diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9380.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9380.json new file mode 100644 index 00000000000..066418035c0 --- /dev/null +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9380.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9380", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T20:15:04.443", + "lastModified": "2024-12-02T20:15:04.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In l2c_lcc_proc_pdu of l2c_fcr.cc, there is a possible out of bounds write\u00a0due to improper input validation. This could lead to remote escalation of\u00a0privilege with no additional execution privileges needed. User interaction\u00a0is needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9381.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9381.json new file mode 100644 index 00000000000..693a2db836d --- /dev/null +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9381.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9381", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T20:15:05.440", + "lastModified": "2024-12-02T20:15:05.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In gatts_process_read_by_type_req of gatt_sr.c, there is a possible\u00a0information disclosure due to uninitialized data. This could lead to remote\u00a0information disclosure with no additional execution privileges needed. User\u00a0interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4395.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4395.json index 66c9ccb129f..e6aa4d2eb65 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4395.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4395.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4395", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-30T21:15:10.623", - "lastModified": "2023-11-07T03:57:44.797", + "lastModified": "2024-12-02T19:15:06.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -65,6 +65,22 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://packetstormsecurity.com/files/177934/WordPress-Membership-For-WooCommerce-Shell-Upload.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://wpscan.com/vulnerability/80407ac4-8ce3-4df7-9c41-007b69045c40", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + }, + { + "url": "https://www.exploit-db.com/exploits/51959", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json index 4b8b7feab58..3cb4ed36bcc 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36357.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36357", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-22T20:15:09.823", - "lastModified": "2023-06-30T16:26:56.567", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-02T19:15:07.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,6 +19,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +28,7 @@ "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.7, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.1, "impactScore": 4.0 @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ @@ -219,6 +229,14 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/5/TL-WR941ND_TL-WR940N_TL-WR841N_userRpm_LocalManageControlRpm.md", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44341.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44341.json index 05535a7d96e..7b00c8ab855 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44341.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44341.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44341", "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T01:41:12.810", - "lastModified": "2024-02-29T13:49:47.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:14:51.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.4.2", + "matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.5.1", + "matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45727.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45727.json index b5a2510d7ac..18efb418ef6 100644 --- a/CVE-2023/CVE-2023-457xx/CVE-2023-45727.json +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45727.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45727", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-10-18T10:15:08.643", - "lastModified": "2023-10-25T17:31:59.553", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-02T19:15:08.390", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,27 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -49,6 +69,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ @@ -101,6 +131,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://jvn.jp/en/jp/JVN95981460/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] + }, + { + "url": "https://www.proself.jp/information/153/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1674.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1674.json index bd1b43b7ddb..02d6ef5e460 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1674.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1674.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1674", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.430", - "lastModified": "2024-02-26T16:27:52.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T19:51:32.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "La implementaci\u00f3n inadecuada en Navegaci\u00f3n en Google Chrome anterior a 122.0.6261.57 permiti\u00f3 a un atacante remoto eludir las restricciones de navegaci\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.6261.57", + "matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://issues.chromium.org/issues/40095183", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://issues.chromium.org/issues/40095183", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1675.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1675.json index 1f107dc6813..843a8f035e8 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1675.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1675", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.540", - "lastModified": "2024-02-26T16:27:52.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T19:54:08.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,140 @@ "value": "La aplicaci\u00f3n insuficiente de pol\u00edticas en Descargas en Google Chrome anteriores a 122.0.6261.57 permiti\u00f3 a un atacante remoto eludir las restricciones del sistema de archivos a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.6261.57", + "matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://issues.chromium.org/issues/41486208", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://issues.chromium.org/issues/41486208", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json index a7903d7c55a..f5df9d693b2 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20768", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:09.470", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:20:27.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json index 0b62182d32d..4c722e8aac6 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30283", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:08.407", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:43:17.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -49,12 +49,69 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json index 9724cb3fcd1..5eb7fbf50bf 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30286", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:09.097", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:43:09.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json index ec5109284ee..5f3dc87e396 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30287.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30287", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:09.700", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:43:02.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json index a1a84d9b573..b7bad04d931 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30288", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:10.330", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:42:53.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,12 +49,69 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json index 3eebcf6e917..29c61e73f94 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30289", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:10.897", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:42:43.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,19 +42,76 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json index 0c9714b8fb2..a5612ba8c81 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30290.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30290", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:11.527", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:42:22.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json index 60c00f1d715..970fe3cf39a 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30291.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30291", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:12.107", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:42:16.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json index b24036872a8..a4e35670ef8 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30292", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:12.713", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:42:07.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,57 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2020.6", + "matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2022", + "versionEndExcluding": "2022.4", + "matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json index 2dd22d30dee..96f4b64fa5a 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30307", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:12.910", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T20:16:16.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.0", + "matchCriteriaId": "CD315CE1-12F5-4A6B-AC9A-248B6230428C" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35451.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35451.json index f3ac79a7038..cb54537d40e 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35451.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35451.json @@ -2,16 +2,55 @@ "id": "CVE-2024-35451", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T05:15:05.690", - "lastModified": "2024-11-29T05:15:05.690", - "vulnStatus": "Received", + "lastModified": "2024-12-02T20:15:06.700", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "LinkStack 2.7.9 through 4.7.7 allows resources\\views\\components\\favicon.blade.php link SSRF." + }, + { + "lang": "es", + "value": "LinkStack 2.7.9 a 4.7.7 permite que resources\\views\\components\\favicon.blade.php se vincule con SSRF." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://datafarm.co.th/blog/CVE-2024-35451:-From-%28Authenticated%29-SSRF-to-Remote-Code-Execution", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39343.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39343.json new file mode 100644 index 00000000000..694fc315955 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39343.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-39343", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T20:15:06.993", + "lastModified": "2024-12-02T20:15:06.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52724.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52724.json new file mode 100644 index 00000000000..ccce56a34d8 --- /dev/null +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52724.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-52724", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T19:15:10.697", + "lastModified": "2024-12-02T19:15:10.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ZZCMS 2023 was discovered to contain a SQL injection vulnerability in /q/show.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/npubaishao/768b638ab16b7da6478d028aeb25bbbc", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/npubaishao/zzcms_sql_injection/blob/main/zzcms_sql_injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53364.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53364.json index 0d78c25fc5b..6fef0b1354e 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53364.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53364.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53364", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T17:15:12.933", - "lastModified": "2024-12-02T17:15:12.933", + "lastModified": "2024-12-02T20:15:07.487", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A SQL injection vulnerability was found in PHPGURUKUL Vehicle Parking Management System v1.13 in /users/view-detail.php. This vulnerability affects the viewid parameter, where improper input sanitization allows attackers to inject malicious SQL queries." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://phpgurukul.com", diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53484.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53484.json new file mode 100644 index 00000000000..d9f881c6da5 --- /dev/null +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53484.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-53484", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T19:15:10.820", + "lastModified": "2024-12-02T19:15:10.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ever Traduora 0.20.0 and below is vulnerable to Privilege Escalation due to the use of a hard-coded JWT signing key." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ever-co/ever-traduora/issues/431%2C", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ever-co/ever-traduora/pull/432%2C", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-53484/Description.md", + "source": "cve@mitre.org" + }, + { + "url": "https://youtu.be/8JL89syikLE", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53617.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53617.json new file mode 100644 index 00000000000..71e670298fb --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53617.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-53617", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T19:15:10.940", + "lastModified": "2024-12-02T20:15:07.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LibrePhotos/librephotos/commit/32237ddc0b6293a69b983a07b5ad462fcdd6c929", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LibrePhotos/librephotos/pull/1476", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ii5mai1/CVE-2024-53617", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53623.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53623.json index 2ad50863634..1350ac71b2b 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53623.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53623.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53623", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T23:15:04.943", - "lastModified": "2024-11-29T23:15:04.943", - "vulnStatus": "Received", + "lastModified": "2024-12-02T20:15:07.917", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in the component l_0_0.xml of TP-Link ARCHER-C7 v5 allows attackers to access sensitive information." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en el componente l_0_0.xml de TP-Link ARCHER-C7 v5 permite a los atacantes acceder a informaci\u00f3n confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Crane-c/CVE_Request/blob/main/TP-Link/C7v5/TPLink_ARCHERC7v5_unauthorized_access_vulnerability_first.md", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53861.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53861.json index fd18e5f8a31..3a9539bedc0 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53861.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53861.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53861", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-29T19:15:09.433", - "lastModified": "2024-11-29T19:15:09.433", - "vulnStatus": "Received", + "lastModified": "2024-12-02T19:15:12.150", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "pyjwt is a JSON Web Token implementation in Python. An incorrect string comparison is run for `iss` checking, resulting in `\"acb\"` being accepted for `\"_abc_\"`. This is a bug introduced in version 2.10.0: checking the \"iss\" claim changed from `isinstance(issuer, list)` to `isinstance(issuer, Sequence)`. Since str is a Sequnce, but not a list, `in` is also used for string comparison. This results in `if \"abc\" not in \"__abcd__\":` being checked instead of `if \"abc\" != \"__abc__\":`. Signature checks are still present so real world impact is likely limited to denial of service scenarios. This issue has been patched in version 2.10.1. All users are advised to upgrade. There are no known workarounds for this vulnerability." + }, + { + "lang": "es", + "value": "pyjwt es una implementaci\u00f3n de JSON Web Token en Python. Se ejecuta una comparaci\u00f3n de cadena incorrecta para la comprobaci\u00f3n de `iss`, lo que da como resultado que `\"acb\"` se acepte en lugar de `\"_abc_\"`. Este es un error introducido en la versi\u00f3n 2.10.0: la comprobaci\u00f3n de la reclamaci\u00f3n \"iss\" cambi\u00f3 de `isinstance(issuer, list)` a `isinstance(issuer, Sequence)`. Dado que str es una secuencia, pero no una lista, `in` tambi\u00e9n se utiliza para la comparaci\u00f3n de cadenas. Esto da como resultado que se compruebe `if \"abc\" not in \"__abcd__\":` en lugar de `if \"abc\" != \"__abc__\":`. Las comprobaciones de firma a\u00fan est\u00e1n presentes, por lo que es probable que el impacto en el mundo real se limite a escenarios de denegaci\u00f3n de servicio. Este problema se ha corregido en la versi\u00f3n 2.10.1. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad." } ], "metrics": { @@ -18,27 +22,27 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N", - "baseScore": 0.0, - "baseSeverity": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.2, + "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", - "integrityImpact": "NONE", + "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 0.7, - "impactScore": 0.0 + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53900.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53900.json new file mode 100644 index 00000000000..5f49814b04e --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53900.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-53900", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T20:15:08.347", + "lastModified": "2024-12-02T20:15:08.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mongoose before 8.8.3 can improperly use $where in match." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Automattic/mongoose/blob/master/CHANGELOG.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Automattic/mongoose/commit/c9e86bff7eef477da75a29af62a06d41a835a156", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Automattic/mongoose/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://www.npmjs.com/package/mongoose?activeTab=versions", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5890.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5890.json new file mode 100644 index 00000000000..71a4c883726 --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5890.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-5890", + "sourceIdentifier": "psirt@servicenow.com", + "published": "2024-12-02T19:15:12.357", + "lastModified": "2024-12-02T19:15:12.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ServiceNow has addressed an HTML injection vulnerability that was identified in the Now Platform. This vulnerability could potentially enable an unauthenticated user to modify a web page or redirect users to another website.\n\nServiceNow released updates\u00a0to customers that addressed this vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance(s) as soon as possible." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1710511", + "source": "psirt@servicenow.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7edc67c1a95..a03cbb1c560 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-02T19:00:42.087633+00:00 +2024-12-02T21:00:30.701836+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-02T18:31:56.817000+00:00 +2024-12-02T20:43:17.603000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -271912 +271920 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `8` -- [CVE-2024-49763](CVE-2024/CVE-2024-497xx/CVE-2024-49763.json) (`2024-12-02T17:15:11.830`) -- [CVE-2024-50380](CVE-2024/CVE-2024-503xx/CVE-2024-50380.json) (`2024-12-02T17:15:11.980`) -- [CVE-2024-50381](CVE-2024/CVE-2024-503xx/CVE-2024-50381.json) (`2024-12-02T17:15:12.160`) -- [CVE-2024-52596](CVE-2024/CVE-2024-525xx/CVE-2024-52596.json) (`2024-12-02T17:15:12.353`) -- [CVE-2024-52806](CVE-2024/CVE-2024-528xx/CVE-2024-52806.json) (`2024-12-02T17:15:12.580`) -- [CVE-2024-53259](CVE-2024/CVE-2024-532xx/CVE-2024-53259.json) (`2024-12-02T17:15:12.767`) -- [CVE-2024-53364](CVE-2024/CVE-2024-533xx/CVE-2024-53364.json) (`2024-12-02T17:15:12.933`) -- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2024-12-02T18:15:11.353`) -- [CVE-2024-53566](CVE-2024/CVE-2024-535xx/CVE-2024-53566.json) (`2024-12-02T18:15:11.500`) -- [CVE-2024-53990](CVE-2024/CVE-2024-539xx/CVE-2024-53990.json) (`2024-12-02T18:15:11.753`) -- [CVE-2024-53992](CVE-2024/CVE-2024-539xx/CVE-2024-53992.json) (`2024-12-02T17:15:14.113`) +- [CVE-2018-9380](CVE-2018/CVE-2018-93xx/CVE-2018-9380.json) (`2024-12-02T20:15:04.443`) +- [CVE-2018-9381](CVE-2018/CVE-2018-93xx/CVE-2018-9381.json) (`2024-12-02T20:15:05.440`) +- [CVE-2024-39343](CVE-2024/CVE-2024-393xx/CVE-2024-39343.json) (`2024-12-02T20:15:06.993`) +- [CVE-2024-52724](CVE-2024/CVE-2024-527xx/CVE-2024-52724.json) (`2024-12-02T19:15:10.697`) +- [CVE-2024-53484](CVE-2024/CVE-2024-534xx/CVE-2024-53484.json) (`2024-12-02T19:15:10.820`) +- [CVE-2024-53617](CVE-2024/CVE-2024-536xx/CVE-2024-53617.json) (`2024-12-02T19:15:10.940`) +- [CVE-2024-53900](CVE-2024/CVE-2024-539xx/CVE-2024-53900.json) (`2024-12-02T20:15:08.347`) +- [CVE-2024-5890](CVE-2024/CVE-2024-58xx/CVE-2024-5890.json) (`2024-12-02T19:15:12.357`) ### CVEs modified in the last Commit -Recently modified CVEs: `37` +Recently modified CVEs: `20` -- [CVE-2024-20127](CVE-2024/CVE-2024-201xx/CVE-2024-20127.json) (`2024-12-02T17:15:09.827`) -- [CVE-2024-20128](CVE-2024/CVE-2024-201xx/CVE-2024-20128.json) (`2024-12-02T17:15:10.230`) -- [CVE-2024-22272](CVE-2024/CVE-2024-222xx/CVE-2024-22272.json) (`2024-12-02T18:15:09.290`) -- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T18:15:09.453`) -- [CVE-2024-30282](CVE-2024/CVE-2024-302xx/CVE-2024-30282.json) (`2024-12-02T17:48:54.733`) -- [CVE-2024-34923](CVE-2024/CVE-2024-349xx/CVE-2024-34923.json) (`2024-12-02T18:15:09.617`) -- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-12-02T17:15:10.497`) -- [CVE-2024-35367](CVE-2024/CVE-2024-353xx/CVE-2024-35367.json) (`2024-12-02T17:15:10.680`) -- [CVE-2024-35368](CVE-2024/CVE-2024-353xx/CVE-2024-35368.json) (`2024-12-02T17:15:10.860`) -- [CVE-2024-35371](CVE-2024/CVE-2024-353xx/CVE-2024-35371.json) (`2024-12-02T17:15:11.037`) -- [CVE-2024-36610](CVE-2024/CVE-2024-366xx/CVE-2024-36610.json) (`2024-12-02T17:15:11.230`) -- [CVE-2024-36612](CVE-2024/CVE-2024-366xx/CVE-2024-36612.json) (`2024-12-02T17:15:11.420`) -- [CVE-2024-36616](CVE-2024/CVE-2024-366xx/CVE-2024-36616.json) (`2024-12-02T18:15:09.857`) -- [CVE-2024-36617](CVE-2024/CVE-2024-366xx/CVE-2024-36617.json) (`2024-12-02T18:15:10.270`) -- [CVE-2024-36618](CVE-2024/CVE-2024-366xx/CVE-2024-36618.json) (`2024-12-02T18:15:10.520`) -- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-12-02T17:36:33.403`) -- [CVE-2024-40075](CVE-2024/CVE-2024-400xx/CVE-2024-40075.json) (`2024-12-02T18:15:10.760`) -- [CVE-2024-46054](CVE-2024/CVE-2024-460xx/CVE-2024-46054.json) (`2024-12-02T17:15:11.610`) -- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-12-02T18:31:56.817`) -- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T18:15:11.123`) -- [CVE-2024-53504](CVE-2024/CVE-2024-535xx/CVE-2024-53504.json) (`2024-12-02T17:15:13.047`) -- [CVE-2024-53505](CVE-2024/CVE-2024-535xx/CVE-2024-53505.json) (`2024-12-02T17:15:13.257`) -- [CVE-2024-53506](CVE-2024/CVE-2024-535xx/CVE-2024-53506.json) (`2024-12-02T17:15:13.497`) -- [CVE-2024-53507](CVE-2024/CVE-2024-535xx/CVE-2024-53507.json) (`2024-12-02T17:15:13.707`) -- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2024-12-02T17:15:13.913`) +- [CVE-2022-4395](CVE-2022/CVE-2022-43xx/CVE-2022-4395.json) (`2024-12-02T19:15:06.587`) +- [CVE-2023-36357](CVE-2023/CVE-2023-363xx/CVE-2023-36357.json) (`2024-12-02T19:15:07.480`) +- [CVE-2023-44341](CVE-2023/CVE-2023-443xx/CVE-2023-44341.json) (`2024-12-02T20:14:51.967`) +- [CVE-2023-45727](CVE-2023/CVE-2023-457xx/CVE-2023-45727.json) (`2024-12-02T19:15:08.390`) +- [CVE-2024-1674](CVE-2024/CVE-2024-16xx/CVE-2024-1674.json) (`2024-12-02T19:51:32.163`) +- [CVE-2024-1675](CVE-2024/CVE-2024-16xx/CVE-2024-1675.json) (`2024-12-02T19:54:08.677`) +- [CVE-2024-20768](CVE-2024/CVE-2024-207xx/CVE-2024-20768.json) (`2024-12-02T20:20:27.637`) +- [CVE-2024-30283](CVE-2024/CVE-2024-302xx/CVE-2024-30283.json) (`2024-12-02T20:43:17.603`) +- [CVE-2024-30286](CVE-2024/CVE-2024-302xx/CVE-2024-30286.json) (`2024-12-02T20:43:09.190`) +- [CVE-2024-30287](CVE-2024/CVE-2024-302xx/CVE-2024-30287.json) (`2024-12-02T20:43:02.727`) +- [CVE-2024-30288](CVE-2024/CVE-2024-302xx/CVE-2024-30288.json) (`2024-12-02T20:42:53.247`) +- [CVE-2024-30289](CVE-2024/CVE-2024-302xx/CVE-2024-30289.json) (`2024-12-02T20:42:43.033`) +- [CVE-2024-30290](CVE-2024/CVE-2024-302xx/CVE-2024-30290.json) (`2024-12-02T20:42:22.897`) +- [CVE-2024-30291](CVE-2024/CVE-2024-302xx/CVE-2024-30291.json) (`2024-12-02T20:42:16.157`) +- [CVE-2024-30292](CVE-2024/CVE-2024-302xx/CVE-2024-30292.json) (`2024-12-02T20:42:07.283`) +- [CVE-2024-30307](CVE-2024/CVE-2024-303xx/CVE-2024-30307.json) (`2024-12-02T20:16:16.277`) +- [CVE-2024-35451](CVE-2024/CVE-2024-354xx/CVE-2024-35451.json) (`2024-12-02T20:15:06.700`) +- [CVE-2024-53364](CVE-2024/CVE-2024-533xx/CVE-2024-53364.json) (`2024-12-02T20:15:07.487`) +- [CVE-2024-53623](CVE-2024/CVE-2024-536xx/CVE-2024-53623.json) (`2024-12-02T20:15:07.917`) +- [CVE-2024-53861](CVE-2024/CVE-2024-538xx/CVE-2024-53861.json) (`2024-12-02T19:15:12.150`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9ccd2b8433b..3a0f0c4b679 100644 --- a/_state.csv +++ b/_state.csv @@ -126937,6 +126937,8 @@ CVE-2018-9371,0,0,dce1635a39fc875c3a6010e78992681138a4af74d8f57da615da4dd9d5becb CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000 CVE-2018-9374,0,0,b5c9257b4379d5ec059f557b277f9ab8f86bedde18eae66967ba271cf76e5f31,2024-11-29T22:15:06.327000 CVE-2018-9377,0,0,e4a0a8bd1ac9734ae148f92ac66c4e7d1d997837e82ad8c47cc9f88531e107dc,2024-11-29T22:15:06.483000 +CVE-2018-9380,1,1,0cc9720b8e47ec2d5bd020aeebcb8430890e5213bf61503748dc373711e983f7,2024-12-02T20:15:04.443000 +CVE-2018-9381,1,1,8de3083231df9c7abf0f8830119091ef6106ff8e1b61d1198db8d22f7c36bfc3,2024-12-02T20:15:05.440000 CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000 CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000 CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000 @@ -209361,7 +209363,7 @@ CVE-2022-43946,0,0,9454164159dbb10a9ad61a906f578ee6e77f1dad056c3ea482f9847b26cc9 CVE-2022-43947,0,0,930ca17bfba7d7c5edef81b50c4bed53316f88b588a9e915ff55d08fcd99e2fd,2023-11-07T03:54:10.187000 CVE-2022-43948,0,0,82504337f08fc51bc776a2c1da2d5aec082839077b37667df962adfb690361e8,2023-11-07T03:54:10.427000 CVE-2022-43949,0,0,6c72abd88f0c5e9d46e60e364b0f8a386336076428497ae4da3e94d618f2f9aa,2023-11-07T03:54:10.637000 -CVE-2022-4395,0,0,fa674d526a224e855adebf9bf4e5c843558feb2c476ab316639a59d270b67690,2023-11-07T03:57:44.797000 +CVE-2022-4395,0,1,467e57fab841a895d97de8d3708cae1f54123076e5e5abcb766a29f9a85bd41f,2024-12-02T19:15:06.587000 CVE-2022-43950,0,0,6742201e2da288c6f1446a59a373009d757b714c07a820521842aa35592f0c05,2023-11-07T03:54:10.837000 CVE-2022-43951,0,0,496c56822957e4145787a5dab7a852893545ed21d01397666cae306817ad2e07,2023-11-07T03:54:11.063000 CVE-2022-43952,0,0,76274f021962892a140dc456f478628abd811f10262c8873bea05e9f8492c4e4,2023-11-07T03:54:11.290000 @@ -221882,7 +221884,7 @@ CVE-2023-28458,0,0,ef73a1fa781dc427433a4344f064cf2c5d295719475229911a534302acd48 CVE-2023-28459,0,0,ff6d9b0d2a61636a2216f5ca3eebb22b60bf4cdf2177e93c8efd3097129af8b8,2023-05-04T12:38:31.430000 CVE-2023-2846,0,0,9aab683976373505e029cb617089a2ec5cce34a049b1b52d471de12eae663bf2,2023-07-10T18:51:01.550000 CVE-2023-28460,0,0,946c7b43c3c7b583cdd2cc158d5075c41f481cca09d32fe7ede01d078026a4ac,2023-03-24T14:57:49.207000 -CVE-2023-28461,0,1,b734dc37bc99200598f1ee9fcd5c811044ce1d1d95438d974fcc0a308eb66f72,2024-12-02T17:15:05.133000 +CVE-2023-28461,0,0,b734dc37bc99200598f1ee9fcd5c811044ce1d1d95438d974fcc0a308eb66f72,2024-12-02T17:15:05.133000 CVE-2023-28462,0,0,2e19120130c69bbcf347fab95b0e8c139f8b88e9e8bf09f2cd8f0d3aa1bc78bf,2023-04-07T17:19:22.730000 CVE-2023-28464,0,0,cb3ff9a13e0f593237f005a371ce64a52ab72b86a221c83df504e264520ebe96,2023-12-22T21:04:49.027000 CVE-2023-28465,0,0,06c8e63c2eb4a5851617744052850dfe59bf346dbe17e85c1e39e4479aeba7f3,2023-12-15T16:35:16.623000 @@ -227733,19 +227735,19 @@ CVE-2023-36351,0,0,4e41961541ac78849f8aab63adfbcd0727b537f75956145c83242ef2d9af6 CVE-2023-36354,0,0,3012502699f5ab60433e9398c145155b6da1a5364596cc6383c9819a14af809b,2023-06-29T20:45:07.187000 CVE-2023-36355,0,0,ffe90f8a7e879810f87e5e896a76276491565a663822003d1bb7fff0b535aff0,2023-07-04T17:15:10.850000 CVE-2023-36356,0,0,b5d4bc3aef30a2b056aa0749109155967237df455fbc3d3a2c517ad3ef391555,2023-06-30T16:18:59.383000 -CVE-2023-36357,0,0,bfe3b576c195b8daf0bbd4d3004add3bbb70d986e0edcddddbc8791300981f36,2023-06-30T16:26:56.567000 +CVE-2023-36357,0,1,7f8ec13898de07f57c7e8e66d0c8d2ff725c2b13b80d89d540b0324101332414,2024-12-02T19:15:07.480000 CVE-2023-36358,0,0,e8205291295a9879a960f26b0fc8aa8de236189b0ca638e99ab394ed48966169,2023-06-30T13:47:39.297000 CVE-2023-36359,0,0,e37b9be911e04ec3ff31e7ef9f5eb59833aaea9fd5ca5c06d32cd8c864c3b67a,2023-06-29T20:44:26.790000 CVE-2023-3636,0,0,614dee89b74d1f88be51816c6b660ce2752056d128833834b326387d81db8a9e,2023-11-07T04:19:12.717000 CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000 CVE-2023-36361,0,0,93cdaa989b68200231a2525ea584dfaf163e866781f3629fc9440cd09f618cc4,2023-09-08T16:47:42.827000 -CVE-2023-36362,0,1,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000 -CVE-2023-36363,0,1,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000 -CVE-2023-36364,0,1,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000 -CVE-2023-36365,0,1,3cee1646a92411ae23b58da3264be3882c3ee35cfa85a4db2f58ac1601bb3fc8,2024-12-02T17:15:06.967000 -CVE-2023-36366,0,1,cffbaf0f33498e58d50fcda5793d9e85b5fef16d30d1ce519a19c604bf7e95f2,2024-12-02T17:15:07.090000 -CVE-2023-36367,0,1,ccf739078a731238f1d3bcf2947ff92dafbcfdd82ca9fb37f44d15486d147e6f,2024-12-02T17:15:07.213000 -CVE-2023-36368,0,1,06ed99c7c4b2db13bcde5eee55492c7c3d29c8ba6e669450d0841c38994eb9b9,2024-12-02T17:15:07.343000 +CVE-2023-36362,0,0,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000 +CVE-2023-36363,0,0,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000 +CVE-2023-36364,0,0,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000 +CVE-2023-36365,0,0,3cee1646a92411ae23b58da3264be3882c3ee35cfa85a4db2f58ac1601bb3fc8,2024-12-02T17:15:06.967000 +CVE-2023-36366,0,0,cffbaf0f33498e58d50fcda5793d9e85b5fef16d30d1ce519a19c604bf7e95f2,2024-12-02T17:15:07.090000 +CVE-2023-36367,0,0,ccf739078a731238f1d3bcf2947ff92dafbcfdd82ca9fb37f44d15486d147e6f,2024-12-02T17:15:07.213000 +CVE-2023-36368,0,0,06ed99c7c4b2db13bcde5eee55492c7c3d29c8ba6e669450d0841c38994eb9b9,2024-12-02T17:15:07.343000 CVE-2023-36369,0,0,1397030efe1debf1a2c78b87207e3a04ff15859d12f5f46231974de7e2ee8274,2023-06-29T18:00:21.530000 CVE-2023-3637,0,0,73ac1481ddc1df889412bda0c2583fec7bc5e2313684ecf116cb691307a3f25b,2023-11-07T04:19:12.810000 CVE-2023-36370,0,0,e114760f1feacab67ceb84869de8d52f3d37062c55d26b2af18b46ed8f63846d,2023-06-29T17:50:13.513000 @@ -233901,7 +233903,7 @@ CVE-2023-44338,0,0,fceb66f519f57c084dcf66fed4cec095683a38b3d185d014206f57cd36a46 CVE-2023-44339,0,0,bb5be312cfbea4ba9c930505f7c7fcb81033beb4c672f7a0c06d918de19173b2,2023-12-04T17:34:46.583000 CVE-2023-4434,0,0,bab0423e657791622a5b1409fa9318c47786d7a606db9ea15a66615a867b1044,2023-08-25T17:57:45.133000 CVE-2023-44340,0,0,b21cbcd12707cbbd4a9d675bde35dbb9ee00edc609212e10acc00e505adf0941,2023-12-04T16:15:08.083000 -CVE-2023-44341,0,0,55625d7cf830a15b7b9ab1f3af48dba559a45f5088b8dff0fd31b6cc5eff7c6c,2024-02-29T13:49:47.277000 +CVE-2023-44341,0,1,828a7a9a18d5f7af7b82657b7cde66e4ef46869412e2a2d6887decf9962a8019,2024-12-02T20:14:51.967000 CVE-2023-44342,0,0,0c8bedb7886b7171854ef831382334ac881a68f538b7d273dcef6fd357215323,2024-02-29T13:49:47.277000 CVE-2023-44343,0,0,8fd557cf540814772da5b8f541b9a82e772c312189a977dcf6ce0e2afc55c609,2024-02-29T13:49:47.277000 CVE-2023-44344,0,0,c241d06a46154624c7347cb87577b52cd441f5be92768e1d05ef69e662dda1ca,2024-02-29T13:49:47.277000 @@ -234689,7 +234691,7 @@ CVE-2023-45722,0,0,4240dd682886c768ab9b9a025ce52687e223d3b5bc66b3a8ef1362427eaf3 CVE-2023-45723,0,0,d75569efe29622a0fceee924d9f808ceeedc0897b5e709cd04faad485aeb7c09,2024-01-09T18:52:37.707000 CVE-2023-45724,0,0,d957afe86c592e8319388b49220462c05dc155b1c149c8e2b8f7290372cc8a41,2024-01-09T18:34:41.837000 CVE-2023-45725,0,0,4be92db793dd202daa1a3bc98875d9a583e5498eb2cacfe9e3765b156e332912,2023-12-20T18:32:15.360000 -CVE-2023-45727,0,0,fd816f9fab63a8b1a8932e920970f61987745f7a8a0c00ecf469bff7165fffb9,2023-10-25T17:31:59.553000 +CVE-2023-45727,0,1,f1e978bfdbac20d70116743d7e239fd9d61802cf9fcce1a1bef0439bb8e689df,2024-12-02T19:15:08.390000 CVE-2023-4573,0,0,8c2c56b4c0641002c802a71d0b3ecc92540f29cc9ee6db1aabe5f4a00eb5a7e0,2024-10-21T13:55:03.510000 CVE-2023-45733,0,0,b0aa2fba9e6a64d0852357607afb3a43fdbb4b3413ce5b91e26ae220829c70ff,2024-05-17T18:36:05.263000 CVE-2023-45734,0,0,bcdee8c11a0e8a4792b5d7f342842becf89dbf6ffedf6c74619e3ac3b10011b3,2024-09-09T12:21:53.383000 @@ -243795,7 +243797,7 @@ CVE-2024-11692,0,0,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff CVE-2024-11693,0,0,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000 CVE-2024-11694,0,0,8fab8f6682482c80a046d7efcb5d62937e3f2364960b2f04726b7a87f7e40748,2024-11-27T17:15:09.703000 CVE-2024-11695,0,0,923949ea70ffb3960535c924daeac21d36cf8875477a4ac90cebfaddff787cf9,2024-11-27T17:15:09.867000 -CVE-2024-11696,0,1,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000 +CVE-2024-11696,0,0,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000 CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000 CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000 CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000 @@ -243803,7 +243805,7 @@ CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990c CVE-2024-11700,0,0,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000 CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000 CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000 -CVE-2024-11703,0,1,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a91d,2024-12-02T18:15:09.087000 +CVE-2024-11703,0,0,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a91d,2024-12-02T18:15:09.087000 CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000 CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14 CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000 @@ -244340,8 +244342,8 @@ CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767 CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000 CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000 CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000 -CVE-2024-1674,0,0,4d84e36811dabb70c79f006b1fddf82b6781a26d6832b626a618ba98da8173a6,2024-02-26T16:27:52.823000 -CVE-2024-1675,0,0,694007ff503c67bb2473e2a3fd85a3cbeb468f543b49d8b91c288ff6cfb53b8e,2024-02-26T16:27:52.870000 +CVE-2024-1674,0,1,4cf2c5e9e39ff8cbbaa4992242e531b6a235b946fada67dc6b67140da5874399,2024-12-02T19:51:32.163000 +CVE-2024-1675,0,1,6dc11c1ffd0c7e93efd7705d99983d7290104eca7113a2804027689feb726c3f,2024-12-02T19:54:08.677000 CVE-2024-1676,0,0,49c3202c5c497a772989e79ead25a52e922bf653bfa98e11038c1b979dd6584e,2024-11-05T16:35:10.247000 CVE-2024-1677,0,0,6fbed0b3db8f4573d0e0535b3a26ae2bb9498eab495e7625679b1e1f5bc2100b,2024-05-02T18:00:37.360000 CVE-2024-1678,0,0,d7ff889a45c19600d651a095e777206640b8492b0764403803a17b2b0960a8bd,2024-05-02T18:00:37.360000 @@ -244773,7 +244775,7 @@ CVE-2024-20112,0,0,f1fecda0bbefb7976a2e5c2d965f45756c3c554b6bb2aece34ce5311395c4 CVE-2024-20113,0,0,1e9f0bb5dd8b46cb9c193f293f4e7e65c1c4f4218a8b5da37a81aedf61132d39,2024-11-04T18:50:05.607000 CVE-2024-20114,0,0,972dbefe1dd7e2ec5c449b6a55d8a48edf191f12736d3b5ac984afdda696c6ff,2024-11-05T19:58:15.577000 CVE-2024-20115,0,0,e0fbbff01a0fa518c41d64f625797efefd6cdce39d74e0c13995ea3dfe394456,2024-11-04T18:50:05.607000 -CVE-2024-20116,0,1,1000133cf92be5d4167320d25c02ed658b66c4f3c0eea2c90e9d7fc1bf88b623,2024-12-02T17:15:08.113000 +CVE-2024-20116,0,0,1000133cf92be5d4167320d25c02ed658b66c4f3c0eea2c90e9d7fc1bf88b623,2024-12-02T17:15:08.113000 CVE-2024-20117,0,0,6baac420d96eb73610546cd262e04d3589f97187f02f3401eb7616db3fa8d745,2024-11-04T18:50:05.607000 CVE-2024-20118,0,0,f196c02d943f7181a2b543f340de54479a6ac9433fa46d02a1108eafa392e84d,2024-11-04T18:50:05.607000 CVE-2024-20119,0,0,b9d1b34a5ac7be8b5a9ce604f28b7c94e37c0f79b74ec7f206945e209ae81009,2024-11-04T18:50:05.607000 @@ -244783,9 +244785,9 @@ CVE-2024-20121,0,0,4938115c914642adef5ea2985a500e819409d2c7aa3a5388330765c060ef6 CVE-2024-20122,0,0,744b016dd77bf1d3925336cb7504cc81d1bda83c1655bf764225b09f6b0227e4,2024-11-05T08:35:19.593000 CVE-2024-20123,0,0,bdf62a4af5c1c1ed58a1e235ea3a69d58e2afa0181d5f68baf40f699c0511aac,2024-11-04T18:50:05.607000 CVE-2024-20124,0,0,1799547edf556e9de06685a9fcdc4c8ef9057ff40c9829ccf5d3b3aa46605f16,2024-11-04T18:50:05.607000 -CVE-2024-20125,0,1,a95592121d0de2a82283637e180f978c8268829ce83449ebef9c55894c24ce6b,2024-12-02T17:15:09.543000 -CVE-2024-20127,0,1,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000 -CVE-2024-20128,0,1,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000 +CVE-2024-20125,0,0,a95592121d0de2a82283637e180f978c8268829ce83449ebef9c55894c24ce6b,2024-12-02T17:15:09.543000 +CVE-2024-20127,0,0,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000 +CVE-2024-20128,0,0,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000 CVE-2024-20129,0,0,671726aba2b1095472532326d37fd302eed94fd6211ea01542506d4087187d34,2024-12-02T04:15:05.073000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 CVE-2024-20130,0,0,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000 @@ -245241,7 +245243,7 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3 CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000 CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000 CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000 -CVE-2024-20768,0,0,1cf643ff4ccc679c74c7a6bac7cb0ce9c19999fa1e2fa773a0fb6fa47f9b0b34,2024-03-18T19:40:00.173000 +CVE-2024-20768,0,1,0a787ae17c1c9554efbce8083ebf2f71929ddd956de1438a76dc74375b810cb1,2024-12-02T20:20:27.637000 CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000 CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000 CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000 @@ -246625,7 +246627,7 @@ CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a69 CVE-2024-2227,0,0,6858b6fb3beef7b6297eae7344c0bc611e8d1dd2c2ff64967d8d2ab0b2897ccc,2024-03-22T19:02:10.300000 CVE-2024-22270,0,0,b9576398a05665519f8e7fa18c7ea965eb2ef26c2b70aff8574e195025c87aea,2024-08-15T19:35:06.457000 CVE-2024-22271,0,0,c68c7abf466a660fd4d52c665cf118cb88242b1be3f139e271f3b7d99c4e675f,2024-08-01T13:46:54.670000 -CVE-2024-22272,0,1,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000 +CVE-2024-22272,0,0,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000 CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da58959d8,2024-05-22T12:46:53.887000 CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000 CVE-2024-22275,0,0,4e0b17231c07cc777231dbb9d62f6bfa759cfc82db650243f36e18a0ee106c1b,2024-05-22T12:46:53.887000 @@ -251828,7 +251830,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7 CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000 CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 -CVE-2024-29645,0,1,c6d6850a2c13e1d1159098cd4eb2c9b0077860b94792b5ea30ac8f664de7fd64,2024-12-02T18:15:09.453000 +CVE-2024-29645,0,0,c6d6850a2c13e1d1159098cd4eb2c9b0077860b94792b5ea30ac8f664de7fd64,2024-12-02T18:15:09.453000 CVE-2024-2965,0,0,31194867e3c8375be8a7a72353070c45d11fab5833d7a91937e736bd4749a53d,2024-11-03T17:15:13.107000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000 @@ -252407,18 +252409,18 @@ CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940d CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000 CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000 CVE-2024-30281,0,0,aa55f6f337f0eff14aaba79eadac42cf1fa69bcced5e256cfe63f794552ecdfc,2024-05-16T13:03:05.353000 -CVE-2024-30282,0,1,23f906c56739d2637a62852ff21f89b589c2e003e455e0b879928121b47e538e,2024-12-02T17:48:54.733000 -CVE-2024-30283,0,0,ba083c1bacb29a7f333eacd467f9eb4c19b7b166e16a58a9ca533c939d8d2cec,2024-05-16T13:03:05.353000 +CVE-2024-30282,0,0,23f906c56739d2637a62852ff21f89b589c2e003e455e0b879928121b47e538e,2024-12-02T17:48:54.733000 +CVE-2024-30283,0,1,9e8da6a935a66e8cc0ba5dc2d12b3c47dfb3d77dd0f559b5a2de4927dc7e26e5,2024-12-02T20:43:17.603000 CVE-2024-30284,0,0,c3d8cfb90cbc04c8f8451d2b94550163ac2e92e833947aa8e3054cbfbcb5af6b,2024-05-15T16:40:19.330000 CVE-2024-30285,0,0,d5d0073a0c86623254404dea22df638b05a2d50f8dfa4429d0e1bb0ebc3d1cd8,2024-07-09T15:52:12.637000 -CVE-2024-30286,0,0,beef9934f7474ed3314782ff972bc64930801beb5207074639983af9565caf76,2024-05-16T13:03:05.353000 -CVE-2024-30287,0,0,6327776c7df1a6e18971678b18b3516cc6d8ff1ce7bdb0b19d9db717f92b4c8f,2024-05-16T13:03:05.353000 -CVE-2024-30288,0,0,225fdb5419e0a0230c2e4c0a2f327ebf5bd46f1fe156cb7feaea8b392bc87209,2024-05-16T13:03:05.353000 -CVE-2024-30289,0,0,5b7948a8da655d7b6a1a1f110dc3e8446cb3de6f8887af2aef80ca12b3dcea4a,2024-05-16T13:03:05.353000 +CVE-2024-30286,0,1,75adbc0b51f836d9f2b10b0ae55478ab071a31884ca662124852dad5ccb56d6c,2024-12-02T20:43:09.190000 +CVE-2024-30287,0,1,7d0b87d3020256a2d5f84b012b2fcf6ff6489ac9b52ff2f45e12033da8f761e2,2024-12-02T20:43:02.727000 +CVE-2024-30288,0,1,3c09417664156b15182e9b1c6d59cd996098519fbd2be16a7308f1b21d29feb9,2024-12-02T20:42:53.247000 +CVE-2024-30289,0,1,3585e0d3ed5bf6e39023e32ef47376cfc16c1f13711447cb7ae5fdeb55e8f5c7,2024-12-02T20:42:43.033000 CVE-2024-3029,0,0,497ffe4940c4ad919b0790a585fb5a1b548684ec5cdf0a9c9ccfacdc2ebdeebe,2024-04-16T13:24:07.103000 -CVE-2024-30290,0,0,af063bdf169684f0cf2582493d5fce25edf961d5186b6e3519602a8f26adde74,2024-05-16T13:03:05.353000 -CVE-2024-30291,0,0,b1658e0e3d84e2ddcef9c516a7d0728d8dfd3880a614c6fbd47e964ae5d10abd,2024-05-16T13:03:05.353000 -CVE-2024-30292,0,0,b720742a0e521838fd188c1ef72d566e03ce789fd7f6d4efecb01f5d65521489,2024-05-16T13:03:05.353000 +CVE-2024-30290,0,1,41177f0a3696b47485943131d85e9a76808670403ac9b663f81a9664eec567b6,2024-12-02T20:42:22.897000 +CVE-2024-30291,0,1,626e3632f0a9ffe88c0c837d5c97c109f71e5e7517b877a727052bfb28302134,2024-12-02T20:42:16.157000 +CVE-2024-30292,0,1,905628d504199451b227bdc8e1cc783bcc48f3bc506ed15f151bfbe5197dcc2c,2024-12-02T20:42:07.283000 CVE-2024-30293,0,0,cb6d64f28c1d177af9d8787acdb5f1ba6610d7808ccf528bce800949c7d74b22,2024-05-16T13:03:05.353000 CVE-2024-30294,0,0,7166a81324ee6dd52833272914dc6f5ed70b0f6ae30e108fd1b216dad0523d9b,2024-05-16T13:03:05.353000 CVE-2024-30295,0,0,7acbb1c4868f13b65f181cea277a794fc009caf9cee062ee7f161860d6c960f2,2024-05-16T13:03:05.353000 @@ -252434,7 +252436,7 @@ CVE-2024-30303,0,0,29beefe281b7361c70e3d46cb1e8ccb19d06aa60b2190adf964c9790227b9 CVE-2024-30304,0,0,2f0e61c634483371daf468eb219084e155dd462f28241798096506ee1920c008,2024-05-03T12:50:34.250000 CVE-2024-30305,0,0,06a2884c73df2d31a52d1bd390050cc8f729b4ecb20f46a8a57111dab1aed1e3,2024-05-03T12:50:34.250000 CVE-2024-30306,0,0,bd8325522698ffc48ea724274c543ace644daca528131bb314d105d4fa38a7b6,2024-05-03T12:50:34.250000 -CVE-2024-30307,0,0,bf65ad64efc89bbef38478afb5c7092364d919771ab618877a59030928133dbc,2024-05-16T13:03:05.353000 +CVE-2024-30307,0,1,f0696b48a33e78d85b238fe696c465ffab8e32dfc9166fa9661c3e97bf0d35fb,2024-12-02T20:16:16.277000 CVE-2024-30308,0,0,5db84bb1c77c493bd5ac8ed7e018742d1d8a89c45b2de719cb9832260f35cd9c,2024-05-16T13:03:05.353000 CVE-2024-30309,0,0,9a08ca34b700dad3cb2e16c475ae7c7fe2e87ace9e5ca70ca16a8519afa5c91c,2024-05-16T13:03:05.353000 CVE-2024-3031,0,0,fa19e5674d76c5b46624774eba96476ad7fabe41ca511ba02fe99ace14a675a4,2024-06-04T16:57:41.053000 @@ -255900,7 +255902,7 @@ CVE-2024-34914,0,0,488c01684aef7fae520eb6f0628a96a961ab856901df991bf866a786a5c90 CVE-2024-34919,0,0,823c5c451a1eed666cfdb6436f6850bdbb3997f7dfda43c7cb7477056e9bb3ae,2024-07-03T02:00:54.243000 CVE-2024-3492,0,0,8ef42f39857b82e21bb506d939c2ddf771d4cf0a62a956e7e002606ca7a897a1,2024-06-13T18:36:09.010000 CVE-2024-34921,0,0,258d6bc4ff16be25947117b994a7b2305574dc7e88be47c1d8439dffb3fb7800,2024-07-03T02:00:55.040000 -CVE-2024-34923,0,1,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5eb94,2024-12-02T18:15:09.617000 +CVE-2024-34923,0,0,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5eb94,2024-12-02T18:15:09.617000 CVE-2024-34927,0,0,65b6f1073e9034477a827eae4f8e1e96da2dcd8b6b7a4dd6a353ea18c54c97c4,2024-07-03T02:00:55.873000 CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8d7a,2024-07-03T02:00:56.653000 CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000 @@ -256177,12 +256179,12 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000 CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000 CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000 -CVE-2024-35366,0,1,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000 -CVE-2024-35367,0,1,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 -CVE-2024-35368,0,1,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000 +CVE-2024-35366,0,0,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000 +CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 +CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000 CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000 CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000 -CVE-2024-35371,0,1,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000 +CVE-2024-35371,0,0,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000 CVE-2024-35373,0,0,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000 CVE-2024-35374,0,0,aa83a1884752e38a4efa40b8d631e010f03947873314106502ec442b10442cd7,2024-08-20T15:35:14.870000 CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000 @@ -256226,7 +256228,7 @@ CVE-2024-35433,0,0,f81c77793e6b4ae7b0491b15530e15eb48456cdd61c3fc22182d06ed972d4 CVE-2024-35434,0,0,21d86b1029a00b97e65dc0e9f829fff58cf55d0aa50fabcc94705f59669d3cd5,2024-08-22T20:35:11.130000 CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000 CVE-2024-3545,0,0,8572c3ccec0c267251b3f9351679ce5114a5e3088ae0469b492154e558f9687c,2024-11-04T17:35:20.247000 -CVE-2024-35451,0,0,f50a3b93c964a5d9a147bcdf3175925abd519a47a61c0212ee7c26e5c2fa496a,2024-11-29T05:15:05.690000 +CVE-2024-35451,0,1,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000 CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000 CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000 CVE-2024-35469,0,0,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000 @@ -257180,13 +257182,13 @@ CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117e CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000 CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000 CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000 -CVE-2024-36610,0,1,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000 +CVE-2024-36610,0,0,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000 CVE-2024-36611,0,0,42465fba5d209a57964c1117a778f054088fdce7482f6b6bd27c3304a10b7c3d,2024-11-29T19:15:06.780000 -CVE-2024-36612,0,1,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000 +CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000 CVE-2024-36615,0,0,2f8c6f09c7b5113fafb5a41f7e4cbad94a7ad0500652cf2d1c05a06d469ab9d0,2024-11-29T19:15:07.703000 -CVE-2024-36616,0,1,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 -CVE-2024-36617,0,1,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000 -CVE-2024-36618,0,1,1b683ed0f9886fba3e4cae1a9790f48a732ffbacff8e54f88bc0a50590bee2ca,2024-12-02T18:15:10.520000 +CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 +CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000 +CVE-2024-36618,0,0,1b683ed0f9886fba3e4cae1a9790f48a732ffbacff8e54f88bc0a50590bee2ca,2024-12-02T18:15:10.520000 CVE-2024-36619,0,0,d30e29b19403999a360d49eb2b7510653e8a4eeae72cc3067a2b6e14731d746f,2024-11-29T18:15:07.550000 CVE-2024-3662,0,0,bf35bc71372b512799f21214c4add2ef96949612530c04611b0774c90b1261c4,2024-04-15T13:15:31.997000 CVE-2024-36620,0,0,bd940859e3a70ba9f20daee48c18afd5e689ded5655791c03dcd144494e8ab28,2024-11-29T18:15:07.787000 @@ -258602,7 +258604,7 @@ CVE-2024-38472,0,0,e2da2567ed5c1bd58671597c1e4c6860b639e273ff91bc91c02bde109665e CVE-2024-38473,0,0,36c5b6d67728da1356289c3874d586ffc56f76a7fbb2f457e14a9e4a12de691d,2024-08-01T13:54:52.397000 CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f2035049e0,2024-08-21T15:03:30.407000 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 -CVE-2024-38476,0,1,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000 +CVE-2024-38476,0,0,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 CVE-2024-38479,0,0,a59c846ab11aea7508425cae5038126c4ec0f650a8e2bdbef76ed0cb402c0b6f,2024-11-15T13:58:08.913000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 @@ -259198,6 +259200,7 @@ CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453c CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000 CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000 +CVE-2024-39343,1,1,5387f0e37d9edeed6f67983994a72c30c3e3ad56112bee25e823237afaf5f39e,2024-12-02T20:15:06.993000 CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000 CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 @@ -259740,7 +259743,7 @@ CVE-2024-40051,0,0,3d4a07f6874af0ae76d5cc0355a7a49b4d82d6a4d252aa7d1e7489d1164a1 CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000 CVE-2024-40060,0,0,41909e3bdc1614813f63de5445f9f7b9276e4c7561b3b730c75588f114a39308,2024-11-01T14:42:03.693000 CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000 -CVE-2024-40075,0,1,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000 +CVE-2024-40075,0,0,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000 CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000 CVE-2024-40083,0,0,002189cbf2bb61a03947d60ab203b9b2c05b38f7fa5f102a2294b4e285e5aee3,2024-10-23T15:12:34.673000 CVE-2024-40084,0,0,4bfdc024cb91df5bb8d17d66cec084fec7d97ef49264d00142fadf94256b75f9,2024-10-23T15:12:34.673000 @@ -263666,7 +263669,7 @@ CVE-2024-46047,0,0,57a3435cb7b6e94de5fb698161c585c7b5ce0f8c27f8db901c567ec5b0f81 CVE-2024-46048,0,0,8b386e1ce8db1651262779289df0cde97cc0d4c50d015509acb4f6ce2f921783,2024-09-20T00:35:54.187000 CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb874,2024-09-20T00:39:30.443000 CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 -CVE-2024-46054,0,1,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234f2f,2024-12-02T17:15:11.610000 +CVE-2024-46054,0,0,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234f2f,2024-12-02T17:15:11.610000 CVE-2024-46055,0,0,fb3ab0f0de94860a6cfab293110c9c5563c53335293fdfc002812d3e3e3d5f7a,2024-11-27T18:15:13.300000 CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000 CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000 @@ -264253,7 +264256,7 @@ CVE-2024-47074,0,0,267a945e17f4a8e8e3ad906b4a73babdb13651aee69ba771912b3792671fd CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000 CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000 CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000 -CVE-2024-47078,0,1,10afb9e6722a0aa2d390a08f8c9cc758e3470acdae52bc8d53ba79b68f1e0fed,2024-12-02T18:31:56.817000 +CVE-2024-47078,0,0,10afb9e6722a0aa2d390a08f8c9cc758e3470acdae52bc8d53ba79b68f1e0fed,2024-12-02T18:31:56.817000 CVE-2024-47079,0,0,d8ccb016ae09801690996b7754595e296560f1a65a763da55e97f54fd5c7b0dc,2024-10-10T12:57:21.987000 CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000 CVE-2024-47080,0,0,aa86a69aa1a9b207836e4ce6e146e436fefd6cc1a294d7c36c55a2bb96d8f384,2024-10-16T16:38:43.170000 @@ -265789,7 +265792,7 @@ CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9 CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000 CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 -CVE-2024-49763,1,1,390a387f134353159444b9384ca7139409cca538e6054a310492c29d8a68242c,2024-12-02T17:15:11.830000 +CVE-2024-49763,0,0,390a387f134353159444b9384ca7139409cca538e6054a310492c29d8a68242c,2024-12-02T17:15:11.830000 CVE-2024-49764,0,0,35742a982a82bfbac3ba89ac10d6a85fed15175d4d482af0c8f4cf2b3fa6e2cc,2024-11-20T14:40:02.630000 CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000 CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000 @@ -266372,8 +266375,8 @@ CVE-2024-50376,0,0,c17efa3dc650d5a0b44b765200512faffc52101b81c2385c1a9f8e742ee86 CVE-2024-50377,0,0,a88baec8ddbf85dae69a29e2d805cf9a334ef1555a19dac3559d55b727cb3e80,2024-11-26T11:22:08.767000 CVE-2024-50378,0,0,d1e7f6cc1c38465f15ead8b558f025ff2fd8c3e8d0c0fab80553e16623c34e06,2024-11-08T19:01:03.880000 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 -CVE-2024-50380,1,1,5cfd4d3058711977d7b02b9e779feffa0e24d95fd021403d8b8b4f61100953a5,2024-12-02T17:15:11.980000 -CVE-2024-50381,1,1,cc4c78182ccb5412150348a074c0f3fe64b48452294aba2fc4de16da81547ef3,2024-12-02T17:15:12.160000 +CVE-2024-50380,0,0,5cfd4d3058711977d7b02b9e779feffa0e24d95fd021403d8b8b4f61100953a5,2024-12-02T17:15:11.980000 +CVE-2024-50381,0,0,cc4c78182ccb5412150348a074c0f3fe64b48452294aba2fc4de16da81547ef3,2024-12-02T17:15:12.160000 CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000 CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000 CVE-2024-50386,0,0,e8a2dfb379d3c33fde3d10d50a34e7ed2697dcee8b987f61d477faa743f65676,2024-11-12T15:48:59.103000 @@ -267647,7 +267650,7 @@ CVE-2024-52585,0,0,ae573765d0059b6c237eb866187766f9c4c0b67ec566925f547df71f0cc9a CVE-2024-52587,0,0,4ff6d32c0cce5d4db211ff88731438a9a256421cd5f2b2cabeafbdadc8a29ef5,2024-11-19T21:57:32.967000 CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000 CVE-2024-52595,0,0,8a7985528b5682db55ae119b7b5e36765ed6db59aa7644e450a4161b96108d1c,2024-11-25T14:27:38.087000 -CVE-2024-52596,1,1,a1b5270424704526254af72af668772c7edcde11b939184b2a93420e4568a321,2024-12-02T17:15:12.353000 +CVE-2024-52596,0,0,a1b5270424704526254af72af668772c7edcde11b939184b2a93420e4568a321,2024-12-02T17:15:12.353000 CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000 CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 @@ -267673,6 +267676,7 @@ CVE-2024-52711,0,0,25e806d2babc20691476aabfcc4918f38a4f803e2dadea4a566e728ec69d7 CVE-2024-52714,0,0,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476af1a,2024-11-20T20:35:15.260000 CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000 CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0194,2024-11-22T16:15:33.983000 +CVE-2024-52724,1,1,31bcc87a603cca0a8b96eca1f7ca6e15911f791c17c30d44ad001cfd53b29b95,2024-12-02T19:15:10.697000 CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000 CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000 CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000 @@ -267710,7 +267714,7 @@ CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176 CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000 CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000 CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000 -CVE-2024-52806,1,1,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000 +CVE-2024-52806,0,0,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000 CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000 CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000 CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000 @@ -267864,7 +267868,7 @@ CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b6 CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000 CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000 CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000 -CVE-2024-53259,1,1,b56d791ed8a3934da53ca3b2bc8d09134e7671697306e7cd36424993380151b4,2024-12-02T17:15:12.767000 +CVE-2024-53259,0,0,b56d791ed8a3934da53ca3b2bc8d09134e7671697306e7cd36424993380151b4,2024-12-02T17:15:12.767000 CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000 CVE-2024-53260,0,0,f8456e8751226ee5d041fd86437235b7d18924e40a17ade86dc5cd10d0203ce0,2024-11-27T22:15:05.353000 CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000 @@ -267884,7 +267888,7 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 CVE-2024-5335,0,0,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000 CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000 -CVE-2024-53364,1,1,98d19b85cee394f2609af2d3c120e10f09c46dfe00af779065231746b6ce8188,2024-12-02T17:15:12.933000 +CVE-2024-53364,0,1,708f3ece40bf0bf488cd6ba77ae8795762f91e489b51a867d515c5116d6de69d,2024-12-02T20:15:07.487000 CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000 CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000 CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000 @@ -267898,16 +267902,17 @@ CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000 CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000 CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000 -CVE-2024-53459,0,1,bcee038fd506b2d042b2e2518da0df51a6c3759ec3722aac04f828072f98c4d4,2024-12-02T18:15:11.123000 +CVE-2024-53459,0,0,bcee038fd506b2d042b2e2518da0df51a6c3759ec3722aac04f828072f98c4d4,2024-12-02T18:15:11.123000 CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000 CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000 CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000 +CVE-2024-53484,1,1,7f2e36a94d2ab38efc349e912aac79a8f2255c98dd9d4e3cafa14fba72ce9911,2024-12-02T19:15:10.820000 CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000 CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000 -CVE-2024-53504,0,1,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000 -CVE-2024-53505,0,1,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000 -CVE-2024-53506,0,1,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000 -CVE-2024-53507,0,1,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000 +CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000 +CVE-2024-53505,0,0,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000 +CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000 +CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000 CVE-2024-5351,0,0,5b3be503117b69cfbfdb88b1fae31317d85f3a58c24bc4f082dcbe98687cb2c4,2024-06-04T19:21:05.570000 CVE-2024-5352,0,0,da1c4d8b4e23dadce106da9517801ea125925e8071854aa14e0650ba3020a2bf,2024-06-21T18:15:11.303000 CVE-2024-5353,0,0,525ae1f28e269a2f910a2998894d881f94e776efad76469271fac08c213e4cb6,2024-06-04T19:21:05.680000 @@ -267917,8 +267922,8 @@ CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8 CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000 CVE-2024-53556,0,0,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000 -CVE-2024-53564,1,1,e10a96030ded2829a41b48cc1671c01830a59f8174dc924d23b218915340bc5b,2024-12-02T18:15:11.353000 -CVE-2024-53566,1,1,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000 +CVE-2024-53564,0,0,e10a96030ded2829a41b48cc1671c01830a59f8174dc924d23b218915340bc5b,2024-12-02T18:15:11.353000 +CVE-2024-53566,0,0,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000 CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000 CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000 CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59eee,2024-06-04T19:21:06.183000 @@ -267929,10 +267934,11 @@ CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f8 CVE-2024-53604,0,0,f62d305bb98148833da87db5a11321e6ca6d6dd658f1c5fbfba2d66d119aa0aa,2024-11-29T14:15:05.893000 CVE-2024-53605,0,0,ca300feecc4d15af3b8cbc938be55c089599ebfcca8298d8fee9c4660ffccb57,2024-12-02T01:15:04.030000 CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000 +CVE-2024-53617,1,1,1d15b7d8455e44e7d682bb17f092211a84550d994186e8d8092655932756eace,2024-12-02T20:15:07.710000 CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000 CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000 CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000 -CVE-2024-53623,0,0,55226a98c0510658df56bd966155efe791cb5e146bf4a5e4e52f80516760f206,2024-11-29T23:15:04.943000 +CVE-2024-53623,0,1,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000 CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000 CVE-2024-53635,0,0,6e8b5160fce2a741e8ac5d43a4a38430a8c2b5d2b740bbc37c715cac813c59a2,2024-11-27T18:15:18.130000 CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000 @@ -268053,7 +268059,7 @@ CVE-2024-53855,0,0,3b7a475c32d1d09fe2eb4189fd1d6fb7d653d88d8eb34139f0255f4c5d06f CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2567,2024-11-27T22:15:05.520000 CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000 CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000 -CVE-2024-53861,0,0,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000 +CVE-2024-53861,0,1,c906a7c9ad7960370bb443153ada29d340a316d0e26a761ec82eb161aaf6e2d4,2024-12-02T19:15:12.150000 CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000 CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000 CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000 @@ -268062,6 +268068,7 @@ CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273 CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000 CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada266a,2024-11-26T18:23:09.517000 CVE-2024-5390,0,0,577e03013c579fd5ea5c07b95a092cd4d32be3fa4130d25da9e61ffe468007ab,2024-06-04T19:21:08.020000 +CVE-2024-53900,1,1,d85cbefb465ea902cbbe0e0389f3f5eff99eb2d1812c50eefe5ac1d7199e1a85,2024-12-02T20:15:08.347000 CVE-2024-53901,0,0,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000 CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000 CVE-2024-5391,0,0,a7c29f93c1b76aed47351138468a6c5b251b9f9a4ad39cf688118719a36ed1c7,2024-06-07T20:15:12.687000 @@ -268073,7 +268080,7 @@ CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000 CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000 CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000 -CVE-2024-53920,0,1,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000 +CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000 CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000 CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000 CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000 @@ -268089,8 +268096,8 @@ CVE-2024-53981,0,0,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000 CVE-2024-53984,0,0,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000 CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000 -CVE-2024-53990,1,1,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000 -CVE-2024-53992,1,1,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000 +CVE-2024-53990,0,0,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000 +CVE-2024-53992,0,0,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000 CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000 CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000 CVE-2024-54004,0,0,4b55764e78df7d1fab73ac81a29fd36001f40116e182b6aab547372d06b234b5,2024-11-27T19:15:33.723000 @@ -268540,6 +268547,7 @@ CVE-2024-5885,0,0,dcdbec1e5ab1fdbf77f5f1b7e765973fbf7491d04e03a7c4b99d66ab0997c5 CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000 CVE-2024-5889,0,0,fbcff794637f48a8b78c74fdd2956f49b1e81babb06e13aa124ccff6d03acd89,2024-08-01T16:50:43.603000 +CVE-2024-5890,1,1,7c6b5ac721dd6914eae890c33082005820010469b56039e337acfc1334e10773,2024-12-02T19:15:12.357000 CVE-2024-5891,0,0,a1103d3c594e6c6c8995aad9b94775b3d253fc3aed0174490e511fc908219bb6,2024-10-04T12:32:13.813000 CVE-2024-5892,0,0,c827287e71db613eefb73da2ddb327e45b7bab6b508053dda1226986578187ad,2024-06-13T18:36:09.013000 CVE-2024-5893,0,0,78ef67dfe3790c320a0f9ba1a7349940f70da93d76f5f0750d1f242e1c8acc0a,2024-08-14T14:02:14.170000