Auto-Update: 2024-12-02T21:00:30.701836+00:00

This commit is contained in:
cad-safe-bot 2024-12-02 21:03:42 +00:00
parent 8e6168a40a
commit a8a0356fe4
30 changed files with 1530 additions and 236 deletions

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9380",
"sourceIdentifier": "security@android.com",
"published": "2024-12-02T20:15:04.443",
"lastModified": "2024-12-02T20:15:04.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In l2c_lcc_proc_pdu of l2c_fcr.cc, there is a possible out of bounds write\u00a0due to improper input validation. This could lead to remote escalation of\u00a0privilege with no additional execution privileges needed. User interaction\u00a0is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9381",
"sourceIdentifier": "security@android.com",
"published": "2024-12-02T20:15:05.440",
"lastModified": "2024-12-02T20:15:05.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In gatts_process_read_by_type_req of gatt_sr.c, there is a possible\u00a0information disclosure due to uninitialized data. This could lead to remote\u00a0information disclosure with no additional execution privileges needed. User\u00a0interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4395",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-30T21:15:10.623",
"lastModified": "2023-11-07T03:57:44.797",
"lastModified": "2024-12-02T19:15:06.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
@ -65,6 +65,22 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://packetstormsecurity.com/files/177934/WordPress-Membership-For-WooCommerce-Shell-Upload.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://wpscan.com/vulnerability/80407ac4-8ce3-4df7-9c41-007b69045c40",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/51959",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36357",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T20:15:09.823",
"lastModified": "2023-06-30T16:26:56.567",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T19:15:07.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +28,7 @@
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -219,6 +229,14 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/5/TL-WR941ND_TL-WR940N_TL-WR841N_userRpm_LocalManageControlRpm.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44341",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-02-29T01:41:12.810",
"lastModified": "2024-02-29T13:49:47.277",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:14:51.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.4.2",
"matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.0",
"versionEndExcluding": "18.5.1",
"matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45727",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-10-18T10:15:08.643",
"lastModified": "2023-10-25T17:31:59.553",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T19:15:08.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,27 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -49,6 +69,16 @@
"value": "CWE-611"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
@ -101,6 +131,20 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jvn.jp/en/jp/JVN95981460/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.proself.jp/information/153/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1674",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-02-21T04:15:08.430",
"lastModified": "2024-02-26T16:27:52.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T19:51:32.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,138 @@
"value": "La implementaci\u00f3n inadecuada en Navegaci\u00f3n en Google Chrome anterior a 122.0.6261.57 permiti\u00f3 a un atacante remoto eludir las restricciones de navegaci\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html",
"source": "chrome-cve-admin@google.com"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://issues.chromium.org/issues/40095183",
"source": "chrome-cve-admin@google.com"
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/",
"source": "chrome-cve-admin@google.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/",
"source": "chrome-cve-admin@google.com"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "122.0.6261.57",
"matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://issues.chromium.org/issues/40095183",
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://issues.chromium.org/issues/40095183",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1675",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-02-21T04:15:08.540",
"lastModified": "2024-02-26T16:27:52.870",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T19:54:08.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,140 @@
"value": "La aplicaci\u00f3n insuficiente de pol\u00edticas en Descargas en Google Chrome anteriores a 122.0.6261.57 permiti\u00f3 a un atacante remoto eludir las restricciones del sistema de archivos a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chromium: media)"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html",
"source": "chrome-cve-admin@google.com"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://issues.chromium.org/issues/41486208",
"source": "chrome-cve-admin@google.com"
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/",
"source": "chrome-cve-admin@google.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/",
"source": "chrome-cve-admin@google.com"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "122.0.6261.57",
"matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://issues.chromium.org/issues/41486208",
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://issues.chromium.org/issues/41486208",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20768",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:09.470",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:20:27.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "psirt@adobe.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30283",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:08.407",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:43:17.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -49,12 +49,69 @@
"value": "CWE-125"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30286",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:09.097",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:43:09.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30287",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:09.700",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:43:02.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30288",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:10.330",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:42:53.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -49,12 +49,69 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30289",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:10.897",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:42:43.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,19 +42,76 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30290",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:11.527",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:42:22.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30291",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:12.107",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:42:16.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30292",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:12.713",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:42:07.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2020.6",
"matchCriteriaId": "816E474A-9942-4849-BBA3-C486176BAD0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022",
"versionEndExcluding": "2022.4",
"matchCriteriaId": "9120D413-CCDC-4FC7-A18E-F3959E3A17B7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb24-37.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30307",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T09:15:12.910",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T20:16:16.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html",
"source": "psirt@adobe.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.0",
"matchCriteriaId": "CD315CE1-12F5-4A6B-AC9A-248B6230428C"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-35451",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T05:15:05.690",
"lastModified": "2024-11-29T05:15:05.690",
"vulnStatus": "Received",
"lastModified": "2024-12-02T20:15:06.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LinkStack 2.7.9 through 4.7.7 allows resources\\views\\components\\favicon.blade.php link SSRF."
},
{
"lang": "es",
"value": "LinkStack 2.7.9 a 4.7.7 permite que resources\\views\\components\\favicon.blade.php se vincule con SSRF."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://datafarm.co.th/blog/CVE-2024-35451:-From-%28Authenticated%29-SSRF-to-Remote-Code-Execution",

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-39343",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T20:15:06.993",
"lastModified": "2024-12-02T20:15:06.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52724",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T19:15:10.697",
"lastModified": "2024-12-02T19:15:10.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ZZCMS 2023 was discovered to contain a SQL injection vulnerability in /q/show.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/npubaishao/768b638ab16b7da6478d028aeb25bbbc",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/npubaishao/zzcms_sql_injection/blob/main/zzcms_sql_injection.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53364",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T17:15:12.933",
"lastModified": "2024-12-02T17:15:12.933",
"lastModified": "2024-12-02T20:15:07.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A SQL injection vulnerability was found in PHPGURUKUL Vehicle Parking Management System v1.13 in /users/view-detail.php. This vulnerability affects the viewid parameter, where improper input sanitization allows attackers to inject malicious SQL queries."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "http://phpgurukul.com",

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-53484",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T19:15:10.820",
"lastModified": "2024-12-02T19:15:10.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ever Traduora 0.20.0 and below is vulnerable to Privilege Escalation due to the use of a hard-coded JWT signing key."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ever-co/ever-traduora/issues/431%2C",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ever-co/ever-traduora/pull/432%2C",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-53484/Description.md",
"source": "cve@mitre.org"
},
{
"url": "https://youtu.be/8JL89syikLE",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-53617",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T19:15:10.940",
"lastModified": "2024-12-02T20:15:07.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/LibrePhotos/librephotos/commit/32237ddc0b6293a69b983a07b5ad462fcdd6c929",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/LibrePhotos/librephotos/pull/1476",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ii5mai1/CVE-2024-53617",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53623",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T23:15:04.943",
"lastModified": "2024-11-29T23:15:04.943",
"vulnStatus": "Received",
"lastModified": "2024-12-02T20:15:07.917",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in the component l_0_0.xml of TP-Link ARCHER-C7 v5 allows attackers to access sensitive information."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en el componente l_0_0.xml de TP-Link ARCHER-C7 v5 permite a los atacantes acceder a informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Crane-c/CVE_Request/blob/main/TP-Link/C7v5/TPLink_ARCHERC7v5_unauthorized_access_vulnerability_first.md",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-53861",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-29T19:15:09.433",
"lastModified": "2024-11-29T19:15:09.433",
"vulnStatus": "Received",
"lastModified": "2024-12-02T19:15:12.150",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pyjwt is a JSON Web Token implementation in Python. An incorrect string comparison is run for `iss` checking, resulting in `\"acb\"` being accepted for `\"_abc_\"`. This is a bug introduced in version 2.10.0: checking the \"iss\" claim changed from `isinstance(issuer, list)` to `isinstance(issuer, Sequence)`. Since str is a Sequnce, but not a list, `in` is also used for string comparison. This results in `if \"abc\" not in \"__abcd__\":` being checked instead of `if \"abc\" != \"__abc__\":`. Signature checks are still present so real world impact is likely limited to denial of service scenarios. This issue has been patched in version 2.10.1. All users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "pyjwt es una implementaci\u00f3n de JSON Web Token en Python. Se ejecuta una comparaci\u00f3n de cadena incorrecta para la comprobaci\u00f3n de `iss`, lo que da como resultado que `\"acb\"` se acepte en lugar de `\"_abc_\"`. Este es un error introducido en la versi\u00f3n 2.10.0: la comprobaci\u00f3n de la reclamaci\u00f3n \"iss\" cambi\u00f3 de `isinstance(issuer, list)` a `isinstance(issuer, Sequence)`. Dado que str es una secuencia, pero no una lista, `in` tambi\u00e9n se utiliza para la comparaci\u00f3n de cadenas. Esto da como resultado que se compruebe `if \"abc\" not in \"__abcd__\":` en lugar de `if \"abc\" != \"__abc__\":`. Las comprobaciones de firma a\u00fan est\u00e1n presentes, por lo que es probable que el impacto en el mundo real se limite a escenarios de denegaci\u00f3n de servicio. Este problema se ha corregido en la versi\u00f3n 2.10.1. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidos para esta vulnerabilidad."
}
],
"metrics": {
@ -18,27 +22,27 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N",
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 2.2,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.7,
"impactScore": 0.0
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-53900",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T20:15:08.347",
"lastModified": "2024-12-02T20:15:08.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mongoose before 8.8.3 can improperly use $where in match."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Automattic/mongoose/blob/master/CHANGELOG.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Automattic/mongoose/commit/c9e86bff7eef477da75a29af62a06d41a835a156",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Automattic/mongoose/releases",
"source": "cve@mitre.org"
},
{
"url": "https://www.npmjs.com/package/mongoose?activeTab=versions",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-5890",
"sourceIdentifier": "psirt@servicenow.com",
"published": "2024-12-02T19:15:12.357",
"lastModified": "2024-12-02T19:15:12.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ServiceNow has addressed an HTML injection vulnerability that was identified in the Now Platform. This vulnerability could potentially enable an unauthenticated user to modify a web page or redirect users to another website.\n\nServiceNow released updates\u00a0to customers that addressed this vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance(s) as soon as possible."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "psirt@servicenow.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "psirt@servicenow.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@servicenow.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1710511",
"source": "psirt@servicenow.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-02T19:00:42.087633+00:00
2024-12-02T21:00:30.701836+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-02T18:31:56.817000+00:00
2024-12-02T20:43:17.603000+00:00
```
### Last Data Feed Release
@ -33,55 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271912
271920
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `8`
- [CVE-2024-49763](CVE-2024/CVE-2024-497xx/CVE-2024-49763.json) (`2024-12-02T17:15:11.830`)
- [CVE-2024-50380](CVE-2024/CVE-2024-503xx/CVE-2024-50380.json) (`2024-12-02T17:15:11.980`)
- [CVE-2024-50381](CVE-2024/CVE-2024-503xx/CVE-2024-50381.json) (`2024-12-02T17:15:12.160`)
- [CVE-2024-52596](CVE-2024/CVE-2024-525xx/CVE-2024-52596.json) (`2024-12-02T17:15:12.353`)
- [CVE-2024-52806](CVE-2024/CVE-2024-528xx/CVE-2024-52806.json) (`2024-12-02T17:15:12.580`)
- [CVE-2024-53259](CVE-2024/CVE-2024-532xx/CVE-2024-53259.json) (`2024-12-02T17:15:12.767`)
- [CVE-2024-53364](CVE-2024/CVE-2024-533xx/CVE-2024-53364.json) (`2024-12-02T17:15:12.933`)
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2024-12-02T18:15:11.353`)
- [CVE-2024-53566](CVE-2024/CVE-2024-535xx/CVE-2024-53566.json) (`2024-12-02T18:15:11.500`)
- [CVE-2024-53990](CVE-2024/CVE-2024-539xx/CVE-2024-53990.json) (`2024-12-02T18:15:11.753`)
- [CVE-2024-53992](CVE-2024/CVE-2024-539xx/CVE-2024-53992.json) (`2024-12-02T17:15:14.113`)
- [CVE-2018-9380](CVE-2018/CVE-2018-93xx/CVE-2018-9380.json) (`2024-12-02T20:15:04.443`)
- [CVE-2018-9381](CVE-2018/CVE-2018-93xx/CVE-2018-9381.json) (`2024-12-02T20:15:05.440`)
- [CVE-2024-39343](CVE-2024/CVE-2024-393xx/CVE-2024-39343.json) (`2024-12-02T20:15:06.993`)
- [CVE-2024-52724](CVE-2024/CVE-2024-527xx/CVE-2024-52724.json) (`2024-12-02T19:15:10.697`)
- [CVE-2024-53484](CVE-2024/CVE-2024-534xx/CVE-2024-53484.json) (`2024-12-02T19:15:10.820`)
- [CVE-2024-53617](CVE-2024/CVE-2024-536xx/CVE-2024-53617.json) (`2024-12-02T19:15:10.940`)
- [CVE-2024-53900](CVE-2024/CVE-2024-539xx/CVE-2024-53900.json) (`2024-12-02T20:15:08.347`)
- [CVE-2024-5890](CVE-2024/CVE-2024-58xx/CVE-2024-5890.json) (`2024-12-02T19:15:12.357`)
### CVEs modified in the last Commit
Recently modified CVEs: `37`
Recently modified CVEs: `20`
- [CVE-2024-20127](CVE-2024/CVE-2024-201xx/CVE-2024-20127.json) (`2024-12-02T17:15:09.827`)
- [CVE-2024-20128](CVE-2024/CVE-2024-201xx/CVE-2024-20128.json) (`2024-12-02T17:15:10.230`)
- [CVE-2024-22272](CVE-2024/CVE-2024-222xx/CVE-2024-22272.json) (`2024-12-02T18:15:09.290`)
- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T18:15:09.453`)
- [CVE-2024-30282](CVE-2024/CVE-2024-302xx/CVE-2024-30282.json) (`2024-12-02T17:48:54.733`)
- [CVE-2024-34923](CVE-2024/CVE-2024-349xx/CVE-2024-34923.json) (`2024-12-02T18:15:09.617`)
- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-12-02T17:15:10.497`)
- [CVE-2024-35367](CVE-2024/CVE-2024-353xx/CVE-2024-35367.json) (`2024-12-02T17:15:10.680`)
- [CVE-2024-35368](CVE-2024/CVE-2024-353xx/CVE-2024-35368.json) (`2024-12-02T17:15:10.860`)
- [CVE-2024-35371](CVE-2024/CVE-2024-353xx/CVE-2024-35371.json) (`2024-12-02T17:15:11.037`)
- [CVE-2024-36610](CVE-2024/CVE-2024-366xx/CVE-2024-36610.json) (`2024-12-02T17:15:11.230`)
- [CVE-2024-36612](CVE-2024/CVE-2024-366xx/CVE-2024-36612.json) (`2024-12-02T17:15:11.420`)
- [CVE-2024-36616](CVE-2024/CVE-2024-366xx/CVE-2024-36616.json) (`2024-12-02T18:15:09.857`)
- [CVE-2024-36617](CVE-2024/CVE-2024-366xx/CVE-2024-36617.json) (`2024-12-02T18:15:10.270`)
- [CVE-2024-36618](CVE-2024/CVE-2024-366xx/CVE-2024-36618.json) (`2024-12-02T18:15:10.520`)
- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-12-02T17:36:33.403`)
- [CVE-2024-40075](CVE-2024/CVE-2024-400xx/CVE-2024-40075.json) (`2024-12-02T18:15:10.760`)
- [CVE-2024-46054](CVE-2024/CVE-2024-460xx/CVE-2024-46054.json) (`2024-12-02T17:15:11.610`)
- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-12-02T18:31:56.817`)
- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T18:15:11.123`)
- [CVE-2024-53504](CVE-2024/CVE-2024-535xx/CVE-2024-53504.json) (`2024-12-02T17:15:13.047`)
- [CVE-2024-53505](CVE-2024/CVE-2024-535xx/CVE-2024-53505.json) (`2024-12-02T17:15:13.257`)
- [CVE-2024-53506](CVE-2024/CVE-2024-535xx/CVE-2024-53506.json) (`2024-12-02T17:15:13.497`)
- [CVE-2024-53507](CVE-2024/CVE-2024-535xx/CVE-2024-53507.json) (`2024-12-02T17:15:13.707`)
- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2024-12-02T17:15:13.913`)
- [CVE-2022-4395](CVE-2022/CVE-2022-43xx/CVE-2022-4395.json) (`2024-12-02T19:15:06.587`)
- [CVE-2023-36357](CVE-2023/CVE-2023-363xx/CVE-2023-36357.json) (`2024-12-02T19:15:07.480`)
- [CVE-2023-44341](CVE-2023/CVE-2023-443xx/CVE-2023-44341.json) (`2024-12-02T20:14:51.967`)
- [CVE-2023-45727](CVE-2023/CVE-2023-457xx/CVE-2023-45727.json) (`2024-12-02T19:15:08.390`)
- [CVE-2024-1674](CVE-2024/CVE-2024-16xx/CVE-2024-1674.json) (`2024-12-02T19:51:32.163`)
- [CVE-2024-1675](CVE-2024/CVE-2024-16xx/CVE-2024-1675.json) (`2024-12-02T19:54:08.677`)
- [CVE-2024-20768](CVE-2024/CVE-2024-207xx/CVE-2024-20768.json) (`2024-12-02T20:20:27.637`)
- [CVE-2024-30283](CVE-2024/CVE-2024-302xx/CVE-2024-30283.json) (`2024-12-02T20:43:17.603`)
- [CVE-2024-30286](CVE-2024/CVE-2024-302xx/CVE-2024-30286.json) (`2024-12-02T20:43:09.190`)
- [CVE-2024-30287](CVE-2024/CVE-2024-302xx/CVE-2024-30287.json) (`2024-12-02T20:43:02.727`)
- [CVE-2024-30288](CVE-2024/CVE-2024-302xx/CVE-2024-30288.json) (`2024-12-02T20:42:53.247`)
- [CVE-2024-30289](CVE-2024/CVE-2024-302xx/CVE-2024-30289.json) (`2024-12-02T20:42:43.033`)
- [CVE-2024-30290](CVE-2024/CVE-2024-302xx/CVE-2024-30290.json) (`2024-12-02T20:42:22.897`)
- [CVE-2024-30291](CVE-2024/CVE-2024-302xx/CVE-2024-30291.json) (`2024-12-02T20:42:16.157`)
- [CVE-2024-30292](CVE-2024/CVE-2024-302xx/CVE-2024-30292.json) (`2024-12-02T20:42:07.283`)
- [CVE-2024-30307](CVE-2024/CVE-2024-303xx/CVE-2024-30307.json) (`2024-12-02T20:16:16.277`)
- [CVE-2024-35451](CVE-2024/CVE-2024-354xx/CVE-2024-35451.json) (`2024-12-02T20:15:06.700`)
- [CVE-2024-53364](CVE-2024/CVE-2024-533xx/CVE-2024-53364.json) (`2024-12-02T20:15:07.487`)
- [CVE-2024-53623](CVE-2024/CVE-2024-536xx/CVE-2024-53623.json) (`2024-12-02T20:15:07.917`)
- [CVE-2024-53861](CVE-2024/CVE-2024-538xx/CVE-2024-53861.json) (`2024-12-02T19:15:12.150`)
## Download and Usage

View File

@ -126937,6 +126937,8 @@ CVE-2018-9371,0,0,dce1635a39fc875c3a6010e78992681138a4af74d8f57da615da4dd9d5becb
CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000
CVE-2018-9374,0,0,b5c9257b4379d5ec059f557b277f9ab8f86bedde18eae66967ba271cf76e5f31,2024-11-29T22:15:06.327000
CVE-2018-9377,0,0,e4a0a8bd1ac9734ae148f92ac66c4e7d1d997837e82ad8c47cc9f88531e107dc,2024-11-29T22:15:06.483000
CVE-2018-9380,1,1,0cc9720b8e47ec2d5bd020aeebcb8430890e5213bf61503748dc373711e983f7,2024-12-02T20:15:04.443000
CVE-2018-9381,1,1,8de3083231df9c7abf0f8830119091ef6106ff8e1b61d1198db8d22f7c36bfc3,2024-12-02T20:15:05.440000
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000
CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000
@ -209361,7 +209363,7 @@ CVE-2022-43946,0,0,9454164159dbb10a9ad61a906f578ee6e77f1dad056c3ea482f9847b26cc9
CVE-2022-43947,0,0,930ca17bfba7d7c5edef81b50c4bed53316f88b588a9e915ff55d08fcd99e2fd,2023-11-07T03:54:10.187000
CVE-2022-43948,0,0,82504337f08fc51bc776a2c1da2d5aec082839077b37667df962adfb690361e8,2023-11-07T03:54:10.427000
CVE-2022-43949,0,0,6c72abd88f0c5e9d46e60e364b0f8a386336076428497ae4da3e94d618f2f9aa,2023-11-07T03:54:10.637000
CVE-2022-4395,0,0,fa674d526a224e855adebf9bf4e5c843558feb2c476ab316639a59d270b67690,2023-11-07T03:57:44.797000
CVE-2022-4395,0,1,467e57fab841a895d97de8d3708cae1f54123076e5e5abcb766a29f9a85bd41f,2024-12-02T19:15:06.587000
CVE-2022-43950,0,0,6742201e2da288c6f1446a59a373009d757b714c07a820521842aa35592f0c05,2023-11-07T03:54:10.837000
CVE-2022-43951,0,0,496c56822957e4145787a5dab7a852893545ed21d01397666cae306817ad2e07,2023-11-07T03:54:11.063000
CVE-2022-43952,0,0,76274f021962892a140dc456f478628abd811f10262c8873bea05e9f8492c4e4,2023-11-07T03:54:11.290000
@ -221882,7 +221884,7 @@ CVE-2023-28458,0,0,ef73a1fa781dc427433a4344f064cf2c5d295719475229911a534302acd48
CVE-2023-28459,0,0,ff6d9b0d2a61636a2216f5ca3eebb22b60bf4cdf2177e93c8efd3097129af8b8,2023-05-04T12:38:31.430000
CVE-2023-2846,0,0,9aab683976373505e029cb617089a2ec5cce34a049b1b52d471de12eae663bf2,2023-07-10T18:51:01.550000
CVE-2023-28460,0,0,946c7b43c3c7b583cdd2cc158d5075c41f481cca09d32fe7ede01d078026a4ac,2023-03-24T14:57:49.207000
CVE-2023-28461,0,1,b734dc37bc99200598f1ee9fcd5c811044ce1d1d95438d974fcc0a308eb66f72,2024-12-02T17:15:05.133000
CVE-2023-28461,0,0,b734dc37bc99200598f1ee9fcd5c811044ce1d1d95438d974fcc0a308eb66f72,2024-12-02T17:15:05.133000
CVE-2023-28462,0,0,2e19120130c69bbcf347fab95b0e8c139f8b88e9e8bf09f2cd8f0d3aa1bc78bf,2023-04-07T17:19:22.730000
CVE-2023-28464,0,0,cb3ff9a13e0f593237f005a371ce64a52ab72b86a221c83df504e264520ebe96,2023-12-22T21:04:49.027000
CVE-2023-28465,0,0,06c8e63c2eb4a5851617744052850dfe59bf346dbe17e85c1e39e4479aeba7f3,2023-12-15T16:35:16.623000
@ -227733,19 +227735,19 @@ CVE-2023-36351,0,0,4e41961541ac78849f8aab63adfbcd0727b537f75956145c83242ef2d9af6
CVE-2023-36354,0,0,3012502699f5ab60433e9398c145155b6da1a5364596cc6383c9819a14af809b,2023-06-29T20:45:07.187000
CVE-2023-36355,0,0,ffe90f8a7e879810f87e5e896a76276491565a663822003d1bb7fff0b535aff0,2023-07-04T17:15:10.850000
CVE-2023-36356,0,0,b5d4bc3aef30a2b056aa0749109155967237df455fbc3d3a2c517ad3ef391555,2023-06-30T16:18:59.383000
CVE-2023-36357,0,0,bfe3b576c195b8daf0bbd4d3004add3bbb70d986e0edcddddbc8791300981f36,2023-06-30T16:26:56.567000
CVE-2023-36357,0,1,7f8ec13898de07f57c7e8e66d0c8d2ff725c2b13b80d89d540b0324101332414,2024-12-02T19:15:07.480000
CVE-2023-36358,0,0,e8205291295a9879a960f26b0fc8aa8de236189b0ca638e99ab394ed48966169,2023-06-30T13:47:39.297000
CVE-2023-36359,0,0,e37b9be911e04ec3ff31e7ef9f5eb59833aaea9fd5ca5c06d32cd8c864c3b67a,2023-06-29T20:44:26.790000
CVE-2023-3636,0,0,614dee89b74d1f88be51816c6b660ce2752056d128833834b326387d81db8a9e,2023-11-07T04:19:12.717000
CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000
CVE-2023-36361,0,0,93cdaa989b68200231a2525ea584dfaf163e866781f3629fc9440cd09f618cc4,2023-09-08T16:47:42.827000
CVE-2023-36362,0,1,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000
CVE-2023-36363,0,1,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000
CVE-2023-36364,0,1,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000
CVE-2023-36365,0,1,3cee1646a92411ae23b58da3264be3882c3ee35cfa85a4db2f58ac1601bb3fc8,2024-12-02T17:15:06.967000
CVE-2023-36366,0,1,cffbaf0f33498e58d50fcda5793d9e85b5fef16d30d1ce519a19c604bf7e95f2,2024-12-02T17:15:07.090000
CVE-2023-36367,0,1,ccf739078a731238f1d3bcf2947ff92dafbcfdd82ca9fb37f44d15486d147e6f,2024-12-02T17:15:07.213000
CVE-2023-36368,0,1,06ed99c7c4b2db13bcde5eee55492c7c3d29c8ba6e669450d0841c38994eb9b9,2024-12-02T17:15:07.343000
CVE-2023-36362,0,0,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000
CVE-2023-36363,0,0,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000
CVE-2023-36364,0,0,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000
CVE-2023-36365,0,0,3cee1646a92411ae23b58da3264be3882c3ee35cfa85a4db2f58ac1601bb3fc8,2024-12-02T17:15:06.967000
CVE-2023-36366,0,0,cffbaf0f33498e58d50fcda5793d9e85b5fef16d30d1ce519a19c604bf7e95f2,2024-12-02T17:15:07.090000
CVE-2023-36367,0,0,ccf739078a731238f1d3bcf2947ff92dafbcfdd82ca9fb37f44d15486d147e6f,2024-12-02T17:15:07.213000
CVE-2023-36368,0,0,06ed99c7c4b2db13bcde5eee55492c7c3d29c8ba6e669450d0841c38994eb9b9,2024-12-02T17:15:07.343000
CVE-2023-36369,0,0,1397030efe1debf1a2c78b87207e3a04ff15859d12f5f46231974de7e2ee8274,2023-06-29T18:00:21.530000
CVE-2023-3637,0,0,73ac1481ddc1df889412bda0c2583fec7bc5e2313684ecf116cb691307a3f25b,2023-11-07T04:19:12.810000
CVE-2023-36370,0,0,e114760f1feacab67ceb84869de8d52f3d37062c55d26b2af18b46ed8f63846d,2023-06-29T17:50:13.513000
@ -233901,7 +233903,7 @@ CVE-2023-44338,0,0,fceb66f519f57c084dcf66fed4cec095683a38b3d185d014206f57cd36a46
CVE-2023-44339,0,0,bb5be312cfbea4ba9c930505f7c7fcb81033beb4c672f7a0c06d918de19173b2,2023-12-04T17:34:46.583000
CVE-2023-4434,0,0,bab0423e657791622a5b1409fa9318c47786d7a606db9ea15a66615a867b1044,2023-08-25T17:57:45.133000
CVE-2023-44340,0,0,b21cbcd12707cbbd4a9d675bde35dbb9ee00edc609212e10acc00e505adf0941,2023-12-04T16:15:08.083000
CVE-2023-44341,0,0,55625d7cf830a15b7b9ab1f3af48dba559a45f5088b8dff0fd31b6cc5eff7c6c,2024-02-29T13:49:47.277000
CVE-2023-44341,0,1,828a7a9a18d5f7af7b82657b7cde66e4ef46869412e2a2d6887decf9962a8019,2024-12-02T20:14:51.967000
CVE-2023-44342,0,0,0c8bedb7886b7171854ef831382334ac881a68f538b7d273dcef6fd357215323,2024-02-29T13:49:47.277000
CVE-2023-44343,0,0,8fd557cf540814772da5b8f541b9a82e772c312189a977dcf6ce0e2afc55c609,2024-02-29T13:49:47.277000
CVE-2023-44344,0,0,c241d06a46154624c7347cb87577b52cd441f5be92768e1d05ef69e662dda1ca,2024-02-29T13:49:47.277000
@ -234689,7 +234691,7 @@ CVE-2023-45722,0,0,4240dd682886c768ab9b9a025ce52687e223d3b5bc66b3a8ef1362427eaf3
CVE-2023-45723,0,0,d75569efe29622a0fceee924d9f808ceeedc0897b5e709cd04faad485aeb7c09,2024-01-09T18:52:37.707000
CVE-2023-45724,0,0,d957afe86c592e8319388b49220462c05dc155b1c149c8e2b8f7290372cc8a41,2024-01-09T18:34:41.837000
CVE-2023-45725,0,0,4be92db793dd202daa1a3bc98875d9a583e5498eb2cacfe9e3765b156e332912,2023-12-20T18:32:15.360000
CVE-2023-45727,0,0,fd816f9fab63a8b1a8932e920970f61987745f7a8a0c00ecf469bff7165fffb9,2023-10-25T17:31:59.553000
CVE-2023-45727,0,1,f1e978bfdbac20d70116743d7e239fd9d61802cf9fcce1a1bef0439bb8e689df,2024-12-02T19:15:08.390000
CVE-2023-4573,0,0,8c2c56b4c0641002c802a71d0b3ecc92540f29cc9ee6db1aabe5f4a00eb5a7e0,2024-10-21T13:55:03.510000
CVE-2023-45733,0,0,b0aa2fba9e6a64d0852357607afb3a43fdbb4b3413ce5b91e26ae220829c70ff,2024-05-17T18:36:05.263000
CVE-2023-45734,0,0,bcdee8c11a0e8a4792b5d7f342842becf89dbf6ffedf6c74619e3ac3b10011b3,2024-09-09T12:21:53.383000
@ -243795,7 +243797,7 @@ CVE-2024-11692,0,0,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff
CVE-2024-11693,0,0,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000
CVE-2024-11694,0,0,8fab8f6682482c80a046d7efcb5d62937e3f2364960b2f04726b7a87f7e40748,2024-11-27T17:15:09.703000
CVE-2024-11695,0,0,923949ea70ffb3960535c924daeac21d36cf8875477a4ac90cebfaddff787cf9,2024-11-27T17:15:09.867000
CVE-2024-11696,0,1,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000
CVE-2024-11696,0,0,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000
CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000
CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
@ -243803,7 +243805,7 @@ CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990c
CVE-2024-11700,0,0,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000
CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
CVE-2024-11703,0,1,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a91d,2024-12-02T18:15:09.087000
CVE-2024-11703,0,0,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a91d,2024-12-02T18:15:09.087000
CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000
@ -244340,8 +244342,8 @@ CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767
CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000
CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000
CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000
CVE-2024-1674,0,0,4d84e36811dabb70c79f006b1fddf82b6781a26d6832b626a618ba98da8173a6,2024-02-26T16:27:52.823000
CVE-2024-1675,0,0,694007ff503c67bb2473e2a3fd85a3cbeb468f543b49d8b91c288ff6cfb53b8e,2024-02-26T16:27:52.870000
CVE-2024-1674,0,1,4cf2c5e9e39ff8cbbaa4992242e531b6a235b946fada67dc6b67140da5874399,2024-12-02T19:51:32.163000
CVE-2024-1675,0,1,6dc11c1ffd0c7e93efd7705d99983d7290104eca7113a2804027689feb726c3f,2024-12-02T19:54:08.677000
CVE-2024-1676,0,0,49c3202c5c497a772989e79ead25a52e922bf653bfa98e11038c1b979dd6584e,2024-11-05T16:35:10.247000
CVE-2024-1677,0,0,6fbed0b3db8f4573d0e0535b3a26ae2bb9498eab495e7625679b1e1f5bc2100b,2024-05-02T18:00:37.360000
CVE-2024-1678,0,0,d7ff889a45c19600d651a095e777206640b8492b0764403803a17b2b0960a8bd,2024-05-02T18:00:37.360000
@ -244773,7 +244775,7 @@ CVE-2024-20112,0,0,f1fecda0bbefb7976a2e5c2d965f45756c3c554b6bb2aece34ce5311395c4
CVE-2024-20113,0,0,1e9f0bb5dd8b46cb9c193f293f4e7e65c1c4f4218a8b5da37a81aedf61132d39,2024-11-04T18:50:05.607000
CVE-2024-20114,0,0,972dbefe1dd7e2ec5c449b6a55d8a48edf191f12736d3b5ac984afdda696c6ff,2024-11-05T19:58:15.577000
CVE-2024-20115,0,0,e0fbbff01a0fa518c41d64f625797efefd6cdce39d74e0c13995ea3dfe394456,2024-11-04T18:50:05.607000
CVE-2024-20116,0,1,1000133cf92be5d4167320d25c02ed658b66c4f3c0eea2c90e9d7fc1bf88b623,2024-12-02T17:15:08.113000
CVE-2024-20116,0,0,1000133cf92be5d4167320d25c02ed658b66c4f3c0eea2c90e9d7fc1bf88b623,2024-12-02T17:15:08.113000
CVE-2024-20117,0,0,6baac420d96eb73610546cd262e04d3589f97187f02f3401eb7616db3fa8d745,2024-11-04T18:50:05.607000
CVE-2024-20118,0,0,f196c02d943f7181a2b543f340de54479a6ac9433fa46d02a1108eafa392e84d,2024-11-04T18:50:05.607000
CVE-2024-20119,0,0,b9d1b34a5ac7be8b5a9ce604f28b7c94e37c0f79b74ec7f206945e209ae81009,2024-11-04T18:50:05.607000
@ -244783,9 +244785,9 @@ CVE-2024-20121,0,0,4938115c914642adef5ea2985a500e819409d2c7aa3a5388330765c060ef6
CVE-2024-20122,0,0,744b016dd77bf1d3925336cb7504cc81d1bda83c1655bf764225b09f6b0227e4,2024-11-05T08:35:19.593000
CVE-2024-20123,0,0,bdf62a4af5c1c1ed58a1e235ea3a69d58e2afa0181d5f68baf40f699c0511aac,2024-11-04T18:50:05.607000
CVE-2024-20124,0,0,1799547edf556e9de06685a9fcdc4c8ef9057ff40c9829ccf5d3b3aa46605f16,2024-11-04T18:50:05.607000
CVE-2024-20125,0,1,a95592121d0de2a82283637e180f978c8268829ce83449ebef9c55894c24ce6b,2024-12-02T17:15:09.543000
CVE-2024-20127,0,1,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000
CVE-2024-20128,0,1,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000
CVE-2024-20125,0,0,a95592121d0de2a82283637e180f978c8268829ce83449ebef9c55894c24ce6b,2024-12-02T17:15:09.543000
CVE-2024-20127,0,0,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000
CVE-2024-20128,0,0,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000
CVE-2024-20129,0,0,671726aba2b1095472532326d37fd302eed94fd6211ea01542506d4087187d34,2024-12-02T04:15:05.073000
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
CVE-2024-20130,0,0,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000
@ -245241,7 +245243,7 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3
CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000
CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000
CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000
CVE-2024-20768,0,0,1cf643ff4ccc679c74c7a6bac7cb0ce9c19999fa1e2fa773a0fb6fa47f9b0b34,2024-03-18T19:40:00.173000
CVE-2024-20768,0,1,0a787ae17c1c9554efbce8083ebf2f71929ddd956de1438a76dc74375b810cb1,2024-12-02T20:20:27.637000
CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000
CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000
CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000
@ -246625,7 +246627,7 @@ CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a69
CVE-2024-2227,0,0,6858b6fb3beef7b6297eae7344c0bc611e8d1dd2c2ff64967d8d2ab0b2897ccc,2024-03-22T19:02:10.300000
CVE-2024-22270,0,0,b9576398a05665519f8e7fa18c7ea965eb2ef26c2b70aff8574e195025c87aea,2024-08-15T19:35:06.457000
CVE-2024-22271,0,0,c68c7abf466a660fd4d52c665cf118cb88242b1be3f139e271f3b7d99c4e675f,2024-08-01T13:46:54.670000
CVE-2024-22272,0,1,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000
CVE-2024-22272,0,0,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000
CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da58959d8,2024-05-22T12:46:53.887000
CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000
CVE-2024-22275,0,0,4e0b17231c07cc777231dbb9d62f6bfa759cfc82db650243f36e18a0ee106c1b,2024-05-22T12:46:53.887000
@ -251828,7 +251830,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7
CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000
CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000
CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000
CVE-2024-29645,0,1,c6d6850a2c13e1d1159098cd4eb2c9b0077860b94792b5ea30ac8f664de7fd64,2024-12-02T18:15:09.453000
CVE-2024-29645,0,0,c6d6850a2c13e1d1159098cd4eb2c9b0077860b94792b5ea30ac8f664de7fd64,2024-12-02T18:15:09.453000
CVE-2024-2965,0,0,31194867e3c8375be8a7a72353070c45d11fab5833d7a91937e736bd4749a53d,2024-11-03T17:15:13.107000
CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000
CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000
@ -252407,18 +252409,18 @@ CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940d
CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000
CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000
CVE-2024-30281,0,0,aa55f6f337f0eff14aaba79eadac42cf1fa69bcced5e256cfe63f794552ecdfc,2024-05-16T13:03:05.353000
CVE-2024-30282,0,1,23f906c56739d2637a62852ff21f89b589c2e003e455e0b879928121b47e538e,2024-12-02T17:48:54.733000
CVE-2024-30283,0,0,ba083c1bacb29a7f333eacd467f9eb4c19b7b166e16a58a9ca533c939d8d2cec,2024-05-16T13:03:05.353000
CVE-2024-30282,0,0,23f906c56739d2637a62852ff21f89b589c2e003e455e0b879928121b47e538e,2024-12-02T17:48:54.733000
CVE-2024-30283,0,1,9e8da6a935a66e8cc0ba5dc2d12b3c47dfb3d77dd0f559b5a2de4927dc7e26e5,2024-12-02T20:43:17.603000
CVE-2024-30284,0,0,c3d8cfb90cbc04c8f8451d2b94550163ac2e92e833947aa8e3054cbfbcb5af6b,2024-05-15T16:40:19.330000
CVE-2024-30285,0,0,d5d0073a0c86623254404dea22df638b05a2d50f8dfa4429d0e1bb0ebc3d1cd8,2024-07-09T15:52:12.637000
CVE-2024-30286,0,0,beef9934f7474ed3314782ff972bc64930801beb5207074639983af9565caf76,2024-05-16T13:03:05.353000
CVE-2024-30287,0,0,6327776c7df1a6e18971678b18b3516cc6d8ff1ce7bdb0b19d9db717f92b4c8f,2024-05-16T13:03:05.353000
CVE-2024-30288,0,0,225fdb5419e0a0230c2e4c0a2f327ebf5bd46f1fe156cb7feaea8b392bc87209,2024-05-16T13:03:05.353000
CVE-2024-30289,0,0,5b7948a8da655d7b6a1a1f110dc3e8446cb3de6f8887af2aef80ca12b3dcea4a,2024-05-16T13:03:05.353000
CVE-2024-30286,0,1,75adbc0b51f836d9f2b10b0ae55478ab071a31884ca662124852dad5ccb56d6c,2024-12-02T20:43:09.190000
CVE-2024-30287,0,1,7d0b87d3020256a2d5f84b012b2fcf6ff6489ac9b52ff2f45e12033da8f761e2,2024-12-02T20:43:02.727000
CVE-2024-30288,0,1,3c09417664156b15182e9b1c6d59cd996098519fbd2be16a7308f1b21d29feb9,2024-12-02T20:42:53.247000
CVE-2024-30289,0,1,3585e0d3ed5bf6e39023e32ef47376cfc16c1f13711447cb7ae5fdeb55e8f5c7,2024-12-02T20:42:43.033000
CVE-2024-3029,0,0,497ffe4940c4ad919b0790a585fb5a1b548684ec5cdf0a9c9ccfacdc2ebdeebe,2024-04-16T13:24:07.103000
CVE-2024-30290,0,0,af063bdf169684f0cf2582493d5fce25edf961d5186b6e3519602a8f26adde74,2024-05-16T13:03:05.353000
CVE-2024-30291,0,0,b1658e0e3d84e2ddcef9c516a7d0728d8dfd3880a614c6fbd47e964ae5d10abd,2024-05-16T13:03:05.353000
CVE-2024-30292,0,0,b720742a0e521838fd188c1ef72d566e03ce789fd7f6d4efecb01f5d65521489,2024-05-16T13:03:05.353000
CVE-2024-30290,0,1,41177f0a3696b47485943131d85e9a76808670403ac9b663f81a9664eec567b6,2024-12-02T20:42:22.897000
CVE-2024-30291,0,1,626e3632f0a9ffe88c0c837d5c97c109f71e5e7517b877a727052bfb28302134,2024-12-02T20:42:16.157000
CVE-2024-30292,0,1,905628d504199451b227bdc8e1cc783bcc48f3bc506ed15f151bfbe5197dcc2c,2024-12-02T20:42:07.283000
CVE-2024-30293,0,0,cb6d64f28c1d177af9d8787acdb5f1ba6610d7808ccf528bce800949c7d74b22,2024-05-16T13:03:05.353000
CVE-2024-30294,0,0,7166a81324ee6dd52833272914dc6f5ed70b0f6ae30e108fd1b216dad0523d9b,2024-05-16T13:03:05.353000
CVE-2024-30295,0,0,7acbb1c4868f13b65f181cea277a794fc009caf9cee062ee7f161860d6c960f2,2024-05-16T13:03:05.353000
@ -252434,7 +252436,7 @@ CVE-2024-30303,0,0,29beefe281b7361c70e3d46cb1e8ccb19d06aa60b2190adf964c9790227b9
CVE-2024-30304,0,0,2f0e61c634483371daf468eb219084e155dd462f28241798096506ee1920c008,2024-05-03T12:50:34.250000
CVE-2024-30305,0,0,06a2884c73df2d31a52d1bd390050cc8f729b4ecb20f46a8a57111dab1aed1e3,2024-05-03T12:50:34.250000
CVE-2024-30306,0,0,bd8325522698ffc48ea724274c543ace644daca528131bb314d105d4fa38a7b6,2024-05-03T12:50:34.250000
CVE-2024-30307,0,0,bf65ad64efc89bbef38478afb5c7092364d919771ab618877a59030928133dbc,2024-05-16T13:03:05.353000
CVE-2024-30307,0,1,f0696b48a33e78d85b238fe696c465ffab8e32dfc9166fa9661c3e97bf0d35fb,2024-12-02T20:16:16.277000
CVE-2024-30308,0,0,5db84bb1c77c493bd5ac8ed7e018742d1d8a89c45b2de719cb9832260f35cd9c,2024-05-16T13:03:05.353000
CVE-2024-30309,0,0,9a08ca34b700dad3cb2e16c475ae7c7fe2e87ace9e5ca70ca16a8519afa5c91c,2024-05-16T13:03:05.353000
CVE-2024-3031,0,0,fa19e5674d76c5b46624774eba96476ad7fabe41ca511ba02fe99ace14a675a4,2024-06-04T16:57:41.053000
@ -255900,7 +255902,7 @@ CVE-2024-34914,0,0,488c01684aef7fae520eb6f0628a96a961ab856901df991bf866a786a5c90
CVE-2024-34919,0,0,823c5c451a1eed666cfdb6436f6850bdbb3997f7dfda43c7cb7477056e9bb3ae,2024-07-03T02:00:54.243000
CVE-2024-3492,0,0,8ef42f39857b82e21bb506d939c2ddf771d4cf0a62a956e7e002606ca7a897a1,2024-06-13T18:36:09.010000
CVE-2024-34921,0,0,258d6bc4ff16be25947117b994a7b2305574dc7e88be47c1d8439dffb3fb7800,2024-07-03T02:00:55.040000
CVE-2024-34923,0,1,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5eb94,2024-12-02T18:15:09.617000
CVE-2024-34923,0,0,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5eb94,2024-12-02T18:15:09.617000
CVE-2024-34927,0,0,65b6f1073e9034477a827eae4f8e1e96da2dcd8b6b7a4dd6a353ea18c54c97c4,2024-07-03T02:00:55.873000
CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8d7a,2024-07-03T02:00:56.653000
CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000
@ -256177,12 +256179,12 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc
CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000
CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000
CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000
CVE-2024-35366,0,1,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000
CVE-2024-35367,0,1,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
CVE-2024-35368,0,1,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
CVE-2024-35366,0,0,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000
CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000
CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000
CVE-2024-35371,0,1,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000
CVE-2024-35371,0,0,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000
CVE-2024-35373,0,0,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000
CVE-2024-35374,0,0,aa83a1884752e38a4efa40b8d631e010f03947873314106502ec442b10442cd7,2024-08-20T15:35:14.870000
CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000
@ -256226,7 +256228,7 @@ CVE-2024-35433,0,0,f81c77793e6b4ae7b0491b15530e15eb48456cdd61c3fc22182d06ed972d4
CVE-2024-35434,0,0,21d86b1029a00b97e65dc0e9f829fff58cf55d0aa50fabcc94705f59669d3cd5,2024-08-22T20:35:11.130000
CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000
CVE-2024-3545,0,0,8572c3ccec0c267251b3f9351679ce5114a5e3088ae0469b492154e558f9687c,2024-11-04T17:35:20.247000
CVE-2024-35451,0,0,f50a3b93c964a5d9a147bcdf3175925abd519a47a61c0212ee7c26e5c2fa496a,2024-11-29T05:15:05.690000
CVE-2024-35451,0,1,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000
CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000
CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000
CVE-2024-35469,0,0,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000
@ -257180,13 +257182,13 @@ CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117e
CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000
CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000
CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000
CVE-2024-36610,0,1,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000
CVE-2024-36610,0,0,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000
CVE-2024-36611,0,0,42465fba5d209a57964c1117a778f054088fdce7482f6b6bd27c3304a10b7c3d,2024-11-29T19:15:06.780000
CVE-2024-36612,0,1,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
CVE-2024-36615,0,0,2f8c6f09c7b5113fafb5a41f7e4cbad94a7ad0500652cf2d1c05a06d469ab9d0,2024-11-29T19:15:07.703000
CVE-2024-36616,0,1,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
CVE-2024-36617,0,1,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000
CVE-2024-36618,0,1,1b683ed0f9886fba3e4cae1a9790f48a732ffbacff8e54f88bc0a50590bee2ca,2024-12-02T18:15:10.520000
CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000
CVE-2024-36618,0,0,1b683ed0f9886fba3e4cae1a9790f48a732ffbacff8e54f88bc0a50590bee2ca,2024-12-02T18:15:10.520000
CVE-2024-36619,0,0,d30e29b19403999a360d49eb2b7510653e8a4eeae72cc3067a2b6e14731d746f,2024-11-29T18:15:07.550000
CVE-2024-3662,0,0,bf35bc71372b512799f21214c4add2ef96949612530c04611b0774c90b1261c4,2024-04-15T13:15:31.997000
CVE-2024-36620,0,0,bd940859e3a70ba9f20daee48c18afd5e689ded5655791c03dcd144494e8ab28,2024-11-29T18:15:07.787000
@ -258602,7 +258604,7 @@ CVE-2024-38472,0,0,e2da2567ed5c1bd58671597c1e4c6860b639e273ff91bc91c02bde109665e
CVE-2024-38473,0,0,36c5b6d67728da1356289c3874d586ffc56f76a7fbb2f457e14a9e4a12de691d,2024-08-01T13:54:52.397000
CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f2035049e0,2024-08-21T15:03:30.407000
CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000
CVE-2024-38476,0,1,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000
CVE-2024-38476,0,0,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000
CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000
CVE-2024-38479,0,0,a59c846ab11aea7508425cae5038126c4ec0f650a8e2bdbef76ed0cb402c0b6f,2024-11-15T13:58:08.913000
CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000
@ -259198,6 +259200,7 @@ CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453c
CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000
CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000
CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000
CVE-2024-39343,1,1,5387f0e37d9edeed6f67983994a72c30c3e3ad56112bee25e823237afaf5f39e,2024-12-02T20:15:06.993000
CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000
CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000
CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000
@ -259740,7 +259743,7 @@ CVE-2024-40051,0,0,3d4a07f6874af0ae76d5cc0355a7a49b4d82d6a4d252aa7d1e7489d1164a1
CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000
CVE-2024-40060,0,0,41909e3bdc1614813f63de5445f9f7b9276e4c7561b3b730c75588f114a39308,2024-11-01T14:42:03.693000
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
CVE-2024-40075,0,1,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000
CVE-2024-40075,0,0,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
CVE-2024-40083,0,0,002189cbf2bb61a03947d60ab203b9b2c05b38f7fa5f102a2294b4e285e5aee3,2024-10-23T15:12:34.673000
CVE-2024-40084,0,0,4bfdc024cb91df5bb8d17d66cec084fec7d97ef49264d00142fadf94256b75f9,2024-10-23T15:12:34.673000
@ -263666,7 +263669,7 @@ CVE-2024-46047,0,0,57a3435cb7b6e94de5fb698161c585c7b5ce0f8c27f8db901c567ec5b0f81
CVE-2024-46048,0,0,8b386e1ce8db1651262779289df0cde97cc0d4c50d015509acb4f6ce2f921783,2024-09-20T00:35:54.187000
CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb874,2024-09-20T00:39:30.443000
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
CVE-2024-46054,0,1,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234f2f,2024-12-02T17:15:11.610000
CVE-2024-46054,0,0,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234f2f,2024-12-02T17:15:11.610000
CVE-2024-46055,0,0,fb3ab0f0de94860a6cfab293110c9c5563c53335293fdfc002812d3e3e3d5f7a,2024-11-27T18:15:13.300000
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
@ -264253,7 +264256,7 @@ CVE-2024-47074,0,0,267a945e17f4a8e8e3ad906b4a73babdb13651aee69ba771912b3792671fd
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000
CVE-2024-47078,0,1,10afb9e6722a0aa2d390a08f8c9cc758e3470acdae52bc8d53ba79b68f1e0fed,2024-12-02T18:31:56.817000
CVE-2024-47078,0,0,10afb9e6722a0aa2d390a08f8c9cc758e3470acdae52bc8d53ba79b68f1e0fed,2024-12-02T18:31:56.817000
CVE-2024-47079,0,0,d8ccb016ae09801690996b7754595e296560f1a65a763da55e97f54fd5c7b0dc,2024-10-10T12:57:21.987000
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
CVE-2024-47080,0,0,aa86a69aa1a9b207836e4ce6e146e436fefd6cc1a294d7c36c55a2bb96d8f384,2024-10-16T16:38:43.170000
@ -265789,7 +265792,7 @@ CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9
CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000
CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
CVE-2024-49763,1,1,390a387f134353159444b9384ca7139409cca538e6054a310492c29d8a68242c,2024-12-02T17:15:11.830000
CVE-2024-49763,0,0,390a387f134353159444b9384ca7139409cca538e6054a310492c29d8a68242c,2024-12-02T17:15:11.830000
CVE-2024-49764,0,0,35742a982a82bfbac3ba89ac10d6a85fed15175d4d482af0c8f4cf2b3fa6e2cc,2024-11-20T14:40:02.630000
CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
@ -266372,8 +266375,8 @@ CVE-2024-50376,0,0,c17efa3dc650d5a0b44b765200512faffc52101b81c2385c1a9f8e742ee86
CVE-2024-50377,0,0,a88baec8ddbf85dae69a29e2d805cf9a334ef1555a19dac3559d55b727cb3e80,2024-11-26T11:22:08.767000
CVE-2024-50378,0,0,d1e7f6cc1c38465f15ead8b558f025ff2fd8c3e8d0c0fab80553e16623c34e06,2024-11-08T19:01:03.880000
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
CVE-2024-50380,1,1,5cfd4d3058711977d7b02b9e779feffa0e24d95fd021403d8b8b4f61100953a5,2024-12-02T17:15:11.980000
CVE-2024-50381,1,1,cc4c78182ccb5412150348a074c0f3fe64b48452294aba2fc4de16da81547ef3,2024-12-02T17:15:12.160000
CVE-2024-50380,0,0,5cfd4d3058711977d7b02b9e779feffa0e24d95fd021403d8b8b4f61100953a5,2024-12-02T17:15:11.980000
CVE-2024-50381,0,0,cc4c78182ccb5412150348a074c0f3fe64b48452294aba2fc4de16da81547ef3,2024-12-02T17:15:12.160000
CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000
CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000
CVE-2024-50386,0,0,e8a2dfb379d3c33fde3d10d50a34e7ed2697dcee8b987f61d477faa743f65676,2024-11-12T15:48:59.103000
@ -267647,7 +267650,7 @@ CVE-2024-52585,0,0,ae573765d0059b6c237eb866187766f9c4c0b67ec566925f547df71f0cc9a
CVE-2024-52587,0,0,4ff6d32c0cce5d4db211ff88731438a9a256421cd5f2b2cabeafbdadc8a29ef5,2024-11-19T21:57:32.967000
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
CVE-2024-52595,0,0,8a7985528b5682db55ae119b7b5e36765ed6db59aa7644e450a4161b96108d1c,2024-11-25T14:27:38.087000
CVE-2024-52596,1,1,a1b5270424704526254af72af668772c7edcde11b939184b2a93420e4568a321,2024-12-02T17:15:12.353000
CVE-2024-52596,0,0,a1b5270424704526254af72af668772c7edcde11b939184b2a93420e4568a321,2024-12-02T17:15:12.353000
CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000
CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
@ -267673,6 +267676,7 @@ CVE-2024-52711,0,0,25e806d2babc20691476aabfcc4918f38a4f803e2dadea4a566e728ec69d7
CVE-2024-52714,0,0,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476af1a,2024-11-20T20:35:15.260000
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0194,2024-11-22T16:15:33.983000
CVE-2024-52724,1,1,31bcc87a603cca0a8b96eca1f7ca6e15911f791c17c30d44ad001cfd53b29b95,2024-12-02T19:15:10.697000
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
@ -267710,7 +267714,7 @@ CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176
CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000
CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000
CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000
CVE-2024-52806,1,1,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000
CVE-2024-52806,0,0,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000
CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000
@ -267864,7 +267868,7 @@ CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b6
CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000
CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000
CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000
CVE-2024-53259,1,1,b56d791ed8a3934da53ca3b2bc8d09134e7671697306e7cd36424993380151b4,2024-12-02T17:15:12.767000
CVE-2024-53259,0,0,b56d791ed8a3934da53ca3b2bc8d09134e7671697306e7cd36424993380151b4,2024-12-02T17:15:12.767000
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
CVE-2024-53260,0,0,f8456e8751226ee5d041fd86437235b7d18924e40a17ade86dc5cd10d0203ce0,2024-11-27T22:15:05.353000
CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000
@ -267884,7 +267888,7 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e
CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
CVE-2024-5335,0,0,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000
CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000
CVE-2024-53364,1,1,98d19b85cee394f2609af2d3c120e10f09c46dfe00af779065231746b6ce8188,2024-12-02T17:15:12.933000
CVE-2024-53364,0,1,708f3ece40bf0bf488cd6ba77ae8795762f91e489b51a867d515c5116d6de69d,2024-12-02T20:15:07.487000
CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000
CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000
CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000
@ -267898,16 +267902,17 @@ CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b
CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000
CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000
CVE-2024-53459,0,1,bcee038fd506b2d042b2e2518da0df51a6c3759ec3722aac04f828072f98c4d4,2024-12-02T18:15:11.123000
CVE-2024-53459,0,0,bcee038fd506b2d042b2e2518da0df51a6c3759ec3722aac04f828072f98c4d4,2024-12-02T18:15:11.123000
CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000
CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000
CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000
CVE-2024-53484,1,1,7f2e36a94d2ab38efc349e912aac79a8f2255c98dd9d4e3cafa14fba72ce9911,2024-12-02T19:15:10.820000
CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000
CVE-2024-53504,0,1,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000
CVE-2024-53505,0,1,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000
CVE-2024-53506,0,1,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000
CVE-2024-53507,0,1,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000
CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000
CVE-2024-53505,0,0,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000
CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000
CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000
CVE-2024-5351,0,0,5b3be503117b69cfbfdb88b1fae31317d85f3a58c24bc4f082dcbe98687cb2c4,2024-06-04T19:21:05.570000
CVE-2024-5352,0,0,da1c4d8b4e23dadce106da9517801ea125925e8071854aa14e0650ba3020a2bf,2024-06-21T18:15:11.303000
CVE-2024-5353,0,0,525ae1f28e269a2f910a2998894d881f94e776efad76469271fac08c213e4cb6,2024-06-04T19:21:05.680000
@ -267917,8 +267922,8 @@ CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8
CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000
CVE-2024-53556,0,0,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000
CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000
CVE-2024-53564,1,1,e10a96030ded2829a41b48cc1671c01830a59f8174dc924d23b218915340bc5b,2024-12-02T18:15:11.353000
CVE-2024-53566,1,1,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000
CVE-2024-53564,0,0,e10a96030ded2829a41b48cc1671c01830a59f8174dc924d23b218915340bc5b,2024-12-02T18:15:11.353000
CVE-2024-53566,0,0,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000
CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59eee,2024-06-04T19:21:06.183000
@ -267929,10 +267934,11 @@ CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f8
CVE-2024-53604,0,0,f62d305bb98148833da87db5a11321e6ca6d6dd658f1c5fbfba2d66d119aa0aa,2024-11-29T14:15:05.893000
CVE-2024-53605,0,0,ca300feecc4d15af3b8cbc938be55c089599ebfcca8298d8fee9c4660ffccb57,2024-12-02T01:15:04.030000
CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000
CVE-2024-53617,1,1,1d15b7d8455e44e7d682bb17f092211a84550d994186e8d8092655932756eace,2024-12-02T20:15:07.710000
CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000
CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000
CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000
CVE-2024-53623,0,0,55226a98c0510658df56bd966155efe791cb5e146bf4a5e4e52f80516760f206,2024-11-29T23:15:04.943000
CVE-2024-53623,0,1,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000
CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000
CVE-2024-53635,0,0,6e8b5160fce2a741e8ac5d43a4a38430a8c2b5d2b740bbc37c715cac813c59a2,2024-11-27T18:15:18.130000
CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000
@ -268053,7 +268059,7 @@ CVE-2024-53855,0,0,3b7a475c32d1d09fe2eb4189fd1d6fb7d653d88d8eb34139f0255f4c5d06f
CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2567,2024-11-27T22:15:05.520000
CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000
CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
CVE-2024-53861,0,0,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000
CVE-2024-53861,0,1,c906a7c9ad7960370bb443153ada29d340a316d0e26a761ec82eb161aaf6e2d4,2024-12-02T19:15:12.150000
CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000
CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000
CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000
@ -268062,6 +268068,7 @@ CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273
CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000
CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada266a,2024-11-26T18:23:09.517000
CVE-2024-5390,0,0,577e03013c579fd5ea5c07b95a092cd4d32be3fa4130d25da9e61ffe468007ab,2024-06-04T19:21:08.020000
CVE-2024-53900,1,1,d85cbefb465ea902cbbe0e0389f3f5eff99eb2d1812c50eefe5ac1d7199e1a85,2024-12-02T20:15:08.347000
CVE-2024-53901,0,0,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000
CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000
CVE-2024-5391,0,0,a7c29f93c1b76aed47351138468a6c5b251b9f9a4ad39cf688118719a36ed1c7,2024-06-07T20:15:12.687000
@ -268073,7 +268080,7 @@ CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
CVE-2024-53920,0,1,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000
CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000
CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000
@ -268089,8 +268096,8 @@ CVE-2024-53981,0,0,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b
CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000
CVE-2024-53984,0,0,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
CVE-2024-53990,1,1,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000
CVE-2024-53992,1,1,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000
CVE-2024-53990,0,0,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000
CVE-2024-53992,0,0,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000
CVE-2024-54004,0,0,4b55764e78df7d1fab73ac81a29fd36001f40116e182b6aab547372d06b234b5,2024-11-27T19:15:33.723000
@ -268540,6 +268547,7 @@ CVE-2024-5885,0,0,dcdbec1e5ab1fdbf77f5f1b7e765973fbf7491d04e03a7c4b99d66ab0997c5
CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000
CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000
CVE-2024-5889,0,0,fbcff794637f48a8b78c74fdd2956f49b1e81babb06e13aa124ccff6d03acd89,2024-08-01T16:50:43.603000
CVE-2024-5890,1,1,7c6b5ac721dd6914eae890c33082005820010469b56039e337acfc1334e10773,2024-12-02T19:15:12.357000
CVE-2024-5891,0,0,a1103d3c594e6c6c8995aad9b94775b3d253fc3aed0174490e511fc908219bb6,2024-10-04T12:32:13.813000
CVE-2024-5892,0,0,c827287e71db613eefb73da2ddb327e45b7bab6b508053dda1226986578187ad,2024-06-13T18:36:09.013000
CVE-2024-5893,0,0,78ef67dfe3790c320a0f9ba1a7349940f70da93d76f5f0750d1f242e1c8acc0a,2024-08-14T14:02:14.170000

Can't render this file because it is too large.