diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47157.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47157.json index 90ccb4540a3..22ef93f3c79 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47157.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47157.json @@ -2,9 +2,8 @@ "id": "CVE-2021-47157", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T05:15:06.317", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-11-25T21:15:04.560", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,7 +14,42 @@ "value": "El m\u00f3dulo Kossy anterior a 0.60 para Perl permite el secuestro de JSON debido al mal manejo de X-Requested-With." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], "references": [ { "url": "https://github.com/kazeburo/Kossy/pull/16", @@ -24,6 +58,14 @@ { "url": "https://metacpan.org/dist/Kossy/changes", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/kazeburo/Kossy/pull/16", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://metacpan.org/dist/Kossy/changes", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json index 1fd8afa9b3c..9fbf1280c69 100644 --- a/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37822.json @@ -2,9 +2,8 @@ "id": "CVE-2023-37822", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-03T18:15:04.443", - "lastModified": "2024-10-29T14:47:05.997", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-11-25T22:15:06.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -23,6 +22,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +31,27 @@ "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", - "availabilityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", "baseScore": 8.2, - "baseSeverity": "HIGH" + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 4.7 @@ -49,6 +68,16 @@ "value": "CWE-331" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-331" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43769.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43769.json index 7acdd46a4f4..3e518b542f8 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43769.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43769.json @@ -2,9 +2,8 @@ "id": "CVE-2023-43769", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:41:09.503", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-11-25T22:15:09.587", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,7 +14,30 @@ "value": "Se descubri\u00f3 un problema en Couchbase Server hasta la versi\u00f3n 7.1.4 anterior a la 7.1.5 y anterior a la 7.2.1. Hay puertos de servicio RMI no autenticados expuestos en Analytics." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", @@ -32,6 +54,22 @@ { "url": "https://www.couchbase.com/downloads", "source": "cve@mitre.org" + }, + { + "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://forums.couchbase.com/tags/security", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.couchbase.com/alerts/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.couchbase.com/downloads", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10709.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10709.json index a26e601c596..6142ee35f4c 100644 --- a/CVE-2024/CVE-2024-107xx/CVE-2024-10709.json +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10709.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10709", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-25T06:15:04.573", - "lastModified": "2024-11-25T06:15:04.573", + "lastModified": "2024-11-25T21:15:08.837", "vulnStatus": "Received", "descriptions": [ { @@ -10,7 +10,30 @@ "value": "The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/114aeaf7-32a5-4510-a497-92cc0951b022/", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json index f59be2a8aa0..9ef36137917 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json @@ -2,9 +2,8 @@ "id": "CVE-2024-1712", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.950", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-11-25T21:15:12.783", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,11 +14,50 @@ "value": "El complemento Carousel Slider de WordPress anterior a 2.2.7 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28811.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28811.json index 214f3e3ded3..320c633be3d 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28811.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28811.json @@ -2,9 +2,8 @@ "id": "CVE-2024-28811", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T19:15:04.060", - "lastModified": "2024-10-04T13:51:25.567", + "lastModified": "2024-11-25T21:15:13.650", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,7 +14,42 @@ "value": "Se descubri\u00f3 un problema en Infinera hiT 7300 5.60.50. Una aplicaci\u00f3n web permite que un atacante remoto con privilegios ejecute aplicaciones contenidas en un directorio de SO espec\u00edfico a trav\u00e9s de invocaciones HTTP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28811", diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32606.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32606.json index c48981ffc5f..44d38836c24 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32606.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32606.json @@ -2,9 +2,8 @@ "id": "CVE-2024-32606", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:45.400", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-11-25T21:15:14.300", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,11 +14,50 @@ "value": "La librer\u00eda HDF5 hasta 1.14.3 puede intentar eliminar la referencia a valores no inicializados en h5tools_str_sprint en tools/lib/h5tools_str.c (llamado desde h5tools_dump_simple_data en tools/lib/h5tools_dump.c)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], "references": [ { "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", "source": "cve@mitre.org" + }, + { + "url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36589.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36589.json index 1a4e64f33e0..9cf1f1f6aa2 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36589.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36589.json @@ -2,9 +2,8 @@ "id": "CVE-2024-36589", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:52.157", - "lastModified": "2024-06-17T12:43:31.090", + "lastModified": "2024-11-25T22:15:11.433", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,11 +14,50 @@ "value": "Se descubri\u00f3 un problema en Annonshop.app DecentralizeJustice/anonymousLocker commit 2b2b4 a ba9fd y DecentralizeJustice/anonBackend commit 57837 a cd815 para almacenar credenciales en texto plano." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36589.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36589.md", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39846.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39846.json index 443301e7339..de496f832f7 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39846.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39846.json @@ -2,9 +2,8 @@ "id": "CVE-2024-39846", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-29T21:15:09.917", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-11-25T21:15:15.117", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,7 +14,42 @@ "value": "NewPass anterior a 1.2.0 almacena contrase\u00f1as (en lugar de hashes de contrase\u00f1as) directamente, lo que facilita la obtenci\u00f3n de acceso no autorizado a informaci\u00f3n confidencial. NOTA: en cada caso, los datos en reposo se cifran, pero se descifran dentro de la memoria del proceso durante el uso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://github.com/6eero/NewPass/commit/13f0a844d64927450fa751deb7cc06beba699720", @@ -24,6 +58,14 @@ { "url": "https://github.com/6eero/NewPass/releases/tag/v1.2.0", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/6eero/NewPass/commit/13f0a844d64927450fa751deb7cc06beba699720", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/6eero/NewPass/releases/tag/v1.2.0", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45031.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45031.json index 4ae887325f3..279e4c79636 100644 --- a/CVE-2024/CVE-2024-450xx/CVE-2024-45031.json +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45031.json @@ -2,9 +2,8 @@ "id": "CVE-2024-45031", "sourceIdentifier": "security@apache.org", "published": "2024-10-24T15:15:13.533", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-11-25T22:15:12.147", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,11 +14,34 @@ "value": "Al editar objetos en Syncope Console, se pod\u00edan usar etiquetas HTML incompletas para evitar la desinfecci\u00f3n de HTML. Esto hac\u00eda posible inyectar payloads XSS almacenados que se activaban para otros usuarios durante el uso normal de la aplicaci\u00f3n. Los payloads XSS tambi\u00e9n se pod\u00edan inyectar en Syncope Enduser al editar \u201cInformaci\u00f3n personal\u201d o \u201cSolicitudes de usuario\u201d: dichos payloads se activaban para los administradores en Syncope Console, lo que permit\u00eda el secuestro de sesiones. Se recomienda a los usuarios que actualicen a la versi\u00f3n 3.0.9, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -32,6 +54,10 @@ { "url": "https://lists.apache.org/thread/fn567pfmo3s55ofkc42drz8b4kgbhp9m", "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/10/24/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json index ec34d9bda6c..b3780003e71 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45894.json @@ -2,9 +2,8 @@ "id": "CVE-2024-45894", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T19:15:09.980", - "lastModified": "2024-10-10T12:57:21.987", + "lastModified": "2024-11-25T22:15:12.850", "vulnStatus": "Awaiting Analysis", - "cveTags": [], "descriptions": [ { "lang": "en", @@ -15,7 +14,42 @@ "value": "BlueCMS 1.6 sufre una eliminaci\u00f3n arbitraria de archivos a trav\u00e9s del par\u00e1metro file_name en una solicitud /admin/database.php?act=del." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yihanjinchangtai/215ea4bf71edb0ac9df33b221b63a3a9", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48981.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48981.json index b73b075d2d9..35d47ee2b3c 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48981.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48981", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T20:15:19.097", - "lastModified": "2024-11-22T17:33:02.740", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-25T22:15:13.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48982.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48982.json index ced60853ed6..c1cf09177bb 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48982.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48982", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T21:15:07.830", - "lastModified": "2024-11-22T21:41:30.290", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-25T21:15:17.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48983.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48983.json index 4a6dc10093b..1cb7aa0901f 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48983.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48983", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T20:15:19.183", - "lastModified": "2024-11-22T17:26:37.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-25T21:15:17.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +68,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48984.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48984.json index 17223fe02a6..5427d4aa9d7 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48984.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48984.json @@ -2,16 +2,54 @@ "id": "CVE-2024-48984", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T21:15:07.920", - "lastModified": "2024-11-20T21:15:07.920", - "vulnStatus": "Received", - "cveTags": [], + "lastModified": "2024-11-25T22:15:14.253", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in MBed OS 6.16.0. When parsing hci reports, the hci parsing software dynamically determines the length of a list of reports by reading a byte from an input stream. It then fetches the length of the first report, uses it to calculate the beginning of the second report, etc. In doing this, it tracks the largest report so it can later allocate a buffer that fits every individual report (but only one at a time). It does not, however, validate that these addresses are all contained within the buffer passed to hciEvtProcessLeExtAdvReport. It is then possible, though unlikely, that the buffer designated to hold the reports is allocated in such a way that one of these out-of-bounds length fields is contained within the new buffer. When the (n-1)th report is copied, it overwrites the length field of the nth report. This now corrupted length field is then used for a memcpy into the new buffer, which may lead to a buffer overflow." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en MBed OS 6.16.0. Al analizar informes hci, el software de an\u00e1lisis hci determina din\u00e1micamente la longitud de una lista de informes leyendo un byte de un flujo de entrada. Luego obtiene la longitud del primer informe, la utiliza para calcular el comienzo del segundo informe, etc. Al hacer esto, realiza un seguimiento del informe m\u00e1s grande para luego asignar un b\u00fafer que se ajuste a cada informe individual (pero solo uno a la vez). Sin embargo, no valida que todas estas direcciones est\u00e9n contenidas dentro del b\u00fafer pasado a hciEvtProcessLeExtAdvReport. Entonces es posible, aunque poco probable, que el b\u00fafer designado para almacenar los informes se asigne de tal manera que uno de estos campos de longitud fuera de los l\u00edmites est\u00e9 contenido dentro del nuevo b\u00fafer. Cuando se copia el (n-1)\u00ba informe, sobrescribe el campo de longitud del n\u00ba informe. Este campo de longitud ahora da\u00f1ado se utiliza luego para una memcpy en el nuevo b\u00fafer, lo que puede provocar un desbordamiento del b\u00fafer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/libraries/cordio_stack/ble-host/sources/hci/dual_chip/hci_evt.c#L1317", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48985.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48985.json index 9113358533c..9f10e065daf 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48985.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48985", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T20:15:19.270", - "lastModified": "2024-11-22T17:19:54.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-25T22:15:14.790", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -48,6 +68,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50671.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50671.json new file mode 100644 index 00000000000..98036559af6 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50671.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-50671", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-25T21:15:19.040", + "lastModified": "2024-11-25T21:15:19.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows attackers with Authenticated User roles to obtain email addresses via the \"Get users\" feature. The vulnerability occurs due to a flaw in permission verification logic, where the wildcard character in permitted URLs grants unintended access to endpoints restricted to users with Super Admin roles. This makes it possible for attackers to disclose the email addresses of all users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/adaptlearning/adapt_authoring", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-50671", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50672.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50672.json new file mode 100644 index 00000000000..391925c3bf4 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50672.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-50672", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-25T21:15:19.523", + "lastModified": "2024-11-25T21:15:19.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/adaptlearning/adapt_authoring", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-50672", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51073.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51073.json index dca41b844c3..584804f03fb 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51073.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51073.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51073", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T16:15:33.730", - "lastModified": "2024-11-25T18:15:13.370", + "lastModified": "2024-11-25T21:15:19.847", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -14,7 +14,30 @@ "value": "Un problema en Cluster KIA Seltos Software v1.0, Hardware v1.0 permite a los atacantes interrumpir las comunicaciones entre el grupo de instrumentos y el bus CAN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.3 + } + ] + }, "references": [ { "url": "https://github.com/nitinronge91/KIA-SELTOS-Cluster-Vulnerabilities/blob/3755e3f692dce5b1ab06de2d04a2433c907ab21c/CVE/Control%20CAN%20communication%20for%20KIA%20SELTOS%20Cluster%20CVE-2024-51073.md", diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json index 5fb46cbcfe3..85c93246b62 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51074.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51074", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T16:15:33.860", - "lastModified": "2024-11-25T18:15:13.480", + "lastModified": "2024-11-25T21:15:20.390", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -14,7 +14,30 @@ "value": "Control de acceso incorrecto en Instrument Cluster KIA Seltos Software v1.0, Hardware v1.0 permite a atacantes cambiar arbitrariamente las lecturas del od\u00f3metro en el veh\u00edculo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.3 + } + ] + }, "references": [ { "url": "https://en.wikipedia.org/wiki/CAN_bus", diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53063.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53063.json index 09c2f500eae..915ffb8bc7a 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53063.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53063.json @@ -2,48 +2,201 @@ "id": "CVE-2024-53063", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:26.180", - "lastModified": "2024-11-19T21:56:45.533", - "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "lastModified": "2024-11-25T21:08:23.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvbdev: prevent the risk of out of memory access\n\nThe dvbdev contains a static variable used to store dvb minors.\n\nThe behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set\nor not. When not set, dvb_register_device() won't check for\nboundaries, as it will rely that a previous call to\ndvb_register_adapter() would already be enforcing it.\n\nOn a similar way, dvb_device_open() uses the assumption\nthat the register functions already did the needed checks.\n\nThis can be fragile if some device ends using different\ncalls. This also generate warnings on static check analysers\nlike Coverity.\n\nSo, add explicit guards to prevent potential risk of OOM issues." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: dvbdev: evitar el riesgo de acceso fuera de memoria El dvbdev contiene una variable est\u00e1tica utilizada para almacenar dvb minors. El comportamiento de la misma depende de si CONFIG_DVB_DYNAMIC_MINORS est\u00e1 configurado o no. Cuando no est\u00e1 configurado, dvb_register_device() no comprobar\u00e1 los l\u00edmites, ya que depender\u00e1 de que una llamada anterior a dvb_register_adapter() ya lo estar\u00eda aplicando. De forma similar, dvb_device_open() utiliza la suposici\u00f3n de que las funciones de registro ya realizaron las comprobaciones necesarias. Esto puede ser fr\u00e1gil si alg\u00fan dispositivo termina utilizando llamadas diferentes. Esto tambi\u00e9n genera advertencias en los analizadores de comprobaciones est\u00e1ticas como Coverity. Por lo tanto, agregue protecciones expl\u00edcitas para evitar el riesgo potencial de problemas de OOM." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.29", + "versionEndExcluding": "4.19.324", + "matchCriteriaId": "D59816FE-D4DB-4E07-852B-113A38BECD27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.286", + "matchCriteriaId": "9952C897-8A61-4D4B-9D6D-7D063E9EA15E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.230", + "matchCriteriaId": "BF5B32D0-72C9-41C3-A0BB-D4946153C134" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.172", + "matchCriteriaId": "88812664-4296-42AC-AE0F-ED71086C1BB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.117", + "matchCriteriaId": "0DD7F755-2F6B-4707-8973-78496AD5AA8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.61", + "matchCriteriaId": "630ED7EB-C97E-4435-B884-1E309E40D6F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.8", + "matchCriteriaId": "0BD000F7-3DAD-4DD3-8906-98EA1EC67E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1e461672616b726f29261ee81bb991528818537c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b88675e18b6517043a6f734eaa8ea6eb3bfa140", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f76f7df14861e3a560898fa41979ec92424b58f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/972e63e895abbe8aa1ccbdbb4e6362abda7cd457", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c17085fabbde2041c893d29599800f2d4992b23", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4a17210c03ade1c8d9a9f193a105654b7a05c11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b751a96025275c17f04083cbfe856822f1658946", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fedfde9deb83ac8d2f3d5f36f111023df34b1684", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53064.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53064.json index 580a7bedd96..1a67ef9ffac 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53064.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53064.json @@ -2,24 +2,117 @@ "id": "CVE-2024-53064", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:26.260", - "lastModified": "2024-11-19T21:56:45.533", - "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "lastModified": "2024-11-25T21:05:52.863", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix idpf_vc_core_init error path\n\nIn an event where the platform running the device control plane\nis rebooted, reset is detected on the driver. It releases\nall the resources and waits for the reset to complete. Once the\nreset is done, it tries to build the resources back. At this\ntime if the device control plane is not yet started, then\nthe driver timeouts on the virtchnl message and retries to\nestablish the mailbox again.\n\nIn the retry flow, mailbox is deinitialized but the mailbox\nworkqueue is still alive and polling for the mailbox message.\nThis results in accessing the released control queue leading to\nnull-ptr-deref. Fix it by unrolling the work queue cancellation\nand mailbox deinitialization in the reverse order which they got\ninitialized." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: idpf: fix idpf_vc_core_init error path En un evento en el que se reinicia la plataforma que ejecuta el plano de control del dispositivo, se detecta un reinicio en el controlador. Libera todos los recursos y espera a que se complete el reinicio. Una vez que se realiza el reinicio, intenta reconstruir los recursos. En este momento, si el plano de control del dispositivo a\u00fan no se inici\u00f3, el controlador agota el tiempo de espera en el mensaje virtchnl y vuelve a intentar establecer el buz\u00f3n. En el flujo de reintento, el buz\u00f3n se desinicializa, pero la cola de trabajo del buz\u00f3n sigue activa y sondea el mensaje del buz\u00f3n. Esto da como resultado el acceso a la cola de control liberada, lo que genera null-ptr-deref. Arr\u00e9glelo desenrollando la cancelaci\u00f3n de la cola de trabajo y la desinicializaci\u00f3n del buz\u00f3n en el orden inverso al que se inicializaron." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.8", + "matchCriteriaId": "0BD000F7-3DAD-4DD3-8906-98EA1EC67E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/683fcd90ba22507ebeb1921a26dfe77efff8c266", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b58031ff96b84a38d7b73b23c7ecfb2e0557f43", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53065.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53065.json index 0d7bac4353e..ddcfccde1e8 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53065.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53065.json @@ -2,24 +2,117 @@ "id": "CVE-2024-53065", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:26.333", - "lastModified": "2024-11-19T21:56:45.533", - "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "lastModified": "2024-11-25T21:04:38.343", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab: fix warning caused by duplicate kmem_cache creation in kmem_buckets_create\n\nCommit b035f5a6d852 (\"mm: slab: reduce the kmalloc() minimum alignment\nif DMA bouncing possible\") reduced ARCH_KMALLOC_MINALIGN to 8 on arm64.\nHowever, with KASAN_HW_TAGS enabled, arch_slab_minalign() becomes 16.\nThis causes kmalloc_caches[*][8] to be aliased to kmalloc_caches[*][16],\nresulting in kmem_buckets_create() attempting to create a kmem_cache for\nsize 16 twice. This duplication triggers warnings on boot:\n\n[ 2.325108] ------------[ cut here ]------------\n[ 2.325135] kmem_cache of name 'memdup_user-16' already exists\n[ 2.325783] WARNING: CPU: 0 PID: 1 at mm/slab_common.c:107 __kmem_cache_create_args+0xb8/0x3b0\n[ 2.327957] Modules linked in:\n[ 2.328550] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc5mm-unstable-arm64+ #12\n[ 2.328683] Hardware name: QEMU QEMU Virtual Machine, BIOS 2024.02-2 03/11/2024\n[ 2.328790] pstate: 61000009 (nZCv daif -PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[ 2.328911] pc : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.328930] lr : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.328942] sp : ffff800083d6fc50\n[ 2.328961] x29: ffff800083d6fc50 x28: f2ff0000c1674410 x27: ffff8000820b0598\n[ 2.329061] x26: 000000007fffffff x25: 0000000000000010 x24: 0000000000002000\n[ 2.329101] x23: ffff800083d6fce8 x22: ffff8000832222e8 x21: ffff800083222388\n[ 2.329118] x20: f2ff0000c1674410 x19: f5ff0000c16364c0 x18: ffff800083d80030\n[ 2.329135] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n[ 2.329152] x14: 0000000000000000 x13: 0a73747369786520 x12: 79646165726c6120\n[ 2.329169] x11: 656820747563205b x10: 2d2d2d2d2d2d2d2d x9 : 0000000000000000\n[ 2.329194] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\n[ 2.329210] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n[ 2.329226] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\n[ 2.329291] Call trace:\n[ 2.329407] __kmem_cache_create_args+0xb8/0x3b0\n[ 2.329499] kmem_buckets_create+0xfc/0x320\n[ 2.329526] init_user_buckets+0x34/0x78\n[ 2.329540] do_one_initcall+0x64/0x3c8\n[ 2.329550] kernel_init_freeable+0x26c/0x578\n[ 2.329562] kernel_init+0x3c/0x258\n[ 2.329574] ret_from_fork+0x10/0x20\n[ 2.329698] ---[ end trace 0000000000000000 ]---\n\n[ 2.403704] ------------[ cut here ]------------\n[ 2.404716] kmem_cache of name 'msg_msg-16' already exists\n[ 2.404801] WARNING: CPU: 2 PID: 1 at mm/slab_common.c:107 __kmem_cache_create_args+0xb8/0x3b0\n[ 2.404842] Modules linked in:\n[ 2.404971] CPU: 2 UID: 0 PID: 1 Comm: swapper/0 Tainted: G W 6.12.0-rc5mm-unstable-arm64+ #12\n[ 2.405026] Tainted: [W]=WARN\n[ 2.405043] Hardware name: QEMU QEMU Virtual Machine, BIOS 2024.02-2 03/11/2024\n[ 2.405057] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2.405079] pc : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.405100] lr : __kmem_cache_create_args+0xb8/0x3b0\n[ 2.405111] sp : ffff800083d6fc50\n[ 2.405115] x29: ffff800083d6fc50 x28: fbff0000c1674410 x27: ffff8000820b0598\n[ 2.405135] x26: 000000000000ffd0 x25: 0000000000000010 x24: 0000000000006000\n[ 2.405153] x23: ffff800083d6fce8 x22: ffff8000832222e8 x21: ffff800083222388\n[ 2.405169] x20: fbff0000c1674410 x19: fdff0000c163d6c0 x18: ffff800083d80030\n[ 2.405185] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n[ 2.405201] x14: 0000000000000000 x13: 0a73747369786520 x12: 79646165726c6120\n[ 2.405217] x11: 656820747563205b x10: 2d2d2d2d2d2d2d2d x9 : 0000000000000000\n[ 2.405233] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\n[ 2.405248] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n[ 2.405271] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\n[ 2.405287] Call trace:\n[ 2\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slab: se corrige la advertencia causada por la creaci\u00f3n duplicada de kmem_cache en kmem_buckets_create. el commit b035f5a6d852 (\"mm: slab: reduce la alineaci\u00f3n m\u00ednima de kmalloc() si es posible el rebote de DMA\") redujo ARCH_KMALLOC_MINALIGN a 8 en arm64. Sin embargo, con KASAN_HW_TAGS habilitado, arch_slab_minalign() se convierte en 16. Esto hace que kmalloc_caches[*][8] se asocie a kmalloc_caches[*][16], lo que hace que kmem_buckets_create() intente crear un kmem_cache para el tama\u00f1o 16 dos veces. Esta duplicaci\u00f3n activa advertencias en el arranque: [ 2.325108] ------------[ cortar aqu\u00ed ]------------ [ 2.325135] kmem_cache con el nombre 'memdup_user-16' ya existe [ 2.325783] ADVERTENCIA: CPU: 0 PID: 1 en mm/slab_common.c:107 __kmem_cache_create_args+0xb8/0x3b0 [ 2.327957] M\u00f3dulos vinculados en: [ 2.328550] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 No contaminado 6.12.0-rc5mm-unstable-arm64+ #12 [ 2.328683] Nombre del hardware: QEMU QEMU Virtual Machine, BIOS 2024.02-2 03/11/2024 [ 2.328790] pstate: 61000009 (nZCv daif -PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 2.328911] pc : __kmem_cache_create_args+0xb8/0x3b0 [ 2.328930] lr : __kmem_cache_create_args+0xb8/0x3b0 [ 2.328942] sp : ffff800083d6fc50 [ 2.328961] x29: ffff800083d6fc50 x28: f2ff0000c1674410 x27: ffff8000820b0598 [ 2.329061] x26: 000000007fffffff x25: 0000000000000010 x24: 00000000000002000 [ 2.329101] x23: ffff800083d6fce8 x22: ffff8000832222e8 x21: ffff800083222388 [ 2.329118] x20: f2ff0000c1674410 x19: f5ff0000c16364c0 x18: ffff800083d80030 [ 2.329135] x17: 000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 2.329152] x14: 0000000000000000 x13: 0a73747369786520 x12: 79646165726c6120 [ 2.329169] x11: 205b x10: 2d2d2d2d2d2d2d2d x9 : 00000000000000000 [ 2.329194] x8 : 0000000000000000 x7 : 00000000000000000 x6 : 0000000000000000 [ 2.329210] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 [ 2.329226] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 [ 2.329291] Rastreo de llamadas: [ 2.329407] __kmem_cache_create_args+0xb8/0x3b0 [ 2.329499] kmem_buckets_create+0xfc/0x320 [ 2.329526] init_user_buckets+0x34/0x78 [ 2.329540] do_one_initcall+0x64/0x3c8 [ 2.329550] kernel_init_freeable+0x26c/0x578 [ 2.329562] kernel_init+0x3c/0x258 [ 2.329574] ret_from_fork+0x10/0x20 [ 2.329698] ---[ fin de seguimiento 000000000000000 ]--- [ 2.403704] ------------[ cortar aqu\u00ed ]------------ [ 2.404716] kmem_cache del nombre 'msg_msg-16' ya existe [ 2.404801] ADVERTENCIA: CPU: 2 PID: 1 en mm/slab_common.c:107 __kmem_cache_create_args+0xb8/0x3b0 [ 2.404842] M\u00f3dulos vinculados en: [ 2.404971] CPU: 2 UID: 0 PID: 1 Comm: swapper/0 Contaminado: GW 6.12.0-rc5mm-unstable-arm64+ #12 [ 2.405026] Contaminado: [W]=WARN [ 2.405043] Nombre del hardware: QEMU QEMU Virtual Machine, BIOS 2024.02-2 03/11/2024 [ 2.405057] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2.405079] pc : __kmem_cache_create_args+0xb8/0x3b0 [ 2.405100] lr : __kmem_cache_create_args+0xb8/0x3b0 [ 2.405111] sp : ffff800083d6fc50 [ 2.405115] x29: ffff800083d6fc50 x28: fbff0000c1674410 x27: ffff8000820b0598 [ 2.405135] x26: 000000000000ffd0 x25: 000000000000010 x24: 0000000000006000 [ 2.405153] x23: ffff800083d6fce8 x22: ffff8000832222e8 x21: ffff800083222388 [ 2.405169] x20: fbff0000c1674410 x19: fdff0000c163d6c0 x18: ffff800083d80030 [ 2.405185] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 2.405201] x14: 0000000000000000 x13: 0a73747369786520 x12: 79646165726c6120 [ 2.405217] x11: 656820747563205b x10: 2d2d2d2d2d2d2d2d x9 : 0000000000000000 [ 2.405233] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 [ 2.405248] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 [ 2.405271] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 [ 2.405287] Rastreo de llamada: [ 2 ---truncado---" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.8", + "matchCriteriaId": "728427FE-4653-45EF-AA11-DA6A6AF58B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1b47f9febf48641d3530ec877f4d0995c58e6b73", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c9201afebea1efc7ea4b8f721ee18a05bb8aca1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53096.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53096.json new file mode 100644 index 00000000000..8566bb53139 --- /dev/null +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53096.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-53096", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-11-25T22:15:15.287", + "lastModified": "2024-11-25T22:15:15.287", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: resolve faulty mmap_region() error path behaviour\n\nThe mmap_region() function is somewhat terrifying, with spaghetti-like\ncontrol flow and numerous means by which issues can arise and incomplete\nstate, memory leaks and other unpleasantness can occur.\n\nA large amount of the complexity arises from trying to handle errors late\nin the process of mapping a VMA, which forms the basis of recently\nobserved issues with resource leaks and observable inconsistent state.\n\nTaking advantage of previous patches in this series we move a number of\nchecks earlier in the code, simplifying things by moving the core of the\nlogic into a static internal function __mmap_region().\n\nDoing this allows us to perform a number of checks up front before we do\nany real work, and allows us to unwind the writable unmap check\nunconditionally as required and to perform a CONFIG_DEBUG_VM_MAPLE_TREE\nvalidation unconditionally also.\n\nWe move a number of things here:\n\n1. We preallocate memory for the iterator before we call the file-backed\n memory hook, allowing us to exit early and avoid having to perform\n complicated and error-prone close/free logic. We carefully free\n iterator state on both success and error paths.\n\n2. The enclosing mmap_region() function handles the mapping_map_writable()\n logic early. Previously the logic had the mapping_map_writable() at the\n point of mapping a newly allocated file-backed VMA, and a matching\n mapping_unmap_writable() on success and error paths.\n\n We now do this unconditionally if this is a file-backed, shared writable\n mapping. If a driver changes the flags to eliminate VM_MAYWRITE, however\n doing so does not invalidate the seal check we just performed, and we in\n any case always decrement the counter in the wrapper.\n\n We perform a debug assert to ensure a driver does not attempt to do the\n opposite.\n\n3. We also move arch_validate_flags() up into the mmap_region()\n function. This is only relevant on arm64 and sparc64, and the check is\n only meaningful for SPARC with ADI enabled. We explicitly add a warning\n for this arch if a driver invalidates this check, though the code ought\n eventually to be fixed to eliminate the need for this.\n\nWith all of these measures in place, we no longer need to explicitly close\nthe VMA on error paths, as we place all checks which might fail prior to a\ncall to any driver mmap hook.\n\nThis eliminates an entire class of errors, makes the code easier to reason\nabout and more robust." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5de195060b2e251a835f622759550e6202167641", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53097.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53097.json new file mode 100644 index 00000000000..073d4423ba9 --- /dev/null +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53097.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-53097", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-11-25T22:15:15.763", + "lastModified": "2024-11-25T22:15:15.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: krealloc: Fix MTE false alarm in __do_krealloc\n\nThis patch addresses an issue introduced by commit 1a83a716ec233 (\"mm:\nkrealloc: consider spare memory for __GFP_ZERO\") which causes MTE\n(Memory Tagging Extension) to falsely report a slab-out-of-bounds error.\n\nThe problem occurs when zeroing out spare memory in __do_krealloc. The\noriginal code only considered software-based KASAN and did not account\nfor MTE. It does not reset the KASAN tag before calling memset, leading\nto a mismatch between the pointer tag and the memory tag, resulting\nin a false positive.\n\nExample of the error:\n==================================================================\nswapper/0: BUG: KASAN: slab-out-of-bounds in __memset+0x84/0x188\nswapper/0: Write at addr f4ffff8005f0fdf0 by task swapper/0/1\nswapper/0: Pointer tag: [f4], memory tag: [fe]\nswapper/0:\nswapper/0: CPU: 4 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.\nswapper/0: Hardware name: MT6991(ENG) (DT)\nswapper/0: Call trace:\nswapper/0: dump_backtrace+0xfc/0x17c\nswapper/0: show_stack+0x18/0x28\nswapper/0: dump_stack_lvl+0x40/0xa0\nswapper/0: print_report+0x1b8/0x71c\nswapper/0: kasan_report+0xec/0x14c\nswapper/0: __do_kernel_fault+0x60/0x29c\nswapper/0: do_bad_area+0x30/0xdc\nswapper/0: do_tag_check_fault+0x20/0x34\nswapper/0: do_mem_abort+0x58/0x104\nswapper/0: el1_abort+0x3c/0x5c\nswapper/0: el1h_64_sync_handler+0x80/0xcc\nswapper/0: el1h_64_sync+0x68/0x6c\nswapper/0: __memset+0x84/0x188\nswapper/0: btf_populate_kfunc_set+0x280/0x3d8\nswapper/0: __register_btf_kfunc_id_set+0x43c/0x468\nswapper/0: register_btf_kfunc_id_set+0x48/0x60\nswapper/0: register_nf_nat_bpf+0x1c/0x40\nswapper/0: nf_nat_init+0xc0/0x128\nswapper/0: do_one_initcall+0x184/0x464\nswapper/0: do_initcall_level+0xdc/0x1b0\nswapper/0: do_initcalls+0x70/0xc0\nswapper/0: do_basic_setup+0x1c/0x28\nswapper/0: kernel_init_freeable+0x144/0x1b8\nswapper/0: kernel_init+0x20/0x1a8\nswapper/0: ret_from_fork+0x10/0x20\n==================================================================" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3dfb40da84f26dd35dd9bbaf626a2424565b8406", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/486aeb5f1855c75dd810c25036134961bd2a6722", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/704573851b51808b45dae2d62059d1d8189138a2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/71548fada7ee0eb50cc6ccda82dff010c745f92c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8ebee7565effdeae6085458f8f8463363120a871", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d02492863023431c31f85d570f718433c22b9311", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d43f1430d47c22a0727c05b6f156ed25fecdfeb4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53098.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53098.json new file mode 100644 index 00000000000..21241ad3ee2 --- /dev/null +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53098.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-53098", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-11-25T22:15:16.147", + "lastModified": "2024-11-25T22:15:16.147", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/ufence: Prefetch ufence addr to catch bogus address\n\naccess_ok() only checks for addr overflow so also try to read the addr\nto catch invalid addr sent from userspace.\n\n(cherry picked from commit 9408c4508483ffc60811e910a93d6425b8e63928)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5d623ffbae96b23f1fc43a3d5a267aabdb07583d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9c1813b3253480b30604c680026c7dc721ce86d1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53099.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53099.json new file mode 100644 index 00000000000..3cb0cdbfc95 --- /dev/null +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53099.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-53099", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-11-25T22:15:16.433", + "lastModified": "2024-11-25T22:15:16.433", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check validity of link->type in bpf_link_show_fdinfo()\n\nIf a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing\nbpf_link_type_strs[link->type] may result in an out-of-bounds access.\n\nTo spot such missed invocations early in the future, checking the\nvalidity of link->type in bpf_link_show_fdinfo() and emitting a warning\nwhen such invocations are missed." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/8421d4c8762bd022cb491f2f0f7019ef51b4f0a7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b3eb1b6a9f745d6941b345f0fae014dc8bb06d36", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d5092b0a1aaf35d77ebd8d33384d7930bec5cb5d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53100.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53100.json new file mode 100644 index 00000000000..e41e4fa5305 --- /dev/null +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53100.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-53100", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-11-25T22:15:16.763", + "lastModified": "2024-11-25T22:15:16.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: tcp: avoid race between queue_lock lock and destroy\n\nCommit 76d54bf20cdc (\"nvme-tcp: don't access released socket during\nerror recovery\") added a mutex_lock() call for the queue->queue_lock\nin nvme_tcp_get_address(). However, the mutex_lock() races with\nmutex_destroy() in nvme_tcp_free_queue(), and causes the WARN below.\n\nDEBUG_LOCKS_WARN_ON(lock->magic != lock)\nWARNING: CPU: 3 PID: 34077 at kernel/locking/mutex.c:587 __mutex_lock+0xcf0/0x1220\nModules linked in: nvmet_tcp nvmet nvme_tcp nvme_fabrics iw_cm ib_cm ib_core pktcdvd nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables qrtr sunrpc ppdev 9pnet_virtio 9pnet pcspkr netfs parport_pc parport e1000 i2c_piix4 i2c_smbus loop fuse nfnetlink zram bochs drm_vram_helper drm_ttm_helper ttm drm_kms_helper xfs drm sym53c8xx floppy nvme scsi_transport_spi nvme_core nvme_auth serio_raw ata_generic pata_acpi dm_multipath qemu_fw_cfg [last unloaded: ib_uverbs]\nCPU: 3 UID: 0 PID: 34077 Comm: udisksd Not tainted 6.11.0-rc7 #319\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:__mutex_lock+0xcf0/0x1220\nCode: 08 84 d2 0f 85 c8 04 00 00 8b 15 ef b6 c8 01 85 d2 0f 85 78 f4 ff ff 48 c7 c6 20 93 ee af 48 c7 c7 60 91 ee af e8 f0 a7 6d fd <0f> 0b e9 5e f4 ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1\nRSP: 0018:ffff88811305f760 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88812c652058 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001\nRBP: ffff88811305f8b0 R08: 0000000000000001 R09: ffffed1075c36341\nR10: ffff8883ae1b1a0b R11: 0000000000010498 R12: 0000000000000000\nR13: 0000000000000000 R14: dffffc0000000000 R15: ffff88812c652058\nFS: 00007f9713ae4980(0000) GS:ffff8883ae180000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fcd78483c7c CR3: 0000000122c38000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n ? __warn.cold+0x5b/0x1af\n ? __mutex_lock+0xcf0/0x1220\n ? report_bug+0x1ec/0x390\n ? handle_bug+0x3c/0x80\n ? exc_invalid_op+0x13/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? __mutex_lock+0xcf0/0x1220\n ? nvme_tcp_get_address+0xc2/0x1e0 [nvme_tcp]\n ? __pfx___mutex_lock+0x10/0x10\n ? __lock_acquire+0xd6a/0x59e0\n ? nvme_tcp_get_address+0xc2/0x1e0 [nvme_tcp]\n nvme_tcp_get_address+0xc2/0x1e0 [nvme_tcp]\n ? __pfx_nvme_tcp_get_address+0x10/0x10 [nvme_tcp]\n nvme_sysfs_show_address+0x81/0xc0 [nvme_core]\n dev_attr_show+0x42/0x80\n ? __asan_memset+0x1f/0x40\n sysfs_kf_seq_show+0x1f0/0x370\n seq_read_iter+0x2cb/0x1130\n ? rw_verify_area+0x3b1/0x590\n ? __mutex_lock+0x433/0x1220\n vfs_read+0x6a6/0xa20\n ? lockdep_hardirqs_on+0x78/0x100\n ? __pfx_vfs_read+0x10/0x10\n ksys_read+0xf7/0x1d0\n ? __pfx_ksys_read+0x10/0x10\n ? __x64_sys_openat+0x105/0x1d0\n do_syscall_64+0x93/0x180\n ? lockdep_hardirqs_on_prepare+0x16d/0x400\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on+0x78/0x100\n ? do_syscall_64+0x9f/0x180\n ? __pfx_ksys_read+0x10/0x10\n ? lockdep_hardirqs_on_prepare+0x16d/0x400\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on+0x78/0x100\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on_prepare+0x16d/0x400\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on+0x78/0x100\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on_prepare+0x16d/0x400\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on+0x78/0x100\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on_prepare+0x16d/0x400\n ? do_syscall_64+0x9f/0x180\n ? lockdep_hardirqs_on+0x78/0x100\n ? do_syscall_64+0x9f/0x180\n ? do_syscall_64+0x9f/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7f9713f55cfa\nCode: 55 48 89 e5 48 83 ec 20 48 89 55 e8 48 89 75 f0 89 7d f8 e8 e8 74 f8 ff 48 8b 55 e8 48 8b 75 f0 4\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/4f946479b326a3cbb193f2b8368aed9269514c35", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/782373ba27660ba7d330208cf5509ece6feb4545", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/975cb1d2121511584695d0e47fdb90e6782da007", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e15cebc1b21856944b387f4abd03b66bd3d4f027", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53101.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53101.json new file mode 100644 index 00000000000..83b6f0694fc --- /dev/null +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53101.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-53101", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-11-25T22:15:17.163", + "lastModified": "2024-11-25T22:15:17.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: Fix uninitialized value issue in from_kuid and from_kgid\n\nocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in\na trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.\n\nInitialize all fields of newattrs to avoid uninitialized variables, by\nchecking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/15f34347481648a567db67fb473c23befb796af5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/17ecb40c5cc7755a321fb6148cba5797431ee5b8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1c28bca1256aecece6e94b26b85cd07e08b0dc90", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/1cb5bfc5bfc651982b6203c224d49b7ddacf28bc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5a72b0d3497b818d8f000c347a7c11801eb27bfc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9db25c2b41c34963c3ccf473b08171f87670652e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a0c77e5e3dcbffc7c6080ccc89c037f0c86496cf", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b3e612bd8f64ce62e731e95f635e06a2efe3c80c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53102.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53102.json new file mode 100644 index 00000000000..a39ea37f401 --- /dev/null +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53102.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-53102", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-11-25T22:15:17.553", + "lastModified": "2024-11-25T22:15:17.553", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: make keep-alive synchronous operation\n\nThe nvme keep-alive operation, which executes at a periodic interval,\ncould potentially sneak in while shutting down a fabric controller.\nThis may lead to a race between the fabric controller admin queue\ndestroy code path (invoked while shutting down controller) and hw/hctx\nqueue dispatcher called from the nvme keep-alive async request queuing\noperation. This race could lead to the kernel crash shown below:\n\nCall Trace:\n autoremove_wake_function+0x0/0xbc (unreliable)\n __blk_mq_sched_dispatch_requests+0x114/0x24c\n blk_mq_sched_dispatch_requests+0x44/0x84\n blk_mq_run_hw_queue+0x140/0x220\n nvme_keep_alive_work+0xc8/0x19c [nvme_core]\n process_one_work+0x200/0x4e0\n worker_thread+0x340/0x504\n kthread+0x138/0x140\n start_kernel_thread+0x14/0x18\n\nWhile shutting down fabric controller, if nvme keep-alive request sneaks\nin then it would be flushed off. The nvme_keep_alive_end_io function is\nthen invoked to handle the end of the keep-alive operation which\ndecrements the admin->q_usage_counter and assuming this is the last/only\nrequest in the admin queue then the admin->q_usage_counter becomes zero.\nIf that happens then blk-mq destroy queue operation (blk_mq_destroy_\nqueue()) which could be potentially running simultaneously on another\ncpu (as this is the controller shutdown code path) would forward\nprogress and deletes the admin queue. So, now from this point onward\nwe are not supposed to access the admin queue resources. However the\nissue here's that the nvme keep-alive thread running hw/hctx queue\ndispatch operation hasn't yet finished its work and so it could still\npotentially access the admin queue resource while the admin queue had\nbeen already deleted and that causes the above crash.\n\nThis fix helps avoid the observed crash by implementing keep-alive as a\nsynchronous operation so that we decrement admin->q_usage_counter only\nafter keep-alive command finished its execution and returns the command\nstatus back up to its caller (blk_execute_rq()). This would ensure that\nfabric shutdown code path doesn't destroy the fabric admin queue until\nkeep-alive request finished execution and also keep-alive thread is not\nrunning hw/hctx queue dispatch operation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/1a1bcca5c9efd2c72c8d2fcbadf2d673cceb2ea7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/afa229465399f89d3af9d72ced865144c9748846", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ccc1d82dfaad0ad27d21139da22e57add73d2a5e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d06923670b5a5f609603d4a9fee4dec02d38de9c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53333.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53333.json new file mode 100644 index 00000000000..534764d3f44 --- /dev/null +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53333.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-53333", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-21T18:15:13.587", + "lastModified": "2024-11-25T22:15:18.437", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK EX200 v4.0.3c.7646_B20201211 was found to contain a command insertion vulnerability in the setUssd function. This vulnerability allows an attacker to execute arbitrary commands via the \"ussd\" parameter." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK EX200 v4.0.3c.7646_B20201211 conten\u00eda una vulnerabilidad de inserci\u00f3n de comandos en la funci\u00f3n setUssd. Esta vulnerabilidad permite a un atacante ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro \"ussd\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/luckysmallbird/Totolink-EX200-Vulnerability-1/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53554.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53554.json new file mode 100644 index 00000000000..3b02e005f5e --- /dev/null +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53554.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-53554", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-25T22:15:18.977", + "lastModified": "2024-11-25T22:15:18.977", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Client-Side Template Injection (CSTI) vulnerability in the component /project/new/scrum of Taiga v 8.6.1 allows remote attackers to execute arbitrary code by injecting a malicious payload within the new project details." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1v2MLZn4Ro9TCpw-KtksUACYFIzsbuTkL/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.githubusercontent.com/Tommywarren/5ed67ab173ed60faeb791215d68e3fac/raw/352cb4259c0d41d70a206d108b5578c15824b2ff/CVE-2024-53554", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53556.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53556.json new file mode 100644 index 00000000000..e98306f6ab9 --- /dev/null +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53556.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-53556", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-25T21:15:21.693", + "lastModified": "2024-11-25T21:15:21.693", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Open Redirect vulnerability in Taiga v6.8.1 allows attackers to redirect users to arbitrary websites via appending a crafted link to /login?next= in the login page URL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1CIr8oHSF4JaqOn51wIhyZyvsCtlX0Q_e/view?usp=drive_link", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.githubusercontent.com/Tommywarren/b42479a048aa8ef11a63a76d14403443/raw/e24c1003accf8daf2e840b7c67d2f0ab30bdd3e6/CVE-2024-53556", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53597.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53597.json new file mode 100644 index 00000000000..067672b33a9 --- /dev/null +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53597.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-53597", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-25T22:15:19.340", + "lastModified": "2024-11-25T22:15:19.340", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "masterstack_imgcap v0.0.1 was discovered to contain a SQL injection vulnerability via the endpoint /submit." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://masterstackimgcap.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/NoPurposeInLife/vulnerability_research/tree/main/CVE-2024-53597", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53599.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53599.json index 74a5ceb9acf..bd86f5c4e95 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53599.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53599.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53599", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-25T19:15:11.957", - "lastModified": "2024-11-25T19:15:11.957", + "lastModified": "2024-11-25T21:15:21.993", "vulnStatus": "Received", "descriptions": [ { @@ -10,7 +10,42 @@ "value": "A cross-site scripting (XSS) vulnerability in the /scroll.php endpoint of LafeLabs Chaos v0.0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/NoPurposeInLife/vulnerability_research/tree/main/CVE-2024-53599", diff --git a/README.md b/README.md index fb0abc29a57..a01907217b1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-25T21:04:53.213664+00:00 +2024-11-25T23:00:37.638944+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-25T21:03:09.620000+00:00 +2024-11-25T22:15:19.340000+00:00 ``` ### Last Data Feed Release @@ -33,61 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -271271 +271284 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `13` -- [CVE-2017-9711](CVE-2017/CVE-2017-97xx/CVE-2017-9711.json) (`2024-11-22T10:15:03.387`) -- [CVE-2021-30299](CVE-2021/CVE-2021-302xx/CVE-2021-30299.json) (`2024-11-22T10:15:04.703`) -- [CVE-2024-32468](CVE-2024/CVE-2024-324xx/CVE-2024-32468.json) (`2024-11-25T19:15:09.510`) -- [CVE-2024-45755](CVE-2024/CVE-2024-457xx/CVE-2024-45755.json) (`2024-11-25T17:15:12.293`) -- [CVE-2024-45756](CVE-2024/CVE-2024-457xx/CVE-2024-45756.json) (`2024-11-25T18:15:12.907`) -- [CVE-2024-51723](CVE-2024/CVE-2024-517xx/CVE-2024-51723.json) (`2024-11-25T19:15:11.050`) -- [CVE-2024-52529](CVE-2024/CVE-2024-525xx/CVE-2024-52529.json) (`2024-11-25T19:15:11.373`) -- [CVE-2024-52787](CVE-2024/CVE-2024-527xx/CVE-2024-52787.json) (`2024-11-25T18:15:13.597`) -- [CVE-2024-52811](CVE-2024/CVE-2024-528xx/CVE-2024-52811.json) (`2024-11-25T19:15:11.567`) -- [CVE-2024-53255](CVE-2024/CVE-2024-532xx/CVE-2024-53255.json) (`2024-11-25T19:15:11.760`) -- [CVE-2024-53258](CVE-2024/CVE-2024-532xx/CVE-2024-53258.json) (`2024-11-25T20:15:10.030`) -- [CVE-2024-53261](CVE-2024/CVE-2024-532xx/CVE-2024-53261.json) (`2024-11-25T20:15:10.217`) -- [CVE-2024-53262](CVE-2024/CVE-2024-532xx/CVE-2024-53262.json) (`2024-11-25T20:15:10.423`) -- [CVE-2024-53268](CVE-2024/CVE-2024-532xx/CVE-2024-53268.json) (`2024-11-25T20:15:10.583`) -- [CVE-2024-53599](CVE-2024/CVE-2024-535xx/CVE-2024-53599.json) (`2024-11-25T19:15:11.957`) -- [CVE-2024-7915](CVE-2024/CVE-2024-79xx/CVE-2024-7915.json) (`2024-11-25T18:15:14.530`) -- [CVE-2024-8272](CVE-2024/CVE-2024-82xx/CVE-2024-8272.json) (`2024-11-25T18:15:14.673`) +- [CVE-2024-50671](CVE-2024/CVE-2024-506xx/CVE-2024-50671.json) (`2024-11-25T21:15:19.040`) +- [CVE-2024-50672](CVE-2024/CVE-2024-506xx/CVE-2024-50672.json) (`2024-11-25T21:15:19.523`) +- [CVE-2024-53096](CVE-2024/CVE-2024-530xx/CVE-2024-53096.json) (`2024-11-25T22:15:15.287`) +- [CVE-2024-53097](CVE-2024/CVE-2024-530xx/CVE-2024-53097.json) (`2024-11-25T22:15:15.763`) +- [CVE-2024-53098](CVE-2024/CVE-2024-530xx/CVE-2024-53098.json) (`2024-11-25T22:15:16.147`) +- [CVE-2024-53099](CVE-2024/CVE-2024-530xx/CVE-2024-53099.json) (`2024-11-25T22:15:16.433`) +- [CVE-2024-53100](CVE-2024/CVE-2024-531xx/CVE-2024-53100.json) (`2024-11-25T22:15:16.763`) +- [CVE-2024-53101](CVE-2024/CVE-2024-531xx/CVE-2024-53101.json) (`2024-11-25T22:15:17.163`) +- [CVE-2024-53102](CVE-2024/CVE-2024-531xx/CVE-2024-53102.json) (`2024-11-25T22:15:17.553`) +- [CVE-2024-53333](CVE-2024/CVE-2024-533xx/CVE-2024-53333.json) (`2024-11-21T18:15:13.587`) +- [CVE-2024-53554](CVE-2024/CVE-2024-535xx/CVE-2024-53554.json) (`2024-11-25T22:15:18.977`) +- [CVE-2024-53556](CVE-2024/CVE-2024-535xx/CVE-2024-53556.json) (`2024-11-25T21:15:21.693`) +- [CVE-2024-53597](CVE-2024/CVE-2024-535xx/CVE-2024-53597.json) (`2024-11-25T22:15:19.340`) ### CVEs modified in the last Commit -Recently modified CVEs: `139` +Recently modified CVEs: `22` -- [CVE-2024-53077](CVE-2024/CVE-2024-530xx/CVE-2024-53077.json) (`2024-11-25T20:41:41.093`) -- [CVE-2024-6811](CVE-2024/CVE-2024-68xx/CVE-2024-6811.json) (`2024-11-25T17:17:22.273`) -- [CVE-2024-6812](CVE-2024/CVE-2024-68xx/CVE-2024-6812.json) (`2024-11-25T17:17:07.970`) -- [CVE-2024-9258](CVE-2024/CVE-2024-92xx/CVE-2024-9258.json) (`2024-11-25T17:15:32.283`) -- [CVE-2024-9259](CVE-2024/CVE-2024-92xx/CVE-2024-9259.json) (`2024-11-25T17:13:49.060`) -- [CVE-2024-9260](CVE-2024/CVE-2024-92xx/CVE-2024-9260.json) (`2024-11-25T17:16:40.663`) -- [CVE-2024-9261](CVE-2024/CVE-2024-92xx/CVE-2024-9261.json) (`2024-11-25T17:17:17.177`) -- [CVE-2024-9671](CVE-2024/CVE-2024-96xx/CVE-2024-9671.json) (`2024-11-25T18:17:11.960`) -- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-25T20:21:59.140`) -- [CVE-2024-9681](CVE-2024/CVE-2024-96xx/CVE-2024-9681.json) (`2024-11-25T19:52:56.417`) -- [CVE-2024-9696](CVE-2024/CVE-2024-96xx/CVE-2024-9696.json) (`2024-11-25T20:42:32.327`) -- [CVE-2024-9700](CVE-2024/CVE-2024-97xx/CVE-2024-9700.json) (`2024-11-25T19:57:41.387`) -- [CVE-2024-9704](CVE-2024/CVE-2024-97xx/CVE-2024-9704.json) (`2024-11-25T19:19:22.113`) -- [CVE-2024-9707](CVE-2024/CVE-2024-97xx/CVE-2024-9707.json) (`2024-11-25T18:50:39.867`) -- [CVE-2024-9708](CVE-2024/CVE-2024-97xx/CVE-2024-9708.json) (`2024-11-25T19:59:31.110`) -- [CVE-2024-9749](CVE-2024/CVE-2024-97xx/CVE-2024-9749.json) (`2024-11-25T18:58:36.077`) -- [CVE-2024-9756](CVE-2024/CVE-2024-97xx/CVE-2024-9756.json) (`2024-11-25T20:49:23.220`) -- [CVE-2024-9772](CVE-2024/CVE-2024-97xx/CVE-2024-9772.json) (`2024-11-25T20:03:01.613`) -- [CVE-2024-9776](CVE-2024/CVE-2024-97xx/CVE-2024-9776.json) (`2024-11-25T18:45:54.377`) -- [CVE-2024-9778](CVE-2024/CVE-2024-97xx/CVE-2024-9778.json) (`2024-11-25T19:20:37.163`) -- [CVE-2024-9781](CVE-2024/CVE-2024-97xx/CVE-2024-9781.json) (`2024-11-25T18:09:33.853`) -- [CVE-2024-9787](CVE-2024/CVE-2024-97xx/CVE-2024-9787.json) (`2024-11-25T17:39:02.310`) -- [CVE-2024-9792](CVE-2024/CVE-2024-97xx/CVE-2024-9792.json) (`2024-11-25T19:02:48.587`) -- [CVE-2024-9798](CVE-2024/CVE-2024-97xx/CVE-2024-9798.json) (`2024-11-25T18:00:47.637`) -- [CVE-2024-9802](CVE-2024/CVE-2024-98xx/CVE-2024-9802.json) (`2024-11-25T17:56:58.937`) +- [CVE-2021-47157](CVE-2021/CVE-2021-471xx/CVE-2021-47157.json) (`2024-11-25T21:15:04.560`) +- [CVE-2023-37822](CVE-2023/CVE-2023-378xx/CVE-2023-37822.json) (`2024-11-25T22:15:06.537`) +- [CVE-2023-43769](CVE-2023/CVE-2023-437xx/CVE-2023-43769.json) (`2024-11-25T22:15:09.587`) +- [CVE-2024-10709](CVE-2024/CVE-2024-107xx/CVE-2024-10709.json) (`2024-11-25T21:15:08.837`) +- [CVE-2024-1712](CVE-2024/CVE-2024-17xx/CVE-2024-1712.json) (`2024-11-25T21:15:12.783`) +- [CVE-2024-28811](CVE-2024/CVE-2024-288xx/CVE-2024-28811.json) (`2024-11-25T21:15:13.650`) +- [CVE-2024-32606](CVE-2024/CVE-2024-326xx/CVE-2024-32606.json) (`2024-11-25T21:15:14.300`) +- [CVE-2024-36589](CVE-2024/CVE-2024-365xx/CVE-2024-36589.json) (`2024-11-25T22:15:11.433`) +- [CVE-2024-39846](CVE-2024/CVE-2024-398xx/CVE-2024-39846.json) (`2024-11-25T21:15:15.117`) +- [CVE-2024-45031](CVE-2024/CVE-2024-450xx/CVE-2024-45031.json) (`2024-11-25T22:15:12.147`) +- [CVE-2024-45894](CVE-2024/CVE-2024-458xx/CVE-2024-45894.json) (`2024-11-25T22:15:12.850`) +- [CVE-2024-48981](CVE-2024/CVE-2024-489xx/CVE-2024-48981.json) (`2024-11-25T22:15:13.517`) +- [CVE-2024-48982](CVE-2024/CVE-2024-489xx/CVE-2024-48982.json) (`2024-11-25T21:15:17.023`) +- [CVE-2024-48983](CVE-2024/CVE-2024-489xx/CVE-2024-48983.json) (`2024-11-25T21:15:17.750`) +- [CVE-2024-48984](CVE-2024/CVE-2024-489xx/CVE-2024-48984.json) (`2024-11-25T22:15:14.253`) +- [CVE-2024-48985](CVE-2024/CVE-2024-489xx/CVE-2024-48985.json) (`2024-11-25T22:15:14.790`) +- [CVE-2024-51073](CVE-2024/CVE-2024-510xx/CVE-2024-51073.json) (`2024-11-25T21:15:19.847`) +- [CVE-2024-51074](CVE-2024/CVE-2024-510xx/CVE-2024-51074.json) (`2024-11-25T21:15:20.390`) +- [CVE-2024-53063](CVE-2024/CVE-2024-530xx/CVE-2024-53063.json) (`2024-11-25T21:08:23.697`) +- [CVE-2024-53064](CVE-2024/CVE-2024-530xx/CVE-2024-53064.json) (`2024-11-25T21:05:52.863`) +- [CVE-2024-53065](CVE-2024/CVE-2024-530xx/CVE-2024-53065.json) (`2024-11-25T21:04:38.343`) +- [CVE-2024-53599](CVE-2024/CVE-2024-535xx/CVE-2024-53599.json) (`2024-11-25T21:15:21.993`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 08ec5430003..87cbd78551f 100644 --- a/_state.csv +++ b/_state.csv @@ -70934,7 +70934,7 @@ CVE-2014-7139,0,0,7f6dfe9137a9a986b5d655fac15fb058bacda4fc4cc5c1baa9b401b022fa1f CVE-2014-7140,0,0,c53419d017c46fad8ed912ed8e480fe6803a48644e411e1686687a30bde5d417,2024-11-21T02:16:24.370000 CVE-2014-7141,0,0,ad54a186f858df850bd59756c764aa3986450ab7168d45ca7edc10716543b701,2024-11-21T02:16:24.517000 CVE-2014-7142,0,0,2ef09ee430e5c5b886e1136af52d5af252c9da63c1648a603a89c92b19b27a6a,2024-11-21T02:16:24.693000 -CVE-2014-7143,0,1,2c5ccdc96d628446ea83911469cbc765c6e585031b2a234c80dc6a685896f094,2024-11-25T18:12:24.673000 +CVE-2014-7143,0,0,2c5ccdc96d628446ea83911469cbc765c6e585031b2a234c80dc6a685896f094,2024-11-25T18:12:24.673000 CVE-2014-7144,0,0,7f82bef635d9cc0252ffcc221b85914a43ed52fc0a51bf034e9c70d98bb58e4e,2024-11-21T02:16:25.030000 CVE-2014-7145,0,0,5ca0668d9d4336811df389abed8dce1a62052b789f655dc50ac4507b0099ccb3,2024-11-21T02:16:25.200000 CVE-2014-7146,0,0,75978059921d8560374196ed7e4200f97dda2c78768b8d67184dc26cc796139a,2024-11-21T02:16:25.370000 @@ -83224,7 +83224,7 @@ CVE-2016-1000107,0,0,dd71b6385b2eb1d733188f19b87037280d6ea62907de253de33ab6321d8 CVE-2016-1000108,0,0,f98d288c233274f9c80e1960d4d3fb07f96afdca8fae18b64baa31c957691d21,2020-08-18T15:05:57.937000 CVE-2016-1000109,0,0,3d0318cfb8893ba07dbedf207448cc9ddf3439762d444459a16a23bbe0a5d662,2020-03-06T18:45:52.123000 CVE-2016-1000110,0,0,f9a85bae09ba738b8e65d6cd2309a67f52c07325920a11ef065637ba1f69c6d1,2023-11-07T02:29:26.210000 -CVE-2016-1000111,0,1,8f9bd4652a7850e14649644d397e7cdde4b186b7e9dcc701472bd3e71d573508,2024-11-25T18:12:24.673000 +CVE-2016-1000111,0,0,8f9bd4652a7850e14649644d397e7cdde4b186b7e9dcc701472bd3e71d573508,2024-11-25T18:12:24.673000 CVE-2016-1000112,0,0,2dd1070967a1489002e07d0dec88ceaeb7fba595f35e04588766798c914d8152,2020-04-29T13:35:09.837000 CVE-2016-1000113,0,0,a9920377376a13be725eda648a1b2a601e477814858fc1ceb4190ed354c3512b,2019-12-19T14:57:56.673000 CVE-2016-1000114,0,0,23e7d6c6cbb971963a44933621ccee4d6ea1f30ddd2323987ef68e4d41318674,2019-12-19T14:57:21.640000 @@ -109503,7 +109503,7 @@ CVE-2017-9706,0,0,176f78f769c5ce1942919829c540d0203fcd6eb2ac25eceeb44e0243d11466 CVE-2017-9708,0,0,52289796798827b5c3d11b2c71bd5dbae8a4655975ab100cfc5cde779c7ff0e7,2024-11-21T03:36:40.897000 CVE-2017-9709,0,0,511879d864da9401b4506954ecc3f0c6cdf812f123fa13220110c60f64c6cc6b,2024-11-21T03:36:41 CVE-2017-9710,0,0,4b1702bfb826595d695fb358774b5771c6741aa539c51d3f2fd078939b1cb6e0,2024-11-21T03:36:41.107000 -CVE-2017-9711,1,1,182c607857dcd09d26126d6f64148e9fb7a13cf374265821741d46b1e335f602,2024-11-25T19:10:02.253000 +CVE-2017-9711,0,0,182c607857dcd09d26126d6f64148e9fb7a13cf374265821741d46b1e335f602,2024-11-25T19:10:02.253000 CVE-2017-9712,0,0,18d93755cd2aa7b7ce05d85b857891baeee992c7b58d32144de70144e97404e1,2024-11-21T03:36:41.213000 CVE-2017-9714,0,0,ba6b7c758b8b9103d27f83f7d8b0cc851921ef0d98d0e96f761f506e7ed03bb5,2024-11-21T03:36:41.313000 CVE-2017-9715,0,0,c24e4e9f2a9aa4043629fa29a514303856ff3ec8e436ef7aa775554bf50c193d,2024-11-21T03:36:41.420000 @@ -130545,7 +130545,7 @@ CVE-2019-12383,0,0,19170dea2dc238f67611d31aa8848218effe35c743ec52c4f57514eec2987 CVE-2019-12384,0,0,019c41ceaee13513b247dda2be288bbc2cd8f987fb89efcf197d1fa499764770,2024-11-21T04:22:43.350000 CVE-2019-12385,0,0,ab6c39aa9388571250bad969f41f816e6e88b9ae3a044e39bb48a7f61286ba00,2024-11-21T04:22:43.613000 CVE-2019-12386,0,0,edcb2827be33ea50c73880e00bb11811e04f162a229c582cf55e6dc0d3d6ff44,2024-11-21T04:22:43.763000 -CVE-2019-12387,0,1,5eab19fc3e2c3865fd003488f2b4cbde57bf7725321c694c7aefcdbb45430a20,2024-11-25T18:12:24.673000 +CVE-2019-12387,0,0,5eab19fc3e2c3865fd003488f2b4cbde57bf7725321c694c7aefcdbb45430a20,2024-11-25T18:12:24.673000 CVE-2019-12388,0,0,b247b107621fc6688d67887316c6313a23eadf6274211632d63d80ffd97d64b0,2024-11-21T04:22:44.097000 CVE-2019-12389,0,0,a47ea76aba6ecf3048704cd1806c5fae8323dc6f69ee8641bfb19d23a9b041ab,2024-11-21T04:22:44.237000 CVE-2019-1239,0,0,16af5201aa3dace6a7da9c63acb67ced6b2ac0b4635fffc282aadc057bef47b0,2024-11-21T04:36:18.667000 @@ -130994,7 +130994,7 @@ CVE-2019-12850,0,0,b2118722ba7515e1908380269271c6cb8d900398b4ac39d3757105bc7f2e2 CVE-2019-12851,0,0,054e3d0f435dbd568490552eccac41222e4b44772f8daeff7a66bcf350fdf4a0,2024-11-21T04:23:43.087000 CVE-2019-12852,0,0,8628062b7925af2b77ac5395c688ecc28a47ae10b1c233a84e1bfd95ac50874e,2024-11-21T04:23:43.240000 CVE-2019-12854,0,0,cb4418780eff6835f782b3b9d06dedd33bab1a274802e95e31434043fffec92b,2024-11-21T04:23:43.380000 -CVE-2019-12855,0,1,765f1c4bdbc5ac22a59fa89392c7ee094f14695029bee3e86038441b87084a6d,2024-11-25T18:12:24.673000 +CVE-2019-12855,0,0,765f1c4bdbc5ac22a59fa89392c7ee094f14695029bee3e86038441b87084a6d,2024-11-25T18:12:24.673000 CVE-2019-1286,0,0,3829b36f4bc2109b4c29fbf9c5666adfc7c7b6bfbeee5e39eb055689c0bbb98a,2024-11-21T04:36:24.177000 CVE-2019-12863,0,0,e79261e5ba07dda02abde75795b3c429c17e0715ec6291761413661d41de5378,2020-08-24T17:37:01.140000 CVE-2019-12864,0,0,ceead207cd9300f3492cf8526962fa5361f57fea124f0ae5f129a613432a5575,2021-07-21T11:39:23.747000 @@ -137922,7 +137922,7 @@ CVE-2019-20918,0,0,f79c1693e6e30492aacfa4150834c3e1fa04f1fcbfb67e00f04b2bbb035f7 CVE-2019-20919,0,0,79a7cdd3e709292de1a5a46c6eea2bb94500f3b61571245396c8b244c025ee5f,2023-11-07T03:09:14.467000 CVE-2019-2092,0,0,3042e54aa1531dd4c8a2de8dbfe9d7ed88393a2737e3556a4c8657a4adb26259,2024-11-21T04:40:12.950000 CVE-2019-20920,0,0,256f6a2077bf59c41eb60f9bad68129a2d3ae0dd1bf9cd731dab8cba687fdbde,2020-10-15T17:35:59.813000 -CVE-2019-20921,0,1,41bf86ccb85740c8d6918b094b8cbe48f3e14ce18e5b2b1edddfee8870d92921,2024-11-25T18:15:06.253000 +CVE-2019-20921,0,0,41bf86ccb85740c8d6918b094b8cbe48f3e14ce18e5b2b1edddfee8870d92921,2024-11-25T18:15:06.253000 CVE-2019-20922,0,0,5b0ac7f7547e92f25e7a7a638c9656b3b66068454e73d322d4da72ef44e384eb,2021-07-21T11:39:23.747000 CVE-2019-20923,0,0,00a06d927eb7495078cf7ae27f9351634d05d64bdc86eb40b6a07cfdc713956f,2024-09-16T17:15:44.540000 CVE-2019-20924,0,0,eb9b100eb2ee8cfcdb3847ea8aba01e6cc64fa8a045fee49718729939192b592,2024-09-16T21:15:33.403000 @@ -145275,8 +145275,8 @@ CVE-2020-10104,0,0,2b1fa557607c13d2950e5d19ac270da392fd92b947d58cf1403f8fcaca3c0 CVE-2020-10105,0,0,23ad6ce33febff7a22260eb89e88a657aefaf985bf6a8017698558086bd15d93,2024-11-21T04:54:49.440000 CVE-2020-10106,0,0,9f2df9450c934138e3773f1d7f595ce7fa097b334907792de8399c11733e18a5,2024-11-21T04:54:49.587000 CVE-2020-10107,0,0,0923b1713c6ea47e3002deb35ec0837d93bcab4003e79083585e5c084471fc19,2024-11-21T04:54:49.733000 -CVE-2020-10108,0,1,d495882d5cc97a5573218785ef1c596d4963625a15c4e7c4c48d171cd27127f6,2024-11-25T18:12:24.673000 -CVE-2020-10109,0,1,e2247288073db6fa4387a09199c49a61180f85667c3a11c4a02d27241f65e31a,2024-11-25T18:12:24.673000 +CVE-2020-10108,0,0,d495882d5cc97a5573218785ef1c596d4963625a15c4e7c4c48d171cd27127f6,2024-11-25T18:12:24.673000 +CVE-2020-10109,0,0,e2247288073db6fa4387a09199c49a61180f85667c3a11c4a02d27241f65e31a,2024-11-25T18:12:24.673000 CVE-2020-1011,0,0,61d59c5e3eb40fa19038be51ab7619a0ae83ceb71d0286cc8f92ea798088c9a3,2024-11-21T05:09:33.220000 CVE-2020-10110,0,0,03b21fa505f8e3805099d2351f579dd29b9a305eb8dcfb8f8ff0aff4eb6916e2,2024-11-21T04:54:50.223000 CVE-2020-10111,0,0,1df395700ccbcac5990d63dc1e6ffabca8c972d957a0a28edb2fe5b04c1dd4c6,2024-11-21T04:54:50.380000 @@ -153293,7 +153293,7 @@ CVE-2020-2214,0,0,64c9ac0856f45533a60895885713e4bc39648b4a97f9010ee613ccf6798ea3 CVE-2020-22148,0,0,4457fe1a192291dc9be25303503e9b6c0506348aa5960c0663e6e2b2e0075f9d,2021-07-29T15:36:04.567000 CVE-2020-2215,0,0,afb566e10136eea1c25eb048d42f987b5fbbfd466981c43c487ee929de3f65ca,2024-11-21T05:24:58.937000 CVE-2020-22150,0,0,b71b3e57d8f34670909e431e94981ea09444316b09ad552d9845e4d2ca2df515,2021-07-29T15:29:58.057000 -CVE-2020-22151,0,1,d9e5411121ffb81e5c51efa6b8dbf7143cb7cf9ce62a07d76aeea3806e04bc71,2024-11-25T19:15:04.760000 +CVE-2020-22151,0,0,d9e5411121ffb81e5c51efa6b8dbf7143cb7cf9ce62a07d76aeea3806e04bc71,2024-11-25T19:15:04.760000 CVE-2020-22152,0,0,54bb12a15b36a137b44b72793ec57d7b0818aeef2f545d35913a4ad88e5ca8ba,2023-07-11T17:23:22.650000 CVE-2020-22153,0,0,76aa9c9f344129f6592e9e891da45aa76bccd55a2177bab6a22b6e68b8e47704,2023-07-11T15:21:49.513000 CVE-2020-22158,0,0,86d283f10cccb10c03b162bee3f4479812db7480a3b03b9623dc251145eb7045,2024-11-21T05:13:07.630000 @@ -170144,7 +170144,7 @@ CVE-2021-24168,0,0,9ffd1d11393e7892f78db2bbcdbbdf91a3fb185fcfbdf7421b2d6645e97b3 CVE-2021-24169,0,0,677a62b1d06271f40840aeab51c5c0422799e65298f12bbbeb4e792f2dcdcb9f,2024-11-20T12:45:36.293000 CVE-2021-2417,0,0,e64e51808263b781ee5f2732a8dd7f73478d6d7a77a36de892782836dc00cab8,2021-07-26T17:32:02.827000 CVE-2021-24170,0,0,e9b9a25144017b8f8b095e0ea80aa86cf42dc21bde9e6f79b6b176f26edb6841,2021-04-09T19:34:59.337000 -CVE-2021-24171,0,1,ad476240b674b0eed6e9fbe3b9ee9b112015d6b5186f36bef8316fc093dd4998,2024-11-25T18:14:49.230000 +CVE-2021-24171,0,0,ad476240b674b0eed6e9fbe3b9ee9b112015d6b5186f36bef8316fc093dd4998,2024-11-25T18:14:49.230000 CVE-2021-24172,0,0,6b9dd41c63cf440dc36c22af7785f33f26ae1681e0ab973e897cb8adcd2a527b,2021-04-09T17:52:12.307000 CVE-2021-24173,0,0,25f1530bc0af3328322549439603b10242134f511bcbe720fd676446abe3f795,2021-04-09T19:18:38.627000 CVE-2021-24174,0,0,37c6e21b7ecd10a5e222e2d17bda809bd5995829c5bb144729146e586260e01e,2021-12-03T18:31:46.167000 @@ -174607,7 +174607,7 @@ CVE-2021-30294,0,0,f3a5de700e0def5b6f90ab74e53a9b700f69a73cd2502a1eeb9ca67fa3be0 CVE-2021-30295,0,0,1fb61e8d3e3e02bee1a6b0027db77e2b96b9881165e0a92908f2e4887413c320,2021-09-15T20:32:16.817000 CVE-2021-30297,0,0,06c1adae88da7d258b236a1ff8fb67f621fa559b7a1392fa73054bedbf25c54a,2021-10-26T18:44:51.597000 CVE-2021-30298,0,0,db31b5e7b2bea74952286765a7b114a21730bebe2d62dc128f467f879e27622e,2022-01-12T15:41:57.967000 -CVE-2021-30299,1,1,2caaf8f092817d36b5ecdee14a0c4518bc8fb7aa81d114a1429c8dc8e1d6e246,2024-11-25T19:11:21.280000 +CVE-2021-30299,0,0,2caaf8f092817d36b5ecdee14a0c4518bc8fb7aa81d114a1429c8dc8e1d6e246,2024-11-25T19:11:21.280000 CVE-2021-30300,0,0,7bd5d447fdab6d400e5cb78b376a570ecc6c0b9b2748c8e6c9709d26548b5f31,2023-04-19T17:10:55.030000 CVE-2021-30301,0,0,4659e015390ee8ab3e9acc4c291cb7354ef329831a579c9dee03dd21d63e80cc,2023-04-19T17:10:55.030000 CVE-2021-30302,0,0,fde65992a90aec1863b5970e59181d73f3a55e92ea951427aeb5327c94e2241a,2021-10-26T18:45:33.893000 @@ -187231,7 +187231,7 @@ CVE-2021-47153,0,0,56cbf1db580541bf210a568c42ec0d8d1585a326c6cb4d7e68f92d9c28512 CVE-2021-47154,0,0,bf01c5a57b84c76af2ae964b238dd0a389f1bbe02106fafbff877dce7353cf4b,2024-11-15T22:35:04.207000 CVE-2021-47155,0,0,6308ec95938d8ffb3e70dc240296486288d07212264c6946580b1860e22fa163,2024-08-29T20:35:04.380000 CVE-2021-47156,0,0,b2f4b6ef5982b832a45226efc32372b1be0aadedffe1e1672fdf4a4a2cbbe76d,2024-03-18T12:38:25.490000 -CVE-2021-47157,0,0,ffa912ab59086aaed72ae16afb96bf4cf5c72c4797b59fc955ea9521c3ad905d,2024-03-18T12:38:25.490000 +CVE-2021-47157,0,1,3753685333541ec3db35783889cc63510753207f2f165f9dc6739bcb06cd2183,2024-11-25T21:15:04.560000 CVE-2021-47158,0,0,ed3553c31f579bd6548b37f699692b3ee0e6203d21cc8234a4da99028a7b3d9e,2024-03-25T13:47:14.087000 CVE-2021-47159,0,0,5927d99dc6ec378e92c8f2e42d5d1210c32d7f3d1c668496b4ba8d6204380782,2024-03-25T13:47:14.087000 CVE-2021-47160,0,0,62362f698cb6b23636b1521d294f437609382d60bbb7ece00da2d9b85fb92cae,2024-03-25T13:47:14.087000 @@ -191243,10 +191243,10 @@ CVE-2022-21708,0,0,5c62598539df16ad1f6eee0ebe7451d6d1dc794bb27b2aab96a99c220774d CVE-2022-2171,0,0,4279be5ecbdbed52e50041f6d2a7b2da72a15e39c67bbee691ba87779b443595,2022-08-05T18:56:45 CVE-2022-21710,0,0,03e31f46eb9f6540a8a8f818bbbe37b8803f7d2ad983fdc82bd7cebbe6cfec7e,2024-11-21T06:45:17.037000 CVE-2022-21711,0,0,1120cacba982ff66b72300ecef7fb5b16a455af77ce87a81b8d5598b17abe89a,2024-11-21T06:45:17.170000 -CVE-2022-21712,0,1,02762a65992bd481b80794138fd1ff894dd29afa9cfe95a54e06c319b4a900e4,2024-11-25T18:12:24.673000 +CVE-2022-21712,0,0,02762a65992bd481b80794138fd1ff894dd29afa9cfe95a54e06c319b4a900e4,2024-11-25T18:12:24.673000 CVE-2022-21713,0,0,27e4760113b92e65e6b8e11d302c79e5bb3f1ef09542b4131d71cb97d634f957,2024-11-21T06:45:17.460000 CVE-2022-21715,0,0,99cca66d0e3eda0ad1f63664be12b39e685c9ae5813cd3149d229a274fbc6764,2024-11-21T06:45:17.603000 -CVE-2022-21716,0,1,2c55a5e4061e886359560617bf366cc6c819a5a2c6be762fa14316870f98a516,2024-11-25T18:12:24.673000 +CVE-2022-21716,0,0,2c55a5e4061e886359560617bf366cc6c819a5a2c6be762fa14316870f98a516,2024-11-25T18:12:24.673000 CVE-2022-21718,0,0,75f60ad800cef0d3dd1f6b6b52cd28ba547c78315d4fc6b264418142319d050f,2024-11-21T06:45:17.913000 CVE-2022-21719,0,0,d5ce130e1e8d0b75fd30fff224ee108ce1359c51d7f881290d6898623d61d01e,2024-11-21T06:45:18.053000 CVE-2022-2172,0,0,b62df461f203fd7c365e41d5b4b1c23a13d126a28ebde164c896fb71fe550500,2022-08-25T02:42:50.340000 @@ -194077,7 +194077,7 @@ CVE-2022-24798,0,0,a3ca0dbcb3c73d9ce512e5bc90602f3908234dae09d801bf6776ef0301db6 CVE-2022-24799,0,0,8e696fb1f9905683f4101a3c5f990ece3df8d445c17f70402f8d9c618aadd03a,2024-11-21T06:51:07.400000 CVE-2022-2480,0,0,9eb58cdfd0edf2eed04dbb67aba8191d634555a5d08031ea6d038684a0c0892c,2023-11-07T03:46:36.773000 CVE-2022-24800,0,0,6d1d498ca0f07e55938e9aed505eedd20329ce0fee84d7f4ca473e8f4046dbb4,2022-07-20T11:40:29.320000 -CVE-2022-24801,0,1,62a658600cd08685e655f78cdb7a65f330e9a6c12b0a274424238eac7dbd9c75,2024-11-25T18:12:24.673000 +CVE-2022-24801,0,0,62a658600cd08685e655f78cdb7a65f330e9a6c12b0a274424238eac7dbd9c75,2024-11-25T18:12:24.673000 CVE-2022-24802,0,0,de2a8e6f7d71cd0e5e84f46230e903fe79cc6edb55a672ca86114905ea3f6f77,2024-11-21T06:51:07.880000 CVE-2022-24803,0,0,de4447eb57f255841ea234e8e23af03af258da23e1302a285555d65486a4e091,2024-11-21T06:51:08.023000 CVE-2022-24804,0,0,51e8907de242c14b5ed6aabd826136f001a10339cc960f516909fd8b61785fed,2024-11-21T06:51:08.150000 @@ -205839,7 +205839,7 @@ CVE-2022-39344,0,0,3ffa27705a93272d5e285c4fe891363dba6684ea3f043c033a0593125be39 CVE-2022-39345,0,0,0c2843b537aac53bbe33932a1359117008bc7e795f22ca1be2a06cd73b58e1ff,2022-10-26T00:54:06.953000 CVE-2022-39346,0,0,16f04ba36a399b7f23c577ae7582533195c4f52e410e4f536aa085506da4e1b0,2023-11-07T03:50:27.250000 CVE-2022-39347,0,0,6e2903841638b0e72d7ea003b33ff1c3b632932dc8e879110e38735116712f8f,2024-01-12T13:15:09.620000 -CVE-2022-39348,0,1,9a836e72da3de58b83cc9130356930f2fa79dc07e8874e46f5815351429355f2,2024-11-25T18:12:24.673000 +CVE-2022-39348,0,0,9a836e72da3de58b83cc9130356930f2fa79dc07e8874e46f5815351429355f2,2024-11-25T18:12:24.673000 CVE-2022-39349,0,0,84c56cc8b81e0945723331d560acc2f0e4191697cfec4df236904f18d4ba4926,2022-10-28T19:25:24.847000 CVE-2022-3935,0,0,01e1a68e751b9a348d7c1c7095a5fe41f2214c2f78ae2628e15fdd80e274c0c7,2023-11-07T03:51:59.260000 CVE-2022-39350,0,0,cf57a6f0de1d056fb3f56144a95e6afda95358fa68fc0a079e54151adfa63c00,2023-11-07T03:50:27.623000 @@ -220090,7 +220090,7 @@ CVE-2023-26277,0,0,95498aef87c5021a1b7e30367bd3bb97878a14ee98abe842b2410786d5f45 CVE-2023-26278,0,0,bbd6fcfc7d7e5c2779044a810f0df62dc3eaa063b4cc469d2ec9a09171bb7bed,2023-06-07T18:12:56.727000 CVE-2023-26279,0,0,57fc86b7d4a1528638516613687d33ccd8293cca63436652accb62c13c411e7d,2023-11-30T04:57:02.920000 CVE-2023-2628,0,0,685fa3b4ad9d590242699f5bfa24f3ff35199bdf1e36b8e87a158d172105c813,2023-11-07T04:12:59.463000 -CVE-2023-26280,0,1,3164d429faa890c4d80312be2c09943bd2591ee37576877bd544627eb72eec78,2024-11-25T19:15:06.987000 +CVE-2023-26280,0,0,3164d429faa890c4d80312be2c09943bd2591ee37576877bd544627eb72eec78,2024-11-25T19:15:06.987000 CVE-2023-26281,0,0,49c4a0509c6b8aa5933927528e8998034faff7b114a65ecfeac6c0da5d0c2f4d,2023-11-07T04:09:33.057000 CVE-2023-26282,0,0,872397b1a416ff1fce13ab136c1efd273022907b2617d95653478f6389617bd4,2024-03-06T15:18:08.093000 CVE-2023-26283,0,0,e2064453ef2858146e69fe81df96344f4104450fa7f97beea6cf1e61b0996cc2,2023-11-07T04:09:33.137000 @@ -221851,7 +221851,7 @@ CVE-2023-28458,0,0,ef73a1fa781dc427433a4344f064cf2c5d295719475229911a534302acd48 CVE-2023-28459,0,0,ff6d9b0d2a61636a2216f5ca3eebb22b60bf4cdf2177e93c8efd3097129af8b8,2023-05-04T12:38:31.430000 CVE-2023-2846,0,0,9aab683976373505e029cb617089a2ec5cce34a049b1b52d471de12eae663bf2,2023-07-10T18:51:01.550000 CVE-2023-28460,0,0,946c7b43c3c7b583cdd2cc158d5075c41f481cca09d32fe7ede01d078026a4ac,2023-03-24T14:57:49.207000 -CVE-2023-28461,0,1,e402f85a274dee9d063e2a4d88bdec0f1c116dcec347d147b7095e8e4f1c0e91,2024-11-25T18:15:09.090000 +CVE-2023-28461,0,0,e402f85a274dee9d063e2a4d88bdec0f1c116dcec347d147b7095e8e4f1c0e91,2024-11-25T18:15:09.090000 CVE-2023-28462,0,0,2e19120130c69bbcf347fab95b0e8c139f8b88e9e8bf09f2cd8f0d3aa1bc78bf,2023-04-07T17:19:22.730000 CVE-2023-28464,0,0,cb3ff9a13e0f593237f005a371ce64a52ab72b86a221c83df504e264520ebe96,2023-12-22T21:04:49.027000 CVE-2023-28465,0,0,06c8e63c2eb4a5851617744052850dfe59bf346dbe17e85c1e39e4479aeba7f3,2023-12-15T16:35:16.623000 @@ -228842,7 +228842,7 @@ CVE-2023-3781,0,0,de223095b5640bb80ec6a860227a648539e83fbab26d9846367892357c5900 CVE-2023-37810,0,0,0a875c94ff411e8048d52a2836b483c297b1d96f9dd1665554f4e1c2688af156,2023-11-07T04:17:07.757000 CVE-2023-37811,0,0,6b91d97ab0606f2517f2c9379dfa3d23ccf09cd6269504f98278ec72bb3d5c8c,2023-11-07T04:17:07.790000 CVE-2023-3782,0,0,2695b83fd02c6f700b03c27b710c853c5a14e90e0e0062d57122bca01fb76baf,2023-08-02T18:31:47.947000 -CVE-2023-37822,0,0,5a026609b10936ca6911c7bb43cac19859e9a4def984486197e63a6831b4a639,2024-10-29T14:47:05.997000 +CVE-2023-37822,0,1,93db97372740f28b2d1d312b352e0a3c783b45f1150d40856622fc4c6d53b7b0,2024-11-25T22:15:06.537000 CVE-2023-37824,0,0,67a1a0cd59a7f9d8d253762869647c68969ae7b19d7a8cc945ab595d6122a4fa,2023-10-28T03:47:39.197000 CVE-2023-37826,0,0,d47577469ae104e7a65a3d5dc49db2bb73b8c88342393d1572c2e0caa1fbdd79,2023-09-07T13:04:10.693000 CVE-2023-37827,0,0,3da8fd77a63742c2db490aa6c50c9a119b2ed1fc587338155f117da39a85ff4d,2023-09-07T13:03:44.377000 @@ -233424,7 +233424,7 @@ CVE-2023-43765,0,0,70a5591427de6ddb2b0c05d9b262d5513d4ac75d65503cb95c39e68ab5de9 CVE-2023-43766,0,0,c6a88587a2a8ee8cde523a53dcacc6d0ba77e01352696079cdce368cede349b6,2024-09-25T14:35:03.310000 CVE-2023-43767,0,0,b347065f41a38bb3b988ca8b34fc42840783a6b7af72cc203506ace26949c90e,2024-09-25T14:35:04.100000 CVE-2023-43768,0,0,8c20823b844f3a9e03681ad3a89abbeac68d3ffbdb0715685e9ab48bbbd54ca4,2024-08-05T15:35:06.983000 -CVE-2023-43769,0,0,c9ac3b45a6e5a8e8f9bade6fa502768ac8c514f0d2ca4cf91d7c69f448e9810a,2024-02-29T13:49:47.277000 +CVE-2023-43769,0,1,d1291ced90d2805df70b626435da6bd41e8d2059a1b9c6f1729a06f74cb5e999,2024-11-25T22:15:09.587000 CVE-2023-43770,0,0,f29dc8bdb9d7b048af488c931e5105cc1ca7a11e56981fca4cbc06661f550bcc,2024-08-14T15:27:53.727000 CVE-2023-43771,0,0,7b7f7a0ad77d34fc80db30287d764899533486e83b2f5086f4c24424762be94a,2023-09-26T13:09:31.350000 CVE-2023-43775,0,0,dbd5f9b099682ddcb8bc595834b106cea07017d25bfa798ac2b2c218f616e3a8,2023-10-02T18:32:56.620000 @@ -234969,7 +234969,7 @@ CVE-2023-46133,0,0,8eab00c940c8d8f91bb04e0e3d644cca8c162bc5560e1251c86a91dccb270 CVE-2023-46134,0,0,1473b3f4b43e1cb40c6c6fcf572d05be0d47658c0168cd594280258ab9a99376,2023-11-06T17:14:17.363000 CVE-2023-46135,0,0,cf644fdffbf7fd42a5ce8c104ef691cf7d35f83af10f0829da97a09b42742ee9,2023-11-01T16:24:12.157000 CVE-2023-46136,0,0,05dd009850075425a23ca2a764d374b30ccce85acf9aedaa51c6b7e2710e9355,2024-01-10T18:58:41.083000 -CVE-2023-46137,0,1,623ad045ad288c7133e2906412f01e528e15d035000abee5c3271bf767957b86,2024-11-25T18:12:24.673000 +CVE-2023-46137,0,0,623ad045ad288c7133e2906412f01e528e15d035000abee5c3271bf767957b86,2024-11-25T18:12:24.673000 CVE-2023-46138,0,0,4d3f15cddc1d92adc33ebd3059b325f6faf7d73ac1a66ce21c0c54319ffc20cb,2023-11-08T18:41:09.540000 CVE-2023-46139,0,0,5547eb2c37a73a3ca31f786582083b2c6ed88acecee3ff38ffba943beeeec072,2023-11-14T19:59:07.563000 CVE-2023-4614,0,0,48582db52caa833023c22becbfe97b66601953ec6bd1ee30a7b5e9ca1820d112,2023-09-08T14:14:50.043000 @@ -240915,7 +240915,7 @@ CVE-2023-6359,0,0,dc4b31625771af30b850afd13facd80e96ad5b76727dda84977b54cd8dc4af CVE-2023-6360,0,0,7ebf7a0996aa604ca0e37b1bb629610295b5e95328fe4cc64d0814601832e864,2023-12-06T00:38:20.297000 CVE-2023-6361,0,0,ee900d0ce76697bb59e695ff10ea4bef0771a3dfdb43509bf5623d1c20a8d15c,2024-10-07T17:47:48.410000 CVE-2023-6362,0,0,952f92f7ee9c9218f22bb36f646b048cbe71b70d0278457c0315e26fc4a1ce45,2024-10-07T17:47:48.410000 -CVE-2023-6363,0,1,a6c18d3b9afe7b3f7d116f76d4914f3743eae5a84abb306714d2496a7122cec3,2024-11-25T18:15:09.670000 +CVE-2023-6363,0,0,a6c18d3b9afe7b3f7d116f76d4914f3743eae5a84abb306714d2496a7122cec3,2024-11-25T18:15:09.670000 CVE-2023-6364,0,0,fba4607731a6fbc78b4193d2d92ff3c3c10642250022df3b4c2b27e59e7cabbd,2023-12-19T15:25:57.190000 CVE-2023-6365,0,0,adfc971ce1542cf6b6b567819af477b3d1939f8ac3b728778258d524fc18b9de,2023-12-19T16:52:31.667000 CVE-2023-6366,0,0,a90661065572d79c101158308fe089b72abce2e5997d868a6480cd1c64aa03fa,2023-12-19T17:30:45.493000 @@ -241478,7 +241478,7 @@ CVE-2023-7009,0,0,5ad483dc163b1d2a4bd5b4eb8d25614aa3b39d41eb8c4920232403e1e86251 CVE-2023-7010,0,0,cd158f29b2c7149d1830cd2f20f16ce1ea838d74d4dcc2619187c2c912c36474,2024-08-01T13:45:49.523000 CVE-2023-7011,0,0,5479a1bc0d015e17b6f3ef6f0339f44a1c082d026b873ec2affbb8aad427236c,2024-08-01T13:45:50.333000 CVE-2023-7012,0,0,620dc45a3ed63b83dcd1d3f918e32b2704bfbaa7d6dfdf613d6128a81864b9c7,2024-08-01T13:45:51.243000 -CVE-2023-7013,0,1,cd353cc73654c1b2a1b2f3ab9a4dd719f99d86adb7d8482fb0762ff23e278009,2024-11-25T19:15:07.563000 +CVE-2023-7013,0,0,cd353cc73654c1b2a1b2f3ab9a4dd719f99d86adb7d8482fb0762ff23e278009,2024-11-25T19:15:07.563000 CVE-2023-7014,0,0,343f60c0c60318ab32b52871ee4d7ec4b33f7cbb001a30f4e8bb917247b8186a,2024-02-15T15:07:55.347000 CVE-2023-7015,0,0,f6191da82f2fc008d6b0296c01ac7c77ae2915d456ba40916209a6adb4acf55a,2024-03-13T18:16:18.563000 CVE-2023-7016,0,0,010884b21a27fa66d833a70681dd186e397f473cbb0b90536483fba7b0d7269d,2024-02-27T14:19:41.650000 @@ -242022,7 +242022,7 @@ CVE-2024-0349,0,0,5ad42f87085218dc69b719df6bb8c9aa4bf523c9a56885daed74fd4a46dfb5 CVE-2024-0350,0,0,e941d42704ea168f3f59beaf15668c410c64d49a2494756f98a59fca67299c76,2024-05-17T02:34:32.873000 CVE-2024-0351,0,0,d104c12df7b89d4c7d488d384fbb0a0a907266e7569db6394c92ffe8d819068d,2024-05-17T02:34:32.980000 CVE-2024-0352,0,0,4882bb5b2fa2813503cc036295b2c15823acceeca7985705376c72ec6e1c8446,2024-05-17T02:34:33.087000 -CVE-2024-0353,0,1,b599cee2b0e1a7fd240b33cfe43b9f49961e1f1dd6a705ea1f9d96566785c852,2024-11-25T19:15:07.917000 +CVE-2024-0353,0,0,b599cee2b0e1a7fd240b33cfe43b9f49961e1f1dd6a705ea1f9d96566785c852,2024-11-25T19:15:07.917000 CVE-2024-0354,0,0,ee2e8514780493c5819cb099b8228abc0e638bffe2ce19679804183f1c4abdf4,2024-05-17T02:34:33.227000 CVE-2024-0355,0,0,505fc07339341eb8f914496ed3c42b022080be5246603f018635a48e4c42fabd,2024-05-17T02:34:33.343000 CVE-2024-0356,0,0,979ae09907d25daa228895b349c1ac7b6fc1f46c6d6f00d9301185df033cf7b5,2024-05-17T02:34:33.457000 @@ -243130,9 +243130,9 @@ CVE-2024-1070,0,0,945eeccf4f5ba232f5b58cbe0a0fb277520149997c332f988c0ef3d652aa0c CVE-2024-10700,0,0,31233b8d64f3c9c8e4fb3c67b64a1725548271e95821d774cfaec82689cc694a,2024-11-05T20:15:39.427000 CVE-2024-10701,0,0,53baafb789e17d3adca0638e17c429a583b20f9faed929ac230c13977cad3370,2024-11-05T16:52:44.937000 CVE-2024-10702,0,0,1494650cf24141bf55e997b208eb307166b880baeab6c7ba81f17c35396d74f0,2024-11-05T16:52:11.193000 -CVE-2024-10709,0,0,286b64da464730ec634efc1bdcfc8b5f10df2b34328ca06f5e437d144cce4ace,2024-11-25T06:15:04.573000 +CVE-2024-10709,0,1,8495777014ebdd1f62f037e2e2ca6d83df0925466fbc2abfccb8e053fc8a7cf4,2024-11-25T21:15:08.837000 CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000 -CVE-2024-10710,0,1,5e7c2f6f8d036436e8970bbc3c9b61158d8fb2052d5ec036090fdb11e7558d66,2024-11-25T17:15:11.747000 +CVE-2024-10710,0,0,5e7c2f6f8d036436e8970bbc3c9b61158d8fb2052d5ec036090fdb11e7558d66,2024-11-25T17:15:11.747000 CVE-2024-10711,0,0,667b67eedaf55d76b13f0d67159b73016c214e768164f9d0df569a4659871c82,2024-11-07T17:04:37.663000 CVE-2024-10715,0,0,a0586864202123c788b39c9152d7bb58a990061badde7177b34380925db28d59,2024-11-08T20:25:37.380000 CVE-2024-10717,0,0,15bf585ae057ebcf6ec6298dedd5d0b0b84d2a3f7b0625f84537e2f339a063a0,2024-11-13T17:01:16.850000 @@ -243558,53 +243558,53 @@ CVE-2024-11510,0,0,ffe33a1c531077f4fae7c4b7c7c7d55f315a1583911fdad78c236d3caa10f CVE-2024-11511,0,0,b16a1b757781bfacc24a799d35e8cae90f6541006f0982074557f3f4a6bef1fe,2024-11-22T21:15:09.363000 CVE-2024-11512,0,0,1e98f48385ff14fb1bd53853b7f8286dcb742a90b7274d179b99b48a4b3343a3,2024-11-22T21:15:09.477000 CVE-2024-11513,0,0,2ab575a6bab312db381589e786e3bcf011a932cccd48e9d88c7978a6067fc071,2024-11-22T21:15:09.590000 -CVE-2024-11514,0,1,40e43052b3444c860eef3e3b558fa76c07292f5deab8bca3b61b112665b889c2,2024-11-25T18:57:28.103000 -CVE-2024-11515,0,1,9f620e91147a51ac8d0e9648505744c40db486a9d2b3ba2b9bfaa8ff1b3b9008,2024-11-25T18:57:23.373000 -CVE-2024-11516,0,1,2d45e772cd143aa841e0911c6324f232dd5316d927191938a3093a22684d4be9,2024-11-25T18:57:19.670000 -CVE-2024-11517,0,1,735a961be52a6bea8052661fc20cfe55e152eebc7eaea944afa707d4bb584ef4,2024-11-25T18:57:16.330000 -CVE-2024-11518,0,1,ce3c2fd500536f595e5a69ed3981df1ad2b903322ac7cb638c260323c1dabdd3,2024-11-25T18:57:12.937000 +CVE-2024-11514,0,0,40e43052b3444c860eef3e3b558fa76c07292f5deab8bca3b61b112665b889c2,2024-11-25T18:57:28.103000 +CVE-2024-11515,0,0,9f620e91147a51ac8d0e9648505744c40db486a9d2b3ba2b9bfaa8ff1b3b9008,2024-11-25T18:57:23.373000 +CVE-2024-11516,0,0,2d45e772cd143aa841e0911c6324f232dd5316d927191938a3093a22684d4be9,2024-11-25T18:57:19.670000 +CVE-2024-11517,0,0,735a961be52a6bea8052661fc20cfe55e152eebc7eaea944afa707d4bb584ef4,2024-11-25T18:57:16.330000 +CVE-2024-11518,0,0,ce3c2fd500536f595e5a69ed3981df1ad2b903322ac7cb638c260323c1dabdd3,2024-11-25T18:57:12.937000 CVE-2024-11519,0,0,f33bf5659185905191e8dab67583a21fc051b1a0a195846a61be5269a8d0db56,2024-11-22T21:15:10.243000 -CVE-2024-11520,0,1,6d11a52c3d48b510631895d705fcd9ee72fad54df07608e0937611ba46065f07,2024-11-25T18:57:06.950000 -CVE-2024-11521,0,1,6c664e429868c249646ae9d3731c6ea172b3102a76d78ecfa41bcdbe4fce5da4,2024-11-25T18:57:04.637000 -CVE-2024-11522,0,1,edcd0c12a353633564f417eece27cdc54a32166837025ac7b77207ce9f47ab3a,2024-11-25T18:57:02.447000 -CVE-2024-11523,0,1,e7ae340871b5ae667fc3a033352cccf647ac36c89d9cb4ae9728d91f93eecb2f,2024-11-25T18:56:56.057000 -CVE-2024-11524,0,1,3ec8cd85143a979fd87471e142d51dcead7e9667445926dce6fbd9a1c1a02134,2024-11-25T18:56:54.067000 -CVE-2024-11525,0,1,8a20d7861b20e92c72d3eca44e792f6d0eecbcdde3254c01f82cb6ffb8efc528,2024-11-25T18:56:51.587000 -CVE-2024-11526,0,1,d1e3f1b5346a87281bbb859058320f1f045d2812f873212734eb58c59430f297,2024-11-25T18:56:47.030000 -CVE-2024-11527,0,1,9e1f6adf96843fbe52b8df2904446d5d05bb5a1831908975bff609731e03d906,2024-11-25T18:56:40.680000 +CVE-2024-11520,0,0,6d11a52c3d48b510631895d705fcd9ee72fad54df07608e0937611ba46065f07,2024-11-25T18:57:06.950000 +CVE-2024-11521,0,0,6c664e429868c249646ae9d3731c6ea172b3102a76d78ecfa41bcdbe4fce5da4,2024-11-25T18:57:04.637000 +CVE-2024-11522,0,0,edcd0c12a353633564f417eece27cdc54a32166837025ac7b77207ce9f47ab3a,2024-11-25T18:57:02.447000 +CVE-2024-11523,0,0,e7ae340871b5ae667fc3a033352cccf647ac36c89d9cb4ae9728d91f93eecb2f,2024-11-25T18:56:56.057000 +CVE-2024-11524,0,0,3ec8cd85143a979fd87471e142d51dcead7e9667445926dce6fbd9a1c1a02134,2024-11-25T18:56:54.067000 +CVE-2024-11525,0,0,8a20d7861b20e92c72d3eca44e792f6d0eecbcdde3254c01f82cb6ffb8efc528,2024-11-25T18:56:51.587000 +CVE-2024-11526,0,0,d1e3f1b5346a87281bbb859058320f1f045d2812f873212734eb58c59430f297,2024-11-25T18:56:47.030000 +CVE-2024-11527,0,0,9e1f6adf96843fbe52b8df2904446d5d05bb5a1831908975bff609731e03d906,2024-11-25T18:56:40.680000 CVE-2024-11528,0,0,082d681920fe8f3d36e26600195c55a68cabec9baca5dfe9fd1da46792a40acb,2024-11-22T21:15:11.250000 -CVE-2024-11529,0,1,a738a75fb061e2285caff81029ff864f37dfb87ffcabbb87d2331f5908c6404f,2024-11-25T18:56:38.437000 +CVE-2024-11529,0,0,a738a75fb061e2285caff81029ff864f37dfb87ffcabbb87d2331f5908c6404f,2024-11-25T18:56:38.437000 CVE-2024-1153,0,0,ef044a07a9d08d9e4b985a54be5b7192d28514cd606cdbcd1ece01d4ab3f4a43,2024-09-16T17:39:45.023000 -CVE-2024-11530,0,1,a9bbadbb9905eee2c30c3d912b1bfa6a78d76a36143757bc18ff2aa9c811097b,2024-11-25T18:56:27.503000 -CVE-2024-11531,0,1,335268a0a7bc12759d8b14cbb90feee62c88c26ad06b3cdcdfc59ff16ca0c0fa,2024-11-25T18:56:20.460000 -CVE-2024-11532,0,1,f300a21a30c6956ab1a0236bafcaaed14022a5db50d8d629de89b5625fbf1d32,2024-11-25T18:49:00.830000 -CVE-2024-11533,0,1,0932c607196745d8100f21175eaaecc6fcf8a7a62626678e9df7dcac729779db,2024-11-25T18:48:20.877000 -CVE-2024-11534,0,1,ec36a9005375843d837ab8b7bb64b28629461c3db168d058869ad19471af69e9,2024-11-25T18:48:13.973000 -CVE-2024-11535,0,1,be3f5ca74810ecf6bd52f299f045fb2bb43ae01de5fc62360ff02ddd0fac90e5,2024-11-25T18:48:00.143000 -CVE-2024-11536,0,1,c818661c111dcbf5cb62ceda40c5fd042fb2df6454c745eb2a5591795cf5b395,2024-11-25T18:47:55.503000 -CVE-2024-11537,0,1,d69e1556886740315e0eb49981387e0459331ef5d6234857bb57b2b7408c7a5b,2024-11-25T18:47:49.387000 -CVE-2024-11538,0,1,c6564ca381de07a0cd900d411058a7631fb6d4334bb2cce596f534ee383077db,2024-11-25T18:47:23.300000 -CVE-2024-11539,0,1,2621dab14251a379e8095ab8e0292134a9b00a99c63162961c3d4bac5e22cf8a,2024-11-25T18:46:33.847000 -CVE-2024-11540,0,1,4b8ba98366951b3769fa5013f1e95712548fa0e1fa72f92a318dc68287c72d08,2024-11-25T18:46:13.237000 -CVE-2024-11541,0,1,aa32ad0310ab9a9743cc3cc834cf6603d8eca85accbcda29b37faa489db3cd0d,2024-11-25T18:46:03.037000 -CVE-2024-11542,0,1,6046e3b7670b1230551d7d10ef18a4259031a77da7b073dc667815d76e9ce900,2024-11-25T18:45:57.473000 -CVE-2024-11543,0,1,25016e376b36b98e637189d079b68a269a6f7bcc7618a3bf62d44a4c37203030,2024-11-25T18:44:09.843000 -CVE-2024-11544,0,1,29a863d49171bb829af8134a95ff026bf795a6a78d54bb8c17ef490a0b78163a,2024-11-25T18:44:03.563000 -CVE-2024-11545,0,1,d9b0e0d6708201d7e57d9a04876174fa7e831a2df992192bb378dad027e5b6b5,2024-11-25T18:43:57.310000 -CVE-2024-11546,0,1,7b2d7a4a065d4abbe56df127d586036c4f118ea1405186e5af15743e17075c4e,2024-11-25T18:43:36.980000 -CVE-2024-11547,0,1,b5bf492a1dc38b9024c1e3fa8249dd3e2a306495b4c98984c8ca9187be10d44a,2024-11-25T18:43:31.837000 -CVE-2024-11548,0,1,8a6f6d90333cf9d11f738f5dd947dd0daf9fbbaadb9242e6202dc9733bf9c1fb,2024-11-25T18:43:25.887000 -CVE-2024-11549,0,1,86c54cdcd41d3223cfe33bec8f3db32e7220b693cbe1be131634d868831662b5,2024-11-25T18:43:19.760000 +CVE-2024-11530,0,0,a9bbadbb9905eee2c30c3d912b1bfa6a78d76a36143757bc18ff2aa9c811097b,2024-11-25T18:56:27.503000 +CVE-2024-11531,0,0,335268a0a7bc12759d8b14cbb90feee62c88c26ad06b3cdcdfc59ff16ca0c0fa,2024-11-25T18:56:20.460000 +CVE-2024-11532,0,0,f300a21a30c6956ab1a0236bafcaaed14022a5db50d8d629de89b5625fbf1d32,2024-11-25T18:49:00.830000 +CVE-2024-11533,0,0,0932c607196745d8100f21175eaaecc6fcf8a7a62626678e9df7dcac729779db,2024-11-25T18:48:20.877000 +CVE-2024-11534,0,0,ec36a9005375843d837ab8b7bb64b28629461c3db168d058869ad19471af69e9,2024-11-25T18:48:13.973000 +CVE-2024-11535,0,0,be3f5ca74810ecf6bd52f299f045fb2bb43ae01de5fc62360ff02ddd0fac90e5,2024-11-25T18:48:00.143000 +CVE-2024-11536,0,0,c818661c111dcbf5cb62ceda40c5fd042fb2df6454c745eb2a5591795cf5b395,2024-11-25T18:47:55.503000 +CVE-2024-11537,0,0,d69e1556886740315e0eb49981387e0459331ef5d6234857bb57b2b7408c7a5b,2024-11-25T18:47:49.387000 +CVE-2024-11538,0,0,c6564ca381de07a0cd900d411058a7631fb6d4334bb2cce596f534ee383077db,2024-11-25T18:47:23.300000 +CVE-2024-11539,0,0,2621dab14251a379e8095ab8e0292134a9b00a99c63162961c3d4bac5e22cf8a,2024-11-25T18:46:33.847000 +CVE-2024-11540,0,0,4b8ba98366951b3769fa5013f1e95712548fa0e1fa72f92a318dc68287c72d08,2024-11-25T18:46:13.237000 +CVE-2024-11541,0,0,aa32ad0310ab9a9743cc3cc834cf6603d8eca85accbcda29b37faa489db3cd0d,2024-11-25T18:46:03.037000 +CVE-2024-11542,0,0,6046e3b7670b1230551d7d10ef18a4259031a77da7b073dc667815d76e9ce900,2024-11-25T18:45:57.473000 +CVE-2024-11543,0,0,25016e376b36b98e637189d079b68a269a6f7bcc7618a3bf62d44a4c37203030,2024-11-25T18:44:09.843000 +CVE-2024-11544,0,0,29a863d49171bb829af8134a95ff026bf795a6a78d54bb8c17ef490a0b78163a,2024-11-25T18:44:03.563000 +CVE-2024-11545,0,0,d9b0e0d6708201d7e57d9a04876174fa7e831a2df992192bb378dad027e5b6b5,2024-11-25T18:43:57.310000 +CVE-2024-11546,0,0,7b2d7a4a065d4abbe56df127d586036c4f118ea1405186e5af15743e17075c4e,2024-11-25T18:43:36.980000 +CVE-2024-11547,0,0,b5bf492a1dc38b9024c1e3fa8249dd3e2a306495b4c98984c8ca9187be10d44a,2024-11-25T18:43:31.837000 +CVE-2024-11548,0,0,8a6f6d90333cf9d11f738f5dd947dd0daf9fbbaadb9242e6202dc9733bf9c1fb,2024-11-25T18:43:25.887000 +CVE-2024-11549,0,0,86c54cdcd41d3223cfe33bec8f3db32e7220b693cbe1be131634d868831662b5,2024-11-25T18:43:19.760000 CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000 -CVE-2024-11550,0,1,fe1826370f7893faa85eb99da773206dc836ba25ba7484ed106c77885135b86e,2024-11-25T18:43:04.463000 -CVE-2024-11551,0,1,772be78f224892d3d6ab8e748ea9163af61a882954195584c0924c2908191081,2024-11-25T18:42:58.463000 -CVE-2024-11552,0,1,d1abf19740f946db347f4ad77698a656aa1b30ebee2431c2037fd3eb51dbb281,2024-11-25T18:42:53.387000 -CVE-2024-11553,0,1,0773ee2578c71be52bd75e9bf46aa9e6389cba0a38aad318f181f338452d6e21,2024-11-25T18:46:34.697000 -CVE-2024-11554,0,1,d7df9a39faa3ecba7b8ce8a37d662a70ebaf88c7cac4c7537e019f9ac76ce968,2024-11-25T18:41:46.223000 -CVE-2024-11555,0,1,3cf2c7177d53f6b2ab1e7f3fbab64983d135fc5614d8005be772569f43b88ee3,2024-11-25T18:41:43.713000 -CVE-2024-11556,0,1,fde18f12404fc5a51e49bd804749a276e1e26e019cb0c2a05b0ffed0ec803c76,2024-11-25T18:16:55.420000 -CVE-2024-11557,0,1,b7bfad0bc64d77fd58f867e0333ee0e631511f684fb4096ba69ab953fe9c4137,2024-11-25T18:51:46.153000 -CVE-2024-11558,0,1,58bd811cda6b3caaf42f933c2a1ae42cb5d2c1031ecf91a43b8341c0fb620445,2024-11-25T18:52:29.450000 +CVE-2024-11550,0,0,fe1826370f7893faa85eb99da773206dc836ba25ba7484ed106c77885135b86e,2024-11-25T18:43:04.463000 +CVE-2024-11551,0,0,772be78f224892d3d6ab8e748ea9163af61a882954195584c0924c2908191081,2024-11-25T18:42:58.463000 +CVE-2024-11552,0,0,d1abf19740f946db347f4ad77698a656aa1b30ebee2431c2037fd3eb51dbb281,2024-11-25T18:42:53.387000 +CVE-2024-11553,0,0,0773ee2578c71be52bd75e9bf46aa9e6389cba0a38aad318f181f338452d6e21,2024-11-25T18:46:34.697000 +CVE-2024-11554,0,0,d7df9a39faa3ecba7b8ce8a37d662a70ebaf88c7cac4c7537e019f9ac76ce968,2024-11-25T18:41:46.223000 +CVE-2024-11555,0,0,3cf2c7177d53f6b2ab1e7f3fbab64983d135fc5614d8005be772569f43b88ee3,2024-11-25T18:41:43.713000 +CVE-2024-11556,0,0,fde18f12404fc5a51e49bd804749a276e1e26e019cb0c2a05b0ffed0ec803c76,2024-11-25T18:16:55.420000 +CVE-2024-11557,0,0,b7bfad0bc64d77fd58f867e0333ee0e631511f684fb4096ba69ab953fe9c4137,2024-11-25T18:51:46.153000 +CVE-2024-11558,0,0,58bd811cda6b3caaf42f933c2a1ae42cb5d2c1031ecf91a43b8341c0fb620445,2024-11-25T18:52:29.450000 CVE-2024-11559,0,0,f88f34a42d20539ad459d52cde23e11e6d8bd94c0e04f443c3e1915b42ee7a6a,2024-11-22T21:15:14.820000 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 CVE-2024-11560,0,0,6ade25d86e7ec8181d51a69f9fa24990d79fdfaec7c5544f50b99cd079e69334,2024-11-22T21:15:14.933000 @@ -243612,18 +243612,18 @@ CVE-2024-11561,0,0,c5bd43633e9c04768f75ad4244dcf8b9d39d9c3f0174b7dfd809527098e31 CVE-2024-11562,0,0,eae20f9cb2c51c2bd5129ae60942c1b8219eaf7555abb75659f1c3416fdeb86b,2024-11-22T21:15:15.160000 CVE-2024-11563,0,0,bc4314fde344556fd9f5cd68669e467fa2d0210afd07f113db846e1f8ac36782,2024-11-22T21:15:15.263000 CVE-2024-11564,0,0,10cf2657f500e03cff7e87487b901119675023b7a87c7a871120660ca4300b80,2024-11-22T21:15:15.373000 -CVE-2024-11565,0,1,3fc206fd3a94927ea63b05e034284ac0e7d80b5c9f97fd16a6e175f5fb4a1a8c,2024-11-25T18:50:52.400000 +CVE-2024-11565,0,0,3fc206fd3a94927ea63b05e034284ac0e7d80b5c9f97fd16a6e175f5fb4a1a8c,2024-11-25T18:50:52.400000 CVE-2024-11566,0,0,77cd2e7e8f001a18616999fc6ebdd468eac783ae420917fe8828c99b0ba729bf,2024-11-22T21:15:15.597000 CVE-2024-11567,0,0,852f1e38e0be9a1cbb7ee4e4a4675da79fd461f1a1ecd994adc0fa04ce88c2e0,2024-11-22T21:15:15.700000 CVE-2024-11568,0,0,5a65aeea47179f15dc8ed802c9791d1a2fe543ba27acbbbdda2bc05a056110fe,2024-11-22T21:15:15.807000 CVE-2024-11569,0,0,e273dca017ad00bf0ab99d042044998dd039384ddd935adbbbf19b5a66fe1265,2024-11-22T21:15:15.917000 CVE-2024-1157,0,0,b2a4c38395c259edc9de63be3363f457cdfc3ed23febeb4ceb3c18d34f71a1ae,2024-10-09T15:20:50.540000 CVE-2024-11570,0,0,811dc82428ee006b84cb089a49b1423459ffd160c1a6e81b2af866797817128d,2024-11-22T21:15:16.027000 -CVE-2024-11571,0,1,abe038812fba5459969813e524450e614fe0dbfd84990479b5a90d64aa6ab80d,2024-11-25T18:53:28.710000 -CVE-2024-11572,0,1,fc11235ab3b14fd619f1a0b00897d854eedb62bdcac8fe59842ec11dbd195d32,2024-11-25T18:53:24.493000 -CVE-2024-11573,0,1,f2af87e723c612dde047a5fb1fdf0094bdc07d8a61129046507fcf330341f051,2024-11-25T18:53:19.637000 -CVE-2024-11574,0,1,fa1eeb9db93aaa586e420f829f9c771727341786ba9ccdd385b964c8b22b3f66,2024-11-25T18:53:09.717000 -CVE-2024-11575,0,1,7ea843ebc70906dd0895ac9c2e2c9dc7ce788c2f48558c5897189cf0ad8ab30d,2024-11-25T18:52:56.080000 +CVE-2024-11571,0,0,abe038812fba5459969813e524450e614fe0dbfd84990479b5a90d64aa6ab80d,2024-11-25T18:53:28.710000 +CVE-2024-11572,0,0,fc11235ab3b14fd619f1a0b00897d854eedb62bdcac8fe59842ec11dbd195d32,2024-11-25T18:53:24.493000 +CVE-2024-11573,0,0,f2af87e723c612dde047a5fb1fdf0094bdc07d8a61129046507fcf330341f051,2024-11-25T18:53:19.637000 +CVE-2024-11574,0,0,fa1eeb9db93aaa586e420f829f9c771727341786ba9ccdd385b964c8b22b3f66,2024-11-25T18:53:09.717000 +CVE-2024-11575,0,0,7ea843ebc70906dd0895ac9c2e2c9dc7ce788c2f48558c5897189cf0ad8ab30d,2024-11-25T18:52:56.080000 CVE-2024-11576,0,0,15b95ae87585a1e2db96405be719e6c6ae25e35a2737cc5a1ab3adc970f3e296,2024-11-22T21:15:16.693000 CVE-2024-11577,0,0,7f8a108f819c04bb40216c73fd42a224a25249d3a09be28970eee3ab91cd6c59,2024-11-22T21:15:16.810000 CVE-2024-11578,0,0,b778d208c109fc5834408ff1c2b87d2c603b94e3fe9078afbf70f6e133f6fcf4,2024-11-22T21:15:16.920000 @@ -243631,7 +243631,7 @@ CVE-2024-11579,0,0,7fb9e4fe2baff2fb6647b473faf8a6c357600e54b9fec9fbf9a44d6a6097d CVE-2024-1158,0,0,3f0844fda5c657ec14fc878f4ca458f05346302835336ebfa8e7bba85b29f7d9,2024-03-13T18:16:18.563000 CVE-2024-11580,0,0,1533093b10721a5a9d087be9fd055f274a9f73f281e8c826ac88fc7550ab2dad,2024-11-22T21:15:17.133000 CVE-2024-11581,0,0,542160d1be89c3da845f4d24bd4022bd60afa8df929836d85949b351ae8fb0a5,2024-11-22T21:15:17.257000 -CVE-2024-11586,0,1,e5108ab65d70608787de70c3e510f85ce33e95747e983d47cc258456bc62f44e,2024-11-25T18:15:10.123000 +CVE-2024-11586,0,0,e5108ab65d70608787de70c3e510f85ce33e95747e983d47cc258456bc62f44e,2024-11-25T18:15:10.123000 CVE-2024-11587,0,0,da366856f804e85e70745473ffd836e0a1a145660e1cb2bd604db9460e7f0d03,2024-11-22T21:15:27.747000 CVE-2024-11588,0,0,08d454ed1206ff32bb2bf5c765516083d1abb53c857b8252091f3b93bd106bb6,2024-11-22T21:02:06.303000 CVE-2024-11589,0,0,3170acb65b71c8fd2a04ce505dabd6df44667cf95fc2d1e7b9e2886d75ccb49c,2024-11-22T22:02:50.957000 @@ -243673,8 +243673,8 @@ CVE-2024-11665,0,0,432484acd0139af98341fd7fe90b0662197ea5956295af2989047d68fc027 CVE-2024-11666,0,0,2250b20e698d0c0188636489287d2b59448a3bc6ff2a33a1b94eca03d876ba25,2024-11-25T00:15:04.040000 CVE-2024-1167,0,0,ed50fa0852f2fbdcdff47243517d528056863b720fcd10bdada66efed3504e8a,2024-02-09T20:20:51.900000 CVE-2024-11670,0,0,da97a331b546adbf73f2b38147c185b1f7045c13e5878ca1de4e9a941cf83c83,2024-11-25T16:15:12.173000 -CVE-2024-11671,0,1,2615e6d984f10785804bed1195d17e9edea1f659c624af4ab21f00fc47d133cf,2024-11-25T17:15:11.930000 -CVE-2024-11672,0,1,04cbb60e58825873c0969626d23fdfedf7389ea5e4e3e844c45f4fa741c93da1,2024-11-25T17:15:12.110000 +CVE-2024-11671,0,0,2615e6d984f10785804bed1195d17e9edea1f659c624af4ab21f00fc47d133cf,2024-11-25T17:15:11.930000 +CVE-2024-11672,0,0,04cbb60e58825873c0969626d23fdfedf7389ea5e4e3e844c45f4fa741c93da1,2024-11-25T17:15:12.110000 CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000 CVE-2024-1169,0,0,a43d6b50f47e310e039f1575550f9d1fe159a31a77f5a57027ebd3dc489ff540,2024-03-07T13:52:27.110000 CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000 @@ -244183,7 +244183,7 @@ CVE-2024-1708,0,0,6cae7b31a50d93c64bbebf273a2a309a21b231083cfe30784a90ad9d3ac860 CVE-2024-1709,0,0,6f636a1764066e50a2362dd3bb56faeb60042678abd2d24f9d15d8c54d976f4b,2024-02-23T02:00:01.867000 CVE-2024-1710,0,0,5ea5efb2a59606376007023930e7f3f561cf6e8445dd6ab880955b85ea9d3b71,2024-02-26T16:32:25.577000 CVE-2024-1711,0,0,2ab0e48a430a92729cda4d6b278e85c71a891f89bc98846d172c82fe259633f1,2024-03-20T13:00:16.367000 -CVE-2024-1712,0,0,2706cad7a11fec91f38938cc077ef2589480c703025fecbc08338dcd88a6afe0,2024-04-15T13:15:31.997000 +CVE-2024-1712,0,1,fb7f13d2f7bf44bf7cf24f6122c1c73601a46e1b4de110d814764f906e25ddaa,2024-11-25T21:15:12.783000 CVE-2024-1713,0,0,e37c1d591c60ce6420c1a8f513ed83f4365b07beb0b63047a411871aff3ed555,2024-03-15T12:53:06.423000 CVE-2024-1714,0,0,89f5925d48309652312dfa6936852577b82bb527296f4567de0ae860b9af2880,2024-03-07T13:52:27.110000 CVE-2024-1715,0,0,a39c7238a47641a1559a03eccfc580fec09edf9e40fae3465f0a89c38d32e634,2024-08-02T15:16:31.550000 @@ -247435,7 +247435,7 @@ CVE-2024-23783,0,0,ef980d6e659836434833911abb6ccbd0387d322b4628c9c61f1ee37ae942b CVE-2024-23784,0,0,80aa18ae4c60aca1ea03b0124ca5d85ae97f52b7c01fa2c2dd6f4722131fd623,2024-10-17T15:14:57.060000 CVE-2024-23785,0,0,3c4c5ea02bf1a3133e4525a79a6b954407721253c39b3ff8b64ff5c5aaabba5a,2024-10-27T14:35:06.580000 CVE-2024-23786,0,0,6ae4fe60ce393a411ea48b9876215e539a050978e709da57dec7a256f24287a3,2024-10-17T15:16:39.213000 -CVE-2024-23787,0,1,f27d41f0c9d6f87ceb9aba4ee8cbad65615f445b915cfc6d8e3de6ddcba3ca2e,2024-11-25T18:54:34.530000 +CVE-2024-23787,0,0,f27d41f0c9d6f87ceb9aba4ee8cbad65615f445b915cfc6d8e3de6ddcba3ca2e,2024-11-25T18:54:34.530000 CVE-2024-23788,0,0,64abbc30839e8d16e55707492265880e002ac43878f4aa04dd4b122fd59c9c73,2024-08-09T16:35:04.550000 CVE-2024-23789,0,0,ebe69de329ce3066ddae75bf202509726e55e928e26b7120b9a03b158a88c139,2024-08-14T19:35:20.280000 CVE-2024-2379,0,0,bf50084b0f6625e9f2f932a65a78a5f1b45a21762f6b47e6f1c8cee00bfd1e05,2024-11-14T20:35:22.613000 @@ -247728,7 +247728,7 @@ CVE-2024-24246,0,0,66df927313dfb2fe51ec7b1761b0f9876821113027121d655169e20e29fad CVE-2024-2425,0,0,5244503cb81f1535e5c26158f97c8ff5a0be1d108c008e859e8897a136ecd780,2024-03-26T12:55:05.010000 CVE-2024-24254,0,0,aa3e1e0113c1afb51d7c9ea40615c9f0ca117924787150a26ed63a73b49e27db,2024-02-15T18:46:57.737000 CVE-2024-24255,0,0,e76da96580c60a9eda41d1841209285ca4cff39dd4bb1ea645c35657b9851939,2024-02-15T18:46:41.247000 -CVE-2024-24256,0,1,fe20b132f20800628865b416d00a9147f8b1e3bb289d3c951e66e359ebfc807e,2024-11-25T18:15:10.727000 +CVE-2024-24256,0,0,fe20b132f20800628865b416d00a9147f8b1e3bb289d3c951e66e359ebfc807e,2024-11-25T18:15:10.727000 CVE-2024-24257,0,0,be1ad47bd4d795f252422bc7418137262b954311599ce561f29c104d0afa01eb,2024-08-01T13:47:24.290000 CVE-2024-24258,0,0,b6889ab8117d84f2b926a30d9ca7e037f41ed41c51b57e24ece8c5f1f0d35cca,2024-02-21T03:15:09.043000 CVE-2024-24259,0,0,27500963c89a35e88885dfebaf6906d578facbf79a9197c97e367a82d6750a09,2024-02-21T03:15:09.110000 @@ -248917,7 +248917,7 @@ CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa6973308 CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000 CVE-2024-26017,0,0,29b69c6327ca7e9581060ad10131cb64e7089e27b058bc4b558a5897a14d5b73,2024-11-15T14:00:09.720000 CVE-2024-26018,0,0,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000 -CVE-2024-26019,0,1,0df98f7200ad7d46543b2c20a940bc440f5954454399f583c78af8a359e4b12a,2024-11-25T19:15:08.683000 +CVE-2024-26019,0,0,0df98f7200ad7d46543b2c20a940bc440f5954454399f583c78af8a359e4b12a,2024-11-25T19:15:08.683000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 CVE-2024-26020,0,0,72caf6bcbf6e85532315d41141700a256acdb0b9130ff5b3cf9c47d5b4a216d7,2024-09-11T14:53:51.013000 CVE-2024-26022,0,0,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000 @@ -249258,7 +249258,7 @@ CVE-2024-2646,0,0,ee46ce874cc14b8f1b3378e14871fd20ec8fc831984d94fc396d6a2b62dd02 CVE-2024-26461,0,0,0b892c8bcbbbf8814ae786a53ca82ff2dc0971c3ced34bcc3c4cddb340bd0150,2024-08-14T16:35:10.207000 CVE-2024-26462,0,0,26de7b444e254c213d77640f77662b5b241a0427363fa56252d8a7b7165832f1,2024-05-14T15:09:01.053000 CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000 -CVE-2024-26465,0,1,2da9a8da14eb7ad2ae1e44833aaff4b7a90cbaefc41a17a4f9b407a5541f6d80,2024-11-25T19:15:08.960000 +CVE-2024-26465,0,0,2da9a8da14eb7ad2ae1e44833aaff4b7a90cbaefc41a17a4f9b407a5541f6d80,2024-11-25T19:15:08.960000 CVE-2024-26466,0,0,6709258f243577bc1f93e1c54519a7b66e4e3ffda1e209724abca2cbfec5238f,2024-10-30T20:35:12.827000 CVE-2024-26467,0,0,c79919be511844338d780cb29a83d8434b9e819bf896bf804be060a155284c12,2024-10-31T15:35:29.323000 CVE-2024-26468,0,0,888c1400596629f642930ce1dfab915bb89a161094e6e25fcf42a7aafbb78e0f,2024-11-06T15:35:12.710000 @@ -251077,7 +251077,7 @@ CVE-2024-28808,0,0,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e42838965 CVE-2024-28809,0,0,32a8202bed4dd3b9abf5e0e2fc819e903ef58b53b2fb296a3ab4e72cb018ad65,2024-10-04T13:51:25.567000 CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000 CVE-2024-28810,0,0,3739176212869d56c3a3e998caee9cc2562b0d9aff07961502c94d248b44c109,2024-10-04T13:51:25.567000 -CVE-2024-28811,0,0,1a121678723ae76a3ec6f23b0047a6bb1341e5c28eedd18f7304785a080aa64f,2024-10-04T13:51:25.567000 +CVE-2024-28811,0,1,560dad69fc61891deb5a7080fb203df90ee75edb43c8d9280eba7b3ce51843cc,2024-11-25T21:15:13.650000 CVE-2024-28812,0,0,6ce4bb24c8d3ff2ae14d2bb074aff81a0b38547ab36fea452d98f50ad763c76a,2024-10-04T13:51:25.567000 CVE-2024-28813,0,0,a8769f0cee836e0100e740c2b3dc0d0f6a6cc1df5477702a5cd8132b21bf5a79,2024-10-04T13:51:25.567000 CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af9c2,2024-08-01T13:49:20.227000 @@ -251411,7 +251411,7 @@ CVE-2024-29162,0,0,b1942e5218b9199d8b3f133e6f6ae0185975e4e85dad3209f496d8fff4251 CVE-2024-29163,0,0,17ffb72bd5e136d8bfcfddc39b6fc15b69108962b9f846734ed6aeb051a0131d,2024-07-03T01:52:12.290000 CVE-2024-29164,0,0,0241c9be23a80d6ab3dceadfce1b9b19b6d47bdd0ac74b2f2c9ae593533e395b,2024-07-03T01:52:13.070000 CVE-2024-29165,0,0,3c479a3372b122f69415807cf18990c87c6bdd2637a3e4ef28a1d60fed2086fd,2024-07-03T01:52:13.840000 -CVE-2024-29166,0,1,12e2164b1ad3a112107fa72d771285f7dceb7d115ecfc3ccd5d15dac51e15c22,2024-11-25T18:15:10.983000 +CVE-2024-29166,0,0,12e2164b1ad3a112107fa72d771285f7dceb7d115ecfc3ccd5d15dac51e15c22,2024-11-25T18:15:10.983000 CVE-2024-29167,0,0,f6346485e6d8e35e008aa46a11a860f615ad785e3c3267fd5e0337b56e2b8115,2024-08-12T21:35:05.960000 CVE-2024-29168,0,0,4b03610f0e9707b91f6d4ca8302add5e9446f332d0532287451d81854b8e8e49,2024-08-06T15:28:10.527000 CVE-2024-29169,0,0,46ae3e5e128a47a51f9060fa5b406a480b0436c4fa2b267a42e0503161231bfe,2024-07-03T01:52:14.690000 @@ -252042,7 +252042,7 @@ CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 -CVE-2024-30122,0,1,e8c36fe55c23724cada8e0cda590d8e925c511ba8a812570d2aee609eea4a123,2024-11-25T18:15:11.213000 +CVE-2024-30122,0,0,e8c36fe55c23724cada8e0cda590d8e925c511ba8a812570d2aee609eea4a123,2024-11-25T18:15:11.213000 CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000 CVE-2024-30125,0,0,967c3bfd100afb2f9224f4a02a5fadb13adf29c3b227e11d52a6e3184d1fe4c3,2024-11-12T21:35:19.700000 CVE-2024-30126,0,0,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000 @@ -253747,7 +253747,7 @@ CVE-2024-32464,0,0,0d11a546e2c271fc0afdeed2fa69714d9b5f84ca5d7bc429f0de3583c1b4a CVE-2024-32465,0,0,7f7730b7863e1b1ab6f4f0e9ed5951cc2498c0f43612f46412186c2ad9411d67,2024-06-26T10:15:12.280000 CVE-2024-32466,0,0,ec6043800c838c8c522daffd1e449b8d51ad254f8e96898e669970687ad3422d,2024-04-18T18:25:55.267000 CVE-2024-32467,0,0,165728eebf3c65f303f09df477c1b36c8acf80b7d71a76e238a98ecb9526f64c,2024-04-25T17:24:59.967000 -CVE-2024-32468,1,1,ad1763a5d577089bbdd32abc055f6dd956b6d8af680f82127698a6000c3e9448,2024-11-25T19:15:09.510000 +CVE-2024-32468,0,0,ad1763a5d577089bbdd32abc055f6dd956b6d8af680f82127698a6000c3e9448,2024-11-25T19:15:09.510000 CVE-2024-32469,0,0,a9e5def06e4db8472decc90b984fed9339b3fda0e27ed47a28dbd2f3e4aaa483,2024-07-11T13:05:54.930000 CVE-2024-3247,0,0,fcdfb02c88d9b1508cf800ba9d574ce87f33b399da1f96cd338d73277a1cf2a4,2024-04-03T12:38:04.840000 CVE-2024-32470,0,0,d5237f47bf052884f2f87007b27838db2dcb0d619cdf0dc0669aa7e69b9c0051,2024-04-18T18:25:55.267000 @@ -253886,7 +253886,7 @@ CVE-2024-32602,0,0,7b667e8bd01619dd090b34abbe2d5a5ca5499fab883b116c704a5a4dff772 CVE-2024-32603,0,0,4de7c608313e8c947c86b2e20de7cb7fd2c0b988cc80a1cc0f63dd8edfd544af,2024-04-18T13:04:28.900000 CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17ec61,2024-04-18T13:04:28.900000 CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000 -CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000 +CVE-2024-32606,0,1,39e96844cb9934d79707d1a9661b987c03af706f5b8e45d9c93a2dc596f3efb6,2024-11-25T21:15:14.300000 CVE-2024-32607,0,0,eaec99baa1b483eede1020ebb49f7f526b5972105f0e6dfde50c82a8071a8477,2024-11-05T20:35:21.880000 CVE-2024-32608,0,0,5e38d1849a448723ba2f30344e01b97ee6dc59cf93689c7dd7b5b71778a65b36,2024-10-17T16:47:02.247000 CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000 @@ -254696,7 +254696,7 @@ CVE-2024-33663,0,0,e1e5e3bf2bfb6f84f42175dcb29cc9799e837d7e631a8436167d9acbf72c8 CVE-2024-33664,0,0,fa102b47e0b0f78985d310d8b8074ad26f7b0a8f6e346244359d7ca87f4b731d,2024-09-05T16:15:07.570000 CVE-2024-33665,0,0,59e0b75ee124fb21ebe68d182006f79532e937bc2c2e651e38a1d465cbb309a7,2024-10-29T21:35:08.080000 CVE-2024-33666,0,0,8e982c6a0c03f8b5d1cbd58e6d45d8ee40f43b5fb9ebc6cbaefdef7cc6467b9d,2024-07-03T01:58:33.837000 -CVE-2024-33667,0,1,30bdfce3cd6522c6ca207e5f39975912239858b3253d1ad3721e006a7391fe88,2024-11-25T19:15:09.713000 +CVE-2024-33667,0,0,30bdfce3cd6522c6ca207e5f39975912239858b3253d1ad3721e006a7391fe88,2024-11-25T19:15:09.713000 CVE-2024-33668,0,0,1057e9899f3d071fbe9469ff4d64f06b263f71484eb3414fb82aad54f0a342bc,2024-07-03T01:58:34.653000 CVE-2024-33669,0,0,9f9e4923b29b77e4df7ed4bfab7ff189f9617396636ad12f3335720e7b3f148c,2024-07-03T01:58:35.420000 CVE-2024-3367,0,0,3b87f70833bb8ccf4c6d89027b50770ba7c3694c19e37821dd6ef423c5078200,2024-08-26T10:15:05.743000 @@ -254820,7 +254820,7 @@ CVE-2024-33872,0,0,1d431ee562aada863536cfe9f8a510d77a4e7e9b56e0c5a0629ef96f2e0cb CVE-2024-33873,0,0,6ea1274dbe138465702444faa4e98a829d2dcf26c68796f03309e9049cdfe9b0,2024-07-03T01:59:05.293000 CVE-2024-33874,0,0,d26fda7bcde0c687055ecb7e8a711b7b405c2f58134eb500396c86a8ce6f97a1,2024-07-03T01:59:06.100000 CVE-2024-33875,0,0,60ecedb94db7f414fe8b0e42f25ed226800cb87efe94a21898c76155402b05c9,2024-11-05T17:35:12.700000 -CVE-2024-33876,0,1,dc9d7bdb713f4d35767476f7647274f550c5fc8867d80cf80823e576cb9f517c,2024-11-25T18:15:11.537000 +CVE-2024-33876,0,0,dc9d7bdb713f4d35767476f7647274f550c5fc8867d80cf80823e576cb9f517c,2024-11-25T18:15:11.537000 CVE-2024-33877,0,0,b4f1b95444f84dfcef907af7774009cf66d9af779662daf465f9739beafd3f6d,2024-07-03T01:59:06.870000 CVE-2024-33878,0,0,feb8ae1feff70622d1e1a8722fc435816940bd9a5d61c3251757968e032c5925,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,a2e90836d222ca0b4ef7793d35cdf806e54f0108df2e23c18454cd2727a93dd8,2024-08-01T13:52:10.267000 @@ -255339,7 +255339,7 @@ CVE-2024-34529,0,0,d8133b9a4ea4710432fb31a4132ab39e712c33d1c820f137246e054dc4fb1 CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957bbe,2024-07-03T02:00:31.917000 CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682bfc,2024-07-03T02:00:33.137000 CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000 -CVE-2024-34535,0,1,f05f2cbbe3f16c7162e57286b6a67330cb9b43ec2392a7719f06ad041a0ee27b,2024-11-25T18:15:11.763000 +CVE-2024-34535,0,0,f05f2cbbe3f16c7162e57286b6a67330cb9b43ec2392a7719f06ad041a0ee27b,2024-11-25T18:15:11.763000 CVE-2024-34537,0,0,aa8d887b54254363340bc9478cf814aad60caefe8559038d897113fab5bc7ce3,2024-10-31T17:15:12.903000 CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 @@ -255550,7 +255550,7 @@ CVE-2024-34739,0,0,f6e54c0f32331bd01c690dd8be038509007e00bfc399df14c98e74d18ccd5 CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a0d,2024-05-02T13:27:25.103000 CVE-2024-34740,0,0,cd68171e55105c9a184cdc72c371579137a9ca2bcc91416cae3d7556d14ecb22,2024-08-19T13:00:23.117000 CVE-2024-34741,0,0,92c683bbe77a7f293c2037090a232d821770d81c7905215e3ef6319cf6b5adba,2024-08-19T13:00:23.117000 -CVE-2024-34742,0,1,2188fe9a2261d48e70273283bd8cf6330a32142746ba90309fa422806d010009,2024-11-25T18:15:11.980000 +CVE-2024-34742,0,0,2188fe9a2261d48e70273283bd8cf6330a32142746ba90309fa422806d010009,2024-11-25T18:15:11.980000 CVE-2024-34743,0,0,9a08509f1ceb4bbb716866bb59161611c0588d77430a21c15b6c1621568bccf5,2024-08-19T20:35:16.253000 CVE-2024-34747,0,0,54274e9091b3a0011b2ff0803398b57f8823e3a645921a5eb6d9ebe2e1bb8c96,2024-11-15T22:35:09.927000 CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000 @@ -256505,7 +256505,7 @@ CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45cbd,2024-08-01T17:39:33.907000 CVE-2024-36041,0,0,d88899430b8465bd9e7ec84eb791ba971452eec022e6c65dc6ad08436f1e4123,2024-07-09T16:22:37.687000 CVE-2024-36042,0,0,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11ac5e,2024-07-03T02:02:42.150000 -CVE-2024-36043,0,1,e7d2271ad4212bc10f9dc860169ebb186d9278667f67ad96839bebaa1d0c2ca2,2024-11-25T18:15:12.213000 +CVE-2024-36043,0,0,e7d2271ad4212bc10f9dc860169ebb186d9278667f67ad96839bebaa1d0c2ca2,2024-11-25T18:15:12.213000 CVE-2024-36048,0,0,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534fd54,2024-08-08T15:35:13.937000 CVE-2024-36049,0,0,16195e94e554c9cc2e1c5fb6b057cc3b79bc050cdc5b42034b6e0554be23efca,2024-08-26T16:35:09.153000 CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000 @@ -256761,7 +256761,7 @@ CVE-2024-36378,0,0,ca258e9b594af616c42b58f8248851951bbd7b3ba86b1f4eba271688d3b21 CVE-2024-3638,0,0,620fdccfcdbef1110695fe5f4df8efef5a2f6320fb9175c618899b2ed73206f0,2024-07-05T17:14:22.140000 CVE-2024-36383,0,0,2c9cf4016aaf0711836c59164d1d46e4509eac95f6ae137d172050d33955d4ae,2024-11-04T17:35:18.540000 CVE-2024-36384,0,0,ea1f3393e518093680ec693139bc0d228506adc5bd8809766b74b272d1bb08de,2024-11-19T22:35:08.610000 -CVE-2024-36387,0,1,5944204c3b638262c6df5c0299cc2ea33b76830b0d9dfa7f4d3cf2f432d1b535,2024-11-25T18:15:12.440000 +CVE-2024-36387,0,0,5944204c3b638262c6df5c0299cc2ea33b76830b0d9dfa7f4d3cf2f432d1b535,2024-11-25T18:15:12.440000 CVE-2024-36388,0,0,e13152636423c6e93176d03b27ba8c5b0397bbb97d42aaccd55001a4d2861e72,2024-06-03T14:46:24.250000 CVE-2024-36389,0,0,d82860a88b070b35d5db5b5f1ca93be5cc187cf6335f9f77cd891e2c4188c207,2024-06-03T14:46:24.250000 CVE-2024-3639,0,0,3825ec646e59832bb04bcf2ca3ea29324db47c6b5904b78d5f1a541ade617b5c,2024-07-05T17:14:37.093000 @@ -256920,7 +256920,7 @@ CVE-2024-36583,0,0,ddd27123c3646f7a3fa3b735f22a6a85d1a122401d7d1a0d660277bbd83fa CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1aacc,2024-07-03T02:03:22.850000 CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000 CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000 -CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000 +CVE-2024-36589,0,1,10aadfa144ec7172e6332bd9745152ec48c63622b9f5382251a66334e562f1ca,2024-11-25T22:15:11.433000 CVE-2024-3659,0,0,5a8168992dcb44ae220556c46984b0dc6a3af90238dc8473c09bd7c8d4830206,2024-08-12T15:57:06.257000 CVE-2024-36597,0,0,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000 CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000 @@ -257262,7 +257262,7 @@ CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3 CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000 CVE-2024-37123,0,0,328c8b42797a7e1aefb8f62555a88a31230bb1f4b153ee44b8fd5cd675cf7937,2024-11-01T20:24:53.730000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 -CVE-2024-37125,0,1,ad424b9dfeb67e33386545a4a38a37f4774ab71491140a757f27303a2f3a60f8,2024-11-25T18:30:46.117000 +CVE-2024-37125,0,0,ad424b9dfeb67e33386545a4a38a37f4774ab71491140a757f27303a2f3a60f8,2024-11-25T18:30:46.117000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 CVE-2024-37127,0,0,d9e870bed45357108f05b43be573ea51c7d15f5150f07ef26a707da9d896bb8b,2024-08-27T15:23:21.370000 CVE-2024-37129,0,0,1bda6b021f1f7698674c595a8a84e9d380a54f5551f6ad0383f5d9c8c50d327f,2024-08-13T15:26:46.890000 @@ -258203,7 +258203,7 @@ CVE-2024-38301,0,0,0aaba53899fa63c6f65cba4d5faa4104f18194e9cd1a78452f451bbbdb780 CVE-2024-38302,0,0,e77ca3bd1f42a6aa7992c70d7c2a8c98c0238a3f11a590553b92597fb717d1f6,2024-07-19T13:01:44.567000 CVE-2024-38303,0,0,028afe1755065337ff24d15854e1a09f4321a858b56f8ecffef2fc2440540b16,2024-08-29T13:25:27.537000 CVE-2024-38304,0,0,c9c5e31995efec3c1031188bcbced9384b5bd23fcd1002d4307a7715d8d36271,2024-08-29T13:25:27.537000 -CVE-2024-38305,0,1,8b2a25f772813217d648083a791c87824d2ddecf111410c1e83c757aac9fac81,2024-11-25T18:16:27.450000 +CVE-2024-38305,0,0,8b2a25f772813217d648083a791c87824d2ddecf111410c1e83c757aac9fac81,2024-11-25T18:16:27.450000 CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000 CVE-2024-38308,0,0,fe139b0ba6074f0e39f21bcc0d3b2863f88a6047b3a5a779d5f8bedf5488475c,2024-10-07T15:24:34.517000 CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000 @@ -259049,7 +259049,7 @@ CVE-2024-39486,0,0,53993c58f90918b7c97876ffca7dc269893e47fb56c6e517d9e82dcf2f998 CVE-2024-39487,0,0,07f5386c1bdf0075b39a52e9355dbebed54d46b5a78637d307e6a04462c33cf2,2024-08-21T17:18:01.117000 CVE-2024-39488,0,0,23685677cb72fbb43ef99f190181df9d9e8c31ec0d3e18867ab50491586a3910,2024-07-11T13:05:54.930000 CVE-2024-39489,0,0,c63175d29bd941720feca94efc3f3a1164cbdc8d8d5c1251ffb632e82e90379f,2024-07-31T14:50:26.330000 -CVE-2024-39490,0,1,bb2525f8bdea5ea98a8ecd939fb733bc8da41a2d00234fb0e8dec30b7fc35804,2024-11-25T20:15:06.600000 +CVE-2024-39490,0,0,bb2525f8bdea5ea98a8ecd939fb733bc8da41a2d00234fb0e8dec30b7fc35804,2024-11-25T20:15:06.600000 CVE-2024-39491,0,0,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf96f,2024-07-11T13:05:54.930000 CVE-2024-39492,0,0,61700a334a3b229fec417915f64a5a7f087e170c95a01499eeb909ca8b8d8efb,2024-10-30T21:35:04.003000 CVE-2024-39493,0,0,1e9db7e81ec34cee90fac11925a12057887fa787e4909a68e8233bca0ebf86c1,2024-07-31T15:38:54.880000 @@ -259138,7 +259138,7 @@ CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09 CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 CVE-2024-39574,0,0,19f7903aaa2fe3131935c172a6b15d77efbdb8c9899ed2e523d65e46645a7e43,2024-09-16T15:59:10.653000 CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 -CVE-2024-39577,0,1,d04d10a10e5d8b8491ab50484278d3d71eaa9b5c56f3ce3e15aea13d8aa84a66,2024-11-25T18:20:36.807000 +CVE-2024-39577,0,0,d04d10a10e5d8b8491ab50484278d3d71eaa9b5c56f3ce3e15aea13d8aa84a66,2024-11-25T18:20:36.807000 CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000 CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000 CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000 @@ -259354,7 +259354,7 @@ CVE-2024-39841,0,0,ec0a0d17e731c27ffa6a480f532677c1b20305a66cc269c9f9b188cfc3547 CVE-2024-39842,0,0,0f81ced5fb2fba09222ea7329c0ce9357115cbf89786dbdbe94910eba6c0e3c2,2024-09-26T13:32:55.343000 CVE-2024-39843,0,0,07fb5bd6c57036e14e96f28e7ffe3aa2fbace9f1391ddf71fe45caaeaa1c10e1,2024-09-26T13:32:55.343000 CVE-2024-39844,0,0,24513dbab8cf2462c08846394521d45521a891f52f216d702fb8431100a32c1f,2024-07-08T14:18:55.147000 -CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 +CVE-2024-39846,0,1,cf548af7ed861d8284fa5ea02ca8598fff351f08ce3d5f3fe36e0baf2c7e26da,2024-11-25T21:15:15.117000 CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000 CVE-2024-3985,0,0,ceb8b898ec23867d1efcc4d7f7a630f584432f67007c6b07d5fd8199e1841622,2024-05-02T18:00:37.360000 CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000 @@ -259530,12 +259530,12 @@ CVE-2024-40395,0,0,3ba6dbce46079967e0577ccca7056038a218abcb260e702c86d066887bd84 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000 -CVE-2024-40404,0,1,445285f90ab03fa1d6867f5ef77507dac62e682f808907e572ced02db9de2e5f,2024-11-25T20:15:06.890000 -CVE-2024-40405,0,1,480d2782a03dda8ab967dd8fe975a5efa4bf8df1f15583f14708be53b883149c,2024-11-25T20:15:07.150000 -CVE-2024-40407,0,1,c0e80793ff0a6477e7fafff17f097335d7930c7a8a4d58b941b1ea974c664682,2024-11-25T20:15:07.383000 -CVE-2024-40408,0,1,c9cbf7b38776a669b8179ec724976179708b2cd349fa4044903fc0e8b9d501ca,2024-11-25T20:15:07.617000 +CVE-2024-40404,0,0,445285f90ab03fa1d6867f5ef77507dac62e682f808907e572ced02db9de2e5f,2024-11-25T20:15:06.890000 +CVE-2024-40405,0,0,480d2782a03dda8ab967dd8fe975a5efa4bf8df1f15583f14708be53b883149c,2024-11-25T20:15:07.150000 +CVE-2024-40407,0,0,c0e80793ff0a6477e7fafff17f097335d7930c7a8a4d58b941b1ea974c664682,2024-11-25T20:15:07.383000 +CVE-2024-40408,0,0,c9cbf7b38776a669b8179ec724976179708b2cd349fa4044903fc0e8b9d501ca,2024-11-25T20:15:07.617000 CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000 -CVE-2024-40410,0,1,da2ccbf844d4798872a7cb3614d6e1ebb23de5a77ebc7dab2d6e8b6d87973974,2024-11-25T20:15:07.830000 +CVE-2024-40410,0,0,da2ccbf844d4798872a7cb3614d6e1ebb23de5a77ebc7dab2d6e8b6d87973974,2024-11-25T20:15:07.830000 CVE-2024-40412,0,0,6bec7f774fa3844522b88a2194ef0a518564be0031f950daee4cc3a1d2af5bc7,2024-08-01T13:57:17.453000 CVE-2024-40414,0,0,cce4bc45b3fd958899493947d8b56ef56455ed7c491dfa2b8588a84925be9f13,2024-08-07T22:13:50.937000 CVE-2024-40415,0,0,97b6ea5de4ca3bbb8d7d817518418a144fefb721c0a2cb8a92df0a8cba71dbba,2024-08-07T22:13:41.720000 @@ -262500,7 +262500,7 @@ CVE-2024-44571,0,0,6ef20a14725bae57f9a567f27cd564fd830fef7d5d8219a7373f1812eb1e3 CVE-2024-44572,0,0,1fb641294c45b891575d0c3a1b41047f1bbad864be426defb5572f6f38bcfd4a,2024-09-12T12:35:54.013000 CVE-2024-44573,0,0,249f071b191a92f2ff5a0bdc93d8f57eeaa3495a59036eb24a231b76634d2746,2024-11-01T19:35:27.177000 CVE-2024-44574,0,0,cfb193c0fdfb56729a274c91dd51261fc44a3306d91c3856efba426d2348d691,2024-09-12T12:35:54.013000 -CVE-2024-44575,0,1,8e6afa406b092fc97403bf18c894169ec34279244dffaf9d373a5db4a6bca366,2024-11-25T18:15:12.667000 +CVE-2024-44575,0,0,8e6afa406b092fc97403bf18c894169ec34279244dffaf9d373a5db4a6bca366,2024-11-25T18:15:12.667000 CVE-2024-44577,0,0,f23b5398825615b1e4c9cdd4a9ee17debd24c87e40c16b163c6e9227921995f9,2024-09-12T12:35:54.013000 CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000 CVE-2024-44587,0,0,df65b03ef618d179da9d66b0f4fc4c4e495ab75863a2207f1a4d99901686f98d,2024-09-05T17:44:56.007000 @@ -262732,7 +262732,7 @@ CVE-2024-45028,0,0,7d5b512323cbd1eada9374cd0af8594b979474aff5440b5d3cab41fc49bfd CVE-2024-45029,0,0,21260e7ef8d10dc3c2200fe33709508a97de174b7662049f29f251b7e7a6c818,2024-09-13T16:29:29.740000 CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000 CVE-2024-45030,0,0,a5fdbeca43ac64eed9d343d3ecb8fc38b2b39144c16b9671c8c2fb6202b08e32,2024-09-13T16:29:23.557000 -CVE-2024-45031,0,0,360f23830efd1386ed3cc99f496b8d558b08cb5b22c35a11d19bfb30bf81992a,2024-10-25T12:56:07.750000 +CVE-2024-45031,0,1,36781973402d597ce98f5884f7ea52968cfb997dba81ead52b033ba35197caa3,2024-11-25T22:15:12.147000 CVE-2024-45032,0,0,9e9832070815f198bd13b47e9ba247da81e362143ea041571debdd67a5f9cbe7,2024-09-10T12:09:50.377000 CVE-2024-45034,0,0,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 @@ -262876,7 +262876,7 @@ CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96 CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 CVE-2024-45200,0,0,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f2e5,2024-09-30T18:35:06.983000 -CVE-2024-45201,0,1,92b8bd132a22a911d082c4796a5c2704cf98ba27382f9f8c2bc815a661909645,2024-11-25T19:15:10.473000 +CVE-2024-45201,0,0,92b8bd132a22a911d082c4796a5c2704cf98ba27382f9f8c2bc815a661909645,2024-11-25T19:15:10.473000 CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 CVE-2024-45216,0,0,b5d4ad361df623d2747c2e3dcc354f4583c0440162a6f21fa826489a75df8c0b,2024-10-16T17:35:02.523000 @@ -262984,7 +262984,7 @@ CVE-2024-45334,0,0,fbd6312b35c8dfb00b7b9cd224a77361e6b346b18836cc30a53c0b55e9ac4 CVE-2024-45335,0,0,b274212e48083a12503af1b1ddd8aa59b1b69e860bfecb2e94b0f481925a580c,2024-10-25T14:37:39.387000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 -CVE-2024-45348,0,1,bc98fa80249f38a70998adac3e692307a7b693d0d2c59147b57b1bd3bcbd8953,2024-11-25T17:14:11.713000 +CVE-2024-45348,0,0,bc98fa80249f38a70998adac3e692307a7b693d0d2c59147b57b1bd3bcbd8953,2024-11-25T17:14:11.713000 CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b64,2024-05-28T12:39:28.377000 CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d1723500,2024-05-07T13:39:32.710000 CVE-2024-45366,0,0,66b88cd12e7b55bd127ef7ca0df825eb8a10e1eaef38a8fce322ba7e6ff8cdf6,2024-11-05T22:35:10.920000 @@ -263205,11 +263205,11 @@ CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab2 CVE-2024-45746,0,0,7abeeb28473d4d90b0f40fa029a9f40cc62f9f19130bf135cc7a0a985dde62f8,2024-10-11T21:36:34.350000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000 -CVE-2024-45751,0,1,a77f37e4ea9f9cb9a24bf925f3f2164ba340c3e11435309a55bc717109619c08,2024-11-25T20:15:08.047000 +CVE-2024-45751,0,0,a77f37e4ea9f9cb9a24bf925f3f2164ba340c3e11435309a55bc717109619c08,2024-11-25T20:15:08.047000 CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4a91,2024-09-25T16:54:27.520000 CVE-2024-45754,0,0,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000 -CVE-2024-45755,1,1,214acbe9890f2a732448290139edf5942230569a0469dfa5778b57aca487e490,2024-11-25T17:15:12.293000 -CVE-2024-45756,1,1,c88c00192e21176f6155758efe042517d130d9b657618b8f3b05bd3fe303bdeb,2024-11-25T19:15:10.673000 +CVE-2024-45755,0,0,214acbe9890f2a732448290139edf5942230569a0469dfa5778b57aca487e490,2024-11-25T17:15:12.293000 +CVE-2024-45756,0,0,c88c00192e21176f6155758efe042517d130d9b657618b8f3b05bd3fe303bdeb,2024-11-25T19:15:10.673000 CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000 CVE-2024-45759,0,0,f59b470dfad0907ca734d4ff5b2320a0c753f38413ab3a3988ccb60d03e5f11c,2024-11-08T19:01:03.880000 CVE-2024-4576,0,0,d47b5037987d3332638a14c0dba5a2bae073fe818289e35d14fa9c3b2b647939,2024-10-27T22:35:08.450000 @@ -263318,7 +263318,7 @@ CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40 CVE-2024-45890,0,0,c542a45da5800b9bf070465b938286cb14fb29efd3dd7dad08549516b77cd8a3,2024-11-04T18:50:05.607000 CVE-2024-45891,0,0,56567b56a9d3c3f88f0920d683da3bd5f2224a241c99109d192e99e45770b58f,2024-11-04T18:50:05.607000 CVE-2024-45893,0,0,fd5db6b3d0fca1b7c42fbd6eb93b25e78d90980aef0f1cc7dadfc28f9d661733,2024-11-04T18:50:05.607000 -CVE-2024-45894,0,0,740550dc5a86649aa0fe59728cae8a43ea99cf049e7478afa6af433b67b6e7ff,2024-10-10T12:57:21.987000 +CVE-2024-45894,0,1,13c8f8aaf2900c11d21e5a32ae2b6dac835a76cb61db6408a6e148f67c38386b,2024-11-25T22:15:12.850000 CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000 CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000 CVE-2024-45918,0,0,bb3df095ba20ae3480c451391f2c617ca8b4f2a199262ca8de5109fc2838c0b5,2024-11-05T20:35:23.220000 @@ -263477,11 +263477,11 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188 CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000 -CVE-2024-46462,0,1,e4a2fb53b33a4f052ac3833f4ac91ba2a67c37ef046470b2e485567755a6bcdc,2024-11-25T20:15:08.323000 -CVE-2024-46463,0,1,0a7a035035d5cd0582187717d294f32f26f2c64d32863a93428234591e876c3e,2024-11-25T20:15:08.563000 -CVE-2024-46465,0,1,fdda6700bbe65dd20aeb74f55d6067ac4d211e513bae7b9ee1a208d093fee6d3,2024-11-25T20:15:08.760000 -CVE-2024-46466,0,1,067e587d17dec2888e824f15c156963ae055c7ed550517114081c62dc17a3436,2024-11-25T20:15:08.957000 -CVE-2024-46467,0,1,edeb76aa2ccb057359ad09d2aae9c70f0e54c1035e057ffebd5fe59c1a614325,2024-11-25T20:15:09.170000 +CVE-2024-46462,0,0,e4a2fb53b33a4f052ac3833f4ac91ba2a67c37ef046470b2e485567755a6bcdc,2024-11-25T20:15:08.323000 +CVE-2024-46463,0,0,0a7a035035d5cd0582187717d294f32f26f2c64d32863a93428234591e876c3e,2024-11-25T20:15:08.563000 +CVE-2024-46465,0,0,fdda6700bbe65dd20aeb74f55d6067ac4d211e513bae7b9ee1a208d093fee6d3,2024-11-25T20:15:08.760000 +CVE-2024-46466,0,0,067e587d17dec2888e824f15c156963ae055c7ed550517114081c62dc17a3436,2024-11-25T20:15:08.957000 +CVE-2024-46467,0,0,edeb76aa2ccb057359ad09d2aae9c70f0e54c1035e057ffebd5fe59c1a614325,2024-11-25T20:15:09.170000 CVE-2024-46468,0,0,d1dabc49a2c8f6666100b3e113a0965ffec605533a3aa178ac1056f150b98c3d,2024-10-15T18:35:14.680000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000 @@ -264498,7 +264498,7 @@ CVE-2024-47799,0,0,de5bae16ec2678599ddf765fb89319547d13abf6f56de5efb31661988db58 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 CVE-2024-47801,0,0,e103685798e8b2dbc73e6876d080a93ca119ff0fe2d3b72153089026c306290a,2024-11-05T19:34:53.927000 CVE-2024-47803,0,0,f1080efaefb289db3b7c83152c009ece86e24390e0aefc406f78766a0804491c,2024-11-13T17:45:58.903000 -CVE-2024-47804,0,1,10f5812c7d5c82996af69313db42afb28574b27553ea72513b30e7e1371550ff,2024-11-25T19:15:10.873000 +CVE-2024-47804,0,0,10f5812c7d5c82996af69313db42afb28574b27553ea72513b30e7e1371550ff,2024-11-25T19:15:10.873000 CVE-2024-47805,0,0,6c51be7f72537aff5307d773eafe7e7345a2eb485d556a7afc321cd8a12ae6ea,2024-11-13T17:32:51.983000 CVE-2024-47806,0,0,7da0bb8e7fc9c3b1d389ccbc624a09ba22b5eddfdda079b80b993589f773a85c,2024-10-04T13:50:43.727000 CVE-2024-47807,0,0,6f73fcbd170bbcb4214e07d010ddde34567b580923105f0e5418ba9615969635,2024-10-04T13:50:43.727000 @@ -264541,7 +264541,7 @@ CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b CVE-2024-47854,0,0,cef81393ed48661f146b05190eb5cd22e800b4711975bd0fc685986ac16438cf,2024-11-13T15:25:13.953000 CVE-2024-47855,0,0,55506bc59fb300d34c632b3a5f880b3df3b3b2206fd15f460c6853ba7eb245ef,2024-11-07T20:35:11.733000 CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000 -CVE-2024-47863,0,1,1709e98bbe195ceb22985b7365edbf4c38348dc3eeb4afeb51d588e87ff0f966,2024-11-25T18:15:13.063000 +CVE-2024-47863,0,0,1709e98bbe195ceb22985b7365edbf4c38348dc3eeb4afeb51d588e87ff0f966,2024-11-25T18:15:13.063000 CVE-2024-47865,0,0,0970b7f6df3012fb0bc3443a9670f4f21476c8c3b81acc6e6b7a63f9648b2853,2024-11-20T08:15:14.890000 CVE-2024-47867,0,0,61f4df5a4a08eee13ad627f16450273fdbebcbdee4534b2d49b7e1adc602b8a3,2024-11-15T16:44:54.783000 CVE-2024-47868,0,0,b1d3ae34e95c1b5cdfd4777e6cf22588fee5fb92f1e32bee19fdee66c93a7d46,2024-10-17T17:04:35.547000 @@ -265028,11 +265028,11 @@ CVE-2024-48971,0,0,aec61daa8e3e4bc8e82a3ac6302404f969998220414a402a4bfea69832823 CVE-2024-48973,0,0,1df97559f56714d73ec761dcc150a7afb6ddaa2583c3474ad5af745f48ebc20c,2024-11-15T13:58:08.913000 CVE-2024-48974,0,0,bca1b70ac99b7db7d345213bfc69c0dea4bcbf3438528546c7259844ada903e4,2024-11-15T13:58:08.913000 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 -CVE-2024-48981,0,0,5b2b12400eaccebf383d2b40e5077824ba5a4e77240460dd5dd838d75660f3c5,2024-11-22T17:33:02.740000 -CVE-2024-48982,0,0,f665ced81ca1b256e3e6dad16a2daffa60a2d70f058ad9522e98ba23ab730955,2024-11-22T21:41:30.290000 -CVE-2024-48983,0,0,fd8b8f835cbc31323f35c4850771c96cd81f91ed628d1a2105541b69100cd7ec,2024-11-22T17:26:37.210000 -CVE-2024-48984,0,0,3da1761ce262b38553e244395a534ef8dd543421045213a55d6269b56b4ca914,2024-11-20T21:15:07.920000 -CVE-2024-48985,0,0,326ecb3fde2112ba8fd571fd0f9461c5f1947114b700cd50b3ae0f8e6a5d4922,2024-11-22T17:19:54.893000 +CVE-2024-48981,0,1,4fb2f959af950491b1165214d5af7285e685bd1f483dd08a9980b4ed8a7d1562,2024-11-25T22:15:13.517000 +CVE-2024-48982,0,1,f42b3937fcc722062f98fc6bbaae24491bf2e4fa46fe2f27f9a228d7654d7069,2024-11-25T21:15:17.023000 +CVE-2024-48983,0,1,2a18f05b7c655cc64e42583e01d678dfd03e9928161d8c2008f12eb74f664363,2024-11-25T21:15:17.750000 +CVE-2024-48984,0,1,f63eef7e44a38e3763497c7d3ccfd8f41a2a3dc01bb7350e0c9c510ef4c4e45c,2024-11-25T22:15:14.253000 +CVE-2024-48985,0,1,66b803e43dea24a2e3c275324c4c361c1dd515a96cd5ed87dc73016b342d568f,2024-11-25T22:15:14.790000 CVE-2024-48986,0,0,544fba74156c45e31f3739b49a8452ccc3cb56a7162a2f82d7d56e1f78d7cfd8,2024-11-22T21:39:25.407000 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 CVE-2024-48989,0,0,9073e18090b9ae4eb5079758fa48cb03e03a3dcd9dfe9e38f4453d35dfeb5c4c,2024-11-13T17:01:16.850000 @@ -266247,6 +266247,8 @@ CVE-2024-50657,0,0,c62ae8e760b0c797e6305b82b7def79ede70f22ae58be77a448cac3286418 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 +CVE-2024-50671,1,1,1223fefc332eddf3a4bf368d5cbbf3c4396b7c221e56523e6bdf733ee7c8c46d,2024-11-25T21:15:19.040000 +CVE-2024-50672,1,1,e15ff7e7887d1c58e55af7028d141453133b59d77bea70d3086e75a4dc40d21f,2024-11-25T21:15:19.523000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000 @@ -266311,7 +266313,7 @@ CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb1 CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000 CVE-2024-5095,0,0,1588c0abfc34bbd50f97e7721e8e7ba42bb279c7cb42725ee04b715e36b1b7b7,2024-06-04T19:20:58.577000 CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000 -CVE-2024-50956,0,1,12124e11e67fab80bf49da8101d4c3d956d958942d16765a9a0238618204ee2c,2024-11-25T20:15:09.383000 +CVE-2024-50956,0,0,12124e11e67fab80bf49da8101d4c3d956d958942d16765a9a0238618204ee2c,2024-11-25T20:15:09.383000 CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000 CVE-2024-50965,0,0,9bf5d4a724136551579847051cc192021c9ca6821a2f6911f3611ec5301fc7fe,2024-11-22T18:15:17.690000 CVE-2024-50966,0,0,c0f005c4299dd685198e56d1be45ab03ba5dbee734217c81e9ee9426dc60d25f,2024-11-08T19:01:03.880000 @@ -266364,7 +266366,7 @@ CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884 CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000 CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000 CVE-2024-51026,0,0,62fad2f07d50146e8433d063d38894194ce538e71bf191ac14b4c471f5cbc87a,2024-11-12T18:35:32.357000 -CVE-2024-51027,0,1,0ed5a060dfaf55a6aeeb1ff31826ca334b77c68fcae973b41bc0e5cff044f75b,2024-11-25T20:15:09.607000 +CVE-2024-51027,0,0,0ed5a060dfaf55a6aeeb1ff31826ca334b77c68fcae973b41bc0e5cff044f75b,2024-11-25T20:15:09.607000 CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000 CVE-2024-51030,0,0,f2e747039aa1c94bb05e787f4d207222d754db12ded9f6bb6df83cbdf74d7a25,2024-11-13T16:47:16.060000 CVE-2024-51031,0,0,b86b8798942030d83468cd0fee37fbed37248c27fcb27a06dd2e8866d706c425,2024-11-13T19:34:52.990000 @@ -266383,9 +266385,9 @@ CVE-2024-51064,0,0,ece811d6bc4d0a8a39ffb1295a05e98aa14ea4b37a609a0a704291f46ae22 CVE-2024-51065,0,0,13eba658de2ad8a597e121d04159d33db90d11b073dc40f03a99a360d854cd46,2024-11-01T16:35:29.133000 CVE-2024-51066,0,0,43893f00c972f583b870a001430879894062f80987f31522bd1f9ce18500c0dd,2024-11-01T21:35:05.747000 CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000 -CVE-2024-51072,0,1,e1042d252c1a0624cc3b64189c1cfc6b213ffe54d3f74283f7090f93cb443a94,2024-11-25T18:15:13.240000 -CVE-2024-51073,0,1,013339fd7fa328d3b1c83607a1d82b5d517d62588099cca85ddd21229f0fd8b9,2024-11-25T18:15:13.370000 -CVE-2024-51074,0,1,5340ce385ea99577a9b19a222d958a18e9d0f21977b4789af00373fa693190c8,2024-11-25T18:15:13.480000 +CVE-2024-51072,0,0,e1042d252c1a0624cc3b64189c1cfc6b213ffe54d3f74283f7090f93cb443a94,2024-11-25T18:15:13.240000 +CVE-2024-51073,0,1,e6ba30a7b201ed724a9ac195f162f9e1706758f965701b6890d0b8fa05eb8fd7,2024-11-25T21:15:19.847000 +CVE-2024-51074,0,1,76b2dfecccfbc118fee0c16cb883801390e41d29c266961e51a6341078dde974,2024-11-25T21:15:20.390000 CVE-2024-51075,0,0,65ae3c5f839d1343cfe96d616d54dd3277e3aa60c8e36fb4e4a98f4465a848c0,2024-11-04T13:41:29.567000 CVE-2024-51076,0,0,cd339191f7270b925031f2e79ccdef36faac89c073f1d7fece38ee50c55aeb1f,2024-11-04T13:41:48.267000 CVE-2024-5108,0,0,b8eaa0c49e3b7a0772fb8d227eefbcd229b705e71c1ea537a10c0b9ca289502f,2024-06-04T19:20:59.700000 @@ -266737,7 +266739,7 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812 CVE-2024-51720,0,0,d935c89d678e6c2465c73b44d2acf8e765a514a71ed8384e14cba8904616d4c2,2024-11-13T17:01:58.603000 CVE-2024-51721,0,0,180a180febf9a6891635b908522e8114d1418c02626388536e7361dbc23f9485,2024-11-13T17:01:16.850000 CVE-2024-51722,0,0,989ca169c6c454e742dc9963e9f58bdb1051de913d3f85c7e971d36fba8be826,2024-11-13T17:01:16.850000 -CVE-2024-51723,1,1,396a4757f193559d2a6f1b55a74b8b296d1e7f05a9e82fc3b3e447007f68add4,2024-11-25T19:15:11.050000 +CVE-2024-51723,0,0,396a4757f193559d2a6f1b55a74b8b296d1e7f05a9e82fc3b3e447007f68add4,2024-11-25T19:15:11.050000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000 CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000 @@ -267193,7 +267195,7 @@ CVE-2024-52524,0,0,0291fb2989ba5bd963e5ba7b16897e7b20eac1eef7056f852252def8abaaa CVE-2024-52525,0,0,87d8daa94d9c7b3468acdf4310326eea5f93ca728ee9d3040ae0a2505b89ffac,2024-11-18T17:11:56.587000 CVE-2024-52526,0,0,3ff8576252c4638e87e23c9cbf14531bcd7f764e2544e8015e850cb9c0cd5650,2024-11-20T14:39:19.647000 CVE-2024-52528,0,0,357b5377315c119aee7d7f03933ac3191b35ccfd203197b2c4dbf611d4131383,2024-11-18T17:11:56.587000 -CVE-2024-52529,1,1,aed0f6fba939d7e0fc9daf0cf45003636f5fec151d1b04e022b3ac89e63eab4f,2024-11-25T19:15:11.373000 +CVE-2024-52529,0,0,aed0f6fba939d7e0fc9daf0cf45003636f5fec151d1b04e022b3ac89e63eab4f,2024-11-25T19:15:11.373000 CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000 CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000 CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000 @@ -267273,7 +267275,7 @@ CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc0920 CVE-2024-52770,0,0,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000 CVE-2024-52771,0,0,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000 CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000 -CVE-2024-52787,1,1,5cf053b2abc44016dfcc451672fa6172c4f3b8dcb05262e0c71f35e05b29e3fa,2024-11-25T18:15:13.597000 +CVE-2024-52787,0,0,5cf053b2abc44016dfcc451672fa6172c4f3b8dcb05262e0c71f35e05b29e3fa,2024-11-25T18:15:13.597000 CVE-2024-52788,0,0,4abe1fd7690362e0e6e7183fadbb1999ee1afb82444324d21e730957cf5066a2,2024-11-22T17:15:10.490000 CVE-2024-52789,0,0,f640d56967c5320ac75d58f4ec0e813038d23df15a507a7fb489e9968905a84b,2024-11-22T17:15:10.660000 CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000 @@ -267283,7 +267285,7 @@ CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000 CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000 CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000 -CVE-2024-52811,1,1,d732a17bde6f16ede8be31f96ee410aad0e3e114ed23b65cb7e34c8157552b5c,2024-11-25T19:15:11.567000 +CVE-2024-52811,0,0,d732a17bde6f16ede8be31f96ee410aad0e3e114ed23b65cb7e34c8157552b5c,2024-11-25T19:15:11.567000 CVE-2024-52814,0,0,05155b182462de438f0b1b6215658fb7f90ef7f2af8e5a0e3c447f1976037015,2024-11-22T16:15:34.553000 CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000 CVE-2024-5283,0,0,b38d3b6d84c245f47c02c6b1221c64126cc1590c1b6b303a3d39721ab1dfca67,2024-08-01T13:59:43.747000 @@ -267355,22 +267357,22 @@ CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4d CVE-2024-53060,0,0,9512d54390796930e267dd9604c9fadc1912325744feb2489aa6764632b0e8be,2024-11-19T21:56:45.533000 CVE-2024-53061,0,0,6d963c9bfc1997e983bc399b63ec90861ae1669db79161a0b8424ee0f8527697,2024-11-22T17:51:45.817000 CVE-2024-53062,0,0,e32700c33557358d5784d1ebd21f16a8e87aef87b2e2617962aff7be3c5d737b,2024-11-22T17:47:43.337000 -CVE-2024-53063,0,0,f035f57ca66a97638de1f9d8f94990b5e4e9ac04ef218bc8be51d04172111a43,2024-11-19T21:56:45.533000 -CVE-2024-53064,0,0,3bb033dc6aae86fa2e5ece446a8e8c6ad0cd30bf017ce16ad3ca01b8f35e3442,2024-11-19T21:56:45.533000 -CVE-2024-53065,0,0,50051ab04eb529a5f3837615462e27887f9fcc2921e459dafebab73a597de8c7,2024-11-19T21:56:45.533000 -CVE-2024-53066,0,1,b6df3ccd2e373434ab94736c95ee77d4eee27bd64280c62d525629ef7f7c0422,2024-11-25T21:03:09.620000 -CVE-2024-53067,0,1,9d3bb8c5ae5090d9d88a3b216dfdb09b9af76d19c318be3e7297e5143c6e6055,2024-11-25T21:00:06.237000 +CVE-2024-53063,0,1,d21047234dabc0b4048c3b7c4fc2410307e450c87dc8013e953beb70e76e78cf,2024-11-25T21:08:23.697000 +CVE-2024-53064,0,1,8d69be8ddfbfe11105bdd27fef64bccbebd47abcaff63cb2aabbe70b3c8c400f,2024-11-25T21:05:52.863000 +CVE-2024-53065,0,1,9cf457144606dcfcc5e8c70bdf0d033d2e0ea8379d8621dbc0af8fececd2f89f,2024-11-25T21:04:38.343000 +CVE-2024-53066,0,0,b6df3ccd2e373434ab94736c95ee77d4eee27bd64280c62d525629ef7f7c0422,2024-11-25T21:03:09.620000 +CVE-2024-53067,0,0,9d3bb8c5ae5090d9d88a3b216dfdb09b9af76d19c318be3e7297e5143c6e6055,2024-11-25T21:00:06.237000 CVE-2024-53068,0,0,95394cfc5f32c3da29765a2447a20db757db3b341b809b278465ed9fe936dfb5,2024-11-25T13:43:00.467000 CVE-2024-53069,0,0,f5c3dc08dd85594810e2e234abca83c46f325a99c8b12681eaf3a88411c504ff,2024-11-22T22:26:20.310000 CVE-2024-5307,0,0,9f60aac251e2e03d9552a0394a9c798214f03b8e43e7cbb0dd9de3359653dec5,2024-08-23T15:00:25.687000 -CVE-2024-53070,0,1,fec68d2ee6c35b8e612d089a8a6513f0b9928e3c7c2d12bf0612c0d406c52a1b,2024-11-25T20:53:55.200000 +CVE-2024-53070,0,0,fec68d2ee6c35b8e612d089a8a6513f0b9928e3c7c2d12bf0612c0d406c52a1b,2024-11-25T20:53:55.200000 CVE-2024-53071,0,0,33ad5da8002c3a0c9d64e8ddebfeae85f88c55b0cbce70c328e8d7bd3f2534af,2024-11-19T21:56:45.533000 -CVE-2024-53072,0,1,0332baeadbc05760f2eeadfce70cde9f66b50aa5c32702b265f2b2cdce0b46d5,2024-11-25T20:43:08.187000 -CVE-2024-53073,0,1,c4a124687f16864cea7121ca6ff88c5bd41d1180fe09dd3878043c78bba7a9b6,2024-11-25T20:43:59.833000 +CVE-2024-53072,0,0,0332baeadbc05760f2eeadfce70cde9f66b50aa5c32702b265f2b2cdce0b46d5,2024-11-25T20:43:08.187000 +CVE-2024-53073,0,0,c4a124687f16864cea7121ca6ff88c5bd41d1180fe09dd3878043c78bba7a9b6,2024-11-25T20:43:59.833000 CVE-2024-53074,0,0,a5befe099246b6e79e3ccd6574afa6c7cdf657f4d54fbf716c577f3e4ea9a0be,2024-11-25T13:51:28.137000 CVE-2024-53075,0,0,b8a47df9f6008c83b93e2abefdeadbc449d2b3e2a3dcb44f41e184a3b9508346,2024-11-25T13:58:31.503000 CVE-2024-53076,0,0,0be57ac15a64c608a1e52bd99fe58bd7fdd85d1305039bc11b5396e02cea259c,2024-11-22T22:24:24.607000 -CVE-2024-53077,0,1,00b9d8c03b0897577603ba9722b5741dae994d46788395a5ed57813d6fd9f76e,2024-11-25T20:41:41.093000 +CVE-2024-53077,0,0,00b9d8c03b0897577603ba9722b5741dae994d46788395a5ed57813d6fd9f76e,2024-11-25T20:41:41.093000 CVE-2024-53078,0,0,fb4576ab424097abb54c012dfd85f820fb3d67465f92657a79299e53e0dd3ac8,2024-11-25T13:31:57.063000 CVE-2024-53079,0,0,feb4dd4b279da03f1175e573ff936491912f98a2521bb1b4a43e7053521e47ac,2024-11-19T21:56:45.533000 CVE-2024-53080,0,0,4f55f4219302c380e18d9d77a4d8b74dea1e1e7f2dd32de0e9052894f115605c,2024-11-19T21:56:45.533000 @@ -267383,7 +267385,14 @@ CVE-2024-53086,0,0,8225327c6a29b2be37353ff40cf0c511301db44cf4b7f474bd5ea225dd664 CVE-2024-53087,0,0,25d166e1e025b5c54c21d08e3702ec93800f086873c5592df1f0003384d2c224,2024-11-19T21:56:45.533000 CVE-2024-53088,0,0,4acb4616433d03d93155294bc2ab962b7dfb65d296dcbedc7f5afde9bb86fb35,2024-11-25T13:38:07.723000 CVE-2024-5309,0,0,c9aea77aef389557d90d6203c5980313f972101a7c87b26eeedeec9679d42fb3,2024-09-11T16:33:17.950000 +CVE-2024-53096,1,1,f048ee28956f5f0b03e24d65de498613892c3e42cb5b5494ac9a7c765539c29a,2024-11-25T22:15:15.287000 +CVE-2024-53097,1,1,282011c61a0f8776f2044ed2484a678d2b8a2988afe6e878264fc41cd34b1aee,2024-11-25T22:15:15.763000 +CVE-2024-53098,1,1,20e1dfdb17d6b88c7b4b0b2fe9be97cbddc468ab4c273f3412716c7e99c5b80b,2024-11-25T22:15:16.147000 +CVE-2024-53099,1,1,ec06daf03ffbd754e45624835e02206e1906f66aad195a72ebe26513583e4519,2024-11-25T22:15:16.433000 CVE-2024-5310,0,0,be68f6d898e4e59f65162318c0ea0836be8ef675c080dff90d77e5a0c98b0b1e,2024-06-04T19:21:04.583000 +CVE-2024-53100,1,1,ebef705ff62b18f19e261a6958f5fc6243a31c8a51b7147820fda44869985973,2024-11-25T22:15:16.763000 +CVE-2024-53101,1,1,be92e9e8d17dfd621b3b25a601d91583efd6dd3a3dcb841c50fadbb794469cef,2024-11-25T22:15:17.163000 +CVE-2024-53102,1,1,066d999453d30a546d39a31866cdbaeffc79fa681b911ec129d6f4d4ed9a482b,2024-11-25T22:15:17.553000 CVE-2024-5311,0,0,4e4e9b4edb642fa4d04760ded51b93254fd12f5bde190a96e2c1818c58cf4797,2024-06-03T14:46:24.250000 CVE-2024-5312,0,0,18bbe6bd336686ff14003841f43dce1a45b7d1ab8cfffd6fca5539a180b7243f,2024-05-24T13:03:05.093000 CVE-2024-5313,0,0,f1cdfb8a50e98ae6ac3af0ea1d50716e060963965a73a7d8f531b777ae15b8ad,2024-08-14T13:40:02.907000 @@ -267396,18 +267405,19 @@ CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570 CVE-2024-5324,0,0,68af38ce3b695644cbcf19d3a148fcefd2523c0cdca6a2454fd88f0297edc15c,2024-07-24T17:42:49.020000 CVE-2024-5325,0,0,3161b31796f943a80af27275e8f23d08c58d4d31d567c9aa76aee11dec3e806e,2024-07-12T16:34:58.687000 CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b65eb,2024-11-22T20:15:09.210000 -CVE-2024-53255,1,1,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000 -CVE-2024-53258,1,1,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000 +CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000 +CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000 CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000 -CVE-2024-53261,1,1,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000 -CVE-2024-53262,1,1,b58ac4cb966f18ebf91dd1e51ed9015ec986a3fab28fed8c4a716894290c935b,2024-11-25T20:15:10.423000 -CVE-2024-53268,1,1,007aa1474b5fa3204d1321367c5c9ffff4ab0370ad189bb72596a6cd01d88cfa,2024-11-25T20:15:10.583000 +CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000 +CVE-2024-53262,0,0,b58ac4cb966f18ebf91dd1e51ed9015ec986a3fab28fed8c4a716894290c935b,2024-11-25T20:15:10.423000 +CVE-2024-53268,0,0,007aa1474b5fa3204d1321367c5c9ffff4ab0370ad189bb72596a6cd01d88cfa,2024-11-25T20:15:10.583000 CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000 CVE-2024-5328,0,0,389f7ef980e9d16941bc44acc7d327871d53fb707d54ba8870eb280f34f36d8b,2024-07-23T19:41:49.540000 CVE-2024-5329,0,0,455e8737b3d3fdaf4e090dd4445471ebeb638ae4f41003db454e4798dec65f13,2024-10-14T13:43:12.070000 CVE-2024-5330,0,0,d052f676e850b1a7538b470735e7fe5f7dfb3046b39fa2778831cd7f8fdd99b2,2024-08-01T12:42:36.933000 CVE-2024-5331,0,0,f05fb229c386046dcd65cdaa4c35f1d7d27dbf88e27984042e1518b076a10077,2024-08-01T12:42:36.933000 CVE-2024-5332,0,0,440877c08f2207e575e98ca75a231683ae97178fa156f1a4d40f84efe3c80f11,2024-08-02T15:03:49.773000 +CVE-2024-53333,1,1,92c7fe13830f0aa65ff76da18ab8b2df2abe26dfb09110de08f83c1b81203228,2024-11-25T22:15:18.437000 CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 CVE-2024-5335,0,0,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000 CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000 @@ -267431,11 +267441,14 @@ CVE-2024-5352,0,0,da1c4d8b4e23dadce106da9517801ea125925e8071854aa14e0650ba3020a2 CVE-2024-5353,0,0,525ae1f28e269a2f910a2998894d881f94e776efad76469271fac08c213e4cb6,2024-06-04T19:21:05.680000 CVE-2024-5354,0,0,2705d9995a32176e712249b570d9e2fb33b0b6cf2235d27d22b60367c7562ece,2024-06-04T19:21:05.783000 CVE-2024-5355,0,0,5f2e376ce579cedaa86f2a16497e6e751e8e7c9f0422d5f739a3fa31c20b6848,2024-06-04T19:21:05.883000 +CVE-2024-53554,1,1,1a0f48cd50a1a9796e08d5ee8e128685ab96ea56ceeddc74045be91abbaa3b33,2024-11-25T22:15:18.977000 +CVE-2024-53556,1,1,48f17862e47add857cc3012444f5820a601a669e2f1886efc4926c973e3aada3,2024-11-25T21:15:21.693000 CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000 CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000 CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000 CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59eee,2024-06-04T19:21:06.183000 -CVE-2024-53599,1,1,67fbbaf563f5264c7c7b7cc504f4be3c03b675a9f95340c37054ca3fa1b35767,2024-11-25T19:15:11.957000 +CVE-2024-53597,1,1,9a4c545b5865d03e7d82c6ef3ae0f046b57734eab4f58e2724c4e5178d1b9adb,2024-11-25T22:15:19.340000 +CVE-2024-53599,0,1,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387ef2,2024-11-25T21:15:21.993000 CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000 CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000 CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000 @@ -268744,8 +268757,8 @@ CVE-2024-6805,0,0,3651654a5946ae683f545f40a6b057035965334d6f69d74ec8dde5ec6f9814 CVE-2024-6806,0,0,9e07e4dacc7e195c5559dec5c29b82d20702a0a9f01ec928e67a9b84e15c4ba7,2024-09-17T14:09:15.247000 CVE-2024-6807,0,0,a50f4fae586037aea5e5ca10bbbaba2b046500e28f99e7a4c09fdd0417545b08,2024-09-07T12:56:42.300000 CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000 -CVE-2024-6811,0,1,d8ff9215db28d240a97869585172792ca5a219ff11d059722111d97e3a845278,2024-11-25T17:17:22.273000 -CVE-2024-6812,0,1,8a972a69293dd4717cbd82f803b2c22d8c11e37b05ad510585efd0656e99c75d,2024-11-25T17:17:07.970000 +CVE-2024-6811,0,0,d8ff9215db28d240a97869585172792ca5a219ff11d059722111d97e3a845278,2024-11-25T17:17:22.273000 +CVE-2024-6812,0,0,8a972a69293dd4717cbd82f803b2c22d8c11e37b05ad510585efd0656e99c75d,2024-11-25T17:17:07.970000 CVE-2024-6813,0,0,288fb5f3b41e930aaeda182bc54b653e53d0161372a0e3799ecbdc40b9084de5,2024-08-27T15:01:38.630000 CVE-2024-6814,0,0,de17dadc03a3a7b793b54f2a6cb99adf9aac2d3ddb1fae1587e0c4f510c1fc2e,2024-08-27T15:03:09.817000 CVE-2024-6815,0,0,6507021e6a1c22d5db4cd218e87c50419a6b4cfd9d917ac6233f4e1a335890c3,2024-11-22T20:15:12.130000 @@ -269686,7 +269699,7 @@ CVE-2024-7911,0,0,859a4ab2d69fd8051484705c8ccd7b2fca36f9fd16b342bf7a32ac0026ea24 CVE-2024-7912,0,0,d022e995569549791df9628a3255ea9ef44a2cde43358affb6b230c8e7dbab8f,2024-08-19T16:16:10.667000 CVE-2024-7913,0,0,3ca4516cfde0ec40156a2de25faf85d000b43871724e778a5c8d5e9733f2280f,2024-08-19T16:14:30.670000 CVE-2024-7914,0,0,360cef7c15cef40e34b5743ca5d838d36fa6ba30c6337dbb0cc4fd0cdd37714c,2024-08-19T16:12:51.837000 -CVE-2024-7915,1,1,5c47aced80f8cca8fe8d6c9d666f6f7f282dfe0284780f998c20fa39fdce534b,2024-11-25T18:15:14.530000 +CVE-2024-7915,0,0,5c47aced80f8cca8fe8d6c9d666f6f7f282dfe0284780f998c20fa39fdce534b,2024-11-25T18:15:14.530000 CVE-2024-7916,0,0,2890180016b54dc9da9d7caa383969ad75f3180954e602dd9178d25d09afddce,2024-08-20T19:38:11.163000 CVE-2024-7917,0,0,1232374447889b44f95a3651db2b7e919b58eb5c9a0d77c398ae62eee2338564,2024-08-21T12:30:34.283000 CVE-2024-7918,0,0,c04f7a29de57a9e48c1dd247a32bf45277bed143c620ae2ac9f6284ba5b1659f,2024-10-07T16:56:28.940000 @@ -269951,7 +269964,7 @@ CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81 CVE-2024-8268,0,0,5be7ed43bc13c42d107f9505f0e50c5c3da78418e570e46eb634a6a34dba57c1,2024-09-26T16:15:31.053000 CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000 CVE-2024-8271,0,0,5caaf7c53ddd5d3d02088dc4ed54b782a6f9790a592df3b53ca1243988b016f0,2024-09-27T16:21:38.463000 -CVE-2024-8272,1,1,d7eb69c7a4d623f87d6728ab3a4cfd8013589291bfba553f20b7287cb73b5bd6,2024-11-25T18:15:14.673000 +CVE-2024-8272,0,0,d7eb69c7a4d623f87d6728ab3a4cfd8013589291bfba553f20b7287cb73b5bd6,2024-11-25T18:15:14.673000 CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000 CVE-2024-8275,0,0,51e1ea7caef25d27b6b41142c09640cebec413599e9a871eb48577f39eda902b,2024-10-02T19:14:54.870000 CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000 @@ -270711,10 +270724,10 @@ CVE-2024-9254,0,0,0c155f4dc59bc8496052b19cde5564b87172dd0e88119742318eb533c5663f CVE-2024-9255,0,0,3ce1cafa758f686588c02a69e0a2d164e1bf93282fb8104afc3a6e944b85214d,2024-11-22T22:15:21.773000 CVE-2024-9256,0,0,ca2f34f378c8385554c1c6627c4e221c455b2f960e3ad93b6df3902e7d0eca78,2024-11-22T22:15:21.903000 CVE-2024-9257,0,0,069193eb3884fdef344f93e2f6ac9b78dbf729bbb7402c16ec2baadbb3832947,2024-11-22T21:15:23.787000 -CVE-2024-9258,0,1,dead427af30f8ff875059650d01008dd6a93625fa5d19061b8e08b64f09006d2,2024-11-25T17:15:32.283000 -CVE-2024-9259,0,1,2cabaa7ed0a6383d684de5974ee246b50557210200ad738850acd35849d59f3e,2024-11-25T17:13:49.060000 -CVE-2024-9260,0,1,2b48e3b38ba22081340c2792e8f8d1a71586a3605d87a113972e2ab9308e173e,2024-11-25T17:16:40.663000 -CVE-2024-9261,0,1,fc7fd8fa9db00a8fe32d000f76af3b335059fdd5fb63f6130b3ff642a3ccee23,2024-11-25T17:17:17.177000 +CVE-2024-9258,0,0,dead427af30f8ff875059650d01008dd6a93625fa5d19061b8e08b64f09006d2,2024-11-25T17:15:32.283000 +CVE-2024-9259,0,0,2cabaa7ed0a6383d684de5974ee246b50557210200ad738850acd35849d59f3e,2024-11-25T17:13:49.060000 +CVE-2024-9260,0,0,2b48e3b38ba22081340c2792e8f8d1a71586a3605d87a113972e2ab9308e173e,2024-11-25T17:16:40.663000 +CVE-2024-9261,0,0,fc7fd8fa9db00a8fe32d000f76af3b335059fdd5fb63f6130b3ff642a3ccee23,2024-11-25T17:17:17.177000 CVE-2024-9262,0,0,0faf581ebb856c33af20ae813ef5903cd96d0da73e2d232fe550d71402d04408,2024-11-12T13:56:24.513000 CVE-2024-9263,0,0,ee4f7b487368511acdd8209efd3b16cc7ea9463265fe8e2495be906cd811a62e,2024-10-18T12:53:04.627000 CVE-2024-9264,0,0,453599246838d2f15e3e7a7864ab2c75c071b729888f2b98b95994ed621e8268,2024-11-01T18:14:31.377000 @@ -271010,13 +271023,13 @@ CVE-2024-9666,0,0,e2a3540bab71afda1dcc140eb145bf53e593e90f0e4c2cb6e0cec9154f378a CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff13d,2024-11-08T15:27:25.697000 CVE-2024-9668,0,0,f818a6b8cdaa67cfd4295b3c202a4554201abb8c6b4c20c52c4343e3261d3200,2024-11-19T15:55:00.840000 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 -CVE-2024-9671,0,1,dcd055e44b7247318281ffcf463a48411c85db46fb1b3636a2e13ae3cf953bfe,2024-11-25T18:17:11.960000 +CVE-2024-9671,0,0,dcd055e44b7247318281ffcf463a48411c85db46fb1b3636a2e13ae3cf953bfe,2024-11-25T18:17:11.960000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 CVE-2024-9675,0,0,eca475b135003e7e06db8f69f6d2f142dd27c257379e7a0b16967a90dcf42a39,2024-11-13T08:15:03.170000 -CVE-2024-9676,0,1,1b97fd6ac229aa8a8b9c08b52e59425e78fb086ebc3030ac254a462349b65cb9,2024-11-25T20:21:59.140000 +CVE-2024-9676,0,0,1b97fd6ac229aa8a8b9c08b52e59425e78fb086ebc3030ac254a462349b65cb9,2024-11-25T20:21:59.140000 CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9680,0,0,aade85a65f2f99cc47c2fb834c470dcfc4a6380ab6735d9434c311360504724b,2024-11-19T17:29:12.207000 -CVE-2024-9681,0,1,8b924b450d4a6dbb27601fbb04f08d88c9285a0a1a67208f21518dfaaa0a72ba,2024-11-25T19:52:56.417000 +CVE-2024-9681,0,0,8b924b450d4a6dbb27601fbb04f08d88c9285a0a1a67208f21518dfaaa0a72ba,2024-11-25T19:52:56.417000 CVE-2024-9682,0,0,2122d85927443e1998d90f1dfaf0e30f87a59df9f9140f4f34d3cb7460150d67,2024-11-19T15:47:07.517000 CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f185407,2024-10-18T12:52:33.507000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 @@ -271025,12 +271038,12 @@ CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79f CVE-2024-9689,0,0,8f8c579186810d2b61eae71f3a64a7543fcf1895acd4679afad8157c388bec86,2024-11-07T20:35:16.807000 CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000 CVE-2024-9693,0,0,d3ce3af0a6d80dbc98dd50b33c81a1344c9e31c2a5be66350b63da26f2e128f6,2024-11-15T13:58:08.913000 -CVE-2024-9696,0,1,d30db32e6e91542491621f64f323265f1c350c675c770ec19d03f3299ae1a70c,2024-11-25T20:42:32.327000 -CVE-2024-9700,0,1,44ec8c5b1c72b9ea93133516d058ebd0146b084de37af1e6b9ed3d48584cc0ad,2024-11-25T19:57:41.387000 +CVE-2024-9696,0,0,d30db32e6e91542491621f64f323265f1c350c675c770ec19d03f3299ae1a70c,2024-11-25T20:42:32.327000 +CVE-2024-9700,0,0,44ec8c5b1c72b9ea93133516d058ebd0146b084de37af1e6b9ed3d48584cc0ad,2024-11-25T19:57:41.387000 CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000 -CVE-2024-9704,0,1,92369527b8063da99abdde67a70ddbdd6e4fcd2e3488ceb190263ec6140f02ae,2024-11-25T19:19:22.113000 -CVE-2024-9707,0,1,c90f2d8626169c06a9c1994156c8d1b566f9edce507a1b3435b11fb610b79fc5,2024-11-25T18:50:39.867000 -CVE-2024-9708,0,1,fb28899552a0c0ade25a514ca2898578f5022c4291bacf5908d8bff46bbb03b1,2024-11-25T19:59:31.110000 +CVE-2024-9704,0,0,92369527b8063da99abdde67a70ddbdd6e4fcd2e3488ceb190263ec6140f02ae,2024-11-25T19:19:22.113000 +CVE-2024-9707,0,0,c90f2d8626169c06a9c1994156c8d1b566f9edce507a1b3435b11fb610b79fc5,2024-11-25T18:50:39.867000 +CVE-2024-9708,0,0,fb28899552a0c0ade25a514ca2898578f5022c4291bacf5908d8bff46bbb03b1,2024-11-25T19:59:31.110000 CVE-2024-9710,0,0,126960c7f1cfd4e8c0223664f79eaa5f17ef8dbaf20fff748e956f3eb8545d99,2024-11-22T21:15:24.043000 CVE-2024-9712,0,0,d53c48c9aa96cdf2a3ea1ba1e63beada343d01b44021e3baef369e20c7b75eee,2024-11-22T21:15:24.167000 CVE-2024-9713,0,0,d21d278290ff50075ddd640cba87a00a4dac8d26cfe898058cbead19058b8efe,2024-11-22T21:15:24.280000 @@ -271069,14 +271082,14 @@ CVE-2024-9745,0,0,6ccaa91421ef09d860a27c137d386ff5d553e01eee158f2e0ba9504deca527 CVE-2024-9746,0,0,b4f1fa0cc11bdcb820b366461cebc840d4a807a8dfce7fb5abe5ea8a4b560b2e,2024-11-25T16:18:17.007000 CVE-2024-9747,0,0,fc3d51dc8394edfbc7d16d5783941a46020e3f284171391bbe3e210537b65d27,2024-11-25T16:17:27.573000 CVE-2024-9748,0,0,f1e93b3eb60a7a8af523dfc1a78d2562ae57bb30b46f9d7831074773fc675812,2024-11-25T16:16:04.847000 -CVE-2024-9749,0,1,b4a4cb7a7e2ed29494903739f7dedc0d0b628bc8a0612acc9ffa95655d50faa7,2024-11-25T18:58:36.077000 +CVE-2024-9749,0,0,b4a4cb7a7e2ed29494903739f7dedc0d0b628bc8a0612acc9ffa95655d50faa7,2024-11-25T18:58:36.077000 CVE-2024-9750,0,0,50c566919a51f8be3bc6653478c682f4aff91e0115b1409db9dcdbae4be42fe5,2024-11-22T21:15:28.973000 CVE-2024-9751,0,0,502422101dd37211c529eb60e9460f0029c22d0c958018c6e16b247d2c36a300,2024-11-22T21:15:29.093000 CVE-2024-9752,0,0,cc80b0f6feb087fe11edb9c73f258a4bb12e3d2bf1ebca1be79f3bf3171f8cdb,2024-11-22T21:15:29.213000 CVE-2024-9753,0,0,52d4f3acff895bd7a6ffd6b4d458fdaf3c9580168bf75876b6b1ddb52b7c9e34,2024-11-22T21:15:29.333000 CVE-2024-9754,0,0,869b9ffa73633a8c504e91a8d2a56c0f45b9a730a7bbb5e3e6543cc881637863,2024-11-22T21:15:29.457000 CVE-2024-9755,0,0,53fc5d522b95af24c769bd48676c24c6ff077be761b00a59b6d1087ab13dc0ad,2024-11-22T21:15:29.570000 -CVE-2024-9756,0,1,9148e76585a16c910e97a54325b51f8747273a547943c29c001cb0cc296240e9,2024-11-25T20:49:23.220000 +CVE-2024-9756,0,0,9148e76585a16c910e97a54325b51f8747273a547943c29c001cb0cc296240e9,2024-11-25T20:49:23.220000 CVE-2024-9757,0,0,d63d1a73eb1226f0ec12ac801319ec47c69cda2abfa1cddcd17208a8b8d87f4f,2024-11-22T21:15:29.683000 CVE-2024-9758,0,0,8012c466870233ab1d14cd5a022d121f3f4b9299e2e1ac356079b5b21375d95a,2024-11-22T21:15:29.813000 CVE-2024-9759,0,0,7bd935b5cd23cdc1a9b3ccdd6323c5442e43e5a5dfdf8e977c62521d83a62491,2024-11-22T21:15:29.927000 @@ -271087,30 +271100,30 @@ CVE-2024-9763,0,0,773a0cffd511db6422d452dc98b5722990978885d04c21ac7b68dcdff9ecc3 CVE-2024-9764,0,0,9cc3bc5866b710f8083fce151aff8948d5bfb29c8b033a45640ae262dd11bd9f,2024-11-22T21:15:30.500000 CVE-2024-9766,0,0,58a9a848a761b7a7389872a2a7b68c3c6cf333af64497b33b286bedd4c7ff978,2024-11-22T21:15:30.623000 CVE-2024-9767,0,0,4ca699d6a3b2186967330ac88b9f14f79524ba910e3d7d02f06998a567a71584,2024-11-22T22:15:22.593000 -CVE-2024-9772,0,1,043bc7caa6859562432d521f3501fd215394ad297fe3470375010095d76d8604,2024-11-25T20:03:01.613000 +CVE-2024-9772,0,0,043bc7caa6859562432d521f3501fd215394ad297fe3470375010095d76d8604,2024-11-25T20:03:01.613000 CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000 -CVE-2024-9776,0,1,9273f765f44bf9e907460b214d240344a8be5b3a239edcb0f9ffb7d3f96c7d26,2024-11-25T18:45:54.377000 +CVE-2024-9776,0,0,9273f765f44bf9e907460b214d240344a8be5b3a239edcb0f9ffb7d3f96c7d26,2024-11-25T18:45:54.377000 CVE-2024-9777,0,0,1e36961484bf4b33413a224fc6189a86ad1224818320d3b39ec4c80bcb37268f,2024-11-19T21:57:32.967000 -CVE-2024-9778,0,1,c5789fd51af706bd1104828309e4c0bbf44a70e2aa01bf36b8318a8802f25b3a,2024-11-25T19:20:37.163000 +CVE-2024-9778,0,0,c5789fd51af706bd1104828309e4c0bbf44a70e2aa01bf36b8318a8802f25b3a,2024-11-25T19:20:37.163000 CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000 -CVE-2024-9781,0,1,4766ae4e21ddab4bdbe139c0afc58af6fd761963f021734b932e1a0e147ffb05,2024-11-25T18:09:33.853000 +CVE-2024-9781,0,0,4766ae4e21ddab4bdbe139c0afc58af6fd761963f021734b932e1a0e147ffb05,2024-11-25T18:09:33.853000 CVE-2024-9782,0,0,e2eb69b6c2b044d22b718569cdb0ebf6964122bc02d92fdf90907280ee9e66c0,2024-10-16T16:44:19.637000 CVE-2024-9783,0,0,596e9c3bfc7b379492d9b169dc85ee1521bf5577471ebe43d2f04808f485ed3a,2024-10-16T16:43:49.053000 CVE-2024-9784,0,0,ee4690bd44afc2da98daa591c06fcd9ef379f757ced30fa65d12d9c28a6966f0,2024-10-16T14:12:35.597000 CVE-2024-9785,0,0,20ed1436a72f0e073efd74a4917d8859909ef12075b835ed6cac997f63b9c265,2024-10-16T16:15:50.720000 CVE-2024-9786,0,0,2263b6cd3d50b9830e0f9e7859f53d9e2b400307608f3f01a1a1cf0a7635a411,2024-10-16T16:15:25.077000 -CVE-2024-9787,0,1,dedeba539f3bc78b880862242d70c5ebe7f3822ab4b50d640d63d2e50d7521c2,2024-11-25T17:39:02.310000 +CVE-2024-9787,0,0,dedeba539f3bc78b880862242d70c5ebe7f3822ab4b50d640d63d2e50d7521c2,2024-11-25T17:39:02.310000 CVE-2024-9788,0,0,bb47e288d5e5460abea3a374f5e4cdb4b6cc616a2e520b5bc3d247976f89342a,2024-10-17T14:26:12.120000 CVE-2024-9789,0,0,80ea14a4b839222acb6cf5cbf05a0b4bf6c9c7a6ca9fbe680be5063151c1bd7e,2024-10-17T14:26:19.523000 CVE-2024-9790,0,0,5ca7d35e0149465887d771cb28bd9e6c74a2fa674a3dd1abd82977367f4ff4f8,2024-10-17T14:26:30.160000 -CVE-2024-9792,0,1,c6fc77027305dc7e546a3e54962c6ad14d4b6e5f062630854dc5fa67d3c90da0,2024-11-25T19:02:48.587000 +CVE-2024-9792,0,0,c6fc77027305dc7e546a3e54962c6ad14d4b6e5f062630854dc5fa67d3c90da0,2024-11-25T19:02:48.587000 CVE-2024-9793,0,0,503f1878edc675a043a9f947e1fa9b5d180038b0550ffeb6e16498fc6b8d25cf,2024-11-01T14:36:02.277000 CVE-2024-9794,0,0,2109299c412606589d2d15c7a99f00ade0d69b6b01c343ac91afffa4dccb49fe,2024-10-15T19:12:36.503000 CVE-2024-9796,0,0,e9e2b215bb5f3ccc6d7244ebabf60d89574166678e83498211f5060a11c7c349,2024-10-15T18:46:53.397000 CVE-2024-9797,0,0,76d0d64f17ede2284b5f27cd006706a5a6cf138e624975afba6fbae8df1636b1,2024-10-15T19:14:42.600000 -CVE-2024-9798,0,1,ca000cc7da37804a8135a0fed8d030c8d584394ab405b96e570ea7efd4710f96,2024-11-25T18:00:47.637000 +CVE-2024-9798,0,0,ca000cc7da37804a8135a0fed8d030c8d584394ab405b96e570ea7efd4710f96,2024-11-25T18:00:47.637000 CVE-2024-9799,0,0,5fde3673efa2bf6da453b0b33789579d0661998aed6cec1b5812c94c8a3c6b99,2024-10-17T14:32:17.640000 -CVE-2024-9802,0,1,bf7bc615056243c71d22c2e1442b94e0ea585af62d38c7ec11e08e67c4d5effe,2024-11-25T17:56:58.937000 +CVE-2024-9802,0,0,bf7bc615056243c71d22c2e1442b94e0ea585af62d38c7ec11e08e67c4d5effe,2024-11-25T17:56:58.937000 CVE-2024-9803,0,0,c7566d4ea04fade14784a7115a07f09549bf169921869ae21cbf19a869fa7a2f,2024-10-16T16:21:14.933000 CVE-2024-9804,0,0,68f5c7e14739a6361e19dd7d813977d666aa17ad23eace3ce2a17d5ea8fdec35,2024-10-15T19:17:27.083000 CVE-2024-9805,0,0,ee00c11b4d31e847e0ebd53a130c82f569b78de6fc7dd36fd6219e14679cf80b,2024-10-15T19:18:27.987000