Auto-Update: 2024-11-26T09:01:03.364720+00:00

This commit is contained in:
cad-safe-bot 2024-11-26 09:04:13 +00:00
parent 9b92e06fa4
commit cf1709fbd5
38 changed files with 2152 additions and 101 deletions

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2018-11881",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-26T05:15:05.710",
"lastModified": "2024-11-26T05:15:05.710",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\u00a0\n\n\n\n\n\n\n\n\n\n\n\nThis CVE ID is unused and any reference to it should be ignored."
}
],
"metrics": {},
"references": []
}

View File

@ -2,46 +2,14 @@
"id": "CVE-2020-11311",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-11-25T05:15:05.273",
"lastModified": "2024-11-25T05:15:05.273",
"vulnStatus": "Received",
"lastModified": "2024-11-26T05:15:07.710",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "This record is rejected as duplicate. All references should point to CVE-2021-1904."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority\u00a0as duplicate. All references should point to CVE-2021-1904."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-1904",
"source": "product-security@qualcomm.com"
},
{
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1904",
"source": "product-security@qualcomm.com"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-33860",
"sourceIdentifier": "CybersecurityCOE@eaton.com",
"published": "2024-11-26T05:15:09.007",
"lastModified": "2024-11-26T06:15:07.343",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-43775. Reason: This record is a duplicate of CVE-2023-43775. Notes: All CVE users should reference CVE-2023-43775 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-10471",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-26T06:15:07.520",
"lastModified": "2024-11-26T06:15:07.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Everest Forms WordPress plugin before 3.0.4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/85d590c9-c96d-40c9-aa59-48302ba3d63c/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-10542",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-26T06:15:07.683",
"lastModified": "2024-11-26T06:15:07.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.43.2/lib/Cleantalk/ApbctWP/RemoteCalls.php#L41",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3179819/cleantalk-spam-protect#file631",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7eb5fad-bb62-4f0b-ad52-b16c3e442b62?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-10570",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-26T06:15:07.880",
"lastModified": "2024-11-26T06:15:07.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized SQL Injection due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 2.145, as well as insufficient input sanitization and validation. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/security-malware-firewall/tags/2.145/lib/CleantalkSP/Common/RemoteCalls.php#L59",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2187311d-6651-4eca-806d-aa2ff9fae4e2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-10781",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-26T06:15:08.057",
"lastModified": "2024-11-26T06:15:08.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-703"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L95",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L96",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3188546/cleantalk-spam-protect#file653",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79ae062c-b084-4045-9407-2d94919993af?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-10857",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-26T07:15:05.003",
"lastModified": "2024-11-26T07:15:05.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-35"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3195423/product-input-fields-for-woocommerce/trunk?contextall=1&old=3173573&old_path=%2Fproduct-input-fields-for-woocommerce%2Ftrunk",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e45207af-3886-4d95-9cd8-5ecdc683dc58?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-11002",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-26T07:15:05.413",
"lastModified": "2024-11-26T07:15:05.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The The InPost Gallery plugin for WordPress is vulnerable to arbitrary shortcode execution via the inpost_gallery_get_shortcode_template AJAX action in all versions up to, and including, 2.1.4.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/inpost-gallery/trunk/index.php#L323",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3192113/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/inpost-gallery/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fbb2dcf-38b8-4ef1-bfea-bf5872cc7e37?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,115 @@
{
"id": "CVE-2024-11202",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-26T08:15:03.710",
"lastModified": "2024-11-26T08:15:03.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Multiple plugins for WordPress are vulnerable to Reflected Cross-Site Scripting via the cminds_free_guide shortcode in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cm-business-directory/trunk/package/cminds-free.php#L1465",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cm-email-blacklist/trunk/package/cminds-free.php#L1465",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cm-header-footer-script-loader/trunk/package/cminds-free.php#L1465",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cm-on-demand-search-and-replace/trunk/package/cminds-free.php#L1469",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cm-pop-up-banners/trunk/package/cminds-free.php#L1471",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cm-video-lesson-manager/trunk/package/cminds-free.php#L1465",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/enhanced-tooltipglossary/trunk/package/cminds-free.php#L1465",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3191536/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3192354/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3192381/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3192416/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3192808/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3193808/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3194393/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/cm-pop-up-banners/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db759c60-9ce9-407d-8d1f-cbbfd09759d5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-25579",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-28T23:15:09.660",
"lastModified": "2024-08-28T16:35:14.267",
"lastModified": "2024-11-26T08:15:04.400",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,6 +22,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,9 +31,29 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
@ -59,6 +80,14 @@
{
"url": "https://www.elecom.co.jp/news/security/20240220-01/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU99444194/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.elecom.co.jp/news/security/20240220-01/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,9 +2,8 @@
"id": "CVE-2024-26258",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-04T00:15:07.047",
"lastModified": "2024-09-09T07:15:16.343",
"lastModified": "2024-11-26T08:15:04.673",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -23,6 +22,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
@ -30,13 +31,33 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -59,6 +80,14 @@
{
"url": "https://www.elecom.co.jp/news/security/20240326-01/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU95381465/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.elecom.co.jp/news/security/20240326-01/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-28038",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:04.873",
"lastModified": "2024-11-26T08:15:04.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-28955",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:05.043",
"lastModified": "2024-11-26T08:15:05.043",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Affected devices create coredump files when crashed, storing them with world-readable permission. Any local user of the device can examine the coredump files, and research the memory contents. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-29146",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:05.203",
"lastModified": "2024-11-26T08:15:05.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-29978",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:05.353",
"lastModified": "2024-11-26T08:15:05.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,52 @@
{
"id": "CVE-2024-32151",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:05.513",
"lastModified": "2024-11-26T08:15:05.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "User passwords are decrypted and stored on memory before any user logged in. Those decrypted passwords can be retrieved from the coredump file. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-257"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,52 @@
{
"id": "CVE-2024-33605",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:05.650",
"lastModified": "2024-11-26T08:15:05.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-33610",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:05.810",
"lastModified": "2024-11-26T08:15:05.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\"sessionlist.html\" and \"sys_trayentryreboot.html\" are accessible with no authentication. \"sessionlist.html\" provides logged-in users' session information including session cookies, and \"sys_trayentryreboot.html\" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-33616",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:05.987",
"lastModified": "2024-11-26T08:15:05.987",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Admin authentication can be bypassed with some specific invalid credentials, which allows logging in with an administrative privilege. Sharp Corporation states the telnet feature is implemented on older models only, and is planning to provide the firmware update to remove the feature. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-34162",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:06.123",
"lastModified": "2024-11-26T08:15:06.123",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The web interface of the affected devices is designed to hide the LDAP credentials even for administrative users. But configuring LDAP authentication to \"SIMPLE\", the device communicates with the LDAP server in clear-text. The LDAP password can be retrieved from this clear-text communication. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-767"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-35244",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:06.273",
"lastModified": "2024-11-26T08:15:06.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There are several hidden accounts. Some of them are intended for maintenance engineers, and with the knowledge of their passwords (e.g., by examining the coredump), these accounts can be used to re-configure the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-36248",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:06.430",
"lastModified": "2024-11-26T08:15:06.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "API keys for some cloud services are hardcoded in the \"main\" binary. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-36249",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:06.580",
"lastModified": "2024-11-26T08:15:06.580",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in Sharp Corporation and Toshiba Tech Corporation multiple MFPs (multifunction printers). If this vulnerability is exploited, an arbitrary script may be executed on the administrative page of the affected MFPs. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-36251",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:06.760",
"lastModified": "2024-11-26T08:15:06.760",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The web interface of the affected devices process some crafted HTTP requests improperly, leading to a device crash. More precisely, a crafted parameter to billcodedef_sub_sel.html is not processed properly and device-crash happens. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-36254",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T08:15:06.923",
"lastModified": "2024-11-26T08:15:06.923",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability exists in Sharp Corporation and Toshiba Tec Corporation multiple MFPs (multifunction printers), which may lead to a denial-of-service (DoS) condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://global.sharp/products/copier/info/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jp.sharp/business/print/information/info_security_2024-05.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/vu/JVNVU93051062/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.co.jp/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.toshibatec.com/information/20240531_02.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -2,13 +2,12 @@
"id": "CVE-2024-42412",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-08-30T07:15:12.070",
"lastModified": "2024-10-27T16:35:00.983",
"lastModified": "2024-11-26T08:15:07.073",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in WAB-I1750-PS and WAB-S1167-PS due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser."
"value": "Cross-site scripting vulnerability exists in ELECOM wireless access points due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser."
},
{
"lang": "es",
@ -23,6 +22,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +31,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
@ -43,6 +42,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -50,9 +51,29 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
@ -61,7 +82,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
@ -71,7 +92,7 @@
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@ -79,6 +100,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,12 @@
"id": "CVE-2024-43689",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-10-21T02:15:02.680",
"lastModified": "2024-10-24T14:02:22.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2024-11-26T08:15:07.347",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow vulnerability exists in WAB-I1750-PS and WAB-S1167-PS. By processing a specially crafted HTTP request, arbitrary code may be executed."
"value": "Stack-based buffer overflow vulnerability exists in ELECOM wireless access points. By processing a specially crafted HTTP request, arbitrary code may be executed."
},
{
"lang": "es",
@ -23,6 +22,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +31,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
@ -43,6 +42,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -50,9 +51,29 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
@ -60,16 +81,6 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
@ -79,6 +90,16 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-47257",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-26T08:15:07.583",
"lastModified": "2024-11-26T08:15:07.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Florent Thi\u00e9ry has found that selected Axis devices were vulnerable to handling certain ethernet frames which could lead to the Axis device becoming unavailable in the network. \nAxis has released patched AXIS OS versions for the highlighted flaw for products that are still under AXIS OS software support. Please refer to the Axis security advisory for more information and solution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"references": [
{
"url": "https://www.axis.com/dam/public/permalink/231088/cve-2024-47257pdf-en-US_InternalID-231088.pdf",
"source": "product-security@axis.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-53278",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-26T05:15:10.563",
"lastModified": "2024-11-26T05:15:10.563",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability exists in WP Admin UI Customize versions prior to ver 1.5.14. If a malicious admin user customizes the admin screen with some malicious contents, an arbitrary script may be executed on the web browser of the other users who are accessing the admin screen."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gqevu6bsiz.chicappa.jp/wp-admin-ui-customize-%E3%82%A2%E3%83%83%E3%83%97%E3%83%87%E3%83%BC%E3%83%881-5-14%E3%82%92%E3%81%97%E3%81%BE%E3%81%97%E3%81%9F/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN87182660/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://wordpress.org/plugins/wp-admin-ui-customize/#developers",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-6476",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-26T07:15:05.697",
"lastModified": "2024-11-26T07:15:05.697",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Gee-netics, member of the AXIS Camera Station Pro Bug Bounty Program has found that it is possible for a non-admin user to gain system privileges by redirecting a file deletion upon service restart. \n Axis has released patched versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:L",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://www.axis.com/dam/public/e5/24/82/cve-2024-6476pdf-en-US-455104.pdf",
"source": "product-security@axis.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-6749",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-26T07:15:05.857",
"lastModified": "2024-11-26T07:15:05.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Seth Fogie, member of the AXIS Camera Station Pro Bug Bounty Program, has found that the Incident report feature may expose sensitive credentials on the AXIS Camera Station windows client. If Incident report is not being used with credentials configured this flaw does not apply. \n\n Axis has released patched versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.0,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.axis.com/dam/public/e6/e8/1e/cve-2024-6749-en-US-455106.pdf",
"source": "product-security@axis.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-6831",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-26T08:15:07.747",
"lastModified": "2024-11-26T08:15:07.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Seth Fogie, member of AXIS Camera Station Pro Bug Bounty Program has found that it is possible to edit and/or remove views without the necessary permission due to a client-side-only check. \nAxis has released patched versions for the highlighted flaw. Please \nrefer to the Axis security advisory for more information and solution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-602"
}
]
}
],
"references": [
{
"url": "https://www.axis.com/dam/public/a2/9a/41/cve-2024-6831-en-US-455107.pdf",
"source": "product-security@axis.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-8160",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-26T08:15:07.893",
"lastModified": "2024-11-26T08:15:07.893",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1286"
}
]
}
],
"references": [
{
"url": "https://www.axis.com/dam/public/permalink/231071/cve-2024-8160pdf-en-US_InternalID-231071.pdf",
"source": "product-security@axis.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-8772",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-26T08:15:08.033",
"lastModified": "2024-11-26T08:15:08.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API managedoverlayimages.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "product-security@axis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1286"
}
]
}
],
"references": [
{
"url": "https://www.axis.com/dam/public/permalink/231072/cve-2024-8772pdf-en-US_InternalID-231072.pdf",
"source": "product-security@axis.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-9504",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-26T08:15:08.180",
"lastModified": "2024-11-26T08:15:08.180",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Booking calendar, Appointment Booking System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.2.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://hacked.be/posts/CVE-2024-9504",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3195800/booking-calendar",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fb05281-205f-4d9c-aac9-2b37e069a6fb?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-26T05:03:25.994917+00:00
2024-11-26T09:01:03.364720+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-26T04:15:05.690000+00:00
2024-11-26T08:15:08.180000+00:00
```
### Last Data Feed Release
@ -33,27 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271300
271331
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `31`
- [CVE-2024-11342](CVE-2024/CVE-2024-113xx/CVE-2024-11342.json) (`2024-11-26T04:15:04.030`)
- [CVE-2024-11418](CVE-2024/CVE-2024-114xx/CVE-2024-11418.json) (`2024-11-26T04:15:05.237`)
- [CVE-2024-49351](CVE-2024/CVE-2024-493xx/CVE-2024-49351.json) (`2024-11-26T04:15:05.457`)
- [CVE-2024-49353](CVE-2024/CVE-2024-493xx/CVE-2024-49353.json) (`2024-11-26T04:15:05.690`)
- [CVE-2024-49595](CVE-2024/CVE-2024-495xx/CVE-2024-49595.json) (`2024-11-26T03:15:06.093`)
- [CVE-2024-49596](CVE-2024/CVE-2024-495xx/CVE-2024-49596.json) (`2024-11-26T03:15:06.570`)
- [CVE-2024-49597](CVE-2024/CVE-2024-495xx/CVE-2024-49597.json) (`2024-11-26T03:15:06.940`)
- [CVE-2024-10857](CVE-2024/CVE-2024-108xx/CVE-2024-10857.json) (`2024-11-26T07:15:05.003`)
- [CVE-2024-11002](CVE-2024/CVE-2024-110xx/CVE-2024-11002.json) (`2024-11-26T07:15:05.413`)
- [CVE-2024-11202](CVE-2024/CVE-2024-112xx/CVE-2024-11202.json) (`2024-11-26T08:15:03.710`)
- [CVE-2024-28038](CVE-2024/CVE-2024-280xx/CVE-2024-28038.json) (`2024-11-26T08:15:04.873`)
- [CVE-2024-28955](CVE-2024/CVE-2024-289xx/CVE-2024-28955.json) (`2024-11-26T08:15:05.043`)
- [CVE-2024-29146](CVE-2024/CVE-2024-291xx/CVE-2024-29146.json) (`2024-11-26T08:15:05.203`)
- [CVE-2024-29978](CVE-2024/CVE-2024-299xx/CVE-2024-29978.json) (`2024-11-26T08:15:05.353`)
- [CVE-2024-32151](CVE-2024/CVE-2024-321xx/CVE-2024-32151.json) (`2024-11-26T08:15:05.513`)
- [CVE-2024-33605](CVE-2024/CVE-2024-336xx/CVE-2024-33605.json) (`2024-11-26T08:15:05.650`)
- [CVE-2024-33610](CVE-2024/CVE-2024-336xx/CVE-2024-33610.json) (`2024-11-26T08:15:05.810`)
- [CVE-2024-33616](CVE-2024/CVE-2024-336xx/CVE-2024-33616.json) (`2024-11-26T08:15:05.987`)
- [CVE-2024-34162](CVE-2024/CVE-2024-341xx/CVE-2024-34162.json) (`2024-11-26T08:15:06.123`)
- [CVE-2024-35244](CVE-2024/CVE-2024-352xx/CVE-2024-35244.json) (`2024-11-26T08:15:06.273`)
- [CVE-2024-36248](CVE-2024/CVE-2024-362xx/CVE-2024-36248.json) (`2024-11-26T08:15:06.430`)
- [CVE-2024-36249](CVE-2024/CVE-2024-362xx/CVE-2024-36249.json) (`2024-11-26T08:15:06.580`)
- [CVE-2024-36251](CVE-2024/CVE-2024-362xx/CVE-2024-36251.json) (`2024-11-26T08:15:06.760`)
- [CVE-2024-36254](CVE-2024/CVE-2024-362xx/CVE-2024-36254.json) (`2024-11-26T08:15:06.923`)
- [CVE-2024-47257](CVE-2024/CVE-2024-472xx/CVE-2024-47257.json) (`2024-11-26T08:15:07.583`)
- [CVE-2024-53278](CVE-2024/CVE-2024-532xx/CVE-2024-53278.json) (`2024-11-26T05:15:10.563`)
- [CVE-2024-6476](CVE-2024/CVE-2024-64xx/CVE-2024-6476.json) (`2024-11-26T07:15:05.697`)
- [CVE-2024-6749](CVE-2024/CVE-2024-67xx/CVE-2024-6749.json) (`2024-11-26T07:15:05.857`)
- [CVE-2024-6831](CVE-2024/CVE-2024-68xx/CVE-2024-6831.json) (`2024-11-26T08:15:07.747`)
- [CVE-2024-8160](CVE-2024/CVE-2024-81xx/CVE-2024-8160.json) (`2024-11-26T08:15:07.893`)
- [CVE-2024-8772](CVE-2024/CVE-2024-87xx/CVE-2024-8772.json) (`2024-11-26T08:15:08.033`)
- [CVE-2024-9504](CVE-2024/CVE-2024-95xx/CVE-2024-9504.json) (`2024-11-26T08:15:08.180`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `5`
- [CVE-2023-5685](CVE-2023/CVE-2023-56xx/CVE-2023-5685.json) (`2024-11-26T03:15:03.853`)
- [CVE-2020-11311](CVE-2020/CVE-2020-113xx/CVE-2020-11311.json) (`2024-11-26T05:15:07.710`)
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-11-26T08:15:04.400`)
- [CVE-2024-26258](CVE-2024/CVE-2024-262xx/CVE-2024-26258.json) (`2024-11-26T08:15:04.673`)
- [CVE-2024-42412](CVE-2024/CVE-2024-424xx/CVE-2024-42412.json) (`2024-11-26T08:15:07.073`)
- [CVE-2024-43689](CVE-2024/CVE-2024-436xx/CVE-2024-43689.json) (`2024-11-26T08:15:07.347`)
## Download and Usage

View File

@ -112891,6 +112891,7 @@ CVE-2018-11878,0,0,a7577880f8317e8f6cb5939c708818c2a887b8562ecbec920a08c1f1686e8
CVE-2018-11879,0,0,005ea63e1da8f5f6c647549e29c98779ed6d3daa520fcbc9169194bed09b0a4d,2019-04-03T11:29:04.113000
CVE-2018-1188,0,0,d02a3f88c911ccac244cd017c7a788b3321fb51f0f9b2d6baef8800cdc1ab7ba,2024-11-21T03:59:21.693000
CVE-2018-11880,0,0,627da105a8c393e5ae596adbacb419520e80fa16dfd213f152a8c8b56730b4fd,2019-04-03T11:29:04.177000
CVE-2018-11881,1,1,3a755b3f5f2fc9cd8ff346db847e8530466459c765b806a0ccc508687869445f,2024-11-26T05:15:05.710000
CVE-2018-11882,0,0,3af8f5703cb0ad8a12381acc51af1ccb69803be80ca51b430f92e26b3e0a8711,2019-04-03T11:29:04.257000
CVE-2018-11883,0,0,be94c1c74171b575bb79bd3d4b626fae0b5be0a713fa28e9bf9d5fc23d03b76a,2018-11-09T17:30:56.937000
CVE-2018-11884,0,0,73bdf9becc23beaf6ddccb8dff7eedf1e71532059116858acc33fc391c373cdf,2019-04-03T11:29:04.333000
@ -146412,7 +146413,7 @@ CVE-2020-11308,0,0,66b4669aa5e5b819ab80edcc6fda2683f4834b645dd0c16ebea4260f308b1
CVE-2020-11309,0,0,7980999164868c5bde422ff7b9ccda24962c06a58981e917b64ea5a5a435e8fd,2021-03-25T15:22:09.177000
CVE-2020-1131,0,0,a9049866d75f4915e3812e50ea536849d9c01aad152004482ccd64c4b0643a62,2024-11-21T05:09:48.683000
CVE-2020-11310,0,0,47d35e42ba3f4a25b280e3fff4a30859cfba407864465e7d2f0b747fd19252fe,2023-11-07T03:14:32.537000
CVE-2020-11311,0,0,5ab03956373554e4b6763630083a57c2bb6ee151196d1bab3f750c33cdd99cd0,2024-11-25T05:15:05.273000
CVE-2020-11311,0,1,ee2ed034f1d9ed4300caba9ca5c05990183b2110a523713d9157725327b6253f,2024-11-26T05:15:07.710000
CVE-2020-11312,0,0,56bf1800f2768291840c5b431a8881b7c8b2647989f6c405ff772d61d14664a3,2023-11-07T03:14:32.840000
CVE-2020-11313,0,0,ea35f7cdc0d725fb735ee147cfd4f5a340a5238dd9757cb42588010c057fbcdf,2023-11-07T03:14:33.090000
CVE-2020-11314,0,0,aa08505486d8f875594538a34810d4a643b780fe6abf664805df8465b3f90a74,2023-11-07T03:14:33.317000
@ -201338,6 +201339,7 @@ CVE-2022-3384,0,0,96fe3cc278e1f3578dbc1d8d62394e5c9eddc659181269d530fc8ac3bbdc5c
CVE-2022-3385,0,0,593b498fcb0cd2378f428b865b2c178f379994b53e509b93e0f7adb1190b75c9,2023-11-07T03:51:12.023000
CVE-2022-33859,0,0,4f6c46dbd95d2e30f74773ec2fb4175cc8bb5b7e4b617fff9df1ff547df67421,2023-10-18T07:15:08.907000
CVE-2022-3386,0,0,90dc1a983cc18883ffe68459fec9534e1c2fd9244045d36ead7ebbc988b2193d,2023-11-07T03:51:12.170000
CVE-2022-33860,1,1,58bb4e4204d245cec3c37ca2a717e4a221cdabf8b4b61aacdb04838ab08a5d98,2024-11-26T06:15:07.343000
CVE-2022-33861,0,0,03676ee7872a13973444412a633314402e275d9e83b5435637fabe65b0d77f06,2024-11-25T09:15:05.277000
CVE-2022-33862,0,0,b22964cc6b97d5cae40bd76583cbd81265427219322bb5cecdbf5ae52396d993,2024-11-25T09:15:05.440000
CVE-2022-33869,0,0,951d166efce7f75a6c1edb2c957deb07e0cda49de5698edaa1b40636fa981910,2023-11-07T03:48:22.783000
@ -240289,7 +240291,7 @@ CVE-2023-5681,0,0,d7491800836d2388e22440d68a862dd278a82c18bac217a1d7b7b5fd9c0595
CVE-2023-5682,0,0,6c4d8f1b67779094e044998a8632d6e355d570ee581670705952e7860caa17b4,2024-05-17T02:33:13.400000
CVE-2023-5683,0,0,eb0b32b0ce9a3963660a0f0ab5d192ab16a842927262b341b5da09de23b03195,2024-05-17T02:33:13.503000
CVE-2023-5684,0,0,3c315e93340887d948ed19808da0318174ccf3ecaa159f738b444123fbaddfe4,2024-05-17T02:33:13.620000
CVE-2023-5685,0,1,118c822d8a774faf91271fc6657bb1a17d0325b3e424df38fb53fdcf18f9dff6,2024-11-26T03:15:03.853000
CVE-2023-5685,0,0,118c822d8a774faf91271fc6657bb1a17d0325b3e424df38fb53fdcf18f9dff6,2024-11-26T03:15:03.853000
CVE-2023-5686,0,0,0d078c68756896175dead30ab40922e082f7f3a5b5772bce14d9cf4eb796a8c9,2024-01-21T03:20:51.297000
CVE-2023-5687,0,0,b43440b744a7afe9bbcecf35486c4aa29c5cc608c95d55fd98b243af67ec6fc5,2023-10-27T18:51:42.730000
CVE-2023-5688,0,0,63a2890764448cd6c331d652f191d177448e86b18c19818092bd8bf33157888d,2023-10-27T18:51:36
@ -242986,6 +242988,7 @@ CVE-2024-10468,0,0,83bc1c79b32264405aab0075e1e410144135f8ec245c6acd9a90fb3cdcacd
CVE-2024-10469,0,0,c023e9dfb8e38961747979c6b3a11e6b64f49a167ced1df26b660ad57b7e9425,2024-11-05T16:51:35.450000
CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000
CVE-2024-10470,0,0,a1e42a94b1ab92bb172948d5f556160411eda471cfe55f94496fa89ac969feb5,2024-11-12T13:56:24.513000
CVE-2024-10471,1,1,81f508e378a965ecd5fa34856ea71a3f431854a83b2ebbffe8ceae5e1096ee9d,2024-11-26T06:15:07.520000
CVE-2024-10474,0,0,e927def1f3fd2126e99e660d96adf5a931edb32585de89bb5c57d9d2e8d1c817,2024-11-04T13:34:48.513000
CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b307,2024-10-29T14:34:04.427000
CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000
@ -243027,6 +243030,7 @@ CVE-2024-10537,0,0,6d7d3981c9a8a70571103d8ad66e6c8952dbf9156b3acdb77755dd3420712
CVE-2024-10538,0,0,4258e87072a64a27fee35a0841a3c5095b5fad35eea820564ce6eaffa01f0137,2024-11-14T13:27:00.400000
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
CVE-2024-10540,0,0,d72994b8ce256d6087bbd8c05a3cb9446a5f50c733a3ad70b615c2d8dd4c3c0c,2024-11-04T13:18:27.017000
CVE-2024-10542,1,1,89806b1e0a8540c6c58c061f04f69ebafa8231c02ffc8a44e3927b57acbdcdfc,2024-11-26T06:15:07.683000
CVE-2024-10543,0,0,78e6de226aa4ccb5cb5b260268ce156b234621147350989dafddd9817bf9323e,2024-11-08T21:19:02.700000
CVE-2024-10544,0,0,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000
CVE-2024-10546,0,0,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000
@ -243038,6 +243042,7 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
CVE-2024-10570,1,1,c512ffde6a7106ceaaceffb83d70a1ad2c299d9e7c750445faea3d54adc81ae2,2024-11-26T06:15:07.880000
CVE-2024-10571,0,0,764d0722def38a147b3ba290b54cc9e9aebe855b12c99828d9c801c2e02fe1a0,2024-11-19T15:46:52.187000
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
CVE-2024-10575,0,0,924d12914fd797ca7b437680e7624f960ff1fb4e9a84f0339e46e831bcf19838,2024-11-19T17:28:06.750000
@ -243184,6 +243189,7 @@ CVE-2024-10770,0,0,0f5897dd9aba481faece95da66f5bd3d6a2ccff92cbfd04ce22fd4f1ffbf1
CVE-2024-10778,0,0,079913d9652b6f58f66290bfdff6b3da5883740d014ac44b1539fe6c742670ea,2024-11-13T17:01:16.850000
CVE-2024-10779,0,0,03484221afac3766470b5ced8d3332eee24d28c027104d12405179c89d30afec,2024-11-12T13:56:24.513000
CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000
CVE-2024-10781,1,1,525208815751629467d033df5e23d63739a60403cc03b8051f4119b633da5911,2024-11-26T06:15:08.057000
CVE-2024-10786,0,0,a76f656d6635ceb4e91d9df4d3549e3d377ef91a9f4fadf29676d949614dad8b,2024-11-18T17:11:17.393000
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000
@ -243229,6 +243235,7 @@ CVE-2024-10852,0,0,f6b203b7b939235aa255ffed248e8cf068dd3b791229b609e430feca6cc83
CVE-2024-10853,0,0,02830723c1cfc34942045c33ee361ea42546311dacb0cff9be0a3634be59c448,2024-11-13T17:01:16.850000
CVE-2024-10854,0,0,15cfe2e17b56db5e0c11761ae38ecac4069d0ddad2bb05d2f72a443bc2fa6485,2024-11-13T17:01:16.850000
CVE-2024-10855,0,0,d7cd537c8ddc42e8b381daa2ada926e04d761570bdc3c7ecb9c761ce484fc4db,2024-11-20T07:15:07.853000
CVE-2024-10857,1,1,7fa5b5a886f884eab497f541a0fe9dbbf359fc91d9012b33d55a7533bd76e633,2024-11-26T07:15:05.003000
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
CVE-2024-10861,0,0,0e475116cbc916b1684eb819921303de89576e8768786550a96cf2c67b7dbecb,2024-11-18T17:11:17.393000
CVE-2024-10863,0,0,73ae75d507e7803adc5662733da40a7cb9c2f90ede6e9111ab7b41f9d928dc1d,2024-11-22T16:15:21.257000
@ -243316,6 +243323,7 @@ CVE-2024-10998,0,0,c1d0d5576e5b5ac9af53ae18f32585f399df56f20f18f57ee7d18eb4fae4d
CVE-2024-10999,0,0,e7ea7377e972e711b7f09c97d1f1904a51f2a45036948c3c337a6d1c65fd2441,2024-11-13T01:05:34.293000
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
CVE-2024-11000,0,0,a7e8d5385c553ca345a72fc5358bdef9d69bb9b3c3980e31af7a0cfb92d81a8f,2024-11-13T01:05:49.643000
CVE-2024-11002,1,1,b6bf6324987f4073b2c9bfe8ed3afef93af42e688e9e8a0c5fdbab27cca15ed5,2024-11-26T07:15:05.413000
CVE-2024-11003,0,0,61bfbb93c4ae10f4af71c16c69643bf462c68ffa94733e59b6f95c78952b7f9b,2024-11-19T21:56:45.533000
CVE-2024-11004,0,0,ae81cd254161ae2b32edcbdeb3c8b9257e0a408bd5a5695d4038ccc9e5adaac9,2024-11-13T17:01:58.603000
CVE-2024-11005,0,0,11c6f0332fc033e5f19567e3b4704591ec391ce7bb38c717fd45eebf4e8bd80e,2024-11-22T17:15:06.803000
@ -243429,6 +243437,7 @@ CVE-2024-11195,0,0,59a97c370771f27b33e51ae1039dc49a821a1858990404541e8309b975c38
CVE-2024-11198,0,0,51d6daea956d8949d0eebe7d036d8836a4c8d5c266ea899d7a1d4229a0290103,2024-11-19T21:57:32.967000
CVE-2024-11199,0,0,1b252293dc51d6f43d3121b045d01eb3c6301ad12927e01a257a520b4287caef,2024-11-23T10:15:03.897000
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
CVE-2024-11202,1,1,51d8d259b86d0f0a0aaf1b7832edde09bf21ffb4ef806afcd5ff2c031b036ac7,2024-11-26T08:15:03.710000
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000
CVE-2024-11208,0,0,eece2216dd32411003d7f73e496d57c02295784efeef0aa80d5e4c5d3e98a4f6,2024-11-19T19:38:51.637000
@ -243503,7 +243512,7 @@ CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f09
CVE-2024-11330,0,0,1c458fab138aae3f3b89b170e15e7403fdc2fbe304c8cf0cbc41ae122ec08539,2024-11-23T07:15:03.737000
CVE-2024-11332,0,0,21d8101c0dd73a7dc8b4a9b045dbbf7a2c40f682ad21bdcbf98ef68d6b970235,2024-11-23T05:15:06.520000
CVE-2024-1134,0,0,92ca7b611a6a52333e888fa3a581b5dbc5c29b22a5e7e62eb553cb40e2cb6d77,2024-05-24T13:03:05.093000
CVE-2024-11342,1,1,bac43c65bfe7c40167758b1f761e157674244a484facce7f4cc928fc94d88934,2024-11-26T04:15:04.030000
CVE-2024-11342,0,0,bac43c65bfe7c40167758b1f761e157674244a484facce7f4cc928fc94d88934,2024-11-26T04:15:04.030000
CVE-2024-1135,0,0,c4e807742cebaf6bf696946dfb175a5e42a114f551ef03f8a1a000797bbd864f,2024-06-30T23:15:02.563000
CVE-2024-1136,0,0,afecf0ebdd615b0db4af51c2dffb234fe058d5206cf056cda6c9c969b40b0967,2024-02-28T14:06:45.783000
CVE-2024-11361,0,0,51b4837c758190b2e89b9741bdbd5713d8df3163c1cfcf1bc7c03ae151745655,2024-11-23T05:15:06.673000
@ -243524,7 +243533,7 @@ CVE-2024-11406,0,0,d4abbee85b1f77460ba170fa7cbcf81435244eeb65babfc1772879a68307a
CVE-2024-11408,0,0,54146805a36bac284d40e39c15c15c6876d5afc53f160d33d40768ebebc9eab4,2024-11-23T05:15:06.990000
CVE-2024-1141,0,0,31012446f41a8e14cd01fac5beb57c8618f6593d63d8f6abd3fca30a025146cd,2024-05-22T22:15:08.627000
CVE-2024-11415,0,0,33ba95f5490e63268a39f93ff44091ae19cc0b92e1f270172254ccc6ede1d872,2024-11-23T04:15:08.760000
CVE-2024-11418,1,1,1127e4fb83ac3b30a1c36f88e01c5bf8c71390c841aa598dea17c87ce6d3a185,2024-11-26T04:15:05.237000
CVE-2024-11418,0,0,1127e4fb83ac3b30a1c36f88e01c5bf8c71390c841aa598dea17c87ce6d3a185,2024-11-26T04:15:05.237000
CVE-2024-1142,0,0,444665e5d63ad8c810b6738875a9c2a9c27bc01781467ef31bed70fec17787e6,2024-03-21T12:58:51.093000
CVE-2024-11426,0,0,2b83b72f632671d15edef71a2fe1b0898a6bd6d43d5d87a70cb93682f02396e8,2024-11-23T05:15:07.153000
CVE-2024-1143,0,0,b8d0c26da5a42e6a02317cbe9672f530b65f02168ce7a3fde71211ebe1a9550d,2024-02-09T19:08:27.423000
@ -248587,7 +248596,7 @@ CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d
CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000
CVE-2024-25576,0,0,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000
CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000
CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000
CVE-2024-25579,0,1,2334dc0dfc6a35e1678047efe2f03994b1d1cbd6e7f94352a106476c186b9728,2024-11-26T08:15:04.400000
CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000
CVE-2024-25580,0,0,aae407d3ca56bd796a76b9a34e38ae064cf192b4e3de93c97edbd1466335c748,2024-10-29T20:35:17.633000
CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000
@ -249172,7 +249181,7 @@ CVE-2024-26254,0,0,024245ede1fede2394fca1e326cc18c265676be3657652d8066482f274ba6
CVE-2024-26255,0,0,def0d1975fa503fc52bece1a738d7a3d0ac65fd2582e7e57928a6ef65a03e34e,2024-04-10T13:24:00.070000
CVE-2024-26256,0,0,3807901f6ac90b4732561ba3ffb11bfe90ae3ad76f283571e61bd6293795a413,2024-10-09T02:15:27.847000
CVE-2024-26257,0,0,066b4f8e21f6da31e18bfde8bcbd77b29d1c931685dc4eb216f9777000563c57,2024-04-10T13:24:00.070000
CVE-2024-26258,0,0,2a9672d6ed0fd06f71f147874c9f6533f22085e94e3e959706ad13fe0557526a,2024-09-09T07:15:16.343000
CVE-2024-26258,0,1,f4248d3e8e928a419f24581b3f206b118893f8adefdd6ccb3d93e9de576bbd15,2024-11-26T08:15:04.673000
CVE-2024-2626,0,0,5a6c338629bbaaf7065165299ae412c08d9197fb3cad2770c12e07d226bcbe56,2024-04-01T15:22:37.883000
CVE-2024-26260,0,0,65643e0ce4f84c48cec78b438df5085c99da999075d065c3a4c15ac8e9f87e0c,2024-06-28T02:15:03.190000
CVE-2024-26261,0,0,513bda7a092399193b5a95cba8191ef907d5160f5f00ea0bdca470614c45d8a0,2024-06-28T02:15:03.423000
@ -250638,6 +250647,7 @@ CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f3
CVE-2024-28030,0,0,383ba087a7d9e03f3729f2d371b6b408a3b63145fc91da4126609ef755900230,2024-11-15T14:00:09.720000
CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000
CVE-2024-28034,0,0,1f04dc65f231aba26563c955179bb55e818d7cb96adc110022207010427ec021,2024-11-05T15:35:10.627000
CVE-2024-28038,1,1,1ba695407daac557b4b1ebe4cf9c9267208d26dcb4f8a7ee455c49c646848593,2024-11-26T08:15:04.873000
CVE-2024-28039,0,0,3a8376c4c37b22221c3249737981025e902f9cb4913edf8d0bc477677335599e,2024-08-01T13:48:56.840000
CVE-2024-2804,0,0,f94784ce7208522cdb239257db0640b294e390aa5a8ad545b6674bfcf666c26b,2024-04-10T13:23:38.787000
CVE-2024-28040,0,0,21719c3860720b51f714db5e12d335d65a6dfdafe50ecd38637f05a181e13a6d,2024-03-22T12:45:36.130000
@ -251218,6 +251228,7 @@ CVE-2024-28950,0,0,d87cf536998f19ca3ea46db1e2a2b6eb63d52069373bbccf1f977f66004b1
CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000
CVE-2024-28952,0,0,03ce4d26ea83e91549021668eb00f7a216a1167d8d20f0cad44e8ebe7a2762af,2024-11-15T14:00:09.720000
CVE-2024-28953,0,0,bf15e6214517ab8261fa8ae7ceac88b061cfcb90015627f72b13aec9e1761bc6,2024-08-14T17:49:14.177000
CVE-2024-28955,1,1,c3ae4f641e2f636ff001fadd7ac5717242b015e25a6ee7a23cb0d8fc07b6d114,2024-11-26T08:15:05.043000
CVE-2024-28957,0,0,99432bbf0e2944655d9b3d14025b17e0714441ee50861d2d06b13856968b6443,2024-08-29T20:36:38
CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000
CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c376,2024-07-03T01:51:57.697000
@ -251401,6 +251412,7 @@ CVE-2024-29140,0,0,7dfd3d07ac776b1ed3210fc9dc9693191a9a0b78ee052584a7764f3cf46ec
CVE-2024-29141,0,0,7df8c5cfc3ead6297dc074977e4d7d2454ed15b4b07a73de90f11f07eb72b8bc,2024-03-19T14:31:27.883000
CVE-2024-29142,0,0,061608a60bd309f905f4d19889d6b64bb9b1a0d9d93bbc96f304394814bdd569,2024-03-19T14:31:27.883000
CVE-2024-29143,0,0,ed69b2d9180032c6bcf01e4d99bd2a1b22e1518c20ff0cda172d21a651ffdd36,2024-03-19T13:26:46
CVE-2024-29146,1,1,d1379564c0c6159afd8169f9dd48944366c0cc9288fe236c2996a59104d1ce79,2024-11-26T08:15:05.203000
CVE-2024-29149,0,0,3887e60eeb63bc9cafb3d652beff1219d97a4604919fa5ac1837a650a43ed85b,2024-07-03T01:52:06.800000
CVE-2024-2915,0,0,fa39838c2e0ba58063df869e29623fc73b77acf2be583ac3e3fe2de7a06ef37a,2024-10-28T19:35:24.793000
CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000
@ -251902,6 +251914,7 @@ CVE-2024-29974,0,0,95c960f3663ca805207b0282e4dd55b7db41b4855a5d3cd2356d3cbb0de9e
CVE-2024-29975,0,0,dd90f52c857658c1e55bb6a9eabcbfa685a04e70242168e88b92597613e79ebb,2024-08-02T02:15:17.723000
CVE-2024-29976,0,0,2e76e5f749f89d166e8f60e11fac3f53e046bc0b5b2bd2c0bb26a6cb79b733c7,2024-08-02T02:15:17.820000
CVE-2024-29977,0,0,5563b7796409ef117337fa79f3e429d4d505556f415621ebfaf7a5a980fdb6af,2024-08-23T14:52:19.923000
CVE-2024-29978,1,1,21b8c7a9090a7705f8c7eb2035360bfe887f64f37adff521699fbd66d3246bcf,2024-11-26T08:15:05.353000
CVE-2024-2998,0,0,529e4d63a60fb43eff1450ddb35e7521c436b06357cd9f933bf7536e9ff53bd8,2024-05-17T02:38:41.883000
CVE-2024-29981,0,0,87a31a61cdf81b98bbc6bd8e79883f9fedc6f421fdbf6cfb239f24353327db62,2024-05-28T23:15:17.270000
CVE-2024-29982,0,0,2b0e311c693a5c01164acb4d684911085c875bf98c0b51fd697730431b87aa78,2024-04-10T13:24:00.070000
@ -253596,6 +253609,7 @@ CVE-2024-32147,0,0,ed14700cccfb0cda87a633109f0f7bc757ba5c2081f42bfda22f3a7feb6f7
CVE-2024-32148,0,0,22eaa682ca57be740d99255c2e5fbd248f14af606d84d6d3c9100973529ff0b8,2024-06-13T18:36:45.417000
CVE-2024-32149,0,0,b2b226678f5b6fc3063af16db3df1b1f5beae60c5b5de2cd72494f3a01514fcc,2024-04-15T13:15:31.997000
CVE-2024-3215,0,0,e5fb2a5f0603876a47fbaf0581a5b0a27f3e787377440e3d933b055fa124676e,2024-05-02T18:00:37.360000
CVE-2024-32151,1,1,8c339ed5932b607ffa17b81066f5ee474a07a6779f814d26ae344849bc4db291,2024-11-26T08:15:05.513000
CVE-2024-32152,0,0,df67a1c7620164eaaccbec2e8f2fd9292dea378bf2d693bf6152652954ec5ae3,2024-09-06T17:22:12.383000
CVE-2024-3216,0,0,36d9056f12425336af262dd787bf04647621823ca6d005690ab6601a9ec48458,2024-04-08T18:49:25.863000
CVE-2024-32161,0,0,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000
@ -254646,12 +254660,15 @@ CVE-2024-33601,0,0,1e872276284c72121f6aaeefc175b69e15bd1ff785d0661b2fa91a7a25fea
CVE-2024-33602,0,0,86deb6f1e6a3eb7f53cef6d50563acba68abbbbc8944080d8d45f1adacf78d24,2024-07-22T18:15:03.583000
CVE-2024-33603,0,0,dd2c640710464d77e12c3cf25cda315c5368032fba1e17806066e822f0955991,2024-11-13T18:39:49
CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877fcf5,2024-05-08T17:05:24.083000
CVE-2024-33605,1,1,caaa76b86c3ff7492d0a97f280ee5a99cadd68c3613aaec26025156bdea3202c,2024-11-26T08:15:05.650000
CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000
CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000
CVE-2024-3361,0,0,3987591b20407a1c515606479571376257c715748e7334237cf48ed958e6de1a,2024-05-17T02:39:52.620000
CVE-2024-33610,1,1,bf6211ed418b7926cc9efc71892371f73adb48d4dea1264ebcb0e4e8e8e8864d,2024-11-26T08:15:05.810000
CVE-2024-33611,0,0,cf39a65aaa20c224e34d51f4ed23923edc045062aed1a2cad8c463648c07e8b6,2024-11-15T14:00:09.720000
CVE-2024-33612,0,0,74c7c883d3664c00836e065c241cfad127fb1c2fb9de0c3022446dbc1326076a,2024-05-08T17:05:24.083000
CVE-2024-33615,0,0,2c0c4d1e8ef406786c1679d725fd5d6b0a90745e47351d773c9f2720f2fe7461,2024-05-16T13:03:05.353000
CVE-2024-33616,1,1,44c021151d827b44a79d292bec5e44784b5aaea7b12b92de48886b6072aff323,2024-11-26T08:15:05.987000
CVE-2024-33617,0,0,48b1ad41b5cd3e3d5db84d8c4b46a345ab8193d6715efa3057992b1f283e39f6,2024-11-15T14:00:09.720000
CVE-2024-33619,0,0,2684fa8fefc27f2e1a5ed51c39fc9579fbba8ac802fe77fdcca9db705628800f,2024-06-21T11:22:01.687000
CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad420,2024-05-17T02:39:52.720000
@ -255093,6 +255110,7 @@ CVE-2024-34156,0,0,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295
CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000
CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000
CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000
CVE-2024-34162,1,1,109242d827d21b07e4ab406abf6737a73fcc105a38ee1f441d43c7fa2b6bfee7,2024-11-26T08:15:06.123000
CVE-2024-34163,0,0,2f9be74221a126c780fee9df35c4749361e313e79808498cd64aeaba263e49d6,2024-09-12T18:59:30.753000
CVE-2024-34164,0,0,efd8b638f6022da57f6ee2faeaf60e8940a4bab962493112791d300389f055b1,2024-11-15T14:00:09.720000
CVE-2024-34165,0,0,5f3c8ad4b4e4d0e5bc71a03e42e033328c198fcf3d84a7a78168501b66f95043,2024-11-15T14:00:09.720000
@ -255861,6 +255879,7 @@ CVE-2024-3524,0,0,caaaa672c1583c111467dc987fb30c87160b7f141d39c66ef33b7bd5d6f222
CVE-2024-35240,0,0,10f7cfa87efb80189efe3d266bfaf6f2d74876bd1f9be0a2a318dfa5c5196863,2024-05-29T13:02:09.280000
CVE-2024-35241,0,0,cb282beda3e169f0ffe5213a46ad14d5235aa62b1613d6fd39f98e381add4a7d,2024-06-20T09:15:11.993000
CVE-2024-35242,0,0,582d7cb6c304b8940a8805c990f3fb7ff37dec36204966ddd8a9cce31009f1cf,2024-06-20T09:15:12.140000
CVE-2024-35244,1,1,e5696b8f2cafa861e8a2a9f26f22e2ef250e8fa5f22792a3545a1cfe52ae13a1,2024-11-26T08:15:06.273000
CVE-2024-35245,0,0,0abf4f6509e66549f5f43f7be33ca478585d0e9b90c24e0597504467160d28c3,2024-11-15T14:00:09.720000
CVE-2024-35246,0,0,cc5250190c0b6d05aacf7ab7e1559a6a667a42d50dc12d387326d113c4c39730,2024-06-21T11:22:01.687000
CVE-2024-35247,0,0,88bbd7eea3b694f188b138a274c2cc76eba6f7f74ce49816ad3caef11da1dd52,2024-06-24T19:26:47.037000
@ -256700,10 +256719,14 @@ CVE-2024-36244,0,0,72ec9199c50b58fba1710bd51385a13f86b624ab2159e939e6a1444afbe8d
CVE-2024-36245,0,0,dde3668c508a0a731afb7367784c1ce5e9599c5845e89faea97d8a30d6c66563,2024-11-15T14:00:09.720000
CVE-2024-36246,0,0,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000
CVE-2024-36247,0,0,16c6efe40503daf1080fcbf6d9a009e1a3c1386098439c6bda19cf80a4941086,2024-09-23T14:16:11.290000
CVE-2024-36248,1,1,10e154d0697e3b3bb59a5e52b9d5c72f727d254297b565b97de8210c55805ec5,2024-11-26T08:15:06.430000
CVE-2024-36249,1,1,c1e49ed40efbf9d773d33fed7fa8a96841b1e33043c5c2fa81dea76adc39ebd3,2024-11-26T08:15:06.580000
CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000
CVE-2024-36250,0,0,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000
CVE-2024-36251,1,1,c4c359abbe3af5727346e49a8dd4bdceb8aa86217f56f68e283b85a2583467df,2024-11-26T08:15:06.760000
CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000
CVE-2024-36253,0,0,440d7b8249c4286c7e09d3a45cabb0a3006bd48cbd66e9aa33e43eb576c7fb12,2024-11-15T14:00:09.720000
CVE-2024-36254,1,1,98b54ac8633be29f60d4c555d974ffc595c64932b9e730d2e5da42c1fe779493,2024-11-26T08:15:06.923000
CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000
CVE-2024-36257,0,0,de59e82b2cc868e7dbd975a3494539da4e2b96eaf9e15fff111a5d725848914c,2024-07-05T17:06:28.517000
CVE-2024-3626,0,0,ecad313ba7341fd9bbe18ef0c6d316a3039cc88d660f7ee647b2392d610decc0,2024-05-24T01:15:30.977000
@ -260995,7 +261018,7 @@ CVE-2024-42406,0,0,e90d9dcd097bb16d679ffd30ffcb27f45aae84621913c19f8cb847809bb0e
CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000
CVE-2024-42412,0,0,344e1b37b83fa96ca2162affade3fd39accb3b8f0b9118fec72f076f637c0a9e,2024-10-27T16:35:00.983000
CVE-2024-42412,0,1,6a9ffe69049be008b8ff459fef4ab0b338252452e67216fc9502fbd6f637f1b8,2024-11-26T08:15:07.073000
CVE-2024-42415,0,0,54b88b1483f9dbb417e72d5eac636a64ce9431f976ae33821cfda8b39e97e793,2024-10-09T16:44:20.360000
CVE-2024-42416,0,0,0c0ba6b9334c7e838b8d455f49871ca47f5d5630f34ccb39214f945ba545086b,2024-09-05T21:25:09.273000
CVE-2024-42417,0,0,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475a69,2024-10-08T15:43:05.720000
@ -261910,7 +261933,7 @@ CVE-2024-43685,0,0,a89a9c99e0124da64988793c53f10ebfe259e8367a37913b86ec873ac50d0
CVE-2024-43686,0,0,57da9b9a959d579b6b38566543c182c3ea32961f0f4f75db16d108202427ec80,2024-10-16T19:20:57.230000
CVE-2024-43687,0,0,2d688f9009e177644291437898c6abc2a42e1449965d5242ebc6bc49d96ae3d9,2024-10-16T19:28:09.177000
CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000
CVE-2024-43689,0,0,6f23e58b4260cafda21579386b8aee6692125d25e44c62a3506c2f2048e021e4,2024-10-24T14:02:22.077000
CVE-2024-43689,0,1,aae1d50ee3cc8d9d2d1a04db198f2f42e9f7bb49447e735666ab02d89e4abba2,2024-11-26T08:15:07.347000
CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000
CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000
CVE-2024-43692,0,0,dd90c0c7ec0961e33104688c3a64f24371b069eba59a503241b07b01ecbb28f7,2024-10-01T16:22:38.197000
@ -264056,6 +264079,7 @@ CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f9
CVE-2024-47253,0,0,0c81facaa1aa1f7ae0b0e27b1673e803ebaeec77aef71a1827f37f9dbd7dbd49,2024-11-07T12:15:24.630000
CVE-2024-47254,0,0,81bb7fbcf9de24b32604c709597f53a5bfd5dadb66fc238800b57d25b4c1a55f,2024-11-07T12:15:24.747000
CVE-2024-47255,0,0,4e4181b499a17b720343878ad776ef93b384b10f1546c28d389a3c7b495a0310,2024-11-07T12:15:24.857000
CVE-2024-47257,1,1,6e9aa7aa322707c0902010d343884ecacf2481e3b9bbb41daf700d654b64ad32,2024-11-26T08:15:07.583000
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
@ -265258,8 +265282,8 @@ CVE-2024-49334,0,0,bcc2db18f40dffe6c4f8472b0ef26870ffad9612f58222d9017252998c694
CVE-2024-49335,0,0,64cc1bcb12301e7e8f03bc857d01393c7ba079fd3a08962dcf26c673c0054a8c,2024-10-24T14:50:16.557000
CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000
CVE-2024-49340,0,0,ac31e0788e5efdd9e643807e1798bcc72e4ae5b0b8213bfd46baffe09e220ce8,2024-11-08T15:06:21.730000
CVE-2024-49351,1,1,61bf934cc2e531cb754499c209e467302d16943993e1ea3a9b8cf8bc0457c2d4,2024-11-26T04:15:05.457000
CVE-2024-49353,1,1,9c97812a4579bafd3b230c433431e7d8c5f9373807385b227e5af52ffb4a16e8,2024-11-26T04:15:05.690000
CVE-2024-49351,0,0,61bf934cc2e531cb754499c209e467302d16943993e1ea3a9b8cf8bc0457c2d4,2024-11-26T04:15:05.457000
CVE-2024-49353,0,0,9c97812a4579bafd3b230c433431e7d8c5f9373807385b227e5af52ffb4a16e8,2024-11-26T04:15:05.690000
CVE-2024-49357,0,0,6503b40a74a6613085cacc3815bfdb01e01bab8ce0bff54535ea857ed7d26be9,2024-11-06T15:28:38.160000
CVE-2024-49358,0,0,df99e254916c8dff27bc118ecfd140161a54ef4581a6841d720c531a5bf44aba,2024-11-06T15:27:26.637000
CVE-2024-49359,0,0,cc09522176dca55ed443e811571748ebfc3f0f5a4f89d4ec44c17a0a8a645881,2024-11-06T15:27:02.347000
@ -265355,9 +265379,9 @@ CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae15
CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000
CVE-2024-49592,0,0,c703ea90112e8bcf8bd25130b1345e2b105fcdfcaded2bbe98ade97b760a4e11,2024-11-18T17:11:56.587000
CVE-2024-49593,0,0,0790debc03c6d685a8ce9800bcaf05d3a2d51714ee514270485ccb66f44467d5,2024-11-18T19:35:04.960000
CVE-2024-49595,1,1,b23fd80b60ac647f05027d85537df31a89ac4114f3b437db461e9c48fece4a35,2024-11-26T03:15:06.093000
CVE-2024-49596,1,1,59e71c8fcc49b547b7105baadcec16161b1e8926ccc4ef3d091ff33a55518621,2024-11-26T03:15:06.570000
CVE-2024-49597,1,1,0ed9c472548512fdbebd47665245e9475dd32b69328def0424455c0672cbd4c3,2024-11-26T03:15:06.940000
CVE-2024-49595,0,0,b23fd80b60ac647f05027d85537df31a89ac4114f3b437db461e9c48fece4a35,2024-11-26T03:15:06.093000
CVE-2024-49596,0,0,59e71c8fcc49b547b7105baadcec16161b1e8926ccc4ef3d091ff33a55518621,2024-11-26T03:15:06.570000
CVE-2024-49597,0,0,0ed9c472548512fdbebd47665245e9475dd32b69328def0424455c0672cbd4c3,2024-11-26T03:15:06.940000
CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000
CVE-2024-49604,0,0,4130a6c1f975a0d07098374dd7fb4ff2ab97718728858633e395173b92657205,2024-10-23T15:49:25.567000
CVE-2024-49605,0,0,21fbfbd0533f40e566065b86694a265ad75f1074bc1863301e12bf2d3d8773cf,2024-10-24T14:57:49.617000
@ -267427,6 +267451,7 @@ CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3
CVE-2024-53262,0,0,b58ac4cb966f18ebf91dd1e51ed9015ec986a3fab28fed8c4a716894290c935b,2024-11-25T20:15:10.423000
CVE-2024-53268,0,0,007aa1474b5fa3204d1321367c5c9ffff4ab0370ad189bb72596a6cd01d88cfa,2024-11-25T20:15:10.583000
CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000
CVE-2024-53278,1,1,1edc5c251ee4bcfedd995bcbf8c129ae024665a932e08b92e99c76ae653deb38,2024-11-26T05:15:10.563000
CVE-2024-5328,0,0,389f7ef980e9d16941bc44acc7d327871d53fb707d54ba8870eb280f34f36d8b,2024-07-23T19:41:49.540000
CVE-2024-5329,0,0,455e8737b3d3fdaf4e090dd4445471ebeb638ae4f41003db454e4798dec65f13,2024-10-14T13:43:12.070000
CVE-2024-5330,0,0,d052f676e850b1a7538b470735e7fe5f7dfb3046b39fa2778831cd7f8fdd99b2,2024-08-01T12:42:36.933000
@ -268485,6 +268510,7 @@ CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc77
CVE-2024-6471,0,0,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d366,2024-08-23T16:47:32.537000
CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000
CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000
CVE-2024-6476,1,1,0370dbdd5727136594c530b872469f044070e5481ffe30d61f2543823a6399da,2024-11-26T07:15:05.697000
CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000
CVE-2024-6479,0,0,c8f8d548256983f37f1a1f914a4517a4b6525cba3baa0c1cf39c2a4bf229f79d,2024-11-01T12:57:03.417000
CVE-2024-6480,0,0,7bcb03d66a5fa0166ee462f7c92d213eea433092d03296e333b90f9f0f0fccdd,2024-11-01T12:57:03.417000
@ -268720,6 +268746,7 @@ CVE-2024-6745,0,0,1617c1b62a6985e7cfd1493a4e6106081b5b226c76f4caaa1064224772ef70
CVE-2024-6746,0,0,a07904c7ab441e8aefcdf67187efe0701752648d282a9adf495048d9805d0f66,2024-07-19T18:02:29.417000
CVE-2024-6747,0,0,0000c09077cd962795fbde814978916c566d78ff452661411d71146a95e7ae22,2024-10-15T13:22:17.563000
CVE-2024-6748,0,0,3165cdb659bfb317f070ab6b5ff0ffe08f8676c2d4210e086188fb527771a712,2024-07-30T13:33:30.653000
CVE-2024-6749,1,1,2490672c4ffdc39c932708a2faf2859ba2c640b574f81fbe1e209d21778c172a,2024-11-26T07:15:05.857000
CVE-2024-6750,0,0,259befaacfd3ee023627d5e60a86696c98cc4bb58920e9f36a409d03ab7792d0,2024-09-03T21:40:22.460000
CVE-2024-6751,0,0,65709f0db2fc5964de358cedefb78e4090d836ca670fed7f74fbf34d4a07dbbd,2024-09-03T21:39:06.433000
CVE-2024-6752,0,0,3322b8d9a07108b4d7f8844e99ca324d2acf62dd128c8d54e626f384defe9b94,2024-09-03T21:36:58.790000
@ -268790,6 +268817,7 @@ CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80fa
CVE-2024-6826,0,0,abddedb129e27da630545079500556677df6390a29a7544ea32b991f1e68fa19,2024-10-25T12:56:07.750000
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
CVE-2024-6830,0,0,aebb528fa5990f215bf59ed6adf1eccff7b523ab0519e4c99385be78311dcd92,2024-10-17T13:33:40.750000
CVE-2024-6831,1,1,0d7f0fe79d51f07497188b312e80cf30f5175160127792ebbd3d6981a3eb001b,2024-11-26T08:15:07.747000
CVE-2024-6833,0,0,b0ea48d29166f6347ac218b4f9f93d3f7fc599fd932b64c35cfa55e5a1a94672,2024-07-18T12:28:43.707000
CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd69630e,2024-08-01T14:00:44.750000
CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de97130779,2024-09-11T16:32:16.247000
@ -269902,6 +269930,7 @@ CVE-2024-8154,0,0,fbb17f9dd590ac994870ad751b395ff693888a574100db6420d6e8a3b3d34a
CVE-2024-8155,0,0,104526467feb0428b2a45114df171b7d6e09efac9bca1bd2f2048b3b33875369,2024-09-12T13:53:23.827000
CVE-2024-8158,0,0,33012ddebc769dbb05ad0933fa5ab17b9a29e8fda58104c3b0868628fb6c230f,2024-09-12T21:00:00.573000
CVE-2024-8159,0,0,187743c6b0677e5a77406a2f8244c876b899aabb1cac71216ceccd6d74ccce3c,2024-10-04T13:50:43.727000
CVE-2024-8160,1,1,8b7a7fe92daa04981b635cf999261099b4066e2c095f85d6a79dda85ed7c340a,2024-11-26T08:15:07.893000
CVE-2024-8161,0,0,b695c0171728397a80eb00146225c0169779aabf8de6c566aa00c71a077959b1,2024-08-26T12:47:20.187000
CVE-2024-8162,0,0,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000
CVE-2024-8163,0,0,34076faaf51f1e489aa58346c56061ee9718b828b5ae0365e6c357cdf31c941d,2024-09-06T22:18:19.283000
@ -270375,6 +270404,7 @@ CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
CVE-2024-8772,1,1,69fe2194f6f1a272b95a9dfa955e0defecb0d89f2fa80479731934d1afc5a40a,2024-11-26T08:15:08.033000
CVE-2024-8775,0,0,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
@ -270921,6 +270951,7 @@ CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8
CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000
CVE-2024-9500,0,0,a3c03f4a2da5e76f37827cc5472849fd1bec52b508254b9d9e4dd8dde68494f7,2024-11-18T17:11:17.393000
CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000
CVE-2024-9504,1,1,fefa8d0bb3f1d2572b72f6cdfb57ed45074690eac5a6713ab2a18c5e4b2d6493,2024-11-26T08:15:08.180000
CVE-2024-9505,0,0,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000
CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000
CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000

Can't render this file because it is too large.