From dbef05869856faf0dd179f65a5dce80e4af86a70 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 12 Dec 2024 15:03:44 +0000 Subject: [PATCH] Auto-Update: 2024-12-12T15:00:22.918388+00:00 --- CVE-2021/CVE-2021-470xx/CVE-2021-47071.json | 124 ++++++++++++-- CVE-2021/CVE-2021-470xx/CVE-2021-47074.json | 107 +++++++++++- CVE-2021/CVE-2021-470xx/CVE-2021-47076.json | 90 +++++++++- CVE-2021/CVE-2021-471xx/CVE-2021-47148.json | 95 ++++++++++- CVE-2023/CVE-2023-279xx/CVE-2023-27946.json | 6 +- CVE-2023/CVE-2023-279xx/CVE-2023-27949.json | 6 +- CVE-2023/CVE-2023-279xx/CVE-2023-27954.json | 10 +- CVE-2023/CVE-2023-279xx/CVE-2023-27955.json | 6 +- CVE-2023/CVE-2023-279xx/CVE-2023-27956.json | 10 +- CVE-2023/CVE-2023-279xx/CVE-2023-27959.json | 6 +- CVE-2023/CVE-2023-279xx/CVE-2023-27961.json | 10 +- CVE-2023/CVE-2023-279xx/CVE-2023-27963.json | 10 +- CVE-2023/CVE-2023-279xx/CVE-2023-27969.json | 10 +- CVE-2023/CVE-2023-279xx/CVE-2023-27970.json | 6 +- CVE-2023/CVE-2023-281xx/CVE-2023-28178.json | 6 +- CVE-2023/CVE-2023-281xx/CVE-2023-28181.json | 6 +- CVE-2023/CVE-2023-281xx/CVE-2023-28182.json | 10 +- CVE-2023/CVE-2023-281xx/CVE-2023-28194.json | 6 +- CVE-2023/CVE-2023-282xx/CVE-2023-28201.json | 10 +- CVE-2023/CVE-2023-282xx/CVE-2023-28208.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32425.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32428.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32432.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32438.json | 6 +- CVE-2023/CVE-2023-343xx/CVE-2023-34352.json | 6 +- CVE-2023/CVE-2023-381xx/CVE-2023-38136.json | 6 +- CVE-2023/CVE-2023-382xx/CVE-2023-38261.json | 6 +- CVE-2023/CVE-2023-429xx/CVE-2023-42942.json | 6 +- CVE-2023/CVE-2023-429xx/CVE-2023-42974.json | 6 +- CVE-2023/CVE-2023-442xx/CVE-2023-44254.json | 6 +- CVE-2023/CVE-2023-458xx/CVE-2023-45866.json | 6 +- CVE-2023/CVE-2023-490xx/CVE-2023-49069.json | 4 +- CVE-2024/CVE-2024-122xx/CVE-2024-12271.json | 68 ++++++++ CVE-2024/CVE-2024-20xx/CVE-2024-2060.json | 71 +++++++- CVE-2024/CVE-2024-20xx/CVE-2024-2061.json | 71 +++++++- CVE-2024/CVE-2024-20xx/CVE-2024-2062.json | 71 +++++++- CVE-2024/CVE-2024-20xx/CVE-2024-2063.json | 71 +++++++- CVE-2024/CVE-2024-20xx/CVE-2024-2064.json | 73 ++++++++- CVE-2024/CVE-2024-232xx/CVE-2024-23201.json | 6 +- CVE-2024/CVE-2024-232xx/CVE-2024-23228.json | 6 +- CVE-2024/CVE-2024-232xx/CVE-2024-23271.json | 6 +- CVE-2024/CVE-2024-277xx/CVE-2024-27791.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27804.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27810.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27816.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27818.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27821.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27834.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27835.json | 6 +- CVE-2024/CVE-2024-281xx/CVE-2024-28142.json | 37 +++++ CVE-2024/CVE-2024-281xx/CVE-2024-28143.json | 37 +++++ CVE-2024/CVE-2024-281xx/CVE-2024-28144.json | 37 +++++ CVE-2024/CVE-2024-281xx/CVE-2024-28145.json | 37 +++++ CVE-2024/CVE-2024-281xx/CVE-2024-28146.json | 37 +++++ CVE-2024/CVE-2024-364xx/CVE-2024-36494.json | 37 +++++ CVE-2024/CVE-2024-364xx/CVE-2024-36498.json | 37 +++++ CVE-2024/CVE-2024-479xx/CVE-2024-47947.json | 37 +++++ CVE-2024/CVE-2024-505xx/CVE-2024-50584.json | 37 +++++ CVE-2024/CVE-2024-540xx/CVE-2024-54091.json | 12 +- CVE-2024/CVE-2024-541xx/CVE-2024-54118.json | 56 +++++++ CVE-2024/CVE-2024-541xx/CVE-2024-54119.json | 56 +++++++ CVE-2024/CVE-2024-541xx/CVE-2024-54122.json | 56 +++++++ README.md | 73 +++++---- _state.csv | 173 +++++++++++--------- 64 files changed, 1546 insertions(+), 322 deletions(-) create mode 100644 CVE-2024/CVE-2024-122xx/CVE-2024-12271.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28142.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28143.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28144.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28145.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28146.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36494.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36498.json create mode 100644 CVE-2024/CVE-2024-479xx/CVE-2024-47947.json create mode 100644 CVE-2024/CVE-2024-505xx/CVE-2024-50584.json create mode 100644 CVE-2024/CVE-2024-541xx/CVE-2024-54118.json create mode 100644 CVE-2024/CVE-2024-541xx/CVE-2024-54119.json create mode 100644 CVE-2024/CVE-2024-541xx/CVE-2024-54122.json diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47071.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47071.json index c325a2c6b09..a898007ed1b 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47071.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47071.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47071", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:46.967", - "lastModified": "2024-11-21T06:35:20.363", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:43:19.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,141 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uio_hv_generic: corrige una p\u00e9rdida de memoria en las rutas de manejo de errores. Si falla 'vmbus_establecer_gpadl()', (recv|send)_gpadl no se actualizar\u00e1 y aparecer\u00e1 'hv_uio_cleanup()' en el error La ruta de manejo no podr\u00e1 liberar el b\u00fafer correspondiente. En tal caso, necesitamos liberar el b\u00fafer expl\u00edcitamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.122", + "matchCriteriaId": "6530C9FA-EEF8-4821-9186-47F7A1FA3C1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.40", + "matchCriteriaId": "69DD053C-277F-4A8C-9606-11A24F806D05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.7", + "matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47074.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47074.json index 8ea3644eb2e..d543a56d931 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47074.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47074.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47074", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:47.113", - "lastModified": "2024-11-21T06:35:20.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:43:36.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,120 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-loop: corrige la p\u00e9rdida de memoria en nvme_loop_create_ctrl() Al crear el control del bucle en nvme_loop_create_ctrl(), si nvme_init_ctrl() falla, el control del bucle debe liberarse antes de saltar al \"out\" \" etiqueta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.8", + "versionEndExcluding": "5.10.40", + "matchCriteriaId": "F63B848B-094A-4190-B459-A059A6701D88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.7", + "matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47076.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47076.json index bf63420a510..42caa704fa3 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47076.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47076.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47076", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:47.223", - "lastModified": "2024-11-21T06:35:21.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:48:50.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,99 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/rxe: devuelve un error de CQE si se proporcion\u00f3 una clave lv\u00e1lida. A RXE le falta la actualizaci\u00f3n del estado de WQE en fallas LOCAL_WRITE. Esto provoc\u00f3 el siguiente p\u00e1nico en el kernel si alguien enviaba una operaci\u00f3n at\u00f3mica con una clave l expl\u00edcitamente incorrecta. [leonro@vm ~]$ mkt test test_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ... ADVERTENCIA: CPU: 5 PID: 263 en drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe] M\u00f3dulos vinculados en: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core CPU: 5 PID: 263 Comm: python3 No contaminado 5.13.0-rc 1+ #2936 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009 ), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 01/04/2014 RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe] C\u00f3digo: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 0 0 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff <0f> 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 0 0 00 e9 ab e7 ff RSP: 0018:ffff8880158af090 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652 RDX: 1ffff9200004b442 RSI: 0000000 000000004 RDI: ffffc9000025a210 RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff 88800f3b63e8 R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES : 0000 CR0: 0000000080050033 CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0 DR0: 00000000000000000 DR1: 00000000000000000 DR 2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0xb11/0x1d f0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_responder+0x5532/0x7620 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0x9c8/0x1df0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_requester+0x1efd/0x58c0 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] r xe_post_send+0x998/0x1860 [rdma_rxe] ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs ] ib_uverbs_write+0x847/0xc80 [ib_uverbs] vfs_write+0x1c5/0x840 ksys_write+0x176/0x1d0 do_syscall_64+0x3f/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.8", + "versionEndExcluding": "5.12.7", + "matchCriteriaId": "86AEDEBB-6C6C-4840-B58E-520581A71F2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47148.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47148.json index 815b6459288..b6d646b9631 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47148.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47148.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47148", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-25T09:15:09.150", - "lastModified": "2024-11-21T06:35:29.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:35:05.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,104 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: corrige un desbordamiento del b\u00fafer en otx2_set_rxfh_context() Esta funci\u00f3n se llama desde ethtool_set_rxfh() y \"*rss_context\" proviene del usuario. Agregue algunas comprobaciones de los l\u00edmites para evitar da\u00f1os en la memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.9", + "matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json index 9ea6cf35bac..66a7b591d80 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27946", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.990", - "lastModified": "2024-11-21T07:53:45.527", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json index 7c8ecf0c8ff..be6e22d9dc0 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27949", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.043", - "lastModified": "2024-11-21T07:53:45.913", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json index ffe79129169..cb37955f408 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27954", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.267", - "lastModified": "2024-11-21T07:53:46.970", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,16 +62,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.0", "versionEndExcluding": "16.4", - "matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E" + "matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json index 230341cee88..ac32eb2a856 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27955", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.317", - "lastModified": "2024-11-21T07:53:47.247", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.4", - "matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2" + "matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json index c2a10c4a7ed..3756d198905 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27956", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.383", - "lastModified": "2024-11-21T07:53:47.430", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,16 +56,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.0", "versionEndExcluding": "16.4", - "matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E" + "matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27959.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27959.json index 262c0717585..1042e6cac29 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27959.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27959.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27959", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.547", - "lastModified": "2024-11-21T07:53:47.957", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.4", - "matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2" + "matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27961.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27961.json index b0486729f78..e1625602592 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27961.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27961.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27961", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.663", - "lastModified": "2024-11-21T07:53:48.263", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,16 +56,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.0", "versionEndExcluding": "16.4", - "matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E" + "matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27963.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27963.json index 65711172a40..6980335a1cc 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27963.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27963.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27963", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.773", - "lastModified": "2024-11-21T07:53:48.647", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,16 +56,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.0", "versionEndExcluding": "16.4", - "matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E" + "matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json index f185a206ad7..7c71cf5d8fd 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27969", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.053", - "lastModified": "2024-11-21T07:53:49.623", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,16 +56,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.0", "versionEndExcluding": "16.4", - "matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E" + "matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json index 9b6ca46506f..3bf99e4adf7 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27970", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.110", - "lastModified": "2024-11-21T07:53:50.370", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.4", - "matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2" + "matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json index 541327a3e69..586748b0f98 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28178", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.163", - "lastModified": "2024-11-21T07:54:32.720", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.4", - "matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2" + "matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json index 3d1920ad012..25499463255 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28181", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.273", - "lastModified": "2024-11-21T07:54:33.123", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.4", - "matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2" + "matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json index 5ea7a36b5b5..432590b85aa 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28182", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.330", - "lastModified": "2024-11-21T07:54:33.267", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,16 +56,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.0", "versionEndExcluding": "16.4", - "matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E" + "matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json index d452785f30e..1dc958bd5ca 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28194", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.633", - "lastModified": "2024-11-21T07:54:34.360", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.4", - "matchCriteriaId": "1223E832-EAEB-4549-83B5-C77FB7055AD2" + "matchCriteriaId": "EE68C5EC-5829-481D-BFF7-0A501018A3CE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28201.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28201.json index 00da72f62c7..10712430bec 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28201.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28201.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28201", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.747", - "lastModified": "2024-11-21T07:54:35.273", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,16 +62,16 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "15.7.4", - "matchCriteriaId": "909D85BE-B03C-469D-B7A0-B15B6366EDAC" + "matchCriteriaId": "6342B4CB-4D7D-4FBD-8A5E-E3DABDC7770E" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.0", "versionEndExcluding": "16.4", - "matchCriteriaId": "D54C540A-5D01-4710-BBF9-EDD8BBAEE16E" + "matchCriteriaId": "79A85DA3-B374-444F-B9A2-7E4F334C26DA" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28208.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28208.json index a0e51ab4864..c18b60d5d84 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28208.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28208.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28208", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:08.497", - "lastModified": "2024-11-21T07:54:36.180", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.3", - "matchCriteriaId": "638F1298-360D-47B5-B3CC-A83E92F967C9" + "matchCriteriaId": "4FAC57E1-C456-4770-815E-DDD7A3621DEB" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json index 697d9094048..6ef53dfd437 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32425", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.177", - "lastModified": "2024-11-21T08:03:19.813", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.5", - "matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00" + "matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json index 441ca462cb4..4e035fb94e0 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32428", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.270", - "lastModified": "2024-11-21T08:03:20.187", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.5", - "matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00" + "matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json index 32005de417d..8b95d46919b 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32432", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.327", - "lastModified": "2024-11-21T08:03:20.447", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.5", - "matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00" + "matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32438.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32438.json index 6ddbb1e90c9..f82b350e945 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32438.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32438.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32438", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.383", - "lastModified": "2024-11-21T08:03:21.223", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.3", - "matchCriteriaId": "638F1298-360D-47B5-B3CC-A83E92F967C9" + "matchCriteriaId": "4FAC57E1-C456-4770-815E-DDD7A3621DEB" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json index 4e6023342e0..2c37a5f6f55 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34352", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.440", - "lastModified": "2024-11-21T08:07:04.700", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.5", - "matchCriteriaId": "6592C7B1-91F3-43B4-9F09-E52898897A00" + "matchCriteriaId": "A4021D9E-B688-4FBC-B43A-D3C28FD38E67" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38136.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38136.json index 9f4e3b4b9d5..e8353b861ad 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38136.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38136.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38136", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:34.487", - "lastModified": "2024-11-21T08:12:55.960", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.6", - "matchCriteriaId": "E97E4E09-CD8D-427A-82DA-EEFE5010F8F4" + "matchCriteriaId": "F362BEC4-90C7-4305-BFF9-645FE6C52DFE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38261.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38261.json index 13b25f18b16..22838efb42f 100644 --- a/CVE-2023/CVE-2023-382xx/CVE-2023-38261.json +++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38261", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:35.170", - "lastModified": "2024-11-21T08:13:12.347", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,9 +56,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.6", - "matchCriteriaId": "E97E4E09-CD8D-427A-82DA-EEFE5010F8F4" + "matchCriteriaId": "F362BEC4-90C7-4305-BFF9-645FE6C52DFE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json index 5aac1120644..2363fc0cb2e 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42942", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.963", - "lastModified": "2024-12-03T20:40:10.397", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -86,8 +86,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D7F45FD5-BD2C-41B5-ADCA-D7F99A0FD4A3" + "criteria": "cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FD0EE39C-DEC4-475C-8661-5BD76457A39E" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json index 01e16adec8b..8bb7730d49a 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42974", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-28T16:15:08.480", - "lastModified": "2024-12-09T16:46:58.417", + "lastModified": "2024-12-12T14:26:18.893", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -96,10 +96,10 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.2", - "matchCriteriaId": "33BFD9C2-BD79-47ED-9DCC-71549F874D14" + "matchCriteriaId": "D0997B97-8D18-41AC-85DD-3605A5DBCA35" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44254.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44254.json index 7894b346dfa..69e706a6416 100644 --- a/CVE-2023/CVE-2023-442xx/CVE-2023-44254.json +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44254.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44254", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-09-10T15:15:14.173", - "lastModified": "2024-09-25T20:17:40.970", + "lastModified": "2024-12-12T13:56:07.013", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -134,10 +134,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:fortinet:fortianalyzer-bigdata:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.2.0", "versionEndIncluding": "7.2.5", - "matchCriteriaId": "FE0C2EF7-B4C2-4B1F-8CE1-AD50C319A172" + "matchCriteriaId": "BD831BAE-D7FB-411E-A28B-BB77ED814AEA" } ] } diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json index 24eac2bb34c..3fed5e397d3 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45866.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45866", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-08T06:15:45.690", - "lastModified": "2024-11-21T08:27:31.013", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -336,9 +336,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.2", - "matchCriteriaId": "ED754E44-EDCF-4B0F-B662-E4C2687B4920" + "matchCriteriaId": "C4117208-4072-4F4C-AC42-97683B6F8FF5" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49069.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49069.json index 7ec55dac155..1d90dde17a3 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49069.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49069.json @@ -2,13 +2,13 @@ "id": "CVE-2023-49069", "sourceIdentifier": "productcert@siemens.com", "published": "2024-09-10T10:15:08.947", - "lastModified": "2024-12-10T14:30:36.767", + "lastModified": "2024-12-12T14:15:20.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.17.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.16 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions < V8.18.32 only if the basic authentication mechanism is used by the application), Mendix Runtime V9 (All versions < V9.24.29 only if the basic authentication mechanism is used by the application). The authentication mechanism of affected applications contains an observable response discrepancy vulnerability when validating usernames. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames." + "value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.17.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.16 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions < V8.18.33 only if the basic authentication mechanism is used by the application), Mendix Runtime V9 (All versions < V9.24.31 only if the basic authentication mechanism is used by the application). The authentication mechanism of affected applications contains an observable response discrepancy vulnerability when validating usernames. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12271.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12271.json new file mode 100644 index 00000000000..30d9e726434 --- /dev/null +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12271.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-12271", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-12T13:15:07.570", + "lastModified": "2024-12-12T13:15:07.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The 360 Javascript Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018ref\u2019 parameter in all versions up to, and including, 1.7.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/360deg-javascript-viewer/trunk/includes/class-jsv-360-parser.php#L129", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/360deg-javascript-viewer/trunk/includes/class-jsv-360-parser.php#L162", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3206400/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/12b4e363-248f-469a-a958-0b1ec5c6e37f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2060.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2060.json index e236af2ea61..7d312c26082 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2060.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2060", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T13:15:08.460", - "lastModified": "2024-11-21T09:08:57.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:59:34.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255375", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255375", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255375", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255375", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2061.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2061.json index fa29a555250..c71873ef98c 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2061.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2061", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T13:15:08.670", - "lastModified": "2024-11-21T09:08:57.477", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:59:46.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255376", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.255376", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255376", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.255376", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2062.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2062.json index fb4d87cbf6a..219450f6e16 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2062.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2062", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T13:15:08.913", - "lastModified": "2024-11-21T09:08:57.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:51:50.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255377", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.255377", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255377", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.255377", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2063.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2063.json index 5779af4e14a..612fe6613a1 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2063.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2063", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T13:15:09.130", - "lastModified": "2024-11-21T09:08:57.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:52:44.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255378", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.255378", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.255378", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.255378", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json index dcebfd6b779..4df7f2e6f7d 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2064", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-01T14:15:54.350", - "lastModified": "2024-11-21T09:08:57.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-12T14:55:04.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rahman:selectcours:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A3706D-EE30-4FC6-AFD3-499561D5650F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255379", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255379", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255379", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255379", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23201.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23201.json index 8170528c74f..0469bd86793 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23201.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23201.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23201", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:47.343", - "lastModified": "2024-12-05T16:55:37.627", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.3", - "matchCriteriaId": "67189624-9996-4612-878A-B661BF9BC116" + "matchCriteriaId": "93A0FBA9-3FF2-483E-8669-E2C196B3A444" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json index d5e8f30540a..4fc34de63f0 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23228.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23228", "sourceIdentifier": "product-security@apple.com", "published": "2024-04-24T17:15:47.073", - "lastModified": "2024-12-10T18:03:26.043", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.3", - "matchCriteriaId": "67189624-9996-4612-878A-B661BF9BC116" + "matchCriteriaId": "93A0FBA9-3FF2-483E-8669-E2C196B3A444" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json index 099c3a19046..7a5125e17bb 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23271.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23271", "sourceIdentifier": "product-security@apple.com", "published": "2024-04-24T17:15:47.127", - "lastModified": "2024-12-10T17:59:41.370", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -96,9 +96,9 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.3", - "matchCriteriaId": "67189624-9996-4612-878A-B661BF9BC116" + "matchCriteriaId": "93A0FBA9-3FF2-483E-8669-E2C196B3A444" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json index 03c77b44e5a..28501b2e6e7 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27791.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27791", "sourceIdentifier": "product-security@apple.com", "published": "2024-04-24T17:15:47.177", - "lastModified": "2024-12-10T17:58:55.290", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,16 +90,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.7.5", - "matchCriteriaId": "5D58F941-47EA-42F3-B7F8-4612A29B9311" + "matchCriteriaId": "52830EA8-817D-47D3-9A0E-2456C2D59301" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.3", - "matchCriteriaId": "296B559E-E3E5-46F5-9FD7-3B371E7C0B3B" + "matchCriteriaId": "7DFDDBEC-015C-4AC6-A2B8-387839CEDCCE" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json index d5026b84209..ccf1a203890 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27804.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27804", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.033", - "lastModified": "2024-12-09T19:25:03.827", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.5", - "matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E" + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json index d20d100f83a..04720c73b1c 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27810", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.267", - "lastModified": "2024-12-09T19:14:08.850", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.5", - "matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E" + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27816.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27816.json index fa9c7e3e93a..99bee6c0767 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27816.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27816.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27816", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.823", - "lastModified": "2024-12-09T18:59:05.477", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.5", - "matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E" + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json index 81c488d87e8..12ac09bd60b 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27818", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:05.047", - "lastModified": "2024-12-09T20:21:02.197", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,16 +60,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.7.8", - "matchCriteriaId": "B64F27E9-49AB-4A68-A617-9D88A28AD5F6" + "matchCriteriaId": "732206AE-D798-41FB-8D91-F796820F912D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0", "versionEndExcluding": "17.5", - "matchCriteriaId": "057195A5-F25E-4D39-8EE5-61E55687B19F" + "matchCriteriaId": "0C520138-1984-4369-8615-09FF57F0BB70" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json index 8990804eb62..ee1585d3ab2 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27821", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:05.287", - "lastModified": "2024-12-09T20:45:41.037", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.5", - "matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E" + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json index 22aa416c6b4..a4f57467a28 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27834.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27834", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:06.953", - "lastModified": "2024-12-09T19:27:43.577", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -96,9 +96,9 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.5", - "matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E" + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27835.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27835.json index 26ff6409819..3f2e04876c8 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27835.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27835.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27835", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:07.197", - "lastModified": "2024-12-09T19:35:44.313", + "lastModified": "2024-12-12T14:33:00.640", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.5", - "matchCriteriaId": "68CC48DA-8DB7-4042-8E07-0FE2B822DA1E" + "matchCriteriaId": "E7F2E11C-4A7D-4E71-BFAA-396B0549F649" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28142.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28142.json new file mode 100644 index 00000000000..1c2e330e7a7 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28142.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-28142", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T13:15:09.763", + "lastModified": "2024-12-12T13:15:09.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The \"File Name\" page (/cgi/uset.cgi?-cfilename) in the User Settings menu improperly filters the \"file name\" and wildcard character input field. By exploiting the wildcard character feature, attackers are able to store arbitrary Javascript code which is being triggered if the page is viewed afterwards, e.g. by higher privileged users such as admins.\n\n\n\n\n\n\n\n\n\nThis attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the \"Default\" User can be changed." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28143.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28143.json new file mode 100644 index 00000000000..6d51fcb8551 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28143.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-28143", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T14:15:22.173", + "lastModified": "2024-12-12T14:15:22.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter\u00a0for a user without knowing the old password, e.g. by exploiting a CSRF issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-620" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28144.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28144.json new file mode 100644 index 00000000000..f4220016f04 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28144.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-28144", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T14:15:22.330", + "lastModified": "2024-12-12T14:15:22.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28145.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28145.json new file mode 100644 index 00000000000..2b412a9bb18 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28145.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-28145", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T14:15:22.467", + "lastModified": "2024-12-12T14:15:22.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php\u00a0file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter \"field\" with the UNION keyword." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28146.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28146.json new file mode 100644 index 00000000000..7e0c53e666b --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28146.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-28146", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T14:15:22.613", + "lastModified": "2024-12-12T14:15:22.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The application uses several hard-coded credentials\u00a0to encrypt config files during backup, to decrypt the new firmware during an update and some passwords allow a direct connection to the database server of the affected device." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36494.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36494.json new file mode 100644 index 00000000000..605b0dc2c6b --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36494.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-36494", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T13:15:10.160", + "lastModified": "2024-12-12T14:15:22.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. The login page at /cgi/slogin.cgi suffers from XSS due to improper input filtering of the -tsetup+-uuser parameter, which can only be exploited if the target user is not already logged in. This makes it ideal for login form phishing attempts." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36498.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36498.json new file mode 100644 index 00000000000..9bfbd07b33b --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36498.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-36498", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T13:15:10.540", + "lastModified": "2024-12-12T13:15:10.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users.\u00a0The \"Edit Disclaimer Text\" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL\n\n\n\n\n\n\n\n\n\nhttps://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre\n\nThe stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser. Version 7.40 implemented a fix, but it could be bypassed via URL-encoding the Javascript payload again." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47947.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47947.json new file mode 100644 index 00000000000..91466a3aee4 --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47947.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-47947", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T13:15:10.920", + "lastModified": "2024-12-12T13:15:10.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users.\u00a0The \"Edit Disclaimer Text\" function of the configuration menu is vulnerable to stored XSS. Only the users Poweruser and Admin can use this function which is available at the URL\n\n\n\n\n\n\n\n\n\nhttps://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre\n\nThe stored Javascript payload will be executed every time the ScanWizard is loaded, even in the Kiosk-mode browser." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50584.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50584.json new file mode 100644 index 00000000000..90527feb92f --- /dev/null +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50584.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-50584", + "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "published": "2024-12-12T14:15:22.833", + "lastModified": "2024-12-12T14:15:22.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated attacker with the user/role \"Poweruser\" can perform an SQL injection by accessing the /class/template_io.php\u00a0file and supplying malicious GET parameters.\u00a0The \"templates\" parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://r.sec-consult.com/imageaccess", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + }, + { + "url": "https://www.imageaccess.de/?page=SupportPortal&lang=en", + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json index 6c1aba3c271..d7c5982d2f1 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54091.json @@ -2,13 +2,17 @@ "id": "CVE-2024-54091", "sourceIdentifier": "productcert@siemens.com", "published": "2024-12-10T14:30:47.193", - "lastModified": "2024-12-10T14:30:47.193", + "lastModified": "2024-12-12T14:15:22.953", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173), Parasolid V37.1 (All versions < V37.1.109). The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files.\r\nThis could allow an attacker to execute code in the context of the current process." + "value": "A vulnerability has been identified in Parasolid V36.1 (All versions < V36.1.225), Parasolid V37.0 (All versions < V37.0.173). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format.\r\nThis could allow an attacker to execute code in the context of the current process." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Parasolid V36.1 (todas las versiones anteriores a V36.1.225), Parasolid V37.0 (todas las versiones anteriores a V37.0.173) y Parasolid V37.1 (todas las versiones anteriores a V37.1.109). Las aplicaciones afectadas contienen una vulnerabilidad de escritura fuera de los l\u00edmites al analizar archivos PAR especialmente manipulados. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto del proceso actual." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -82,7 +86,7 @@ "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54118.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54118.json new file mode 100644 index 00000000000..3b7e7de0e4e --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54118.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54118", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-12-12T13:15:11.180", + "lastModified": "2024-12-12T13:15:11.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54119.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54119.json new file mode 100644 index 00000000000..d4316234f30 --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54119.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54119", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-12-12T13:15:11.350", + "lastModified": "2024-12-12T13:15:11.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54122.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54122.json new file mode 100644 index 00000000000..7080d4ddeb7 --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54122.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-54122", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-12-12T13:15:11.527", + "lastModified": "2024-12-12T13:15:11.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Concurrent variable access vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may affect availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/12/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 181f7f80ca4..5517ce601e6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-12T13:00:51.118892+00:00 +2024-12-12T15:00:22.918388+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-12T12:15:28.727000+00:00 +2024-12-12T14:59:46.863000+00:00 ``` ### Last Data Feed Release @@ -33,44 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -273496 +273509 ``` ### CVEs added in the last Commit -Recently added CVEs: `31` +Recently added CVEs: `13` -- [CVE-2024-54098](CVE-2024/CVE-2024-540xx/CVE-2024-54098.json) (`2024-12-12T12:15:23.243`) -- [CVE-2024-54099](CVE-2024/CVE-2024-540xx/CVE-2024-54099.json) (`2024-12-12T12:15:23.420`) -- [CVE-2024-54100](CVE-2024/CVE-2024-541xx/CVE-2024-54100.json) (`2024-12-12T12:15:23.593`) -- [CVE-2024-54101](CVE-2024/CVE-2024-541xx/CVE-2024-54101.json) (`2024-12-12T12:15:23.763`) -- [CVE-2024-54102](CVE-2024/CVE-2024-541xx/CVE-2024-54102.json) (`2024-12-12T12:15:23.930`) -- [CVE-2024-54103](CVE-2024/CVE-2024-541xx/CVE-2024-54103.json) (`2024-12-12T12:15:24.123`) -- [CVE-2024-54104](CVE-2024/CVE-2024-541xx/CVE-2024-54104.json) (`2024-12-12T12:15:24.550`) -- [CVE-2024-54105](CVE-2024/CVE-2024-541xx/CVE-2024-54105.json) (`2024-12-12T12:15:24.983`) -- [CVE-2024-54106](CVE-2024/CVE-2024-541xx/CVE-2024-54106.json) (`2024-12-12T12:15:25.237`) -- [CVE-2024-54107](CVE-2024/CVE-2024-541xx/CVE-2024-54107.json) (`2024-12-12T12:15:25.653`) -- [CVE-2024-54108](CVE-2024/CVE-2024-541xx/CVE-2024-54108.json) (`2024-12-12T12:15:26.023`) -- [CVE-2024-54109](CVE-2024/CVE-2024-541xx/CVE-2024-54109.json) (`2024-12-12T12:15:26.270`) -- [CVE-2024-54110](CVE-2024/CVE-2024-541xx/CVE-2024-54110.json) (`2024-12-12T12:15:26.453`) -- [CVE-2024-54111](CVE-2024/CVE-2024-541xx/CVE-2024-54111.json) (`2024-12-12T12:15:26.647`) -- [CVE-2024-54112](CVE-2024/CVE-2024-541xx/CVE-2024-54112.json) (`2024-12-12T12:15:26.823`) -- [CVE-2024-54113](CVE-2024/CVE-2024-541xx/CVE-2024-54113.json) (`2024-12-12T12:15:27.003`) -- [CVE-2024-54114](CVE-2024/CVE-2024-541xx/CVE-2024-54114.json) (`2024-12-12T12:15:27.187`) -- [CVE-2024-54115](CVE-2024/CVE-2024-541xx/CVE-2024-54115.json) (`2024-12-12T12:15:27.363`) -- [CVE-2024-54116](CVE-2024/CVE-2024-541xx/CVE-2024-54116.json) (`2024-12-12T12:15:27.570`) -- [CVE-2024-54117](CVE-2024/CVE-2024-541xx/CVE-2024-54117.json) (`2024-12-12T12:15:27.747`) -- [CVE-2024-8179](CVE-2024/CVE-2024-81xx/CVE-2024-8179.json) (`2024-12-12T12:15:27.937`) -- [CVE-2024-8233](CVE-2024/CVE-2024-82xx/CVE-2024-8233.json) (`2024-12-12T12:15:28.120`) -- [CVE-2024-8647](CVE-2024/CVE-2024-86xx/CVE-2024-8647.json) (`2024-12-12T12:15:28.297`) -- [CVE-2024-9367](CVE-2024/CVE-2024-93xx/CVE-2024-9367.json) (`2024-12-12T12:15:28.497`) -- [CVE-2024-9387](CVE-2024/CVE-2024-93xx/CVE-2024-9387.json) (`2024-12-12T12:15:28.727`) +- [CVE-2024-12271](CVE-2024/CVE-2024-122xx/CVE-2024-12271.json) (`2024-12-12T13:15:07.570`) +- [CVE-2024-28142](CVE-2024/CVE-2024-281xx/CVE-2024-28142.json) (`2024-12-12T13:15:09.763`) +- [CVE-2024-28143](CVE-2024/CVE-2024-281xx/CVE-2024-28143.json) (`2024-12-12T14:15:22.173`) +- [CVE-2024-28144](CVE-2024/CVE-2024-281xx/CVE-2024-28144.json) (`2024-12-12T14:15:22.330`) +- [CVE-2024-28145](CVE-2024/CVE-2024-281xx/CVE-2024-28145.json) (`2024-12-12T14:15:22.467`) +- [CVE-2024-28146](CVE-2024/CVE-2024-281xx/CVE-2024-28146.json) (`2024-12-12T14:15:22.613`) +- [CVE-2024-36494](CVE-2024/CVE-2024-364xx/CVE-2024-36494.json) (`2024-12-12T13:15:10.160`) +- [CVE-2024-36498](CVE-2024/CVE-2024-364xx/CVE-2024-36498.json) (`2024-12-12T13:15:10.540`) +- [CVE-2024-47947](CVE-2024/CVE-2024-479xx/CVE-2024-47947.json) (`2024-12-12T13:15:10.920`) +- [CVE-2024-50584](CVE-2024/CVE-2024-505xx/CVE-2024-50584.json) (`2024-12-12T14:15:22.833`) +- [CVE-2024-54118](CVE-2024/CVE-2024-541xx/CVE-2024-54118.json) (`2024-12-12T13:15:11.180`) +- [CVE-2024-54119](CVE-2024/CVE-2024-541xx/CVE-2024-54119.json) (`2024-12-12T13:15:11.350`) +- [CVE-2024-54122](CVE-2024/CVE-2024-541xx/CVE-2024-54122.json) (`2024-12-12T13:15:11.527`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `49` +- [CVE-2023-34352](CVE-2023/CVE-2023-343xx/CVE-2023-34352.json) (`2024-12-12T14:26:18.893`) +- [CVE-2023-38136](CVE-2023/CVE-2023-381xx/CVE-2023-38136.json) (`2024-12-12T14:26:18.893`) +- [CVE-2023-38261](CVE-2023/CVE-2023-382xx/CVE-2023-38261.json) (`2024-12-12T14:26:18.893`) +- [CVE-2023-42942](CVE-2023/CVE-2023-429xx/CVE-2023-42942.json) (`2024-12-12T14:26:18.893`) +- [CVE-2023-42974](CVE-2023/CVE-2023-429xx/CVE-2023-42974.json) (`2024-12-12T14:26:18.893`) +- [CVE-2023-44254](CVE-2023/CVE-2023-442xx/CVE-2023-44254.json) (`2024-12-12T13:56:07.013`) +- [CVE-2023-45866](CVE-2023/CVE-2023-458xx/CVE-2023-45866.json) (`2024-12-12T14:33:00.640`) +- [CVE-2023-49069](CVE-2023/CVE-2023-490xx/CVE-2023-49069.json) (`2024-12-12T14:15:20.450`) +- [CVE-2024-2060](CVE-2024/CVE-2024-20xx/CVE-2024-2060.json) (`2024-12-12T14:59:34.407`) +- [CVE-2024-2061](CVE-2024/CVE-2024-20xx/CVE-2024-2061.json) (`2024-12-12T14:59:46.863`) +- [CVE-2024-2062](CVE-2024/CVE-2024-20xx/CVE-2024-2062.json) (`2024-12-12T14:51:50.387`) +- [CVE-2024-2063](CVE-2024/CVE-2024-20xx/CVE-2024-2063.json) (`2024-12-12T14:52:44.657`) +- [CVE-2024-2064](CVE-2024/CVE-2024-20xx/CVE-2024-2064.json) (`2024-12-12T14:55:04.297`) +- [CVE-2024-23201](CVE-2024/CVE-2024-232xx/CVE-2024-23201.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-23228](CVE-2024/CVE-2024-232xx/CVE-2024-23228.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-23271](CVE-2024/CVE-2024-232xx/CVE-2024-23271.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27791](CVE-2024/CVE-2024-277xx/CVE-2024-27791.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27804](CVE-2024/CVE-2024-278xx/CVE-2024-27804.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27810](CVE-2024/CVE-2024-278xx/CVE-2024-27810.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27816](CVE-2024/CVE-2024-278xx/CVE-2024-27816.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27818](CVE-2024/CVE-2024-278xx/CVE-2024-27818.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27821](CVE-2024/CVE-2024-278xx/CVE-2024-27821.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27834](CVE-2024/CVE-2024-278xx/CVE-2024-27834.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-27835](CVE-2024/CVE-2024-278xx/CVE-2024-27835.json) (`2024-12-12T14:33:00.640`) +- [CVE-2024-54091](CVE-2024/CVE-2024-540xx/CVE-2024-54091.json) (`2024-12-12T14:15:22.953`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6fe27a356c0..cc426654fad 100644 --- a/_state.csv +++ b/_state.csv @@ -187212,12 +187212,12 @@ CVE-2021-47067,0,0,9df5b0005af4045c4050adb25d4d0a3c7ed0af17ec105b20f7776b61c08f0 CVE-2021-47068,0,0,e902a18ffbe6654398a0348af04e476fbaf331e8e30fa78b6bfe4762a12c956f,2024-12-10T19:50:49.147000 CVE-2021-47069,0,0,c1eca05ee668952c1f7b1291c7ec7a82c3eb142d2cda65e66b7909adc2d987bc,2024-11-21T06:35:18.510000 CVE-2021-47070,0,0,affc793dd141d8f358bff7bbf0e6544f3d5ab387f0d1d9fdbb175a861def15c6,2024-11-21T06:35:18.633000 -CVE-2021-47071,0,0,70d2443c4522733bfa6621cf92ec2f8083a480402e420a029b09490aeade57ef,2024-11-21T06:35:20.363000 +CVE-2021-47071,0,1,d800b8ddcd96789ad1c1f5273161686a71669bb9dbf533fd7eca685a04a147dd,2024-12-12T14:43:19.253000 CVE-2021-47072,0,0,954df5847b9e8b8847398a4fb353515add1c8b9bc355ca2ca788b956a977c290,2024-11-21T06:35:20.567000 CVE-2021-47073,0,0,1da6789de0e18c722faf0748d86b29266ec446ef02b371ec3294102d5dc16cb8,2024-11-21T06:35:20.683000 -CVE-2021-47074,0,0,62606d2032895447276146a4bd74173d7188ecf09841f325ee145350e8690bb6,2024-11-21T06:35:20.813000 +CVE-2021-47074,0,1,49866fe835e78e03621976826fedc250f3287bb5acca2d0153d10814806d0b1b,2024-12-12T14:43:36.903000 CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e24109c,2024-11-21T06:35:20.930000 -CVE-2021-47076,0,0,eb44f78121b9b3561a16c318aaec96c6c6576ae1ed25b0b86867d5e51cb5effd,2024-11-21T06:35:21.103000 +CVE-2021-47076,0,1,d73ef7581eddf57c90dedb9553a930cea360fd3157b9a516f25e7504c936d196,2024-12-12T14:48:50.960000 CVE-2021-47077,0,0,89ceade981ed48989989cfdea08722c6551df82a7dcf7e9e57d17f7163739998,2024-12-10T21:01:51.030000 CVE-2021-47078,0,0,10d2cc255b79f1ae1b2de2b41ed383d0a6ccb70ddfa9cdcb0b129f97f8f6ab93,2024-11-21T06:35:21.327000 CVE-2021-47079,0,0,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba415,2024-12-09T18:41:59.903000 @@ -187289,7 +187289,7 @@ CVE-2021-47144,0,0,c2e0d5f06ee1d87b70c640c6d1cfae5fabab5c3538ce13718b21796bfa989 CVE-2021-47145,0,0,00fe141e2115246367ddd029d151ab446804946a179f5a5ef7bd44ff636b1ad0,2024-11-21T06:35:29.310000 CVE-2021-47146,0,0,bb8ef503187c896095044fd8ab66fc3492a4b167cf262883e87dcd339c1bf77d,2024-11-21T06:35:29.427000 CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000 -CVE-2021-47148,0,0,d58d3aa38ff2a58e5c3f44becaeb992b1b4061cece3e3080a7e4f4c4e4d6b59f,2024-11-21T06:35:29.710000 +CVE-2021-47148,0,1,a79aea59b658b885a0baa703d45c7d81c359e77c26745d7330c5c2f35be78df6,2024-12-12T14:35:05.817000 CVE-2021-47149,0,0,d58f4fbb593bd6f34152e342d4fe5dcc66a8a727beb81de12439ae37b3fafa9a,2024-11-21T06:35:29.813000 CVE-2021-47150,0,0,ba00f511cbd076485c22314a7ced443a6ac385f27ad1c5c8ea8eccc33146def6,2024-11-21T06:35:29.937000 CVE-2021-47151,0,0,342b7162752caa84d3e7b35c452b9e1669f1f036fff3448b5525075ff2119a77,2024-11-21T06:35:30.050000 @@ -221466,34 +221466,34 @@ CVE-2023-27942,0,0,3ecc08594caf9a6757a777d75ec071ee2a208b9788efdbc9a957e6df06e8c CVE-2023-27943,0,0,93898ded30863b05ee38e9474954d1cbc946f8739e5d8580b19c6fadef995cdd,2024-11-21T07:53:45.090000 CVE-2023-27944,0,0,f2b8aa1a39cc66b45a2350e92881c5b190f580eb31f8fde93e99402295076d99,2024-11-21T07:53:45.237000 CVE-2023-27945,0,0,1d36d9a31ae0099c5afd0b68dccb72e1ea6d9cd5681ed25196b42ec2add3e3d2,2024-11-21T07:53:45.397000 -CVE-2023-27946,0,0,fbc36b1e3706eb534706745e76add7e93efd5fef4b8af27c967fa244394ac539,2024-11-21T07:53:45.527000 +CVE-2023-27946,0,1,4658716f882d77ace1fafe2bcdcb33d875de1ab354be3fcccc413a3af9c5d578,2024-12-12T14:26:18.893000 CVE-2023-27947,0,0,9bf9d3fbde55e086450c5ce93b783034cd711e1641158d1e5bbb1708d0565525,2024-11-21T07:53:45.673000 CVE-2023-27948,0,0,760363adf8d7d0ca02870884a0a0e9fa6b245440dd3df2e635a2aa44ecab95cc,2024-11-21T07:53:45.790000 -CVE-2023-27949,0,0,c11719a9f9a205ad453f3f5e2c5bff4c583c84231bbcbe169deb3d8afeb1aaf4,2024-11-21T07:53:45.913000 +CVE-2023-27949,0,1,94bf87b48c9a3a5c84aec88c9a24effc756e5c999de8db419a0d112eb0d8b59b,2024-12-12T14:26:18.893000 CVE-2023-2795,0,0,1134a4f4c2856595d0eca4004b0d37ee1461cd84cc05ae468aa9f7ee1279458e,2024-11-21T07:59:18.350000 CVE-2023-27950,0,0,382f8ebc081a8dba327fc928069a71cba666cd4fe1a6c22366c971263e51f9a0,2024-11-21T07:53:46.073000 CVE-2023-27951,0,0,273a0bb5b11e80a4f64c3b772233292e3a49197dfe48e0bc69231017a9e3117c,2024-11-21T07:53:46.283000 CVE-2023-27952,0,0,71c584277ce7e7878c8ff4fa1d46c992f11399da6db6f5472d8356133b6674e9,2024-11-21T07:53:46.517000 CVE-2023-27953,0,0,882334bb505d92aedf3ef28df592344c3d189b00052a4aa25a5774d3da0d6c85,2024-11-21T07:53:46.723000 -CVE-2023-27954,0,0,def6e89bf8c2ae705edbdd0fd230b3574c7b55b20dba5f8f3ff9cf79c85d2aa8,2024-11-21T07:53:46.970000 -CVE-2023-27955,0,0,574088d4597d5ada5a582255b5d6747ace50d7a37b246112afd509e9b05d7dc6,2024-11-21T07:53:47.247000 -CVE-2023-27956,0,0,eab6e1954671eba9b10d40fff38c341975fcbed82e2bfcc5ef35133991b7eee5,2024-11-21T07:53:47.430000 +CVE-2023-27954,0,1,d5e69b4018517c57c05d166c75572cfed92bb8df7dfe32eecc6fbea6fd25d15f,2024-12-12T14:26:18.893000 +CVE-2023-27955,0,1,7acf8a7793e4b719acdaf66694a3822c1348de2230a60099f121cefdbfef126e,2024-12-12T14:26:18.893000 +CVE-2023-27956,0,1,a208b16ed3bab62b90db436d4fa73c9552c541d7479c9b855380d7eeeb2ec94f,2024-12-12T14:26:18.893000 CVE-2023-27957,0,0,d1e7b3b508465a6866530fc7113267739c37584824db57ecc458485e18cefd8b,2024-11-21T07:53:47.610000 CVE-2023-27958,0,0,46eb7deb505f5e3897b9b5522e801fbefb236a052e189591d28ec2b72f2e9ee4,2024-11-21T07:53:47.773000 -CVE-2023-27959,0,0,5a19b117c69cca5c27ffede42bc67a0b8c02a846984d23887716c1df47f55d8b,2024-11-21T07:53:47.957000 +CVE-2023-27959,0,1,93f088a3d2cd12f6488f2a83e930e5b4640c45e601cd51de8c6e1d5789140d21,2024-12-12T14:26:18.893000 CVE-2023-2796,0,0,efcf9f17319a3efd07e6eb558157012737214df0290a562d2adb729552c32388,2024-11-21T07:59:18.450000 CVE-2023-27960,0,0,a775190b8842b0c3b8a81f624c230a57c4f33980270a40a1b212244445925782,2024-11-21T07:53:48.107000 -CVE-2023-27961,0,0,be816b764a083ff572b1a681fbefb9cca484e8d101b08ea3e48462468e9db88d,2024-11-21T07:53:48.263000 +CVE-2023-27961,0,1,184216b2faccb1468fad7c6686a8ffc8d233ef0643d3de27eea3c613c3abe845,2024-12-12T14:26:18.893000 CVE-2023-27962,0,0,39774aa61a14583e66301eb335bdb09877c9692002f6084dc5ebedde5c9bc5ae,2024-11-21T07:53:48.427000 -CVE-2023-27963,0,0,0108ac2b47b46aa8c8946d3f257fe82e669139947b8f7bd419976bd5816947cd,2024-11-21T07:53:48.647000 +CVE-2023-27963,0,1,871eaaf1ed6152750e4a3b0c5b9459687c54af50cc37274d8bd96c673b253664,2024-12-12T14:26:18.893000 CVE-2023-27964,0,0,66c685f1ae1959baf0bc535c35accef15fb3af44c505366884bd10b44ff2d874,2024-11-21T07:53:48.813000 CVE-2023-27965,0,0,d36260e906ea921ae2b3b9889a511ed9b1581da9ad128bba673ca418057616ce,2024-11-21T07:53:48.973000 CVE-2023-27966,0,0,926402e8f275ea22b5d8bf82349144414fc85ac8fc75118d770d8a642c646911,2024-11-21T07:53:49.143000 CVE-2023-27967,0,0,97e449f089e56958277363060aba143c547f4a3a525212eb9abf0ca467f18d6c,2024-11-21T07:53:49.307000 CVE-2023-27968,0,0,ea25c17c07b88b6ee4e5fc8bccf5dfa389009c4d4961141985a5e418ffcfa535,2024-11-21T07:53:49.467000 -CVE-2023-27969,0,0,aec985448b073ea3a12106b568bc9c3bda401ddac1bb7a15ef47d6766b6912c1,2024-11-21T07:53:49.623000 +CVE-2023-27969,0,1,f1f20ce6904cc30931a6abbcfb3f675aed7b844d1bf572e2b498faf5dc0064d5,2024-12-12T14:26:18.893000 CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000 -CVE-2023-27970,0,0,cc1a16777cc160ceca0d8afbf6014f2059efe85d8b717e0800fa446e6f62d6eb,2024-11-21T07:53:50.370000 +CVE-2023-27970,0,1,b35fd2e501512d070ab8abb0064d9cb019af1ee0a86e5172680f09686df7094e,2024-12-12T14:26:18.893000 CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c782,2024-11-21T07:53:50.490000 CVE-2023-27972,0,0,420429654e9bf1c36921c5fb5ba9fd2a3cef17c110a30df72aaea78d27cfc78c,2024-11-21T07:53:50.660000 CVE-2023-27973,0,0,d08fe914a7a90b67c8fff32446e07617af2ab2e8c1d32e40b6c83140c1b3a4f8,2024-11-21T07:53:50.817000 @@ -221697,12 +221697,12 @@ CVE-2023-28174,0,0,bb6ef0d47e13701e185c1c10861c5818ee389d356cb605662b90bf06d12e6 CVE-2023-28175,0,0,5522213ae06f55fcc5fb60c67fd4792ba0f4a7a1d16d7415fe6640350e531681,2024-11-21T07:54:32.270000 CVE-2023-28176,0,0,64aa2f78c2b021e48b0729a70932536afb67c7a5b590937c7bc2e491af2c742a,2024-11-21T07:54:32.463000 CVE-2023-28177,0,0,9eb43263c394b13747a003475f6d282a664de82a606e534bf935ab9c4aca3786,2024-11-21T07:54:32.600000 -CVE-2023-28178,0,0,7637c9f743cbc59f55984cd66adc98a1a05f47d88a540a8adce2653b387e33df,2024-11-21T07:54:32.720000 +CVE-2023-28178,0,1,bea5f49c485e4cbec3e11cd8d816ba700342509178a6f14df66ec06a05ec4418,2024-12-12T14:26:18.893000 CVE-2023-28179,0,0,870008b95a647a1114870423bafa8a6a05fdcb978c8b81dd449c39ea8b394b6f,2024-11-21T07:54:32.867000 CVE-2023-2818,0,0,735a9c6bb7b4e983aea153a48d7553aa85a0db10d10608cbd385e641830a2924,2024-11-21T07:59:20.993000 CVE-2023-28180,0,0,0ce33ac5d5a2979c95d935bfd32b1833849725ddf91941f17d2054c2cf71e983,2024-11-21T07:54:32.993000 -CVE-2023-28181,0,0,8c3b49a14e81e3548ed1190a771a9989b01602aef264bdfd83bc8cfba49cf1e8,2024-11-21T07:54:33.123000 -CVE-2023-28182,0,0,52274ab3f7c6e0181a35c728f9b6861a008e705abe1a49138afe47022b4ef72d,2024-11-21T07:54:33.267000 +CVE-2023-28181,0,1,999111fcedce705b76e3e07cc47b0246fcb4defa65f9b7837c9509cbfa4cca3d,2024-12-12T14:26:18.893000 +CVE-2023-28182,0,1,8a71ead8d7c1a5607dfede369db99ac87448a4e203e347ef760c72939cd497f4,2024-12-12T14:26:18.893000 CVE-2023-28185,0,0,daea7675bd9566307ac8ce74e72790c4119b91a66b24f2f9152cc8c5ddb3b31c,2024-11-21T07:54:33.430000 CVE-2023-28187,0,0,40a29a1b4bc9415b4849d4f34e04745eda7dc3fb7e002919cc6706a7403562d0,2024-11-21T07:54:33.587000 CVE-2023-28188,0,0,25a78be88c94d9bf595f284b54e423d2516fc344a5483e69e2bfc4dddd4809a5,2024-11-21T07:54:33.713000 @@ -221711,20 +221711,20 @@ CVE-2023-2819,0,0,3b247f5e1d6c37a7d71b49d023a88849ee6321753c3431bf9020211da96c53 CVE-2023-28190,0,0,1f82ddef5936295dcf73abb8973b0ae3383f3e5f03fdeb02923fe9c8639f3f86,2024-11-21T07:54:33.977000 CVE-2023-28191,0,0,6664ec9e1968effd5625736bb352c1ff2957736653242e5c49084c5c4ffb4a69,2024-12-05T17:15:07.650000 CVE-2023-28192,0,0,bec9476248d838879f049cdff7c7fc6b9811ab932643e2b25e917dae2446625d,2024-11-21T07:54:34.230000 -CVE-2023-28194,0,0,7c1d9184bb1bbb126559590d90c2a6db03c6e5c3683b0976cc866e5be35f39a5,2024-11-21T07:54:34.360000 +CVE-2023-28194,0,1,ef88e882c90ab27eed46eeb54efd34e0f525019b73601447931aa3df0fde4727,2024-12-12T14:26:18.893000 CVE-2023-28195,0,0,8cbb6e52e93eaa1b59d3b6c05cd65ee9bba3ab7a0f8a3e99e51be3ea64c9a34c,2024-11-21T07:54:34.510000 CVE-2023-28197,0,0,b0028e40b4402ddcd64e533b5a9757c40af44232ee19051239601e0493f7972c,2024-11-21T07:54:34.650000 CVE-2023-28198,0,0,ae34c1a56fa2108ed8ad4fc0a54302c4b1d1b763dabdc5146efb236d14a3dd22,2024-11-21T07:54:34.807000 CVE-2023-28199,0,0,05af04328d433371a3ddd30f536d3a6762568cdfa59840d0a9294deef10b4e5a,2024-11-21T07:54:34.960000 CVE-2023-2820,0,0,08d715925f7f5014699cb2db19e7ec85cff308a1685def5e596523dd96401861,2024-11-21T07:59:21.230000 CVE-2023-28200,0,0,22779f2fd2da8a96c7f3f5c92aa1445c68699ef8eec81c0220095c315e6bab45,2024-11-21T07:54:35.097000 -CVE-2023-28201,0,0,3b72ed119c38ad447e20db50b0e204b6f9722af31a874e645fb433c1d71f7dcd,2024-11-21T07:54:35.273000 +CVE-2023-28201,0,1,d32f98dffd71069baa9e03e46c720b8409c7128c98bb12bcc06703a79fa5daf0,2024-12-12T14:26:18.893000 CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf7fe,2024-12-05T17:15:07.837000 CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000 CVE-2023-28204,0,0,d29b1bc8f2cad26e0d01ee6d8c1150ddfc2761a38a4996cd387e5b09f29ccca7,2024-11-21T07:54:35.760000 CVE-2023-28205,0,0,5c84232494f2fcfdae49b4240e0969a21c90ed06bcedd6171dec390938943816,2024-11-21T07:54:35.903000 CVE-2023-28206,0,0,133d94b27a1b3c7e7df5cecbef9facfa4e231a0ac0e323a888a6687ed2719316,2024-11-21T07:54:36.043000 -CVE-2023-28208,0,0,97dff423f8f1e3be9864012295c3835e29519579b102a6cf74bb95e7ae7457ca,2024-11-21T07:54:36.180000 +CVE-2023-28208,0,1,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000 CVE-2023-28211,0,0,2c47262728ad176602183272ee6e13d09c3d058aa1bc5e5323714b37fe246b7d,2024-11-21T07:54:36.583000 @@ -225019,19 +225019,19 @@ CVE-2023-32421,0,0,d77d924a3f2984827f1e9563a2e4b6b5331da9100b5eceb620082e3d44ec5 CVE-2023-32422,0,0,73d03fdf9e33246a7bce76c8257d96b2959f868905ce0c084bd026fd40188c02,2024-11-21T08:03:19.437000 CVE-2023-32423,0,0,649c1fea8bb358cdb986652674a08f896a4ce22aa152f5b6c01d3129a8e957eb,2024-11-21T08:03:19.570000 CVE-2023-32424,0,0,683ff3dc266ba5113bf26052502eced1eeaa3aa9593de767afbcbc26a6c1779e,2024-11-21T08:03:19.700000 -CVE-2023-32425,0,0,39836bfbe0295959a92d652492761b12c48e6823b1a995ccaa96dc3a48ccfcdd,2024-11-21T08:03:19.813000 +CVE-2023-32425,0,1,5d12e602e911c4507fec6203eb76478f80fb57b35ff46e09bf5daa53d5a2bd48,2024-12-12T14:26:18.893000 CVE-2023-32426,0,0,fd77e42b4f67240428062c33ae76dc6a71f3f5905a3245c0ec491d905903d45f,2024-11-21T08:03:19.950000 CVE-2023-32427,0,0,cc5468223a597b0de35ba767fe8127d59a8f1edf477272ab39a011b2f2e623cf,2024-11-21T08:03:20.073000 -CVE-2023-32428,0,0,0bddf2fc6550a659e04b093c9b541c0a819887627184b4b3f6cdfff36372e41f,2024-11-21T08:03:20.187000 +CVE-2023-32428,0,1,99205db1a770f47b11ac7d95d5ca84c04e16d667c5b63388f13a2ae357684f4a,2024-12-12T14:26:18.893000 CVE-2023-32429,0,0,e46e02f258d51635ab5ef8bab6d35855f35e56d76662f17aff3e32f728cfd595,2024-11-21T08:03:20.323000 CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0b4,2024-11-21T08:16:47.080000 -CVE-2023-32432,0,0,3457420e2926628d4a5f489bc2d76177c685a7bb7de12f00747929ed6add3b53,2024-11-21T08:03:20.447000 +CVE-2023-32432,0,1,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000 CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000 CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000 CVE-2023-32435,0,0,8ba5c35ba3d4096c020898ee1b826ad36545f20cab90f7a54bedc2fe478ba0be,2024-11-21T08:03:20.847000 CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000 CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000 -CVE-2023-32438,0,0,d49d74a9791b71f07c54fe8fb9cdbfa9168c1fa0f56fb0fabd1ac40a4e25eec4,2024-11-21T08:03:21.223000 +CVE-2023-32438,0,1,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000 CVE-2023-32439,0,0,2ce1da5abff5d1853b37c29dc7ead4fe975de63113cb782df730a53c27083887,2024-11-21T08:03:21.347000 CVE-2023-3244,0,0,01470d499b32ea5cba53fbc6c2839f629c628a66441361005d09811a2b604954,2024-11-21T08:16:47.233000 CVE-2023-32441,0,0,aaaa4d579ed908d0b9e7528ac9c558ea7a2bc165ae2989c8a5559d52e290963e,2024-11-21T08:03:21.477000 @@ -226644,7 +226644,7 @@ CVE-2023-34349,0,0,06a40335d163da4fe7518e3f18c085a7bad1b6af503d4a45984fd2a1475ec CVE-2023-3435,0,0,e98f90f1d1fb2158c9d2c3adfd2e45e18bb6bf237e3d0fdce7cb8b06122d1303,2024-11-21T08:17:15.720000 CVE-2023-34350,0,0,682f1db060a4b8706d3ec2edf54dde23ce60e433eb3e296270782b2877db6c4e,2024-11-21T08:07:04.420000 CVE-2023-34351,0,0,fa851bda5a3d465a6e27ad470e5caf4c9af9d0323fd45a49d2d5ae5f9274c999,2024-11-21T08:07:04.560000 -CVE-2023-34352,0,0,b92adc2c91891f8c8bd1a2086316d683b3081e8e5b3272d5cb1844152fd723a4,2024-11-21T08:07:04.700000 +CVE-2023-34352,0,1,f72b1e6219a280c1523515e862a1044a3418ce987e6197cc5fa4a86813d27361,2024-12-12T14:26:18.893000 CVE-2023-34353,0,0,b831cf02b0c0b5c8a4a06f1a983e4a3856cb9f0d37d5c8519af0e0014ef4c403,2024-11-21T08:07:04.850000 CVE-2023-34354,0,0,a7af9aca49302ffb07c43a9f3f2ad659aa1bf706c207249117dee1313093aa83,2024-11-21T08:07:04.973000 CVE-2023-34355,0,0,ab6ae2eec5861033eae892aa10db430640863fe78fae4652af121597a8d70a8c,2024-11-21T08:07:05.123000 @@ -229287,7 +229287,7 @@ CVE-2023-38131,0,0,611709636100c69cf6d6cb78f5118ad5d0f848c4469c2e54b68cb7b55c4e9 CVE-2023-38132,0,0,bef6620e894452da9f54317308d5e61f7e24da5d400717d71860cadee3e4de3f,2024-11-21T08:12:55.523000 CVE-2023-38133,0,0,bb1189864474e7e88f0d93b35a80586c835dccabaae15f84263f8600a9354fae,2024-11-21T08:12:55.660000 CVE-2023-38135,0,0,a9eca0d1487abab7057a92f32328b56c514faa78c668f86dc1cd7bba91171771,2024-11-21T08:12:55.817000 -CVE-2023-38136,0,0,3c6a0b74ba4978fedab7de07869f2d1a9bf8eca18ba7d357cb5ae683187d28a9,2024-11-21T08:12:55.960000 +CVE-2023-38136,0,1,cc4955f78f48feea52a8ff9bece7ccf895118e79124cbc89767e10212b3e4ba9,2024-12-12T14:26:18.893000 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000 CVE-2023-38138,0,0,1f64720a33a48dc733e35902253cb6213fd10f67a3ac3695889a96fc8d42fddb,2024-11-21T08:12:56.123000 CVE-2023-38139,0,0,bd4ed8d4efc52bf413d252e03d4fba6e7225df8c564b1d7faa7098fc0d8be3b0,2024-11-21T08:12:56.303000 @@ -229413,7 +229413,7 @@ CVE-2023-38257,0,0,09d27492b5a9015c6faf62de453ab30551289fe6c5a01aabfd73be462e45e CVE-2023-38258,0,0,060aaace07f640fb2981b514ebc5317ede89a9f03b251196b17e0e6062544e74,2024-11-21T08:13:12.087000 CVE-2023-38259,0,0,f6d385bc4e8d3b221a1165b408f81be680399ebe73ab3fa34e6177f5071258ba,2024-11-21T08:13:12.203000 CVE-2023-3826,0,0,10a54531e4b61f73304f4069e0bd02e690466ff0531610c4169da8b0f580ffbb,2024-11-21T08:18:09.383000 -CVE-2023-38261,0,0,9c8a5ce57bd2d115944d5dfc607545d48cfcbb0fc96c1f8625fd34d52e4a8d2b,2024-11-21T08:13:12.347000 +CVE-2023-38261,0,1,2765150f90d3f70e2a92d7223b49d2806afecaad25ea073a91c33f5490b79d20,2024-12-12T14:26:18.893000 CVE-2023-38262,0,0,dabd543aed0a40cc49d4f82115ae229069d2208d7b1db90cb5f4f183a1ca41d4,2024-02-14T18:15:45.920000 CVE-2023-38263,0,0,eb0a88faca61f4b3b5594cac520716cbabbc0da206c5a5e1b79bc8ab8623a136,2024-11-21T08:13:12.477000 CVE-2023-38264,0,0,69fec526bc04dafd94aa9d55c534d1f2dc5220ab7efc0e2e5709e1498fe131a0,2024-11-21T08:13:12.620000 @@ -233076,7 +233076,7 @@ CVE-2023-42939,0,0,e616f5469a9d7bb93c6568524cd0da091acc5847091d9c388ddeadcb2cb5d CVE-2023-4294,0,0,fcd5217d18d35731ba36e8ff238f5a1bf98d496e576a6fdb93d816929d596780,2024-11-21T08:34:48.073000 CVE-2023-42940,0,0,081f1f083b0a5e08a4cc019094cc8130686f6068cec8c929ea7accb4db1ee05f,2024-11-21T08:23:33.703000 CVE-2023-42941,0,0,19defc185372677244aebe3d5063652959898759c97be2163da9238e29c2177e,2024-11-21T08:23:33.820000 -CVE-2023-42942,0,0,3274b98a531cd08d74304340509fb78bde32a21b5cbacb575666b356fbaa6330,2024-12-03T20:40:10.397000 +CVE-2023-42942,0,1,27e4c2c81073d4cfa2606c4ee2d9e468f15cec1dc91f380091e211ce6ab43fba,2024-12-12T14:26:18.893000 CVE-2023-42943,0,0,4348601e49a149ecf0cc722f6061370f0f19d3786dfa65f61a2443ae099f7801,2024-11-21T08:23:34.143000 CVE-2023-42945,0,0,200d2323886607812ee6e5544cc7dd3d7a9d9cd1bbcf9fd4feec9eae73a4bb8a,2024-12-03T20:37:44.587000 CVE-2023-42946,0,0,2f891640e91a360138828eb608ca23096bc37ddebdc3147d949a745dda2c8d29,2024-12-03T20:29:31.657000 @@ -233097,7 +233097,7 @@ CVE-2023-42959,0,0,e0711eaa631fd202edf70b35af742cf22eb3e7c7935db69f51becbb0419ea CVE-2023-4296,0,0,33ed9dd29ae54896f2c71a35c0cf4e6717a204ccdf2c2895c6a00d7ae9486fbd,2024-11-21T08:34:48.323000 CVE-2023-42962,0,0,eae5b5f8f8786c59ec83e045e5108238e720128cfd3c327cba0cde631527ec1f,2024-11-21T08:23:37.137000 CVE-2023-4297,0,0,aab89ab1490fbae98144b9e8b7a1072e7027356d76454a4a729b99641cbaa65d,2024-11-21T08:34:48.470000 -CVE-2023-42974,0,0,252a25f038a640dd8e95a4a1a78e56debc62bdfa87a9891793f33c790cd37bac,2024-12-09T16:46:58.417000 +CVE-2023-42974,0,1,d29cf4c12f6bfc30add86b56c7cddf36ff797f915e589c9ccb7d83e046515203,2024-12-12T14:26:18.893000 CVE-2023-4298,0,0,4ed5d094ffd5dea0fd4531466e39c4acc00f223f7c93151de436797f2abc86a2,2024-11-21T08:34:48.657000 CVE-2023-4299,0,0,2bb2546e4c2688f5cb6f960f37cc2f67d4a5cfbe4b334ba15f2c1261d771d0fa,2024-11-21T08:34:48.760000 CVE-2023-4300,0,0,723cb43892ca9bbdbe65bce2483f7097fa889e436033f6391408d357e0bbb2e1,2024-11-21T08:34:48.940000 @@ -233939,7 +233939,7 @@ CVE-2023-44250,0,0,0d3ab2a5f1dbeb27bcf4620dc515d818236fb1035ed356fbc0f5888149a72 CVE-2023-44251,0,0,210f76ac785503ef85f9f29e5171e770b552fc2f3cfa12b6a4e38e6574e41651,2024-11-21T08:25:31.357000 CVE-2023-44252,0,0,63c2d146a5ae0206e5d18228794b49ab364e208a0889d0266333bc65ee223842,2024-11-21T08:25:31.487000 CVE-2023-44253,0,0,05adddf01c28ccdadf157eaf7e699ca16a7f022edc42efc339913e2d8e614464,2024-11-21T08:25:31.610000 -CVE-2023-44254,0,0,75fe554063567aba06da5ccef57a53c326b8e18e0586e981e90c553f586b7eef,2024-09-25T20:17:40.970000 +CVE-2023-44254,0,1,475ef6ce457d30d091835ffaf71dd3aad018d0e54862a597c59869af0501a514,2024-12-12T13:56:07.013000 CVE-2023-44255,0,0,7fdcb3d3de35862cfec3d92f0ef2423e8b11fe79c792f372bb9fd7b3037b5267,2024-11-13T17:01:16.850000 CVE-2023-44256,0,0,e10f4305e62a4a76d73f69a54ab165b287870937a6bf5c86952e332366741db4,2024-11-21T08:25:31.910000 CVE-2023-44257,0,0,f040c2562709814f3b28ce0b714c95a5032145d9cb2f2f01e6d99c6378dfa7ca,2024-11-21T08:25:32.047000 @@ -234938,7 +234938,7 @@ CVE-2023-45860,0,0,b0a232784c907c1d319e7c8804731be31abf0a0c725f224e6a540a389e724 CVE-2023-45862,0,0,4892afe3223d3545625e1ee7b2caa991c4e28519ffdd4afa80b56977e6e0030f,2024-11-21T08:27:30.540000 CVE-2023-45863,0,0,7e6255563636556e753e7796ac4af3aefa345ee4e82a777323f5f5fcecc58f6e,2024-11-21T08:27:30.690000 CVE-2023-45864,0,0,6a3294dace0ff40a3a50cced6d2b6adb0b901408877204e37fea3d62ba5ec23a,2024-11-21T08:27:30.837000 -CVE-2023-45866,0,0,fb9ecaf46227551e005d097f3b17bdbb4fa1c3c2b6ae8ffbdb288c6caccc4b05,2024-11-21T08:27:31.013000 +CVE-2023-45866,0,1,cbf7cac96fb95d80c4c713c037b13d635525c2b9e57b23d9fc1adcd43bf029b6,2024-12-12T14:33:00.640000 CVE-2023-45867,0,0,c5950548ba5293881c74b3a11f24edec7618fa48a1057b0edd5094fcf622e914,2024-11-21T08:27:31.230000 CVE-2023-45868,0,0,40b498079fd380f3efc8be05a7ecf8de93dab24618d65616aa0cb8c27082264e,2024-11-21T08:27:31.390000 CVE-2023-45869,0,0,23f1d911a5119687fbd5eb685444cfff4088a5040669161b4e3b33c43519c795,2024-11-21T08:27:31.547000 @@ -237307,7 +237307,7 @@ CVE-2023-49060,0,0,4c0d752f52234ac5b2c5afa73fa3bd5f4d490c81b175ad6b9dd8f7509e06e CVE-2023-49061,0,0,7af406d30b2caa1b6fd7c257680f774d6fb0a30f02df3c6d99ace0a0c64683ce,2024-11-21T08:32:45.193000 CVE-2023-49062,0,0,3f72bcc43e8d39618a32732cc6fdb32aa26187117eb8dbf2cde612d2322c6a42,2024-11-21T08:32:45.310000 CVE-2023-49068,0,0,f934d451589c0486639c7452250c50f87bff70e169120c3b6e2d48b968d911f7,2024-11-21T08:32:45.430000 -CVE-2023-49069,0,0,e77673261bbd774d10e127672f71f84c304f9e77431045eed106775d130e9272,2024-12-10T14:30:36.767000 +CVE-2023-49069,0,1,4dd675a4bcdd715ef5af8de81fad90e175fe51ef7fad884ab7b4c5fc97c6ff60,2024-12-12T14:15:20.450000 CVE-2023-4907,0,0,90be30672dd3ea93872990567976373933c812f92a368cb35abe26c70cc23ea6,2024-11-21T08:36:14.203000 CVE-2023-49070,0,0,9c3d4a270f963f36dd20306a853b062b27d681d986a9a2c3bace9e52f7eaf712,2024-11-21T08:32:45.697000 CVE-2023-49073,0,0,a59c7f971c52a4d5004cf2ba397f8b1bff7a40aa00abdd575b19a18ae50de0c5,2024-11-21T08:32:45.843000 @@ -242915,7 +242915,7 @@ CVE-2024-10038,0,0,ebd3b63d92012ddaf16057a534e828f3dfcac6a3eb398c1c9f9e757273980 CVE-2024-1004,0,0,c4dbb102401f2137e0b8cd1bff949d2b544d9c71a1e20b6681f553badf7e1df2,2024-11-21T08:49:34.290000 CVE-2024-10040,0,0,f83eb1bf0d191e6ff28c64987d9d925532ba47fbade95b4f2582be8beaa243b5,2024-11-01T18:26:23.450000 CVE-2024-10041,0,0,4b41dd5debbc084bf5e0606c70490ab13b95ffcedabf63fcff7e5a18674f516d,2024-11-26T16:15:09.230000 -CVE-2024-10043,1,1,13688c90cdf23efa99c353df702bf2684b23a45eac1ab5206f484e4389a2d62e,2024-12-12T12:15:21.330000 +CVE-2024-10043,0,0,13688c90cdf23efa99c353df702bf2684b23a45eac1ab5206f484e4389a2d62e,2024-12-12T12:15:21.330000 CVE-2024-10045,0,0,856fc9a539db9327702f3141fe8cd970de60cdb7e18125e39405eb0d41f31999,2024-10-25T18:52:30.337000 CVE-2024-10046,0,0,b787fcdd5d7d124fce0b1d064cdbebb0879583867f2aea1259fc81f5d70c4638,2024-12-07T02:15:17.543000 CVE-2024-10048,0,0,ecbd52d9f528e72b1a462b39f0bdabc3e6386a862771af6a7927a393730bf0a7,2024-10-29T14:34:04.427000 @@ -243884,7 +243884,7 @@ CVE-2024-11263,0,0,cc23e994a38bc31df951aa6a58125fc0f0777c81e47c57f81b464948cdbf2 CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000 CVE-2024-11268,0,0,40373fcd315fe487c851607fe3ac45b00147e2cbb2f06b71a2f20cd5b3490696,2024-12-09T18:15:22.120000 CVE-2024-1127,0,0,156ab4f781dcbea8349dccaf03d8331b37e207b23f13868177d2fc6d72956211,2024-11-21T08:49:51.547000 -CVE-2024-11274,1,1,68416047580eaaa72dd4e9ca219e395346d31290ba0ce8919ace0c1ae20f7ea4,2024-12-12T12:15:22.267000 +CVE-2024-11274,0,0,68416047580eaaa72dd4e9ca219e395346d31290ba0ce8919ace0c1ae20f7ea4,2024-12-12T12:15:22.267000 CVE-2024-11276,0,0,bec6f6d7f70ddc5f33f40077c2ca48024f960e5925873d26e2cd076944abd586,2024-12-06T09:15:05.827000 CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b481b5,2024-11-26T20:59:50.643000 CVE-2024-11278,0,0,3f323ea4c088ae11099db65ea7e4647c3e5f880422ea2bf5351a2656e281a2c7,2024-11-21T13:57:24.187000 @@ -244476,11 +244476,12 @@ CVE-2024-12263,0,0,26e6f6662d9a18b231b0aa6c025b39b781c192581d3251c6a28c1443632d6 CVE-2024-12265,0,0,08a405cbd3278593ec8a61d1242715139e8d63dafea3d02ca0fbe833f73b571d,2024-12-12T06:15:24.143000 CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000 CVE-2024-12270,0,0,39bcf28b0c7f0c2cc7925c4c71867c3d58c667f7e488518c8c9808ae3acf42cd,2024-12-07T10:15:06.200000 +CVE-2024-12271,1,1,c0650f03cca9644a90682266e664ccabbc04f0f372266c55d1404f09537e354b,2024-12-12T13:15:07.570000 CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 CVE-2024-12283,0,0,dca4df71f894f590cb0f5d26cfe1803e25114c809f761c64773c44a35cabeb38,2024-12-11T09:15:05.697000 CVE-2024-12286,0,0,fd7295e26214e392d9cfe3b72df0f6a777b0e479184a2a0c173af7d7cc4270a2,2024-12-10T18:15:27.150000 CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000 -CVE-2024-12292,1,1,e027faa06b5953369db62292a4b64efc1354409048616ace4830c061b024cddd,2024-12-12T12:15:22.470000 +CVE-2024-12292,0,0,e027faa06b5953369db62292a4b64efc1354409048616ace4830c061b024cddd,2024-12-12T12:15:22.470000 CVE-2024-12294,0,0,c80c38451ddc3a567e7758d3362278a970e04ba14ecece8e507b66c499c77553,2024-12-11T11:15:06.623000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 CVE-2024-12305,0,0,591beb549e2fd130a4eb51689f906f54cfd4f9ef094b292b5ebd58de367d8b56,2024-12-09T09:15:04.970000 @@ -244564,7 +244565,7 @@ CVE-2024-1255,0,0,d4be5ae93b9e5092a7e5ab21334a6f9f4c81c0431c6141ca4ea56d5a345519 CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000 CVE-2024-12564,0,0,c230cd43d38fe8c83310efd182b4d76e37d3a9bde033f283d87a798eb552782a,2024-12-12T08:15:16.517000 CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000 -CVE-2024-12570,1,1,55c8778ae52085a06019b95421840b0ea1343cca5de17e3c27e61710e2f13cc0,2024-12-12T12:15:22.660000 +CVE-2024-12570,0,0,55c8778ae52085a06019b95421840b0ea1343cca5de17e3c27e61710e2f13cc0,2024-12-12T12:15:22.660000 CVE-2024-1258,0,0,debedad37d9addee2213fe56690e6af35567d54f911af42012dde5a258793ebd,2024-11-21T08:50:10.573000 CVE-2024-1259,0,0,20758d1bd1b7d5c9a9cfa7609b802ac82aa264b25c107b9463c99ee9056f246a,2024-11-21T08:50:10.730000 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 @@ -245729,11 +245730,11 @@ CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c6 CVE-2024-2057,0,0,e5c93f7381e9c562590637af109bc48ab64f0cda8b9656e06708802a9eaa17f2,2024-11-21T09:08:56.920000 CVE-2024-2058,0,0,33a3e353af74f2d695cce3be2493a5677751c7365de6b1d8c6772bcf6a979a5a,2024-12-10T23:23:40.153000 CVE-2024-2059,0,0,5f97477692139521401f190887f1f2478fd814e5ddd0152ac688240955c16848,2024-12-10T23:24:34.477000 -CVE-2024-2060,0,0,e30aa9c1a298c19807282a1755921a86bb2e5b5f93b64559a78c7077fba12793,2024-11-21T09:08:57.347000 -CVE-2024-2061,0,0,79dc1bd1746c35498269eb72fd4501df46f607a32105dcc0bd7da4fa73505d75,2024-11-21T09:08:57.477000 -CVE-2024-2062,0,0,4aff557e6e96d7678134b316b3c4ed63f2c8d5ed487405f524f805b6164b27d3,2024-11-21T09:08:57.603000 -CVE-2024-2063,0,0,0056e68c2a6d4d39e29d86045baa8823246c8c5c6f26326049b79181e450b2b7,2024-11-21T09:08:57.740000 -CVE-2024-2064,0,0,2385eb67d6be623ad8112182ae984d3fa2e8ae69076b3b790807ac9a6b5deb1f,2024-11-21T09:08:57.877000 +CVE-2024-2060,0,1,753d0b50bd9fe186a347f752fb632f1046e6ed9fc391161852ffbbfeda3b1450,2024-12-12T14:59:34.407000 +CVE-2024-2061,0,1,69d09f2649de7c5f2bc6337421821be600beea7cb539776419eb64deb0e3397a,2024-12-12T14:59:46.863000 +CVE-2024-2062,0,1,d47243d1ea2357e9fbeb5950fae1c877f503df0e90bd3e4b48e2f1f6395a7e19,2024-12-12T14:51:50.387000 +CVE-2024-2063,0,1,105f8bba07f6e5d58d542106ecd8b4b67b8fe0ee30b7d06894bc8f61187f81c8,2024-12-12T14:52:44.657000 +CVE-2024-2064,0,1,0fd223e9d69be50cb5e3f32325fa5a0fcf1872f9c64691113c80f1f1b0e20fed,2024-12-12T14:55:04.297000 CVE-2024-2065,0,0,85538f13ab9c0d974ee84ce6ef9ff20f8f4fb1a30faf640caa1bccd504d0aa69,2024-11-21T09:08:58.017000 CVE-2024-20652,0,0,0c8f02a3e1821b5da5ebcb9143d8efb2bf923d87af3d4955d19f16d3a1cd64be,2024-11-21T08:52:50.477000 CVE-2024-20653,0,0,1490a2533670cff7c4699493600e894af921fc46cc87168ccab2b53e4ddcf6ce,2024-11-21T08:52:50.663000 @@ -247761,7 +247762,7 @@ CVE-2024-23193,0,0,5c86364f2e9a596bd450fe9fda7b94c5e059889fda5e9241f244c9d0b6271 CVE-2024-23194,0,0,4f40f5167bdcf1a866193efba982a2c3887ef8a11b46c3ce806ea82446be0618,2024-11-21T08:57:10.087000 CVE-2024-23196,0,0,0d32c51ce72350dd7c64548130f68fa93ab80dcc404414e8b48b908eeb62f212,2024-11-21T08:57:10.203000 CVE-2024-23198,0,0,2ed7d3b0098de9236c6804af620722b58125b2d81b99a0ac437923755e294f60,2024-11-15T14:00:09.720000 -CVE-2024-23201,0,0,6ed91e352afbe440084318a506bc61cae0112de96fcbe1ed002ee6097d98108d,2024-12-05T16:55:37.627000 +CVE-2024-23201,0,1,33e7e632afe1a49f2c14e60ce462e7acaef1367469488bf13783b4201dbe914d,2024-12-12T14:33:00.640000 CVE-2024-23203,0,0,95b0cc98c6cf15bf88b9b805ab28c64e75e08db553bb09a3fada68b81cfc6d9c,2024-11-21T08:57:10.620000 CVE-2024-23204,0,0,e3db754c1857c0a2e5208847645179d7ff6f5e9b5ceabe6657345c274158c1bb,2024-11-21T08:57:10.750000 CVE-2024-23205,0,0,e18ee594460a44f1f65af5f62c86fe10e8903646c6e9896a40c7de1ae7cf9620,2024-12-05T16:45:45.183000 @@ -247787,7 +247788,7 @@ CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059 CVE-2024-23225,0,0,9dfb819681987b4a5a9414d770000d224347f0f554d029e87276f60932096d78,2024-11-21T08:57:13.833000 CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000 CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000 -CVE-2024-23228,0,0,fabb67c070c23a358c12e5aa72c58f105d051682dfa4bb029cd67e201bdd2a60,2024-12-10T18:03:26.043000 +CVE-2024-23228,0,1,4777eb1057e01b89423a9fc98cb690d47cbff49eeda10b8695a9f357523c2a6d,2024-12-12T14:33:00.640000 CVE-2024-23229,0,0,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000 CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000 CVE-2024-23231,0,0,ba1d2593aea3c4c4a174d2e33b5049749196fa54034828f6beef5b71f462e4b8,2024-12-05T16:27:10.467000 @@ -247834,7 +247835,7 @@ CVE-2024-23268,0,0,a4c71a604889babee2e216d86343f0529f00ea91abd63d6059a91119c010c CVE-2024-23269,0,0,ff17c0eb56233e8c1810d5c7d345cd079818a9bae566e9d38123eb71446315f5,2024-12-07T02:24:18 CVE-2024-2327,0,0,d808ee50b7311490896cd8bdb8756e9f194caa00018a5e3650ac719c80993330,2024-11-21T09:09:30.713000 CVE-2024-23270,0,0,efc25267f76e51fabdd2fb3c6181d1a0b3289093213986fcbb3a9c324f22bac6,2024-11-21T08:57:21.540000 -CVE-2024-23271,0,0,d84e39fab89ccbf882a4c4cd50017e8fcfd39eac0fb58f6d2914463b06c5ae14,2024-12-10T17:59:41.370000 +CVE-2024-23271,0,1,5d71e6f3b33842773f30db60947f5883e7fac8e4209545a57c6e0cff9cef7f50,2024-12-12T14:33:00.640000 CVE-2024-23272,0,0,08c7845c329ebb70a04bd317b5b476df2f47be5440c894d265d78e8332ad9e18,2024-11-21T08:57:21.970000 CVE-2024-23273,0,0,6682ed6ac45cfbaaac0fe8ef6ae5c842d9a8d5e71f5e7eee23e553a23545b047,2024-11-21T08:57:22.103000 CVE-2024-23274,0,0,318b4df782d3c6e71148c6552d1841eeb2ed2926c2f9c1ed83914e87222269ee,2024-11-21T08:57:22.330000 @@ -251223,7 +251224,7 @@ CVE-2024-27785,0,0,33fb495428cc1ae3149f69e28bb269378e2b02f54308ee72c86f0fdee748a CVE-2024-27789,0,0,629b0eb4c889aa6984222a2f069788b087760d7a2b278ce5cd8b69fb5a39ad91,2024-12-09T19:28:42.173000 CVE-2024-2779,0,0,48faa7e8e11bfa3d30687d130ca268634cf645c8049636c0e48558d9c97e39e2,2024-11-21T09:10:30.013000 CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f431,2024-12-09T19:31:56.207000 -CVE-2024-27791,0,0,439aca2fd1f55eeaf8fa200c5d29a0be14fb7faf194f143c1548179e82383c22,2024-12-10T17:58:55.290000 +CVE-2024-27791,0,1,cced26eba1922f922a989a68f8969cd506e95668cebd2d4731d8f0f634e4325a,2024-12-12T14:33:00.640000 CVE-2024-27792,0,0,f31b62b6f6fa42ac443db705e1bcf2907bbf913e30a3984de7b426f885533f5d,2024-11-21T09:05:03.877000 CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000 CVE-2024-27794,0,0,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000 @@ -251236,26 +251237,26 @@ CVE-2024-27800,0,0,78fc466a5a3bc2fd93a87f9252c88beddb725a45d7abbe6a920f8fae9f2e7 CVE-2024-27801,0,0,720cea692e34651a5265f635aa3400fa0ae834d7fa3223fa64ee366beda959f9,2024-11-21T09:05:05.390000 CVE-2024-27802,0,0,d93ef75dc5eeaeb883b4133f9552e0ead554b44d6061155d92fdfc3f1ac7f547,2024-11-21T09:05:05.640000 CVE-2024-27803,0,0,57628ee2a3feb80e1c2eaa68ad6c74f016c8d3c240bd24844f69c1bc20ce3abd,2024-12-09T19:19:52.583000 -CVE-2024-27804,0,0,7af3cdd40a8567eed16b709e51a205f9d47e981fb7782f5899966d23e2723fe8,2024-12-09T19:25:03.827000 +CVE-2024-27804,0,1,a29744c60490bc8d871154f016c981e176782317111f5eae9bd7bffb3fe827a4,2024-12-12T14:33:00.640000 CVE-2024-27805,0,0,305e3c300912952c560e48c8adc35b883194d1194f1733bc789072ff631f3e97,2024-11-21T09:05:06.223000 CVE-2024-27806,0,0,04ae2f924f27899fabc437b68048a977a78d58a5dfac718be7ed36670048d4dd,2024-11-21T09:05:06.393000 CVE-2024-27807,0,0,b016f86f84ff3be5552fb4afdb86e3ff10dc5c6f121c45f7bd657b8d06f30e77,2024-11-21T09:05:06.567000 CVE-2024-27808,0,0,dfd2c1144d0a5d419427b718c6ce49475ee3dbc0e0385d1e51f26b909b153ec5,2024-11-21T09:05:06.720000 CVE-2024-27809,0,0,37e58d803d63de85ca90a78876427abd2ec5daef1ccaf9e8d7067d55f7a69003,2024-11-21T09:05:06.963000 CVE-2024-2781,0,0,5db24c11b7ff425ba8bd3bc724b16605f1e9f4ee6d83ed18dad9d4756913a2f4,2024-11-21T09:10:30.277000 -CVE-2024-27810,0,0,c45e8a8a23369357bb9a21b53398fc280320a10b7919d575370fc32bfe3b869d,2024-12-09T19:14:08.850000 +CVE-2024-27810,0,1,0628d7b2890240a6eb441f13cd3ca854f8e8cff37b4689a851937f7340f4db89,2024-12-12T14:33:00.640000 CVE-2024-27811,0,0,c04d71d0d3f7fe84fc297afd712b4cec9b87b90e7c1dcdf468cbc3048db22a41,2024-11-21T09:05:07.357000 CVE-2024-27812,0,0,990107596f1e534025072a9bc1ed03a11b1fa3c1694782e485345ceb7b5df925,2024-11-21T09:05:07.637000 CVE-2024-27813,0,0,5d6a815fd129c8774bcecab0dde1809a9b9e4fa7eecfd6b9b8c142caa5672720,2024-12-09T19:10:27.723000 CVE-2024-27814,0,0,a8f1c9abd07f6955526f110808053a26f5e88f4fce2a4eb46b087a3616519c3c,2024-11-21T09:05:08.047000 CVE-2024-27815,0,0,193b5220cd8f10dd9ee9ca9a7a47183212b5114c55a334e29aa9c7e47768ef54,2024-11-21T09:05:08.303000 -CVE-2024-27816,0,0,334654513b3404ade23d9a46bafe4c56a1306444c7c3ccc6c50e0d2d5deb8afa,2024-12-09T18:59:05.477000 +CVE-2024-27816,0,1,d126026a0e8c09579a5f31347cc45bf3577225eb227c98451e45b114e71fba42,2024-12-12T14:33:00.640000 CVE-2024-27817,0,0,6dd9dd975d0fcfe58238d9ba3ba9e1921b514abadfa496cb71844ef21c201d0f,2024-11-21T09:05:08.793000 -CVE-2024-27818,0,0,7a8cd425a14ee433567d01539eb40da8fde96abececcaf8dd03320db0eecdaca,2024-12-09T20:21:02.197000 +CVE-2024-27818,0,1,bf2ff5e56a5dcc0026326b877c5d2f40490029874fbc80b54df6651b77bfe1fe,2024-12-12T14:33:00.640000 CVE-2024-27819,0,0,af5349cb7fb8018051d3446391b7c541613e37fd1a57a702dbccd3af5f1ae345,2024-11-21T09:05:09.137000 CVE-2024-2782,0,0,0fbffd09bb8d00a40b2857d7fa7951d51bd7afe07485ce80aa521012139d7b52,2024-11-21T09:10:30.413000 CVE-2024-27820,0,0,b615b9c5d68a674c239e6993b78212fe0266a4c1058c37eeaa57e7bae0332265,2024-11-21T09:05:09.333000 -CVE-2024-27821,0,0,04c0a314898330696abcc412c5d53cf7faa36fd50076d840a4eec6c1d9189b98,2024-12-09T20:45:41.037000 +CVE-2024-27821,0,1,662c0fdb4a6b9881c4e3b0e9bdefd91c75dc8c6155b30ede36ff0f65a0b09925,2024-12-12T14:33:00.640000 CVE-2024-27822,0,0,f8be55eb8bf86503cf81512385aa89b340f124c8a3f8c20fd852538813632324,2024-12-09T20:45:57.453000 CVE-2024-27823,0,0,78c75b2c22fe34bed862cefb90eaed8a187e580151d9a70d547054d573dd3f8b,2024-11-21T09:05:10.170000 CVE-2024-27824,0,0,2cc12ddd99599dd006872c0cf7b8d5ab63b8531da94587db60786c0ccab83ed8,2024-12-09T19:47:18.810000 @@ -251269,8 +251270,8 @@ CVE-2024-27830,0,0,b0521ebc14fa7593afac28a97f2ffc5b645a238bddc7c634576c0a0eb1c02 CVE-2024-27831,0,0,021ff19030824e294055f32a82c8285e7d73be4c916d4ff29def1abb6f3c09a5,2024-11-21T09:05:12.317000 CVE-2024-27832,0,0,04dcb345a14a0cb6ad8ba4a692e5d933148730aef6f5fc463e2f2d88998d59ff,2024-11-21T09:05:12.617000 CVE-2024-27833,0,0,aca57f4f6788befa5ae19c7880aaae0334b13dc3e08cacaa08f3bb1676962cb1,2024-11-21T09:05:12.963000 -CVE-2024-27834,0,0,7ea76e4baf4ba7b67b0fdc12af786d548e567eac33d807077e93cb8c6039649a,2024-12-09T19:27:43.577000 -CVE-2024-27835,0,0,a377a6efb0a3a23c68a73fecff6189f518f9a61f64872e1ca8a3d7eba8227309,2024-12-09T19:35:44.313000 +CVE-2024-27834,0,1,6c6d54d22633be541c48da8706377c23c9ad13fa603579cca3775efd6a72c3d4,2024-12-12T14:33:00.640000 +CVE-2024-27835,0,1,f881b6857db9fc81b1871120d8438516334e3c0ba89dfda682c1ff2f016b760d,2024-12-12T14:33:00.640000 CVE-2024-27836,0,0,cbc2d84b81c4d8680b3e2ce71e679c4626236304b018eec892d9a66d50b30816,2024-11-21T09:05:13.850000 CVE-2024-27837,0,0,dbe00fc9ad9cfd5169a026b6dd14e56e505a786293836f85ce62ef635b022b41,2024-12-09T19:50:49.497000 CVE-2024-27838,0,0,f48a4ff4fde890aeedd51ce8d5c4a8dd37d520a0fe71173be2957a5d08c5e442,2024-11-21T09:05:14.337000 @@ -251562,6 +251563,11 @@ CVE-2024-28139,0,0,871d40bc8a7366798572b17910afce0da36a7dc3bc42652a155d0d45e3265 CVE-2024-2814,0,0,266291004cb50fc9fa499704214f3d6d747ab61c03d4ecf60b55016bd9e70c6a,2024-11-21T09:10:35.307000 CVE-2024-28140,0,0,4c0d53437c48eb1f32a5b64caceb78ae4d2e11497873371834b83dd5680d3140,2024-12-12T01:47:46.317000 CVE-2024-28141,0,0,d301dc86e6b9da2d535b33aa3d93591f7cfa6960db015fd11adcc9dde289a182,2024-12-11T17:15:15.007000 +CVE-2024-28142,1,1,6cb61a9f0f8449b1b568192393be8881ded9059ad87a84d1806cd5aa61af294a,2024-12-12T13:15:09.763000 +CVE-2024-28143,1,1,03751e070551dd60cbde288b3b2942c58190e62afc2cef23201e91771a583cc2,2024-12-12T14:15:22.173000 +CVE-2024-28144,1,1,81be89bbbb4abedd6fa2db2b638f26a18dc9c9fec5168864f1e906af6d78a8eb,2024-12-12T14:15:22.330000 +CVE-2024-28145,1,1,1e813b570d6af097f04e3a2f93b40ef98c71cad14280a9f8266a6f3abf985861,2024-12-12T14:15:22.467000 +CVE-2024-28146,1,1,a454235f37e4f5cd71a6085407c2105a9d91786049302c11105b501b7ed5ccc6,2024-12-12T14:15:22.613000 CVE-2024-28147,0,0,385f022ef3b9e74c16d2ca430dbfe84754b0905ec234f9f62a2995438a07dfd7,2024-11-21T09:05:53.770000 CVE-2024-28148,0,0,3ac8f61b51b12f3a297806b3219d55d9a6d8e022b2f823c428c505a4ab5ae12c,2024-11-21T09:05:53.983000 CVE-2024-28149,0,0,57ed6574f074778f026c6cc859bdab33a0e7bd4d9407db0a106e88c4247206d2,2024-12-06T19:15:11.663000 @@ -257745,9 +257751,11 @@ CVE-2024-36489,0,0,483f02515bfc91c5ae3d16c61773df6c14d7d1b71a9ade79929d031b233a7 CVE-2024-3649,0,0,9d4b3c873377dc252861a0a03bd9c832139a807a0ffd6ec04c3597a6690414bd,2024-11-21T09:30:04.903000 CVE-2024-36491,0,0,c755cb5a1143bbce4a7cda0b31b5fee61d8d298088a69a8871a699ccb2c2e2b9,2024-11-21T09:22:16.813000 CVE-2024-36492,0,0,e317bdf7a68aa0ba85302ebd2a113aec9f051f925a8df929903da8016701a4ff,2024-08-23T14:51:08.580000 +CVE-2024-36494,1,1,3540278f02115410a54db8dbbec83a8b2dada3f5b7a5289eba714855c82641a1,2024-12-12T14:15:22.740000 CVE-2024-36495,0,0,7a48233cad150c8548a3307f191550e3a4681c1f61964468c57271a9b155ed9e,2024-11-21T09:22:17.123000 CVE-2024-36496,0,0,714184028efd3fe8c9f7d2ed728a4da4803d7a712f47e3b49b2335391ba3f339,2024-11-21T09:22:17.317000 CVE-2024-36497,0,0,8eced1bcdef5e314cf0f9e441a92136c389e617dfa3768edcabff5beddde4a7c,2024-11-21T09:22:17.510000 +CVE-2024-36498,1,1,413e14e6ad08d9c61634262f616ee78abf93816f1f45688c171ea6771616c33b,2024-12-12T13:15:10.540000 CVE-2024-36499,0,0,ed858a4b472fd445a2ad0302c3cb1fbf31dff02fd641ba3d16a4232251d27f43,2024-11-21T09:22:17.690000 CVE-2024-3650,0,0,39c66b574e110ed65a957c31c0ff9b18a289672070e2636411b75e7ed3e28849,2024-11-21T09:30:05.030000 CVE-2024-36500,0,0,3749986292cf3f04be3ecd79c3eae7049cd48de8e666dbec442c9f3a4ab4ee71,2024-11-21T09:22:17.843000 @@ -265770,6 +265778,7 @@ CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48 CVE-2024-47944,0,0,2b62f766b4e887a556703c4ed0cb75befb46953f16e7999cc97a39c4906c4816,2024-10-15T16:35:09.410000 CVE-2024-47945,0,0,4eaa4330fd6e6ea36aef0bbee2681edcaf5e4575b714ff483b0a9415275f4700,2024-10-21T19:41:10.407000 CVE-2024-47946,0,0,ee189e084ef2ce307b61e5f5ca3165fcf3b82770c351969d8c2d68fa96cf146f,2024-12-10T08:15:19.210000 +CVE-2024-47947,1,1,d1b994a48e6b4f8ec3583fba5fcc683670af31653a32905f4aaef7b6a4979777,2024-12-12T13:15:10.920000 CVE-2024-47948,0,0,517ff2cf40b380f17f0ca0cb700d9beda797d40f6236e57145e952b4be3c000e,2024-10-11T19:56:44.863000 CVE-2024-47949,0,0,c7868bf3f997ce1e01baff6d85be7f51aca23f28e73102f98ffda228afc78456,2024-10-11T19:57:06.207000 CVE-2024-4795,0,0,874142283439f7d65325bd0714cbf0599f4b631a02f97bcc512f2aca94da1495,2024-11-21T09:43:37.747000 @@ -267569,6 +267578,7 @@ CVE-2024-50580,0,0,3398f584a5664889c1e4deaaab3b304a2b81a8e4a61ec448e96876890935c CVE-2024-50581,0,0,46efa2852e259a5f8d275b5dae3ea2a01d70670e7b9ab092dcb227fcb28b2ae1,2024-10-29T17:17:20.747000 CVE-2024-50582,0,0,bc56234b3ab653a760273693a6e0012ab15651a705a524c4f1f1233ab3806295,2024-10-29T17:16:46.007000 CVE-2024-50583,0,0,7274c5e22b718796ad1b4962554320fbc5e753e3e5b53c77142694b9ec8dd2dd,2024-10-25T21:35:08.253000 +CVE-2024-50584,1,1,4135d655b74e68f2958d8835e4d1b9a7ed598273fddd4654b44762351a0b4d3c,2024-12-12T14:15:22.833000 CVE-2024-50585,0,0,3ab67247e8f30f4fbfca962702858819d9540939e9d4e81cc6f18dea9bcdce2b,2024-12-12T02:06:30.727000 CVE-2024-50588,0,0,bfaa579943a78c86d813d9dedefba8b226ac11f00c84d1c00da87c599a1cb193,2024-11-08T19:01:03.880000 CVE-2024-50589,0,0,64643b83ced7e561121c5a71099032b9b033224c4f3853ee59622fb2bbd5e998,2024-11-08T19:01:03.880000 @@ -269440,35 +269450,38 @@ CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000 CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000 CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 -CVE-2024-54091,0,0,d3d3ef567bc07203eacd243364831a07a307a7b442281f775f6be9f7c62bf73c,2024-12-10T14:30:47.193000 +CVE-2024-54091,0,1,dc351406c488f002e073939d29344cb9478bbe226b29253f9010eef494af4991,2024-12-12T14:15:22.953000 CVE-2024-54093,0,0,c9952f718b9dee5ade98198ba738919650786fa00e81e0f00fb78cc1b9473a29,2024-12-10T14:30:47.350000 CVE-2024-54094,0,0,694ba54d9708cc1a645dcf1348a2fcb0fdf3ec8538eee26d6c1d91de386dfffb,2024-12-10T14:30:47.507000 CVE-2024-54095,0,0,0fd9f2382bb077e34770785fba7450b0fb33d7127731375f559f57743667fedd,2024-12-10T14:30:47.660000 -CVE-2024-54096,1,1,9261c64f31476c9e801125d110238de2f41ab464009f69a1e17e737c35dad121,2024-12-12T12:15:22.863000 -CVE-2024-54097,1,1,85148239adb3a8f48cee178befbfa05884dcc9f615091e00d2f8a5734140b33a,2024-12-12T12:15:23.060000 -CVE-2024-54098,1,1,d0efe25d3c347a8bbfa56b3383d186c21cfb5473126e43a6b8b504ddde7fc595,2024-12-12T12:15:23.243000 -CVE-2024-54099,1,1,bbcbaf28c2160611d51c0f728f59ab462e3b911669ddc33aa08124e6675a8b6e,2024-12-12T12:15:23.420000 +CVE-2024-54096,0,0,9261c64f31476c9e801125d110238de2f41ab464009f69a1e17e737c35dad121,2024-12-12T12:15:22.863000 +CVE-2024-54097,0,0,85148239adb3a8f48cee178befbfa05884dcc9f615091e00d2f8a5734140b33a,2024-12-12T12:15:23.060000 +CVE-2024-54098,0,0,d0efe25d3c347a8bbfa56b3383d186c21cfb5473126e43a6b8b504ddde7fc595,2024-12-12T12:15:23.243000 +CVE-2024-54099,0,0,bbcbaf28c2160611d51c0f728f59ab462e3b911669ddc33aa08124e6675a8b6e,2024-12-12T12:15:23.420000 CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000 -CVE-2024-54100,1,1,7f515e65bdb6ab5181f0118723843d8f5c6afa40f279ffecf4b8c9d1571ac01b,2024-12-12T12:15:23.593000 -CVE-2024-54101,1,1,d7186920e2b075ebba0208e83d07ec821c5673384b0d7e299bc1802bcd81467f,2024-12-12T12:15:23.763000 -CVE-2024-54102,1,1,ce00efa4b532daaff43ff118ab0c4ac9dc4234c0ae50d2c0f1338a4144c85289,2024-12-12T12:15:23.930000 -CVE-2024-54103,1,1,80d5e2584365269ddcc08fb7032346b2f0951d36adf55f0c491fcd2cd60ef3fe,2024-12-12T12:15:24.123000 -CVE-2024-54104,1,1,1f0e4c6be4ffcc67d6b0f08808f86688a53278ae0874bb7cd16befc862ff64b6,2024-12-12T12:15:24.550000 -CVE-2024-54105,1,1,df02f666da31fce1001d1a95e5512a5107155dfc1f3165f5d0e9ab8e63e4dd2b,2024-12-12T12:15:24.983000 -CVE-2024-54106,1,1,de39841c40a5530520f350610324ac4c1eb2bab21154d33849699860befaa174,2024-12-12T12:15:25.237000 -CVE-2024-54107,1,1,0ff2eb6f92e00e3c5ef9427ebcb12c7721187f8bf7305d2839cfcf2410987f14,2024-12-12T12:15:25.653000 -CVE-2024-54108,1,1,4143f69ac737b42f763083f896fb4f01320638f88eafcf7c834857b6e4cdc577,2024-12-12T12:15:26.023000 -CVE-2024-54109,1,1,56344fe1ed621c9f75d875f4c8441bc88e4f5f6f4c6cc53a246c6690c62ea040,2024-12-12T12:15:26.270000 +CVE-2024-54100,0,0,7f515e65bdb6ab5181f0118723843d8f5c6afa40f279ffecf4b8c9d1571ac01b,2024-12-12T12:15:23.593000 +CVE-2024-54101,0,0,d7186920e2b075ebba0208e83d07ec821c5673384b0d7e299bc1802bcd81467f,2024-12-12T12:15:23.763000 +CVE-2024-54102,0,0,ce00efa4b532daaff43ff118ab0c4ac9dc4234c0ae50d2c0f1338a4144c85289,2024-12-12T12:15:23.930000 +CVE-2024-54103,0,0,80d5e2584365269ddcc08fb7032346b2f0951d36adf55f0c491fcd2cd60ef3fe,2024-12-12T12:15:24.123000 +CVE-2024-54104,0,0,1f0e4c6be4ffcc67d6b0f08808f86688a53278ae0874bb7cd16befc862ff64b6,2024-12-12T12:15:24.550000 +CVE-2024-54105,0,0,df02f666da31fce1001d1a95e5512a5107155dfc1f3165f5d0e9ab8e63e4dd2b,2024-12-12T12:15:24.983000 +CVE-2024-54106,0,0,de39841c40a5530520f350610324ac4c1eb2bab21154d33849699860befaa174,2024-12-12T12:15:25.237000 +CVE-2024-54107,0,0,0ff2eb6f92e00e3c5ef9427ebcb12c7721187f8bf7305d2839cfcf2410987f14,2024-12-12T12:15:25.653000 +CVE-2024-54108,0,0,4143f69ac737b42f763083f896fb4f01320638f88eafcf7c834857b6e4cdc577,2024-12-12T12:15:26.023000 +CVE-2024-54109,0,0,56344fe1ed621c9f75d875f4c8441bc88e4f5f6f4c6cc53a246c6690c62ea040,2024-12-12T12:15:26.270000 CVE-2024-5411,0,0,e795bc7b322ce716766b807c3b3b3802815a82a4cbe62ad72330624f242dbba1,2024-11-21T09:47:36.060000 -CVE-2024-54110,1,1,3f42e20a25cbd91964a89e9fdfbea09ea139eba6f3574895d470cd5289c69a21,2024-12-12T12:15:26.453000 -CVE-2024-54111,1,1,77d1193dcf328f6cc416a16012a2642072a9732c7ba8f363914436c79d1f4c70,2024-12-12T12:15:26.647000 -CVE-2024-54112,1,1,327478728a691456163c2d383338a11b1642cfdb2d101001c14c7cf30a96b490,2024-12-12T12:15:26.823000 -CVE-2024-54113,1,1,c17639bbac31d6e767f94e59a9d5739dfb09652acfe6fca0f6bdfa4200798999,2024-12-12T12:15:27.003000 -CVE-2024-54114,1,1,a111534753b98540ca337acd88aa702ae8e630c62254e7687d6734548077dc0f,2024-12-12T12:15:27.187000 -CVE-2024-54115,1,1,741355349f9435cd42c66f3377cffe1583cafeb2023d8a0204d2ccf228f9cecb,2024-12-12T12:15:27.363000 -CVE-2024-54116,1,1,197dbc22138009348c82a9c1242c98a9b08fd86b4623d5cdeb06e97e7982fbff,2024-12-12T12:15:27.570000 -CVE-2024-54117,1,1,837b889858c5f1ca4d6b9874369983f269bb57694a2e404b05d165d17f63d118,2024-12-12T12:15:27.747000 +CVE-2024-54110,0,0,3f42e20a25cbd91964a89e9fdfbea09ea139eba6f3574895d470cd5289c69a21,2024-12-12T12:15:26.453000 +CVE-2024-54111,0,0,77d1193dcf328f6cc416a16012a2642072a9732c7ba8f363914436c79d1f4c70,2024-12-12T12:15:26.647000 +CVE-2024-54112,0,0,327478728a691456163c2d383338a11b1642cfdb2d101001c14c7cf30a96b490,2024-12-12T12:15:26.823000 +CVE-2024-54113,0,0,c17639bbac31d6e767f94e59a9d5739dfb09652acfe6fca0f6bdfa4200798999,2024-12-12T12:15:27.003000 +CVE-2024-54114,0,0,a111534753b98540ca337acd88aa702ae8e630c62254e7687d6734548077dc0f,2024-12-12T12:15:27.187000 +CVE-2024-54115,0,0,741355349f9435cd42c66f3377cffe1583cafeb2023d8a0204d2ccf228f9cecb,2024-12-12T12:15:27.363000 +CVE-2024-54116,0,0,197dbc22138009348c82a9c1242c98a9b08fd86b4623d5cdeb06e97e7982fbff,2024-12-12T12:15:27.570000 +CVE-2024-54117,0,0,837b889858c5f1ca4d6b9874369983f269bb57694a2e404b05d165d17f63d118,2024-12-12T12:15:27.747000 +CVE-2024-54118,1,1,06dbbaa56dbb0521d92a05cf41eb27809fd6ac01cf0fe92db998592469d94917,2024-12-12T13:15:11.180000 +CVE-2024-54119,1,1,8d1b082013414edb4cf2a70c615ee571882f6082c2475b11b8446d45709196a0,2024-12-12T13:15:11.350000 CVE-2024-5412,0,0,30cdd8d4ddc0c145e9e904e4cec9f4dfba9de81bde8e7e7c7fe70aa069b0dcac,2024-09-06T18:07:43.940000 +CVE-2024-54122,1,1,dd9e24175ea566453e4c3ad71fd1ead238a480148cc91ac618503312b8837b99,2024-12-12T13:15:11.527000 CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000 CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000 CVE-2024-54126,0,0,3941fb8e728e330fd976c4332894869311a751e23bfc8b1148739b238362642b,2024-12-05T13:15:09.290000 @@ -272053,7 +272066,7 @@ CVE-2024-8174,0,0,1dc878ba3beb9968167e459c17f743abf529f1002a73d2a9a97eee6f148db5 CVE-2024-8175,0,0,315b5d8c30fa3f596d2b19f9165abc0783338a7797fc6b810b3d2ebf5065b9c7,2024-09-26T13:32:02.803000 CVE-2024-8177,0,0,68f0684d583a9f9a4ce375a0141ea9098b00e19628bd3c6b03452fa109f6e864,2024-11-26T19:15:31.860000 CVE-2024-8178,0,0,f63bf0f152c4f86c96b3594773688985cacb234931d40b4f2f4b7730cd2e6082,2024-09-06T17:35:20.203000 -CVE-2024-8179,1,1,dc903cc4005a44195e415ea8e3115125e204701e617987249daed976903cce6a,2024-12-12T12:15:27.937000 +CVE-2024-8179,0,0,dc903cc4005a44195e415ea8e3115125e204701e617987249daed976903cce6a,2024-12-12T12:15:27.937000 CVE-2024-8180,0,0,117d846afafa242adbc4406c5ff142ffe8b88b5bbef46dbdcd45c56ba413becd,2024-11-15T13:58:08.913000 CVE-2024-8181,0,0,df421880038257102966196c13cd04d05c22cea7a93153a2801c2b264a3f913a,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,ea6aec216face156fcef6f098448074a9c150d5b197d49bfe7028bcbeb9c8aa3,2024-08-30T13:53:52.197000 @@ -272096,7 +272109,7 @@ CVE-2024-8229,0,0,0f0c3bade6073339f6fc40762170674788262ef054336179c520aead1aa17a CVE-2024-8230,0,0,30b3e89c4400fc9a0469e6c715c05bc0b5a379c6df176bbc381a46fd5bfda112,2024-08-29T00:08:24.643000 CVE-2024-8231,0,0,7b1368650149e5f428621f08aabb2898c481bc6c90025aa2d156bedb40168791,2024-10-16T20:01:30.877000 CVE-2024-8232,0,0,a69636827e9fee8b582093e92530655a6c59ea13191cf499db607e808cf33182,2024-09-11T16:26:11.920000 -CVE-2024-8233,1,1,2565a2f145c1b82e4e17dc18a57e7d07f1fc6970c1bb6ea1b67496837e1af9c1,2024-12-12T12:15:28.120000 +CVE-2024-8233,0,0,2565a2f145c1b82e4e17dc18a57e7d07f1fc6970c1bb6ea1b67496837e1af9c1,2024-12-12T12:15:28.120000 CVE-2024-8234,0,0,95ebed0db99ea339d09aa632fba8014d36ee19972c4de55ce87523d4a48f000d,2024-08-30T13:00:05.390000 CVE-2024-8235,0,0,92d140a8cdbaca4d63092d44133892839b758a6b944ab2f33fbe74524523db69,2024-11-21T09:52:55.440000 CVE-2024-8236,0,0,a9354591770ec6819f85c9a3fbf166dfa5e7589e439c687e4e3141e2652cb2af,2024-11-26T14:15:22.217000 @@ -272432,7 +272445,7 @@ CVE-2024-8643,0,0,cbea7b9a6f59c586a627b90f33481078a840b0ca42db0dfdb8ba2116e3145b CVE-2024-8644,0,0,2dfdb42d1a9b750aaa29594591bf9a515d2eee126b389920bb78dd9d0a1f2e71,2024-10-04T17:14:20.587000 CVE-2024-8645,0,0,6c6883b70c241242d9a1f65a2463032602ee72b4685cb982075bbd16ddb3850e,2024-09-10T12:09:50.377000 CVE-2024-8646,0,0,5d4c3a28ebd32aa1f4378c55d3483650a644a252e8339908c6d85c6b0a714f65,2024-09-18T20:20:51.643000 -CVE-2024-8647,1,1,6801f15749db20b91800273bd2daa788ac40474b525c86f76604562aa5bd48b6,2024-12-12T12:15:28.297000 +CVE-2024-8647,0,0,6801f15749db20b91800273bd2daa788ac40474b525c86f76604562aa5bd48b6,2024-12-12T12:15:28.297000 CVE-2024-8648,0,0,7583459ecb84585b0b32bbfa86cdb4d5a6c70ebcb60ba453627ebf383edd5a01,2024-11-15T13:58:08.913000 CVE-2024-8651,0,0,448e710c58dc2b6cb7e6c0752275d7c46f3230f5cc540adcb81ec64c7f3e3413,2024-09-23T17:51:13.050000 CVE-2024-8652,0,0,b93328507c3e2c61251105f102cea9b9503ccc6f996f8a6d11d528a513238383,2024-09-23T17:53:49.197000 @@ -272992,7 +273005,7 @@ CVE-2024-9360,0,0,9e7f98e3d809b8c96b9d73cc0b5d35292511289aedca7f27c34f93544c8c9f CVE-2024-9361,0,0,5bc3da93845b38589382163c5da3beae4068773a42f5aefb96e280c13a317d80,2024-11-01T18:46:32.783000 CVE-2024-9364,0,0,9ebd82b4859f157f79a8dcd16aa66e84da6e7858640c431e532bfbe4c36998a2,2024-10-22T15:26:10.673000 CVE-2024-9366,0,0,db84f6e2ff16ebff2d502f21f85e90095a4a755ba5e4941bffb7a9e2e4c31307,2024-10-22T15:09:48.177000 -CVE-2024-9367,1,1,0490c5630af99317b70a177927e7e490d30802f34cc3cc0c2c86826e7a151905,2024-12-12T12:15:28.497000 +CVE-2024-9367,0,0,0490c5630af99317b70a177927e7e490d30802f34cc3cc0c2c86826e7a151905,2024-12-12T12:15:28.497000 CVE-2024-9368,0,0,6b310411ff00de8abfede8a1c8f49292bfd465b294d4fa7ea5baca1d5f7f7405,2024-10-10T20:30:51.240000 CVE-2024-9369,0,0,44fa2193f75586b1458beb818a5e1c2c9f22056f87d27b78d9d601599ada3720,2024-11-27T19:15:33.883000 CVE-2024-9371,0,0,6b69a68b0411ce9f1a3873a71c65ed5e38b4a3301ee458433c180567bd1ea8c9,2024-11-21T13:57:24.187000 @@ -273011,7 +273024,7 @@ CVE-2024-9383,0,0,b7617b74ef4da113d7cf5afa0950d70949b5b59027c6cf75c70744cb91a0ee CVE-2024-9384,0,0,ae8a39c564e82dbd6457db653f3a9bfb0f9f90a890c89dcc0a652cdab4a7191b,2024-10-10T20:52:33.333000 CVE-2024-9385,0,0,11d26d69edf7cd05785d7947d27cc3b8e693949d9e16b32a439334da8eabbb91,2024-10-07T17:48:28.117000 CVE-2024-9386,0,0,40b1e099aced766613386d42a163e901ce3fa54d1f7c244b23685d231017f4e0,2024-11-18T17:11:17.393000 -CVE-2024-9387,1,1,c91dd8a03a42787566fa8593c6a34bb5905a66c37de31af7b93f0105c42d461e,2024-12-12T12:15:28.727000 +CVE-2024-9387,0,0,c91dd8a03a42787566fa8593c6a34bb5905a66c37de31af7b93f0105c42d461e,2024-12-12T12:15:28.727000 CVE-2024-9388,0,0,faa9b09575a77d9ded1960e9b0fc31a1265b5ea5ecaad878a5f831a26c433777,2024-11-01T12:57:03.417000 CVE-2024-9391,0,0,0b5514fcac669714e6f01a53b731f460c97b1b96d9cd17909f2327df86dfa0a7,2024-11-22T19:15:07.653000 CVE-2024-9392,0,0,3897eba657ef73df994749d3992567f48ac4f6aa96a842beef14b63d03694543,2024-10-04T13:51:25.567000