diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5117.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5117.json new file mode 100644 index 00000000000..c6fbafb4afd --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5117.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-5117", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-12-25T15:15:05.900", + "lastModified": "2024-12-25T15:15:05.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware that files uploaded to comments on confidential issues and epics of public projects could be accessed without authentication via a direct link to the uploaded file URL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-213" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/398250", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47102.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47102.json new file mode 100644 index 00000000000..5e96959dc92 --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47102.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47102", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-25T15:15:06.583", + "lastModified": "2024-12-25T15:15:06.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1\n\ncould allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7179826", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47978.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47978.json new file mode 100644 index 00000000000..32bc00c9bea --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47978.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47978", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-25T15:15:06.780", + "lastModified": "2024-12-25T15:15:06.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json index ff643e5b834..ed23c860e3f 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51464.json @@ -2,20 +2,24 @@ "id": "CVE-2024-51464", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-21T14:15:21.627", - "lastModified": "2024-12-21T14:15:21.627", - "vulnStatus": "Received", + "lastModified": "2024-12-25T15:15:07.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed to perform when using Navigator for i." + }, + { + "lang": "es", + "value": "IBM i 7.3, 7.4 y 7.5 es vulnerable a la omisi\u00f3n de las restricciones de la interfaz de Navigator for i. Al enviar una solicitud especialmente manipulada, un atacante autenticado podr\u00eda aprovechar esta vulnerabilidad para realizar de forma remota operaciones que el usuario no tiene permitido realizar cuando utiliza Navigator for i." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", @@ -42,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-644" + "value": "CWE-288" } ] } diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52534.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52534.json new file mode 100644 index 00000000000..a782cb47ea5 --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52534.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52534", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-25T16:15:21.997", + "lastModified": "2024-12-25T16:15:21.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Session theft." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52535.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52535.json new file mode 100644 index 00000000000..d82e28d154c --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52535.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52535", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-25T15:15:07.247", + "lastModified": "2024-12-25T15:15:07.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000261086/dsa-2024-470-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52543.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52543.json new file mode 100644 index 00000000000..ce13211fc45 --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52543.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52543", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-25T16:15:22.387", + "lastModified": "2024-12-25T16:15:22.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-378" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52906.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52906.json new file mode 100644 index 00000000000..8ca5628dde9 --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52906.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52906", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-25T15:15:07.470", + "lastModified": "2024-12-25T15:15:07.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1\n\n\n\ncould allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7179826", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53291.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53291.json new file mode 100644 index 00000000000..37b379b62df --- /dev/null +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53291.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53291", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-25T15:15:07.673", + "lastModified": "2024-12-25T15:15:07.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Exposure of Sensitive Information Through Metadata vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1230" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 862a7f4c95b..9192328c638 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-25T15:00:19.888898+00:00 +2024-12-25T17:00:19.609757+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-25T14:15:22.610000+00:00 +2024-12-25T16:15:22.387000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274661 +274669 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `8` -- [CVE-2024-39725](CVE-2024/CVE-2024-397xx/CVE-2024-39725.json) (`2024-12-25T14:15:21.660`) -- [CVE-2024-39727](CVE-2024/CVE-2024-397xx/CVE-2024-39727.json) (`2024-12-25T14:15:22.610`) -- [CVE-2024-8950](CVE-2024/CVE-2024-89xx/CVE-2024-8950.json) (`2024-12-25T13:15:19.057`) +- [CVE-2023-5117](CVE-2023/CVE-2023-51xx/CVE-2023-5117.json) (`2024-12-25T15:15:05.900`) +- [CVE-2024-47102](CVE-2024/CVE-2024-471xx/CVE-2024-47102.json) (`2024-12-25T15:15:06.583`) +- [CVE-2024-47978](CVE-2024/CVE-2024-479xx/CVE-2024-47978.json) (`2024-12-25T15:15:06.780`) +- [CVE-2024-52534](CVE-2024/CVE-2024-525xx/CVE-2024-52534.json) (`2024-12-25T16:15:21.997`) +- [CVE-2024-52535](CVE-2024/CVE-2024-525xx/CVE-2024-52535.json) (`2024-12-25T15:15:07.247`) +- [CVE-2024-52543](CVE-2024/CVE-2024-525xx/CVE-2024-52543.json) (`2024-12-25T16:15:22.387`) +- [CVE-2024-52906](CVE-2024/CVE-2024-529xx/CVE-2024-52906.json) (`2024-12-25T15:15:07.470`) +- [CVE-2024-53291](CVE-2024/CVE-2024-532xx/CVE-2024-53291.json) (`2024-12-25T15:15:07.673`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-51464](CVE-2024/CVE-2024-514xx/CVE-2024-51464.json) (`2024-12-25T15:15:07.040`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6adae8abe74..c26e8a1d940 100644 --- a/_state.csv +++ b/_state.csv @@ -238894,6 +238894,7 @@ CVE-2023-5115,0,0,05e3e9c0dc22461b743c2358ed803bf3147865ec12621e61796b475c03cf4d CVE-2023-51154,0,0,1004622243e2a435c323ad288b161b00e21408178e87064850a86cae0dcdcde9,2024-11-21T08:37:54.250000 CVE-2023-51157,0,0,9f80b18b8a7b0cc4aad6087dd59c00b328d310cd40a9013afb508a333bdacafe,2024-10-02T16:58:20.160000 CVE-2023-5116,0,0,0bc0d2ef7183d3d186c53da0d73b888a77982cd2f16a155c36bbb3ba3253d10a,2024-11-21T08:41:05.700000 +CVE-2023-5117,1,1,193cecfcabcb618dc9d93c7901e5c5be200e79c307e3a0b36f2f1d5c0d172aa1,2024-12-25T15:15:05.900000 CVE-2023-5118,0,0,6f35b4b16a80a49be4e878b09580eb14452d102547cf5069f64518854ff08ff0,2024-11-21T08:41:05.817000 CVE-2023-5119,0,0,ecf16c6c035e79f3eaf6e343ec94472bd0208a5d903462d13517d90122e996ee,2024-11-21T08:41:05.940000 CVE-2023-51195,0,0,51f71cede0bdb9c7936f2282fb83cb0df673897fa19475ea77fc955e31990b5f,2024-01-10T20:15:45.393000 @@ -260803,9 +260804,9 @@ CVE-2024-39720,0,0,56b4d276b5bf79d64e33d4488006377883d1926ea37aa08bbe14b948e3752 CVE-2024-39721,0,0,8f383f081975755f1c8480c4d7c46c7557e3da56494ccedacf667eae60e062c2,2024-11-01T16:35:24.357000 CVE-2024-39722,0,0,3310dd431aef43138d89a0489db78429e88bdad0641d09cdee269db9d8d13bc9,2024-11-01T15:35:17.693000 CVE-2024-39723,0,0,bcb1dcc110c96a14094bcf053f7153eaf6a2b700a5f4ed663f41b81704e99c3a,2024-11-21T09:28:17.990000 -CVE-2024-39725,1,1,b31874f936a4e878816fa89600e0cbd518ebb1293c5348d1670a96439fee6178,2024-12-25T14:15:21.660000 +CVE-2024-39725,0,0,b31874f936a4e878816fa89600e0cbd518ebb1293c5348d1670a96439fee6178,2024-12-25T14:15:21.660000 CVE-2024-39726,0,0,84f4bd0f0e66fd1792095fdf470f4f3cbdbdc235abdd5805255bdd32721e778c,2024-11-19T21:51:40.093000 -CVE-2024-39727,1,1,92ce461235c4c1c06a5ed4f32da0b358b5d53e84b1c4c1e92c4ef357cc1150e6,2024-12-25T14:15:22.610000 +CVE-2024-39727,0,0,92ce461235c4c1c06a5ed4f32da0b358b5d53e84b1c4c1e92c4ef357cc1150e6,2024-12-25T14:15:22.610000 CVE-2024-39728,0,0,419d6522507eb930af7ae6835142d3dcdf46166050b6817f37759954abce17b8,2024-11-21T09:28:18.217000 CVE-2024-39729,0,0,17ef6112215ce540557fe392c3c226b8e791e3105e6cb641f6eb9b3c8bbe26c4,2024-11-21T09:28:18.363000 CVE-2024-3973,0,0,1e562721e06ec34010a875bed42bd8dd124b3449743c9a2acf9ba1a2336534dd,2024-08-07T15:17:46.717000 @@ -265702,6 +265703,7 @@ CVE-2024-47093,0,0,80d34acd1d42b9ec0548b5c2bde111c84ef7562ed8aa3809448dda19ce45d CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000 CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000 CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000 +CVE-2024-47102,1,1,688756206af77c535c639193cbdc434ec4118c056e1cad14389fde58683cce7b,2024-12-25T15:15:06.583000 CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000 CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000 CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000 @@ -266425,6 +266427,7 @@ CVE-2024-47974,0,0,5b42e76afcab24c20bdceb8d619dc3b1d3700c61728605186411865d26bbe CVE-2024-47975,0,0,919a5c25fcfdd1004bec82ba910db5fe6300dd9cdcfe2f11fc4b0bb574f4091b,2024-10-11T20:15:05.143000 CVE-2024-47976,0,0,b7d584a3048cada45c1f6e92a2751d3e6ae6406892198b5d0fe37bebaa37f847,2024-10-17T22:15:03.210000 CVE-2024-47977,0,0,e38680112a30ad62187a3d04ee7a979b5da459a2a6058680229404134a82d5e8,2024-12-16T11:15:06.370000 +CVE-2024-47978,1,1,76107c041bb3501b5273abccab3ce5a69dde08406393598adbaa4319b08b2a11,2024-12-25T15:15:06.780000 CVE-2024-4798,0,0,67d409a675b221a14312164f5cc62c5f24d760e91c26863f4b27a369f421db4d,2024-11-21T09:43:38.167000 CVE-2024-47984,0,0,f2bdbdc582424541b49afcc3246712b531918aae288858fba96175f001d774bf,2024-12-13T15:15:27.110000 CVE-2024-4799,0,0,bcde09b7182d8e0e6116d4d77d66aa7fc678a4d38a1639ef2abc6c729d992c49,2024-11-21T09:43:38.320000 @@ -268561,7 +268564,7 @@ CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8 CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000 CVE-2024-51460,0,0,5ed8cb0bc6e7264a024f4fdc6bea49f8d819c03171033b2027328a825c325cb4,2024-12-11T13:15:06.510000 CVE-2024-51463,0,0,c10145e6070215d7c0984525084a5c3afdf7565c93303fbc3fb7373df154d225,2024-12-21T14:15:21.453000 -CVE-2024-51464,0,0,69f5d546a83bdd7683722d0859a88a640e895a1b44c51270e757af6904b8f33c,2024-12-21T14:15:21.627000 +CVE-2024-51464,0,1,6976cf6244f493a37311fb0cbfbc33c06ff05664e1a61fb69527ac2b03e9107d,2024-12-25T15:15:07.040000 CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000 CVE-2024-51466,0,0,f8d3d47f89339e1c49e199d4d29061c3398d8045235700eb4ff399548ec59171,2024-12-20T14:15:24.250000 CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000 @@ -269374,10 +269377,13 @@ CVE-2024-52530,0,0,78f036a07a80d7c50933eab4b5ec3e54640dd9a8e9ce77e883bfb2118e573 CVE-2024-52531,0,0,8eedc16d1aadf080c6f2b302997fd47ee6a376af2a4466e43fcf9633d24182c6,2024-11-12T19:35:15.807000 CVE-2024-52532,0,0,54c3190a0eeff653a8f66dda7fd5b580cc7aa4648618e83320436fca355bcda1,2024-11-12T19:35:16.970000 CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff06bd,2024-12-06T14:15:21.400000 +CVE-2024-52534,1,1,7820e0ba924890a736ce88aba45e59a78e389d023258ec741d265aac9be5c12b,2024-12-25T16:15:21.997000 +CVE-2024-52535,1,1,2fc6a4a30035252b3fe1efc0866346ed5a93aa19e5169be6ec428c9c99a9b9ff,2024-12-25T15:15:07.247000 CVE-2024-52537,0,0,79d5bab7a316a4a5e36b347dfcb08651d568dc7cb64073148e1c1e42669123b6,2024-12-11T08:15:05.747000 CVE-2024-52538,0,0,1bae7e87d532ab1b896b47e33928c8b9835fb6690e8325140679d38a93ad90cb,2024-12-16T11:15:06.523000 CVE-2024-5254,0,0,b08a56d01443c9abf44ee33ecfae9cdfa73a8d20318044fcd2f5caa1e9d31f2e,2024-11-21T09:47:17.063000 CVE-2024-52542,0,0,b9ef140e9aba5b496ed2c25474c1d2f358b5c656839b56a93dea59533bce0be8,2024-12-17T12:15:20.703000 +CVE-2024-52543,1,1,f95691332b8723e38141c007d14687ca24f6efa2e91837c90720d3d872189100,2024-12-25T16:15:22.387000 CVE-2024-52544,0,0,c58d604e70e1d52d10e6c46ba91f7cf731eb4ad32c0c46522333c5ba2eb214aa,2024-12-03T21:15:07.390000 CVE-2024-52545,0,0,387ccc5d59fa5b7f0e29a5a9d3b818216a2c3bea1d9e491918de17e5ca055044,2024-12-03T21:15:07.490000 CVE-2024-52546,0,0,5387c491d047007733dddf4928762fe4affacc09ddf2859617c316a62a5513e1,2024-12-03T21:15:07.593000 @@ -269565,6 +269571,7 @@ CVE-2024-52897,0,0,381b132ed462b4faa45e569dc53fdf4283419f66b3eee4d6b531c72acef36 CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52901,0,0,b816b5cb98cf7a5b0d48398070b9006c656711b2b4741d0569a92b7898dcb78d,2024-12-12T16:15:54.807000 +CVE-2024-52906,1,1,432a7b0e13ffe8dc54c1398b0a02c0b5b0e2dc251c9417a0fa8319a3eb4564ec,2024-12-25T15:15:07.470000 CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000 CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000 CVE-2024-52913,0,0,3182ee9c1e3fb83798715d4b9c300b62667d15206aea663fa8688a39a2c605f0,2024-11-18T17:11:17.393000 @@ -269810,6 +269817,7 @@ CVE-2024-53285,0,0,c2ecada22121f7b17c10fd447456e68801df7cd8946752141828b9091e6bc CVE-2024-53289,0,0,8569657d296d8056ead91ae269679fae58808070b2f82927c0ce8aea97673a55,2024-12-11T08:15:06.010000 CVE-2024-5329,0,0,daffb0d0cde1b0a7abdef85d122cb231171a58845d7b7cc2d00de14c5f127b92,2024-11-21T09:47:26.100000 CVE-2024-53290,0,0,08e0a042eea6dcb1196f79e060fe5af8f554fba59cbaa553b3654d405551bc5e,2024-12-11T08:15:06.250000 +CVE-2024-53291,1,1,318e92e79259a9a7331cf36c9930c7627fff266ca815aad87948838b386ab239,2024-12-25T15:15:07.673000 CVE-2024-53292,0,0,67896e5cb823d0bbe120641ca2bcb7973e9580249f1b4ecda20948602273ce08,2024-12-11T08:15:06.423000 CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 @@ -273833,7 +273841,7 @@ CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d9 CVE-2024-8947,0,0,23b90e98b4d0b5ac484fc062b569695b891052af214ed33d731d1a205b7beeae,2024-09-24T13:17:52.397000 CVE-2024-8948,0,0,d33c8be61eafb6c6f1399a6681b3e81aa3033fc00349884a89a0d7a9189f2227,2024-09-23T18:10:28.273000 CVE-2024-8949,0,0,5ae1b80bdfc570c2dbbc4bf0efff8e610ad07187757c64e752e108409b11f0e8,2024-09-23T18:05:07.043000 -CVE-2024-8950,1,1,db59029c35d940baabec97c0caeacaf99c60a82838607a0b2064b33fa8b76c62,2024-12-25T13:15:19.057000 +CVE-2024-8950,0,0,db59029c35d940baabec97c0caeacaf99c60a82838607a0b2064b33fa8b76c62,2024-12-25T13:15:19.057000 CVE-2024-8951,0,0,421b70ea69ac7f8a66bf7d315715c47b3ee53b72c4adfbc4647ff96984497ead,2024-09-23T18:12:37.380000 CVE-2024-8956,0,0,d05dd0e86b32f79dfafef581ca7f3185d2618ea7886f798509ed3bccd73be818,2024-11-05T02:00:01.697000 CVE-2024-8957,0,0,6175e643f46339ff132c2346994cb23e9f442b046b5039790534affc3054adb1,2024-11-05T02:00:01.697000