Auto-Update: 2024-11-14T21:00:20.459715+00:00

This commit is contained in:
cad-safe-bot 2024-11-14 21:03:23 +00:00
parent 0e4790d32a
commit ec8514daa3
82 changed files with 3749 additions and 449 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2005-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-17T14:15:03.800",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T19:35:58.467",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -68,6 +68,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -127,30 +147,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mikexstudios:xcomic:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.8.3",
"matchCriteriaId": "BE6B0A39-7E9A-408A-9294-B926F2BACC88"
}
]
}
]
}
],
"references": [
{
"url": "http://xcomic.mikexstudios.com/forum/viewtopic.php?id=130",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/mikexstudios/xcomic/commit/6ed8e3cc336e29f09c7e791863d0559939da98bf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/mikexstudios/xcomic/releases/tag/v0.8.3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.280359",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.280359",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://web.archive.org/web/20071218144304/http://xcomic.mikexstudios.com/forum/viewtopic.php?id=130",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-11T23:15:09.250",
"lastModified": "2023-07-19T13:23:15.433",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-14T19:35:01.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42840",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:48.767",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-11-14T19:35:02.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213983",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50436",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-29T01:42:00.697",
"lastModified": "2024-02-29T13:49:47.277",
"lastModified": "2024-11-14T20:35:08.293",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en Couchbase Server antes de la versi\u00f3n 7.2.4. Las credenciales de administrador de ns_server se filtran en forma codificada en el archivo diag.log. La primera versi\u00f3n afectada es la 7.1.5."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52358",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-02-18T03:15:08.640",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-11-14T20:35:09.213",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de defectos de configuraci\u00f3n en algunas API del m\u00f3dulo de audio. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/2/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52385",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-08T10:15:08.400",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-11-14T20:35:09.457",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de escritura fuera de los l\u00edmites en el m\u00f3dulo RSMC. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52556",
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
"published": "2024-03-01T17:15:07.177",
"lastModified": "2024-03-01T22:22:25.913",
"lastModified": "2024-11-14T20:35:09.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En OpenBSD 7.4 antes de la errata 009, una condici\u00f3n de ejecuci\u00f3n entre el procesamiento de paquetes de pf(4) y la expiraci\u00f3n de los estados de los paquetes puede causar un p\u00e1nico en el kernel."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "9119a7d8-5eab-497f-8521-727c672e3725",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52713",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-04-07T09:15:08.377",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-11-14T20:35:09.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de control inadecuado de permisos en el m\u00f3dulo de gesti\u00f3n de ventanas. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad y la confidencialidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/4/",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-10146",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-14T06:15:07.080",
"lastModified": "2024-11-14T06:15:07.080",
"lastModified": "2024-11-14T19:35:05.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins."
},
{
"lang": "es",
"value": "El complemento Simple File List de WordPress anterior a la versi\u00f3n 6.1.13 no desinfecta ni escapa una URL generada antes de mostrarla nuevamente en un atributo, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra los administradores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/9ee74a0f-83ff-4c15-a114-f8f6baab8bf5/",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-10394",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T20:15:20.777",
"lastModified": "2024-11-14T20:15:20.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A local user can bypass the OpenAFS PAG (Process Authentication Group)\nthrottling mechanism in Unix clients, allowing the user to create a PAG using\nan existing id number, effectively joining the PAG and letting the user steal\nthe credentials in that PAG."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.4,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://openafs.org/pages/security/OPENAFS-SA-2024-001.txt",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-10396",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T20:15:20.917",
"lastModified": "2024-11-14T20:15:20.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated user can provide a malformed ACL to the fileserver's StoreACL\nRPC, causing the fileserver to crash, possibly expose uninitialized memory, and\npossibly store garbage data in the audit log.\nMalformed ACLs provided in responses to client FetchACL RPCs can cause client\nprocesses to crash and possibly expose uninitialized memory into other ACLs\nstored on the server."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.1,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1286"
}
]
}
],
"references": [
{
"url": "https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-10397",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T20:15:21.057",
"lastModified": "2024-11-14T20:15:21.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A malicious server can crash the OpenAFS cache manager and other client\nutilities, and possibly execute arbitrary code."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://openafs.org/pages/security/OPENAFS-SA-2024-003.txt",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10685",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-12T04:15:04.410",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T19:40:14.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpplugin:contact_form_7_redirect_\\&_thank_you_page:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.7",
"matchCriteriaId": "45F9DC2F-3C65-443B-9FDD-688E7790C860"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3184638%40cf7-redirect-thank-you-page&new=3184638%40cf7-redirect-thank-you-page&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f52285e0-e78d-4231-8ff9-53fbe568fcc2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10695",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-12T04:15:04.610",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T19:44:16.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,7 +41,7 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -49,16 +49,50 @@
"value": "CWE-639"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.14",
"matchCriteriaId": "2895B55C-CE63-44E6-9CEE-B65A396E8DDC"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3184380%40futurio-extra&new=3184380%40futurio-extra&sfp_email=&sfph_mail=#file3",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/53871750-6437-459f-97e1-5cf524160f09?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-11T18:15:14.620",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:06:54.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,26 +154,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dimongshi/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.283870",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283870",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.441174",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-11T18:15:14.940",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:14:26.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,26 +154,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/UnrealdDei/cve/blob/main/sql2-rce.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283871",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283871",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.441182",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2379",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-03-27T08:15:41.230",
"lastModified": "2024-07-30T02:15:05.397",
"lastModified": "2024-11-14T20:35:22.613",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "libcurl omite la verificaci\u00f3n del certificado para una conexi\u00f3n QUIC bajo ciertas condiciones, cuando est\u00e1 dise\u00f1ado para usar wolfSSL. Si se le indica que utilice un cifrado o curva desconocido/incorrecto, la ruta de error omite accidentalmente la verificaci\u00f3n y devuelve OK, ignorando as\u00ed cualquier problema de certificado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25431",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-08T17:15:06.023",
"lastModified": "2024-11-13T15:35:07.420",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T20:42:47.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.3.2",
"matchCriteriaId": "A5C4A095-7C30-4027-B83A-DC6C72967FD2"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/haruki3hhh/bd228e6dcaf8c18140e1074964912b39",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/3122",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "https://github.com/bytecodealliance/wasm-micro-runtime/pull/3126",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25434",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-01T23:15:08.360",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-11-14T20:35:13.403",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Pkp Ojs v3.3 permite a los atacantes ejecutar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Publicname."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1MFuAyZukdJeA7HKz8o8pOKLJMjURTZCt/view?usp=sharing",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25848",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-08T02:15:50.527",
"lastModified": "2024-03-08T14:02:57.420",
"lastModified": "2024-11-14T20:35:14.383",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el m\u00f3dulo \"Ever Ultimate SEO\" (everpsseo) <= 8.1.2 de Team Ever para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL en las versiones afectadas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://addons.prestashop.com/fr/seo-referencement-naturel/39489-ever-ultimate-seo.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26329",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T07:15:10.970",
"lastModified": "2024-04-05T12:40:52.763",
"lastModified": "2024-11-14T20:35:15.287",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Chilkat anterior a v9.5.0.98, permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de PRNG predecible en la funci\u00f3n ChilkatRand::randomBytes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-331"
}
]
}
],
"references": [
{
"url": "https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27592",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T21:15:08.027",
"lastModified": "2024-04-16T23:15:08.690",
"lastModified": "2024-11-14T20:35:16.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad Open Redirect en Corezoid Process Engine v6.5.0 permite a los atacantes redirigir a sitios web arbitrarios agregando un enlace manipulado a /login/ en la URL de la p\u00e1gina de inicio de sesi\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/corezoid/helm/issues/110",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28753",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-09T00:15:59.923",
"lastModified": "2024-03-11T01:32:39.697",
"lastModified": "2024-11-14T20:35:21.680",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "RaspAP (tambi\u00e9n conocido como raspap-webgui) hasta la versi\u00f3n 3.0.9 permite a atacantes remotos leer el archivo /etc/passwd mediante una solicitud manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://dustri.org/b/carrot-disclosure.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29211",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-11-13T02:15:16.150",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:09:01.213",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "support@hackerone.com",
@ -39,10 +61,63 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.7",
"matchCriteriaId": "2347060E-FEC7-41EF-A0C0-5ED61B157223"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:-:*:*:*:*:*:*",
"matchCriteriaId": "C419EC4C-AB98-4D73-82B2-00A0A1F5A435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "F78C1CDE-FB11-4033-AEBA-D04D937EDD67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "E881D4BF-3222-4EF9-8A9B-0948973CCC89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:r3:*:*:*:*:*:*",
"matchCriteriaId": "D93F7D15-B61D-4EE7-9280-FC0B7C45C940"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30202",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T15:15:52.427",
"lastModified": "2024-05-01T18:15:19.553",
"lastModified": "2024-11-14T20:35:23.057",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En Emacs anterior a 29.3, el c\u00f3digo Lisp arbitrario se eval\u00faa como parte de activar el modo Org. Esto afecta al modo de organizaci\u00f3n anterior a la versi\u00f3n 9.6.23."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/25/2",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30656",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T22:15:08.870",
"lastModified": "2024-04-16T13:24:07.103",
"lastModified": "2024-11-14T20:35:23.857",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Un problema en Fireboltt Dream Wristphone BSW202_FB_AAC_v2.0_20240110-20240110-1956 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un frame de autenticaci\u00f3n manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://github.com/Yashodhanvivek/Firebolt-wristphone-vulnerability",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-34719",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:20.267",
"lastModified": "2024-11-13T18:15:20.267",
"lastModified": "2024-11-14T19:35:05.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible permissions bypass due to a missing null check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias ubicaciones, es posible que se omitan los permisos debido a la falta de una verificaci\u00f3n nula. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/b0e4375577ba7e21bd40edac5990bea418ecdc8c",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36507",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:10.233",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:31:45.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +81,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.13",
"matchCriteriaId": "CC29F9A2-9ED8-45C6-AC9F-FB4EEAA7AFF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "F06CB11B-0726-4E7A-B257-CB71E2237AA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*",
"matchCriteriaId": "6B512696-8596-4458-ADC9-24DD3C6C377B"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-205",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36509",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:10.440",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:33:44.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "7B0C24E1-3735-4117-8FA1-FB20D23AED9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28B43375-DA74-4C5F-BAEE-39F312EEF51F"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-180",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36513",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:10.633",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:35:26.093",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "6.4.10",
"matchCriteriaId": "4C015491-F83B-4569-B0BB-0877C1D89C66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.13",
"matchCriteriaId": "CC29F9A2-9ED8-45C6-AC9F-FB4EEAA7AFF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "F06CB11B-0726-4E7A-B257-CB71E2237AA7"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-144",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-3760",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-14T19:15:06.327",
"lastModified": "2024-11-14T19:15:06.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In lunary-ai/lunary version 1.2.7, there is a lack of rate limiting on the forgot password page, leading to an email bombing vulnerability. Attackers can exploit this by automating forgot password requests to flood targeted user accounts with a high volume of password reset emails. This not only overwhelms the victim's mailbox, making it difficult to manage and locate legitimate emails, but also significantly impacts mail servers by consuming their resources. The increased load can cause performance degradation and, in severe cases, make the mail servers unresponsive or unavailable, disrupting email services for the entire organization."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/29374bb10020712009c1ec238affe098112a51d6",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/c29e9f36-8261-463d-8862-7f4fdcc8eddc",
"source": "security@huntr.dev"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-38479",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-14T10:15:05.347",
"lastModified": "2024-11-14T10:15:05.347",
"lastModified": "2024-11-14T19:35:07.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5.\n\nUsers are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue."
},
{
"lang": "es",
"value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Traffic Server. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 8.0.0 hasta la 8.1.11, desde la versi\u00f3n 9.0.0 hasta la 9.2.5. Se recomienda a los usuarios que actualicen a la versi\u00f3n 9.2.6, que soluciona el problema, o a la versi\u00f3n 10.0.2, que no lo tiene."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40592",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-11-12T19:15:11.013",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:37:06.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -51,10 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "81B7F626-84B5-47A5-959F-735D6250C147"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:macos:*:*",
"matchCriteriaId": "0A079CA4-D957-402A-B899-31F26A89DF00"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-022",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-40660",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:20.570",
"lastModified": "2024-11-13T18:15:20.570",
"lastModified": "2024-11-14T19:35:07.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setTransactionState of SurfaceFlinger.cpp, there is a possible way to change protected display attributes due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En setTransactionState de SurfaceFlinger.cpp, existe una forma posible de cambiar los atributos de visualizaci\u00f3n protegidos debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/native/+/064ce6e3235b6318be1e41f1bac9595a98e4aafa",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41738",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-01T17:15:16.033",
"lastModified": "2024-11-01T20:24:53.730",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T20:51:29.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:txseries_for_multiplatforms:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E87CAC4-6CC5-4C17-B49C-88BAA7F1F806"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7174572",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41741",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-01T17:15:16.320",
"lastModified": "2024-11-01T20:24:53.730",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T20:42:44.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,13 +36,43 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:txseries_for_multiplatforms:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E87CAC4-6CC5-4C17-B49C-88BAA7F1F806"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7174572",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41745",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-01T17:15:16.800",
"lastModified": "2024-11-01T20:24:53.730",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T20:35:33.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:standard:*:*:*",
"matchCriteriaId": "2E54DF77-511D-4C8A-88B0-3ABB4E232273"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7174576",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-43087",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:21.307",
"lastModified": "2024-11-13T18:15:21.307",
"lastModified": "2024-11-14T19:35:08.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In getInstalledAccessibilityPreferences of AccessibilitySettings.java, there is a possible way to hide an enabled accessibility service in the accessibility service settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En getInstalledAccessibilityPreferences de AccessibilitySettings.java, existe una forma posible de ocultar un servicio de accesibilidad habilitado en la configuraci\u00f3n del servicio de accesibilidad debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/6253b87704bb097ad9963941bdddf3b86906a73e",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-43088",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:21.387",
"lastModified": "2024-11-13T18:15:21.387",
"lastModified": "2024-11-14T19:35:08.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions in AppInfoBase.java, there is a possible way to manipulate app permission settings belonging to another user on the device due to a missing permission check. This could lead to local escalation of privilege across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias funciones de AppInfoBase.java, existe una forma posible de manipular la configuraci\u00f3n de permisos de la aplicaci\u00f3n que pertenece a otro usuario en el dispositivo debido a una verificaci\u00f3n de permisos faltante. Esto podr\u00eda provocar una escalada local de privilegios entre los l\u00edmites de usuario sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/975c28535419be1cc45f66712f41e4a7a40e6001",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43499",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:24.363",
"lastModified": "2024-11-13T17:01:58.603",
"lastModified": "2024-11-14T19:15:06.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -44,6 +44,10 @@
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-409"
},
{
"lang": "en",
"value": "CWE-606"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43598",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:28.277",
"lastModified": "2024-11-13T17:01:58.603",
"lastModified": "2024-11-14T20:15:23.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43637",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-12T18:15:32.773",
"lastModified": "2024-11-13T17:01:58.603",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:15:23.993",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,30 +15,7 @@
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el controlador del sistema de clase de v\u00eddeo USB de Windows"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"metrics": {},
"weaknesses": [
{
"source": "secure@microsoft.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45309",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-21T15:15:03.463",
"lastModified": "2024-10-21T17:09:45.417",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:39:31.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -73,14 +105,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:onedev_project:onedev:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.0.9",
"matchCriteriaId": "E3D84704-8413-44E7-80D1-7843D9720D4B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/theonedev/onedev/commit/4637aaac8c70d41aa789b7fce208b75c6a7b711f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/theonedev/onedev/security/advisories/GHSA-7wg5-6864-v489",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46635",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-30T18:15:06.140",
"lastModified": "2024-10-04T13:51:25.567",
"lastModified": "2024-11-14T20:35:33.310",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en el endpoint de la API /AccountMaster/GetCurrentUserInfo de INROAD anterior a v202402060 permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el par\u00e1metro UserNameOrPhoneNumber."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://hithub.notion.site/Sensitive-Information-Disclosure-in-GongZhiDao-System-aaad25d2430f4a638d462194cfa87c8b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46956",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-10T22:15:12.943",
"lastModified": "2024-11-12T20:35:13.723",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T20:39:54.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,22 +81,102 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.04.0",
"matchCriteriaId": "4202C3F1-622D-4443-B2F0-1C26F73BD662"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_high_performance_computing:12.0:sp5:*:*:-:*:*:*",
"matchCriteriaId": "F8C8AD43-557D-4285-BA46-9C5785F53229"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:*",
"matchCriteriaId": "9F714147-87CC-4DAF-81E4-C6DFA7C4F2AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss:*:*:*",
"matchCriteriaId": "930B3D1B-202E-4FE9-8737-329874F1D821"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss_extended_security:*:*:*",
"matchCriteriaId": "AE1A79C4-DC01-4CC6-A745-C20E70C3FF03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp5:*:*:*:*:*:*",
"matchCriteriaId": "21ED3679-51E2-4D12-84AD-ACCE27B55F13"
}
]
}
]
}
],
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=707895",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47331",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-11T19:15:09.783",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:22:49.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ninjateam:multi_step_for_contact_form_7:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.7.8",
"matchCriteriaId": "EC1F05E6-FC11-44F2-9AF7-480F03715B42"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-multi-step/wordpress-multi-step-for-contact-form-plugin-2-7-7-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47441",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-12T19:15:13.310",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:09:41.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +71,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.6.9",
"matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47442",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-12T19:15:13.517",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:09:51.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.6.9",
"matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47443",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-12T19:15:13.730",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:10:01.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.6.9",
"matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47444",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-12T19:15:13.947",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:10:29.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.6.9",
"matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47445",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-12T19:15:14.157",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:10:34.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.6.9",
"matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47446",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-12T19:15:14.377",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:10:24.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +61,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionEndIncluding": "23.6.9",
"matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49025",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-11-14T20:15:25.207",
"lastModified": "2024-11-14T20:15:25.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-359"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49025",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49579",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-10-17T13:15:14.613",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T19:24:45.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.47197",
"matchCriteriaId": "EE7D786F-614F-40DA-8908-13A2C3133779"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49580",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-10-17T13:15:14.853",
"lastModified": "2024-10-18T12:52:33.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T19:25:47.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "cve@jetbrains.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.0",
"matchCriteriaId": "34BD7712-1D07-487C-8A52-C2202C53BA2E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-50305",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-14T10:15:08.013",
"lastModified": "2024-11-14T10:15:08.013",
"lastModified": "2024-11-14T19:35:16.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Valid Host header field can cause Apache Traffic Server to crash on some platforms.\n\nThis issue affects Apache Traffic Server: from 9.2.0 through 9.2.5.\n\nUsers are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue."
},
{
"lang": "es",
"value": "Un campo de encabezado de host v\u00e1lido puede provocar que Apache Traffic Server se bloquee en algunas plataformas. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 9.2.0 hasta la 9.2.5. Se recomienda a los usuarios actualizar a la versi\u00f3n 9.2.6, que soluciona el problema, o a la versi\u00f3n 10.0.2, que no lo tiene."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -22,6 +49,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50634",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-08T17:15:06.570",
"lastModified": "2024-11-13T15:35:12.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-14T20:40:43.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sbond:watcharr:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.43.0",
"matchCriteriaId": "C904CC44-5248-409D-9DC1-388BABEBE4A7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yamerooo123/CVE/tree/main/CVE-2024-50634",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://youtu.be/wnULru0WdtA",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50837",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T15:15:08.990",
"lastModified": "2024-11-14T17:15:07.257",
"lastModified": "2024-11-14T19:35:17.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/admin_user.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the firstname and username parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20admin%20user.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50838",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T15:15:09.073",
"lastModified": "2024-11-14T17:15:07.333",
"lastModified": "2024-11-14T19:35:18.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/department.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the d and pi parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Department.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50839",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T14:15:18.670",
"lastModified": "2024-11-14T17:15:07.410",
"lastModified": "2024-11-14T19:35:19.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/add_subject.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the subject_code and title parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Subject.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50840",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T14:15:18.793",
"lastModified": "2024-11-14T17:15:07.473",
"lastModified": "2024-11-14T19:35:20.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/class.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the class_name parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Class.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50841",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T14:15:18.880",
"lastModified": "2024-11-14T17:15:07.543",
"lastModified": "2024-11-14T19:35:20.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/calendar_of_events.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the date_start, date_end, and title parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Calendar%20of%20Events.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50842",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T14:15:18.967",
"lastModified": "2024-11-14T17:15:07.613",
"lastModified": "2024-11-14T19:35:21.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/school_year.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the school_year parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20School%20Year.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50843",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T14:15:19.050",
"lastModified": "2024-11-14T14:15:19.050",
"lastModified": "2024-11-14T19:35:22.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Directory listing issue was found in PHPGurukul User Registration & Login and User Management System 3.2, which allows remote attackers attacker to access sensitive files and directories via /loginsystem/assets."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20&%20Login%20and%20User%20Management%20System%20With%20admin%20panel/Directory%20listings.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51484",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-11T20:15:18.170",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:14:44.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ampache/ampache/security/advisories/GHSA-h6vj-6rvc-3x29",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51485",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-11T20:15:18.313",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:06:12.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ampache/ampache/security/advisories/GHSA-xvfj-w962-hqcx",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51486",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-11T20:15:18.430",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:55:34.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51487",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-11T20:15:18.640",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T19:37:53.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ampache/ampache/security/advisories/GHSA-5rmx-fjmc-mg6x",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51488",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-11T20:15:18.757",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:12:58.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
@ -73,10 +95,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ampache/ampache/security/advisories/GHSA-46m4-5pxj-66f2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51489",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-11T20:15:18.877",
"lastModified": "2024-11-14T15:46:50.553",
"lastModified": "2024-11-14T20:12:52.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -104,9 +104,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.1",
"matchCriteriaId": "7DC140BB-7D16-4B97-A24E-7D0E9D83C57F"
"criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51490",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-11T20:15:18.987",
"lastModified": "2024-11-14T15:30:15.643",
"lastModified": "2024-11-14T20:13:01.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,9 +80,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.1",
"matchCriteriaId": "7DC140BB-7D16-4B97-A24E-7D0E9D83C57F"
"criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51587",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:04.903",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:26:14.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softfirm:definitive_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.5.16",
"matchCriteriaId": "129088C1-6A12-4DCD-922B-C0E794DC5524"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/definitive-addons-for-elementor/wordpress-definitive-addons-for-elementor-plugin-1-5-16-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51588",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:05.113",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:26:28.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themehat:super_addons_for_elementor:1.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "97EB2257-8F8F-4F83-9D45-DC83C693FBF0"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/super-addons-for-elementor/wordpress-super-addons-for-elementor-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51589",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:05.327",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:26:41.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpcirqle:bigmart_elements:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.3",
"matchCriteriaId": "A175B919-682E-40D9-8EA4-11D878C7E749"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bigmart-elements/wordpress-bigmart-elements-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51597",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:07.050",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:27:46.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brandevolutionco:themeshark_templates_\\&_widgets_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.7",
"matchCriteriaId": "582D4D33-3F77-4B3A-A21E-0049AAF5585C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/themeshark-elementor/wordpress-themeshark-templates-widgets-for-elementor-plugin-1-1-7-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-51688",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-14T20:15:25.810",
"lastModified": "2024-11-14T20:15:25.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in FraudLabs Pro FraudLabs Pro SMS Verification allows Stored XSS.This issue affects FraudLabs Pro SMS Verification: from n/a through 1.10.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fraudlabs-pro-sms-verification/wordpress-fraudlabs-pro-sms-verification-plugin-1-10-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52350",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-11T07:15:06.293",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:22:24.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:crm2go:crm2go:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "F3CF0A47-6ECE-4092-B344-6FC89F22BD52"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/crm2go/wordpress-crm-2go-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52351",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-11T07:15:06.583",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-14T20:24:39.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bu:bu_slideshow:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3.10",
"matchCriteriaId": "E8B7B55D-C5E1-43F8-8101-ABD48373BEB6"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bu-slideshow/wordpress-bu-slideshow-plugin-2-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52369",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-14T19:15:09.533",
"lastModified": "2024-11-14T19:15:09.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Optimal Access Inc. KBucket allows Upload a Web Shell to a Web Server.This issue affects KBucket: from n/a through 4.1.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/kbucket/wordpress-kbucket-plugin-4-1-6-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52370",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-14T19:15:09.760",
"lastModified": "2024-11-14T19:15:09.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Hive Support Hive Support \u2013 WordPress Help Desk allows Upload a Web Shell to a Web Server.This issue affects Hive Support \u2013 WordPress Help Desk: from n/a through 1.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hive-support/wordpress-hive-support-wordpress-help-desk-live-chat-ai-chat-bot-plugin-for-wordpress-plugin-1-1-1-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-14T19:00:28.666108+00:00
2024-11-14T21:00:20.459715+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-14T18:57:17.743000+00:00
2024-11-14T20:51:29.847000+00:00
```
### Last Data Feed Release
@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
269753
269761
```
### CVEs added in the last Commit
Recently added CVEs: `42`
Recently added CVEs: `8`
- [CVE-2024-50831](CVE-2024/CVE-2024-508xx/CVE-2024-50831.json) (`2024-11-14T18:15:21.180`)
- [CVE-2024-50832](CVE-2024/CVE-2024-508xx/CVE-2024-50832.json) (`2024-11-14T17:15:06.823`)
- [CVE-2024-50833](CVE-2024/CVE-2024-508xx/CVE-2024-50833.json) (`2024-11-14T17:15:06.917`)
- [CVE-2024-50834](CVE-2024/CVE-2024-508xx/CVE-2024-50834.json) (`2024-11-14T17:15:07.003`)
- [CVE-2024-50835](CVE-2024/CVE-2024-508xx/CVE-2024-50835.json) (`2024-11-14T17:15:07.090`)
- [CVE-2024-50836](CVE-2024/CVE-2024-508xx/CVE-2024-50836.json) (`2024-11-14T17:15:07.177`)
- [CVE-2024-5125](CVE-2024/CVE-2024-51xx/CVE-2024-5125.json) (`2024-11-14T18:15:26.760`)
- [CVE-2024-52371](CVE-2024/CVE-2024-523xx/CVE-2024-52371.json) (`2024-11-14T18:15:21.383`)
- [CVE-2024-52372](CVE-2024/CVE-2024-523xx/CVE-2024-52372.json) (`2024-11-14T18:15:21.737`)
- [CVE-2024-52373](CVE-2024/CVE-2024-523xx/CVE-2024-52373.json) (`2024-11-14T18:15:21.993`)
- [CVE-2024-52374](CVE-2024/CVE-2024-523xx/CVE-2024-52374.json) (`2024-11-14T18:15:22.420`)
- [CVE-2024-52375](CVE-2024/CVE-2024-523xx/CVE-2024-52375.json) (`2024-11-14T18:15:23.117`)
- [CVE-2024-52376](CVE-2024/CVE-2024-523xx/CVE-2024-52376.json) (`2024-11-14T18:15:23.570`)
- [CVE-2024-52377](CVE-2024/CVE-2024-523xx/CVE-2024-52377.json) (`2024-11-14T18:15:23.800`)
- [CVE-2024-52378](CVE-2024/CVE-2024-523xx/CVE-2024-52378.json) (`2024-11-14T18:15:24.160`)
- [CVE-2024-52379](CVE-2024/CVE-2024-523xx/CVE-2024-52379.json) (`2024-11-14T18:15:24.507`)
- [CVE-2024-52380](CVE-2024/CVE-2024-523xx/CVE-2024-52380.json) (`2024-11-14T18:15:24.837`)
- [CVE-2024-52381](CVE-2024/CVE-2024-523xx/CVE-2024-52381.json) (`2024-11-14T18:15:25.137`)
- [CVE-2024-52382](CVE-2024/CVE-2024-523xx/CVE-2024-52382.json) (`2024-11-14T18:15:25.400`)
- [CVE-2024-52383](CVE-2024/CVE-2024-523xx/CVE-2024-52383.json) (`2024-11-14T18:15:25.673`)
- [CVE-2024-52384](CVE-2024/CVE-2024-523xx/CVE-2024-52384.json) (`2024-11-14T18:15:25.913`)
- [CVE-2024-52393](CVE-2024/CVE-2024-523xx/CVE-2024-52393.json) (`2024-11-14T18:15:26.140`)
- [CVE-2024-52396](CVE-2024/CVE-2024-523xx/CVE-2024-52396.json) (`2024-11-14T18:15:26.377`)
- [CVE-2024-52524](CVE-2024/CVE-2024-525xx/CVE-2024-52524.json) (`2024-11-14T18:15:26.610`)
- [CVE-2024-6068](CVE-2024/CVE-2024-60xx/CVE-2024-6068.json) (`2024-11-14T17:15:07.680`)
- [CVE-2024-10394](CVE-2024/CVE-2024-103xx/CVE-2024-10394.json) (`2024-11-14T20:15:20.777`)
- [CVE-2024-10396](CVE-2024/CVE-2024-103xx/CVE-2024-10396.json) (`2024-11-14T20:15:20.917`)
- [CVE-2024-10397](CVE-2024/CVE-2024-103xx/CVE-2024-10397.json) (`2024-11-14T20:15:21.057`)
- [CVE-2024-3760](CVE-2024/CVE-2024-37xx/CVE-2024-3760.json) (`2024-11-14T19:15:06.327`)
- [CVE-2024-49025](CVE-2024/CVE-2024-490xx/CVE-2024-49025.json) (`2024-11-14T20:15:25.207`)
- [CVE-2024-51688](CVE-2024/CVE-2024-516xx/CVE-2024-51688.json) (`2024-11-14T20:15:25.810`)
- [CVE-2024-52369](CVE-2024/CVE-2024-523xx/CVE-2024-52369.json) (`2024-11-14T19:15:09.533`)
- [CVE-2024-52370](CVE-2024/CVE-2024-523xx/CVE-2024-52370.json) (`2024-11-14T19:15:09.760`)
### CVEs modified in the last Commit
Recently modified CVEs: `42`
Recently modified CVEs: `72`
- [CVE-2024-50252](CVE-2024/CVE-2024-502xx/CVE-2024-50252.json) (`2024-11-14T18:08:17.857`)
- [CVE-2024-50253](CVE-2024/CVE-2024-502xx/CVE-2024-50253.json) (`2024-11-14T18:09:15.067`)
- [CVE-2024-50254](CVE-2024/CVE-2024-502xx/CVE-2024-50254.json) (`2024-11-14T18:09:48.530`)
- [CVE-2024-50255](CVE-2024/CVE-2024-502xx/CVE-2024-50255.json) (`2024-11-14T18:10:12.383`)
- [CVE-2024-50256](CVE-2024/CVE-2024-502xx/CVE-2024-50256.json) (`2024-11-14T18:11:08.250`)
- [CVE-2024-50257](CVE-2024/CVE-2024-502xx/CVE-2024-50257.json) (`2024-11-14T18:11:39.990`)
- [CVE-2024-50258](CVE-2024/CVE-2024-502xx/CVE-2024-50258.json) (`2024-11-14T18:12:39.487`)
- [CVE-2024-50259](CVE-2024/CVE-2024-502xx/CVE-2024-50259.json) (`2024-11-14T18:24:11.470`)
- [CVE-2024-50261](CVE-2024/CVE-2024-502xx/CVE-2024-50261.json) (`2024-11-14T18:24:41.597`)
- [CVE-2024-50306](CVE-2024/CVE-2024-503xx/CVE-2024-50306.json) (`2024-11-14T18:35:03.743`)
- [CVE-2024-50837](CVE-2024/CVE-2024-508xx/CVE-2024-50837.json) (`2024-11-14T17:15:07.257`)
- [CVE-2024-50838](CVE-2024/CVE-2024-508xx/CVE-2024-50838.json) (`2024-11-14T17:15:07.333`)
- [CVE-2024-50839](CVE-2024/CVE-2024-508xx/CVE-2024-50839.json) (`2024-11-14T17:15:07.410`)
- [CVE-2024-50840](CVE-2024/CVE-2024-508xx/CVE-2024-50840.json) (`2024-11-14T17:15:07.473`)
- [CVE-2024-50841](CVE-2024/CVE-2024-508xx/CVE-2024-50841.json) (`2024-11-14T17:15:07.543`)
- [CVE-2024-50842](CVE-2024/CVE-2024-508xx/CVE-2024-50842.json) (`2024-11-14T17:15:07.613`)
- [CVE-2024-51591](CVE-2024/CVE-2024-515xx/CVE-2024-51591.json) (`2024-11-14T17:51:14.717`)
- [CVE-2024-51606](CVE-2024/CVE-2024-516xx/CVE-2024-51606.json) (`2024-11-14T17:17:28.997`)
- [CVE-2024-51608](CVE-2024/CVE-2024-516xx/CVE-2024-51608.json) (`2024-11-14T17:14:55.070`)
- [CVE-2024-51609](CVE-2024/CVE-2024-516xx/CVE-2024-51609.json) (`2024-11-14T17:10:36.463`)
- [CVE-2024-51793](CVE-2024/CVE-2024-517xx/CVE-2024-51793.json) (`2024-11-14T17:54:09.443`)
- [CVE-2024-51820](CVE-2024/CVE-2024-518xx/CVE-2024-51820.json) (`2024-11-14T18:03:02.447`)
- [CVE-2024-51837](CVE-2024/CVE-2024-518xx/CVE-2024-51837.json) (`2024-11-14T18:43:03.537`)
- [CVE-2024-51843](CVE-2024/CVE-2024-518xx/CVE-2024-51843.json) (`2024-11-14T18:53:54.760`)
- [CVE-2024-5982](CVE-2024/CVE-2024-59xx/CVE-2024-5982.json) (`2024-11-14T18:52:16.567`)
- [CVE-2024-47446](CVE-2024/CVE-2024-474xx/CVE-2024-47446.json) (`2024-11-14T19:10:24.197`)
- [CVE-2024-49579](CVE-2024/CVE-2024-495xx/CVE-2024-49579.json) (`2024-11-14T19:24:45.603`)
- [CVE-2024-49580](CVE-2024/CVE-2024-495xx/CVE-2024-49580.json) (`2024-11-14T19:25:47.433`)
- [CVE-2024-50305](CVE-2024/CVE-2024-503xx/CVE-2024-50305.json) (`2024-11-14T19:35:16.650`)
- [CVE-2024-50634](CVE-2024/CVE-2024-506xx/CVE-2024-50634.json) (`2024-11-14T20:40:43.690`)
- [CVE-2024-50837](CVE-2024/CVE-2024-508xx/CVE-2024-50837.json) (`2024-11-14T19:35:17.623`)
- [CVE-2024-50838](CVE-2024/CVE-2024-508xx/CVE-2024-50838.json) (`2024-11-14T19:35:18.427`)
- [CVE-2024-50839](CVE-2024/CVE-2024-508xx/CVE-2024-50839.json) (`2024-11-14T19:35:19.240`)
- [CVE-2024-50840](CVE-2024/CVE-2024-508xx/CVE-2024-50840.json) (`2024-11-14T19:35:20.033`)
- [CVE-2024-50841](CVE-2024/CVE-2024-508xx/CVE-2024-50841.json) (`2024-11-14T19:35:20.837`)
- [CVE-2024-50842](CVE-2024/CVE-2024-508xx/CVE-2024-50842.json) (`2024-11-14T19:35:21.650`)
- [CVE-2024-50843](CVE-2024/CVE-2024-508xx/CVE-2024-50843.json) (`2024-11-14T19:35:22.450`)
- [CVE-2024-51484](CVE-2024/CVE-2024-514xx/CVE-2024-51484.json) (`2024-11-14T20:14:44.360`)
- [CVE-2024-51485](CVE-2024/CVE-2024-514xx/CVE-2024-51485.json) (`2024-11-14T20:06:12.627`)
- [CVE-2024-51486](CVE-2024/CVE-2024-514xx/CVE-2024-51486.json) (`2024-11-14T19:55:34.890`)
- [CVE-2024-51487](CVE-2024/CVE-2024-514xx/CVE-2024-51487.json) (`2024-11-14T19:37:53.107`)
- [CVE-2024-51488](CVE-2024/CVE-2024-514xx/CVE-2024-51488.json) (`2024-11-14T20:12:58.443`)
- [CVE-2024-51489](CVE-2024/CVE-2024-514xx/CVE-2024-51489.json) (`2024-11-14T20:12:52.027`)
- [CVE-2024-51490](CVE-2024/CVE-2024-514xx/CVE-2024-51490.json) (`2024-11-14T20:13:01.587`)
- [CVE-2024-51587](CVE-2024/CVE-2024-515xx/CVE-2024-51587.json) (`2024-11-14T20:26:14.467`)
- [CVE-2024-51588](CVE-2024/CVE-2024-515xx/CVE-2024-51588.json) (`2024-11-14T20:26:28.047`)
- [CVE-2024-51589](CVE-2024/CVE-2024-515xx/CVE-2024-51589.json) (`2024-11-14T20:26:41.497`)
- [CVE-2024-51597](CVE-2024/CVE-2024-515xx/CVE-2024-51597.json) (`2024-11-14T20:27:46.943`)
- [CVE-2024-52350](CVE-2024/CVE-2024-523xx/CVE-2024-52350.json) (`2024-11-14T20:22:24.387`)
- [CVE-2024-52351](CVE-2024/CVE-2024-523xx/CVE-2024-52351.json) (`2024-11-14T20:24:39.083`)
## Download and Usage

View File

@ -11997,7 +11997,7 @@ CVE-2005-0999,0,0,ecca03fc38e9f5ae3e58e3725ca38d3553d21cd1060d462173b32ea09b9c08
CVE-2005-1000,0,0,876733ec970e875daec33609ebf439cfdd17ab98e8699b5ea8b6434b457f0939,2017-07-11T01:32:28.970000
CVE-2005-10001,0,0,2693db2d9b06c7ac36b92ee416e4e3effc2afa7e0b62b3415561be1db7294514,2024-08-08T00:15:23.127000
CVE-2005-10002,0,0,dc6fd831307ffcb4928dc15e5f0d4bca55123aa5ffaf8e97bc126f60e3f9b493,2024-05-17T00:24:26.580000
CVE-2005-10003,0,0,44493880725cd8839360edfe510264f0a320784d6ddba11287efa4e03d5d872b,2024-10-18T12:52:33.507000
CVE-2005-10003,0,1,367ed1bdab9b1c724256e2f713521055b99a14b98489eb580101edbb999a0048,2024-11-14T19:35:58.467000
CVE-2005-1001,0,0,15f915129c529eb106d656586fee07bf3a049367ce9223cf255e6d44dfb5abdc,2017-07-11T01:32:29.047000
CVE-2005-1002,0,0,9c4a3a87f279404d6b0eb0a64f730f2b1c061844b6065693972fceeec1e57e20,2016-10-18T03:16:25.287000
CVE-2005-1003,0,0,a961fab12b3a0362183c5cb7e641f0b1d0fc1fc8dc55e4a55bb9ee3700911bfa,2017-07-11T01:32:29.110000
@ -228634,7 +228634,7 @@ CVE-2023-37759,0,0,1415b636fde1d1e674552edec835a4b3f13774f91e7a6f36739442bfd5509
CVE-2023-3776,0,0,9b9e6fdf1c4bc5c96e654d9815690fa791039ca2db35eb2aa960559d73c92292,2024-08-22T20:24:45.973000
CVE-2023-37765,0,0,fb5a4ab315cc617fe99ad635daf21b9c79c91c61de43c4e314280f3386a0498a,2024-11-08T15:35:06.813000
CVE-2023-37766,0,0,ce98ea852fb52f0469c90b820fae6227fe146452d537f4ff6e92411f9ad946cd,2024-11-08T15:35:07.720000
CVE-2023-37767,0,0,60856d57fef3bb2747e75b5f6421f739b7660d5998660526a164bb704d8a46c4,2023-07-19T13:23:15.433000
CVE-2023-37767,0,1,f823bf48e7d8332b29718e3997d8b10cff2429fa94b0b410b71d2eaeac048ffd,2024-11-14T19:35:01.150000
CVE-2023-37769,0,0,371b615184f3bd513f2ca6abbebf9bd837602f137112e4a844bb2ff233999791,2023-07-28T13:22:09.480000
CVE-2023-3777,0,0,321a63c9d284567c8aae4befb0438a62ebf3ef396cb82b681c3d1067ce1fcd33,2024-08-26T16:08:25.727000
CVE-2023-37770,0,0,4f05dc848203776d620f57ea5888526c8203866e548c30aa9fb65dc5e4e7d188,2023-07-27T03:41:54.570000
@ -232642,7 +232642,7 @@ CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79add
CVE-2023-42838,0,0,d2c7cb1076afde325efe19ebd9189ea0f891ccc309473cf4021fe8881f3b600e,2024-08-09T16:35:01.893000
CVE-2023-42839,0,0,765dd4087b9c648a2614e4f77e8cb2a77a0f084da4aebcff5c956301f137e1c8,2024-02-22T19:07:27.197000
CVE-2023-4284,0,0,61fe561181169a40965e309f813ea607fd0daab2834cbef8e665fe00162fc64c,2023-11-07T04:22:25.233000
CVE-2023-42840,0,0,7d5761fec7b6f15aa84a1074a2da48e2a22e511dd264acb4eb97aeef295d728b,2024-02-22T19:07:27.197000
CVE-2023-42840,0,1,cd82264bc86c6b2cae0cfb802b7b76d55587d9910f0b6c0aa67585421b1bd358,2024-11-14T19:35:02.180000
CVE-2023-42841,0,0,1ba74cc5d5e854bd871cdd5a2c1321cd1721679505b9b640a088d8b01d078fa3,2024-09-10T21:35:05.947000
CVE-2023-42842,0,0,e6c3110fb32fb31efa637e19595877e38152993b501001f3e91f7f4195c48558,2023-12-13T01:15:08.050000
CVE-2023-42843,0,0,fdcaee2947060de20442c439e087fd1ee28a11ba66828a8d78ea7542fc20bb0f,2024-11-04T17:35:05.077000
@ -237879,7 +237879,7 @@ CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530
CVE-2023-50432,0,0,c08f27e1996614a80b06549eae73e36c5ce5ae51536270832f0a5c16afd3388e,2024-04-30T13:11:16.690000
CVE-2023-50433,0,0,1236cb1d1900890c10f0cec86536128d745a880515430cbaebcfc664a41166fd,2024-11-01T20:35:02.620000
CVE-2023-50434,0,0,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000
CVE-2023-50436,0,0,ed32d35f9bbdbf2811a8eab402768e68d119c724560cb58715088d750e00a6f9,2024-02-29T13:49:47.277000
CVE-2023-50436,0,1,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000
CVE-2023-50437,0,0,5d04fa2c2abb29eb8832a1e8bf568c0f0a216e516c111aa1d77c21b68cee54fb,2024-08-13T20:35:01.850000
CVE-2023-50439,0,0,6b771bac02a72f028393ea4844a2183a7f75d742009abba66069d074c7166b89,2023-12-20T18:29:44.920000
CVE-2023-5044,0,0,70d08631485d3df486bfde2a9938b1cd4cc232cbf333408306960d4923f33474,2024-03-07T17:15:12.073000
@ -239127,7 +239127,7 @@ CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb6
CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000
CVE-2023-52356,0,0,7dccc26c119ffd507dca45bc259afb8dfb8baea8acfee17fa269d8f7d722129f,2024-09-16T20:15:45.480000
CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9b50,2024-02-20T19:50:53.960000
CVE-2023-52358,0,0,0a9b9b1ce599c5b6e28af28108c550a9307f5fa18440515cf987b65d0e1a3c4d,2024-02-20T19:50:53.960000
CVE-2023-52358,0,1,7c9601112ec312a1dc4d0e883a26142a68f2368228707be8b0f1eb6cd36b27ff,2024-11-14T20:35:09.213000
CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000
CVE-2023-5236,0,0,fb6c3d46b555cdb6e2e8cfed896e892086c77c4bb29daa7e1e3231fc7a825bf9,2024-09-16T14:15:13.093000
CVE-2023-52360,0,0,ecfeb27a76b3cb4fc769668e2502fbe290543c70b0ad7217d769381a048f79b6,2024-08-01T13:45:37.677000
@ -239157,7 +239157,7 @@ CVE-2023-52381,0,0,612a15eb78d5f66fad16ca7ce12c6865c6ce501f4c4f47c30f542596a8c6d
CVE-2023-52382,0,0,ff68df838ff80bf3e32ebfcc4daa22b26645bb5f933b0ba12d2f456af89feb1f,2024-04-17T07:15:07.860000
CVE-2023-52383,0,0,c4deca95a8f07fb7c22e4b0e0a89d522f9cee543c8642a4a0eb87f9ff81520a5,2024-05-14T16:13:02.773000
CVE-2023-52384,0,0,1b28b5db39952ebab24cd0a63a53f39f49ccb355e1098aabd754534aa358eb82,2024-05-14T16:13:02.773000
CVE-2023-52385,0,0,4ae1d46cf462cfb34863df2df93bf59cc8a9a1d66d4276d9b536de0d4da8bf65,2024-04-08T18:48:40.217000
CVE-2023-52385,0,1,561fc607f16ade31646311120f49c331cbd56a95de1d2c8d93f073ef13e4d9d9,2024-11-14T20:35:09.457000
CVE-2023-52386,0,0,2a4cd33d840fba69ad11f548bc845cd6f6c618831136cbd5b4aaca4a2cf8bb8e,2024-04-08T18:48:40.217000
CVE-2023-52387,0,0,b2650028ac123e8e842277def6205aab4a35adb4993f16c1142f88bb1bfd4c25,2024-02-20T19:50:53.960000
CVE-2023-52388,0,0,fba652f56323ecabc4b9d2851593ecc2735d11f138371eaf93b02c0479a98a71,2024-08-29T20:35:48.347000
@ -239314,7 +239314,7 @@ CVE-2023-52552,0,0,263d078676b8ab80374bf1a1af537e9950d34ffb536f631dc6fba4ba090af
CVE-2023-52553,0,0,5e22a2db35ff14a3185f1e3a5a41a0a5f1eb054fee3abb62e16eda3a347f57d8,2024-11-05T16:35:06.793000
CVE-2023-52554,0,0,7c787c5730bd1ba7c71a82d47c4e7d44ddec67c0569424251b431e6010a9a5a6,2024-11-05T20:35:14.087000
CVE-2023-52555,0,0,5e36334335ab678d55bf6cac0b324af1ed187d2c730be3da7b4f852afbed6d98,2024-08-29T20:35:49.350000
CVE-2023-52556,0,0,7e3a11269360b6276bc76b9c4c1e84711ad94d2bfd285528e8777ca57579453a,2024-03-01T22:22:25.913000
CVE-2023-52556,0,1,f1f75b940389db0870ae4241ca39f9296fd800bfd62f55176223a4222383bf4c,2024-11-14T20:35:09.700000
CVE-2023-52557,0,0,5ed6bf0a491f3ec717ecac7d6471909703923a149768b3b4e52317d23f8d24e0,2024-08-01T13:45:39.150000
CVE-2023-52558,0,0,7a2164a6ea51bedc215ff5cabec224ee6fc723b56d536531a97955800cae293d,2024-03-01T22:22:25.913000
CVE-2023-52559,0,0,04af586fb20ce25776f7cc5f46253da9986ceb3c1247d4979acb72706c00df50,2024-03-04T13:58:23.447000
@ -239486,7 +239486,7 @@ CVE-2023-5271,0,0,6ca5aae6cfeafe6825b7b5b7a5960426f19016861ea4d7372261699d3ccb81
CVE-2023-52710,0,0,ff58675472b7f5253b62ab393b160b1cf349e6c1ae9c4d19bd1e0fd775a66fcd,2024-05-28T12:39:28.377000
CVE-2023-52711,0,0,7f19105f212eeeb82211cb5994a99c19f7a30d3dc3b433f91a0f9224ea063ce7,2024-05-28T12:39:28.377000
CVE-2023-52712,0,0,73fcfe56ef063242282f261e724c58a36beee3e73b4f79775b264a51d001342d,2024-05-28T12:39:28.377000
CVE-2023-52713,0,0,e0911b0cf80bf6534e65542375951beb0e5886b953272bd0f3008029f846fea2,2024-04-08T18:48:40.217000
CVE-2023-52713,0,1,bdf8d958353ec868d361ade9a3e967148b0b330845268fe3373dfde7a9053cbf,2024-11-14T20:35:09.950000
CVE-2023-52714,0,0,64949270c571827fa0b1878e73815a64c054140ffbbc1db3039e41e2500fc2d8,2024-08-14T19:35:16.973000
CVE-2023-52715,0,0,9d265f7602d20da9561a5e602d40ae6467560b79969c95ff6054722335d07e0d,2024-04-08T18:48:40.217000
CVE-2023-52716,0,0,04aef122aa6e9fa538042470d9e6c3bb7020a52932e8cd0f2e1328b4a81042f6,2024-08-29T20:35:50.213000
@ -242512,7 +242512,7 @@ CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f
CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000
CVE-2024-10141,0,0,1a2024f75553982bce647b93dbf2bff672eefec5950fa457467c64b98f6e45c7,2024-10-23T20:27:09.370000
CVE-2024-10142,0,0,f8d897c68f0699e753bf4964aa75eec3baa1d06414695c8d5256c262c45a3b84,2024-10-22T18:11:20.450000
CVE-2024-10146,0,0,5c8d93b22b0d392814df49f4ec3c42fba34f1e8a22bc1ba34d61b8cdb061b7c7,2024-11-14T06:15:07.080000
CVE-2024-10146,0,1,a6ea98fb4b84357fa99272a99b0f27b60fff4866bf525eca471cf9c7afe292b6,2024-11-14T19:35:05.160000
CVE-2024-10148,0,0,83c51017fcaad8303b49e241d62740cf9ee14ff3b98ac6e60e27203bec158551,2024-11-06T16:02:22.120000
CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000
CVE-2024-10150,0,0,980e5c556ba92cfe6f78a7c5edf14225adf63d1f935caa703239c8f6c3933115,2024-11-05T17:47:35.353000
@ -242679,6 +242679,9 @@ CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332
CVE-2024-10389,0,0,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077b56,2024-11-04T18:50:05.607000
CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000
CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000
CVE-2024-10394,1,1,4cdc66d522045d131b62bdfb9e89fa2c725ded5ae77d9c9a336284d0b06165be,2024-11-14T20:15:20.777000
CVE-2024-10396,1,1,c092919609de9bd4dd7de7dc30b35cfdf8abab6f06aaf1fb65271dd7702e20cf,2024-11-14T20:15:20.917000
CVE-2024-10397,1,1,4228f9e0bc2b26997ae55684f775720995f3ce71af3c6095d90bd9baad018ccd,2024-11-14T20:15:21.057000
CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000
CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000
CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000
@ -242851,21 +242854,21 @@ CVE-2024-10667,0,0,8c3b4c9a2974763bbe2a826956e8c92748c65fd783dec0a85476416fcfdde
CVE-2024-10668,0,0,ad6a1e988aa7f35451b56c605706e2e8d28df7ceaf4537d00be5d4d05186782b,2024-11-08T19:01:03.880000
CVE-2024-10669,0,0,23093ef05e499c533c3a2d4bc80a20165a28e5f349ac3746239f8d0e4e64a94d,2024-11-12T13:56:24.513000
CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000
CVE-2024-10672,0,1,1c6c91368b0def5a51813fa0531d7bb91e94a3b53eca32eed9c5f65d5616e882,2024-11-14T18:49:26.733000
CVE-2024-10672,0,0,1c6c91368b0def5a51813fa0531d7bb91e94a3b53eca32eed9c5f65d5616e882,2024-11-14T18:49:26.733000
CVE-2024-10673,0,0,721fbd2c7f4fd52d46e9315cad58bcfcec74c6705f993232b5ed88d0e5ca2848,2024-11-12T13:56:24.513000
CVE-2024-10674,0,0,d16f584849190e67ddd9b044fe809cc53716f0604b4d903c0b675313c791d9a1,2024-11-12T13:56:24.513000
CVE-2024-10676,0,0,c4d26028c65dae8ee24a6ae71fbafbbbdf2f434e1b4ee4c7591876108357a5b0,2024-11-12T13:56:24.513000
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
CVE-2024-10683,0,0,81b5edc9806b9d41a626cf134b47e67b5d64e10aaf06aa6e2f1151e4509d5dd6,2024-11-12T13:56:24.513000
CVE-2024-10684,0,0,dd46c46b63d005f5eba7cd0edc585eb1b3eb2cd540c331f34ccb08dcb21efeb7,2024-11-13T17:01:16.850000
CVE-2024-10685,0,0,735dc2f0f480642d8ccf07f78f6e1a8d59da145d42e7702cb885b90e2b756411,2024-11-12T13:55:21.227000
CVE-2024-10686,0,1,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d49750a6,2024-11-14T18:15:17.943000
CVE-2024-10685,0,1,1d5e3517448dda5f262310078551ab26523509e6a1746aada937566f5315b2a6,2024-11-14T19:40:14.953000
CVE-2024-10686,0,0,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d49750a6,2024-11-14T18:15:17.943000
CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000
CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
CVE-2024-10693,0,0,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000
CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
CVE-2024-10695,0,0,b5551f18720c3992d4cbffe3b44039a24aa131396124cb89424c3c4f8c05f581,2024-11-12T13:55:21.227000
CVE-2024-10695,0,1,c91c88b2e014c926c977a623d612f44936109b69ef58435a4fdca68abda40e21,2024-11-14T19:44:16.020000
CVE-2024-10697,0,0,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000
CVE-2024-10698,0,0,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000
CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000
@ -243067,9 +243070,9 @@ CVE-2024-11068,0,0,4b051dd1e90eddfcfc88c8711edd0209408a9ba2f8b4588824fefefed2e09
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
CVE-2024-11073,0,0,7b275d77346d3baae5145fae1e1bc949854bb720c1a66c386a5f1f31e520bae5,2024-11-12T13:55:21.227000
CVE-2024-11074,0,0,b0b432f9f11178b738766f16248994f53b322af072bbf835d11e0cca21060089,2024-11-12T13:55:21.227000
CVE-2024-11076,0,0,68aaa806834c6f72f1c370289d32181f8562b1175818d8ed99e5a507b1de4718,2024-11-12T13:55:21.227000
CVE-2024-11077,0,1,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
CVE-2024-11074,0,1,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000
CVE-2024-11076,0,1,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000
CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
@ -243647,7 +243650,7 @@ CVE-2024-1678,0,0,d7ff889a45c19600d651a095e777206640b8492b0764403803a17b2b0960a8
CVE-2024-1679,0,0,17bb9123bbf364aa33e966e6c2425a349b78ca4b0bae773030e2388aec7f2994,2024-05-02T18:00:37.360000
CVE-2024-1680,0,0,bd026f6f4577d87113b1d29b371eaa9932e24a38c7da0012faa1c1e94f133830,2024-03-13T18:15:58.530000
CVE-2024-1681,0,0,1a482680a055401416ddaa083a69f1c47b6c9194da0d7c18ae32e2ad08501e23,2024-04-22T13:28:50.310000
CVE-2024-1682,1,1,4ff469fb84591d897d3f78d88681c151b0fdc8d5b35d0167b2763ec31141a950,2024-11-14T18:15:18.193000
CVE-2024-1682,0,0,4ff469fb84591d897d3f78d88681c151b0fdc8d5b35d0167b2763ec31141a950,2024-11-14T18:15:18.193000
CVE-2024-1683,0,0,5eea2ca94f33514f1a10330cfb76f46bfaa5dd8e7036c4fcc56926960dff400d,2024-02-23T02:42:54.547000
CVE-2024-1684,0,0,3968c3bdd3b3ae3fb293826cfdf6d87aa6258fc78cc6b2c763e860d1cdec7f47,2024-03-13T18:15:58.530000
CVE-2024-1685,0,0,52ebc28025f57fba31216035550fa84131fc9d72b996fd38059ce631ee298162,2024-03-17T22:38:29.433000
@ -246923,7 +246926,7 @@ CVE-2024-23786,0,0,6ae4fe60ce393a411ea48b9876215e539a050978e709da57dec7a256f2428
CVE-2024-23787,0,0,7a8ddce6195bf931c799fcf4083a75cf1b9842febd9c3da44a75515daf822e08,2024-08-13T14:35:10.747000
CVE-2024-23788,0,0,64abbc30839e8d16e55707492265880e002ac43878f4aa04dd4b122fd59c9c73,2024-08-09T16:35:04.550000
CVE-2024-23789,0,0,ebe69de329ce3066ddae75bf202509726e55e928e26b7120b9a03b158a88c139,2024-08-14T19:35:20.280000
CVE-2024-2379,0,0,0712844accba64ea814c5017a1af61ea7caadbf030deed7db72ba68c9fce60bc,2024-07-30T02:15:05.397000
CVE-2024-2379,0,1,bf50084b0f6625e9f2f932a65a78a5f1b45a21762f6b47e6f1c8cee00bfd1e05,2024-11-14T20:35:22.613000
CVE-2024-23790,0,0,10fd61ba3db4d7c66d81b3afd519574867d168f5ef59d8caac21df5f30755ae0,2024-02-02T02:07:58.653000
CVE-2024-23791,0,0,244621ff2d433005513b939ef7ab8ae44d25c483ec850474bc054b795de67574,2024-02-02T02:07:28.850000
CVE-2024-23792,0,0,f34fcbde7640056d2156c42bbb24f1d1b396f26de8a742cdc375ac91a383f3c8,2024-02-02T02:07:40.577000
@ -247965,8 +247968,8 @@ CVE-2024-25422,0,0,183c4ec0faabad98f4264a6cd25b9f8acfe9ee005e0931f44bde0815e323c
CVE-2024-25423,0,0,9c38591521533b12d0d8640f97867e59ae0ba009f0e2d3612c6f7b4eda265498,2024-07-03T01:48:50.347000
CVE-2024-25428,0,0,a1baa90ebade4117b4da7a9052f9f7b7385230216b8f9a62456cca560644c28a,2024-08-01T13:47:44.563000
CVE-2024-2543,0,0,90e05f36a3d2dfc0c0cb0570a48a9a80b8042b66097a9bbd3537fdf34c177bc6,2024-04-10T13:23:38.787000
CVE-2024-25431,0,0,f7a29023d8c25d655bb74a17238710ea0f203fcbcb981c8e00225473e26857c3,2024-11-13T15:35:07.420000
CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfcdb4,2024-03-04T13:58:23.447000
CVE-2024-25431,0,1,f8fa003a847bb4543088b3781a569aaae2e4aa029e3153cd371cce5663cfcfcd,2024-11-14T20:42:47.297000
CVE-2024-25434,0,1,63dc4e430ec66833460d8a2f31e4264b2ff025b996c4a8f44483af6e7e8189f7,2024-11-14T20:35:13.403000
CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000
CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000
CVE-2024-25438,0,0,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000
@ -248237,7 +248240,7 @@ CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c1
CVE-2024-25845,0,0,f312beb2aa8aad65c6f2e2cd8b391abcdec4221175ade5509f4776c9d68bd6f9,2024-08-27T20:35:14.373000
CVE-2024-25846,0,0,1b01ded1319f85d0e1b31b4bad3147fa711a456779b7a8a2cc484b2fe23c37c9,2024-08-08T20:35:05.147000
CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde784,2024-08-01T13:47:53.253000
CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000
CVE-2024-25848,0,1,94e717b82be5b6df9a732c7bc789b8a92af8746fc6d8d5b662ce1272090a4840,2024-11-14T20:35:14.383000
CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000
CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000
CVE-2024-25850,0,0,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000
@ -248693,7 +248696,7 @@ CVE-2024-26318,0,0,e49f81956340b47d12c2b6c8e60e793f3ff0ae30227c439a8cc649c04f3ff
CVE-2024-2632,0,0,68039af9d391e4f53fc42bf0bf9c6a75cff13780e172f64ceb26ab23a8a8d5db,2024-03-19T13:26:46
CVE-2024-26327,0,0,30d08d577d44d38c98e8d09a3ca2e28a354f8d84b13e8b7475d667e0aa1a602c,2024-07-03T01:49:38.810000
CVE-2024-26328,0,0,8e220872ce6fda1bf070a0407dc485e9fea465cf19de6295b3aa4e1694aacee0,2024-11-06T15:35:12.510000
CVE-2024-26329,0,0,3b0eb6608df7a74fc8a9d5773ed651310cd73a96d8ef2afac673200b449390fe,2024-04-05T12:40:52.763000
CVE-2024-26329,0,1,6cf7072c8c7ab5f09657771928ed8ed0d8504124fb97a810035e6c97c6ae3c1a,2024-11-14T20:35:15.287000
CVE-2024-2633,0,0,5cbc6482108bfabb58a338263ca9ce41f75b102c0fb9b1f68c08206c04598c5e,2024-03-19T13:26:46
CVE-2024-26330,0,0,57903b982740769cb2bfceb4ed7ca578f76569bff9879a33cdaca56e77a02b3c,2024-11-01T20:35:07.497000
CVE-2024-26331,0,0,1ee618c6a83f1d80e2b7639e36ef676bbc9cac1ae9fe1beda2944758bd324a0a,2024-08-06T19:35:02.510000
@ -249754,7 +249757,7 @@ CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000
CVE-2024-2759,0,0,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000
CVE-2024-27592,0,0,d1ab0f4f443cdfc3ef1bdb598e0eca6a6dd41bceb98b2d42145b4b52d872d5f3,2024-04-16T23:15:08.690000
CVE-2024-27592,0,1,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
CVE-2024-27602,0,0,ff68a7dfbe76578be745d2be853eb13367fbf75dc768ea067191484500d8515d,2024-07-11T15:05:30.183000
@ -250206,7 +250209,7 @@ CVE-2024-28158,0,0,e11a9678e4f2f0242962248a4f5f96e3f4098382c9b4895b78df62a6d496f
CVE-2024-28159,0,0,4a9f4f91b8aea86a42bde029558a44ab2b24f6212168e8c6c34372a6626e7248,2024-08-27T20:35:21.767000
CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000
CVE-2024-28160,0,0,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000
CVE-2024-28161,0,1,aa5f9db377232f49e906c38d93bc3880cc53cbb7f55a8f6a819061fb4aaf5744,2024-11-14T17:35:04.520000
CVE-2024-28161,0,0,aa5f9db377232f49e906c38d93bc3880cc53cbb7f55a8f6a819061fb4aaf5744,2024-11-14T17:35:04.520000
CVE-2024-28162,0,0,755d306fd311701bbe86ac9be3ec2b0c299df65b6f39b9390d67e843d3998f72,2024-11-12T16:35:08.007000
CVE-2024-28163,0,0,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
@ -250511,7 +250514,7 @@ CVE-2024-2875,0,0,6cdb006d1a6c5034276b51f0b43f593cf2fffd4a38086e818a1876a540999e
CVE-2024-28750,0,0,d780513969d95a2a8e4659069a1cd3d6cd97b1c91cdf4b1dec2cf83a7354c7e9,2024-07-09T18:19:14.047000
CVE-2024-28751,0,0,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3d0d,2024-07-09T18:19:14.047000
CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e95ca,2024-08-01T13:49:17.413000
CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000
CVE-2024-28753,0,1,4002240eba0a3970a9e2bc0d65ac010136c812b867a4455af92d4cbdee24b2a1,2024-11-14T20:35:21.680000
CVE-2024-28754,0,0,9b31cb39cd5b77a5e56c0bcf42c58dcc3858bfa4f0abada8f077294e21b8f1b4,2024-11-01T19:35:21.447000
CVE-2024-28755,0,0,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000
CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000
@ -250836,7 +250839,7 @@ CVE-2024-29117,0,0,7cbc86fd47b57aac5bdcb66853eac01c2823bf8c332ca79b8820d49cc7cba
CVE-2024-29118,0,0,1cf920921a96fd5f0eb418dbd890604a04de50213d4066e1f2401f217f180df5,2024-03-19T16:33:58.680000
CVE-2024-29119,0,0,738a7b7e804b6feffc33f998d5fbd83a1b05ef16b9a6d435f583f42a46ae6f6c,2024-11-12T13:55:21.227000
CVE-2024-2912,0,0,f62836a8afe15e49afc11abef746f6e05f5ae0f68099e584fae53277c8c9f769,2024-05-22T16:15:09.713000
CVE-2024-29120,0,1,7f41b964c09ac8aa95a0035e77a220dee0c782999c30c100c6ecb39548161767,2024-11-14T17:35:05.343000
CVE-2024-29120,0,0,7f41b964c09ac8aa95a0035e77a220dee0c782999c30c100c6ecb39548161767,2024-11-14T17:35:05.343000
CVE-2024-29121,0,0,6325c10b522d77de76e2af8d35d0ad7dde2dffd7703677e5c3f9cd67ab864731,2024-03-19T16:33:58.680000
CVE-2024-29122,0,0,661ef3e986563bd80f846a4ddab64b8b192e2d4e3524465144ceb6bed1a37def,2024-03-19T16:33:58.680000
CVE-2024-29123,0,0,ebf9249691adeb2d60017b147325d5448759ac253d439ee41cb427cd5527b99e,2024-03-19T16:33:58.680000
@ -250927,7 +250930,7 @@ CVE-2024-29208,0,0,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074
CVE-2024-29209,0,0,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000
CVE-2024-2921,0,0,db69ed599921b3347a9e090088ac60a033292b080a263fe6dc6a7861e5eadd49,2024-11-07T16:35:16.250000
CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000
CVE-2024-29211,0,0,cac9131decc256e64ee1b892c76f8872c9f6c8a09a15f4735f9724dfd6f004f1,2024-11-13T17:01:16.850000
CVE-2024-29211,0,1,8c8d8e45b5c218fe77a714d1c8b6c57d4f639d22f03f0277fa791692b77b52ed,2024-11-14T19:09:01.213000
CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000
CVE-2024-29213,0,0,923c285048ea8e8ada1ec8fc14c3379597d106a93dc5f7c0191835b40c0543ad,2024-10-21T18:35:11.263000
CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40afd,2024-05-28T12:39:42.673000
@ -251572,7 +251575,7 @@ CVE-2024-30199,0,0,c87ad7b2d130da7ff087acec94fffbb9d8ac3e1c8f24ab4590517eee45b03
CVE-2024-3020,0,0,a9be8733f9c5e2508f0c4f960f0c984a8f23212df5d63b8e13b98f95d9597dbc,2024-04-10T13:23:38.787000
CVE-2024-30200,0,0,c455a1dbb6f9d915db0da82c73cca8bc6fa2d78acc476d7a8456fd9d1e2ea4e1,2024-03-28T12:42:56.150000
CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735ecd,2024-03-27T12:29:30.307000
CVE-2024-30202,0,0,2545347c9158a3f795ad08e02fee2783f83a0102d3b3c6cd088e6c61c3ec608b,2024-05-01T18:15:19.553000
CVE-2024-30202,0,1,ecd5c9b4bd0ebc202276e86a3d9a7e9f6b3bf262206739b2cbd70f27623f88ba,2024-11-14T20:35:23.057000
CVE-2024-30203,0,0,8b447cfaa3c0f29bed1fa430ec69e0ff721af51bf1f0d5669fc03f342b79df4c,2024-11-07T11:35:05.040000
CVE-2024-30204,0,0,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000
CVE-2024-30205,0,0,59ff5e238770a16ac12a044b9f567826327ea645bd7ddc5284c92e9966a63ace,2024-05-01T17:15:32.820000
@ -252004,7 +252007,7 @@ CVE-2024-30639,0,0,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078
CVE-2024-3064,0,0,8a36a79ace74b39564c56ff7401e476ffc08c1a4de80ba6f8cd5a5d5cd60f7fb,2024-04-10T13:23:38.787000
CVE-2024-30645,0,0,77873f1c56920b575cbc0a26f80968d9589bdd66fb005fe46610787de441aca3,2024-08-01T13:50:25.530000
CVE-2024-3065,0,0,0bda0f080fba1f5572d33c440e40f60c6a3ce2d985dfed057962a87436804b26,2024-05-24T01:15:30.977000
CVE-2024-30656,0,0,2a0fe69d1e3a24b032821f19ada467d83a25099df7b1313f53c857fcc2f0c81c,2024-04-16T13:24:07.103000
CVE-2024-30656,0,1,1fbf6cc036ef4d1011b70d44411336d2b49e8c9bc093f89b2ba8a036f8909251,2024-11-14T20:35:23.857000
CVE-2024-30657,0,0,aafd37252d8cd76cc88d27e5c06a74ee401323bfc2559b7fbd8004e3865b18d4,2024-05-27T00:15:08.743000
CVE-2024-30658,0,0,f06c1cf8cc96fbec2b40a1e1e937877c93d61d8d9e3a49d3ddc67ff1cbc9406e,2024-05-27T00:15:09.013000
CVE-2024-30659,0,0,bed02d76dc732ca7319584b72b912e2fa7d96c20f4a15450066496d1fa763c6e,2024-05-27T01:15:15.650000
@ -254213,7 +254216,7 @@ CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9
CVE-2024-33787,0,0,c79d3756f20fa8608bd38338556aeaa798aa21ec0e9c3dffe176487918ad4adc,2024-08-06T15:35:13.693000
CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47
CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000
CVE-2024-3379,1,1,e72123e670b36578febbe2bb46d6c313dfeb7d39f810ad5f1278e7e7f1aa3fb0,2024-11-14T18:15:18.503000
CVE-2024-3379,0,0,e72123e670b36578febbe2bb46d6c313dfeb7d39f810ad5f1278e7e7f1aa3fb0,2024-11-14T18:15:18.503000
CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000
CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000
CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000
@ -254982,7 +254985,7 @@ CVE-2024-34714,0,0,e231a4a259714202f61a69bb06497a65111477c8e99d84b716409e7518cfc
CVE-2024-34715,0,0,a82e11e04c452d1bea6b0a9824b74b6f2046192e0be7962e7e2d23b74ac2865a,2024-05-29T19:50:25.303000
CVE-2024-34716,0,0,6c3b1bfeb59833afa0878217bf084cc4cde82455598fa083dba17b1e1360762c,2024-05-14T19:17:55.627000
CVE-2024-34717,0,0,9708a1af9b10bdcf029cd505a3cb07145d8977f96260cc07b0dfdf42dc2f21cb,2024-05-14T19:17:55.627000
CVE-2024-34719,0,0,af526077039a417189ef9679569a256f965cab96e39d64f9b572f448307fd3f6,2024-11-13T18:15:20.267000
CVE-2024-34719,0,1,6509dac5d4e8a7f2cdcfeb42852d7e5d9efb42f55153585bcf2d16c7c627fade,2024-11-14T19:35:05.990000
CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000
CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0fa9f,2024-07-12T16:11:36.933000
CVE-2024-34721,0,0,e10eab3e44bc304347c4431c31d705a2c4a55c2499e0412aab4621d1d6ef445b,2024-11-05T21:35:07.660000
@ -255166,11 +255169,11 @@ CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adae
CVE-2024-34997,0,0,5fbdf010972a8268fd5a9463e95189eba51629c3cae1b641fade25965bb6360c,2024-08-27T15:35:16.800000
CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000
CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000
CVE-2024-3501,1,1,ab0fe1f3dce1fe66b80d12a62cfc54d2e4dd51a2f66f7bab1f837d3a63819abb,2024-11-14T18:15:18.713000
CVE-2024-3501,0,0,ab0fe1f3dce1fe66b80d12a62cfc54d2e4dd51a2f66f7bab1f837d3a63819abb,2024-11-14T18:15:18.713000
CVE-2024-35010,0,0,6e4b79d2c02224bc0070ffd30b8ebbf9821b5f9a967abd7e45b682dfed020dc3,2024-08-20T14:35:18.007000
CVE-2024-35011,0,0,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000
CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000
CVE-2024-3502,1,1,d04b21de3058acac73afb833001910f0d9412a3db1c01740f30b8d218c869c4a,2024-11-14T18:15:18.943000
CVE-2024-3502,0,0,d04b21de3058acac73afb833001910f0d9412a3db1c01740f30b8d218c869c4a,2024-11-14T18:15:18.943000
CVE-2024-35039,0,0,16789b799d84c4b57ca393e0c1f64a27f89bdf5208029185a91c381dd5f853e1,2024-07-03T02:01:12.907000
CVE-2024-3504,0,0,e2de0e6f69991c8d2671ce35086e9faed799d2b484a27eddaabccf584b0c7ea8,2024-10-09T15:27:06.437000
CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502def,2024-07-03T02:01:13.607000
@ -256144,7 +256147,7 @@ CVE-2024-36245,0,0,2a3b56c6f77ab27067ab462dff7f04da57eee3c95a1a9438f3f26c40b9ad2
CVE-2024-36246,0,0,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000
CVE-2024-36247,0,0,16c6efe40503daf1080fcbf6d9a009e1a3c1386098439c6bda19cf80a4941086,2024-09-23T14:16:11.290000
CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000
CVE-2024-36250,0,1,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000
CVE-2024-36250,0,0,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000
CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000
CVE-2024-36253,0,0,06043dbdef5bfb8c85e10716419691bf2f83dd9066a2e1afc5045e796a57514d,2024-11-13T21:15:22.730000
CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000
@ -256318,11 +256321,11 @@ CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc
CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000
CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000
CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000
CVE-2024-36507,0,0,28094c1511051827ab705dfbe554b5fd3b0b346d21c7557cdc9c03406094ce3d,2024-11-13T17:01:16.850000
CVE-2024-36509,0,0,e73caa2f8033d4cfc04b162e805f3ab537b8b8aa1a9627edccc2f136fe9b885c,2024-11-13T17:01:16.850000
CVE-2024-36507,0,1,6b0c38dbda3f727dc169ce7e5f1546c11940f9dacdf67710b851d7b6c214bd3a,2024-11-14T20:31:45.367000
CVE-2024-36509,0,1,764e30bb72423d5f8b5a78996260ef54d9ee171a8c47fd6a3f0c38f56a930041,2024-11-14T20:33:44.727000
CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000
CVE-2024-36511,0,0,1807360f38a62bd1fc293a7868ee622ad3fd5e209d6556e4181a75075ebcfb2f,2024-09-20T19:43:25.023000
CVE-2024-36513,0,0,26713fdac822ac59e8e0a74e647e8fce39aef4f8e8fc394f397e4d708e9a25dc,2024-11-13T17:01:16.850000
CVE-2024-36513,0,1,65d57afbb9c95cb16ccd4d82b60d3a42d510f6812bfb367624a249d49aac930c,2024-11-14T20:35:26.093000
CVE-2024-36514,0,0,ae3ea1b58c1af4d84bf3b1df047767075b97747b2aba92d2b8d841814d31aaad,2024-08-27T13:28:33.090000
CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14e64,2024-08-27T13:28:09.360000
CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000
@ -256405,7 +256408,7 @@ CVE-2024-3668,0,0,760723957a03bd3e6e8f8da9bf14a37cb962a55f21654d65bee4d6a13a6bb6
CVE-2024-36680,0,0,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f28d2,2024-07-03T02:03:31.083000
CVE-2024-36681,0,0,91ab5a39355fb60d1e0e5e355644e5363b5d880ec14684cab5ae1016626028b9,2024-07-03T02:03:31.853000
CVE-2024-36682,0,0,607667f3d3fa1e7539487ebcdf60477393019c86221af3075a4b31a59983923e,2024-08-01T13:53:12.263000
CVE-2024-36683,0,1,27df8e942ccfab1fb39d37797bd69ddbea8088898ebdaa405a1fffabd06ad979,2024-11-14T17:35:06.183000
CVE-2024-36683,0,0,27df8e942ccfab1fb39d37797bd69ddbea8088898ebdaa405a1fffabd06ad979,2024-11-14T17:35:06.183000
CVE-2024-36684,0,0,92f14ba44da3232d94fa9d8919d066f2f528d700fa94d6456ec4eb59fdec8f01,2024-08-19T18:51:09.050000
CVE-2024-3669,0,0,adf9cc4d7b16c7513726b84fd5b10bd94ac2985d9cd2d264bea2883110b227ce,2024-08-01T13:56:38.537000
CVE-2024-36691,0,0,2dc541714f35cff24b0fb3cd72710beeeeaa2b0f3379e9849d1938be2b5e0991,2024-08-21T17:35:03.320000
@ -256756,7 +256759,7 @@ CVE-2024-37175,0,0,2e75968b5d051a3722a9a13599775d327d1c94984da4214e0e883674bda95
CVE-2024-37176,0,0,3275b09004f17b6b89b755a43fa7e2802a78dd80261334da823124655666d26e,2024-08-09T18:42:31.847000
CVE-2024-37177,0,0,5c668d6fc8f89d275dab68dfc9c6e6aa2dda5828c4c067dd13278268042a6c87,2024-06-11T13:54:12.057000
CVE-2024-37178,0,0,ec0623af63b542a59bee4b0b0dc964702dff4ddb4fa5e9957a0a4c2999ed0559,2024-06-11T13:54:12.057000
CVE-2024-37179,0,1,9e078b923dead8982d3eeccf36e44ecb74b62c159eddd8ac1e417f60aaeca0b3,2024-11-14T17:35:54.067000
CVE-2024-37179,0,0,9e078b923dead8982d3eeccf36e44ecb74b62c159eddd8ac1e417f60aaeca0b3,2024-11-14T17:35:54.067000
CVE-2024-3718,0,0,8a153be0e904f8dfce7a1fd62411ff8bb9932d49f0ddf7963b849729d2d3feb2,2024-05-24T13:03:05.093000
CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862f7e,2024-07-09T18:19:14.047000
CVE-2024-37182,0,0,2c3b8dc4ac8a4c58e16690b89b8b1d4e60a1d50b12c336b43ce7311fbfe9a142,2024-08-07T16:08:10.810000
@ -256846,7 +256849,7 @@ CVE-2024-37280,0,0,ac35b85853446debbb96c46d0c81b9a57aa5a4ffc880ba0d37638e24be271
CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e7864801ae,2024-07-31T12:57:02.300000
CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000
CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000
CVE-2024-37285,1,1,5ec3c9c6ec0808543bc54e437e22bc2609a83a3787034dc5d9d288840ccb842b,2024-11-14T17:15:06.457000
CVE-2024-37285,0,0,5ec3c9c6ec0808543bc54e437e22bc2609a83a3787034dc5d9d288840ccb842b,2024-11-14T17:15:06.457000
CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000
CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000
CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000
@ -257102,6 +257105,7 @@ CVE-2024-37571,0,0,f2268da0f70596d56829f3f9bf9d47661ad5192c587321bdcf916146c34ae
CVE-2024-37573,0,0,7cf896a83bff7adb78d3c1fc14e6c4ef534e5b6ec963a5ca90d46c8aebfbcf87,2024-11-01T12:57:03.417000
CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000
CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000
CVE-2024-3760,1,1,a76c6c9495269ad7ff459691b805bf829dd2e190006db9d3c1454ecf240be3c1,2024-11-14T19:15:06.327000
CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000
CVE-2024-37619,0,0,09797faff2df8b72db2a2f262ebdfd130817b6ee60286e6aa7311eb834d19b77,2024-08-01T13:54:07.797000
CVE-2024-3762,0,0,40d3f55de3ecbf79b02b0c0e4b35c8d9284b268357e297bc7035406e1948919a,2024-05-17T02:40:06.647000
@ -257770,7 +257774,7 @@ CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f203504
CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000
CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000
CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000
CVE-2024-38479,0,0,ae8d4fe4cee56e3fa0df61bc7ba838dbd35927401f04ef96a32b3fc49065681c,2024-11-14T10:15:05.347000
CVE-2024-38479,0,1,ed83952a9f70632e9d0b7a4d5c8799cb8efdbff31e26235b2ce51a2f2396b47b,2024-11-14T19:35:07.153000
CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000
CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000
CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000
@ -259058,7 +259062,7 @@ CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f
CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000
CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
CVE-2024-40592,0,0,3e301ea9b16bc5fcf34d69433510034814387de05c59701041d20988436679bd,2024-11-13T17:01:16.850000
CVE-2024-40592,0,1,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000
CVE-2024-40594,0,0,e1d4d027c9dcda2da83b02bb549097245bef0193d8569c5563a5fbe8b55ccbb0,2024-11-04T21:35:06.433000
CVE-2024-40595,0,0,c44d4f6c466d7ef5eae926dc07df3df9a34ba4de6b2deba6d973ce015e367bf0,2024-10-25T12:56:07.750000
CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000
@ -259113,7 +259117,7 @@ CVE-2024-40657,0,0,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b9
CVE-2024-40658,0,0,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000
CVE-2024-40659,0,0,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000
CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000
CVE-2024-40660,0,0,74c960eea143c0e524b09de261c09c6fc912cc1517e2fa6f798149565937a1e4,2024-11-13T18:15:20.570000
CVE-2024-40660,0,1,ae7ab748903bf86da17ab7fb8334db31f49836b36b2874e1b7e20376910cc25d,2024-11-14T19:35:07.343000
CVE-2024-40661,0,0,ece784732e717dfd5aa9d24e114c7c911766a2da6d3d446f6065a64726338596,2024-11-14T16:35:06.610000
CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000
CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000
@ -259851,11 +259855,11 @@ CVE-2024-41734,0,0,ee1445b5a6c50fe46a456bea41ccb696f4523dbb75f2650033b52fcf021a5
CVE-2024-41735,0,0,9b1bcbea87f6f37440d1c449d6340c711ae945b18c9cda4029f4e601f348537e,2024-09-12T13:53:32.993000
CVE-2024-41736,0,0,f12f0374fcc58eb9fac9e1d169220d47e16a0e5ad6c2e28256d8df041476b834,2024-09-12T13:51:42.727000
CVE-2024-41737,0,0,bcc2c31b9f08a899ad8c6d2953a09d2c0889e7eb08f1011b3147192ea690de38,2024-09-12T13:49:41.953000
CVE-2024-41738,0,0,4efab88de529d1709dd37e7b4c462899323e09e9f1086b1299191256308a84b4,2024-11-01T20:24:53.730000
CVE-2024-41738,0,1,a6808727835cd2b2cc80bf122a0771de7820d21201249aa0c0345f68c41d07cd,2024-11-14T20:51:29.847000
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
CVE-2024-41741,0,0,a5849c0737a5fc5cdca9a5fab4a979a4e60039d70cf014b49f4fd62777760773,2024-11-01T20:24:53.730000
CVE-2024-41741,0,1,ccd34eefc10ced5bf4d48e49b50366b947f28aa2b83fb2dfcdc45ff79ea550e2,2024-11-14T20:42:44.150000
CVE-2024-41744,0,0,fc4eedd1a4bbdd823b105499b0a912c465f8e205cf09b2d4f8519632cc3e2fd2,2024-11-01T20:24:53.730000
CVE-2024-41745,0,0,33b6213f3cdb5e0742b91b08da2cfb6951f537645032e7c87f4be371dc6d2024,2024-11-01T20:24:53.730000
CVE-2024-41745,0,1,099100d567f038155daa92534283ffbc5becefb4479f9a979209e7ec8d982d6f,2024-11-14T20:35:33.390000
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
@ -260756,8 +260760,8 @@ CVE-2024-43083,0,0,9e09a78fc09963141a3fc02fd9ed1ad21971def8b416ce9fb9ce24f8d729d
CVE-2024-43084,0,0,437d5cc042837f1bfc9cfa8d8d836f0c2f4c7883f5fb73f66819713dd173d647,2024-11-13T22:35:07.777000
CVE-2024-43085,0,0,c715c7e31f1af16a494792b8c4a654750dfcfcb152116fd578bca383daa762e5,2024-11-14T16:35:11.720000
CVE-2024-43086,0,0,b35a9c0f4b81e475922d197d48e538ace9956732719607be7dbe8800d97916ab,2024-11-14T16:35:12.570000
CVE-2024-43087,0,0,1127c4ae24000cbc474cb9ae6b80fcd28ac633a09b7c536b905800937c9d183e,2024-11-13T18:15:21.307000
CVE-2024-43088,0,0,f856fb27d9849b9e2892c2985299e11fb1bace58e4df7f885384836d602d3a8a,2024-11-13T18:15:21.387000
CVE-2024-43087,0,1,df8687413166c680df9e58e2ffe928b52946447f2106313681b4f6900ac2725f,2024-11-14T19:35:08.150000
CVE-2024-43088,0,1,1c13294f36b1f9b0be567789e36f583be558d3a79698dff40d24917c5068c2a3,2024-11-14T19:35:08.967000
CVE-2024-43089,0,0,b277ca7768b3e4b4b0f60e1bf47b20ac676f3753e8cd1ebaabaa7be31aea80a8,2024-11-14T16:35:13.417000
CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000
CVE-2024-43090,0,0,28e87613d5722ac4d9a0be826e296e6e3ad7500c170880234254815d7f83e6be,2024-11-13T22:35:07.990000
@ -260768,7 +260772,7 @@ CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22f
CVE-2024-43102,0,0,08e196b4c8739548226238903033d07bdd98395e1a6fb3461533ef08cfa70faf,2024-09-05T21:23:40.503000
CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000
CVE-2024-43108,0,0,d9bd8ea3b307dd054ae1953991304a1a331018261701e1f611f2a6906461a05c,2024-10-17T17:15:11.883000
CVE-2024-4311,1,1,5ce68034443eff5cfd91da7bf57e59e53b34bc4d88653b18949c94eb80ddbb7a,2024-11-14T18:15:19.473000
CVE-2024-4311,0,0,5ce68034443eff5cfd91da7bf57e59e53b34bc4d88653b18949c94eb80ddbb7a,2024-11-14T18:15:19.473000
CVE-2024-43110,0,0,1fe822a52c0b3af1ede7bdafa556f57158a1ace3adaf6fcd1e0c1b1f3c86485b,2024-09-05T21:22:04.810000
CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000
CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000
@ -261069,7 +261073,7 @@ CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300
CVE-2024-43427,0,0,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000
CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000
CVE-2024-43429,0,0,f5ddfa56b018dea7dd2df903532e997853780531d9960a7743dc3f510200d05d,2024-11-12T20:35:11.370000
CVE-2024-4343,1,1,78453087f3d920ad597fcd60d72d2a9fe6e1100dded9b6d75201b30e4e1918be,2024-11-14T18:15:19.687000
CVE-2024-4343,0,0,78453087f3d920ad597fcd60d72d2a9fe6e1100dded9b6d75201b30e4e1918be,2024-11-14T18:15:19.687000
CVE-2024-43430,0,0,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000
CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000
CVE-2024-43432,0,0,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000
@ -261134,7 +261138,7 @@ CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca
CVE-2024-43496,0,0,1e4f277010291ea8388e3463633269924e9ec7b9c2f947668d81da4d3ef80c37,2024-09-23T17:32:54.663000
CVE-2024-43497,0,0,2537458188d3ab9aa76faa081a4fee596da658de243be9f1924628f34744e854,2024-10-17T21:15:30.827000
CVE-2024-43498,0,0,9135372ac5e3977470b2eb332390d436ca9fee66059a03ec8790ad9f4a433a6f,2024-11-13T17:01:58.603000
CVE-2024-43499,0,0,29c69bd8859eab169ca545423a97a43fe6dcc5053603621028a68104e92b31d8,2024-11-13T17:01:58.603000
CVE-2024-43499,0,1,7ebb7afefec77c5ab7a1f808c37fa1fd165da864c1ddb6b9d2371398ad1a5f62,2024-11-14T19:15:06.850000
CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000
CVE-2024-43500,0,0,78bdbde8586a4aeadf73d960935866ca71ecb415ed1914c17c331c1e31d9dae2,2024-10-17T21:01:08.067000
CVE-2024-43501,0,0,3dab9521c0cc7c6361671a7526673e1c684c3d41e5a05cbd155304b95f78c3a9,2024-10-17T21:06:07.377000
@ -261232,7 +261236,7 @@ CVE-2024-43592,0,0,66ef8868710faf1076b1b13051f2c75eebafbfe5976017df5a4f00073c2c6
CVE-2024-43593,0,0,7e17c95f595bed9729f21273d821a92cb32423e919d0faf83c37ed5dcd8b802f,2024-10-22T19:30:19.870000
CVE-2024-43595,0,0,c9530dd7915099d4a86e6d6506504fdd984e781ac89cb128030fa646bffdb2c0,2024-10-18T16:55:06.487000
CVE-2024-43596,0,0,0f30448ecbbf09d34768a5a54fbdb251259ce851c310b81f9cbc1d14d274f939,2024-10-18T16:59:08.667000
CVE-2024-43598,0,0,0e63fcdf7edb1a83f6735bd611b91974391ef24a255435fccd558f8aabce089d,2024-11-13T17:01:58.603000
CVE-2024-43598,0,1,a49a8ba853043290255d579663f01b51dacc414c74b45702ab0d4dc178d7ed05,2024-11-14T20:15:23.070000
CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000
CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000
CVE-2024-43601,0,0,70d1af092a29e0256385b0b1eb94d28b1b04d755b5d71c8bb3ee4a255fe9335f,2024-11-08T22:15:20.270000
@ -261268,7 +261272,7 @@ CVE-2024-43633,0,0,a669df41e6b8e280ede36b7d990c4a947611e3b4651b20636421d64a3c939
CVE-2024-43634,0,0,be46605526ccfa35f1252c530a1d59f1a4721e4cfb23c5e6b43085ce81e02003,2024-11-13T17:01:58.603000
CVE-2024-43635,0,0,fd289d1f1b223eefb059527c3a8cd1b78f42a2ae2aa2f373013ec3b9ff5bcfc2,2024-11-13T17:01:58.603000
CVE-2024-43636,0,0,ab440c7e821dc3f32c12ecf3b6fac62c7c24dc48162ef5309530325198cb4d0a,2024-11-13T17:01:58.603000
CVE-2024-43637,0,0,5386336a31da59eab97bc0a9b3c5f078d402dbe829ca33cb96123663ed282562,2024-11-13T17:01:58.603000
CVE-2024-43637,0,1,737654f43dbf52f6320d615f45ceb3a2f2e1482d751022b3ef3fda23fc25c5ac,2024-11-14T20:15:23.993000
CVE-2024-43638,0,0,5d4563b9842099287f436a8e46a7e575b284f966e2c8b9bbb3f581433da01118,2024-11-13T17:01:58.603000
CVE-2024-43639,0,0,39dd6691d9e1e48649bade627c73acf7c371e16dce9774c261541277131745b3,2024-11-14T00:15:16.227000
CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000
@ -262308,13 +262312,13 @@ CVE-2024-45273,0,0,c68c26959493b8bdb5a6e0f8fb0c0f3ccd854da00b6c3d41e3b43310e52bc
CVE-2024-45274,0,0,962df114e3e3c66d9d19f1ca544b8230483172f76eaafa5fd0b600c57eee6936,2024-10-17T17:40:10.690000
CVE-2024-45275,0,0,40f0f90c7dfe9cf789ccd1df5334cd05deab445b0b9828925252ef5f0bc7f642,2024-10-17T17:39:52.713000
CVE-2024-45276,0,0,0d59a7b0ab1984e9b1bbe3d7b7d14f5af3d9a52d661be0bb698b4cd9771bbeac,2024-10-17T17:39:07.160000
CVE-2024-45277,0,1,70442b40b0caf8411977da5cfcb16c20b5a6ff14fa4b9cd980ee1e0c0a870945,2024-11-14T17:54:28.373000
CVE-2024-45278,0,1,fe89b5eda7ebfb13c28d9a27daad1a9da9ad863fd06c770aa1cadb8552e812a3,2024-11-14T17:17:12.640000
CVE-2024-45277,0,0,70442b40b0caf8411977da5cfcb16c20b5a6ff14fa4b9cd980ee1e0c0a870945,2024-11-14T17:54:28.373000
CVE-2024-45278,0,0,fe89b5eda7ebfb13c28d9a27daad1a9da9ad863fd06c770aa1cadb8552e812a3,2024-11-14T17:17:12.640000
CVE-2024-45279,0,0,d1e01ad73c7c0fcb7dd9f385faab2f84a1522d644234e290f3ff403f5eb9a4d9,2024-09-10T12:09:50.377000
CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000
CVE-2024-45280,0,0,95185fad87ef89782ef20303875d1e67479f6c5b9be0dfe150b0d387302d1c9d,2024-09-10T12:09:50.377000
CVE-2024-45281,0,0,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91409,2024-09-10T12:09:50.377000
CVE-2024-45282,0,1,179c784b205c6724246efb20f0c57ea3738c9dd91a7daa64b041b332a3137a9a,2024-11-14T17:56:17.007000
CVE-2024-45282,0,0,179c784b205c6724246efb20f0c57ea3738c9dd91a7daa64b041b332a3137a9a,2024-11-14T17:56:17.007000
CVE-2024-45283,0,0,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000
CVE-2024-45284,0,0,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000
CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000
@ -262342,7 +262346,7 @@ CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a
CVE-2024-45306,0,0,492d01bc755bef5620391aaeab10cbcbbc187e7fb0b5fdfef32f617ff36771b7,2024-10-01T15:20:29.533000
CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000
CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000
CVE-2024-45309,0,0,ccef45c69697c06d2e18f0c2778de8d0d49f29cfcf182bfdc484e40f1c83f2df,2024-10-21T17:09:45.417000
CVE-2024-45309,0,1,f4049ebd525ebf7d9a070b0f28b330263ba82d3d3b5513f7651199ce08f029a9,2024-11-14T19:39:31.233000
CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000
CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac208e0,2024-09-03T19:40:46.783000
CVE-2024-45311,0,0,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2befc3,2024-09-25T17:03:36.817000
@ -262352,7 +262356,7 @@ CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ece
CVE-2024-45315,0,0,a47f8116c282f3f6ec68b3e4e22ecd3455e5be0b6298182198301e89c068e15d,2024-11-01T16:35:26.853000
CVE-2024-45316,0,0,4ecfd9e7fa59bfdd4734e2d4185781d6d4be914b03dfd0489df8aa5f6a42264d,2024-10-15T12:58:51.050000
CVE-2024-45317,0,0,cf582da0518aca65335a8c43cb4d83f1a02fd5797437525cbc0cf86d6da8db4d,2024-10-15T12:58:51.050000
CVE-2024-4532,0,1,535c0d4d9a82c0b19c9079d44a1e72c9e08eaddfd4b3d6cfcc361e767dca3488,2024-11-14T17:35:07.383000
CVE-2024-4532,0,0,535c0d4d9a82c0b19c9079d44a1e72c9e08eaddfd4b3d6cfcc361e767dca3488,2024-11-14T17:35:07.383000
CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f75b,2024-09-20T16:23:51.397000
CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000
@ -262921,7 +262925,7 @@ CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a37367
CVE-2024-46628,0,0,75b1cdb8791d268c28a8d1c2eb3eabb85cf8645763bd77b2b5fbf5588170833f,2024-10-04T17:18:31.663000
CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000
CVE-2024-46632,0,0,abc659def740354695cf2f3df5ac488f8137388dc197ea59e5551153368ce0a9,2024-09-30T12:46:20.237000
CVE-2024-46635,0,0,2a4403bf13895f55d2b7c4f0f33ade98643e62272f578a54a0ec9f112b8f9ef5,2024-10-04T13:51:25.567000
CVE-2024-46635,0,1,f734baba30d1fc1fbf7b88c7d8f0d678888adf80d108ab1f608ca9628303be55,2024-11-14T20:35:33.310000
CVE-2024-46639,0,0,32a1c80f017ce1b9b0a593e635fc1fe3b0612fc660594feed34360cf471ca787,2024-09-26T13:32:55.343000
CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000
CVE-2024-46640,0,0,8a8901a45f157bc967024a42c670214bc1166786f3fd7086e031ee10a8d6de95,2024-09-26T13:32:55.343000
@ -263194,7 +263198,7 @@ CVE-2024-46952,0,0,3444b82bcb136a59628b03fd05ed82e98f664dba01fba9072fb9ccd140595
CVE-2024-46953,0,0,1ac66484fd2bfafcc0c3fa8efd1c5670384cc15b372b551dc478a0e32265c98e,2024-11-14T02:01:09.580000
CVE-2024-46954,0,0,1c51b2cf98df98462cd0f63d13a6cbbce248971ad1254684ccfcb961f73b913d,2024-11-14T01:58:47.833000
CVE-2024-46955,0,0,6859a74370b7a98e23915805df3d1c3994da708d9324c0071b81c91c225b8a4b,2024-11-14T01:53:21.587000
CVE-2024-46956,0,0,d97941c29272a8785e7eed871c50021e8c7af6d31794d5ac1c57d8bc8cd6c620,2024-11-12T20:35:13.723000
CVE-2024-46956,0,1,a3c6f157d772da02193157b28e147261098f90814e5cc49bec25afe198e21c86,2024-11-14T20:39:54.757000
CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000
CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000
CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000
@ -263443,7 +263447,7 @@ CVE-2024-47328,0,0,983ca76f75739c6c5a714cbed6751627aac116c793e329729ee2a34061631
CVE-2024-47329,0,0,8f9cf4ad2ce9c10f9ea9bbbdd9112304e1d41b0ef8826075f80f55633e097d19,2024-10-07T17:47:48.410000
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000
CVE-2024-47331,0,0,407e750d1989e683e236deff0838b4e791295832cd6aebe80372c3e2e15da3dd,2024-10-15T12:57:46.880000
CVE-2024-47331,0,1,676bf46bf803674feaabbe5776a2c5d7eff974f9c187b6ee25e37aee829df1b9,2024-11-14T19:22:49.760000
CVE-2024-47332,0,0,ac5ed213fd921095ee0b8be4048aa454f8ac7fdcdf6a18756d3c0921bb781874,2024-10-07T17:47:48.410000
CVE-2024-47333,0,0,512f6769e7250dfb91a8929703f1237d3beaa36f2d8957fee001943383c80c30,2024-10-07T17:47:48.410000
CVE-2024-47334,0,0,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000
@ -263555,12 +263559,12 @@ CVE-2024-47438,0,0,7e0b5e24785d49f8831b8f977c55089778dcfecdc1d3ed1a3ff3706e1db01
CVE-2024-47439,0,0,fd699d4af34618547dfc4fa9b3af7acc44300fb88cea698c573b3bfaf3e742d3,2024-11-13T19:11:48.890000
CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000
CVE-2024-47440,0,0,43d98456eee459100aa755cd72e412c04aa2168e096adac55805f69f958d3dd5,2024-11-13T18:52:57.013000
CVE-2024-47441,0,0,c2eb49fb0d727d7b0f3883aa37b6b97377094ad2c1a4f03a303d46be9710a9bc,2024-11-13T17:01:16.850000
CVE-2024-47442,0,0,7c4534e89702d523b6e3d7f73c6e5c526c57723d6c4585c0750bce11fac482ce,2024-11-13T17:01:16.850000
CVE-2024-47443,0,0,c7ebbaf071cf97fd15363efb3c4bd4e1dc07d445eda0326b1fed701bb4576e20,2024-11-13T17:01:16.850000
CVE-2024-47444,0,0,3c50a4520e405f3f41f0090609f649e84bb504d4a6472763c67225f747ab18fe,2024-11-13T17:01:16.850000
CVE-2024-47445,0,0,ca1dd8bb79ee4af2eeebbf79d117955d6fc93c61063dc6d9daefeb8e2749c043,2024-11-13T17:01:16.850000
CVE-2024-47446,0,0,c032a93b3fb4c35b6697f3f50bccffa735973c8ecd23346bcfedb7e37c027b69,2024-11-13T17:01:16.850000
CVE-2024-47441,0,1,1479ac749c9e743ace56bfafc7ab2566abf6710acac75e8f6acd2688a27c74f2,2024-11-14T19:09:41.703000
CVE-2024-47442,0,1,3bf9fecf715a9e5e18b142731c234fd078a48b474bc36eb7d0491ffd17de8488,2024-11-14T19:09:51.347000
CVE-2024-47443,0,1,1dcf0c600868d36fda16962d2760894b883a8628a4b98fff5983e4de2f83eec3,2024-11-14T19:10:01.277000
CVE-2024-47444,0,1,d3fe594dc453d55be943e3202bb696525b4a84d77f2b027234360c5d0f1b27ac,2024-11-14T19:10:29.537000
CVE-2024-47445,0,1,a9dbc6a36d1d30896e9174b86f7f3ee615b146047aaa4385a9a8b4c9c79ad152,2024-11-14T19:10:34.587000
CVE-2024-47446,0,1,9f7569ca580ae92afb8852804ee0ea4974f50d040fd6bc83cd87bd8b77a128cf,2024-11-14T19:10:24.197000
CVE-2024-47449,0,0,41f61b13e3dd2f4f5b46d75ab8d7ff84aae16e2e4e96b480eec29b17a142cd2c,2024-11-14T14:32:55.163000
CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000
CVE-2024-47450,0,0,e59fcc3accbe89009d4278a792d4807261153ec8178fc8038a63474d199284a3,2024-11-14T14:26:45.873000
@ -263831,8 +263835,8 @@ CVE-2024-47773,0,0,9ec3c242835bf576bc0968a82a3b46699041f8e41d118ea66f5704cf28b5d
CVE-2024-47779,0,0,5f35e8aa4452b188a7ed79805178dc2710160d52596e1c24b8778a31542e007a,2024-11-12T17:15:08.037000
CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000
CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000
CVE-2024-47781,0,1,67394dbff8e4cb67bdf642414e74d835a5dc27aa9e6bfae1cb41a5373a1332b6,2024-11-14T18:19:28.180000
CVE-2024-47782,0,1,2d6d06702f768b667755e8c5de7c65592170674b77fb80b577cfc56101b86527,2024-11-14T18:19:34.127000
CVE-2024-47781,0,0,67394dbff8e4cb67bdf642414e74d835a5dc27aa9e6bfae1cb41a5373a1332b6,2024-11-14T18:19:28.180000
CVE-2024-47782,0,0,2d6d06702f768b667755e8c5de7c65592170674b77fb80b577cfc56101b86527,2024-11-14T18:19:34.127000
CVE-2024-47783,0,0,5a9cc3d76940a89383ed74c67262d35c051dcce0550c21e752e3852ace3e6422,2024-11-13T23:13:25.367000
CVE-2024-47789,0,0,5cca8aa9572eb6cd0c059882137f083cb8544427e147bc3f1f0eab6346cef001,2024-10-14T11:15:11.797000
CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000
@ -264095,7 +264099,7 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737
CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
CVE-2024-48284,1,1,998374701c5526c5658e1716377a4ae0da740a94202fbf58911b61696d69c3d0,2024-11-14T18:15:19.150000
CVE-2024-48284,0,0,998374701c5526c5658e1716377a4ae0da740a94202fbf58911b61696d69c3d0,2024-11-14T18:15:19.150000
CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
CVE-2024-48290,0,0,470dc7a365392aceea819604e300f16b964336068e4f6e607d709f5104e50d51,2024-11-08T19:01:03.880000
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
@ -264372,6 +264376,7 @@ CVE-2024-49019,0,0,e08679fc365479f57d65d68203459387c13c3c1dd4e5679713ba188e89b8c
CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000
CVE-2024-49021,0,0,aa53deff3838efd1c66c363e2988f51dc92f0fe1f44fbadc27229d2d752a53d8,2024-11-13T17:01:58.603000
CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000
CVE-2024-49025,1,1,5b36b6511687656a4af0ef8b89408d3be008a49fa6cb3accb0de807c63dd75e7,2024-11-14T20:15:25.207000
CVE-2024-49026,0,0,389b45fb365606f0dc850137e89a99d79b49e7936c4d322daa7512c8f2a443d1,2024-11-13T17:01:58.603000
CVE-2024-49027,0,0,756a52ba86626ae0feaa38ac7b9ca7560a1f0424ed8969e0ec266d976b69f598,2024-11-13T17:01:58.603000
CVE-2024-49028,0,0,15af4a2817e602a0be5b827f4b62639c5042e250c1d16e5ecaf5290fdb0946fa,2024-11-13T17:01:58.603000
@ -264550,7 +264555,7 @@ CVE-2024-49358,0,0,df99e254916c8dff27bc118ecfd140161a54ef4581a6841d720c531a5bf44
CVE-2024-49359,0,0,cc09522176dca55ed443e811571748ebfc3f0f5a4f89d4ec44c17a0a8a645881,2024-11-06T15:27:02.347000
CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000
CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e281007d,2024-10-21T17:10:22.857000
CVE-2024-49362,1,1,2f51dbc5deeb1d293fdeae27596ba8a6e3ed43c3ac3a33b254ac8bbf6cdae95d,2024-11-14T18:15:19.243000
CVE-2024-49362,0,0,2f51dbc5deeb1d293fdeae27596ba8a6e3ed43c3ac3a33b254ac8bbf6cdae95d,2024-11-14T18:15:19.243000
CVE-2024-49366,0,0,1ea5441e3f8684e26cb3e2ee03927aa37cfc22f8ddf1688cacc08e4a6c38e9c1,2024-11-07T15:15:04.587000
CVE-2024-49367,0,0,a00a7c814532ad3abb0f836142856607dc752da167ff2cb313965be7a6e5269e,2024-11-07T14:57:17.393000
CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000
@ -264632,9 +264637,9 @@ CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
CVE-2024-49560,0,0,ab312f3dd70e163a5c72b63be519379ba38d0c543c55c0ea8821e33d6ab68e6b,2024-11-12T13:55:21.227000
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
CVE-2024-49579,0,0,4674118b21cb39ebeef2b4743f0ed75dcd0002fe01b9b902589f8dc4995b5f10,2024-10-18T12:52:33.507000
CVE-2024-49579,0,1,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
CVE-2024-49580,0,0,58d42ce80f49f44500183a1a00e208025f481699c4f078e6c8ff15ecab46fe22,2024-10-18T12:52:33.507000
CVE-2024-49580,0,1,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000
CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000
CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000
@ -265188,25 +265193,25 @@ CVE-2024-50245,0,0,05e7417907eec0d344f4f019d335736318867717f881e8b6a4faef9e6a31b
CVE-2024-50246,0,0,f7f6c7b2429f844498e426c684268b0f866fe299897d6dcd99d5e8fa1575b677,2024-11-13T17:38:55.453000
CVE-2024-50247,0,0,e7f3fceab887e2a4963b8083073c4b9aab1b11dcc27847eb5f1a16595fd7cb7e,2024-11-13T17:58:15.133000
CVE-2024-50248,0,0,958d8f945e6b139afb0971827ad795d8101513c47ac50a5a04f769eaadab1f70,2024-11-13T18:07:09.280000
CVE-2024-50249,0,1,e054f0001c224e334050e2eac6d88617343fb9e96d0dbd3cea9aeaed099db70d,2024-11-14T17:01:11.577000
CVE-2024-50249,0,0,e054f0001c224e334050e2eac6d88617343fb9e96d0dbd3cea9aeaed099db70d,2024-11-14T17:01:11.577000
CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000
CVE-2024-50250,0,1,56e8946cae382f823bea55d7d896bec578a306a8ecc523ac3517b83bef5b40c7,2024-11-14T17:04:14.043000
CVE-2024-50251,0,1,eb13cee896d3e0464c0f35df79d5111082643df2ca7ac2c253f660163c4e84ff,2024-11-14T17:31:21.280000
CVE-2024-50252,0,1,b6aa9baadd8479fe935a11ad7442892bb3cf3be13323c7e0015aa59daced0bac,2024-11-14T18:08:17.857000
CVE-2024-50253,0,1,8e910b5803a76805af440ed69cb6144822b325028bc59ee13ce13ddde4ce61cb,2024-11-14T18:09:15.067000
CVE-2024-50254,0,1,a9e1d5266d05392c3a6db80684bc007031fdbdda133ec3d98105936eb5be979f,2024-11-14T18:09:48.530000
CVE-2024-50255,0,1,c3d114b8ae1780085283e691737577774255f0ed6dc6a7631650a080100cf9c5,2024-11-14T18:10:12.383000
CVE-2024-50256,0,1,8d034d6960ffbf3be2443b4e8e64ac1dde33a73fcf61078ccf231ff7ccf539e8,2024-11-14T18:11:08.250000
CVE-2024-50257,0,1,00539950bc43acb220118006c9aa4d0dae21649054459f273535c3ee15f7812a,2024-11-14T18:11:39.990000
CVE-2024-50258,0,1,13d9deae4c3b1e76a26be622c9f1c043e18cde848c01bde395e4f7b0dd49cd29,2024-11-14T18:12:39.487000
CVE-2024-50259,0,1,78be2432b0c867394be3a84dac27fe7ca07a42a30f4cfd5b2db30a57c3eb3db6,2024-11-14T18:24:11.470000
CVE-2024-50250,0,0,56e8946cae382f823bea55d7d896bec578a306a8ecc523ac3517b83bef5b40c7,2024-11-14T17:04:14.043000
CVE-2024-50251,0,0,eb13cee896d3e0464c0f35df79d5111082643df2ca7ac2c253f660163c4e84ff,2024-11-14T17:31:21.280000
CVE-2024-50252,0,0,b6aa9baadd8479fe935a11ad7442892bb3cf3be13323c7e0015aa59daced0bac,2024-11-14T18:08:17.857000
CVE-2024-50253,0,0,8e910b5803a76805af440ed69cb6144822b325028bc59ee13ce13ddde4ce61cb,2024-11-14T18:09:15.067000
CVE-2024-50254,0,0,a9e1d5266d05392c3a6db80684bc007031fdbdda133ec3d98105936eb5be979f,2024-11-14T18:09:48.530000
CVE-2024-50255,0,0,c3d114b8ae1780085283e691737577774255f0ed6dc6a7631650a080100cf9c5,2024-11-14T18:10:12.383000
CVE-2024-50256,0,0,8d034d6960ffbf3be2443b4e8e64ac1dde33a73fcf61078ccf231ff7ccf539e8,2024-11-14T18:11:08.250000
CVE-2024-50257,0,0,00539950bc43acb220118006c9aa4d0dae21649054459f273535c3ee15f7812a,2024-11-14T18:11:39.990000
CVE-2024-50258,0,0,13d9deae4c3b1e76a26be622c9f1c043e18cde848c01bde395e4f7b0dd49cd29,2024-11-14T18:12:39.487000
CVE-2024-50259,0,0,78be2432b0c867394be3a84dac27fe7ca07a42a30f4cfd5b2db30a57c3eb3db6,2024-11-14T18:24:11.470000
CVE-2024-50260,0,0,05a63ba87ad199ac12bf4ea248cb7aed5d0afcea08fb2e43e5b32d282eebbf3f,2024-11-13T18:47:43.830000
CVE-2024-50261,0,1,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc69d,2024-11-14T18:24:41.597000
CVE-2024-50261,0,0,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc69d,2024-11-14T18:24:41.597000
CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000
CVE-2024-50263,0,0,031640c798eb6a3a8aeb817df2908ddb318a337ddb803a116f07c15a4af2eba6,2024-11-14T16:23:08.347000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-50305,0,0,32cba8395bb8f36501f7e711a4f56600fb80cd2e3ef145d3ce8fad1597b52437,2024-11-14T10:15:08.013000
CVE-2024-50306,0,1,cc5580a479aa56497866a68f93d6dda4574cf88b0c33aa007c3b6c36cae3f549,2024-11-14T18:35:03.743000
CVE-2024-50305,0,1,0ac0ed2449a977be00632b91304d1c4dd569cf943961c8a7c2303ec2dddef88b,2024-11-14T19:35:16.650000
CVE-2024-50306,0,0,cc5580a479aa56497866a68f93d6dda4574cf88b0c33aa007c3b6c36cae3f549,2024-11-14T18:35:03.743000
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000
@ -265425,7 +265430,7 @@ CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb7601
CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
CVE-2024-50634,0,0,b51bed2cbdafb47e43997329f84c20416d967781120359bc1bc6075ffd759ad7,2024-11-13T15:35:12.950000
CVE-2024-50634,0,1,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2002,2024-11-14T20:40:43.690000
CVE-2024-50636,0,0,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000
CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
@ -265452,29 +265457,29 @@ CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf1
CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000
CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000
CVE-2024-5082,0,0,cb3e951bda46c1109919ca7a678dadb9606afdd347c29db218b2212393edae45,2024-11-14T16:35:15.960000
CVE-2024-50823,1,1,2e3eed0e10706d12ac6edf3de28d8ea62fff93b7c877208ab10072a1a4fd7baf,2024-11-14T18:15:19.940000
CVE-2024-50824,1,1,d00b846930484fbbce7bdb09824dfe70ffba685c849b72b2ba7d1c10c81206af,2024-11-14T18:15:20.107000
CVE-2024-50825,1,1,b19038dc42214d1be237b151cc9fb5c6dc663beb62f52e2ec0213e7446b5bd16,2024-11-14T18:15:20.230000
CVE-2024-50826,1,1,f0c8ef389fccef7f33cb99e2a4bf4a4bc876d1132cc52311f62e5fbfc012d126,2024-11-14T18:15:20.350000
CVE-2024-50827,1,1,f168cef41cd7a54e803709d8bd886da57e0948d39d51d6345834de7710b580e0,2024-11-14T18:15:20.457000
CVE-2024-50828,1,1,9f15c177b20d85daadeb6ffb06e3a27ac4e87ccbfbcfa7c9a30f6f82cb84750d,2024-11-14T18:15:20.580000
CVE-2024-50829,1,1,e6266c33d16b684e110a9959e9e7eb33a7d04f9cb637340c5ee5aa729167b57c,2024-11-14T18:15:20.853000
CVE-2024-50823,0,0,2e3eed0e10706d12ac6edf3de28d8ea62fff93b7c877208ab10072a1a4fd7baf,2024-11-14T18:15:19.940000
CVE-2024-50824,0,0,d00b846930484fbbce7bdb09824dfe70ffba685c849b72b2ba7d1c10c81206af,2024-11-14T18:15:20.107000
CVE-2024-50825,0,0,b19038dc42214d1be237b151cc9fb5c6dc663beb62f52e2ec0213e7446b5bd16,2024-11-14T18:15:20.230000
CVE-2024-50826,0,0,f0c8ef389fccef7f33cb99e2a4bf4a4bc876d1132cc52311f62e5fbfc012d126,2024-11-14T18:15:20.350000
CVE-2024-50827,0,0,f168cef41cd7a54e803709d8bd886da57e0948d39d51d6345834de7710b580e0,2024-11-14T18:15:20.457000
CVE-2024-50828,0,0,9f15c177b20d85daadeb6ffb06e3a27ac4e87ccbfbcfa7c9a30f6f82cb84750d,2024-11-14T18:15:20.580000
CVE-2024-50829,0,0,e6266c33d16b684e110a9959e9e7eb33a7d04f9cb637340c5ee5aa729167b57c,2024-11-14T18:15:20.853000
CVE-2024-5083,0,0,354c3da34b8f763f544f0a11d2fd1368a94de7e7d66991c980b19b9a84dcb883,2024-11-14T16:35:16.267000
CVE-2024-50830,1,1,46d5dee8148ab451f9fe20968670525ca2af0642e62c9e7f268d471c0a9975d0,2024-11-14T18:15:21.063000
CVE-2024-50831,1,1,02adc50bcffb5b7bf893716b08bac8248c08364658e04ba0ed22181dc2aa4c7f,2024-11-14T18:15:21.180000
CVE-2024-50832,1,1,aedec215e4fff8b086e324bb81716bdb261a8d4579e06c7127153d9e74c69cb4,2024-11-14T17:15:06.823000
CVE-2024-50833,1,1,8a96d04960a2653f66a832963d35c2f3eafedd781373d43d2535c42d531f1769,2024-11-14T17:15:06.917000
CVE-2024-50834,1,1,ff4e100f60622e5d9ce338fcf7ab94d399525bdbd301fed837c9edc8d99c4f5a,2024-11-14T17:15:07.003000
CVE-2024-50835,1,1,4c49f45501187673346fd1cc366755759fd782ee43c85d8161bb20ac39b258a6,2024-11-14T17:15:07.090000
CVE-2024-50836,1,1,e4170c7bde5a8712bd1a169ba3cd2bdeba23ba63ce58eac087ccd35178aa8e33,2024-11-14T17:15:07.177000
CVE-2024-50837,0,1,e4ba8b8751142a0f25b581bd09a92b410f6585bb26a1cf76aae00c46a3330531,2024-11-14T17:15:07.257000
CVE-2024-50838,0,1,d15836167d7b8a1380bd2014f0abd80f97020569f7d91b7323ded85f533008e7,2024-11-14T17:15:07.333000
CVE-2024-50839,0,1,937c698e4b5f77b7b7b4a1512c9db99e8b27d86711a987aa8372bbe5d72c31c1,2024-11-14T17:15:07.410000
CVE-2024-50830,0,0,46d5dee8148ab451f9fe20968670525ca2af0642e62c9e7f268d471c0a9975d0,2024-11-14T18:15:21.063000
CVE-2024-50831,0,0,02adc50bcffb5b7bf893716b08bac8248c08364658e04ba0ed22181dc2aa4c7f,2024-11-14T18:15:21.180000
CVE-2024-50832,0,0,aedec215e4fff8b086e324bb81716bdb261a8d4579e06c7127153d9e74c69cb4,2024-11-14T17:15:06.823000
CVE-2024-50833,0,0,8a96d04960a2653f66a832963d35c2f3eafedd781373d43d2535c42d531f1769,2024-11-14T17:15:06.917000
CVE-2024-50834,0,0,ff4e100f60622e5d9ce338fcf7ab94d399525bdbd301fed837c9edc8d99c4f5a,2024-11-14T17:15:07.003000
CVE-2024-50835,0,0,4c49f45501187673346fd1cc366755759fd782ee43c85d8161bb20ac39b258a6,2024-11-14T17:15:07.090000
CVE-2024-50836,0,0,e4170c7bde5a8712bd1a169ba3cd2bdeba23ba63ce58eac087ccd35178aa8e33,2024-11-14T17:15:07.177000
CVE-2024-50837,0,1,96fcb499d8472366d78a24893fbbac02e051d7a3c4b83012b851978cab4924d9,2024-11-14T19:35:17.623000
CVE-2024-50838,0,1,d3c85db11c13d4fba199f7e6340f60a6c715055c9315a5219004d92d9ce4c5df,2024-11-14T19:35:18.427000
CVE-2024-50839,0,1,01640e157e2a49f4f650966b70746ee61106bde203a589e9de4ac4be36608fd9,2024-11-14T19:35:19.240000
CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000
CVE-2024-50840,0,1,83a104e99e093c886f72c2e3a3e97e1ae67cf48c97368a6ff247b3296efc5b07,2024-11-14T17:15:07.473000
CVE-2024-50841,0,1,5ce179f23a19f7e3fb48567c13e92444515f82552ae73fa5d0443dd8bdb9fc51,2024-11-14T17:15:07.543000
CVE-2024-50842,0,1,bc47c508e41a48b5e541c242afefc4eedc2a8e61d8b6382f5c46f44d63437d1d,2024-11-14T17:15:07.613000
CVE-2024-50843,0,0,2e5763784084abfb6b2aa938fe6a9d65acf0f9a9701fbcbc297a0a7fb9b2cb2a,2024-11-14T14:15:19.050000
CVE-2024-50840,0,1,8955f492100255068b940e7935b918e5bbcb11994bf34f2daf1b5882bc9a7544,2024-11-14T19:35:20.033000
CVE-2024-50841,0,1,ee2c60c11c28af1ad6f5941091e02458a0eeda596a52828fe6a1eeb35f455204,2024-11-14T19:35:20.837000
CVE-2024-50842,0,1,5121c7171f1e61aaa48992446e276abddf9e8bc92a9c1fc4eb5a094a20f99e76,2024-11-14T19:35:21.650000
CVE-2024-50843,0,1,7c516cdb53e3e589740dd68d67e686b2cd7aad02d1967da6279de76f51b446c0,2024-11-14T19:35:22.450000
CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000
CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000
CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000
@ -265603,7 +265608,7 @@ CVE-2024-51246,0,0,aa194fa853a376377fe6819071cfa2916e0d00edaefe6d104071b5230b5ba
CVE-2024-51247,0,0,6f763214fc728651cee8f49e7f9d3466af02b1a87bcb320803295d2391bcc8af,2024-11-05T19:28:25.143000
CVE-2024-51248,0,0,24dce655c534c26b0b67ea327bc58bc6e5d7937e725965feb96bf75ba11def28,2024-11-05T19:28:29.730000
CVE-2024-51249,0,0,23dd85f23924e75ce199438298671d7b20ece05b7ee21f636e4f3929eb3f65e7,2024-11-04T18:50:05.607000
CVE-2024-5125,1,1,9510d0b0017e51aeff47cd796d174da78a6aa3383162558c0d995d4ae8f4e9f7,2024-11-14T18:15:26.760000
CVE-2024-5125,0,0,9510d0b0017e51aeff47cd796d174da78a6aa3383162558c0d995d4ae8f4e9f7,2024-11-14T18:15:26.760000
CVE-2024-51251,0,0,63152562fe66f261ed3205b0767b9a859ea9c0ff927b599c5c96705e6967a8f8,2024-11-04T18:50:05.607000
CVE-2024-51252,0,0,bf357f6855609c81237cb444d332859dc7316dc50aaeed6006dd85a3ea82ebf7,2024-11-05T20:54:38.960000
CVE-2024-51253,0,0,bd6b7c4e24728199770eb9a14af1e277c7168d7d6f853e011077c74df42885e3,2024-11-04T18:50:05.607000
@ -265671,14 +265676,14 @@ CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb
CVE-2024-51481,0,0,79865ece5695e59d21a71c5242cb6b84c6582b835d3ed06315b12ef5cbe5ff4e,2024-11-01T12:57:03.417000
CVE-2024-51482,0,0,bfd63cd113518065a1bebad51613f86054f6e228acaf54013add2bd0a434c523,2024-11-05T14:15:14.840000
CVE-2024-51483,0,0,f70c42f235544d305181618bf39f85a2958b60e254bcd1640771f1e1cba85c88,2024-11-01T20:24:53.730000
CVE-2024-51484,0,0,702c9eef66989d49f443105697529c0366c78728d1841138606db38ce216d817,2024-11-12T13:55:21.227000
CVE-2024-51485,0,0,31fff43947b857d031a4fdbb88a07c40af7e2b11b292e3abc7f2012e09de9d36,2024-11-12T13:55:21.227000
CVE-2024-51486,0,0,cfb832dac4d0cbf401700dcb55c0c7132e9df371a60e5f7ffc5aa427e996f6c8,2024-11-12T13:55:21.227000
CVE-2024-51487,0,0,9d095d095278ad4a0dff54fce8de4e672ea8d9b24e1c51cb430743545d0db5d0,2024-11-12T13:55:21.227000
CVE-2024-51488,0,0,ddbc9992d74d320bfbf1c9bd238e20d40adcec2b3d076a6778151cca6b5c7323,2024-11-12T13:55:21.227000
CVE-2024-51489,0,0,efa91bf89407165e94622b83e98374536f35ce2357c1330a17e23418c17b6aac,2024-11-14T15:46:50.553000
CVE-2024-51484,0,1,5ad773dfa5945e967ed814ecd83f8950f4a4be9ded42c813ce8f58f67f3e839a,2024-11-14T20:14:44.360000
CVE-2024-51485,0,1,048497f9e62d1928c48f09ad1aa496e653c26dc6a3d76047826a152202d1f209,2024-11-14T20:06:12.627000
CVE-2024-51486,0,1,fbc0430671200f5bea2fd75bf3c998ad971ed972c97a19a8cafbccb43ea185a9,2024-11-14T19:55:34.890000
CVE-2024-51487,0,1,a83a631e81d66653d31978f19924867892c25aaddc9eac90a67354f92618e935,2024-11-14T19:37:53.107000
CVE-2024-51488,0,1,a48a7601698a74a180f128f3050edf74445080860fde1b7f806d8ef650e632d0,2024-11-14T20:12:58.443000
CVE-2024-51489,0,1,e5ad0022488018990486a414e781379ff86a44ab1670849d0fdca11bd887fc39,2024-11-14T20:12:52.027000
CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000
CVE-2024-51490,0,0,d4714e4f1de2d271a9b1753a60e073ec7ec6d263502b222cf774a3e40303ce12,2024-11-14T15:30:15.643000
CVE-2024-51490,0,1,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000
CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000
CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000
CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000
@ -265750,18 +265755,18 @@ CVE-2024-51583,0,0,010a1e766cc75cf146f9c46f237fd66f102136959cced374ac920d84a09d7
CVE-2024-51584,0,0,9c4a52f0d53ee42578cceb9af71c252fa973eb5d3948982134b3891bd8f24f09,2024-11-14T02:23:33.777000
CVE-2024-51585,0,0,f8f0159c16016c8277cf65597d8f99b43d67be3e4576e769b2c2d94060d5ff5c,2024-11-12T13:56:24.513000
CVE-2024-51586,0,0,a8972424c5984945ec92c9d745b8e4e19d8648e53cf9bf4412423a5729e18a26,2024-11-12T13:56:24.513000
CVE-2024-51587,0,0,e9f51090d9fa9675336bc7bbe1c57c65ee721fe84e77e75530bdeca2bbd3390e,2024-11-12T13:56:24.513000
CVE-2024-51588,0,0,86887bb25af63d8afae760e3bff597b6e65d20856876b111e550c616afd70db1,2024-11-12T13:56:24.513000
CVE-2024-51589,0,0,4352c7b10d513c73c468cf162405842f1aca94517899c3343788aa1230c49906,2024-11-12T13:56:24.513000
CVE-2024-51587,0,1,5012d2ea8e67b5c3d09827ef519aa6163b1c4ce17e7784b8af6d96ad392aa639,2024-11-14T20:26:14.467000
CVE-2024-51588,0,1,70526e1ab4d1d5c15696a10cecb0303b3b1171b870de0da3e9c134310aec09dc,2024-11-14T20:26:28.047000
CVE-2024-51589,0,1,f74ef05c06e608fec4a8cb8e6637837c5709985a6e45866d77121ef9596fd10a,2024-11-14T20:26:41.497000
CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000
CVE-2024-51590,0,0,2b2dd3629e58a1a0a584c789ff16e47b54d755aa79cd57fc09a49fbe103244b5,2024-11-12T13:56:24.513000
CVE-2024-51591,0,1,726468de391ad91b93d7baa9a968a1009926515da7cdc024a9ffcb433fe899c7,2024-11-14T17:51:14.717000
CVE-2024-51591,0,0,726468de391ad91b93d7baa9a968a1009926515da7cdc024a9ffcb433fe899c7,2024-11-14T17:51:14.717000
CVE-2024-51592,0,0,d7967d1b981bf412d08b0a25269c7d321b022b9cea0f3a4b67df42b6afa94a25,2024-11-12T13:56:24.513000
CVE-2024-51593,0,0,0b8922825fb0b901603d2f67d3b43c5b8e0349818c9523e9ebd1542dcf2e04bf,2024-11-12T13:56:24.513000
CVE-2024-51594,0,0,6349168b6c38502c80c5202765ac4a54912ffa4126b37a3166a4be8b98199c58,2024-11-12T13:56:24.513000
CVE-2024-51595,0,0,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88d12,2024-11-12T13:56:24.513000
CVE-2024-51596,0,0,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000
CVE-2024-51597,0,0,506ea8c3ccd37fd10cf92a9da4f6b30af469b7e869d78e2a86278b8ad4eb302c,2024-11-12T13:56:24.513000
CVE-2024-51597,0,1,e580da6df611238773fd113640aa155cd0ddae703c31494078adb66dd981bd48,2024-11-14T20:27:46.943000
CVE-2024-51598,0,0,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000
CVE-2024-51599,0,0,5cd988e2787a53cdc2d1a464fab74b9367513165a89a10c905f4537cb27134dd,2024-11-12T13:56:24.513000
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
@ -265770,10 +265775,10 @@ CVE-2024-51602,0,0,822f9c86566535e8535c86995cf3af8d3cfe52baf5520ff85e767e1c3e725
CVE-2024-51603,0,0,8b39030ffd0cb3459341d14dd644b429e38d44c25946f2093686635047f23972,2024-11-12T13:56:24.513000
CVE-2024-51604,0,0,d6aae3a059c834fc01b3c5ecd18a671e61f67a1403ae9009e32e762b5707c5b2,2024-11-12T13:56:24.513000
CVE-2024-51605,0,0,3181370e86e19cb15e2ba0b512a12ea9b3036b112f432239f6f810bbb742dc02,2024-11-12T13:56:24.513000
CVE-2024-51606,0,1,ee1e7a1b1dbbb608910d3a1a8045750337c3795b4002cbbe921c849cc6ea0c49,2024-11-14T17:17:28.997000
CVE-2024-51606,0,0,ee1e7a1b1dbbb608910d3a1a8045750337c3795b4002cbbe921c849cc6ea0c49,2024-11-14T17:17:28.997000
CVE-2024-51607,0,0,6430a32ad0ccdbe2b5e85b260802defe649419f41be04507feb4e50aaec51a17,2024-11-12T13:56:24.513000
CVE-2024-51608,0,1,fa8c1f71c1313549b1f07e9b16bbcd2db8cf2a03813dee88669910ab58470fe5,2024-11-14T17:14:55.070000
CVE-2024-51609,0,1,56872967e7644d93195c5d54b9b6037222a1a65a36a397a829075693cfee2bc9,2024-11-14T17:10:36.463000
CVE-2024-51608,0,0,fa8c1f71c1313549b1f07e9b16bbcd2db8cf2a03813dee88669910ab58470fe5,2024-11-14T17:14:55.070000
CVE-2024-51609,0,0,56872967e7644d93195c5d54b9b6037222a1a65a36a397a829075693cfee2bc9,2024-11-14T17:10:36.463000
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
CVE-2024-51610,0,0,0c5999073d5ab9119b43a93ca30f63ab8745f39e68c0616117ee986d0b9671e4,2024-11-12T13:56:24.513000
CVE-2024-51611,0,0,df71ebdad6b83784c059a213dbfeff0cd4ad4cfa07621a54c78ae28de90b182c,2024-11-12T13:56:24.513000
@ -265819,6 +265824,7 @@ CVE-2024-51681,0,0,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5
CVE-2024-51682,0,0,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000
CVE-2024-51683,0,0,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000
CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000
CVE-2024-51688,1,1,f336ea0855ea6c7ae9e523ec49c986b999bafe76f23320e5c7d552ada048279f,2024-11-14T20:15:25.810000
CVE-2024-51689,0,0,ab2f405c7815c7db8e61d12d5b0c31d4e0752b7068e1e475bf3338853f840d9d,2024-11-12T13:56:24.513000
CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000
CVE-2024-51690,0,0,7e5eae0ff5cca9f377bf464de65b2d968392e357bd55f7a073753a3ee3d229f4,2024-11-12T13:56:24.513000
@ -265902,13 +265908,13 @@ CVE-2024-5179,0,0,ea665152b8c9953ad6e84eb904f7eac78af7e075a45f2a4da51451b13f6b9c
CVE-2024-51790,0,0,fba98a5a0db28c31280349a90cdb7b7024352d9f0714027ac377d0f6cd5519cc,2024-11-12T13:55:21.227000
CVE-2024-51791,0,0,23e57cba494263540d9476be8dbc91c39074a345469e3f762d8046c45490e08d,2024-11-12T13:55:21.227000
CVE-2024-51792,0,0,fc1eeb5584728befc235c6239684e31ab35d3a01996711d288287f5d00f4e79e,2024-11-12T13:55:21.227000
CVE-2024-51793,0,1,e5fc762a7a32ea475c07569842392172d1bc64c0845c6072708f9c58bc29c98d,2024-11-14T17:54:09.443000
CVE-2024-51793,0,0,e5fc762a7a32ea475c07569842392172d1bc64c0845c6072708f9c58bc29c98d,2024-11-14T17:54:09.443000
CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000
CVE-2024-5182,0,0,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d63b,2024-08-27T17:30:21.127000
CVE-2024-51820,0,1,32887e354effea1e131cd9e743ee44f42b47c96e6bd7b3cb63299faaf19261f2,2024-11-14T18:03:02.447000
CVE-2024-51837,0,1,e9f8081c2d7915b10644a12d0f68fe73c734be4cc28338c4f4e1ebedd715f110,2024-11-14T18:43:03.537000
CVE-2024-51820,0,0,32887e354effea1e131cd9e743ee44f42b47c96e6bd7b3cb63299faaf19261f2,2024-11-14T18:03:02.447000
CVE-2024-51837,0,0,e9f8081c2d7915b10644a12d0f68fe73c734be4cc28338c4f4e1ebedd715f110,2024-11-14T18:43:03.537000
CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000
CVE-2024-51843,0,1,a6d4a6be7765d1f6ab8758bae3a6c01142ac4e227b76768176b61b0604aaa531,2024-11-14T18:53:54.760000
CVE-2024-51843,0,0,a6d4a6be7765d1f6ab8758bae3a6c01142ac4e227b76768176b61b0604aaa531,2024-11-14T18:53:54.760000
CVE-2024-51845,0,0,dbd1c3b4a35b8f99deb6b733f1f6a0d823e2de27d76d535b93cb645196883f7d,2024-11-12T13:55:21.227000
CVE-2024-5185,0,0,0c09010aee9423412314c9f1cbba57fc2fd9ee19c760646e6502f5738cacb7fd,2024-08-30T19:15:16.340000
CVE-2024-5186,0,0,7baed0c201f742c44896dec767d6237c8df7ae961ab3d7ec09eb8b65736716f7,2024-09-24T14:04:47.170000
@ -266017,8 +266023,8 @@ CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3b
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000
CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000
CVE-2024-52350,0,0,692358ac026b1dcbfe6e09ab2593ec3b4f32e9a916cf64b8732ac22b9832c48f,2024-11-12T13:55:21.227000
CVE-2024-52351,0,0,a3e325cd315c5fea0f5f837fd6ee002cc35206ad757df5ede60f907fde9affb3,2024-11-12T13:55:21.227000
CVE-2024-52350,0,1,e1972ef2ed811c153b13903abf6cdb344f717306ca9175d9381f4d30088fc38a,2024-11-14T20:22:24.387000
CVE-2024-52351,0,1,bc8a69483160ec6542284bd2a28a21525e92c209bc39a02aab3ce5329e7f65b5,2024-11-14T20:24:39.083000
CVE-2024-52352,0,0,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f0382e,2024-11-12T13:55:21.227000
CVE-2024-52353,0,0,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000
CVE-2024-52354,0,0,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000
@ -266027,25 +266033,27 @@ CVE-2024-52356,0,0,6f52c6a317f3e6d9b4fea003476d72ca3813f755516b2759515eed910b7d7
CVE-2024-52357,0,0,0b87f00ebcffd7ab9b093f3ccd343158c40fba6d8989757f4c8a16b72f945025,2024-11-12T13:55:21.227000
CVE-2024-52358,0,0,98865d3b54e5cf46f7348181649ffde2326b16ddca1830d7a36a631093f0fb1c,2024-11-12T13:55:21.227000
CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000
CVE-2024-52369,1,1,ae9094b09e5afb967416763a162ae84e427c99fc8df047cc10454b5d4560616d,2024-11-14T19:15:09.533000
CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000
CVE-2024-52371,1,1,e317ec242f10297ab3e3fbb218a6c860ca6829dfd4eae7680de76f5511014375,2024-11-14T18:15:21.383000
CVE-2024-52372,1,1,23bb66a968be43561306c3e6f22460792787db17519c7be51902bbab5c73f773,2024-11-14T18:15:21.737000
CVE-2024-52373,1,1,356a21a49fe25c0e02ed4d02c15b4a7e816a29c13c357516adc354a0e2147649,2024-11-14T18:15:21.993000
CVE-2024-52374,1,1,78d6fb15794391c868fc56ec155b3c8f40ca933f0b5239bbbadef4b3304b3705,2024-11-14T18:15:22.420000
CVE-2024-52375,1,1,653b0bd1373146fd4ccda17deb0c35d8f0daf24d36821bb095a73b4fd070b7ad,2024-11-14T18:15:23.117000
CVE-2024-52376,1,1,b559962c9280acbcee199f6c3ac871209278734389b79e886993cd01664bd39d,2024-11-14T18:15:23.570000
CVE-2024-52377,1,1,169b963bf9f71b88a242692e8abb9831743969676f6056684c710ab866a074c1,2024-11-14T18:15:23.800000
CVE-2024-52378,1,1,725a806ad6dc447249e0f3d5a28b7126c924cffcf0e1b9b67071be6faac7979f,2024-11-14T18:15:24.160000
CVE-2024-52379,1,1,2000c94fb8e536fc455534c247b2d585a2ae7ee7483eeabbd4d680268cba5e2b,2024-11-14T18:15:24.507000
CVE-2024-52370,1,1,8c9d6ca4ccd27001e922f930f3ccceb2cdfaf3ddd39977cc6e79e5f0568f9844,2024-11-14T19:15:09.760000
CVE-2024-52371,0,0,e317ec242f10297ab3e3fbb218a6c860ca6829dfd4eae7680de76f5511014375,2024-11-14T18:15:21.383000
CVE-2024-52372,0,0,23bb66a968be43561306c3e6f22460792787db17519c7be51902bbab5c73f773,2024-11-14T18:15:21.737000
CVE-2024-52373,0,0,356a21a49fe25c0e02ed4d02c15b4a7e816a29c13c357516adc354a0e2147649,2024-11-14T18:15:21.993000
CVE-2024-52374,0,0,78d6fb15794391c868fc56ec155b3c8f40ca933f0b5239bbbadef4b3304b3705,2024-11-14T18:15:22.420000
CVE-2024-52375,0,0,653b0bd1373146fd4ccda17deb0c35d8f0daf24d36821bb095a73b4fd070b7ad,2024-11-14T18:15:23.117000
CVE-2024-52376,0,0,b559962c9280acbcee199f6c3ac871209278734389b79e886993cd01664bd39d,2024-11-14T18:15:23.570000
CVE-2024-52377,0,0,169b963bf9f71b88a242692e8abb9831743969676f6056684c710ab866a074c1,2024-11-14T18:15:23.800000
CVE-2024-52378,0,0,725a806ad6dc447249e0f3d5a28b7126c924cffcf0e1b9b67071be6faac7979f,2024-11-14T18:15:24.160000
CVE-2024-52379,0,0,2000c94fb8e536fc455534c247b2d585a2ae7ee7483eeabbd4d680268cba5e2b,2024-11-14T18:15:24.507000
CVE-2024-5238,0,0,a03a95be1868c6bee6318b11858946fc155e156e4fa75ea27b59162de04fd53f,2024-06-04T19:21:03.413000
CVE-2024-52380,1,1,439c4471e5c55a16e6c7f1fda73b7588ee53429e29d4c91b708135bb89665294,2024-11-14T18:15:24.837000
CVE-2024-52381,1,1,5490501b0b7cb5dd31281f323cc53949170590f25be3035ec9c58749bb2a77ac,2024-11-14T18:15:25.137000
CVE-2024-52382,1,1,8b50a0c69ecff4a10ad372fa1734c345b5933c67dc642634393504c339d3d961,2024-11-14T18:15:25.400000
CVE-2024-52383,1,1,f6c4247e5b79c9b3acf2e12769de76728836c89b6b47cdb325f0e8aa5c66b961,2024-11-14T18:15:25.673000
CVE-2024-52384,1,1,ce4a2adcca8fedb3ffd2031633939cc5b2a015620a5bcfe722fe131a1a735e3f,2024-11-14T18:15:25.913000
CVE-2024-52380,0,0,439c4471e5c55a16e6c7f1fda73b7588ee53429e29d4c91b708135bb89665294,2024-11-14T18:15:24.837000
CVE-2024-52381,0,0,5490501b0b7cb5dd31281f323cc53949170590f25be3035ec9c58749bb2a77ac,2024-11-14T18:15:25.137000
CVE-2024-52382,0,0,8b50a0c69ecff4a10ad372fa1734c345b5933c67dc642634393504c339d3d961,2024-11-14T18:15:25.400000
CVE-2024-52383,0,0,f6c4247e5b79c9b3acf2e12769de76728836c89b6b47cdb325f0e8aa5c66b961,2024-11-14T18:15:25.673000
CVE-2024-52384,0,0,ce4a2adcca8fedb3ffd2031633939cc5b2a015620a5bcfe722fe131a1a735e3f,2024-11-14T18:15:25.913000
CVE-2024-5239,0,0,22096f8834a8c03dcb48be161c14c319f43af7764381bdfba5862a8d7ec5b0e4,2024-06-04T19:21:03.520000
CVE-2024-52393,1,1,5d325e767191cb4360b1037e8925cbd1e9b39c416613dffc3da9c523441c42ab,2024-11-14T18:15:26.140000
CVE-2024-52396,1,1,25ddfd2ed12e4786902a6f41c33759128a4017098e69734285be305e8b0a3d90,2024-11-14T18:15:26.377000
CVE-2024-52393,0,0,5d325e767191cb4360b1037e8925cbd1e9b39c416613dffc3da9c523441c42ab,2024-11-14T18:15:26.140000
CVE-2024-52396,0,0,25ddfd2ed12e4786902a6f41c33759128a4017098e69734285be305e8b0a3d90,2024-11-14T18:15:26.377000
CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000
CVE-2024-5241,0,0,b91d4b722c041cbce6644b69dfde443a5ae4515bb0ecbdc8f8544e6b04a0143c,2024-06-04T19:21:03.750000
CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000
@ -266060,7 +266068,7 @@ CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb
CVE-2024-52505,0,0,57ccd65234ca26ee122006fc2fd297cd6476ffcbc3e000ccfd260aa2e522cc64,2024-11-14T16:15:20.220000
CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000
CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
CVE-2024-52524,1,1,722ff46c18c852a9996cf4c27de7aa2756510ae7b124e9e0792e085fdaedaaba,2024-11-14T18:15:26.610000
CVE-2024-52524,0,0,722ff46c18c852a9996cf4c27de7aa2756510ae7b124e9e0792e085fdaedaaba,2024-11-14T18:15:26.610000
CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000
CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000
@ -266717,7 +266725,7 @@ CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da758158
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
CVE-2024-5981,0,0,ef1af743cedf4b6b2a243e8210155140211219a91ac8483d52ff9c2f041ab697,2024-08-16T20:29:35.287000
CVE-2024-5982,0,1,7c71634ff9331b5352aa00156297bd0464d86f167cdd23e49f4124985fc0c305,2024-11-14T18:52:16.567000
CVE-2024-5982,0,0,7c71634ff9331b5352aa00156297bd0464d86f167cdd23e49f4124985fc0c305,2024-11-14T18:52:16.567000
CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018a7,2024-07-24T02:39:24.200000
CVE-2024-5984,0,0,02adfef3fce737b6a79614009e0e348625eec114041041ad04a7ccaf8be7e88b,2024-10-09T18:37:10.747000
CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000
@ -266794,7 +266802,7 @@ CVE-2024-6064,0,0,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d
CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000
CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000
CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000
CVE-2024-6068,1,1,50e35eb8c18da26a456aeaddd0104d0fd03875e3ed8bf390602102d874dd8853,2024-11-14T17:15:07.680000
CVE-2024-6068,0,0,50e35eb8c18da26a456aeaddd0104d0fd03875e3ed8bf390602102d874dd8853,2024-11-14T17:15:07.680000
CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000
CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000
CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000

Can't render this file because it is too large.