From ec8514daa3e6ea42ff073e0af63ece8e4d4d8ddd Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 14 Nov 2024 21:03:23 +0000 Subject: [PATCH] Auto-Update: 2024-11-14T21:00:20.459715+00:00 --- CVE-2005/CVE-2005-100xx/CVE-2005-10003.json | 75 ++++- CVE-2023/CVE-2023-377xx/CVE-2023-37767.json | 14 +- CVE-2023/CVE-2023-428xx/CVE-2023-42840.json | 39 ++- CVE-2023/CVE-2023-504xx/CVE-2023-50436.json | 39 ++- CVE-2023/CVE-2023-523xx/CVE-2023-52358.json | 27 +- CVE-2023/CVE-2023-523xx/CVE-2023-52385.json | 27 +- CVE-2023/CVE-2023-525xx/CVE-2023-52556.json | 27 +- CVE-2023/CVE-2023-527xx/CVE-2023-52713.json | 39 ++- CVE-2024/CVE-2024-101xx/CVE-2024-10146.json | 31 +- CVE-2024/CVE-2024-103xx/CVE-2024-10394.json | 78 +++++ CVE-2024/CVE-2024-103xx/CVE-2024-10396.json | 78 +++++ CVE-2024/CVE-2024-103xx/CVE-2024-10397.json | 78 +++++ CVE-2024/CVE-2024-106xx/CVE-2024-10685.json | 32 +- CVE-2024/CVE-2024-106xx/CVE-2024-10695.json | 44 ++- CVE-2024/CVE-2024-110xx/CVE-2024-11074.json | 82 +++++- CVE-2024/CVE-2024-110xx/CVE-2024-11076.json | 82 +++++- CVE-2024/CVE-2024-23xx/CVE-2024-2379.json | 27 +- CVE-2024/CVE-2024-254xx/CVE-2024-25431.json | 68 ++++- CVE-2024/CVE-2024-254xx/CVE-2024-25434.json | 39 ++- CVE-2024/CVE-2024-258xx/CVE-2024-25848.json | 39 ++- CVE-2024/CVE-2024-263xx/CVE-2024-26329.json | 39 ++- CVE-2024/CVE-2024-275xx/CVE-2024-27592.json | 39 ++- CVE-2024/CVE-2024-287xx/CVE-2024-28753.json | 27 +- CVE-2024/CVE-2024-292xx/CVE-2024-29211.json | 81 ++++- CVE-2024/CVE-2024-302xx/CVE-2024-30202.json | 39 ++- CVE-2024/CVE-2024-306xx/CVE-2024-30656.json | 27 +- CVE-2024/CVE-2024-347xx/CVE-2024-34719.json | 43 ++- CVE-2024/CVE-2024-365xx/CVE-2024-36507.json | 70 ++++- CVE-2024/CVE-2024-365xx/CVE-2024-36509.json | 53 +++- CVE-2024/CVE-2024-365xx/CVE-2024-36513.json | 62 +++- CVE-2024/CVE-2024-37xx/CVE-2024-3760.json | 60 ++++ CVE-2024/CVE-2024-384xx/CVE-2024-38479.json | 31 +- CVE-2024/CVE-2024-405xx/CVE-2024-40592.json | 53 +++- CVE-2024/CVE-2024-406xx/CVE-2024-40660.json | 43 ++- CVE-2024/CVE-2024-417xx/CVE-2024-41738.json | 58 +++- CVE-2024/CVE-2024-417xx/CVE-2024-41741.json | 60 +++- CVE-2024/CVE-2024-417xx/CVE-2024-41745.json | 26 +- CVE-2024/CVE-2024-430xx/CVE-2024-43087.json | 43 ++- CVE-2024/CVE-2024-430xx/CVE-2024-43088.json | 43 ++- CVE-2024/CVE-2024-434xx/CVE-2024-43499.json | 6 +- CVE-2024/CVE-2024-435xx/CVE-2024-43598.json | 16 +- CVE-2024/CVE-2024-436xx/CVE-2024-43637.json | 29 +- CVE-2024/CVE-2024-453xx/CVE-2024-45309.json | 64 +++- CVE-2024/CVE-2024-466xx/CVE-2024-46635.json | 39 ++- CVE-2024/CVE-2024-469xx/CVE-2024-46956.json | 122 +++++++- CVE-2024/CVE-2024-473xx/CVE-2024-47331.json | 47 ++- CVE-2024/CVE-2024-474xx/CVE-2024-47441.json | 71 ++++- CVE-2024/CVE-2024-474xx/CVE-2024-47442.json | 51 +++- CVE-2024/CVE-2024-474xx/CVE-2024-47443.json | 51 +++- CVE-2024/CVE-2024-474xx/CVE-2024-47444.json | 51 +++- CVE-2024/CVE-2024-474xx/CVE-2024-47445.json | 51 +++- CVE-2024/CVE-2024-474xx/CVE-2024-47446.json | 61 +++- CVE-2024/CVE-2024-490xx/CVE-2024-49025.json | 56 ++++ CVE-2024/CVE-2024-495xx/CVE-2024-49579.json | 59 +++- CVE-2024/CVE-2024-495xx/CVE-2024-49580.json | 59 +++- CVE-2024/CVE-2024-503xx/CVE-2024-50305.json | 41 ++- CVE-2024/CVE-2024-506xx/CVE-2024-50634.json | 62 +++- CVE-2024/CVE-2024-508xx/CVE-2024-50837.json | 39 ++- CVE-2024/CVE-2024-508xx/CVE-2024-50838.json | 39 ++- CVE-2024/CVE-2024-508xx/CVE-2024-50839.json | 39 ++- CVE-2024/CVE-2024-508xx/CVE-2024-50840.json | 39 ++- CVE-2024/CVE-2024-508xx/CVE-2024-50841.json | 39 ++- CVE-2024/CVE-2024-508xx/CVE-2024-50842.json | 39 ++- CVE-2024/CVE-2024-508xx/CVE-2024-50843.json | 39 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51484.json | 49 +++- CVE-2024/CVE-2024-514xx/CVE-2024-51485.json | 59 +++- CVE-2024/CVE-2024-514xx/CVE-2024-51486.json | 47 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51487.json | 49 +++- CVE-2024/CVE-2024-514xx/CVE-2024-51488.json | 49 +++- CVE-2024/CVE-2024-514xx/CVE-2024-51489.json | 7 +- CVE-2024/CVE-2024-514xx/CVE-2024-51490.json | 7 +- CVE-2024/CVE-2024-515xx/CVE-2024-51587.json | 47 ++- CVE-2024/CVE-2024-515xx/CVE-2024-51588.json | 46 ++- CVE-2024/CVE-2024-515xx/CVE-2024-51589.json | 47 ++- CVE-2024/CVE-2024-515xx/CVE-2024-51597.json | 47 ++- CVE-2024/CVE-2024-516xx/CVE-2024-51688.json | 56 ++++ CVE-2024/CVE-2024-523xx/CVE-2024-52350.json | 57 +++- CVE-2024/CVE-2024-523xx/CVE-2024-52351.json | 47 ++- CVE-2024/CVE-2024-523xx/CVE-2024-52369.json | 56 ++++ CVE-2024/CVE-2024-523xx/CVE-2024-52370.json | 56 ++++ README.md | 93 +++--- _state.csv | 308 ++++++++++---------- 82 files changed, 3749 insertions(+), 449 deletions(-) create mode 100644 CVE-2024/CVE-2024-103xx/CVE-2024-10394.json create mode 100644 CVE-2024/CVE-2024-103xx/CVE-2024-10396.json create mode 100644 CVE-2024/CVE-2024-103xx/CVE-2024-10397.json create mode 100644 CVE-2024/CVE-2024-37xx/CVE-2024-3760.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49025.json create mode 100644 CVE-2024/CVE-2024-516xx/CVE-2024-51688.json create mode 100644 CVE-2024/CVE-2024-523xx/CVE-2024-52369.json create mode 100644 CVE-2024/CVE-2024-523xx/CVE-2024-52370.json diff --git a/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json b/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json index c487b421884..0580f124954 100644 --- a/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json +++ b/CVE-2005/CVE-2005-100xx/CVE-2005-10003.json @@ -2,8 +2,8 @@ "id": "CVE-2005-10003", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T14:15:03.800", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T19:35:58.467", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -68,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -127,30 +147,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mikexstudios:xcomic:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.8.3", + "matchCriteriaId": "BE6B0A39-7E9A-408A-9294-B926F2BACC88" + } + ] + } + ] + } + ], "references": [ { "url": "http://xcomic.mikexstudios.com/forum/viewtopic.php?id=130", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/mikexstudios/xcomic/commit/6ed8e3cc336e29f09c7e791863d0559939da98bf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mikexstudios/xcomic/releases/tag/v0.8.3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.280359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://web.archive.org/web/20071218144304/http://xcomic.mikexstudios.com/forum/viewtopic.php?id=130", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37767.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37767.json index e31532716cf..bd6a6665b3e 100644 --- a/CVE-2023/CVE-2023-377xx/CVE-2023-37767.json +++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37767.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37767", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-11T23:15:09.250", - "lastModified": "2023-07-19T13:23:15.433", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-14T19:35:01.150", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42840.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42840.json index caa8cc1963c..96fbb185773 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42840.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42840.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42840", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:48.767", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-11-14T19:35:02.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213983", diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50436.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50436.json index 120d4bd20d9..6347d3becd4 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50436.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50436.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50436", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:42:00.697", - "lastModified": "2024-02-29T13:49:47.277", + "lastModified": "2024-11-14T20:35:08.293", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Couchbase Server antes de la versi\u00f3n 7.2.4. Las credenciales de administrador de ns_server se filtran en forma codificada en el archivo diag.log. La primera versi\u00f3n afectada es la 7.1.5." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], "references": [ { "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52358.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52358.json index 2845f0f6cce..75113a337b5 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52358.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52358.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52358", "sourceIdentifier": "psirt@huawei.com", "published": "2024-02-18T03:15:08.640", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-11-14T20:35:09.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de defectos de configuraci\u00f3n en algunas API del m\u00f3dulo de audio. La explotaci\u00f3n exitosa de esta vulnerabilidad puede afectar la disponibilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/", diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52385.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52385.json index d04aa3ae11d..f1efd44e4c2 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52385.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52385.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52385", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-08T10:15:08.400", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-11-14T20:35:09.457", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de escritura fuera de los l\u00edmites en el m\u00f3dulo RSMC. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "psirt@huawei.com", diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52556.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52556.json index 0c15d56bf1f..fb1f24ab79b 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52556.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52556.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52556", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-03-01T17:15:07.177", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-11-14T20:35:09.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En OpenBSD 7.4 antes de la errata 009, una condici\u00f3n de ejecuci\u00f3n entre el procesamiento de paquetes de pf(4) y la expiraci\u00f3n de los estados de los paquetes puede causar un p\u00e1nico en el kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "9119a7d8-5eab-497f-8521-727c672e3725", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json index 5907fdabeb9..a01c4ff0d65 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52713.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52713", "sourceIdentifier": "psirt@huawei.com", "published": "2024-04-07T09:15:08.377", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-11-14T20:35:09.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de control inadecuado de permisos en el m\u00f3dulo de gesti\u00f3n de ventanas. Impacto: La explotaci\u00f3n exitosa de esta vulnerabilidad afectar\u00e1 la disponibilidad y la confidencialidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/", diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json index 49415649c60..f0c9df6a60c 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10146.json @@ -2,16 +2,43 @@ "id": "CVE-2024-10146", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-14T06:15:07.080", - "lastModified": "2024-11-14T06:15:07.080", + "lastModified": "2024-11-14T19:35:05.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins." + }, + { + "lang": "es", + "value": "El complemento Simple File List de WordPress anterior a la versi\u00f3n 6.1.13 no desinfecta ni escapa una URL generada antes de mostrarla nuevamente en un atributo, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra los administradores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9ee74a0f-83ff-4c15-a114-f8f6baab8bf5/", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10394.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10394.json new file mode 100644 index 00000000000..c121d8f6cd5 --- /dev/null +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10394.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-10394", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2024-11-14T20:15:20.777", + "lastModified": "2024-11-14T20:15:20.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local user can bypass the OpenAFS PAG (Process Authentication Group)\nthrottling mechanism in Unix clients, allowing the user to create a PAG using\nan existing id number, effectively joining the PAG and letting the user steal\nthe credentials in that PAG." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.4, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://openafs.org/pages/security/OPENAFS-SA-2024-001.txt", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10396.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10396.json new file mode 100644 index 00000000000..12e359767ce --- /dev/null +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10396.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-10396", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2024-11-14T20:15:20.917", + "lastModified": "2024-11-14T20:15:20.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated user can provide a malformed ACL to the fileserver's StoreACL\nRPC, causing the fileserver to crash, possibly expose uninitialized memory, and\npossibly store garbage data in the audit log.\nMalformed ACLs provided in responses to client FetchACL RPCs can cause client\nprocesses to crash and possibly expose uninitialized memory into other ACLs\nstored on the server." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], + "references": [ + { + "url": "https://openafs.org/pages/security/OPENAFS-SA-2024-002.txt", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10397.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10397.json new file mode 100644 index 00000000000..822cdccc452 --- /dev/null +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10397.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-10397", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2024-11-14T20:15:21.057", + "lastModified": "2024-11-14T20:15:21.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A malicious server can crash the OpenAFS cache manager and other client\nutilities, and possibly execute arbitrary code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://openafs.org/pages/security/OPENAFS-SA-2024-003.txt", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10685.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10685.json index eff373fce58..6a913043630 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10685.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10685", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-12T04:15:04.410", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T19:40:14.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpplugin:contact_form_7_redirect_\\&_thank_you_page:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.7", + "matchCriteriaId": "45F9DC2F-3C65-443B-9FDD-688E7790C860" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3184638%40cf7-redirect-thank-you-page&new=3184638%40cf7-redirect-thank-you-page&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f52285e0-e78d-4231-8ff9-53fbe568fcc2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10695.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10695.json index a38ca1af08d..7c6149852ba 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10695.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10695.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10695", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-12T04:15:04.610", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T19:44:16.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,7 +41,7 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -49,16 +49,50 @@ "value": "CWE-639" } ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.14", + "matchCriteriaId": "2895B55C-CE63-44E6-9CEE-B65A396E8DDC" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3184380%40futurio-extra&new=3184380%40futurio-extra&sfp_email=&sfph_mail=#file3", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/53871750-6437-459f-97e1-5cf524160f09?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11074.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11074.json index d0300897384..3a5a5fa72b4 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11074.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11074.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11074", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-11T18:15:14.620", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:06:54.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -124,26 +154,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dimongshi/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.283870", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.283870", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.441174", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11076.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11076.json index fb80eb73fd4..72365b2b76f 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11076.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11076", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-11T18:15:14.940", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:14:26.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -124,26 +154,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/UnrealdDei/cve/blob/main/sql2-rce.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.283871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.283871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.441182", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json index 4c33b746b80..f7c3c153d9a 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2379.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2379", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.230", - "lastModified": "2024-07-30T02:15:05.397", + "lastModified": "2024-11-14T20:35:22.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "libcurl omite la verificaci\u00f3n del certificado para una conexi\u00f3n QUIC bajo ciertas condiciones, cuando est\u00e1 dise\u00f1ado para usar wolfSSL. Si se le indica que utilice un cifrado o curva desconocido/incorrecto, la ruta de error omite accidentalmente la verificaci\u00f3n y devuelve OK, ignorando as\u00ed cualquier problema de certificado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25431.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25431.json index e0475fa61e2..091fecf6476 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25431.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25431.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25431", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T17:15:06.023", - "lastModified": "2024-11-13T15:35:07.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T20:42:47.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bytecodealliance:webassembly_micro_runtime:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.2", + "matchCriteriaId": "A5C4A095-7C30-4027-B83A-DC6C72967FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/bd228e6dcaf8c18140e1074964912b39", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/bytecodealliance/wasm-micro-runtime/issues/3122", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch" + ] }, { "url": "https://github.com/bytecodealliance/wasm-micro-runtime/pull/3126", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25434.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25434.json index 4818c3eedc8..b4345820f65 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25434.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25434.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25434", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T23:15:08.360", - "lastModified": "2024-03-04T13:58:23.447", + "lastModified": "2024-11-14T20:35:13.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Pkp Ojs v3.3 permite a los atacantes ejecutar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Publicname." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1MFuAyZukdJeA7HKz8o8pOKLJMjURTZCt/view?usp=sharing", diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json index 8ee5c202928..91a0523e288 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25848.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25848", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-08T02:15:50.527", - "lastModified": "2024-03-08T14:02:57.420", + "lastModified": "2024-11-14T20:35:14.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el m\u00f3dulo \"Ever Ultimate SEO\" (everpsseo) <= 8.1.2 de Team Ever para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL en las versiones afectadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://addons.prestashop.com/fr/seo-referencement-naturel/39489-ever-ultimate-seo.html", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json index d33b1627cd6..e98f7db1be0 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26329.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26329", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-05T07:15:10.970", - "lastModified": "2024-04-05T12:40:52.763", + "lastModified": "2024-11-14T20:35:15.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Chilkat anterior a v9.5.0.98, permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de PRNG predecible en la funci\u00f3n ChilkatRand::randomBytes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-331" + } + ] + } + ], "references": [ { "url": "https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27592.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27592.json index aa94ee48dbf..fc12effa8ef 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27592.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27592.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27592", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T21:15:08.027", - "lastModified": "2024-04-16T23:15:08.690", + "lastModified": "2024-11-14T20:35:16.207", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad Open Redirect en Corezoid Process Engine v6.5.0 permite a los atacantes redirigir a sitios web arbitrarios agregando un enlace manipulado a /login/ en la URL de la p\u00e1gina de inicio de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://github.com/corezoid/helm/issues/110", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28753.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28753.json index 649d4047c34..3918e9f13f9 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28753.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28753.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28753", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-09T00:15:59.923", - "lastModified": "2024-03-11T01:32:39.697", + "lastModified": "2024-11-14T20:35:21.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "RaspAP (tambi\u00e9n conocido como raspap-webgui) hasta la versi\u00f3n 3.0.9 permite a atacantes remotos leer el archivo /etc/passwd mediante una solicitud manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://dustri.org/b/carrot-disclosure.html", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29211.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29211.json index 055a5ce1a0f..45aca5c78c4 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29211.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29211", "sourceIdentifier": "support@hackerone.com", "published": "2024-11-13T02:15:16.150", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:09:01.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -39,10 +61,63 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.7", + "matchCriteriaId": "2347060E-FEC7-41EF-A0C0-5ED61B157223" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:-:*:*:*:*:*:*", + "matchCriteriaId": "C419EC4C-AB98-4D73-82B2-00A0A1F5A435" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "F78C1CDE-FB11-4033-AEBA-D04D937EDD67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:r2:*:*:*:*:*:*", + "matchCriteriaId": "E881D4BF-3222-4EF9-8A9B-0948973CCC89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:secure_access_client:22.7:r3:*:*:*:*:*:*", + "matchCriteriaId": "D93F7D15-B61D-4EE7-9280-FC0B7C45C940" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30202.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30202.json index 373d0543ff0..1fb72935e81 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30202.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30202.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30202", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T15:15:52.427", - "lastModified": "2024-05-01T18:15:19.553", + "lastModified": "2024-11-14T20:35:23.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Emacs anterior a 29.3, el c\u00f3digo Lisp arbitrario se eval\u00faa como parte de activar el modo Org. Esto afecta al modo de organizaci\u00f3n anterior a la versi\u00f3n 9.6.23." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/25/2", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30656.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30656.json index 00a466c0ac2..183b97992aa 100644 --- a/CVE-2024/CVE-2024-306xx/CVE-2024-30656.json +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30656.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30656", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T22:15:08.870", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-11-14T20:35:23.857", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en Fireboltt Dream Wristphone BSW202_FB_AAC_v2.0_20240110-20240110-1956 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un frame de autenticaci\u00f3n manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://github.com/Yashodhanvivek/Firebolt-wristphone-vulnerability", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json index 298538db774..696d6a9bfe3 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34719.json @@ -2,16 +2,55 @@ "id": "CVE-2024-34719", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.267", - "lastModified": "2024-11-13T18:15:20.267", + "lastModified": "2024-11-14T19:35:05.990", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple locations, there is a possible permissions bypass due to a missing null check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En varias ubicaciones, es posible que se omitan los permisos debido a la falta de una verificaci\u00f3n nula. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/b0e4375577ba7e21bd40edac5990bea418ecdc8c", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36507.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36507.json index dc594006ef1..dfc19894bb1 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36507.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36507", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:10.233", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:31:45.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +81,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.13", + "matchCriteriaId": "CC29F9A2-9ED8-45C6-AC9F-FB4EEAA7AFF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.5", + "matchCriteriaId": "F06CB11B-0726-4E7A-B257-CB71E2237AA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*", + "matchCriteriaId": "6B512696-8596-4458-ADC9-24DD3C6C377B" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-205", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36509.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36509.json index df35bd148c2..3eed0940282 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36509.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36509.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36509", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:10.440", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:33:44.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "7.4.4", + "matchCriteriaId": "7B0C24E1-3735-4117-8FA1-FB20D23AED9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "28B43375-DA74-4C5F-BAEE-39F312EEF51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-180", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36513.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36513.json index 4e55b689c98..e3d48661c75 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36513.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36513.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36513", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:10.633", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:35:26.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.10", + "matchCriteriaId": "4C015491-F83B-4569-B0BB-0877C1D89C66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.13", + "matchCriteriaId": "CC29F9A2-9ED8-45C6-AC9F-FB4EEAA7AFF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.5", + "matchCriteriaId": "F06CB11B-0726-4E7A-B257-CB71E2237AA7" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-144", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3760.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3760.json new file mode 100644 index 00000000000..77e0e8dd98c --- /dev/null +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3760.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-3760", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-11-14T19:15:06.327", + "lastModified": "2024-11-14T19:15:06.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In lunary-ai/lunary version 1.2.7, there is a lack of rate limiting on the forgot password page, leading to an email bombing vulnerability. Attackers can exploit this by automating forgot password requests to flood targeted user accounts with a high volume of password reset emails. This not only overwhelms the victim's mailbox, making it difficult to manage and locate legitimate emails, but also significantly impacts mail servers by consuming their resources. The increased load can cause performance degradation and, in severe cases, make the mail servers unresponsive or unavailable, disrupting email services for the entire organization." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lunary-ai/lunary/commit/29374bb10020712009c1ec238affe098112a51d6", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/c29e9f36-8261-463d-8862-7f4fdcc8eddc", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json index 1ac42fd49ef..758a72d3513 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38479.json @@ -2,16 +2,43 @@ "id": "CVE-2024-38479", "sourceIdentifier": "security@apache.org", "published": "2024-11-14T10:15:05.347", - "lastModified": "2024-11-14T10:15:05.347", + "lastModified": "2024-11-14T19:35:07.153", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache Traffic Server.\n\nThis issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5.\n\nUsers are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Traffic Server. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 8.0.0 hasta la 8.1.11, desde la versi\u00f3n 9.0.0 hasta la 9.2.5. Se recomienda a los usuarios que actualicen a la versi\u00f3n 9.2.6, que soluciona el problema, o a la versi\u00f3n 10.0.2, que no lo tiene." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40592.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40592.json index 208aac87465..1fea9b729af 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40592.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40592.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40592", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-11-12T19:15:11.013", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:37:06.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -51,10 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*", + "versionStartIncluding": "6.4.0", + "versionEndExcluding": "7.2.5", + "matchCriteriaId": "81B7F626-84B5-47A5-959F-735D6250C147" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:macos:*:*", + "matchCriteriaId": "0A079CA4-D957-402A-B899-31F26A89DF00" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-022", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json index c455cc65cc3..31953a65c8c 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40660.json @@ -2,16 +2,55 @@ "id": "CVE-2024-40660", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.570", - "lastModified": "2024-11-13T18:15:20.570", + "lastModified": "2024-11-14T19:35:07.343", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In setTransactionState of SurfaceFlinger.cpp, there is a possible way to change protected display attributes due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En setTransactionState de SurfaceFlinger.cpp, existe una forma posible de cambiar los atributos de visualizaci\u00f3n protegidos debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/native/+/064ce6e3235b6318be1e41f1bac9595a98e4aafa", diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json index d81d0046fe1..b7dc79d626d 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41738", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-01T17:15:16.033", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T20:51:29.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:txseries_for_multiplatforms:10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6E87CAC4-6CC5-4C17-B49C-88BAA7F1F806" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174572", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json index c32af98df96..7c0db7bf3d3 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41741", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-01T17:15:16.320", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T20:42:44.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,13 +36,43 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:txseries_for_multiplatforms:10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6E87CAC4-6CC5-4C17-B49C-88BAA7F1F806" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174572", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json index 94034cd7a1e..bc744a15aea 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41745", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-11-01T17:15:16.800", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T20:35:33.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:standard:*:*:*", + "matchCriteriaId": "2E54DF77-511D-4C8A-88B0-3ABB4E232273" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174576", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json index 151b1980018..4c6a13006cb 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json @@ -2,16 +2,55 @@ "id": "CVE-2024-43087", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.307", - "lastModified": "2024-11-13T18:15:21.307", + "lastModified": "2024-11-14T19:35:08.150", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In getInstalledAccessibilityPreferences of AccessibilitySettings.java, there is a possible way to hide an enabled accessibility service in the accessibility service settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." + }, + { + "lang": "es", + "value": "En getInstalledAccessibilityPreferences de AccessibilitySettings.java, existe una forma posible de ocultar un servicio de accesibilidad habilitado en la configuraci\u00f3n del servicio de accesibilidad debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/6253b87704bb097ad9963941bdddf3b86906a73e", diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json index eb3baed880b..f36b9370096 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43088.json @@ -2,16 +2,55 @@ "id": "CVE-2024-43088", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.387", - "lastModified": "2024-11-13T18:15:21.387", + "lastModified": "2024-11-14T19:35:08.967", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple functions in AppInfoBase.java, there is a possible way to manipulate app permission settings belonging to another user on the device due to a missing permission check. This could lead to local escalation of privilege across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En varias funciones de AppInfoBase.java, existe una forma posible de manipular la configuraci\u00f3n de permisos de la aplicaci\u00f3n que pertenece a otro usuario en el dispositivo debido a una verificaci\u00f3n de permisos faltante. Esto podr\u00eda provocar una escalada local de privilegios entre los l\u00edmites de usuario sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/975c28535419be1cc45f66712f41e4a7a40e6001", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43499.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43499.json index 77adcac7fd4..06001691531 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43499.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43499.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43499", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:24.363", - "lastModified": "2024-11-13T17:01:58.603", + "lastModified": "2024-11-14T19:15:06.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -44,6 +44,10 @@ "source": "secure@microsoft.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-409" + }, { "lang": "en", "value": "CWE-606" diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43598.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43598.json index 6470ed3e686..d8808f3d129 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43598.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43598.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43598", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:28.277", - "lastModified": "2024-11-13T17:01:58.603", + "lastModified": "2024-11-14T20:15:23.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.5, + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json index 4e2a76f2cec..e968b59a4cc 100644 --- a/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43637", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:32.773", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:15:23.993", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,30 +15,7 @@ "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el controlador del sistema de clase de v\u00eddeo USB de Windows" } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "secure@microsoft.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "PHYSICAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 6.8, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 0.9, - "impactScore": 5.9 - } - ] - }, + "metrics": {}, "weaknesses": [ { "source": "secure@microsoft.com", diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json index c1cb96952e6..7e84309a2be 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45309.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45309", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-21T15:15:03.463", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:39:31.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -73,14 +105,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:onedev_project:onedev:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.0.9", + "matchCriteriaId": "E3D84704-8413-44E7-80D1-7843D9720D4B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/theonedev/onedev/commit/4637aaac8c70d41aa789b7fce208b75c6a7b711f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/theonedev/onedev/security/advisories/GHSA-7wg5-6864-v489", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46635.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46635.json index 8902135796b..16b7c8e6fac 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46635.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46635.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46635", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T18:15:06.140", - "lastModified": "2024-10-04T13:51:25.567", + "lastModified": "2024-11-14T20:35:33.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el endpoint de la API /AccountMaster/GetCurrentUserInfo de INROAD anterior a v202402060 permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para el par\u00e1metro UserNameOrPhoneNumber." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://hithub.notion.site/Sensitive-Information-Disclosure-in-GongZhiDao-System-aaad25d2430f4a638d462194cfa87c8b", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json index 63a149a2c97..cc53e74863f 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46956", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-10T22:15:12.943", - "lastModified": "2024-11-12T20:35:13.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T20:39:54.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.04.0", + "matchCriteriaId": "4202C3F1-622D-4443-B2F0-1C26F73BD662" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_high_performance_computing:12.0:sp5:*:*:-:*:*:*", + "matchCriteriaId": "F8C8AD43-557D-4285-BA46-9C5785F53229" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:*", + "matchCriteriaId": "9F714147-87CC-4DAF-81E4-C6DFA7C4F2AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss:*:*:*", + "matchCriteriaId": "930B3D1B-202E-4FE9-8737-329874F1D821" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:ltss_extended_security:*:*:*", + "matchCriteriaId": "AE1A79C4-DC01-4CC6-A745-C20E70C3FF03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp5:*:*:*:*:*:*", + "matchCriteriaId": "21ED3679-51E2-4D12-84AD-ACCE27B55F13" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707895", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47331.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47331.json index bb97cbfd83a..7594586470c 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47331.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47331.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47331", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-11T19:15:09.783", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:22:49.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:multi_step_for_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.8", + "matchCriteriaId": "EC1F05E6-FC11-44F2-9AF7-480F03715B42" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cf7-multi-step/wordpress-multi-step-for-contact-form-plugin-2-7-7-unauthenticated-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47441.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47441.json index d1c8006c4b3..311b28c588d 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47441.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47441.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47441", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-12T19:15:13.310", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:09:41.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -51,10 +71,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionEndIncluding": "23.6.9", + "matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.6.3", + "matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47442.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47442.json index 64bf49402e1..ab0f1d935c5 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47442.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47442.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47442", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-12T19:15:13.517", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:09:51.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionEndIncluding": "23.6.9", + "matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.6.3", + "matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47443.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47443.json index 4db0020a434..1b2860443c1 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47443.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47443.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47443", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-12T19:15:13.730", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:10:01.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionEndIncluding": "23.6.9", + "matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.6.3", + "matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47444.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47444.json index 003dec4b0da..00d9ce68cc2 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47444.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47444.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47444", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-12T19:15:13.947", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:10:29.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionEndIncluding": "23.6.9", + "matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.6.3", + "matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47445.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47445.json index 89b5f2d76f1..5b17303cae2 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47445.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47445.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47445", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-12T19:15:14.157", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:10:34.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionEndIncluding": "23.6.9", + "matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.6.3", + "matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47446.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47446.json index 9b21d283d8d..9c97cae29fe 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47446.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47446.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47446", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-12T19:15:14.377", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:10:24.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -51,10 +61,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionEndIncluding": "23.6.9", + "matchCriteriaId": "C00F63B0-D926-493E-8784-E7E0EF7D514E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.6.3", + "matchCriteriaId": "4E7C5CA6-F2DB-439F-9804-D1DA98876FDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49025.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49025.json new file mode 100644 index 00000000000..442b739ddff --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49025.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49025", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-14T20:15:25.207", + "lastModified": "2024-11-14T20:15:25.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49025", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json index 63208dd5ebc..3f4ae257e3e 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49579", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-17T13:15:14.613", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T19:24:45.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "cve@jetbrains.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cve@jetbrains.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47197", + "matchCriteriaId": "EE7D786F-614F-40DA-8908-13A2C3133779" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json index b4430078dc6..8b68e497384 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49580", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-17T13:15:14.853", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T19:25:47.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "cve@jetbrains.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cve@jetbrains.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.0", + "matchCriteriaId": "34BD7712-1D07-487C-8A52-C2202C53BA2E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json index ecedfa3c903..b8c9fb7d422 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50305.json @@ -2,16 +2,43 @@ "id": "CVE-2024-50305", "sourceIdentifier": "security@apache.org", "published": "2024-11-14T10:15:08.013", - "lastModified": "2024-11-14T10:15:08.013", + "lastModified": "2024-11-14T19:35:16.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Valid Host header field can cause Apache Traffic Server to crash on some platforms.\n\nThis issue affects Apache Traffic Server: from 9.2.0 through 9.2.5.\n\nUsers are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue." + }, + { + "lang": "es", + "value": "Un campo de encabezado de host v\u00e1lido puede provocar que Apache Traffic Server se bloquee en algunas plataformas. Este problema afecta a Apache Traffic Server: desde la versi\u00f3n 9.2.0 hasta la 9.2.5. Se recomienda a los usuarios actualizar a la versi\u00f3n 9.2.6, que soluciona el problema, o a la versi\u00f3n 10.0.2, que no lo tiene." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -22,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50634.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50634.json index a22934c608f..a72c9ba7171 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50634.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50634.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50634", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T17:15:06.570", - "lastModified": "2024-11-13T15:35:12.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T20:40:43.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sbond:watcharr:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.43.0", + "matchCriteriaId": "C904CC44-5248-409D-9DC1-388BABEBE4A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yamerooo123/CVE/tree/main/CVE-2024-50634", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://youtu.be/wnULru0WdtA", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json index 475a4cbe270..b72efb6337a 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50837.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50837", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T15:15:08.990", - "lastModified": "2024-11-14T17:15:07.257", + "lastModified": "2024-11-14T19:35:17.623", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/admin_user.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the firstname and username parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20admin%20user.pdf", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json index 94481b3c509..6c3e6d55534 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50838.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50838", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T15:15:09.073", - "lastModified": "2024-11-14T17:15:07.333", + "lastModified": "2024-11-14T19:35:18.427", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/department.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the d and pi parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Department.pdf", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json index 46bdb68a0c7..3171d5f09b2 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50839.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50839", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.670", - "lastModified": "2024-11-14T17:15:07.410", + "lastModified": "2024-11-14T19:35:19.240", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/add_subject.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the subject_code and title parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Subject.pdf", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json index 28f8bfb4f69..563ae8c1cf1 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50840.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50840", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.793", - "lastModified": "2024-11-14T17:15:07.473", + "lastModified": "2024-11-14T19:35:20.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/class.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the class_name parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Class.pdf", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json index 5e4a33afe1a..a526f78211c 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50841.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50841", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.880", - "lastModified": "2024-11-14T17:15:07.543", + "lastModified": "2024-11-14T19:35:20.837", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/calendar_of_events.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the date_start, date_end, and title parameters." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20Calendar%20of%20Events.pdf", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json index d667916463a..4d8414b699e 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50842.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50842", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:18.967", - "lastModified": "2024-11-14T17:15:07.613", + "lastModified": "2024-11-14T19:35:21.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability was found in /admin/school_year.php in KASHIPARA E-learning Management System Project 1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the school_year parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/Stored%20XSS%20-%20School%20Year.pdf", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json index adf70b6827a..81c10a8d7f1 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50843.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50843", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T14:15:19.050", - "lastModified": "2024-11-14T14:15:19.050", + "lastModified": "2024-11-14T19:35:22.450", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Directory listing issue was found in PHPGurukul User Registration & Login and User Management System 3.2, which allows remote attackers attacker to access sensitive files and directories via /loginsystem/assets." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20&%20Login%20and%20User%20Management%20System%20With%20admin%20panel/Directory%20listings.md", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51484.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51484.json index f623393b4bc..fddc6e786c2 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51484.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51484", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-11T20:15:18.170", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:14:44.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ampache/ampache/security/advisories/GHSA-h6vj-6rvc-3x29", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51485.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51485.json index 44d87b588d3..7d23bb8d65c 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51485.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51485", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-11T20:15:18.313", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:06:12.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ampache/ampache/security/advisories/GHSA-xvfj-w962-hqcx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51486.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51486.json index 1cba99cd600..eefc6dfd7a9 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51486.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51486", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-11T20:15:18.430", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:55:34.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ampache/ampache/security/advisories/GHSA-4xw5-f7xm-vpw5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51487.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51487.json index 6fb7720b0bd..35b8a541085 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51487.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51487", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-11T20:15:18.640", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T19:37:53.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ampache/ampache/security/advisories/GHSA-5rmx-fjmc-mg6x", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51488.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51488.json index 9a001eeb3bc..f8848738f17 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51488.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51488", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-11T20:15:18.757", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:12:58.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ampache/ampache/security/advisories/GHSA-46m4-5pxj-66f2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51489.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51489.json index 9e237a7a585..793b2411755 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51489.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51489.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51489", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-11T20:15:18.877", - "lastModified": "2024-11-14T15:46:50.553", + "lastModified": "2024-11-14T20:12:52.027", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -104,9 +104,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*", - "versionEndExcluding": "7.0.1", - "matchCriteriaId": "7DC140BB-7D16-4B97-A24E-7D0E9D83C57F" + "criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6" } ] } diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51490.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51490.json index 9bf34d79170..bfdd0cde2b1 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51490.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51490.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51490", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-11T20:15:18.987", - "lastModified": "2024-11-14T15:30:15.643", + "lastModified": "2024-11-14T20:13:01.587", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*", - "versionEndExcluding": "7.0.1", - "matchCriteriaId": "7DC140BB-7D16-4B97-A24E-7D0E9D83C57F" + "criteria": "cpe:2.3:a:ampache:ampache:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "03A1494C-7A66-4E5D-B05D-4B0E5CC161E6" } ] } diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51587.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51587.json index 0e84b9ca08b..539c3906886 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51587.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51587", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:04.903", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:26:14.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:softfirm:definitive_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.16", + "matchCriteriaId": "129088C1-6A12-4DCD-922B-C0E794DC5524" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/definitive-addons-for-elementor/wordpress-definitive-addons-for-elementor-plugin-1-5-16-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51588.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51588.json index b58f2488c15..84e897c92ee 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51588.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51588.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51588", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:05.113", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:26:28.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themehat:super_addons_for_elementor:1.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "97EB2257-8F8F-4F83-9D45-DC83C693FBF0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/super-addons-for-elementor/wordpress-super-addons-for-elementor-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51589.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51589.json index d4347bf3f6a..e82d0fa1246 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51589.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51589.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51589", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:05.327", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:26:41.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpcirqle:bigmart_elements:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.3", + "matchCriteriaId": "A175B919-682E-40D9-8EA4-11D878C7E749" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bigmart-elements/wordpress-bigmart-elements-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51597.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51597.json index b44a301a73a..d46816d437f 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51597.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51597", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:07.050", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:27:46.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brandevolutionco:themeshark_templates_\\&_widgets_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.7", + "matchCriteriaId": "582D4D33-3F77-4B3A-A21E-0049AAF5585C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/themeshark-elementor/wordpress-themeshark-templates-widgets-for-elementor-plugin-1-1-7-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51688.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51688.json new file mode 100644 index 00000000000..6af9184b272 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51688.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51688", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T20:15:25.810", + "lastModified": "2024-11-14T20:15:25.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in FraudLabs Pro FraudLabs Pro SMS Verification allows Stored XSS.This issue affects FraudLabs Pro SMS Verification: from n/a through 1.10.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fraudlabs-pro-sms-verification/wordpress-fraudlabs-pro-sms-verification-plugin-1-10-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52350.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52350.json index fd6d02597c2..6ec91ce72a8 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52350.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52350.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52350", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-11T07:15:06.293", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:22:24.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crm2go:crm2go:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "F3CF0A47-6ECE-4092-B344-6FC89F22BD52" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/crm2go/wordpress-crm-2go-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52351.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52351.json index e692a195f55..df328c24c3d 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52351.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52351.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52351", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-11T07:15:06.583", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T20:24:39.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bu:bu_slideshow:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3.10", + "matchCriteriaId": "E8B7B55D-C5E1-43F8-8101-ABD48373BEB6" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bu-slideshow/wordpress-bu-slideshow-plugin-2-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52369.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52369.json new file mode 100644 index 00000000000..576b7f362bc --- /dev/null +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52369.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52369", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T19:15:09.533", + "lastModified": "2024-11-14T19:15:09.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Optimal Access Inc. KBucket allows Upload a Web Shell to a Web Server.This issue affects KBucket: from n/a through 4.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/kbucket/wordpress-kbucket-plugin-4-1-6-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52370.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52370.json new file mode 100644 index 00000000000..199422e6c9c --- /dev/null +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52370.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52370", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T19:15:09.760", + "lastModified": "2024-11-14T19:15:09.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Hive Support Hive Support \u2013 WordPress Help Desk allows Upload a Web Shell to a Web Server.This issue affects Hive Support \u2013 WordPress Help Desk: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/hive-support/wordpress-hive-support-wordpress-help-desk-live-chat-ai-chat-bot-plugin-for-wordpress-plugin-1-1-1-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c7e241f7dfc..abd732e98db 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-14T19:00:28.666108+00:00 +2024-11-14T21:00:20.459715+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-14T18:57:17.743000+00:00 +2024-11-14T20:51:29.847000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269753 +269761 ``` ### CVEs added in the last Commit -Recently added CVEs: `42` +Recently added CVEs: `8` -- [CVE-2024-50831](CVE-2024/CVE-2024-508xx/CVE-2024-50831.json) (`2024-11-14T18:15:21.180`) -- [CVE-2024-50832](CVE-2024/CVE-2024-508xx/CVE-2024-50832.json) (`2024-11-14T17:15:06.823`) -- [CVE-2024-50833](CVE-2024/CVE-2024-508xx/CVE-2024-50833.json) (`2024-11-14T17:15:06.917`) -- [CVE-2024-50834](CVE-2024/CVE-2024-508xx/CVE-2024-50834.json) (`2024-11-14T17:15:07.003`) -- [CVE-2024-50835](CVE-2024/CVE-2024-508xx/CVE-2024-50835.json) (`2024-11-14T17:15:07.090`) -- [CVE-2024-50836](CVE-2024/CVE-2024-508xx/CVE-2024-50836.json) (`2024-11-14T17:15:07.177`) -- [CVE-2024-5125](CVE-2024/CVE-2024-51xx/CVE-2024-5125.json) (`2024-11-14T18:15:26.760`) -- [CVE-2024-52371](CVE-2024/CVE-2024-523xx/CVE-2024-52371.json) (`2024-11-14T18:15:21.383`) -- [CVE-2024-52372](CVE-2024/CVE-2024-523xx/CVE-2024-52372.json) (`2024-11-14T18:15:21.737`) -- [CVE-2024-52373](CVE-2024/CVE-2024-523xx/CVE-2024-52373.json) (`2024-11-14T18:15:21.993`) -- [CVE-2024-52374](CVE-2024/CVE-2024-523xx/CVE-2024-52374.json) (`2024-11-14T18:15:22.420`) -- [CVE-2024-52375](CVE-2024/CVE-2024-523xx/CVE-2024-52375.json) (`2024-11-14T18:15:23.117`) -- [CVE-2024-52376](CVE-2024/CVE-2024-523xx/CVE-2024-52376.json) (`2024-11-14T18:15:23.570`) -- [CVE-2024-52377](CVE-2024/CVE-2024-523xx/CVE-2024-52377.json) (`2024-11-14T18:15:23.800`) -- [CVE-2024-52378](CVE-2024/CVE-2024-523xx/CVE-2024-52378.json) (`2024-11-14T18:15:24.160`) -- [CVE-2024-52379](CVE-2024/CVE-2024-523xx/CVE-2024-52379.json) (`2024-11-14T18:15:24.507`) -- [CVE-2024-52380](CVE-2024/CVE-2024-523xx/CVE-2024-52380.json) (`2024-11-14T18:15:24.837`) -- [CVE-2024-52381](CVE-2024/CVE-2024-523xx/CVE-2024-52381.json) (`2024-11-14T18:15:25.137`) -- [CVE-2024-52382](CVE-2024/CVE-2024-523xx/CVE-2024-52382.json) (`2024-11-14T18:15:25.400`) -- [CVE-2024-52383](CVE-2024/CVE-2024-523xx/CVE-2024-52383.json) (`2024-11-14T18:15:25.673`) -- [CVE-2024-52384](CVE-2024/CVE-2024-523xx/CVE-2024-52384.json) (`2024-11-14T18:15:25.913`) -- [CVE-2024-52393](CVE-2024/CVE-2024-523xx/CVE-2024-52393.json) (`2024-11-14T18:15:26.140`) -- [CVE-2024-52396](CVE-2024/CVE-2024-523xx/CVE-2024-52396.json) (`2024-11-14T18:15:26.377`) -- [CVE-2024-52524](CVE-2024/CVE-2024-525xx/CVE-2024-52524.json) (`2024-11-14T18:15:26.610`) -- [CVE-2024-6068](CVE-2024/CVE-2024-60xx/CVE-2024-6068.json) (`2024-11-14T17:15:07.680`) +- [CVE-2024-10394](CVE-2024/CVE-2024-103xx/CVE-2024-10394.json) (`2024-11-14T20:15:20.777`) +- [CVE-2024-10396](CVE-2024/CVE-2024-103xx/CVE-2024-10396.json) (`2024-11-14T20:15:20.917`) +- [CVE-2024-10397](CVE-2024/CVE-2024-103xx/CVE-2024-10397.json) (`2024-11-14T20:15:21.057`) +- [CVE-2024-3760](CVE-2024/CVE-2024-37xx/CVE-2024-3760.json) (`2024-11-14T19:15:06.327`) +- [CVE-2024-49025](CVE-2024/CVE-2024-490xx/CVE-2024-49025.json) (`2024-11-14T20:15:25.207`) +- [CVE-2024-51688](CVE-2024/CVE-2024-516xx/CVE-2024-51688.json) (`2024-11-14T20:15:25.810`) +- [CVE-2024-52369](CVE-2024/CVE-2024-523xx/CVE-2024-52369.json) (`2024-11-14T19:15:09.533`) +- [CVE-2024-52370](CVE-2024/CVE-2024-523xx/CVE-2024-52370.json) (`2024-11-14T19:15:09.760`) ### CVEs modified in the last Commit -Recently modified CVEs: `42` +Recently modified CVEs: `72` -- [CVE-2024-50252](CVE-2024/CVE-2024-502xx/CVE-2024-50252.json) (`2024-11-14T18:08:17.857`) -- [CVE-2024-50253](CVE-2024/CVE-2024-502xx/CVE-2024-50253.json) (`2024-11-14T18:09:15.067`) -- [CVE-2024-50254](CVE-2024/CVE-2024-502xx/CVE-2024-50254.json) (`2024-11-14T18:09:48.530`) -- [CVE-2024-50255](CVE-2024/CVE-2024-502xx/CVE-2024-50255.json) (`2024-11-14T18:10:12.383`) -- [CVE-2024-50256](CVE-2024/CVE-2024-502xx/CVE-2024-50256.json) (`2024-11-14T18:11:08.250`) -- [CVE-2024-50257](CVE-2024/CVE-2024-502xx/CVE-2024-50257.json) (`2024-11-14T18:11:39.990`) -- [CVE-2024-50258](CVE-2024/CVE-2024-502xx/CVE-2024-50258.json) (`2024-11-14T18:12:39.487`) -- [CVE-2024-50259](CVE-2024/CVE-2024-502xx/CVE-2024-50259.json) (`2024-11-14T18:24:11.470`) -- [CVE-2024-50261](CVE-2024/CVE-2024-502xx/CVE-2024-50261.json) (`2024-11-14T18:24:41.597`) -- [CVE-2024-50306](CVE-2024/CVE-2024-503xx/CVE-2024-50306.json) (`2024-11-14T18:35:03.743`) -- [CVE-2024-50837](CVE-2024/CVE-2024-508xx/CVE-2024-50837.json) (`2024-11-14T17:15:07.257`) -- [CVE-2024-50838](CVE-2024/CVE-2024-508xx/CVE-2024-50838.json) (`2024-11-14T17:15:07.333`) -- [CVE-2024-50839](CVE-2024/CVE-2024-508xx/CVE-2024-50839.json) (`2024-11-14T17:15:07.410`) -- [CVE-2024-50840](CVE-2024/CVE-2024-508xx/CVE-2024-50840.json) (`2024-11-14T17:15:07.473`) -- [CVE-2024-50841](CVE-2024/CVE-2024-508xx/CVE-2024-50841.json) (`2024-11-14T17:15:07.543`) -- [CVE-2024-50842](CVE-2024/CVE-2024-508xx/CVE-2024-50842.json) (`2024-11-14T17:15:07.613`) -- [CVE-2024-51591](CVE-2024/CVE-2024-515xx/CVE-2024-51591.json) (`2024-11-14T17:51:14.717`) -- [CVE-2024-51606](CVE-2024/CVE-2024-516xx/CVE-2024-51606.json) (`2024-11-14T17:17:28.997`) -- [CVE-2024-51608](CVE-2024/CVE-2024-516xx/CVE-2024-51608.json) (`2024-11-14T17:14:55.070`) -- [CVE-2024-51609](CVE-2024/CVE-2024-516xx/CVE-2024-51609.json) (`2024-11-14T17:10:36.463`) -- [CVE-2024-51793](CVE-2024/CVE-2024-517xx/CVE-2024-51793.json) (`2024-11-14T17:54:09.443`) -- [CVE-2024-51820](CVE-2024/CVE-2024-518xx/CVE-2024-51820.json) (`2024-11-14T18:03:02.447`) -- [CVE-2024-51837](CVE-2024/CVE-2024-518xx/CVE-2024-51837.json) (`2024-11-14T18:43:03.537`) -- [CVE-2024-51843](CVE-2024/CVE-2024-518xx/CVE-2024-51843.json) (`2024-11-14T18:53:54.760`) -- [CVE-2024-5982](CVE-2024/CVE-2024-59xx/CVE-2024-5982.json) (`2024-11-14T18:52:16.567`) +- [CVE-2024-47446](CVE-2024/CVE-2024-474xx/CVE-2024-47446.json) (`2024-11-14T19:10:24.197`) +- [CVE-2024-49579](CVE-2024/CVE-2024-495xx/CVE-2024-49579.json) (`2024-11-14T19:24:45.603`) +- [CVE-2024-49580](CVE-2024/CVE-2024-495xx/CVE-2024-49580.json) (`2024-11-14T19:25:47.433`) +- [CVE-2024-50305](CVE-2024/CVE-2024-503xx/CVE-2024-50305.json) (`2024-11-14T19:35:16.650`) +- [CVE-2024-50634](CVE-2024/CVE-2024-506xx/CVE-2024-50634.json) (`2024-11-14T20:40:43.690`) +- [CVE-2024-50837](CVE-2024/CVE-2024-508xx/CVE-2024-50837.json) (`2024-11-14T19:35:17.623`) +- [CVE-2024-50838](CVE-2024/CVE-2024-508xx/CVE-2024-50838.json) (`2024-11-14T19:35:18.427`) +- [CVE-2024-50839](CVE-2024/CVE-2024-508xx/CVE-2024-50839.json) (`2024-11-14T19:35:19.240`) +- [CVE-2024-50840](CVE-2024/CVE-2024-508xx/CVE-2024-50840.json) (`2024-11-14T19:35:20.033`) +- [CVE-2024-50841](CVE-2024/CVE-2024-508xx/CVE-2024-50841.json) (`2024-11-14T19:35:20.837`) +- [CVE-2024-50842](CVE-2024/CVE-2024-508xx/CVE-2024-50842.json) (`2024-11-14T19:35:21.650`) +- [CVE-2024-50843](CVE-2024/CVE-2024-508xx/CVE-2024-50843.json) (`2024-11-14T19:35:22.450`) +- [CVE-2024-51484](CVE-2024/CVE-2024-514xx/CVE-2024-51484.json) (`2024-11-14T20:14:44.360`) +- [CVE-2024-51485](CVE-2024/CVE-2024-514xx/CVE-2024-51485.json) (`2024-11-14T20:06:12.627`) +- [CVE-2024-51486](CVE-2024/CVE-2024-514xx/CVE-2024-51486.json) (`2024-11-14T19:55:34.890`) +- [CVE-2024-51487](CVE-2024/CVE-2024-514xx/CVE-2024-51487.json) (`2024-11-14T19:37:53.107`) +- [CVE-2024-51488](CVE-2024/CVE-2024-514xx/CVE-2024-51488.json) (`2024-11-14T20:12:58.443`) +- [CVE-2024-51489](CVE-2024/CVE-2024-514xx/CVE-2024-51489.json) (`2024-11-14T20:12:52.027`) +- [CVE-2024-51490](CVE-2024/CVE-2024-514xx/CVE-2024-51490.json) (`2024-11-14T20:13:01.587`) +- [CVE-2024-51587](CVE-2024/CVE-2024-515xx/CVE-2024-51587.json) (`2024-11-14T20:26:14.467`) +- [CVE-2024-51588](CVE-2024/CVE-2024-515xx/CVE-2024-51588.json) (`2024-11-14T20:26:28.047`) +- [CVE-2024-51589](CVE-2024/CVE-2024-515xx/CVE-2024-51589.json) (`2024-11-14T20:26:41.497`) +- [CVE-2024-51597](CVE-2024/CVE-2024-515xx/CVE-2024-51597.json) (`2024-11-14T20:27:46.943`) +- [CVE-2024-52350](CVE-2024/CVE-2024-523xx/CVE-2024-52350.json) (`2024-11-14T20:22:24.387`) +- [CVE-2024-52351](CVE-2024/CVE-2024-523xx/CVE-2024-52351.json) (`2024-11-14T20:24:39.083`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 99f74d0986c..dda0ed7a91b 100644 --- a/_state.csv +++ b/_state.csv @@ -11997,7 +11997,7 @@ CVE-2005-0999,0,0,ecca03fc38e9f5ae3e58e3725ca38d3553d21cd1060d462173b32ea09b9c08 CVE-2005-1000,0,0,876733ec970e875daec33609ebf439cfdd17ab98e8699b5ea8b6434b457f0939,2017-07-11T01:32:28.970000 CVE-2005-10001,0,0,2693db2d9b06c7ac36b92ee416e4e3effc2afa7e0b62b3415561be1db7294514,2024-08-08T00:15:23.127000 CVE-2005-10002,0,0,dc6fd831307ffcb4928dc15e5f0d4bca55123aa5ffaf8e97bc126f60e3f9b493,2024-05-17T00:24:26.580000 -CVE-2005-10003,0,0,44493880725cd8839360edfe510264f0a320784d6ddba11287efa4e03d5d872b,2024-10-18T12:52:33.507000 +CVE-2005-10003,0,1,367ed1bdab9b1c724256e2f713521055b99a14b98489eb580101edbb999a0048,2024-11-14T19:35:58.467000 CVE-2005-1001,0,0,15f915129c529eb106d656586fee07bf3a049367ce9223cf255e6d44dfb5abdc,2017-07-11T01:32:29.047000 CVE-2005-1002,0,0,9c4a3a87f279404d6b0eb0a64f730f2b1c061844b6065693972fceeec1e57e20,2016-10-18T03:16:25.287000 CVE-2005-1003,0,0,a961fab12b3a0362183c5cb7e641f0b1d0fc1fc8dc55e4a55bb9ee3700911bfa,2017-07-11T01:32:29.110000 @@ -228634,7 +228634,7 @@ CVE-2023-37759,0,0,1415b636fde1d1e674552edec835a4b3f13774f91e7a6f36739442bfd5509 CVE-2023-3776,0,0,9b9e6fdf1c4bc5c96e654d9815690fa791039ca2db35eb2aa960559d73c92292,2024-08-22T20:24:45.973000 CVE-2023-37765,0,0,fb5a4ab315cc617fe99ad635daf21b9c79c91c61de43c4e314280f3386a0498a,2024-11-08T15:35:06.813000 CVE-2023-37766,0,0,ce98ea852fb52f0469c90b820fae6227fe146452d537f4ff6e92411f9ad946cd,2024-11-08T15:35:07.720000 -CVE-2023-37767,0,0,60856d57fef3bb2747e75b5f6421f739b7660d5998660526a164bb704d8a46c4,2023-07-19T13:23:15.433000 +CVE-2023-37767,0,1,f823bf48e7d8332b29718e3997d8b10cff2429fa94b0b410b71d2eaeac048ffd,2024-11-14T19:35:01.150000 CVE-2023-37769,0,0,371b615184f3bd513f2ca6abbebf9bd837602f137112e4a844bb2ff233999791,2023-07-28T13:22:09.480000 CVE-2023-3777,0,0,321a63c9d284567c8aae4befb0438a62ebf3ef396cb82b681c3d1067ce1fcd33,2024-08-26T16:08:25.727000 CVE-2023-37770,0,0,4f05dc848203776d620f57ea5888526c8203866e548c30aa9fb65dc5e4e7d188,2023-07-27T03:41:54.570000 @@ -232642,7 +232642,7 @@ CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79add CVE-2023-42838,0,0,d2c7cb1076afde325efe19ebd9189ea0f891ccc309473cf4021fe8881f3b600e,2024-08-09T16:35:01.893000 CVE-2023-42839,0,0,765dd4087b9c648a2614e4f77e8cb2a77a0f084da4aebcff5c956301f137e1c8,2024-02-22T19:07:27.197000 CVE-2023-4284,0,0,61fe561181169a40965e309f813ea607fd0daab2834cbef8e665fe00162fc64c,2023-11-07T04:22:25.233000 -CVE-2023-42840,0,0,7d5761fec7b6f15aa84a1074a2da48e2a22e511dd264acb4eb97aeef295d728b,2024-02-22T19:07:27.197000 +CVE-2023-42840,0,1,cd82264bc86c6b2cae0cfb802b7b76d55587d9910f0b6c0aa67585421b1bd358,2024-11-14T19:35:02.180000 CVE-2023-42841,0,0,1ba74cc5d5e854bd871cdd5a2c1321cd1721679505b9b640a088d8b01d078fa3,2024-09-10T21:35:05.947000 CVE-2023-42842,0,0,e6c3110fb32fb31efa637e19595877e38152993b501001f3e91f7f4195c48558,2023-12-13T01:15:08.050000 CVE-2023-42843,0,0,fdcaee2947060de20442c439e087fd1ee28a11ba66828a8d78ea7542fc20bb0f,2024-11-04T17:35:05.077000 @@ -237879,7 +237879,7 @@ CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530 CVE-2023-50432,0,0,c08f27e1996614a80b06549eae73e36c5ce5ae51536270832f0a5c16afd3388e,2024-04-30T13:11:16.690000 CVE-2023-50433,0,0,1236cb1d1900890c10f0cec86536128d745a880515430cbaebcfc664a41166fd,2024-11-01T20:35:02.620000 CVE-2023-50434,0,0,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000 -CVE-2023-50436,0,0,ed32d35f9bbdbf2811a8eab402768e68d119c724560cb58715088d750e00a6f9,2024-02-29T13:49:47.277000 +CVE-2023-50436,0,1,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000 CVE-2023-50437,0,0,5d04fa2c2abb29eb8832a1e8bf568c0f0a216e516c111aa1d77c21b68cee54fb,2024-08-13T20:35:01.850000 CVE-2023-50439,0,0,6b771bac02a72f028393ea4844a2183a7f75d742009abba66069d074c7166b89,2023-12-20T18:29:44.920000 CVE-2023-5044,0,0,70d08631485d3df486bfde2a9938b1cd4cc232cbf333408306960d4923f33474,2024-03-07T17:15:12.073000 @@ -239127,7 +239127,7 @@ CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb6 CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000 CVE-2023-52356,0,0,7dccc26c119ffd507dca45bc259afb8dfb8baea8acfee17fa269d8f7d722129f,2024-09-16T20:15:45.480000 CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9b50,2024-02-20T19:50:53.960000 -CVE-2023-52358,0,0,0a9b9b1ce599c5b6e28af28108c550a9307f5fa18440515cf987b65d0e1a3c4d,2024-02-20T19:50:53.960000 +CVE-2023-52358,0,1,7c9601112ec312a1dc4d0e883a26142a68f2368228707be8b0f1eb6cd36b27ff,2024-11-14T20:35:09.213000 CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000 CVE-2023-5236,0,0,fb6c3d46b555cdb6e2e8cfed896e892086c77c4bb29daa7e1e3231fc7a825bf9,2024-09-16T14:15:13.093000 CVE-2023-52360,0,0,ecfeb27a76b3cb4fc769668e2502fbe290543c70b0ad7217d769381a048f79b6,2024-08-01T13:45:37.677000 @@ -239157,7 +239157,7 @@ CVE-2023-52381,0,0,612a15eb78d5f66fad16ca7ce12c6865c6ce501f4c4f47c30f542596a8c6d CVE-2023-52382,0,0,ff68df838ff80bf3e32ebfcc4daa22b26645bb5f933b0ba12d2f456af89feb1f,2024-04-17T07:15:07.860000 CVE-2023-52383,0,0,c4deca95a8f07fb7c22e4b0e0a89d522f9cee543c8642a4a0eb87f9ff81520a5,2024-05-14T16:13:02.773000 CVE-2023-52384,0,0,1b28b5db39952ebab24cd0a63a53f39f49ccb355e1098aabd754534aa358eb82,2024-05-14T16:13:02.773000 -CVE-2023-52385,0,0,4ae1d46cf462cfb34863df2df93bf59cc8a9a1d66d4276d9b536de0d4da8bf65,2024-04-08T18:48:40.217000 +CVE-2023-52385,0,1,561fc607f16ade31646311120f49c331cbd56a95de1d2c8d93f073ef13e4d9d9,2024-11-14T20:35:09.457000 CVE-2023-52386,0,0,2a4cd33d840fba69ad11f548bc845cd6f6c618831136cbd5b4aaca4a2cf8bb8e,2024-04-08T18:48:40.217000 CVE-2023-52387,0,0,b2650028ac123e8e842277def6205aab4a35adb4993f16c1142f88bb1bfd4c25,2024-02-20T19:50:53.960000 CVE-2023-52388,0,0,fba652f56323ecabc4b9d2851593ecc2735d11f138371eaf93b02c0479a98a71,2024-08-29T20:35:48.347000 @@ -239314,7 +239314,7 @@ CVE-2023-52552,0,0,263d078676b8ab80374bf1a1af537e9950d34ffb536f631dc6fba4ba090af CVE-2023-52553,0,0,5e22a2db35ff14a3185f1e3a5a41a0a5f1eb054fee3abb62e16eda3a347f57d8,2024-11-05T16:35:06.793000 CVE-2023-52554,0,0,7c787c5730bd1ba7c71a82d47c4e7d44ddec67c0569424251b431e6010a9a5a6,2024-11-05T20:35:14.087000 CVE-2023-52555,0,0,5e36334335ab678d55bf6cac0b324af1ed187d2c730be3da7b4f852afbed6d98,2024-08-29T20:35:49.350000 -CVE-2023-52556,0,0,7e3a11269360b6276bc76b9c4c1e84711ad94d2bfd285528e8777ca57579453a,2024-03-01T22:22:25.913000 +CVE-2023-52556,0,1,f1f75b940389db0870ae4241ca39f9296fd800bfd62f55176223a4222383bf4c,2024-11-14T20:35:09.700000 CVE-2023-52557,0,0,5ed6bf0a491f3ec717ecac7d6471909703923a149768b3b4e52317d23f8d24e0,2024-08-01T13:45:39.150000 CVE-2023-52558,0,0,7a2164a6ea51bedc215ff5cabec224ee6fc723b56d536531a97955800cae293d,2024-03-01T22:22:25.913000 CVE-2023-52559,0,0,04af586fb20ce25776f7cc5f46253da9986ceb3c1247d4979acb72706c00df50,2024-03-04T13:58:23.447000 @@ -239486,7 +239486,7 @@ CVE-2023-5271,0,0,6ca5aae6cfeafe6825b7b5b7a5960426f19016861ea4d7372261699d3ccb81 CVE-2023-52710,0,0,ff58675472b7f5253b62ab393b160b1cf349e6c1ae9c4d19bd1e0fd775a66fcd,2024-05-28T12:39:28.377000 CVE-2023-52711,0,0,7f19105f212eeeb82211cb5994a99c19f7a30d3dc3b433f91a0f9224ea063ce7,2024-05-28T12:39:28.377000 CVE-2023-52712,0,0,73fcfe56ef063242282f261e724c58a36beee3e73b4f79775b264a51d001342d,2024-05-28T12:39:28.377000 -CVE-2023-52713,0,0,e0911b0cf80bf6534e65542375951beb0e5886b953272bd0f3008029f846fea2,2024-04-08T18:48:40.217000 +CVE-2023-52713,0,1,bdf8d958353ec868d361ade9a3e967148b0b330845268fe3373dfde7a9053cbf,2024-11-14T20:35:09.950000 CVE-2023-52714,0,0,64949270c571827fa0b1878e73815a64c054140ffbbc1db3039e41e2500fc2d8,2024-08-14T19:35:16.973000 CVE-2023-52715,0,0,9d265f7602d20da9561a5e602d40ae6467560b79969c95ff6054722335d07e0d,2024-04-08T18:48:40.217000 CVE-2023-52716,0,0,04aef122aa6e9fa538042470d9e6c3bb7020a52932e8cd0f2e1328b4a81042f6,2024-08-29T20:35:50.213000 @@ -242512,7 +242512,7 @@ CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000 CVE-2024-10141,0,0,1a2024f75553982bce647b93dbf2bff672eefec5950fa457467c64b98f6e45c7,2024-10-23T20:27:09.370000 CVE-2024-10142,0,0,f8d897c68f0699e753bf4964aa75eec3baa1d06414695c8d5256c262c45a3b84,2024-10-22T18:11:20.450000 -CVE-2024-10146,0,0,5c8d93b22b0d392814df49f4ec3c42fba34f1e8a22bc1ba34d61b8cdb061b7c7,2024-11-14T06:15:07.080000 +CVE-2024-10146,0,1,a6ea98fb4b84357fa99272a99b0f27b60fff4866bf525eca471cf9c7afe292b6,2024-11-14T19:35:05.160000 CVE-2024-10148,0,0,83c51017fcaad8303b49e241d62740cf9ee14ff3b98ac6e60e27203bec158551,2024-11-06T16:02:22.120000 CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000 CVE-2024-10150,0,0,980e5c556ba92cfe6f78a7c5edf14225adf63d1f935caa703239c8f6c3933115,2024-11-05T17:47:35.353000 @@ -242679,6 +242679,9 @@ CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332 CVE-2024-10389,0,0,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077b56,2024-11-04T18:50:05.607000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 +CVE-2024-10394,1,1,4cdc66d522045d131b62bdfb9e89fa2c725ded5ae77d9c9a336284d0b06165be,2024-11-14T20:15:20.777000 +CVE-2024-10396,1,1,c092919609de9bd4dd7de7dc30b35cfdf8abab6f06aaf1fb65271dd7702e20cf,2024-11-14T20:15:20.917000 +CVE-2024-10397,1,1,4228f9e0bc2b26997ae55684f775720995f3ce71af3c6095d90bd9baad018ccd,2024-11-14T20:15:21.057000 CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000 CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000 @@ -242851,21 +242854,21 @@ CVE-2024-10667,0,0,8c3b4c9a2974763bbe2a826956e8c92748c65fd783dec0a85476416fcfdde CVE-2024-10668,0,0,ad6a1e988aa7f35451b56c605706e2e8d28df7ceaf4537d00be5d4d05186782b,2024-11-08T19:01:03.880000 CVE-2024-10669,0,0,23093ef05e499c533c3a2d4bc80a20165a28e5f349ac3746239f8d0e4e64a94d,2024-11-12T13:56:24.513000 CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000 -CVE-2024-10672,0,1,1c6c91368b0def5a51813fa0531d7bb91e94a3b53eca32eed9c5f65d5616e882,2024-11-14T18:49:26.733000 +CVE-2024-10672,0,0,1c6c91368b0def5a51813fa0531d7bb91e94a3b53eca32eed9c5f65d5616e882,2024-11-14T18:49:26.733000 CVE-2024-10673,0,0,721fbd2c7f4fd52d46e9315cad58bcfcec74c6705f993232b5ed88d0e5ca2848,2024-11-12T13:56:24.513000 CVE-2024-10674,0,0,d16f584849190e67ddd9b044fe809cc53716f0604b4d903c0b675313c791d9a1,2024-11-12T13:56:24.513000 CVE-2024-10676,0,0,c4d26028c65dae8ee24a6ae71fbafbbbdf2f434e1b4ee4c7591876108357a5b0,2024-11-12T13:56:24.513000 CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000 CVE-2024-10683,0,0,81b5edc9806b9d41a626cf134b47e67b5d64e10aaf06aa6e2f1151e4509d5dd6,2024-11-12T13:56:24.513000 CVE-2024-10684,0,0,dd46c46b63d005f5eba7cd0edc585eb1b3eb2cd540c331f34ccb08dcb21efeb7,2024-11-13T17:01:16.850000 -CVE-2024-10685,0,0,735dc2f0f480642d8ccf07f78f6e1a8d59da145d42e7702cb885b90e2b756411,2024-11-12T13:55:21.227000 -CVE-2024-10686,0,1,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d49750a6,2024-11-14T18:15:17.943000 +CVE-2024-10685,0,1,1d5e3517448dda5f262310078551ab26523509e6a1746aada937566f5315b2a6,2024-11-14T19:40:14.953000 +CVE-2024-10686,0,0,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d49750a6,2024-11-14T18:15:17.943000 CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000 CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000 CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000 CVE-2024-10693,0,0,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000 CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000 -CVE-2024-10695,0,0,b5551f18720c3992d4cbffe3b44039a24aa131396124cb89424c3c4f8c05f581,2024-11-12T13:55:21.227000 +CVE-2024-10695,0,1,c91c88b2e014c926c977a623d612f44936109b69ef58435a4fdca68abda40e21,2024-11-14T19:44:16.020000 CVE-2024-10697,0,0,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000 CVE-2024-10698,0,0,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000 CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000 @@ -243067,9 +243070,9 @@ CVE-2024-11068,0,0,4b051dd1e90eddfcfc88c8711edd0209408a9ba2f8b4588824fefefed2e09 CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000 CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000 CVE-2024-11073,0,0,7b275d77346d3baae5145fae1e1bc949854bb720c1a66c386a5f1f31e520bae5,2024-11-12T13:55:21.227000 -CVE-2024-11074,0,0,b0b432f9f11178b738766f16248994f53b322af072bbf835d11e0cca21060089,2024-11-12T13:55:21.227000 -CVE-2024-11076,0,0,68aaa806834c6f72f1c370289d32181f8562b1175818d8ed99e5a507b1de4718,2024-11-12T13:55:21.227000 -CVE-2024-11077,0,1,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000 +CVE-2024-11074,0,1,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000 +CVE-2024-11076,0,1,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000 +CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000 CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000 CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000 CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000 @@ -243647,7 +243650,7 @@ CVE-2024-1678,0,0,d7ff889a45c19600d651a095e777206640b8492b0764403803a17b2b0960a8 CVE-2024-1679,0,0,17bb9123bbf364aa33e966e6c2425a349b78ca4b0bae773030e2388aec7f2994,2024-05-02T18:00:37.360000 CVE-2024-1680,0,0,bd026f6f4577d87113b1d29b371eaa9932e24a38c7da0012faa1c1e94f133830,2024-03-13T18:15:58.530000 CVE-2024-1681,0,0,1a482680a055401416ddaa083a69f1c47b6c9194da0d7c18ae32e2ad08501e23,2024-04-22T13:28:50.310000 -CVE-2024-1682,1,1,4ff469fb84591d897d3f78d88681c151b0fdc8d5b35d0167b2763ec31141a950,2024-11-14T18:15:18.193000 +CVE-2024-1682,0,0,4ff469fb84591d897d3f78d88681c151b0fdc8d5b35d0167b2763ec31141a950,2024-11-14T18:15:18.193000 CVE-2024-1683,0,0,5eea2ca94f33514f1a10330cfb76f46bfaa5dd8e7036c4fcc56926960dff400d,2024-02-23T02:42:54.547000 CVE-2024-1684,0,0,3968c3bdd3b3ae3fb293826cfdf6d87aa6258fc78cc6b2c763e860d1cdec7f47,2024-03-13T18:15:58.530000 CVE-2024-1685,0,0,52ebc28025f57fba31216035550fa84131fc9d72b996fd38059ce631ee298162,2024-03-17T22:38:29.433000 @@ -246923,7 +246926,7 @@ CVE-2024-23786,0,0,6ae4fe60ce393a411ea48b9876215e539a050978e709da57dec7a256f2428 CVE-2024-23787,0,0,7a8ddce6195bf931c799fcf4083a75cf1b9842febd9c3da44a75515daf822e08,2024-08-13T14:35:10.747000 CVE-2024-23788,0,0,64abbc30839e8d16e55707492265880e002ac43878f4aa04dd4b122fd59c9c73,2024-08-09T16:35:04.550000 CVE-2024-23789,0,0,ebe69de329ce3066ddae75bf202509726e55e928e26b7120b9a03b158a88c139,2024-08-14T19:35:20.280000 -CVE-2024-2379,0,0,0712844accba64ea814c5017a1af61ea7caadbf030deed7db72ba68c9fce60bc,2024-07-30T02:15:05.397000 +CVE-2024-2379,0,1,bf50084b0f6625e9f2f932a65a78a5f1b45a21762f6b47e6f1c8cee00bfd1e05,2024-11-14T20:35:22.613000 CVE-2024-23790,0,0,10fd61ba3db4d7c66d81b3afd519574867d168f5ef59d8caac21df5f30755ae0,2024-02-02T02:07:58.653000 CVE-2024-23791,0,0,244621ff2d433005513b939ef7ab8ae44d25c483ec850474bc054b795de67574,2024-02-02T02:07:28.850000 CVE-2024-23792,0,0,f34fcbde7640056d2156c42bbb24f1d1b396f26de8a742cdc375ac91a383f3c8,2024-02-02T02:07:40.577000 @@ -247965,8 +247968,8 @@ CVE-2024-25422,0,0,183c4ec0faabad98f4264a6cd25b9f8acfe9ee005e0931f44bde0815e323c CVE-2024-25423,0,0,9c38591521533b12d0d8640f97867e59ae0ba009f0e2d3612c6f7b4eda265498,2024-07-03T01:48:50.347000 CVE-2024-25428,0,0,a1baa90ebade4117b4da7a9052f9f7b7385230216b8f9a62456cca560644c28a,2024-08-01T13:47:44.563000 CVE-2024-2543,0,0,90e05f36a3d2dfc0c0cb0570a48a9a80b8042b66097a9bbd3537fdf34c177bc6,2024-04-10T13:23:38.787000 -CVE-2024-25431,0,0,f7a29023d8c25d655bb74a17238710ea0f203fcbcb981c8e00225473e26857c3,2024-11-13T15:35:07.420000 -CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfcdb4,2024-03-04T13:58:23.447000 +CVE-2024-25431,0,1,f8fa003a847bb4543088b3781a569aaae2e4aa029e3153cd371cce5663cfcfcd,2024-11-14T20:42:47.297000 +CVE-2024-25434,0,1,63dc4e430ec66833460d8a2f31e4264b2ff025b996c4a8f44483af6e7e8189f7,2024-11-14T20:35:13.403000 CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000 CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000 CVE-2024-25438,0,0,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000 @@ -248237,7 +248240,7 @@ CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c1 CVE-2024-25845,0,0,f312beb2aa8aad65c6f2e2cd8b391abcdec4221175ade5509f4776c9d68bd6f9,2024-08-27T20:35:14.373000 CVE-2024-25846,0,0,1b01ded1319f85d0e1b31b4bad3147fa711a456779b7a8a2cc484b2fe23c37c9,2024-08-08T20:35:05.147000 CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde784,2024-08-01T13:47:53.253000 -CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000 +CVE-2024-25848,0,1,94e717b82be5b6df9a732c7bc789b8a92af8746fc6d8d5b662ce1272090a4840,2024-11-14T20:35:14.383000 CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000 CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000 CVE-2024-25850,0,0,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000 @@ -248693,7 +248696,7 @@ CVE-2024-26318,0,0,e49f81956340b47d12c2b6c8e60e793f3ff0ae30227c439a8cc649c04f3ff CVE-2024-2632,0,0,68039af9d391e4f53fc42bf0bf9c6a75cff13780e172f64ceb26ab23a8a8d5db,2024-03-19T13:26:46 CVE-2024-26327,0,0,30d08d577d44d38c98e8d09a3ca2e28a354f8d84b13e8b7475d667e0aa1a602c,2024-07-03T01:49:38.810000 CVE-2024-26328,0,0,8e220872ce6fda1bf070a0407dc485e9fea465cf19de6295b3aa4e1694aacee0,2024-11-06T15:35:12.510000 -CVE-2024-26329,0,0,3b0eb6608df7a74fc8a9d5773ed651310cd73a96d8ef2afac673200b449390fe,2024-04-05T12:40:52.763000 +CVE-2024-26329,0,1,6cf7072c8c7ab5f09657771928ed8ed0d8504124fb97a810035e6c97c6ae3c1a,2024-11-14T20:35:15.287000 CVE-2024-2633,0,0,5cbc6482108bfabb58a338263ca9ce41f75b102c0fb9b1f68c08206c04598c5e,2024-03-19T13:26:46 CVE-2024-26330,0,0,57903b982740769cb2bfceb4ed7ca578f76569bff9879a33cdaca56e77a02b3c,2024-11-01T20:35:07.497000 CVE-2024-26331,0,0,1ee618c6a83f1d80e2b7639e36ef676bbc9cac1ae9fe1beda2944758bd324a0a,2024-08-06T19:35:02.510000 @@ -249754,7 +249757,7 @@ CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000 CVE-2024-2759,0,0,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000 -CVE-2024-27592,0,0,d1ab0f4f443cdfc3ef1bdb598e0eca6a6dd41bceb98b2d42145b4b52d872d5f3,2024-04-16T23:15:08.690000 +CVE-2024-27592,0,1,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000 CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000 CVE-2024-27602,0,0,ff68a7dfbe76578be745d2be853eb13367fbf75dc768ea067191484500d8515d,2024-07-11T15:05:30.183000 @@ -250206,7 +250209,7 @@ CVE-2024-28158,0,0,e11a9678e4f2f0242962248a4f5f96e3f4098382c9b4895b78df62a6d496f CVE-2024-28159,0,0,4a9f4f91b8aea86a42bde029558a44ab2b24f6212168e8c6c34372a6626e7248,2024-08-27T20:35:21.767000 CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000 CVE-2024-28160,0,0,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000 -CVE-2024-28161,0,1,aa5f9db377232f49e906c38d93bc3880cc53cbb7f55a8f6a819061fb4aaf5744,2024-11-14T17:35:04.520000 +CVE-2024-28161,0,0,aa5f9db377232f49e906c38d93bc3880cc53cbb7f55a8f6a819061fb4aaf5744,2024-11-14T17:35:04.520000 CVE-2024-28162,0,0,755d306fd311701bbe86ac9be3ec2b0c299df65b6f39b9390d67e843d3998f72,2024-11-12T16:35:08.007000 CVE-2024-28163,0,0,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000 CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000 @@ -250511,7 +250514,7 @@ CVE-2024-2875,0,0,6cdb006d1a6c5034276b51f0b43f593cf2fffd4a38086e818a1876a540999e CVE-2024-28750,0,0,d780513969d95a2a8e4659069a1cd3d6cd97b1c91cdf4b1dec2cf83a7354c7e9,2024-07-09T18:19:14.047000 CVE-2024-28751,0,0,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3d0d,2024-07-09T18:19:14.047000 CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e95ca,2024-08-01T13:49:17.413000 -CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000 +CVE-2024-28753,0,1,4002240eba0a3970a9e2bc0d65ac010136c812b867a4455af92d4cbdee24b2a1,2024-11-14T20:35:21.680000 CVE-2024-28754,0,0,9b31cb39cd5b77a5e56c0bcf42c58dcc3858bfa4f0abada8f077294e21b8f1b4,2024-11-01T19:35:21.447000 CVE-2024-28755,0,0,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000 CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000 @@ -250836,7 +250839,7 @@ CVE-2024-29117,0,0,7cbc86fd47b57aac5bdcb66853eac01c2823bf8c332ca79b8820d49cc7cba CVE-2024-29118,0,0,1cf920921a96fd5f0eb418dbd890604a04de50213d4066e1f2401f217f180df5,2024-03-19T16:33:58.680000 CVE-2024-29119,0,0,738a7b7e804b6feffc33f998d5fbd83a1b05ef16b9a6d435f583f42a46ae6f6c,2024-11-12T13:55:21.227000 CVE-2024-2912,0,0,f62836a8afe15e49afc11abef746f6e05f5ae0f68099e584fae53277c8c9f769,2024-05-22T16:15:09.713000 -CVE-2024-29120,0,1,7f41b964c09ac8aa95a0035e77a220dee0c782999c30c100c6ecb39548161767,2024-11-14T17:35:05.343000 +CVE-2024-29120,0,0,7f41b964c09ac8aa95a0035e77a220dee0c782999c30c100c6ecb39548161767,2024-11-14T17:35:05.343000 CVE-2024-29121,0,0,6325c10b522d77de76e2af8d35d0ad7dde2dffd7703677e5c3f9cd67ab864731,2024-03-19T16:33:58.680000 CVE-2024-29122,0,0,661ef3e986563bd80f846a4ddab64b8b192e2d4e3524465144ceb6bed1a37def,2024-03-19T16:33:58.680000 CVE-2024-29123,0,0,ebf9249691adeb2d60017b147325d5448759ac253d439ee41cb427cd5527b99e,2024-03-19T16:33:58.680000 @@ -250927,7 +250930,7 @@ CVE-2024-29208,0,0,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074 CVE-2024-29209,0,0,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000 CVE-2024-2921,0,0,db69ed599921b3347a9e090088ac60a033292b080a263fe6dc6a7861e5eadd49,2024-11-07T16:35:16.250000 CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000 -CVE-2024-29211,0,0,cac9131decc256e64ee1b892c76f8872c9f6c8a09a15f4735f9724dfd6f004f1,2024-11-13T17:01:16.850000 +CVE-2024-29211,0,1,8c8d8e45b5c218fe77a714d1c8b6c57d4f639d22f03f0277fa791692b77b52ed,2024-11-14T19:09:01.213000 CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000 CVE-2024-29213,0,0,923c285048ea8e8ada1ec8fc14c3379597d106a93dc5f7c0191835b40c0543ad,2024-10-21T18:35:11.263000 CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40afd,2024-05-28T12:39:42.673000 @@ -251572,7 +251575,7 @@ CVE-2024-30199,0,0,c87ad7b2d130da7ff087acec94fffbb9d8ac3e1c8f24ab4590517eee45b03 CVE-2024-3020,0,0,a9be8733f9c5e2508f0c4f960f0c984a8f23212df5d63b8e13b98f95d9597dbc,2024-04-10T13:23:38.787000 CVE-2024-30200,0,0,c455a1dbb6f9d915db0da82c73cca8bc6fa2d78acc476d7a8456fd9d1e2ea4e1,2024-03-28T12:42:56.150000 CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735ecd,2024-03-27T12:29:30.307000 -CVE-2024-30202,0,0,2545347c9158a3f795ad08e02fee2783f83a0102d3b3c6cd088e6c61c3ec608b,2024-05-01T18:15:19.553000 +CVE-2024-30202,0,1,ecd5c9b4bd0ebc202276e86a3d9a7e9f6b3bf262206739b2cbd70f27623f88ba,2024-11-14T20:35:23.057000 CVE-2024-30203,0,0,8b447cfaa3c0f29bed1fa430ec69e0ff721af51bf1f0d5669fc03f342b79df4c,2024-11-07T11:35:05.040000 CVE-2024-30204,0,0,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000 CVE-2024-30205,0,0,59ff5e238770a16ac12a044b9f567826327ea645bd7ddc5284c92e9966a63ace,2024-05-01T17:15:32.820000 @@ -252004,7 +252007,7 @@ CVE-2024-30639,0,0,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078 CVE-2024-3064,0,0,8a36a79ace74b39564c56ff7401e476ffc08c1a4de80ba6f8cd5a5d5cd60f7fb,2024-04-10T13:23:38.787000 CVE-2024-30645,0,0,77873f1c56920b575cbc0a26f80968d9589bdd66fb005fe46610787de441aca3,2024-08-01T13:50:25.530000 CVE-2024-3065,0,0,0bda0f080fba1f5572d33c440e40f60c6a3ce2d985dfed057962a87436804b26,2024-05-24T01:15:30.977000 -CVE-2024-30656,0,0,2a0fe69d1e3a24b032821f19ada467d83a25099df7b1313f53c857fcc2f0c81c,2024-04-16T13:24:07.103000 +CVE-2024-30656,0,1,1fbf6cc036ef4d1011b70d44411336d2b49e8c9bc093f89b2ba8a036f8909251,2024-11-14T20:35:23.857000 CVE-2024-30657,0,0,aafd37252d8cd76cc88d27e5c06a74ee401323bfc2559b7fbd8004e3865b18d4,2024-05-27T00:15:08.743000 CVE-2024-30658,0,0,f06c1cf8cc96fbec2b40a1e1e937877c93d61d8d9e3a49d3ddc67ff1cbc9406e,2024-05-27T00:15:09.013000 CVE-2024-30659,0,0,bed02d76dc732ca7319584b72b912e2fa7d96c20f4a15450066496d1fa763c6e,2024-05-27T01:15:15.650000 @@ -254213,7 +254216,7 @@ CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9 CVE-2024-33787,0,0,c79d3756f20fa8608bd38338556aeaa798aa21ec0e9c3dffe176487918ad4adc,2024-08-06T15:35:13.693000 CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47 CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000 -CVE-2024-3379,1,1,e72123e670b36578febbe2bb46d6c313dfeb7d39f810ad5f1278e7e7f1aa3fb0,2024-11-14T18:15:18.503000 +CVE-2024-3379,0,0,e72123e670b36578febbe2bb46d6c313dfeb7d39f810ad5f1278e7e7f1aa3fb0,2024-11-14T18:15:18.503000 CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000 CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000 CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000 @@ -254982,7 +254985,7 @@ CVE-2024-34714,0,0,e231a4a259714202f61a69bb06497a65111477c8e99d84b716409e7518cfc CVE-2024-34715,0,0,a82e11e04c452d1bea6b0a9824b74b6f2046192e0be7962e7e2d23b74ac2865a,2024-05-29T19:50:25.303000 CVE-2024-34716,0,0,6c3b1bfeb59833afa0878217bf084cc4cde82455598fa083dba17b1e1360762c,2024-05-14T19:17:55.627000 CVE-2024-34717,0,0,9708a1af9b10bdcf029cd505a3cb07145d8977f96260cc07b0dfdf42dc2f21cb,2024-05-14T19:17:55.627000 -CVE-2024-34719,0,0,af526077039a417189ef9679569a256f965cab96e39d64f9b572f448307fd3f6,2024-11-13T18:15:20.267000 +CVE-2024-34719,0,1,6509dac5d4e8a7f2cdcfeb42852d7e5d9efb42f55153585bcf2d16c7c627fade,2024-11-14T19:35:05.990000 CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000 CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0fa9f,2024-07-12T16:11:36.933000 CVE-2024-34721,0,0,e10eab3e44bc304347c4431c31d705a2c4a55c2499e0412aab4621d1d6ef445b,2024-11-05T21:35:07.660000 @@ -255166,11 +255169,11 @@ CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adae CVE-2024-34997,0,0,5fbdf010972a8268fd5a9463e95189eba51629c3cae1b641fade25965bb6360c,2024-08-27T15:35:16.800000 CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000 CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000 -CVE-2024-3501,1,1,ab0fe1f3dce1fe66b80d12a62cfc54d2e4dd51a2f66f7bab1f837d3a63819abb,2024-11-14T18:15:18.713000 +CVE-2024-3501,0,0,ab0fe1f3dce1fe66b80d12a62cfc54d2e4dd51a2f66f7bab1f837d3a63819abb,2024-11-14T18:15:18.713000 CVE-2024-35010,0,0,6e4b79d2c02224bc0070ffd30b8ebbf9821b5f9a967abd7e45b682dfed020dc3,2024-08-20T14:35:18.007000 CVE-2024-35011,0,0,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000 CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000 -CVE-2024-3502,1,1,d04b21de3058acac73afb833001910f0d9412a3db1c01740f30b8d218c869c4a,2024-11-14T18:15:18.943000 +CVE-2024-3502,0,0,d04b21de3058acac73afb833001910f0d9412a3db1c01740f30b8d218c869c4a,2024-11-14T18:15:18.943000 CVE-2024-35039,0,0,16789b799d84c4b57ca393e0c1f64a27f89bdf5208029185a91c381dd5f853e1,2024-07-03T02:01:12.907000 CVE-2024-3504,0,0,e2de0e6f69991c8d2671ce35086e9faed799d2b484a27eddaabccf584b0c7ea8,2024-10-09T15:27:06.437000 CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502def,2024-07-03T02:01:13.607000 @@ -256144,7 +256147,7 @@ CVE-2024-36245,0,0,2a3b56c6f77ab27067ab462dff7f04da57eee3c95a1a9438f3f26c40b9ad2 CVE-2024-36246,0,0,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000 CVE-2024-36247,0,0,16c6efe40503daf1080fcbf6d9a009e1a3c1386098439c6bda19cf80a4941086,2024-09-23T14:16:11.290000 CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000 -CVE-2024-36250,0,1,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000 +CVE-2024-36250,0,0,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000 CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 CVE-2024-36253,0,0,06043dbdef5bfb8c85e10716419691bf2f83dd9066a2e1afc5045e796a57514d,2024-11-13T21:15:22.730000 CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000 @@ -256318,11 +256321,11 @@ CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000 CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000 -CVE-2024-36507,0,0,28094c1511051827ab705dfbe554b5fd3b0b346d21c7557cdc9c03406094ce3d,2024-11-13T17:01:16.850000 -CVE-2024-36509,0,0,e73caa2f8033d4cfc04b162e805f3ab537b8b8aa1a9627edccc2f136fe9b885c,2024-11-13T17:01:16.850000 +CVE-2024-36507,0,1,6b0c38dbda3f727dc169ce7e5f1546c11940f9dacdf67710b851d7b6c214bd3a,2024-11-14T20:31:45.367000 +CVE-2024-36509,0,1,764e30bb72423d5f8b5a78996260ef54d9ee171a8c47fd6a3f0c38f56a930041,2024-11-14T20:33:44.727000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-36511,0,0,1807360f38a62bd1fc293a7868ee622ad3fd5e209d6556e4181a75075ebcfb2f,2024-09-20T19:43:25.023000 -CVE-2024-36513,0,0,26713fdac822ac59e8e0a74e647e8fce39aef4f8e8fc394f397e4d708e9a25dc,2024-11-13T17:01:16.850000 +CVE-2024-36513,0,1,65d57afbb9c95cb16ccd4d82b60d3a42d510f6812bfb367624a249d49aac930c,2024-11-14T20:35:26.093000 CVE-2024-36514,0,0,ae3ea1b58c1af4d84bf3b1df047767075b97747b2aba92d2b8d841814d31aaad,2024-08-27T13:28:33.090000 CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14e64,2024-08-27T13:28:09.360000 CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000 @@ -256405,7 +256408,7 @@ CVE-2024-3668,0,0,760723957a03bd3e6e8f8da9bf14a37cb962a55f21654d65bee4d6a13a6bb6 CVE-2024-36680,0,0,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f28d2,2024-07-03T02:03:31.083000 CVE-2024-36681,0,0,91ab5a39355fb60d1e0e5e355644e5363b5d880ec14684cab5ae1016626028b9,2024-07-03T02:03:31.853000 CVE-2024-36682,0,0,607667f3d3fa1e7539487ebcdf60477393019c86221af3075a4b31a59983923e,2024-08-01T13:53:12.263000 -CVE-2024-36683,0,1,27df8e942ccfab1fb39d37797bd69ddbea8088898ebdaa405a1fffabd06ad979,2024-11-14T17:35:06.183000 +CVE-2024-36683,0,0,27df8e942ccfab1fb39d37797bd69ddbea8088898ebdaa405a1fffabd06ad979,2024-11-14T17:35:06.183000 CVE-2024-36684,0,0,92f14ba44da3232d94fa9d8919d066f2f528d700fa94d6456ec4eb59fdec8f01,2024-08-19T18:51:09.050000 CVE-2024-3669,0,0,adf9cc4d7b16c7513726b84fd5b10bd94ac2985d9cd2d264bea2883110b227ce,2024-08-01T13:56:38.537000 CVE-2024-36691,0,0,2dc541714f35cff24b0fb3cd72710beeeeaa2b0f3379e9849d1938be2b5e0991,2024-08-21T17:35:03.320000 @@ -256756,7 +256759,7 @@ CVE-2024-37175,0,0,2e75968b5d051a3722a9a13599775d327d1c94984da4214e0e883674bda95 CVE-2024-37176,0,0,3275b09004f17b6b89b755a43fa7e2802a78dd80261334da823124655666d26e,2024-08-09T18:42:31.847000 CVE-2024-37177,0,0,5c668d6fc8f89d275dab68dfc9c6e6aa2dda5828c4c067dd13278268042a6c87,2024-06-11T13:54:12.057000 CVE-2024-37178,0,0,ec0623af63b542a59bee4b0b0dc964702dff4ddb4fa5e9957a0a4c2999ed0559,2024-06-11T13:54:12.057000 -CVE-2024-37179,0,1,9e078b923dead8982d3eeccf36e44ecb74b62c159eddd8ac1e417f60aaeca0b3,2024-11-14T17:35:54.067000 +CVE-2024-37179,0,0,9e078b923dead8982d3eeccf36e44ecb74b62c159eddd8ac1e417f60aaeca0b3,2024-11-14T17:35:54.067000 CVE-2024-3718,0,0,8a153be0e904f8dfce7a1fd62411ff8bb9932d49f0ddf7963b849729d2d3feb2,2024-05-24T13:03:05.093000 CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862f7e,2024-07-09T18:19:14.047000 CVE-2024-37182,0,0,2c3b8dc4ac8a4c58e16690b89b8b1d4e60a1d50b12c336b43ce7311fbfe9a142,2024-08-07T16:08:10.810000 @@ -256846,7 +256849,7 @@ CVE-2024-37280,0,0,ac35b85853446debbb96c46d0c81b9a57aa5a4ffc880ba0d37638e24be271 CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e7864801ae,2024-07-31T12:57:02.300000 CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000 CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000 -CVE-2024-37285,1,1,5ec3c9c6ec0808543bc54e437e22bc2609a83a3787034dc5d9d288840ccb842b,2024-11-14T17:15:06.457000 +CVE-2024-37285,0,0,5ec3c9c6ec0808543bc54e437e22bc2609a83a3787034dc5d9d288840ccb842b,2024-11-14T17:15:06.457000 CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000 CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000 @@ -257102,6 +257105,7 @@ CVE-2024-37571,0,0,f2268da0f70596d56829f3f9bf9d47661ad5192c587321bdcf916146c34ae CVE-2024-37573,0,0,7cf896a83bff7adb78d3c1fc14e6c4ef534e5b6ec963a5ca90d46c8aebfbcf87,2024-11-01T12:57:03.417000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 +CVE-2024-3760,1,1,a76c6c9495269ad7ff459691b805bf829dd2e190006db9d3c1454ecf240be3c1,2024-11-14T19:15:06.327000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 CVE-2024-37619,0,0,09797faff2df8b72db2a2f262ebdfd130817b6ee60286e6aa7311eb834d19b77,2024-08-01T13:54:07.797000 CVE-2024-3762,0,0,40d3f55de3ecbf79b02b0c0e4b35c8d9284b268357e297bc7035406e1948919a,2024-05-17T02:40:06.647000 @@ -257770,7 +257774,7 @@ CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f203504 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 -CVE-2024-38479,0,0,ae8d4fe4cee56e3fa0df61bc7ba838dbd35927401f04ef96a32b3fc49065681c,2024-11-14T10:15:05.347000 +CVE-2024-38479,0,1,ed83952a9f70632e9d0b7a4d5c8799cb8efdbff31e26235b2ce51a2f2396b47b,2024-11-14T19:35:07.153000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 @@ -259058,7 +259062,7 @@ CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 -CVE-2024-40592,0,0,3e301ea9b16bc5fcf34d69433510034814387de05c59701041d20988436679bd,2024-11-13T17:01:16.850000 +CVE-2024-40592,0,1,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000 CVE-2024-40594,0,0,e1d4d027c9dcda2da83b02bb549097245bef0193d8569c5563a5fbe8b55ccbb0,2024-11-04T21:35:06.433000 CVE-2024-40595,0,0,c44d4f6c466d7ef5eae926dc07df3df9a34ba4de6b2deba6d973ce015e367bf0,2024-10-25T12:56:07.750000 CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000 @@ -259113,7 +259117,7 @@ CVE-2024-40657,0,0,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b9 CVE-2024-40658,0,0,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000 CVE-2024-40659,0,0,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 -CVE-2024-40660,0,0,74c960eea143c0e524b09de261c09c6fc912cc1517e2fa6f798149565937a1e4,2024-11-13T18:15:20.570000 +CVE-2024-40660,0,1,ae7ab748903bf86da17ab7fb8334db31f49836b36b2874e1b7e20376910cc25d,2024-11-14T19:35:07.343000 CVE-2024-40661,0,0,ece784732e717dfd5aa9d24e114c7c911766a2da6d3d446f6065a64726338596,2024-11-14T16:35:06.610000 CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 @@ -259851,11 +259855,11 @@ CVE-2024-41734,0,0,ee1445b5a6c50fe46a456bea41ccb696f4523dbb75f2650033b52fcf021a5 CVE-2024-41735,0,0,9b1bcbea87f6f37440d1c449d6340c711ae945b18c9cda4029f4e601f348537e,2024-09-12T13:53:32.993000 CVE-2024-41736,0,0,f12f0374fcc58eb9fac9e1d169220d47e16a0e5ad6c2e28256d8df041476b834,2024-09-12T13:51:42.727000 CVE-2024-41737,0,0,bcc2c31b9f08a899ad8c6d2953a09d2c0889e7eb08f1011b3147192ea690de38,2024-09-12T13:49:41.953000 -CVE-2024-41738,0,0,4efab88de529d1709dd37e7b4c462899323e09e9f1086b1299191256308a84b4,2024-11-01T20:24:53.730000 +CVE-2024-41738,0,1,a6808727835cd2b2cc80bf122a0771de7820d21201249aa0c0345f68c41d07cd,2024-11-14T20:51:29.847000 CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000 -CVE-2024-41741,0,0,a5849c0737a5fc5cdca9a5fab4a979a4e60039d70cf014b49f4fd62777760773,2024-11-01T20:24:53.730000 +CVE-2024-41741,0,1,ccd34eefc10ced5bf4d48e49b50366b947f28aa2b83fb2dfcdc45ff79ea550e2,2024-11-14T20:42:44.150000 CVE-2024-41744,0,0,fc4eedd1a4bbdd823b105499b0a912c465f8e205cf09b2d4f8519632cc3e2fd2,2024-11-01T20:24:53.730000 -CVE-2024-41745,0,0,33b6213f3cdb5e0742b91b08da2cfb6951f537645032e7c87f4be371dc6d2024,2024-11-01T20:24:53.730000 +CVE-2024-41745,0,1,099100d567f038155daa92534283ffbc5becefb4479f9a979209e7ec8d982d6f,2024-11-14T20:35:33.390000 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 @@ -260756,8 +260760,8 @@ CVE-2024-43083,0,0,9e09a78fc09963141a3fc02fd9ed1ad21971def8b416ce9fb9ce24f8d729d CVE-2024-43084,0,0,437d5cc042837f1bfc9cfa8d8d836f0c2f4c7883f5fb73f66819713dd173d647,2024-11-13T22:35:07.777000 CVE-2024-43085,0,0,c715c7e31f1af16a494792b8c4a654750dfcfcb152116fd578bca383daa762e5,2024-11-14T16:35:11.720000 CVE-2024-43086,0,0,b35a9c0f4b81e475922d197d48e538ace9956732719607be7dbe8800d97916ab,2024-11-14T16:35:12.570000 -CVE-2024-43087,0,0,1127c4ae24000cbc474cb9ae6b80fcd28ac633a09b7c536b905800937c9d183e,2024-11-13T18:15:21.307000 -CVE-2024-43088,0,0,f856fb27d9849b9e2892c2985299e11fb1bace58e4df7f885384836d602d3a8a,2024-11-13T18:15:21.387000 +CVE-2024-43087,0,1,df8687413166c680df9e58e2ffe928b52946447f2106313681b4f6900ac2725f,2024-11-14T19:35:08.150000 +CVE-2024-43088,0,1,1c13294f36b1f9b0be567789e36f583be558d3a79698dff40d24917c5068c2a3,2024-11-14T19:35:08.967000 CVE-2024-43089,0,0,b277ca7768b3e4b4b0f60e1bf47b20ac676f3753e8cd1ebaabaa7be31aea80a8,2024-11-14T16:35:13.417000 CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 CVE-2024-43090,0,0,28e87613d5722ac4d9a0be826e296e6e3ad7500c170880234254815d7f83e6be,2024-11-13T22:35:07.990000 @@ -260768,7 +260772,7 @@ CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22f CVE-2024-43102,0,0,08e196b4c8739548226238903033d07bdd98395e1a6fb3461533ef08cfa70faf,2024-09-05T21:23:40.503000 CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000 CVE-2024-43108,0,0,d9bd8ea3b307dd054ae1953991304a1a331018261701e1f611f2a6906461a05c,2024-10-17T17:15:11.883000 -CVE-2024-4311,1,1,5ce68034443eff5cfd91da7bf57e59e53b34bc4d88653b18949c94eb80ddbb7a,2024-11-14T18:15:19.473000 +CVE-2024-4311,0,0,5ce68034443eff5cfd91da7bf57e59e53b34bc4d88653b18949c94eb80ddbb7a,2024-11-14T18:15:19.473000 CVE-2024-43110,0,0,1fe822a52c0b3af1ede7bdafa556f57158a1ace3adaf6fcd1e0c1b1f3c86485b,2024-09-05T21:22:04.810000 CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000 CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000 @@ -261069,7 +261073,7 @@ CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300 CVE-2024-43427,0,0,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000 CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000 CVE-2024-43429,0,0,f5ddfa56b018dea7dd2df903532e997853780531d9960a7743dc3f510200d05d,2024-11-12T20:35:11.370000 -CVE-2024-4343,1,1,78453087f3d920ad597fcd60d72d2a9fe6e1100dded9b6d75201b30e4e1918be,2024-11-14T18:15:19.687000 +CVE-2024-4343,0,0,78453087f3d920ad597fcd60d72d2a9fe6e1100dded9b6d75201b30e4e1918be,2024-11-14T18:15:19.687000 CVE-2024-43430,0,0,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000 CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000 CVE-2024-43432,0,0,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000 @@ -261134,7 +261138,7 @@ CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca CVE-2024-43496,0,0,1e4f277010291ea8388e3463633269924e9ec7b9c2f947668d81da4d3ef80c37,2024-09-23T17:32:54.663000 CVE-2024-43497,0,0,2537458188d3ab9aa76faa081a4fee596da658de243be9f1924628f34744e854,2024-10-17T21:15:30.827000 CVE-2024-43498,0,0,9135372ac5e3977470b2eb332390d436ca9fee66059a03ec8790ad9f4a433a6f,2024-11-13T17:01:58.603000 -CVE-2024-43499,0,0,29c69bd8859eab169ca545423a97a43fe6dcc5053603621028a68104e92b31d8,2024-11-13T17:01:58.603000 +CVE-2024-43499,0,1,7ebb7afefec77c5ab7a1f808c37fa1fd165da864c1ddb6b9d2371398ad1a5f62,2024-11-14T19:15:06.850000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 CVE-2024-43500,0,0,78bdbde8586a4aeadf73d960935866ca71ecb415ed1914c17c331c1e31d9dae2,2024-10-17T21:01:08.067000 CVE-2024-43501,0,0,3dab9521c0cc7c6361671a7526673e1c684c3d41e5a05cbd155304b95f78c3a9,2024-10-17T21:06:07.377000 @@ -261232,7 +261236,7 @@ CVE-2024-43592,0,0,66ef8868710faf1076b1b13051f2c75eebafbfe5976017df5a4f00073c2c6 CVE-2024-43593,0,0,7e17c95f595bed9729f21273d821a92cb32423e919d0faf83c37ed5dcd8b802f,2024-10-22T19:30:19.870000 CVE-2024-43595,0,0,c9530dd7915099d4a86e6d6506504fdd984e781ac89cb128030fa646bffdb2c0,2024-10-18T16:55:06.487000 CVE-2024-43596,0,0,0f30448ecbbf09d34768a5a54fbdb251259ce851c310b81f9cbc1d14d274f939,2024-10-18T16:59:08.667000 -CVE-2024-43598,0,0,0e63fcdf7edb1a83f6735bd611b91974391ef24a255435fccd558f8aabce089d,2024-11-13T17:01:58.603000 +CVE-2024-43598,0,1,a49a8ba853043290255d579663f01b51dacc414c74b45702ab0d4dc178d7ed05,2024-11-14T20:15:23.070000 CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 CVE-2024-43601,0,0,70d1af092a29e0256385b0b1eb94d28b1b04d755b5d71c8bb3ee4a255fe9335f,2024-11-08T22:15:20.270000 @@ -261268,7 +261272,7 @@ CVE-2024-43633,0,0,a669df41e6b8e280ede36b7d990c4a947611e3b4651b20636421d64a3c939 CVE-2024-43634,0,0,be46605526ccfa35f1252c530a1d59f1a4721e4cfb23c5e6b43085ce81e02003,2024-11-13T17:01:58.603000 CVE-2024-43635,0,0,fd289d1f1b223eefb059527c3a8cd1b78f42a2ae2aa2f373013ec3b9ff5bcfc2,2024-11-13T17:01:58.603000 CVE-2024-43636,0,0,ab440c7e821dc3f32c12ecf3b6fac62c7c24dc48162ef5309530325198cb4d0a,2024-11-13T17:01:58.603000 -CVE-2024-43637,0,0,5386336a31da59eab97bc0a9b3c5f078d402dbe829ca33cb96123663ed282562,2024-11-13T17:01:58.603000 +CVE-2024-43637,0,1,737654f43dbf52f6320d615f45ceb3a2f2e1482d751022b3ef3fda23fc25c5ac,2024-11-14T20:15:23.993000 CVE-2024-43638,0,0,5d4563b9842099287f436a8e46a7e575b284f966e2c8b9bbb3f581433da01118,2024-11-13T17:01:58.603000 CVE-2024-43639,0,0,39dd6691d9e1e48649bade627c73acf7c371e16dce9774c261541277131745b3,2024-11-14T00:15:16.227000 CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000 @@ -262308,13 +262312,13 @@ CVE-2024-45273,0,0,c68c26959493b8bdb5a6e0f8fb0c0f3ccd854da00b6c3d41e3b43310e52bc CVE-2024-45274,0,0,962df114e3e3c66d9d19f1ca544b8230483172f76eaafa5fd0b600c57eee6936,2024-10-17T17:40:10.690000 CVE-2024-45275,0,0,40f0f90c7dfe9cf789ccd1df5334cd05deab445b0b9828925252ef5f0bc7f642,2024-10-17T17:39:52.713000 CVE-2024-45276,0,0,0d59a7b0ab1984e9b1bbe3d7b7d14f5af3d9a52d661be0bb698b4cd9771bbeac,2024-10-17T17:39:07.160000 -CVE-2024-45277,0,1,70442b40b0caf8411977da5cfcb16c20b5a6ff14fa4b9cd980ee1e0c0a870945,2024-11-14T17:54:28.373000 -CVE-2024-45278,0,1,fe89b5eda7ebfb13c28d9a27daad1a9da9ad863fd06c770aa1cadb8552e812a3,2024-11-14T17:17:12.640000 +CVE-2024-45277,0,0,70442b40b0caf8411977da5cfcb16c20b5a6ff14fa4b9cd980ee1e0c0a870945,2024-11-14T17:54:28.373000 +CVE-2024-45278,0,0,fe89b5eda7ebfb13c28d9a27daad1a9da9ad863fd06c770aa1cadb8552e812a3,2024-11-14T17:17:12.640000 CVE-2024-45279,0,0,d1e01ad73c7c0fcb7dd9f385faab2f84a1522d644234e290f3ff403f5eb9a4d9,2024-09-10T12:09:50.377000 CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000 CVE-2024-45280,0,0,95185fad87ef89782ef20303875d1e67479f6c5b9be0dfe150b0d387302d1c9d,2024-09-10T12:09:50.377000 CVE-2024-45281,0,0,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91409,2024-09-10T12:09:50.377000 -CVE-2024-45282,0,1,179c784b205c6724246efb20f0c57ea3738c9dd91a7daa64b041b332a3137a9a,2024-11-14T17:56:17.007000 +CVE-2024-45282,0,0,179c784b205c6724246efb20f0c57ea3738c9dd91a7daa64b041b332a3137a9a,2024-11-14T17:56:17.007000 CVE-2024-45283,0,0,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000 CVE-2024-45284,0,0,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000 CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000 @@ -262342,7 +262346,7 @@ CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a CVE-2024-45306,0,0,492d01bc755bef5620391aaeab10cbcbbc187e7fb0b5fdfef32f617ff36771b7,2024-10-01T15:20:29.533000 CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000 CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000 -CVE-2024-45309,0,0,ccef45c69697c06d2e18f0c2778de8d0d49f29cfcf182bfdc484e40f1c83f2df,2024-10-21T17:09:45.417000 +CVE-2024-45309,0,1,f4049ebd525ebf7d9a070b0f28b330263ba82d3d3b5513f7651199ce08f029a9,2024-11-14T19:39:31.233000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac208e0,2024-09-03T19:40:46.783000 CVE-2024-45311,0,0,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2befc3,2024-09-25T17:03:36.817000 @@ -262352,7 +262356,7 @@ CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ece CVE-2024-45315,0,0,a47f8116c282f3f6ec68b3e4e22ecd3455e5be0b6298182198301e89c068e15d,2024-11-01T16:35:26.853000 CVE-2024-45316,0,0,4ecfd9e7fa59bfdd4734e2d4185781d6d4be914b03dfd0489df8aa5f6a42264d,2024-10-15T12:58:51.050000 CVE-2024-45317,0,0,cf582da0518aca65335a8c43cb4d83f1a02fd5797437525cbc0cf86d6da8db4d,2024-10-15T12:58:51.050000 -CVE-2024-4532,0,1,535c0d4d9a82c0b19c9079d44a1e72c9e08eaddfd4b3d6cfcc361e767dca3488,2024-11-14T17:35:07.383000 +CVE-2024-4532,0,0,535c0d4d9a82c0b19c9079d44a1e72c9e08eaddfd4b3d6cfcc361e767dca3488,2024-11-14T17:35:07.383000 CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000 CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f75b,2024-09-20T16:23:51.397000 CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000 @@ -262921,7 +262925,7 @@ CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a37367 CVE-2024-46628,0,0,75b1cdb8791d268c28a8d1c2eb3eabb85cf8645763bd77b2b5fbf5588170833f,2024-10-04T17:18:31.663000 CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000 CVE-2024-46632,0,0,abc659def740354695cf2f3df5ac488f8137388dc197ea59e5551153368ce0a9,2024-09-30T12:46:20.237000 -CVE-2024-46635,0,0,2a4403bf13895f55d2b7c4f0f33ade98643e62272f578a54a0ec9f112b8f9ef5,2024-10-04T13:51:25.567000 +CVE-2024-46635,0,1,f734baba30d1fc1fbf7b88c7d8f0d678888adf80d108ab1f608ca9628303be55,2024-11-14T20:35:33.310000 CVE-2024-46639,0,0,32a1c80f017ce1b9b0a593e635fc1fe3b0612fc660594feed34360cf471ca787,2024-09-26T13:32:55.343000 CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000 CVE-2024-46640,0,0,8a8901a45f157bc967024a42c670214bc1166786f3fd7086e031ee10a8d6de95,2024-09-26T13:32:55.343000 @@ -263194,7 +263198,7 @@ CVE-2024-46952,0,0,3444b82bcb136a59628b03fd05ed82e98f664dba01fba9072fb9ccd140595 CVE-2024-46953,0,0,1ac66484fd2bfafcc0c3fa8efd1c5670384cc15b372b551dc478a0e32265c98e,2024-11-14T02:01:09.580000 CVE-2024-46954,0,0,1c51b2cf98df98462cd0f63d13a6cbbce248971ad1254684ccfcb961f73b913d,2024-11-14T01:58:47.833000 CVE-2024-46955,0,0,6859a74370b7a98e23915805df3d1c3994da708d9324c0071b81c91c225b8a4b,2024-11-14T01:53:21.587000 -CVE-2024-46956,0,0,d97941c29272a8785e7eed871c50021e8c7af6d31794d5ac1c57d8bc8cd6c620,2024-11-12T20:35:13.723000 +CVE-2024-46956,0,1,a3c6f157d772da02193157b28e147261098f90814e5cc49bec25afe198e21c86,2024-11-14T20:39:54.757000 CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000 CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000 @@ -263443,7 +263447,7 @@ CVE-2024-47328,0,0,983ca76f75739c6c5a714cbed6751627aac116c793e329729ee2a34061631 CVE-2024-47329,0,0,8f9cf4ad2ce9c10f9ea9bbbdd9112304e1d41b0ef8826075f80f55633e097d19,2024-10-07T17:47:48.410000 CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 -CVE-2024-47331,0,0,407e750d1989e683e236deff0838b4e791295832cd6aebe80372c3e2e15da3dd,2024-10-15T12:57:46.880000 +CVE-2024-47331,0,1,676bf46bf803674feaabbe5776a2c5d7eff974f9c187b6ee25e37aee829df1b9,2024-11-14T19:22:49.760000 CVE-2024-47332,0,0,ac5ed213fd921095ee0b8be4048aa454f8ac7fdcdf6a18756d3c0921bb781874,2024-10-07T17:47:48.410000 CVE-2024-47333,0,0,512f6769e7250dfb91a8929703f1237d3beaa36f2d8957fee001943383c80c30,2024-10-07T17:47:48.410000 CVE-2024-47334,0,0,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000 @@ -263555,12 +263559,12 @@ CVE-2024-47438,0,0,7e0b5e24785d49f8831b8f977c55089778dcfecdc1d3ed1a3ff3706e1db01 CVE-2024-47439,0,0,fd699d4af34618547dfc4fa9b3af7acc44300fb88cea698c573b3bfaf3e742d3,2024-11-13T19:11:48.890000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-47440,0,0,43d98456eee459100aa755cd72e412c04aa2168e096adac55805f69f958d3dd5,2024-11-13T18:52:57.013000 -CVE-2024-47441,0,0,c2eb49fb0d727d7b0f3883aa37b6b97377094ad2c1a4f03a303d46be9710a9bc,2024-11-13T17:01:16.850000 -CVE-2024-47442,0,0,7c4534e89702d523b6e3d7f73c6e5c526c57723d6c4585c0750bce11fac482ce,2024-11-13T17:01:16.850000 -CVE-2024-47443,0,0,c7ebbaf071cf97fd15363efb3c4bd4e1dc07d445eda0326b1fed701bb4576e20,2024-11-13T17:01:16.850000 -CVE-2024-47444,0,0,3c50a4520e405f3f41f0090609f649e84bb504d4a6472763c67225f747ab18fe,2024-11-13T17:01:16.850000 -CVE-2024-47445,0,0,ca1dd8bb79ee4af2eeebbf79d117955d6fc93c61063dc6d9daefeb8e2749c043,2024-11-13T17:01:16.850000 -CVE-2024-47446,0,0,c032a93b3fb4c35b6697f3f50bccffa735973c8ecd23346bcfedb7e37c027b69,2024-11-13T17:01:16.850000 +CVE-2024-47441,0,1,1479ac749c9e743ace56bfafc7ab2566abf6710acac75e8f6acd2688a27c74f2,2024-11-14T19:09:41.703000 +CVE-2024-47442,0,1,3bf9fecf715a9e5e18b142731c234fd078a48b474bc36eb7d0491ffd17de8488,2024-11-14T19:09:51.347000 +CVE-2024-47443,0,1,1dcf0c600868d36fda16962d2760894b883a8628a4b98fff5983e4de2f83eec3,2024-11-14T19:10:01.277000 +CVE-2024-47444,0,1,d3fe594dc453d55be943e3202bb696525b4a84d77f2b027234360c5d0f1b27ac,2024-11-14T19:10:29.537000 +CVE-2024-47445,0,1,a9dbc6a36d1d30896e9174b86f7f3ee615b146047aaa4385a9a8b4c9c79ad152,2024-11-14T19:10:34.587000 +CVE-2024-47446,0,1,9f7569ca580ae92afb8852804ee0ea4974f50d040fd6bc83cd87bd8b77a128cf,2024-11-14T19:10:24.197000 CVE-2024-47449,0,0,41f61b13e3dd2f4f5b46d75ab8d7ff84aae16e2e4e96b480eec29b17a142cd2c,2024-11-14T14:32:55.163000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 CVE-2024-47450,0,0,e59fcc3accbe89009d4278a792d4807261153ec8178fc8038a63474d199284a3,2024-11-14T14:26:45.873000 @@ -263831,8 +263835,8 @@ CVE-2024-47773,0,0,9ec3c242835bf576bc0968a82a3b46699041f8e41d118ea66f5704cf28b5d CVE-2024-47779,0,0,5f35e8aa4452b188a7ed79805178dc2710160d52596e1c24b8778a31542e007a,2024-11-12T17:15:08.037000 CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000 -CVE-2024-47781,0,1,67394dbff8e4cb67bdf642414e74d835a5dc27aa9e6bfae1cb41a5373a1332b6,2024-11-14T18:19:28.180000 -CVE-2024-47782,0,1,2d6d06702f768b667755e8c5de7c65592170674b77fb80b577cfc56101b86527,2024-11-14T18:19:34.127000 +CVE-2024-47781,0,0,67394dbff8e4cb67bdf642414e74d835a5dc27aa9e6bfae1cb41a5373a1332b6,2024-11-14T18:19:28.180000 +CVE-2024-47782,0,0,2d6d06702f768b667755e8c5de7c65592170674b77fb80b577cfc56101b86527,2024-11-14T18:19:34.127000 CVE-2024-47783,0,0,5a9cc3d76940a89383ed74c67262d35c051dcce0550c21e752e3852ace3e6422,2024-11-13T23:13:25.367000 CVE-2024-47789,0,0,5cca8aa9572eb6cd0c059882137f083cb8544427e147bc3f1f0eab6346cef001,2024-10-14T11:15:11.797000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 @@ -264095,7 +264099,7 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48284,1,1,998374701c5526c5658e1716377a4ae0da740a94202fbf58911b61696d69c3d0,2024-11-14T18:15:19.150000 +CVE-2024-48284,0,0,998374701c5526c5658e1716377a4ae0da740a94202fbf58911b61696d69c3d0,2024-11-14T18:15:19.150000 CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000 CVE-2024-48290,0,0,470dc7a365392aceea819604e300f16b964336068e4f6e607d709f5104e50d51,2024-11-08T19:01:03.880000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 @@ -264372,6 +264376,7 @@ CVE-2024-49019,0,0,e08679fc365479f57d65d68203459387c13c3c1dd4e5679713ba188e89b8c CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 CVE-2024-49021,0,0,aa53deff3838efd1c66c363e2988f51dc92f0fe1f44fbadc27229d2d752a53d8,2024-11-13T17:01:58.603000 CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000 +CVE-2024-49025,1,1,5b36b6511687656a4af0ef8b89408d3be008a49fa6cb3accb0de807c63dd75e7,2024-11-14T20:15:25.207000 CVE-2024-49026,0,0,389b45fb365606f0dc850137e89a99d79b49e7936c4d322daa7512c8f2a443d1,2024-11-13T17:01:58.603000 CVE-2024-49027,0,0,756a52ba86626ae0feaa38ac7b9ca7560a1f0424ed8969e0ec266d976b69f598,2024-11-13T17:01:58.603000 CVE-2024-49028,0,0,15af4a2817e602a0be5b827f4b62639c5042e250c1d16e5ecaf5290fdb0946fa,2024-11-13T17:01:58.603000 @@ -264550,7 +264555,7 @@ CVE-2024-49358,0,0,df99e254916c8dff27bc118ecfd140161a54ef4581a6841d720c531a5bf44 CVE-2024-49359,0,0,cc09522176dca55ed443e811571748ebfc3f0f5a4f89d4ec44c17a0a8a645881,2024-11-06T15:27:02.347000 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e281007d,2024-10-21T17:10:22.857000 -CVE-2024-49362,1,1,2f51dbc5deeb1d293fdeae27596ba8a6e3ed43c3ac3a33b254ac8bbf6cdae95d,2024-11-14T18:15:19.243000 +CVE-2024-49362,0,0,2f51dbc5deeb1d293fdeae27596ba8a6e3ed43c3ac3a33b254ac8bbf6cdae95d,2024-11-14T18:15:19.243000 CVE-2024-49366,0,0,1ea5441e3f8684e26cb3e2ee03927aa37cfc22f8ddf1688cacc08e4a6c38e9c1,2024-11-07T15:15:04.587000 CVE-2024-49367,0,0,a00a7c814532ad3abb0f836142856607dc752da167ff2cb313965be7a6e5269e,2024-11-07T14:57:17.393000 CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000 @@ -264632,9 +264637,9 @@ CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 CVE-2024-49560,0,0,ab312f3dd70e163a5c72b63be519379ba38d0c543c55c0ea8821e33d6ab68e6b,2024-11-12T13:55:21.227000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 -CVE-2024-49579,0,0,4674118b21cb39ebeef2b4743f0ed75dcd0002fe01b9b902589f8dc4995b5f10,2024-10-18T12:52:33.507000 +CVE-2024-49579,0,1,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 -CVE-2024-49580,0,0,58d42ce80f49f44500183a1a00e208025f481699c4f078e6c8ff15ecab46fe22,2024-10-18T12:52:33.507000 +CVE-2024-49580,0,1,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000 CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000 @@ -265188,25 +265193,25 @@ CVE-2024-50245,0,0,05e7417907eec0d344f4f019d335736318867717f881e8b6a4faef9e6a31b CVE-2024-50246,0,0,f7f6c7b2429f844498e426c684268b0f866fe299897d6dcd99d5e8fa1575b677,2024-11-13T17:38:55.453000 CVE-2024-50247,0,0,e7f3fceab887e2a4963b8083073c4b9aab1b11dcc27847eb5f1a16595fd7cb7e,2024-11-13T17:58:15.133000 CVE-2024-50248,0,0,958d8f945e6b139afb0971827ad795d8101513c47ac50a5a04f769eaadab1f70,2024-11-13T18:07:09.280000 -CVE-2024-50249,0,1,e054f0001c224e334050e2eac6d88617343fb9e96d0dbd3cea9aeaed099db70d,2024-11-14T17:01:11.577000 +CVE-2024-50249,0,0,e054f0001c224e334050e2eac6d88617343fb9e96d0dbd3cea9aeaed099db70d,2024-11-14T17:01:11.577000 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 -CVE-2024-50250,0,1,56e8946cae382f823bea55d7d896bec578a306a8ecc523ac3517b83bef5b40c7,2024-11-14T17:04:14.043000 -CVE-2024-50251,0,1,eb13cee896d3e0464c0f35df79d5111082643df2ca7ac2c253f660163c4e84ff,2024-11-14T17:31:21.280000 -CVE-2024-50252,0,1,b6aa9baadd8479fe935a11ad7442892bb3cf3be13323c7e0015aa59daced0bac,2024-11-14T18:08:17.857000 -CVE-2024-50253,0,1,8e910b5803a76805af440ed69cb6144822b325028bc59ee13ce13ddde4ce61cb,2024-11-14T18:09:15.067000 -CVE-2024-50254,0,1,a9e1d5266d05392c3a6db80684bc007031fdbdda133ec3d98105936eb5be979f,2024-11-14T18:09:48.530000 -CVE-2024-50255,0,1,c3d114b8ae1780085283e691737577774255f0ed6dc6a7631650a080100cf9c5,2024-11-14T18:10:12.383000 -CVE-2024-50256,0,1,8d034d6960ffbf3be2443b4e8e64ac1dde33a73fcf61078ccf231ff7ccf539e8,2024-11-14T18:11:08.250000 -CVE-2024-50257,0,1,00539950bc43acb220118006c9aa4d0dae21649054459f273535c3ee15f7812a,2024-11-14T18:11:39.990000 -CVE-2024-50258,0,1,13d9deae4c3b1e76a26be622c9f1c043e18cde848c01bde395e4f7b0dd49cd29,2024-11-14T18:12:39.487000 -CVE-2024-50259,0,1,78be2432b0c867394be3a84dac27fe7ca07a42a30f4cfd5b2db30a57c3eb3db6,2024-11-14T18:24:11.470000 +CVE-2024-50250,0,0,56e8946cae382f823bea55d7d896bec578a306a8ecc523ac3517b83bef5b40c7,2024-11-14T17:04:14.043000 +CVE-2024-50251,0,0,eb13cee896d3e0464c0f35df79d5111082643df2ca7ac2c253f660163c4e84ff,2024-11-14T17:31:21.280000 +CVE-2024-50252,0,0,b6aa9baadd8479fe935a11ad7442892bb3cf3be13323c7e0015aa59daced0bac,2024-11-14T18:08:17.857000 +CVE-2024-50253,0,0,8e910b5803a76805af440ed69cb6144822b325028bc59ee13ce13ddde4ce61cb,2024-11-14T18:09:15.067000 +CVE-2024-50254,0,0,a9e1d5266d05392c3a6db80684bc007031fdbdda133ec3d98105936eb5be979f,2024-11-14T18:09:48.530000 +CVE-2024-50255,0,0,c3d114b8ae1780085283e691737577774255f0ed6dc6a7631650a080100cf9c5,2024-11-14T18:10:12.383000 +CVE-2024-50256,0,0,8d034d6960ffbf3be2443b4e8e64ac1dde33a73fcf61078ccf231ff7ccf539e8,2024-11-14T18:11:08.250000 +CVE-2024-50257,0,0,00539950bc43acb220118006c9aa4d0dae21649054459f273535c3ee15f7812a,2024-11-14T18:11:39.990000 +CVE-2024-50258,0,0,13d9deae4c3b1e76a26be622c9f1c043e18cde848c01bde395e4f7b0dd49cd29,2024-11-14T18:12:39.487000 +CVE-2024-50259,0,0,78be2432b0c867394be3a84dac27fe7ca07a42a30f4cfd5b2db30a57c3eb3db6,2024-11-14T18:24:11.470000 CVE-2024-50260,0,0,05a63ba87ad199ac12bf4ea248cb7aed5d0afcea08fb2e43e5b32d282eebbf3f,2024-11-13T18:47:43.830000 -CVE-2024-50261,0,1,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc69d,2024-11-14T18:24:41.597000 +CVE-2024-50261,0,0,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc69d,2024-11-14T18:24:41.597000 CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000 CVE-2024-50263,0,0,031640c798eb6a3a8aeb817df2908ddb318a337ddb803a116f07c15a4af2eba6,2024-11-14T16:23:08.347000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 -CVE-2024-50305,0,0,32cba8395bb8f36501f7e711a4f56600fb80cd2e3ef145d3ce8fad1597b52437,2024-11-14T10:15:08.013000 -CVE-2024-50306,0,1,cc5580a479aa56497866a68f93d6dda4574cf88b0c33aa007c3b6c36cae3f549,2024-11-14T18:35:03.743000 +CVE-2024-50305,0,1,0ac0ed2449a977be00632b91304d1c4dd569cf943961c8a7c2303ec2dddef88b,2024-11-14T19:35:16.650000 +CVE-2024-50306,0,0,cc5580a479aa56497866a68f93d6dda4574cf88b0c33aa007c3b6c36cae3f549,2024-11-14T18:35:03.743000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000 @@ -265425,7 +265430,7 @@ CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb7601 CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000 CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 -CVE-2024-50634,0,0,b51bed2cbdafb47e43997329f84c20416d967781120359bc1bc6075ffd759ad7,2024-11-13T15:35:12.950000 +CVE-2024-50634,0,1,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2002,2024-11-14T20:40:43.690000 CVE-2024-50636,0,0,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000 CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 @@ -265452,29 +265457,29 @@ CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf1 CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000 CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000 CVE-2024-5082,0,0,cb3e951bda46c1109919ca7a678dadb9606afdd347c29db218b2212393edae45,2024-11-14T16:35:15.960000 -CVE-2024-50823,1,1,2e3eed0e10706d12ac6edf3de28d8ea62fff93b7c877208ab10072a1a4fd7baf,2024-11-14T18:15:19.940000 -CVE-2024-50824,1,1,d00b846930484fbbce7bdb09824dfe70ffba685c849b72b2ba7d1c10c81206af,2024-11-14T18:15:20.107000 -CVE-2024-50825,1,1,b19038dc42214d1be237b151cc9fb5c6dc663beb62f52e2ec0213e7446b5bd16,2024-11-14T18:15:20.230000 -CVE-2024-50826,1,1,f0c8ef389fccef7f33cb99e2a4bf4a4bc876d1132cc52311f62e5fbfc012d126,2024-11-14T18:15:20.350000 -CVE-2024-50827,1,1,f168cef41cd7a54e803709d8bd886da57e0948d39d51d6345834de7710b580e0,2024-11-14T18:15:20.457000 -CVE-2024-50828,1,1,9f15c177b20d85daadeb6ffb06e3a27ac4e87ccbfbcfa7c9a30f6f82cb84750d,2024-11-14T18:15:20.580000 -CVE-2024-50829,1,1,e6266c33d16b684e110a9959e9e7eb33a7d04f9cb637340c5ee5aa729167b57c,2024-11-14T18:15:20.853000 +CVE-2024-50823,0,0,2e3eed0e10706d12ac6edf3de28d8ea62fff93b7c877208ab10072a1a4fd7baf,2024-11-14T18:15:19.940000 +CVE-2024-50824,0,0,d00b846930484fbbce7bdb09824dfe70ffba685c849b72b2ba7d1c10c81206af,2024-11-14T18:15:20.107000 +CVE-2024-50825,0,0,b19038dc42214d1be237b151cc9fb5c6dc663beb62f52e2ec0213e7446b5bd16,2024-11-14T18:15:20.230000 +CVE-2024-50826,0,0,f0c8ef389fccef7f33cb99e2a4bf4a4bc876d1132cc52311f62e5fbfc012d126,2024-11-14T18:15:20.350000 +CVE-2024-50827,0,0,f168cef41cd7a54e803709d8bd886da57e0948d39d51d6345834de7710b580e0,2024-11-14T18:15:20.457000 +CVE-2024-50828,0,0,9f15c177b20d85daadeb6ffb06e3a27ac4e87ccbfbcfa7c9a30f6f82cb84750d,2024-11-14T18:15:20.580000 +CVE-2024-50829,0,0,e6266c33d16b684e110a9959e9e7eb33a7d04f9cb637340c5ee5aa729167b57c,2024-11-14T18:15:20.853000 CVE-2024-5083,0,0,354c3da34b8f763f544f0a11d2fd1368a94de7e7d66991c980b19b9a84dcb883,2024-11-14T16:35:16.267000 -CVE-2024-50830,1,1,46d5dee8148ab451f9fe20968670525ca2af0642e62c9e7f268d471c0a9975d0,2024-11-14T18:15:21.063000 -CVE-2024-50831,1,1,02adc50bcffb5b7bf893716b08bac8248c08364658e04ba0ed22181dc2aa4c7f,2024-11-14T18:15:21.180000 -CVE-2024-50832,1,1,aedec215e4fff8b086e324bb81716bdb261a8d4579e06c7127153d9e74c69cb4,2024-11-14T17:15:06.823000 -CVE-2024-50833,1,1,8a96d04960a2653f66a832963d35c2f3eafedd781373d43d2535c42d531f1769,2024-11-14T17:15:06.917000 -CVE-2024-50834,1,1,ff4e100f60622e5d9ce338fcf7ab94d399525bdbd301fed837c9edc8d99c4f5a,2024-11-14T17:15:07.003000 -CVE-2024-50835,1,1,4c49f45501187673346fd1cc366755759fd782ee43c85d8161bb20ac39b258a6,2024-11-14T17:15:07.090000 -CVE-2024-50836,1,1,e4170c7bde5a8712bd1a169ba3cd2bdeba23ba63ce58eac087ccd35178aa8e33,2024-11-14T17:15:07.177000 -CVE-2024-50837,0,1,e4ba8b8751142a0f25b581bd09a92b410f6585bb26a1cf76aae00c46a3330531,2024-11-14T17:15:07.257000 -CVE-2024-50838,0,1,d15836167d7b8a1380bd2014f0abd80f97020569f7d91b7323ded85f533008e7,2024-11-14T17:15:07.333000 -CVE-2024-50839,0,1,937c698e4b5f77b7b7b4a1512c9db99e8b27d86711a987aa8372bbe5d72c31c1,2024-11-14T17:15:07.410000 +CVE-2024-50830,0,0,46d5dee8148ab451f9fe20968670525ca2af0642e62c9e7f268d471c0a9975d0,2024-11-14T18:15:21.063000 +CVE-2024-50831,0,0,02adc50bcffb5b7bf893716b08bac8248c08364658e04ba0ed22181dc2aa4c7f,2024-11-14T18:15:21.180000 +CVE-2024-50832,0,0,aedec215e4fff8b086e324bb81716bdb261a8d4579e06c7127153d9e74c69cb4,2024-11-14T17:15:06.823000 +CVE-2024-50833,0,0,8a96d04960a2653f66a832963d35c2f3eafedd781373d43d2535c42d531f1769,2024-11-14T17:15:06.917000 +CVE-2024-50834,0,0,ff4e100f60622e5d9ce338fcf7ab94d399525bdbd301fed837c9edc8d99c4f5a,2024-11-14T17:15:07.003000 +CVE-2024-50835,0,0,4c49f45501187673346fd1cc366755759fd782ee43c85d8161bb20ac39b258a6,2024-11-14T17:15:07.090000 +CVE-2024-50836,0,0,e4170c7bde5a8712bd1a169ba3cd2bdeba23ba63ce58eac087ccd35178aa8e33,2024-11-14T17:15:07.177000 +CVE-2024-50837,0,1,96fcb499d8472366d78a24893fbbac02e051d7a3c4b83012b851978cab4924d9,2024-11-14T19:35:17.623000 +CVE-2024-50838,0,1,d3c85db11c13d4fba199f7e6340f60a6c715055c9315a5219004d92d9ce4c5df,2024-11-14T19:35:18.427000 +CVE-2024-50839,0,1,01640e157e2a49f4f650966b70746ee61106bde203a589e9de4ac4be36608fd9,2024-11-14T19:35:19.240000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 -CVE-2024-50840,0,1,83a104e99e093c886f72c2e3a3e97e1ae67cf48c97368a6ff247b3296efc5b07,2024-11-14T17:15:07.473000 -CVE-2024-50841,0,1,5ce179f23a19f7e3fb48567c13e92444515f82552ae73fa5d0443dd8bdb9fc51,2024-11-14T17:15:07.543000 -CVE-2024-50842,0,1,bc47c508e41a48b5e541c242afefc4eedc2a8e61d8b6382f5c46f44d63437d1d,2024-11-14T17:15:07.613000 -CVE-2024-50843,0,0,2e5763784084abfb6b2aa938fe6a9d65acf0f9a9701fbcbc297a0a7fb9b2cb2a,2024-11-14T14:15:19.050000 +CVE-2024-50840,0,1,8955f492100255068b940e7935b918e5bbcb11994bf34f2daf1b5882bc9a7544,2024-11-14T19:35:20.033000 +CVE-2024-50841,0,1,ee2c60c11c28af1ad6f5941091e02458a0eeda596a52828fe6a1eeb35f455204,2024-11-14T19:35:20.837000 +CVE-2024-50842,0,1,5121c7171f1e61aaa48992446e276abddf9e8bc92a9c1fc4eb5a094a20f99e76,2024-11-14T19:35:21.650000 +CVE-2024-50843,0,1,7c516cdb53e3e589740dd68d67e686b2cd7aad02d1967da6279de76f51b446c0,2024-11-14T19:35:22.450000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000 CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000 @@ -265603,7 +265608,7 @@ CVE-2024-51246,0,0,aa194fa853a376377fe6819071cfa2916e0d00edaefe6d104071b5230b5ba CVE-2024-51247,0,0,6f763214fc728651cee8f49e7f9d3466af02b1a87bcb320803295d2391bcc8af,2024-11-05T19:28:25.143000 CVE-2024-51248,0,0,24dce655c534c26b0b67ea327bc58bc6e5d7937e725965feb96bf75ba11def28,2024-11-05T19:28:29.730000 CVE-2024-51249,0,0,23dd85f23924e75ce199438298671d7b20ece05b7ee21f636e4f3929eb3f65e7,2024-11-04T18:50:05.607000 -CVE-2024-5125,1,1,9510d0b0017e51aeff47cd796d174da78a6aa3383162558c0d995d4ae8f4e9f7,2024-11-14T18:15:26.760000 +CVE-2024-5125,0,0,9510d0b0017e51aeff47cd796d174da78a6aa3383162558c0d995d4ae8f4e9f7,2024-11-14T18:15:26.760000 CVE-2024-51251,0,0,63152562fe66f261ed3205b0767b9a859ea9c0ff927b599c5c96705e6967a8f8,2024-11-04T18:50:05.607000 CVE-2024-51252,0,0,bf357f6855609c81237cb444d332859dc7316dc50aaeed6006dd85a3ea82ebf7,2024-11-05T20:54:38.960000 CVE-2024-51253,0,0,bd6b7c4e24728199770eb9a14af1e277c7168d7d6f853e011077c74df42885e3,2024-11-04T18:50:05.607000 @@ -265671,14 +265676,14 @@ CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb CVE-2024-51481,0,0,79865ece5695e59d21a71c5242cb6b84c6582b835d3ed06315b12ef5cbe5ff4e,2024-11-01T12:57:03.417000 CVE-2024-51482,0,0,bfd63cd113518065a1bebad51613f86054f6e228acaf54013add2bd0a434c523,2024-11-05T14:15:14.840000 CVE-2024-51483,0,0,f70c42f235544d305181618bf39f85a2958b60e254bcd1640771f1e1cba85c88,2024-11-01T20:24:53.730000 -CVE-2024-51484,0,0,702c9eef66989d49f443105697529c0366c78728d1841138606db38ce216d817,2024-11-12T13:55:21.227000 -CVE-2024-51485,0,0,31fff43947b857d031a4fdbb88a07c40af7e2b11b292e3abc7f2012e09de9d36,2024-11-12T13:55:21.227000 -CVE-2024-51486,0,0,cfb832dac4d0cbf401700dcb55c0c7132e9df371a60e5f7ffc5aa427e996f6c8,2024-11-12T13:55:21.227000 -CVE-2024-51487,0,0,9d095d095278ad4a0dff54fce8de4e672ea8d9b24e1c51cb430743545d0db5d0,2024-11-12T13:55:21.227000 -CVE-2024-51488,0,0,ddbc9992d74d320bfbf1c9bd238e20d40adcec2b3d076a6778151cca6b5c7323,2024-11-12T13:55:21.227000 -CVE-2024-51489,0,0,efa91bf89407165e94622b83e98374536f35ce2357c1330a17e23418c17b6aac,2024-11-14T15:46:50.553000 +CVE-2024-51484,0,1,5ad773dfa5945e967ed814ecd83f8950f4a4be9ded42c813ce8f58f67f3e839a,2024-11-14T20:14:44.360000 +CVE-2024-51485,0,1,048497f9e62d1928c48f09ad1aa496e653c26dc6a3d76047826a152202d1f209,2024-11-14T20:06:12.627000 +CVE-2024-51486,0,1,fbc0430671200f5bea2fd75bf3c998ad971ed972c97a19a8cafbccb43ea185a9,2024-11-14T19:55:34.890000 +CVE-2024-51487,0,1,a83a631e81d66653d31978f19924867892c25aaddc9eac90a67354f92618e935,2024-11-14T19:37:53.107000 +CVE-2024-51488,0,1,a48a7601698a74a180f128f3050edf74445080860fde1b7f806d8ef650e632d0,2024-11-14T20:12:58.443000 +CVE-2024-51489,0,1,e5ad0022488018990486a414e781379ff86a44ab1670849d0fdca11bd887fc39,2024-11-14T20:12:52.027000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 -CVE-2024-51490,0,0,d4714e4f1de2d271a9b1753a60e073ec7ec6d263502b222cf774a3e40303ce12,2024-11-14T15:30:15.643000 +CVE-2024-51490,0,1,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000 CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000 CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000 CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000 @@ -265750,18 +265755,18 @@ CVE-2024-51583,0,0,010a1e766cc75cf146f9c46f237fd66f102136959cced374ac920d84a09d7 CVE-2024-51584,0,0,9c4a52f0d53ee42578cceb9af71c252fa973eb5d3948982134b3891bd8f24f09,2024-11-14T02:23:33.777000 CVE-2024-51585,0,0,f8f0159c16016c8277cf65597d8f99b43d67be3e4576e769b2c2d94060d5ff5c,2024-11-12T13:56:24.513000 CVE-2024-51586,0,0,a8972424c5984945ec92c9d745b8e4e19d8648e53cf9bf4412423a5729e18a26,2024-11-12T13:56:24.513000 -CVE-2024-51587,0,0,e9f51090d9fa9675336bc7bbe1c57c65ee721fe84e77e75530bdeca2bbd3390e,2024-11-12T13:56:24.513000 -CVE-2024-51588,0,0,86887bb25af63d8afae760e3bff597b6e65d20856876b111e550c616afd70db1,2024-11-12T13:56:24.513000 -CVE-2024-51589,0,0,4352c7b10d513c73c468cf162405842f1aca94517899c3343788aa1230c49906,2024-11-12T13:56:24.513000 +CVE-2024-51587,0,1,5012d2ea8e67b5c3d09827ef519aa6163b1c4ce17e7784b8af6d96ad392aa639,2024-11-14T20:26:14.467000 +CVE-2024-51588,0,1,70526e1ab4d1d5c15696a10cecb0303b3b1171b870de0da3e9c134310aec09dc,2024-11-14T20:26:28.047000 +CVE-2024-51589,0,1,f74ef05c06e608fec4a8cb8e6637837c5709985a6e45866d77121ef9596fd10a,2024-11-14T20:26:41.497000 CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 CVE-2024-51590,0,0,2b2dd3629e58a1a0a584c789ff16e47b54d755aa79cd57fc09a49fbe103244b5,2024-11-12T13:56:24.513000 -CVE-2024-51591,0,1,726468de391ad91b93d7baa9a968a1009926515da7cdc024a9ffcb433fe899c7,2024-11-14T17:51:14.717000 +CVE-2024-51591,0,0,726468de391ad91b93d7baa9a968a1009926515da7cdc024a9ffcb433fe899c7,2024-11-14T17:51:14.717000 CVE-2024-51592,0,0,d7967d1b981bf412d08b0a25269c7d321b022b9cea0f3a4b67df42b6afa94a25,2024-11-12T13:56:24.513000 CVE-2024-51593,0,0,0b8922825fb0b901603d2f67d3b43c5b8e0349818c9523e9ebd1542dcf2e04bf,2024-11-12T13:56:24.513000 CVE-2024-51594,0,0,6349168b6c38502c80c5202765ac4a54912ffa4126b37a3166a4be8b98199c58,2024-11-12T13:56:24.513000 CVE-2024-51595,0,0,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88d12,2024-11-12T13:56:24.513000 CVE-2024-51596,0,0,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000 -CVE-2024-51597,0,0,506ea8c3ccd37fd10cf92a9da4f6b30af469b7e869d78e2a86278b8ad4eb302c,2024-11-12T13:56:24.513000 +CVE-2024-51597,0,1,e580da6df611238773fd113640aa155cd0ddae703c31494078adb66dd981bd48,2024-11-14T20:27:46.943000 CVE-2024-51598,0,0,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000 CVE-2024-51599,0,0,5cd988e2787a53cdc2d1a464fab74b9367513165a89a10c905f4537cb27134dd,2024-11-12T13:56:24.513000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 @@ -265770,10 +265775,10 @@ CVE-2024-51602,0,0,822f9c86566535e8535c86995cf3af8d3cfe52baf5520ff85e767e1c3e725 CVE-2024-51603,0,0,8b39030ffd0cb3459341d14dd644b429e38d44c25946f2093686635047f23972,2024-11-12T13:56:24.513000 CVE-2024-51604,0,0,d6aae3a059c834fc01b3c5ecd18a671e61f67a1403ae9009e32e762b5707c5b2,2024-11-12T13:56:24.513000 CVE-2024-51605,0,0,3181370e86e19cb15e2ba0b512a12ea9b3036b112f432239f6f810bbb742dc02,2024-11-12T13:56:24.513000 -CVE-2024-51606,0,1,ee1e7a1b1dbbb608910d3a1a8045750337c3795b4002cbbe921c849cc6ea0c49,2024-11-14T17:17:28.997000 +CVE-2024-51606,0,0,ee1e7a1b1dbbb608910d3a1a8045750337c3795b4002cbbe921c849cc6ea0c49,2024-11-14T17:17:28.997000 CVE-2024-51607,0,0,6430a32ad0ccdbe2b5e85b260802defe649419f41be04507feb4e50aaec51a17,2024-11-12T13:56:24.513000 -CVE-2024-51608,0,1,fa8c1f71c1313549b1f07e9b16bbcd2db8cf2a03813dee88669910ab58470fe5,2024-11-14T17:14:55.070000 -CVE-2024-51609,0,1,56872967e7644d93195c5d54b9b6037222a1a65a36a397a829075693cfee2bc9,2024-11-14T17:10:36.463000 +CVE-2024-51608,0,0,fa8c1f71c1313549b1f07e9b16bbcd2db8cf2a03813dee88669910ab58470fe5,2024-11-14T17:14:55.070000 +CVE-2024-51609,0,0,56872967e7644d93195c5d54b9b6037222a1a65a36a397a829075693cfee2bc9,2024-11-14T17:10:36.463000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 CVE-2024-51610,0,0,0c5999073d5ab9119b43a93ca30f63ab8745f39e68c0616117ee986d0b9671e4,2024-11-12T13:56:24.513000 CVE-2024-51611,0,0,df71ebdad6b83784c059a213dbfeff0cd4ad4cfa07621a54c78ae28de90b182c,2024-11-12T13:56:24.513000 @@ -265819,6 +265824,7 @@ CVE-2024-51681,0,0,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5 CVE-2024-51682,0,0,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000 CVE-2024-51683,0,0,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000 CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 +CVE-2024-51688,1,1,f336ea0855ea6c7ae9e523ec49c986b999bafe76f23320e5c7d552ada048279f,2024-11-14T20:15:25.810000 CVE-2024-51689,0,0,ab2f405c7815c7db8e61d12d5b0c31d4e0752b7068e1e475bf3338853f840d9d,2024-11-12T13:56:24.513000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-51690,0,0,7e5eae0ff5cca9f377bf464de65b2d968392e357bd55f7a073753a3ee3d229f4,2024-11-12T13:56:24.513000 @@ -265902,13 +265908,13 @@ CVE-2024-5179,0,0,ea665152b8c9953ad6e84eb904f7eac78af7e075a45f2a4da51451b13f6b9c CVE-2024-51790,0,0,fba98a5a0db28c31280349a90cdb7b7024352d9f0714027ac377d0f6cd5519cc,2024-11-12T13:55:21.227000 CVE-2024-51791,0,0,23e57cba494263540d9476be8dbc91c39074a345469e3f762d8046c45490e08d,2024-11-12T13:55:21.227000 CVE-2024-51792,0,0,fc1eeb5584728befc235c6239684e31ab35d3a01996711d288287f5d00f4e79e,2024-11-12T13:55:21.227000 -CVE-2024-51793,0,1,e5fc762a7a32ea475c07569842392172d1bc64c0845c6072708f9c58bc29c98d,2024-11-14T17:54:09.443000 +CVE-2024-51793,0,0,e5fc762a7a32ea475c07569842392172d1bc64c0845c6072708f9c58bc29c98d,2024-11-14T17:54:09.443000 CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000 CVE-2024-5182,0,0,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d63b,2024-08-27T17:30:21.127000 -CVE-2024-51820,0,1,32887e354effea1e131cd9e743ee44f42b47c96e6bd7b3cb63299faaf19261f2,2024-11-14T18:03:02.447000 -CVE-2024-51837,0,1,e9f8081c2d7915b10644a12d0f68fe73c734be4cc28338c4f4e1ebedd715f110,2024-11-14T18:43:03.537000 +CVE-2024-51820,0,0,32887e354effea1e131cd9e743ee44f42b47c96e6bd7b3cb63299faaf19261f2,2024-11-14T18:03:02.447000 +CVE-2024-51837,0,0,e9f8081c2d7915b10644a12d0f68fe73c734be4cc28338c4f4e1ebedd715f110,2024-11-14T18:43:03.537000 CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000 -CVE-2024-51843,0,1,a6d4a6be7765d1f6ab8758bae3a6c01142ac4e227b76768176b61b0604aaa531,2024-11-14T18:53:54.760000 +CVE-2024-51843,0,0,a6d4a6be7765d1f6ab8758bae3a6c01142ac4e227b76768176b61b0604aaa531,2024-11-14T18:53:54.760000 CVE-2024-51845,0,0,dbd1c3b4a35b8f99deb6b733f1f6a0d823e2de27d76d535b93cb645196883f7d,2024-11-12T13:55:21.227000 CVE-2024-5185,0,0,0c09010aee9423412314c9f1cbba57fc2fd9ee19c760646e6502f5738cacb7fd,2024-08-30T19:15:16.340000 CVE-2024-5186,0,0,7baed0c201f742c44896dec767d6237c8df7ae961ab3d7ec09eb8b65736716f7,2024-09-24T14:04:47.170000 @@ -266017,8 +266023,8 @@ CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3b CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000 CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000 CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000 -CVE-2024-52350,0,0,692358ac026b1dcbfe6e09ab2593ec3b4f32e9a916cf64b8732ac22b9832c48f,2024-11-12T13:55:21.227000 -CVE-2024-52351,0,0,a3e325cd315c5fea0f5f837fd6ee002cc35206ad757df5ede60f907fde9affb3,2024-11-12T13:55:21.227000 +CVE-2024-52350,0,1,e1972ef2ed811c153b13903abf6cdb344f717306ca9175d9381f4d30088fc38a,2024-11-14T20:22:24.387000 +CVE-2024-52351,0,1,bc8a69483160ec6542284bd2a28a21525e92c209bc39a02aab3ce5329e7f65b5,2024-11-14T20:24:39.083000 CVE-2024-52352,0,0,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f0382e,2024-11-12T13:55:21.227000 CVE-2024-52353,0,0,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000 CVE-2024-52354,0,0,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000 @@ -266027,25 +266033,27 @@ CVE-2024-52356,0,0,6f52c6a317f3e6d9b4fea003476d72ca3813f755516b2759515eed910b7d7 CVE-2024-52357,0,0,0b87f00ebcffd7ab9b093f3ccd343158c40fba6d8989757f4c8a16b72f945025,2024-11-12T13:55:21.227000 CVE-2024-52358,0,0,98865d3b54e5cf46f7348181649ffde2326b16ddca1830d7a36a631093f0fb1c,2024-11-12T13:55:21.227000 CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000 +CVE-2024-52369,1,1,ae9094b09e5afb967416763a162ae84e427c99fc8df047cc10454b5d4560616d,2024-11-14T19:15:09.533000 CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000 -CVE-2024-52371,1,1,e317ec242f10297ab3e3fbb218a6c860ca6829dfd4eae7680de76f5511014375,2024-11-14T18:15:21.383000 -CVE-2024-52372,1,1,23bb66a968be43561306c3e6f22460792787db17519c7be51902bbab5c73f773,2024-11-14T18:15:21.737000 -CVE-2024-52373,1,1,356a21a49fe25c0e02ed4d02c15b4a7e816a29c13c357516adc354a0e2147649,2024-11-14T18:15:21.993000 -CVE-2024-52374,1,1,78d6fb15794391c868fc56ec155b3c8f40ca933f0b5239bbbadef4b3304b3705,2024-11-14T18:15:22.420000 -CVE-2024-52375,1,1,653b0bd1373146fd4ccda17deb0c35d8f0daf24d36821bb095a73b4fd070b7ad,2024-11-14T18:15:23.117000 -CVE-2024-52376,1,1,b559962c9280acbcee199f6c3ac871209278734389b79e886993cd01664bd39d,2024-11-14T18:15:23.570000 -CVE-2024-52377,1,1,169b963bf9f71b88a242692e8abb9831743969676f6056684c710ab866a074c1,2024-11-14T18:15:23.800000 -CVE-2024-52378,1,1,725a806ad6dc447249e0f3d5a28b7126c924cffcf0e1b9b67071be6faac7979f,2024-11-14T18:15:24.160000 -CVE-2024-52379,1,1,2000c94fb8e536fc455534c247b2d585a2ae7ee7483eeabbd4d680268cba5e2b,2024-11-14T18:15:24.507000 +CVE-2024-52370,1,1,8c9d6ca4ccd27001e922f930f3ccceb2cdfaf3ddd39977cc6e79e5f0568f9844,2024-11-14T19:15:09.760000 +CVE-2024-52371,0,0,e317ec242f10297ab3e3fbb218a6c860ca6829dfd4eae7680de76f5511014375,2024-11-14T18:15:21.383000 +CVE-2024-52372,0,0,23bb66a968be43561306c3e6f22460792787db17519c7be51902bbab5c73f773,2024-11-14T18:15:21.737000 +CVE-2024-52373,0,0,356a21a49fe25c0e02ed4d02c15b4a7e816a29c13c357516adc354a0e2147649,2024-11-14T18:15:21.993000 +CVE-2024-52374,0,0,78d6fb15794391c868fc56ec155b3c8f40ca933f0b5239bbbadef4b3304b3705,2024-11-14T18:15:22.420000 +CVE-2024-52375,0,0,653b0bd1373146fd4ccda17deb0c35d8f0daf24d36821bb095a73b4fd070b7ad,2024-11-14T18:15:23.117000 +CVE-2024-52376,0,0,b559962c9280acbcee199f6c3ac871209278734389b79e886993cd01664bd39d,2024-11-14T18:15:23.570000 +CVE-2024-52377,0,0,169b963bf9f71b88a242692e8abb9831743969676f6056684c710ab866a074c1,2024-11-14T18:15:23.800000 +CVE-2024-52378,0,0,725a806ad6dc447249e0f3d5a28b7126c924cffcf0e1b9b67071be6faac7979f,2024-11-14T18:15:24.160000 +CVE-2024-52379,0,0,2000c94fb8e536fc455534c247b2d585a2ae7ee7483eeabbd4d680268cba5e2b,2024-11-14T18:15:24.507000 CVE-2024-5238,0,0,a03a95be1868c6bee6318b11858946fc155e156e4fa75ea27b59162de04fd53f,2024-06-04T19:21:03.413000 -CVE-2024-52380,1,1,439c4471e5c55a16e6c7f1fda73b7588ee53429e29d4c91b708135bb89665294,2024-11-14T18:15:24.837000 -CVE-2024-52381,1,1,5490501b0b7cb5dd31281f323cc53949170590f25be3035ec9c58749bb2a77ac,2024-11-14T18:15:25.137000 -CVE-2024-52382,1,1,8b50a0c69ecff4a10ad372fa1734c345b5933c67dc642634393504c339d3d961,2024-11-14T18:15:25.400000 -CVE-2024-52383,1,1,f6c4247e5b79c9b3acf2e12769de76728836c89b6b47cdb325f0e8aa5c66b961,2024-11-14T18:15:25.673000 -CVE-2024-52384,1,1,ce4a2adcca8fedb3ffd2031633939cc5b2a015620a5bcfe722fe131a1a735e3f,2024-11-14T18:15:25.913000 +CVE-2024-52380,0,0,439c4471e5c55a16e6c7f1fda73b7588ee53429e29d4c91b708135bb89665294,2024-11-14T18:15:24.837000 +CVE-2024-52381,0,0,5490501b0b7cb5dd31281f323cc53949170590f25be3035ec9c58749bb2a77ac,2024-11-14T18:15:25.137000 +CVE-2024-52382,0,0,8b50a0c69ecff4a10ad372fa1734c345b5933c67dc642634393504c339d3d961,2024-11-14T18:15:25.400000 +CVE-2024-52383,0,0,f6c4247e5b79c9b3acf2e12769de76728836c89b6b47cdb325f0e8aa5c66b961,2024-11-14T18:15:25.673000 +CVE-2024-52384,0,0,ce4a2adcca8fedb3ffd2031633939cc5b2a015620a5bcfe722fe131a1a735e3f,2024-11-14T18:15:25.913000 CVE-2024-5239,0,0,22096f8834a8c03dcb48be161c14c319f43af7764381bdfba5862a8d7ec5b0e4,2024-06-04T19:21:03.520000 -CVE-2024-52393,1,1,5d325e767191cb4360b1037e8925cbd1e9b39c416613dffc3da9c523441c42ab,2024-11-14T18:15:26.140000 -CVE-2024-52396,1,1,25ddfd2ed12e4786902a6f41c33759128a4017098e69734285be305e8b0a3d90,2024-11-14T18:15:26.377000 +CVE-2024-52393,0,0,5d325e767191cb4360b1037e8925cbd1e9b39c416613dffc3da9c523441c42ab,2024-11-14T18:15:26.140000 +CVE-2024-52396,0,0,25ddfd2ed12e4786902a6f41c33759128a4017098e69734285be305e8b0a3d90,2024-11-14T18:15:26.377000 CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000 CVE-2024-5241,0,0,b91d4b722c041cbce6644b69dfde443a5ae4515bb0ecbdc8f8544e6b04a0143c,2024-06-04T19:21:03.750000 CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000 @@ -266060,7 +266068,7 @@ CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb CVE-2024-52505,0,0,57ccd65234ca26ee122006fc2fd297cd6476ffcbc3e000ccfd260aa2e522cc64,2024-11-14T16:15:20.220000 CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000 CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000 -CVE-2024-52524,1,1,722ff46c18c852a9996cf4c27de7aa2756510ae7b124e9e0792e085fdaedaaba,2024-11-14T18:15:26.610000 +CVE-2024-52524,0,0,722ff46c18c852a9996cf4c27de7aa2756510ae7b124e9e0792e085fdaedaaba,2024-11-14T18:15:26.610000 CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000 CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000 CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000 @@ -266717,7 +266725,7 @@ CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da758158 CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000 CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000 CVE-2024-5981,0,0,ef1af743cedf4b6b2a243e8210155140211219a91ac8483d52ff9c2f041ab697,2024-08-16T20:29:35.287000 -CVE-2024-5982,0,1,7c71634ff9331b5352aa00156297bd0464d86f167cdd23e49f4124985fc0c305,2024-11-14T18:52:16.567000 +CVE-2024-5982,0,0,7c71634ff9331b5352aa00156297bd0464d86f167cdd23e49f4124985fc0c305,2024-11-14T18:52:16.567000 CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018a7,2024-07-24T02:39:24.200000 CVE-2024-5984,0,0,02adfef3fce737b6a79614009e0e348625eec114041041ad04a7ccaf8be7e88b,2024-10-09T18:37:10.747000 CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000 @@ -266794,7 +266802,7 @@ CVE-2024-6064,0,0,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000 CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000 CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000 -CVE-2024-6068,1,1,50e35eb8c18da26a456aeaddd0104d0fd03875e3ed8bf390602102d874dd8853,2024-11-14T17:15:07.680000 +CVE-2024-6068,0,0,50e35eb8c18da26a456aeaddd0104d0fd03875e3ed8bf390602102d874dd8853,2024-11-14T17:15:07.680000 CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000 CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000 CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000