diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46988.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46988.json index 54a76f7a43a..27204ee7876 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46988.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46988.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46988", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.640", - "lastModified": "2024-12-24T14:25:32.130", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:01:37.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -102,38 +102,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc1:*:*:*:*:*:*", - "matchCriteriaId": "07875739-0CCB-4F48-9330-3D4B6A4064FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DA09B732-04F8-452C-94CF-97644E78684D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc3:*:*:*:*:*:*", - "matchCriteriaId": "E5371152-7515-4908-BB7E-494805EA5DF2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7788E5B-D54E-45BF-9043-2C7B77842FD0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc5:*:*:*:*:*:*", - "matchCriteriaId": "A935F9F1-DA8B-49F4-BF2B-FA01A92F113E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc6:*:*:*:*:*:*", - "matchCriteriaId": "DF0AF673-12B7-4274-9090-411D4939CB62" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.12:rc7:*:*:*:*:*:*", - "matchCriteriaId": "06AE06A6-A0C3-4556-BFFA-3D6E4BAC43C8" + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" } ] } diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46990.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46990.json index a359dd14539..e97d151eacc 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46990.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46990.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46990", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.733", - "lastModified": "2024-12-24T14:30:57.310", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:01:41.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -118,36 +118,6 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", - "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", - "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", - "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", - "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", - "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc7:*:*:*:*:*:*", - "matchCriteriaId": "F63101C7-E7A3-4C74-9CD5-B5FC5F53F5C8" } ] } diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json index 2c00b685b1f..61058a7ce12 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4860.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4860", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.070", - "lastModified": "2024-11-21T08:36:07.650", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:43:44.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.0.5790.98", + "matchCriteriaId": "50BEE8A6-45AE-4322-A841-DE18CF0F1590" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40064341", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40064341", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json index 020024e37ef..c98a8ec9897 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7010.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7010", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.140", - "lastModified": "2024-11-21T08:45:01.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:41:50.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "117.0.5938.62", + "matchCriteriaId": "73BA21B3-79E0-40E8-9AD9-BD459AA1CEFF" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40070891", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40070891", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json index 2490c505fb1..9b7dee52de9 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7011.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7011", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.210", - "lastModified": "2024-11-21T08:45:01.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:43:13.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "119.0.6045.105", + "matchCriteriaId": "EB02C074-0B9E-4658-BC8D-5F6198D2E3EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40066780", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40066780", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json index a2db7ac8676..c7970d99942 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7012.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7012", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T23:15:11.270", - "lastModified": "2024-11-21T08:45:01.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:43:32.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,22 +85,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "117.0.5938.62", + "matchCriteriaId": "73BA21B3-79E0-40E8-9AD9-BD459AA1CEFF" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40061509", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40061509", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json index d29882db7f0..a52fc4bb9b5 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7261", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-07T20:15:10.887", - "lastModified": "2024-11-21T08:45:37.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:07:39.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:updater:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.36.351", + "matchCriteriaId": "E44CE57F-E54B-4F58-87A4-AE7B8565CDC2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39B565E1-C2F1-44FC-A517-E3130332B17C" + } + ] + } + ] + } + ], "references": [ { "url": "https://issues.chromium.org/issues/40064602", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://issues.chromium.org/issues/40064602", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12744.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12744.json index 5c20c8eafab..a1d971ecd99 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12744.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12744.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12744", "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2024-12-24T17:15:07.940", - "lastModified": "2024-12-24T17:15:07.940", + "lastModified": "2024-12-26T15:15:06.290", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ } ], "references": [ + { + "url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-015/", + "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" + }, { "url": "https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-8596-2jgr-ppj7", "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12745.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12745.json index d0753c14542..dc4f4de09f9 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12745.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12745.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12745", "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2024-12-24T17:15:08.150", - "lastModified": "2024-12-24T17:15:08.150", + "lastModified": "2024-12-26T15:15:06.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ } ], "references": [ + { + "url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-015/", + "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" + }, { "url": "https://github.com/aws/amazon-redshift-python-driver/security/advisories/GHSA-8gc2-vq6m-rwjw", "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12746.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12746.json index d101d75b364..fd315e2a8e1 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12746.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12746.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12746", "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "published": "2024-12-24T17:15:08.353", - "lastModified": "2024-12-24T17:15:08.353", + "lastModified": "2024-12-26T15:15:06.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -92,6 +92,10 @@ } ], "references": [ + { + "url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-015/", + "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" + }, { "url": "https://github.com/aws/amazon-redshift-odbc-driver/security/advisories/GHSA-g63m-5vjv-wr3v", "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12908.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12908.json new file mode 100644 index 00000000000..86dbaf7bf1f --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12908.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-12908", + "sourceIdentifier": "1443cd92-d354-46d2-9290-d812316ca43a", + "published": "2024-12-26T16:15:06.050", + "lastModified": "2024-12-26T16:15:06.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version\u00a06.0.3.26)\u00a0where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a\u00a0remote attacker may be able to convince a user to visit a malicious web-page, or open a\nmalicious document which could trigger the vulnerable handler, allowing them to execute\narbitrary code on the user's machine.\u00a0Delinea added additional validation that the downloaded installer's batch file was in the expected format." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "1443cd92-d354-46d2-9290-d812316ca43a", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "1443cd92-d354-46d2-9290-d812316ca43a", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/", + "source": "1443cd92-d354-46d2-9290-d812316ca43a" + }, + { + "url": "https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm", + "source": "1443cd92-d354-46d2-9290-d812316ca43a" + }, + { + "url": "https://trust.delinea.com/", + "source": "1443cd92-d354-46d2-9290-d812316ca43a" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json index f0e6c71b05d..60d26da8086 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12951.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12951", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T13:15:05.667", - "lastModified": "2024-12-26T13:15:05.667", + "lastModified": "2024-12-26T16:15:06.730", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.468644", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README3.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12952.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12952.json index 234dfef79de..4c0b857bbe2 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12952.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12952.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12952", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T13:15:06.727", - "lastModified": "2024-12-26T13:15:06.727", + "lastModified": "2024-12-26T16:15:10.540", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -148,6 +148,18 @@ { "url": "https://vuldb.com/?submit.468683", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/melMass/comfy_mtb/issues/224", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2552664778", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2553432365", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json index b5a3f5e4ca3..ce94ca7c4dd 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12953.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12953", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T14:15:05.147", - "lastModified": "2024-12-26T14:15:05.147", + "lastModified": "2024-12-26T16:15:14.487", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.468769", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json index d59cb7314dc..a42b0456484 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12954.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12954", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T14:15:06.000", - "lastModified": "2024-12-26T14:15:06.000", + "lastModified": "2024-12-26T16:15:17.510", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.468772", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README5.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12955.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12955.json new file mode 100644 index 00000000000..dd8345c17a4 --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12955.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-12955", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-26T15:15:06.767", + "lastModified": "2024-12-26T16:15:20.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in PHPGurukul Blood Bank & Donor Management System 2.4 and classified as problematic. This vulnerability affects unknown code of the file /logout.php. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289318", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289318", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.468878", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.468878", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12956.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12956.json new file mode 100644 index 00000000000..9c4f6d14be4 --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12956.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-12956", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-26T15:15:06.953", + "lastModified": "2024-12-26T16:15:22.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. This issue affects some unknown processing of the file /add_achievement_details.php. The manipulation of the argument ach_certy leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://1000projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289319", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289319", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.468540", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12958.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12958.json new file mode 100644 index 00000000000..f871a816203 --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12958.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-12958", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-26T16:15:25.667", + "lastModified": "2024-12-26T16:15:25.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. This affects an unknown part of the file /update_pro_details.php. The manipulation of the argument q leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://1000projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README6.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289323", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289323", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.468799", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json new file mode 100644 index 00000000000..319d8fb3587 --- /dev/null +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12959.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-12959", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-26T16:15:27.643", + "lastModified": "2024-12-26T16:15:27.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in 1000 Projects Portfolio Management System MCA 1.0. This vulnerability affects unknown code of the file /update_personal_details.php. The manipulation of the argument q leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://1000projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README7.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289324", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289324", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.468800", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json index 1205a8f11a6..86e6821010b 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1694", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-07T20:15:10.973", - "lastModified": "2024-11-21T08:51:06.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:09:24.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:updater:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.36.351", + "matchCriteriaId": "E44CE57F-E54B-4F58-87A4-AE7B8565CDC2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://issues.chromium.org/issues/40946325", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://issues.chromium.org/issues/40946325", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51540.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51540.json new file mode 100644 index 00000000000..2321bda485e --- /dev/null +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51540.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51540", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-26T16:15:29.640", + "lastModified": "2024-12-26T16:15:29.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell ECS, versions prior to 3.8.1.3 contains an arithmetic overflow vulnerability exists in retention period handling of ECS. An authenticated user with bucket or object-level access and the necessary privileges could potentially exploit this vulnerability to bypass retention policies and delete objects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json index 86342af2660..e6fea765dc3 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5493.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5493", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.283", - "lastModified": "2024-11-21T09:47:47.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:36:54.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,114 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0.6422.141", + "matchCriteriaId": "3402DC85-809C-464E-8762-521C59315387" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339877165", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339877165", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json index 6b2872c8eb7..8af3b0b3585 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5494", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.367", - "lastModified": "2024-11-21T09:47:47.450", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:38:51.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,114 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0.6422.141", + "matchCriteriaId": "3402DC85-809C-464E-8762-521C59315387" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/338071106", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/338071106", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json index dbe262d5687..32c90f759be 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5495", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.433", - "lastModified": "2024-11-21T09:47:48.493", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:42:57.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,114 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0.6422.141", + "matchCriteriaId": "3402DC85-809C-464E-8762-521C59315387" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/338103465", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/338103465", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json index 65f4789ad82..e24d39de4e3 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5496.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5496", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.497", - "lastModified": "2024-11-21T09:47:48.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:43:17.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0.6422.141", + "matchCriteriaId": "3402DC85-809C-464E-8762-521C59315387" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/338929744", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/338929744", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json index f84a4ead966..f99a0e4903c 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5497", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.560", - "lastModified": "2024-11-21T09:47:48.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:43:33.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0.6422.141", + "matchCriteriaId": "3402DC85-809C-464E-8762-521C59315387" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339061099", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339061099", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json index db04a376c48..65c01c1fe15 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5498.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5498", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.630", - "lastModified": "2024-11-21T09:47:49.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:43:44.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0.6422.141", + "matchCriteriaId": "3402DC85-809C-464E-8762-521C59315387" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339588211", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339588211", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json index 75daa9eb168..f9e6889cc13 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5499.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5499", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-30T23:15:48.697", - "lastModified": "2024-11-21T09:47:49.183", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:07:06.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0.6422.141", + "matchCriteriaId": "3402DC85-809C-464E-8762-521C59315387" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339877167", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/339877167", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json index 533941e519b..2eaef8b6ff9 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6290.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6290", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.460", - "lastModified": "2024-11-21T09:49:21.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:26:22.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,38 +91,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.126", + "matchCriteriaId": "F668E111-FA1B-4F16-9486-9D5A0794DCC3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/342428008", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/342428008", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json index 2ab2699d91f..4d53d59899f 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6291.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6291", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.577", - "lastModified": "2024-11-21T09:49:22.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:26:31.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,38 +91,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.126", + "matchCriteriaId": "F668E111-FA1B-4F16-9486-9D5A0794DCC3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40942995", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40942995", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json index 575ce173606..ea0217fb23c 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6292", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.660", - "lastModified": "2024-11-21T09:49:22.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:26:46.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,38 +91,114 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.126", + "matchCriteriaId": "F668E111-FA1B-4F16-9486-9D5A0794DCC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/342545100", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/342545100", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json index b95c519fc66..88ff4719eef 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6293.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6293", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-24T22:15:10.740", - "lastModified": "2024-11-21T09:49:22.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:02:51.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,38 +91,114 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.126", + "matchCriteriaId": "F668E111-FA1B-4F16-9486-9D5A0794DCC3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/345993680", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/345993680", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6772.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6772.json index f7c1b06ba4a..d8139c5feb9 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6772.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6772", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T22:15:06.810", - "lastModified": "2024-11-21T09:50:17.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:02:45.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.182", + "matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/346597059", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/346597059", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6773.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6773.json index 2c5a8d15022..4d269c14e33 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6773.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6773", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T22:15:06.893", - "lastModified": "2024-11-21T09:50:17.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:03:48.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.182", + "matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/347724915", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/347724915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6774.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6774.json index f1e6ba684ca..afac7fb4db4 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6774.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6774.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6774", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T22:15:06.963", - "lastModified": "2024-11-21T09:50:18.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:04:06.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,22 +91,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.182", + "matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/346898524", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/346898524", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6775.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6775.json index 8172f684249..d31f07bbf6f 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6775.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6775", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T22:15:07.073", - "lastModified": "2024-11-21T09:50:18.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:05:07.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,22 +91,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.182", + "matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/347373236", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/347373236", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6776.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6776.json index a0b7f32cae7..a7c740afaf7 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6776.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6776.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6776", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T22:15:07.163", - "lastModified": "2024-11-21T09:50:18.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T16:05:20.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,22 +91,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.182", + "matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/346692546", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/346692546", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6778.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6778.json index 20e6c477431..d61daf8600f 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6778.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6778.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6778", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T22:15:07.357", - "lastModified": "2024-11-21T09:50:18.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:36:56.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,22 +91,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.182", + "matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/341136300", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/341136300", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6779.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6779.json index 849a1c20750..d8cafcf33e2 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6779.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6779", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-07-16T22:15:07.460", - "lastModified": "2024-11-21T09:50:18.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-26T15:41:39.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0.6478.182", + "matchCriteriaId": "26C1F2B0-2FAA-47FE-A54B-29F3332447DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/351327767", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/351327767", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json index 16d6a41ba44..4a309760d51 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8975", "sourceIdentifier": "security@grafana.com", "published": "2024-09-25T17:15:19.360", - "lastModified": "2024-10-01T19:20:21.103", + "lastModified": "2024-12-26T15:00:26.180", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -83,6 +83,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -96,13 +97,24 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:grafana:alloy:1.4.0:rc.0:*:*:*:*:*:*", - "matchCriteriaId": "6D6E0AE9-806E-494F-981B-87C7DD8DA29B" + "criteria": "cpe:2.3:a:grafana:alloy:1.4.0:rc0:*:*:*:*:*:*", + "matchCriteriaId": "EDEDC487-EC03-4EFF-BFC2-F28FF86C25B7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:grafana:alloy:1.4.0:rc.1:*:*:*:*:*:*", - "matchCriteriaId": "6C18AD89-54BC-46BA-8902-0B0B29671D8C" + "criteria": "cpe:2.3:a:grafana:alloy:1.4.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2724CED9-623A-459D-A29B-1D9E3E7D5148" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } diff --git a/README.md b/README.md index df2cb3aa0d0..5b877359bf3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-26T15:00:19.871411+00:00 +2024-12-26T17:00:20.628288+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-26T14:58:47.547000+00:00 +2024-12-26T16:43:44.433000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274717 +274723 ``` ### CVEs added in the last Commit Recently added CVEs: `6` -- [CVE-2024-12951](CVE-2024/CVE-2024-129xx/CVE-2024-12951.json) (`2024-12-26T13:15:05.667`) -- [CVE-2024-12952](CVE-2024/CVE-2024-129xx/CVE-2024-12952.json) (`2024-12-26T13:15:06.727`) -- [CVE-2024-12953](CVE-2024/CVE-2024-129xx/CVE-2024-12953.json) (`2024-12-26T14:15:05.147`) -- [CVE-2024-12954](CVE-2024/CVE-2024-129xx/CVE-2024-12954.json) (`2024-12-26T14:15:06.000`) -- [CVE-2024-47149](CVE-2024/CVE-2024-471xx/CVE-2024-47149.json) (`2024-12-26T13:15:07.007`) -- [CVE-2024-47150](CVE-2024/CVE-2024-471xx/CVE-2024-47150.json) (`2024-12-26T13:15:07.140`) +- [CVE-2024-12908](CVE-2024/CVE-2024-129xx/CVE-2024-12908.json) (`2024-12-26T16:15:06.050`) +- [CVE-2024-12955](CVE-2024/CVE-2024-129xx/CVE-2024-12955.json) (`2024-12-26T15:15:06.767`) +- [CVE-2024-12956](CVE-2024/CVE-2024-129xx/CVE-2024-12956.json) (`2024-12-26T15:15:06.953`) +- [CVE-2024-12958](CVE-2024/CVE-2024-129xx/CVE-2024-12958.json) (`2024-12-26T16:15:25.667`) +- [CVE-2024-12959](CVE-2024/CVE-2024-129xx/CVE-2024-12959.json) (`2024-12-26T16:15:27.643`) +- [CVE-2024-51540](CVE-2024/CVE-2024-515xx/CVE-2024-51540.json) (`2024-12-26T16:15:29.640`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `34` -- [CVE-2023-36504](CVE-2023/CVE-2023-365xx/CVE-2023-36504.json) (`2024-12-26T14:58:30.100`) -- [CVE-2024-1014](CVE-2024/CVE-2024-10xx/CVE-2024-1014.json) (`2024-12-26T14:47:20.980`) -- [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2024-12-26T14:47:20.980`) -- [CVE-2024-5444](CVE-2024/CVE-2024-54xx/CVE-2024-5444.json) (`2024-12-26T14:43:05.523`) -- [CVE-2024-5938](CVE-2024/CVE-2024-59xx/CVE-2024-5938.json) (`2024-12-26T14:58:47.547`) -- [CVE-2024-6777](CVE-2024/CVE-2024-67xx/CVE-2024-6777.json) (`2024-12-26T14:55:39.437`) -- [CVE-2024-8481](CVE-2024/CVE-2024-84xx/CVE-2024-8481.json) (`2024-12-26T14:58:41.757`) +- [CVE-2024-12746](CVE-2024/CVE-2024-127xx/CVE-2024-12746.json) (`2024-12-26T15:15:06.650`) +- [CVE-2024-12951](CVE-2024/CVE-2024-129xx/CVE-2024-12951.json) (`2024-12-26T16:15:06.730`) +- [CVE-2024-12952](CVE-2024/CVE-2024-129xx/CVE-2024-12952.json) (`2024-12-26T16:15:10.540`) +- [CVE-2024-12953](CVE-2024/CVE-2024-129xx/CVE-2024-12953.json) (`2024-12-26T16:15:14.487`) +- [CVE-2024-12954](CVE-2024/CVE-2024-129xx/CVE-2024-12954.json) (`2024-12-26T16:15:17.510`) +- [CVE-2024-1694](CVE-2024/CVE-2024-16xx/CVE-2024-1694.json) (`2024-12-26T16:09:24.467`) +- [CVE-2024-5493](CVE-2024/CVE-2024-54xx/CVE-2024-5493.json) (`2024-12-26T16:36:54.357`) +- [CVE-2024-5494](CVE-2024/CVE-2024-54xx/CVE-2024-5494.json) (`2024-12-26T16:38:51.957`) +- [CVE-2024-5495](CVE-2024/CVE-2024-54xx/CVE-2024-5495.json) (`2024-12-26T16:42:57.383`) +- [CVE-2024-5496](CVE-2024/CVE-2024-54xx/CVE-2024-5496.json) (`2024-12-26T16:43:17.607`) +- [CVE-2024-5497](CVE-2024/CVE-2024-54xx/CVE-2024-5497.json) (`2024-12-26T16:43:33.383`) +- [CVE-2024-5498](CVE-2024/CVE-2024-54xx/CVE-2024-5498.json) (`2024-12-26T16:43:44.433`) +- [CVE-2024-5499](CVE-2024/CVE-2024-54xx/CVE-2024-5499.json) (`2024-12-26T16:07:06.693`) +- [CVE-2024-6290](CVE-2024/CVE-2024-62xx/CVE-2024-6290.json) (`2024-12-26T16:26:22.763`) +- [CVE-2024-6291](CVE-2024/CVE-2024-62xx/CVE-2024-6291.json) (`2024-12-26T16:26:31.473`) +- [CVE-2024-6292](CVE-2024/CVE-2024-62xx/CVE-2024-6292.json) (`2024-12-26T16:26:46.207`) +- [CVE-2024-6293](CVE-2024/CVE-2024-62xx/CVE-2024-6293.json) (`2024-12-26T16:02:51.103`) +- [CVE-2024-6772](CVE-2024/CVE-2024-67xx/CVE-2024-6772.json) (`2024-12-26T16:02:45.563`) +- [CVE-2024-6773](CVE-2024/CVE-2024-67xx/CVE-2024-6773.json) (`2024-12-26T16:03:48.013`) +- [CVE-2024-6774](CVE-2024/CVE-2024-67xx/CVE-2024-6774.json) (`2024-12-26T16:04:06.250`) +- [CVE-2024-6775](CVE-2024/CVE-2024-67xx/CVE-2024-6775.json) (`2024-12-26T16:05:07.670`) +- [CVE-2024-6776](CVE-2024/CVE-2024-67xx/CVE-2024-6776.json) (`2024-12-26T16:05:20.450`) +- [CVE-2024-6778](CVE-2024/CVE-2024-67xx/CVE-2024-6778.json) (`2024-12-26T15:36:56.463`) +- [CVE-2024-6779](CVE-2024/CVE-2024-67xx/CVE-2024-6779.json) (`2024-12-26T15:41:39.910`) +- [CVE-2024-8975](CVE-2024/CVE-2024-89xx/CVE-2024-8975.json) (`2024-12-26T15:00:26.180`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 211683a4a6b..0949a599c91 100644 --- a/_state.csv +++ b/_state.csv @@ -187154,9 +187154,9 @@ CVE-2021-46984,0,0,d9cce9d726ee3d6403e2144a0618518d03488b8f6aa8580231d506cf0d7c3 CVE-2021-46985,0,0,b55f7da4d8af6b538e5342c699879b38a7eac54f39c8d2da26b510610f029cd8,2024-12-06T15:02:17.187000 CVE-2021-46986,0,0,e8bf96e7d68a0a39498049c9247d2d34f593bd8c73d1f880d85fb602a45b9951,2024-11-21T06:35:07.760000 CVE-2021-46987,0,0,8b30e27b6b209d80685bed3bea9ab3c4c2b966757291dae1784881a91a36c579,2024-12-06T15:07:49.483000 -CVE-2021-46988,0,0,bb3f06f2c641a7a082c9b77fe59ee802148066b3526dd5bd0f2f235d296ad089,2024-12-24T14:25:32.130000 +CVE-2021-46988,0,1,de8d73a57494caab48e725962c4418d3d631d0723f1dc9c9f4d6cd417f6dc70a,2024-12-26T15:01:37.110000 CVE-2021-46989,0,0,600337192eb6414d45bda3482618305f3b218774e0cae5d5e975853340f7b41b,2024-11-21T06:35:08.167000 -CVE-2021-46990,0,0,d815e81975a79b2e3a047c66789857803c479a6177bbf16cdf6205d5ed9b46db,2024-12-24T14:30:57.310000 +CVE-2021-46990,0,1,ce8555ace2bf3a1f14f5c2122c041f8c05ea4411a5757642319b18f33f58c34e,2024-12-26T15:01:41.753000 CVE-2021-46991,0,0,2f6445f008d8252daec57a306462580e4e81cb2e8269cb435b7460491da39731,2024-12-06T15:27:56.500000 CVE-2021-46992,0,0,19c99c300bb6998a5850e0973feda19b3c49096e5600119628f0575bd055a56f,2024-12-24T14:34:12.700000 CVE-2021-46993,0,0,4174cc77477502e59614df8d700469da9d9c4c2c348540bb8233d1949572daef,2024-12-24T14:40:13.420000 @@ -228096,7 +228096,7 @@ CVE-2023-3650,0,0,59d67f695ce0a439c91aa9aca8211e7840329c605fbc79a1b81cd1ce6873fd CVE-2023-36501,0,0,c5fd1d48310551e06c32858d3409f4b3bb81cd7bf054db0d3372ef926c25dfa2,2024-11-21T08:09:50.330000 CVE-2023-36502,0,0,e9d4311f7e63b9210af8c1a166cb719dc6be2e97fafa60cc1a82e40b1b54f98c,2024-11-21T08:09:50.440000 CVE-2023-36503,0,0,fcdad8415d080aa47a84afac77e8960e774a0ec452ae2f7f9d9cac880e3ce051,2024-11-21T08:09:50.547000 -CVE-2023-36504,0,1,b5bae85a56b80cc82ee2f0e40cb8a5ddeda98713155429cf430d437601a3fe5d,2024-12-26T14:58:30.100000 +CVE-2023-36504,0,0,b5bae85a56b80cc82ee2f0e40cb8a5ddeda98713155429cf430d437601a3fe5d,2024-12-26T14:58:30.100000 CVE-2023-36505,0,0,5363f501da8bfc66e09637cdf5abf2bec037ea092c52ae679457d719d6a84707,2024-11-21T08:09:50.763000 CVE-2023-36506,0,0,6af22016e284031d53b3ef3f11af4b1bf92676c075b4e08e2aebb1352de367b9,2024-12-13T15:15:16.450000 CVE-2023-36507,0,0,860d90b5f40d8a7bffdd9335fefbba3d2a2e252c703ad45f15814d2a2853d7b9,2024-11-21T08:09:50.870000 @@ -237153,7 +237153,7 @@ CVE-2023-48596,0,0,de08592d3c71d66e59070351ea26bea49dadd868fefc66b0ba4179500db4a CVE-2023-48597,0,0,d7f1a246225086d83b69935e58dc4602f3fcef4594d168c1020a717a6330da0d,2024-11-21T08:32:03.953000 CVE-2023-48598,0,0,e8d794c913b8e3983f097f457cda3379e1c61e97cc0adfeffae883de31f69e55,2024-11-21T08:32:04.093000 CVE-2023-48599,0,0,2e70e7ae46aac224c87d96857ac466f4705439e2d232e872500f1dc94b2797af,2024-11-21T08:32:04.223000 -CVE-2023-4860,0,0,ebf07d7f6ac653bfc9c61d9afa8d50a2b81ea14de8f7c9ccb4549f66e0cf2d9f,2024-11-21T08:36:07.650000 +CVE-2023-4860,0,1,f2ee8c7cca80ea10fb37f13bebd387b0e199932343c0dc789987081100e260ff,2024-12-26T15:43:44.150000 CVE-2023-48600,0,0,d32c28faf1b061d90525ebf3fcefd5b4bf1d95a6546e384c00c0ea07ba201078,2024-11-21T08:32:04.370000 CVE-2023-48601,0,0,718c0fad2dc83a633754363917e13665aa08eac2ce50ddc16b559b12bd57ba32,2024-11-21T08:32:04.503000 CVE-2023-48602,0,0,000bbe97c4e7face9425dfe9ca9eac2ba3e71df3f28a04e84d479d0912285850,2024-11-21T08:32:04.650000 @@ -241903,9 +241903,9 @@ CVE-2023-7006,0,0,4ed87f24fa2ac772a2f7b727b0e300912c42583637b6187ad692e5891d6c66 CVE-2023-7007,0,0,f5e78178645c6c2c5f772707ce2e5c5b75e98e2d2f30a88b209671633b387a46,2024-11-21T08:45:00.997000 CVE-2023-7008,0,0,8f61c119937be8edfdf7101f886737120021ea2a8349db9b1b71fa74e2a2c59a,2024-11-22T12:15:17.590000 CVE-2023-7009,0,0,b57b77e1725b8b8c49b556ed32701d8b8151b9088182b93e7a5fa2f75ef52569,2024-11-21T08:45:01.307000 -CVE-2023-7010,0,0,d8516a2314475ea88a0442b6ad8e65fc85b3bd82e72b2ee1cf04ef1c51f28076,2024-11-21T08:45:01.507000 -CVE-2023-7011,0,0,72378bdb8cf373a08a37ff6ea0f1af2faaa7de19f7d8d87458e7c6e0e1678b5b,2024-11-21T08:45:01.717000 -CVE-2023-7012,0,0,84030e6a24b9e8073d5f6a175ec6f51a7cecdd66f0432b09153254fde9a7e9d3,2024-11-21T08:45:01.923000 +CVE-2023-7010,0,1,da19a0c9c77d04e9464a81f2adb102f21022724548788d306dd9e3bba9553117,2024-12-26T15:41:50.507000 +CVE-2023-7011,0,1,6d4b7c148a188ea77758cea520edfe0357813276fd6d84006cbfa3ca6c8f0f4b,2024-12-26T15:43:13.963000 +CVE-2023-7012,0,1,5c1ae12587a689695a3c07cc39f89391bb45d6735687677ab3130a98835fea9b,2024-12-26T15:43:32.457000 CVE-2023-7013,0,0,7b6b201772be0aba336e92b627046a6ba51720df3756a6d97030ef66c2c200f0,2024-11-25T19:15:07.563000 CVE-2023-7014,0,0,653f0c93c2effce325dc59ce969f80644077c8f621b768b2909654e991fcf9ec,2024-11-21T08:45:02.353000 CVE-2023-7015,0,0,224517b57b37d699b3731a5510aaff638d6368c6c45ae4b54b5bcb3d097873b1,2024-11-21T08:45:02.537000 @@ -242127,7 +242127,7 @@ CVE-2023-7256,0,0,0ac9480edfa78672f3e48d67b957e1b408f0f4794e53e1735d22587fc0a9d3 CVE-2023-7258,0,0,19eded96602052a8819eafc5cc41ffac2509a4daaba91945398147ff28a3094a,2024-11-21T08:45:37.347000 CVE-2023-7259,0,0,1c611eaee9f33d7ccd17c89183f492baf0d1cbca8df2084f000fb54a7cc465c0,2024-11-21T08:45:37.483000 CVE-2023-7260,0,0,5b13b64738d9f99d38b36ccafd3664ce3af226a3295d006866426dd31c7dada4,2024-10-16T12:53:08.807000 -CVE-2023-7261,0,0,76fbd9a401218d54a4aec8710ad79859c3837b6947fd957fd367d79cfdd70905,2024-11-21T08:45:37.777000 +CVE-2023-7261,0,1,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83f3,2024-12-26T16:07:39.820000 CVE-2023-7264,0,0,481a3123c728ee9b31d977e1754c02d6eb9c9d972c045f9b799c0c77e37a60b9,2024-11-21T08:45:37.997000 CVE-2023-7265,0,0,c24118f188412f71957951e5a194c8feaa5aa2870f8d4bad1cae66392f13b12f,2024-09-06T16:38:04.533000 CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a18e,2024-11-21T08:45:38.200000 @@ -243172,14 +243172,14 @@ CVE-2024-10136,0,0,1687e7cebd4edca0b737a65982fb9c424de87cc15acb38175a53b82a71807 CVE-2024-10137,0,0,f8f7215d3ce93e92144f6efe5a55c5ac5044b5c034241100e379f4163f66dd21,2024-10-22T14:17:31.527000 CVE-2024-10138,0,0,b55d0a2514636d98877966409f2919e65547e4eeafd1d900c75d88c763738105,2024-10-22T14:16:51.547000 CVE-2024-10139,0,0,a46ec81f772febd4a2634b4660ef65a5595694d8d1440f2dfd233785d6da934c,2024-10-22T14:18:12.087000 -CVE-2024-1014,0,1,3b68d16ac7b67593d321fe9ae9e77edfd7762ecf7bffc2a9653df88b5ebfc53b,2024-12-26T14:47:20.980000 +CVE-2024-1014,0,0,3b68d16ac7b67593d321fe9ae9e77edfd7762ecf7bffc2a9653df88b5ebfc53b,2024-12-26T14:47:20.980000 CVE-2024-10140,0,0,5c8d3582a9e1cf69741010665609bb47843d809bedccb1b62254ed0f178666e0,2024-10-22T14:19:08.420000 CVE-2024-10141,0,0,9f480f5e4cde435173bb5b248bf28ae1efa97ee859e6fa4ed20730ab18f55365,2024-10-23T20:27:09.370000 CVE-2024-10142,0,0,b21f3b0b970a8f035562ca65d7166416ad40a1b3d1b0f2ed6d773f0caf719d22,2024-10-22T18:11:20.450000 CVE-2024-10146,0,0,5e07a63dc9cb998c12f2ef5f735047cdc411acb65308532570ff1ef11f2b6ae8,2024-11-15T13:58:08.913000 CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb9ca,2024-11-18T17:11:17.393000 CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000 -CVE-2024-1015,0,1,f5106ef87a8ce490640958ad18e87b170d3461b5088dc4b1c5335fd41b68ef46,2024-12-26T14:47:20.980000 +CVE-2024-1015,0,0,f5106ef87a8ce490640958ad18e87b170d3461b5088dc4b1c5335fd41b68ef46,2024-12-26T14:47:20.980000 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 CVE-2024-10153,0,0,205337601504c6a6060c88aa213139cbdb5096813b7204f786c736b1a09bbbe9,2024-10-22T14:45:04.670000 CVE-2024-10154,0,0,8bc22a596ba6d08db60619a5118141d0b00a385670008138b09554e9c573f4a2,2024-10-22T14:44:47.807000 @@ -245059,9 +245059,9 @@ CVE-2024-12729,0,0,e884fbf395061cc739fddc55aa58e43dec46aecaf3403889ecea11d1206a1 CVE-2024-1273,0,0,e8464b176bd39036e0f45e4b49d8110f84d3d3960c826bc9710c36200b4f5e6c,2024-11-21T08:50:12.557000 CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000 CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e5e3,2024-12-18T20:15:22.390000 -CVE-2024-12744,0,0,78725b468a6838fc9d3446b27bc7148939594937a057e2fbae83770e53e8a5e9,2024-12-24T17:15:07.940000 -CVE-2024-12745,0,0,dab7ef9c5411977e5c294799dbb9a429e172aa931a00df35a4460bfe9c29eea5,2024-12-24T17:15:08.150000 -CVE-2024-12746,0,0,e5d6b57814e4fb16babc699c5413311be4120e9cff603631d2309446a6d28149,2024-12-24T17:15:08.353000 +CVE-2024-12744,0,1,d625183b591eae0673573781c90eb9abca36c8d2b82dff7d8b06b69720375ac1,2024-12-26T15:15:06.290000 +CVE-2024-12745,0,1,20a5217461f53528351644b440cb21786d595c714b2ef84b0f71065c6f46f5a0,2024-12-26T15:15:06.527000 +CVE-2024-12746,0,1,26339eaaadb22cdf91e2f6744dc4d14eac5494ac390adaedafd2918e4b3da3f7,2024-12-26T15:15:06.650000 CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000 CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000 CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 @@ -245124,6 +245124,7 @@ CVE-2024-12900,0,0,1012b3733f239b410a68b2041572702d5a7f787259c3b8be862ffc1a0d536 CVE-2024-12901,0,0,7438bb24c69768569f04db263b25be4e855460433a924b6dad82e02e6b0c486b,2024-12-23T02:15:06.613000 CVE-2024-12902,0,0,dc8ea62d5500cfba347f51f27017c7c034c6314a6ca11a7df4d8bb8555d9de85,2024-12-23T11:15:06.153000 CVE-2024-12903,0,0,bc4a71a13a64e9c0d45e023c2f146d73439b3078b2350002a42c4be342765e96,2024-12-23T13:15:06.390000 +CVE-2024-12908,1,1,b6b5f22116dfcb3666f4cb811c1a3f7e5747b47443d62abc367bbed55ab61bde,2024-12-26T16:15:06.050000 CVE-2024-1291,0,0,52c4840726a3cf584db63abe3d1006ff575604ba403c25fca89470816948ce5e,2024-11-21T08:50:14.863000 CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000 CVE-2024-12926,0,0,e218ff80ac001bcdc288d778a26371bdd41dd905c42a161e5fc197e8c4673bb2,2024-12-25T20:15:22.147000 @@ -245154,10 +245155,14 @@ CVE-2024-12948,0,0,9ed039ff2046d0bd52c0232ea595bbbab01c59fd1089b82b348419f43d74c CVE-2024-12949,0,0,86d3ebeba0868e6b562019ec87488552d967c5cd5ccaf8d01f425a8fe584af62,2024-12-26T12:15:05.997000 CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247e4,2024-11-21T08:50:15.410000 CVE-2024-12950,0,0,ca4cbf7c69d996ce2bfd33f152e0fb62d216c9cea2edc40017131b89bad1e400,2024-12-26T12:15:06.870000 -CVE-2024-12951,1,1,414b8ef6fdf35b84093358683da5afb7b3382068e7e9f8acbda999d479d1d854,2024-12-26T13:15:05.667000 -CVE-2024-12952,1,1,b880f28fe687c0b824a45422a445e9df755a70364b015764cba902b8758181d7,2024-12-26T13:15:06.727000 -CVE-2024-12953,1,1,23709a5786c8f99b782e8a710a7efbea47345eeaaafeae1249bc1f849023a0b7,2024-12-26T14:15:05.147000 -CVE-2024-12954,1,1,8f39e5ac10e6fd830a15460b7aaac36438e362dedf7ea84356195659fff033f9,2024-12-26T14:15:06 +CVE-2024-12951,0,1,0a12db8b7c5fc4ae5da0ad4788be58d750d64838f93d7574048d431978efeae4,2024-12-26T16:15:06.730000 +CVE-2024-12952,0,1,bebb703b529a136680b3d159fa57c325a3b9aee1ad512e84decac68c414e89ad,2024-12-26T16:15:10.540000 +CVE-2024-12953,0,1,b6658fb4c7ce816c34d17982ad9065b1b2273c2711dd83d876543af9deecca01,2024-12-26T16:15:14.487000 +CVE-2024-12954,0,1,5b3615740107f6cda64b7337a871541f03c27d10081cdea2daacf61f08c096ca,2024-12-26T16:15:17.510000 +CVE-2024-12955,1,1,a8777044c9076e12b90807fbb55d952d1381d25a2406bca0f486e11fcc4343f9,2024-12-26T16:15:20.320000 +CVE-2024-12956,1,1,277dbeee2c836d1ea7f61c74b6cd65abb129ed40587a3a4d389474be190962ee,2024-12-26T16:15:22.847000 +CVE-2024-12958,1,1,750f2f464b0d44b3315b5a0380e86b50db9852ce8f322705c4d405807c7053b6,2024-12-26T16:15:25.667000 +CVE-2024-12959,1,1,ad9ab3bb035c04c7413feef8cc4008dc338f6f3f3a2985de139ec649d8ab5665,2024-12-26T16:15:27.643000 CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000 CVE-2024-1297,0,0,0d9e22e56ecef1715a16e9d7809dba48ba55def0e741f79f7098027ea7ebc7ff,2024-11-21T08:50:15.770000 CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000 @@ -245530,7 +245535,7 @@ CVE-2024-1690,0,0,7e2e3e4c0dc45c7e10c6184fa4180e4340b05f725f49212c634f18d52aeb86 CVE-2024-1691,0,0,ad75487233977609d54ff16305491e716d553be8d688024aabeec1b1b5cb10e2,2024-11-21T08:51:05.807000 CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7acd9,2024-11-21T08:51:05.923000 CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000 -CVE-2024-1694,0,0,079878959a8efbd5b173f133ee975ee04d7e371a6f31dd92c25cc0ffbda86079,2024-11-21T08:51:06.180000 +CVE-2024-1694,0,1,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000 CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000 CVE-2024-1696,0,0,96c8303e535001c6c5d3b6e14d30079b9651c70dc730972b738df81a8696b09e,2024-11-21T08:51:06.550000 CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c2e,2024-11-21T08:51:06.673000 @@ -265768,9 +265773,9 @@ CVE-2024-47142,0,0,3b160aeed892b3de0fae2f0bd942190d42286dfc37500bd913fc0a3b0770a CVE-2024-47145,0,0,060f9bb9a43b25110359917405fc9bc4bfa91006f8a71471b803c37bd9f0df18,2024-09-26T18:42:33.550000 CVE-2024-47146,0,0,4c1ec2fd77a55fc12a380140e8b75abce8b99c7554038e5bb49a8e56f7893728,2024-12-10T19:45:51.023000 CVE-2024-47148,0,0,b2b201e492cb219881350a4ee656b7e0714f48f06b1efeb7497e58f4cfc34dd3,2024-12-26T12:15:07.063000 -CVE-2024-47149,1,1,777275743f5865f3be6f0f8246f16b564657bd5cc036e3b2daa732b3eb5c4d7d,2024-12-26T13:15:07.007000 +CVE-2024-47149,0,0,777275743f5865f3be6f0f8246f16b564657bd5cc036e3b2daa732b3eb5c4d7d,2024-12-26T13:15:07.007000 CVE-2024-4715,0,0,cfdee50dbf680b557a3c5935dd446958982a7767348e746e1514b6a87d45fd32,2024-11-21T09:43:26.243000 -CVE-2024-47150,1,1,d34bb8def30ddd1e10efd6b15266d2eac0ad62d8addf9f44a21ce79578e09f5e,2024-12-26T13:15:07.140000 +CVE-2024-47150,0,0,d34bb8def30ddd1e10efd6b15266d2eac0ad62d8addf9f44a21ce79578e09f5e,2024-12-26T13:15:07.140000 CVE-2024-47151,0,0,32ffda1955b6441bb63553c91b7088d99e558c2a2a144674b8b411a9369261be,2024-12-26T11:15:07.387000 CVE-2024-47153,0,0,3c9ddb156d4838ab4dd50ad2be03036f905c4748cf151f06b44931abbf5374c8,2024-12-26T12:15:07.183000 CVE-2024-47154,0,0,91109d991ba96e992fa2e33be15597c37ea7cea8c8a483406508c60a9929a172,2024-12-26T12:15:07.303000 @@ -268670,6 +268675,7 @@ CVE-2024-5153,0,0,5201b5401d401becd44a1317581445bf8929de090e1718378b23c7f68f95a1 CVE-2024-51530,0,0,7cd040cc53d7ba42e6f6d453f4d18993a534b39a2754ee99e99110d754af3ffe,2024-11-07T19:56:10.187000 CVE-2024-51532,0,0,4490c7d316879473ce06299341d463d32f4cb580470042766196dc8d1e940618,2024-12-19T02:15:23 CVE-2024-5154,0,0,2b204ac4cfe5700aeb8fd234238f6495b194bb11d4ab3c09549ae293c9be6a35,2024-12-11T04:15:04.990000 +CVE-2024-51540,1,1,e5d60701916d41d767ba92f7413eb5609f3540c0c601b97a5ed7d1e29cd79006,2024-12-26T16:15:29.640000 CVE-2024-51541,0,0,142a418f59528ceed12160c8666a0df4712069c8f2391d18e7017db83feff322,2024-12-05T13:15:07.303000 CVE-2024-51542,0,0,8c33b38999354a42a1903c24f67205a8ad9fd22f1d54e4dcd4d2cd4e47336759,2024-12-05T13:15:07.453000 CVE-2024-51543,0,0,2e5257f71ed91dbe805d033e4a6755a3128eea835afba16fb7592fead3d316f3,2024-12-05T13:15:07.613000 @@ -270547,7 +270553,7 @@ CVE-2024-54436,0,0,50f2aaadb8a1ae9384ae60f68026e46bd3f9598cfdbd34eb21f00698325fc CVE-2024-54437,0,0,16f6ccd347b342a49e1da88c1694aefeff9e893cc31cb4a150a5024ef58f3acc,2024-12-16T15:15:22.570000 CVE-2024-54438,0,0,833db86282c8f87abecab539c28e79528e3843a7acd46c3598d439c688dae985,2024-12-16T15:15:22.713000 CVE-2024-54439,0,0,8084e70e603ce1752cdcbfd728997a090db24c24cb39c5fcf7404f93404060f4,2024-12-16T15:15:22.843000 -CVE-2024-5444,0,1,36f69048d386cbeda368abf26513717dd8b8ca822b22f9fe60a170ecb8b494bc,2024-12-26T14:43:05.523000 +CVE-2024-5444,0,0,36f69048d386cbeda368abf26513717dd8b8ca822b22f9fe60a170ecb8b494bc,2024-12-26T14:43:05.523000 CVE-2024-54440,0,0,9b88f7d99cecca6e6d64d74e7bc4b9afd66c4a9b5857582e450bf8ac5f697387,2024-12-16T15:15:22.987000 CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1ec5,2024-12-16T15:15:23.130000 CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000 @@ -270663,7 +270669,7 @@ CVE-2024-54926,0,0,99308ee0c7bdb2555270e9769b907fdbadfdbd27447c982cce941529cd8db CVE-2024-54927,0,0,743cd5f75576f93b89277c4c4bd309f2a9d5d44818b55b3d4433a9a3e5ce11c7,2024-12-11T16:15:16.360000 CVE-2024-54928,0,0,c0b3aee5ee0c3359e1bdf75741044319f3b2ae90c5d6a8fa2f4c6b96dad60fe9,2024-12-11T16:15:16.590000 CVE-2024-54929,0,0,028424391bfd0e6e1a80decba8ca8422fb184a112971073f186a5d0b3e71e96b,2024-12-10T15:47:10.800000 -CVE-2024-5493,0,0,99495d539b3e7c5420779ea4c7fe2a7c3d29e2571ddf17552fa1ce56ee81cc83,2024-11-21T09:47:47.260000 +CVE-2024-5493,0,1,e28052dbe6c7953505a06f636383a79eb3b96ef55b7ca08e8ed256a1f6ab6ea0,2024-12-26T16:36:54.357000 CVE-2024-54930,0,0,59137406324a26fde678f077cfa8b27bd914be08b6757bd42247e4c52270e1f7,2024-12-12T18:15:26.440000 CVE-2024-54931,0,0,ef3fc2dbe9a46d49c1248bd262a192fe17792d64b5abf18c5cb4f9afa4b62ded,2024-12-11T16:15:16.820000 CVE-2024-54932,0,0,8a514ce426faf4a02b37c1044e879c28a2d4841edec0cfb7f7fd39bffdd5ab3f,2024-12-12T18:15:26.673000 @@ -270673,15 +270679,15 @@ CVE-2024-54935,0,0,61185b20f382be4d3639bac7ef1593b440e8859a1d371e482182cb5ef4251 CVE-2024-54936,0,0,f21b1da20346f5f757f77e403c54bbd170034aa987896c1a2a9c5ceb1fff38da,2024-12-10T18:15:43.233000 CVE-2024-54937,0,0,197a7c9b3b72f036ddf287711fb28635bb9463140aa1361b9ca00a7c51b672cd,2024-12-11T17:15:20.790000 CVE-2024-54938,0,0,5376f91bdc16b2e02af9854f224acaa97d8eeeea6e39c3277fbe6d2d4b3c3ddd,2024-12-11T16:15:17.033000 -CVE-2024-5494,0,0,ed8919a3a72bc0a94d60c277c4ec43350424fe50eb0ccce1865c59d68e32ef3b,2024-11-21T09:47:47.450000 -CVE-2024-5495,0,0,7e3283a6194c41a2af3850cb5ac4e1a0c2e897e38cb3c5184917b35a2eb12e24,2024-11-21T09:47:48.493000 -CVE-2024-5496,0,0,d3b75826fe915a74aaa5a4797be578d141a432c172476165ea61e77bcef44960,2024-11-21T09:47:48.673000 -CVE-2024-5497,0,0,0a74f825bdf3f1ae568a5ccb507b369f4950c8addbc47e2976687241a7c9b692,2024-11-21T09:47:48.847000 -CVE-2024-5498,0,0,fce878f9e792484de930f9dfb7891cf3344dac35e7826879543feab91dcd62f7,2024-11-21T09:47:49.010000 +CVE-2024-5494,0,1,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000 +CVE-2024-5495,0,1,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 +CVE-2024-5496,0,1,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000 +CVE-2024-5497,0,1,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000 +CVE-2024-5498,0,1,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000 CVE-2024-54982,0,0,e8c74eec51cce9de539b00c3292b4abecd40a032af1c51a9e260f51659b60214,2024-12-19T22:15:06.197000 CVE-2024-54983,0,0,b2ad246b10b45dd7cfc17926ea56de4773d20508323adacbed126b6796329cde,2024-12-19T22:15:06.387000 CVE-2024-54984,0,0,babb2b33ae3b96a3432a944bca85ec3b312a6220922b7f6f4cd42fd71ea663cf,2024-12-19T22:15:06.563000 -CVE-2024-5499,0,0,d14563bb736027f9fa8360c97e72024beb95c7279a88997a51eec5f6d8b04659,2024-11-21T09:47:49.183000 +CVE-2024-5499,0,1,bbe4dd69894f0f98fba609f59dfd6e7af7f9cec1f980c4939ff30b774a53a4b5,2024-12-26T16:07:06.693000 CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000 CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000 CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000 @@ -271292,7 +271298,7 @@ CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b CVE-2024-5935,0,0,33de45cd0a9dbec9c09be2dfcdd626110c8d1494b4e9b3daff11fb78fd2ccee2,2024-11-21T09:48:36.403000 CVE-2024-5936,0,0,d33e3654fbe2f8d1101b64d197a41ff3f425b0d6a2e0640a9a89b19935133a92,2024-11-21T09:48:36.527000 CVE-2024-5937,0,0,2ef9817ef948574c57ede2754d552b256d02d4486235fa2fd7b5314353636fc5,2024-11-21T09:48:36.637000 -CVE-2024-5938,0,1,ca56ac1750495779a8b37a0ec018b68bc2fd21cbfeb20098d1d5f998ac6da3bc,2024-12-26T14:58:47.547000 +CVE-2024-5938,0,0,ca56ac1750495779a8b37a0ec018b68bc2fd21cbfeb20098d1d5f998ac6da3bc,2024-12-26T14:58:47.547000 CVE-2024-5939,0,0,318b3e9b499ff5b450323efa05eed5a91b82903815ef8ad200d027e36bed2ddb,2024-08-26T18:12:14.250000 CVE-2024-5940,0,0,00419b45dbaebd6c3f7bbb471b92b7dfc3e08de501bf62a1ac5f1d8f54145970,2024-08-26T18:14:14.083000 CVE-2024-5941,0,0,50b9cff2552a6f01b7b5069a5b5d20c0dc58c3654f086afba5659848e809333c,2024-08-26T18:14:39.290000 @@ -271615,10 +271621,10 @@ CVE-2024-6286,0,0,b554a948fc06c2eb91239ea46a179afa609033e182a5f9aab369b4b7b31cea CVE-2024-6287,0,0,40f3c985baea6ec05334f3fce731768f0d81911c304f1a2e44209c982888aaa6,2024-11-21T09:49:21.517000 CVE-2024-6288,0,0,40bbc38b68a450631f0e9175185c8ad76d9776d4b142273208983180f4c09b3f,2024-11-21T09:49:21.653000 CVE-2024-6289,0,0,e3b1da7f78c07c932415d923ac9d2fd6e2073e4f22fe5d996bf5052a37e49819,2024-11-21T09:49:21.773000 -CVE-2024-6290,0,0,18dd60715cbe1fc534d82c4523c2e3d718491a23b97063d74f8c862303a5ef1f,2024-11-21T09:49:21.897000 -CVE-2024-6291,0,0,24c583a0e21426186967a4fb3ba23bfcb67611d6c314cd51d2fcd598fefe3f2d,2024-11-21T09:49:22.090000 -CVE-2024-6292,0,0,ef0544c170da08b3ad9a20599edabe011f935ef7ec9b7b061b2cff7521fbe521,2024-11-21T09:49:22.283000 -CVE-2024-6293,0,0,f4ab32485753bf1f0567445de167179555ac74d76324cb1641ededa8c7d04897,2024-11-21T09:49:22.470000 +CVE-2024-6290,0,1,ecbdc53f91b6c561a5db09710186acd2b3f3ef9b51205410ab3ba731edcf64a9,2024-12-26T16:26:22.763000 +CVE-2024-6291,0,1,66d2b2d54c02e96dc13691c90aaf7f945837bdc6a98aacbc87b63c22a02825cb,2024-12-26T16:26:31.473000 +CVE-2024-6292,0,1,1ac566fb41655f5c37f2bd78fc339ae1a5e7248a5c374fffe68269359e07bea7,2024-12-26T16:26:46.207000 +CVE-2024-6293,0,1,9cb6114f1cfcae8ae7287cd7ca0141f7af5d15fb9c45578f1bda519f5f7ce75e,2024-12-26T16:02:51.103000 CVE-2024-6294,0,0,502447c197a08738d3dcd348b035883f55795c98c8a8453d4fc4e46065c26673,2024-11-21T09:49:22.657000 CVE-2024-6295,0,0,a37d39737ca398b822e686c19248b2da7cb8fddd0eff6235ded59a7b44ef41a3,2024-11-21T09:49:22.777000 CVE-2024-6296,0,0,abffd4826c09735f90bdf20b5659c634be724f2d335a4180be0afc939510aed5,2024-11-21T09:49:22.900000 @@ -272040,14 +272046,14 @@ CVE-2024-6767,0,0,f769e30490d66d8fac295ebcef2fe317bfce217d66064d303b66800281e266 CVE-2024-6768,0,0,b0c2adf1378e129f3c2fa9f6619403600641c44acc0ae447bd533a4b6adedd5a,2024-08-13T12:58:25.437000 CVE-2024-6769,0,0,b0714003f1bf6cd2be4063e321f555651e3b2ab352e349c019ed51506a9392ee,2024-11-21T09:50:16.560000 CVE-2024-6770,0,0,245271887342f9e17dd751c91a668b9b2365e973cc52173695152644e765b2e0,2024-07-31T12:57:02.300000 -CVE-2024-6772,0,0,52e8b20e6bfcba18227c894be6418d0f7663e53f1292a0f5a92d0bf702e24163,2024-11-21T09:50:17.730000 -CVE-2024-6773,0,0,b721cdb596ff1541ba1bb8d07e42929150e9ff33565e159ea3e892fe17579f91,2024-11-21T09:50:17.933000 -CVE-2024-6774,0,0,f2c65b7a19fe6cc63dfa08b4e4aee9ed96bcfe29384e0bfcb382a7326674290b,2024-11-21T09:50:18.100000 -CVE-2024-6775,0,0,59aff284b990ac5949297db1ecbeeb7dfa61a29748cdcf7ab9843b427302ed69,2024-11-21T09:50:18.273000 -CVE-2024-6776,0,0,33be44e38058cd7ddcf4e51267528970811e1d75df7b3019a5389194b8f70b19,2024-11-21T09:50:18.447000 -CVE-2024-6777,0,1,043fbce92e733c3dc4ffda017908d058956bd68e3286cb190e277117396f8b7f,2024-12-26T14:55:39.437000 -CVE-2024-6778,0,0,54facbee55d2061ebcca96c6d5abeaff15d259809b812dea7e9b8558ee133bdb,2024-11-21T09:50:18.790000 -CVE-2024-6779,0,0,371ba97cacc400735eb2bef0b73f4416d7b4718268423923ed7c983e39a36751,2024-11-21T09:50:18.973000 +CVE-2024-6772,0,1,08bece7a609ae5c256191220df37bfb7787faad66b3cbbcc7d4346f3923e9178,2024-12-26T16:02:45.563000 +CVE-2024-6773,0,1,65ae8e2289d672ddf0c4386153a69914491d30ca4214f30bcdbc26db45c55c63,2024-12-26T16:03:48.013000 +CVE-2024-6774,0,1,1665894a3ed006ccb5f2db0018f065d507e3e2654d18204239c4f6f55183d1be,2024-12-26T16:04:06.250000 +CVE-2024-6775,0,1,ba45af092937d8fb5c31317d336492f36d2631e4ebc8525322d8e7449a0f71c5,2024-12-26T16:05:07.670000 +CVE-2024-6776,0,1,a8c015e90f08f6134c54834c322d65ea474ba1ec2af7cdf5fb0885e06ec14506,2024-12-26T16:05:20.450000 +CVE-2024-6777,0,0,043fbce92e733c3dc4ffda017908d058956bd68e3286cb190e277117396f8b7f,2024-12-26T14:55:39.437000 +CVE-2024-6778,0,1,4c9f0f8db5b035fb15c580d04205b5e01054cdeca86ea5adabc82fd945298cba,2024-12-26T15:36:56.463000 +CVE-2024-6779,0,1,a7902d5ec74d01877c4af55bf0533a1a0a1af67408306a7de93bffdc44560978,2024-12-26T15:41:39.910000 CVE-2024-6780,0,0,4db2765824e08317655513c06e959ab5619d487ccfa2efc1d7c86120a66859df,2024-11-21T09:50:19.137000 CVE-2024-6781,0,0,47a24b53fb6b9fd8c09af1c57dcfaa9c67d275ac691fc2f4c15d2dc0980fd1d6,2024-08-19T17:15:34.797000 CVE-2024-6782,0,0,718e1d79780261b60c359e19d0776a8dde2ec8da1b3bbbef9c2b08242f327e82,2024-08-06T16:30:24.547000 @@ -273491,7 +273497,7 @@ CVE-2024-8477,0,0,19e1a50b82df4e949fc45923ac7e1924aea3a0df2879078ebf532cd95acaec CVE-2024-8478,0,0,484f2c68e6e7a76a908ae4220aa78a61277af4da3d4158c47b9f9bfdd22b29a6,2024-09-26T15:53:44.297000 CVE-2024-8479,0,0,7f607ab6226df6cc30f72675a0a7928628cd9dd405d303e55b9ea75b85e4f01b,2024-09-27T16:12:10.427000 CVE-2024-8480,0,0,a3222d51b9b3bc8d7bc3a958018f5a48e92863fd740c6e5bbb78fa8f0df0cf21,2024-09-26T18:13:58.470000 -CVE-2024-8481,0,1,e96492f313c7b1441b72002a9c604dad6321f6a135632489e9b86411985da7a0,2024-12-26T14:58:41.757000 +CVE-2024-8481,0,0,e96492f313c7b1441b72002a9c604dad6321f6a135632489e9b86411985da7a0,2024-12-26T14:58:41.757000 CVE-2024-8482,0,0,57ce7318b7ddf832f81e12c73f97b2d6a83ff16fd2ddddc2f2363683908d13f3,2024-10-10T12:56:30.817000 CVE-2024-8483,0,0,5195ba758d6242bcccf2c248e56be79d4b9654410f6f169122c92d0c6b15f217,2024-10-02T16:42:30.347000 CVE-2024-8484,0,0,e466c3875728036a2a9b4c89a8305493672d041c885c3b58c536c50de9cc1d74,2024-10-02T17:44:13.687000 @@ -273903,7 +273909,7 @@ CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab3041 CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000 CVE-2024-8972,0,0,f92dc947552b410f0979548c7a5f91eedd60185a26a1399ffa98cc212dfdc7dd,2024-12-17T14:15:20.110000 CVE-2024-8974,0,0,9dfe7c1e1fc096d25206dd031b2e4236d5ec5630433070bbc83f3c7af62bcf85,2024-10-04T17:30:18.803000 -CVE-2024-8975,0,0,2e1af783568cf7ad44e3b33e6ac71980410920ee6be566fa4a01ec060d747af4,2024-10-01T19:20:21.103000 +CVE-2024-8975,0,1,6fdd60e4ac8e82514dad4ab3d13b10cc453141d483b967a0f088dd2001919391,2024-12-26T15:00:26.180000 CVE-2024-8977,0,0,cb8e4225cbeae27a4d5cd5a6caff3e78c74f90a4a117f3ebee8859bf0cf66b60,2024-10-16T17:10:13.220000 CVE-2024-8978,0,0,d27b973a30e145b038f4aa46488a1a73c5d80a05af06996c64c589eb06d82073,2024-11-19T17:04:38.903000 CVE-2024-8979,0,0,c8d7a454a2e21b5a6419915f563e8d188611a09ebbbeb9864f16825c369f1ca3,2024-11-19T17:05:08.270000