From f0b83891dc66c07b11cb70ab27554d02a8d4247d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 19 Dec 2024 00:58:47 +0000 Subject: [PATCH] Auto-Update: 2024-12-19T00:55:25.344583+00:00 --- CVE-2021/CVE-2021-205xx/CVE-2021-20553.json | 56 ++++++++ CVE-2021/CVE-2021-298xx/CVE-2021-29827.json | 56 ++++++++ CVE-2022/CVE-2022-407xx/CVE-2022-40732.json | 56 ++++++++ CVE-2022/CVE-2022-407xx/CVE-2022-40733.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44512.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44513.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44514.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44515.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44516.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44517.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44518.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44519.json | 56 ++++++++ CVE-2022/CVE-2022-445xx/CVE-2022-44520.json | 56 ++++++++ CVE-2023/CVE-2023-215xx/CVE-2023-21586.json | 56 ++++++++ CVE-2024/CVE-2024-376xx/CVE-2024-37649.json | 21 +++ CVE-2024/CVE-2024-398xx/CVE-2024-39804.json | 60 +++++++++ CVE-2024/CVE-2024-411xx/CVE-2024-41138.json | 60 +++++++++ CVE-2024/CVE-2024-411xx/CVE-2024-41145.json | 60 +++++++++ CVE-2024/CVE-2024-411xx/CVE-2024-41159.json | 60 +++++++++ CVE-2024/CVE-2024-411xx/CVE-2024-41165.json | 60 +++++++++ CVE-2024/CVE-2024-420xx/CVE-2024-42004.json | 60 +++++++++ CVE-2024/CVE-2024-422xx/CVE-2024-42220.json | 60 +++++++++ CVE-2024/CVE-2024-431xx/CVE-2024-43106.json | 60 +++++++++ CVE-2024/CVE-2024-435xx/CVE-2024-43594.json | 8 +- CVE-2024/CVE-2024-535xx/CVE-2024-53580.json | 25 ++++ CVE-2024/CVE-2024-552xx/CVE-2024-55239.json | 21 +++ CVE-2024/CVE-2024-554xx/CVE-2024-55461.json | 21 +++ CVE-2024/CVE-2024-555xx/CVE-2024-55506.json | 21 +++ CVE-2024/CVE-2024-556xx/CVE-2024-55603.json | 84 ++++++++++++ CVE-2024/CVE-2024-561xx/CVE-2024-56115.json | 21 +++ CVE-2024/CVE-2024-561xx/CVE-2024-56116.json | 21 +++ CVE-2024/CVE-2024-563xx/CVE-2024-56317.json | 33 +++++ CVE-2024/CVE-2024-563xx/CVE-2024-56318.json | 41 ++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56319.json | 41 ++++++ README.md | 72 +++++----- _state.csv | 137 ++++++++++++-------- 36 files changed, 1734 insertions(+), 97 deletions(-) create mode 100644 CVE-2021/CVE-2021-205xx/CVE-2021-20553.json create mode 100644 CVE-2021/CVE-2021-298xx/CVE-2021-29827.json create mode 100644 CVE-2022/CVE-2022-407xx/CVE-2022-40732.json create mode 100644 CVE-2022/CVE-2022-407xx/CVE-2022-40733.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44512.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44513.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44514.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44515.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44516.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44517.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44518.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44519.json create mode 100644 CVE-2022/CVE-2022-445xx/CVE-2022-44520.json create mode 100644 CVE-2023/CVE-2023-215xx/CVE-2023-21586.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37649.json create mode 100644 CVE-2024/CVE-2024-398xx/CVE-2024-39804.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41138.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41145.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41159.json create mode 100644 CVE-2024/CVE-2024-411xx/CVE-2024-41165.json create mode 100644 CVE-2024/CVE-2024-420xx/CVE-2024-42004.json create mode 100644 CVE-2024/CVE-2024-422xx/CVE-2024-42220.json create mode 100644 CVE-2024/CVE-2024-431xx/CVE-2024-43106.json create mode 100644 CVE-2024/CVE-2024-535xx/CVE-2024-53580.json create mode 100644 CVE-2024/CVE-2024-552xx/CVE-2024-55239.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55461.json create mode 100644 CVE-2024/CVE-2024-555xx/CVE-2024-55506.json create mode 100644 CVE-2024/CVE-2024-556xx/CVE-2024-55603.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56115.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56116.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56317.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56318.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56319.json diff --git a/CVE-2021/CVE-2021-205xx/CVE-2021-20553.json b/CVE-2021/CVE-2021-205xx/CVE-2021-20553.json new file mode 100644 index 00000000000..458e49fb8f9 --- /dev/null +++ b/CVE-2021/CVE-2021-205xx/CVE-2021-20553.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2021-20553", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-19T00:15:04.710", + "lastModified": "2024-12-19T00:15:04.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/6496761", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-298xx/CVE-2021-29827.json b/CVE-2021/CVE-2021-298xx/CVE-2021-29827.json new file mode 100644 index 00000000000..957d4fa16a3 --- /dev/null +++ b/CVE-2021/CVE-2021-298xx/CVE-2021-29827.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2021-29827", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-19T00:15:04.873", + "lastModified": "2024-12-19T00:15:04.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Information Server 11.7 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/security-bulletin-ibm-infosphere-information-server-vulnerable-cross-frame-scripting-exploit-cve-2021-29827", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40732.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40732.json new file mode 100644 index 00000000000..36f5629bc08 --- /dev/null +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40732.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-40732", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:07.060", + "lastModified": "2024-12-18T23:15:07.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1514", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40733.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40733.json new file mode 100644 index 00000000000..d44eaed2404 --- /dev/null +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40733.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-40733", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:07.243", + "lastModified": "2024-12-18T23:15:07.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44512.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44512.json new file mode 100644 index 00000000000..d883f54eeb3 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44512.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44512", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:05.067", + "lastModified": "2024-12-19T00:15:05.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44513.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44513.json new file mode 100644 index 00000000000..d70556739e6 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44513.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44513", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:05.237", + "lastModified": "2024-12-19T00:15:05.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44514.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44514.json new file mode 100644 index 00000000000..d59abdb78c8 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44514.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44514", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:05.400", + "lastModified": "2024-12-19T00:15:05.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44515.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44515.json new file mode 100644 index 00000000000..e4fa3610956 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44515.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44515", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:05.567", + "lastModified": "2024-12-19T00:15:05.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44516.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44516.json new file mode 100644 index 00000000000..9cf83e77991 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44516.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44516", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:05.727", + "lastModified": "2024-12-19T00:15:05.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44517.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44517.json new file mode 100644 index 00000000000..32e159a34a7 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44517.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44517", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:05.880", + "lastModified": "2024-12-19T00:15:05.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44518.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44518.json new file mode 100644 index 00000000000..5c3321fce1b --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44518.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44518", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:06.037", + "lastModified": "2024-12-19T00:15:06.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44519.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44519.json new file mode 100644 index 00000000000..0ea87220f69 --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44519.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44519", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:06.200", + "lastModified": "2024-12-19T00:15:06.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44520.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44520.json new file mode 100644 index 00000000000..0994bddb31a --- /dev/null +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44520.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-44520", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:06.360", + "lastModified": "2024-12-19T00:15:06.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21586.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21586.json new file mode 100644 index 00000000000..9be0ee566a1 --- /dev/null +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21586.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-21586", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-12-19T00:15:06.530", + "lastModified": "2024-12-19T00:15:06.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-01.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37649.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37649.json new file mode 100644 index 00000000000..8bae493c3a9 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37649.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37649", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:07.440", + "lastModified": "2024-12-18T23:15:07.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure Permissions vulnerability in SecureSTATION v.2.5.5.3116-S50-SMA-B20160811A and before allows a physically proximate attacker to obtain sensitive information via the modification of user credentials." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/kklzzcun/SecureSTATION-/blob/main/The%20SecureSTATION%20.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39804.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39804.json new file mode 100644 index 00000000000..3ff421eaa0a --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39804.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39804", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:07.640", + "lastModified": "2024-12-18T23:15:07.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in Microsoft PowerPoint 16.83 for macOS. A specially crafted library can leverage PowerPoint's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1974", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1974", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41138.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41138.json new file mode 100644 index 00000000000..db54e101a03 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41138.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-41138", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:07.813", + "lastModified": "2024-12-18T23:15:07.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in the com.microsoft.teams2.modulehost.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1991", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1991", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41145.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41145.json new file mode 100644 index 00000000000..6dc66870f8b --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41145.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-41145", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:07.970", + "lastModified": "2024-12-18T23:15:07.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in the WebView.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1990", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1990", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41159.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41159.json new file mode 100644 index 00000000000..c0b0ea430f7 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41159.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-41159", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:08.140", + "lastModified": "2024-12-18T23:15:08.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in Microsoft OneNote 16.83 for macOS. A specially crafted library can leverage OneNote's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1975", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1975", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41165.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41165.json new file mode 100644 index 00000000000..17a94da7861 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41165.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-41165", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:08.300", + "lastModified": "2024-12-18T23:15:08.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in Microsoft Word 16.83 for macOS. A specially crafted library can leverage Word's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1977", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1977", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42004.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42004.json new file mode 100644 index 00000000000..60358a7259b --- /dev/null +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42004.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42004", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:08.450", + "lastModified": "2024-12-18T23:15:08.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1973", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1973", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42220.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42220.json new file mode 100644 index 00000000000..16a094a1bac --- /dev/null +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42220.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42220", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:08.597", + "lastModified": "2024-12-18T23:15:08.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in Microsoft Outlook 16.83.3 for macOS. A specially crafted library can leverage Outlook's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43106.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43106.json new file mode 100644 index 00000000000..2908de5907e --- /dev/null +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43106.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43106", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T23:15:08.760", + "lastModified": "2024-12-18T23:15:08.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A library injection vulnerability exists in Microsoft Excel 16.83 for macOS. A specially crafted library can leverage Excel's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1976", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1976", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43594.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43594.json index d03a456284e..674b6ade410 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43594.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43594.json @@ -2,13 +2,13 @@ "id": "CVE-2024-43594", "sourceIdentifier": "secure@microsoft.com", "published": "2024-12-12T02:00:54.287", - "lastModified": "2024-12-12T02:00:54.287", + "lastModified": "2024-12-18T23:15:08.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "System Center Operations Manager Elevation of Privilege Vulnerability" + "value": "Microsoft System Center Elevation of Privilege Vulnerability" }, { "lang": "es", @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53580.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53580.json new file mode 100644 index 00000000000..2946bd6ef4a --- /dev/null +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53580.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-53580", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:17.010", + "lastModified": "2024-12-18T23:15:17.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/neolead/663badf2ebefefa6fe4303695e7aa7a3", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/esnet/iperf/releases/tag/3.18", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55239.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55239.json new file mode 100644 index 00000000000..f11583e593b --- /dev/null +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55239.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-55239", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:17.180", + "lastModified": "2024-12-18T23:15:17.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A reflected Cross-Site Scripting vulnerability in the standard documentation upload functionality in Portabilis i-Educar 2.9 allows attacker to craft malicious urls with arbitrary javascript in the 'titulo_documento' parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/RegularUs3r/CVE-Research/blob/main/CVE-2024/Portabilis%20-%20iEducar/CVE-2024-55649%20-%20Reflected%20Cross-Site%20Scripting.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json new file mode 100644 index 00000000000..f0e2fc571cb --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55461.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-55461", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:17.350", + "lastModified": "2024-12-18T23:15:17.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SeaCMS <=13.0 is vulnerable to command execution in phome.php via the function Ebak_RepPathFiletext()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/FengFu01/sea/issues/IB8S1N", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55506.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55506.json new file mode 100644 index 00000000000..9ffaf562960 --- /dev/null +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55506.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-55506", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:17.523", + "lastModified": "2024-12-18T23:15:17.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An IDOR vulnerability in CodeAstro's Complaint Management System v1.0 (version with 0 updates) enables an attacker to execute arbitrary code and obtain sensitive information via the delete.php file and modifying the id parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55506.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55603.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55603.json new file mode 100644 index 00000000000..fc558334de5 --- /dev/null +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55603.json @@ -0,0 +1,84 @@ +{ + "id": "CVE-2024-55603", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-19T00:15:06.713", + "lastModified": "2024-12-19T00:15:06.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`).\nThus, a session which's lifetime is already `> time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kanboard/kanboard/blob/main/app/Core/Session/SessionHandler.php#L40", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/kanboard/kanboard/commit/7ce61c34d962ca8b5dce776289ddf4b207be6e78", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gv5c-8pxr-p484", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.php.net/manual/en/function.session-start.php", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-divisor", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-maxlifetime", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-probability", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.php.net/manual/en/sessionhandlerinterface.gc.php", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56115.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56115.json new file mode 100644 index 00000000000..e45fef0f27e --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56115.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56115", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:17.687", + "lastModified": "2024-12-18T23:15:17.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ComplianceControl/CVE-2024-56115", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56116.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56116.json new file mode 100644 index 00000000000..1403425a476 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56116.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56116", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:17.857", + "lastModified": "2024-12-18T23:15:17.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery vulnerability in Amiro.CMS before 7.8.4 allows remote attackers to create an administrator account." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ComplianceControl/CVE-2024-56116", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56317.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56317.json new file mode 100644 index 00000000000..a4e826c5366 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56317.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56317", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:18.023", + "lastModified": "2024-12-18T23:15:18.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0, the WriteAcl function deletes all existing ACL entries first, and then attempts to recreate them based on user input. If input validation fails during decoding, the process stops, and no entries are restored by access-control-server.cpp, i.e., a denial of service." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/project-chip/connectedhomeip/issues/36535", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56318.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56318.json new file mode 100644 index 00000000000..5f8d5ddcc1b --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56318.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-56318", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:18.213", + "lastModified": "2024-12-19T00:15:06.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In raw\\TCP.cpp in Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0 before 27ca6ec, there is a NULL pointer dereference in TCPBase::ProcessSingleMessage via TCP packets with zero messageSize, leading to denial of service." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/project-chip/connectedhomeip/commit/27ca6ec255b78168e04bd71e0f1a473869cf144b", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/project-chip/connectedhomeip/issues/36750", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/project-chip/connectedhomeip/pull/36751", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56319.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56319.json new file mode 100644 index 00000000000..71e178d993a --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56319.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-56319", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-18T23:15:18.373", + "lastModified": "2024-12-18T23:15:18.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0 before e3277eb, unlimited user label appends in a userlabel cluster can lead to a denial of service (resource exhaustion)." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/project-chip/connectedhomeip/commit/e3277eb02ed8115de5887e8beca0e35007ba71f3", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/project-chip/connectedhomeip/issues/36760", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/project-chip/connectedhomeip/pull/36843", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6792bb684c2..441052294f2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-18T23:00:20.790972+00:00 +2024-12-19T00:55:25.344583+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-18T22:39:17.437000+00:00 +2024-12-19T00:15:06.897000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274297 +274330 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `33` -- [CVE-2024-12686](CVE-2024/CVE-2024-126xx/CVE-2024-12686.json) (`2024-12-18T21:15:08.020`) -- [CVE-2024-12692](CVE-2024/CVE-2024-126xx/CVE-2024-12692.json) (`2024-12-18T22:15:05.730`) -- [CVE-2024-12693](CVE-2024/CVE-2024-126xx/CVE-2024-12693.json) (`2024-12-18T22:15:06.293`) -- [CVE-2024-12694](CVE-2024/CVE-2024-126xx/CVE-2024-12694.json) (`2024-12-18T22:15:06.397`) -- [CVE-2024-12695](CVE-2024/CVE-2024-126xx/CVE-2024-12695.json) (`2024-12-18T22:15:06.523`) -- [CVE-2024-45338](CVE-2024/CVE-2024-453xx/CVE-2024-45338.json) (`2024-12-18T21:15:08.173`) -- [CVE-2024-55231](CVE-2024/CVE-2024-552xx/CVE-2024-55231.json) (`2024-12-18T22:15:07.127`) -- [CVE-2024-55232](CVE-2024/CVE-2024-552xx/CVE-2024-55232.json) (`2024-12-18T22:15:07.297`) -- [CVE-2024-55505](CVE-2024/CVE-2024-555xx/CVE-2024-55505.json) (`2024-12-18T22:15:07.477`) -- [CVE-2024-56140](CVE-2024/CVE-2024-561xx/CVE-2024-56140.json) (`2024-12-18T21:15:08.353`) -- [CVE-2024-56145](CVE-2024/CVE-2024-561xx/CVE-2024-56145.json) (`2024-12-18T21:15:08.530`) +- [CVE-2022-44516](CVE-2022/CVE-2022-445xx/CVE-2022-44516.json) (`2024-12-19T00:15:05.727`) +- [CVE-2022-44517](CVE-2022/CVE-2022-445xx/CVE-2022-44517.json) (`2024-12-19T00:15:05.880`) +- [CVE-2022-44518](CVE-2022/CVE-2022-445xx/CVE-2022-44518.json) (`2024-12-19T00:15:06.037`) +- [CVE-2022-44519](CVE-2022/CVE-2022-445xx/CVE-2022-44519.json) (`2024-12-19T00:15:06.200`) +- [CVE-2022-44520](CVE-2022/CVE-2022-445xx/CVE-2022-44520.json) (`2024-12-19T00:15:06.360`) +- [CVE-2023-21586](CVE-2023/CVE-2023-215xx/CVE-2023-21586.json) (`2024-12-19T00:15:06.530`) +- [CVE-2024-37649](CVE-2024/CVE-2024-376xx/CVE-2024-37649.json) (`2024-12-18T23:15:07.440`) +- [CVE-2024-39804](CVE-2024/CVE-2024-398xx/CVE-2024-39804.json) (`2024-12-18T23:15:07.640`) +- [CVE-2024-41138](CVE-2024/CVE-2024-411xx/CVE-2024-41138.json) (`2024-12-18T23:15:07.813`) +- [CVE-2024-41145](CVE-2024/CVE-2024-411xx/CVE-2024-41145.json) (`2024-12-18T23:15:07.970`) +- [CVE-2024-41159](CVE-2024/CVE-2024-411xx/CVE-2024-41159.json) (`2024-12-18T23:15:08.140`) +- [CVE-2024-41165](CVE-2024/CVE-2024-411xx/CVE-2024-41165.json) (`2024-12-18T23:15:08.300`) +- [CVE-2024-42004](CVE-2024/CVE-2024-420xx/CVE-2024-42004.json) (`2024-12-18T23:15:08.450`) +- [CVE-2024-42220](CVE-2024/CVE-2024-422xx/CVE-2024-42220.json) (`2024-12-18T23:15:08.597`) +- [CVE-2024-43106](CVE-2024/CVE-2024-431xx/CVE-2024-43106.json) (`2024-12-18T23:15:08.760`) +- [CVE-2024-53580](CVE-2024/CVE-2024-535xx/CVE-2024-53580.json) (`2024-12-18T23:15:17.010`) +- [CVE-2024-55239](CVE-2024/CVE-2024-552xx/CVE-2024-55239.json) (`2024-12-18T23:15:17.180`) +- [CVE-2024-55461](CVE-2024/CVE-2024-554xx/CVE-2024-55461.json) (`2024-12-18T23:15:17.350`) +- [CVE-2024-55506](CVE-2024/CVE-2024-555xx/CVE-2024-55506.json) (`2024-12-18T23:15:17.523`) +- [CVE-2024-55603](CVE-2024/CVE-2024-556xx/CVE-2024-55603.json) (`2024-12-19T00:15:06.713`) +- [CVE-2024-56115](CVE-2024/CVE-2024-561xx/CVE-2024-56115.json) (`2024-12-18T23:15:17.687`) +- [CVE-2024-56116](CVE-2024/CVE-2024-561xx/CVE-2024-56116.json) (`2024-12-18T23:15:17.857`) +- [CVE-2024-56317](CVE-2024/CVE-2024-563xx/CVE-2024-56317.json) (`2024-12-18T23:15:18.023`) +- [CVE-2024-56318](CVE-2024/CVE-2024-563xx/CVE-2024-56318.json) (`2024-12-18T23:15:18.213`) +- [CVE-2024-56319](CVE-2024/CVE-2024-563xx/CVE-2024-56319.json) (`2024-12-18T23:15:18.373`) ### CVEs modified in the last Commit -Recently modified CVEs: `40` +Recently modified CVEs: `1` -- [CVE-2024-47544](CVE-2024/CVE-2024-475xx/CVE-2024-47544.json) (`2024-12-18T21:48:32.893`) -- [CVE-2024-47545](CVE-2024/CVE-2024-475xx/CVE-2024-47545.json) (`2024-12-18T21:49:28.210`) -- [CVE-2024-47546](CVE-2024/CVE-2024-475xx/CVE-2024-47546.json) (`2024-12-18T21:50:08.920`) -- [CVE-2024-47596](CVE-2024/CVE-2024-475xx/CVE-2024-47596.json) (`2024-12-18T21:51:08.200`) -- [CVE-2024-47597](CVE-2024/CVE-2024-475xx/CVE-2024-47597.json) (`2024-12-18T21:39:17.820`) -- [CVE-2024-47598](CVE-2024/CVE-2024-475xx/CVE-2024-47598.json) (`2024-12-18T21:40:26.240`) -- [CVE-2024-47599](CVE-2024/CVE-2024-475xx/CVE-2024-47599.json) (`2024-12-18T21:41:17.307`) -- [CVE-2024-47600](CVE-2024/CVE-2024-476xx/CVE-2024-47600.json) (`2024-12-18T21:43:04.660`) -- [CVE-2024-47601](CVE-2024/CVE-2024-476xx/CVE-2024-47601.json) (`2024-12-18T21:43:42.903`) -- [CVE-2024-47602](CVE-2024/CVE-2024-476xx/CVE-2024-47602.json) (`2024-12-18T21:27:41.137`) -- [CVE-2024-47603](CVE-2024/CVE-2024-476xx/CVE-2024-47603.json) (`2024-12-18T21:28:13.987`) -- [CVE-2024-47606](CVE-2024/CVE-2024-476xx/CVE-2024-47606.json) (`2024-12-18T21:35:45.223`) -- [CVE-2024-47774](CVE-2024/CVE-2024-477xx/CVE-2024-47774.json) (`2024-12-18T21:36:58.827`) -- [CVE-2024-47775](CVE-2024/CVE-2024-477xx/CVE-2024-47775.json) (`2024-12-18T21:37:59.663`) -- [CVE-2024-49543](CVE-2024/CVE-2024-495xx/CVE-2024-49543.json) (`2024-12-18T21:22:33.593`) -- [CVE-2024-49544](CVE-2024/CVE-2024-495xx/CVE-2024-49544.json) (`2024-12-18T21:22:11.823`) -- [CVE-2024-49545](CVE-2024/CVE-2024-495xx/CVE-2024-49545.json) (`2024-12-18T21:21:56.527`) -- [CVE-2024-49546](CVE-2024/CVE-2024-495xx/CVE-2024-49546.json) (`2024-12-18T21:21:39.133`) -- [CVE-2024-49547](CVE-2024/CVE-2024-495xx/CVE-2024-49547.json) (`2024-12-18T21:20:40.313`) -- [CVE-2024-49548](CVE-2024/CVE-2024-495xx/CVE-2024-49548.json) (`2024-12-18T21:20:23.697`) -- [CVE-2024-49549](CVE-2024/CVE-2024-495xx/CVE-2024-49549.json) (`2024-12-18T21:19:54.533`) -- [CVE-2024-53269](CVE-2024/CVE-2024-532xx/CVE-2024-53269.json) (`2024-12-18T22:15:06.763`) -- [CVE-2024-53270](CVE-2024/CVE-2024-532xx/CVE-2024-53270.json) (`2024-12-18T22:15:06.883`) -- [CVE-2024-53271](CVE-2024/CVE-2024-532xx/CVE-2024-53271.json) (`2024-12-18T22:15:07.010`) -- [CVE-2024-53954](CVE-2024/CVE-2024-539xx/CVE-2024-53954.json) (`2024-12-18T21:16:26.943`) +- [CVE-2024-43594](CVE-2024/CVE-2024-435xx/CVE-2024-43594.json) (`2024-12-18T23:15:08.920`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c7911a4fc10..0e3cf3e85e0 100644 --- a/_state.csv +++ b/_state.csv @@ -129336,7 +129336,7 @@ CVE-2019-10998,0,0,161127b36527ecf2ed6c8d5c408b2b950f0ea4d9c8cadc83798247b49ff47 CVE-2019-10999,0,0,eca7c08e3a3a663a4247eb777bd211e2ef1683fd47fd5eafbd3364ae2d4cd1fb,2024-11-21T04:20:19.520000 CVE-2019-1100,0,0,3139fa67f72c2ac2a426b9e94a2463ded4c90c91d0d9502dc10ab7acc7202820,2024-11-21T04:36:00.973000 CVE-2019-11000,0,0,9f7b47e98cf836a95312c8ca77593d15ab59aa5e2b59d7d023930e92995b07af,2024-11-21T04:20:19.670000 -CVE-2019-11001,0,1,3990b0085a0a17399a8582ce087900aeb743bed0cf8a6a60a30fc0ea94af9616,2024-12-18T21:15:06.880000 +CVE-2019-11001,0,0,3990b0085a0a17399a8582ce087900aeb743bed0cf8a6a60a30fc0ea94af9616,2024-12-18T21:15:06.880000 CVE-2019-11002,0,0,982a4058b8e9adceb38d582ecced8ccba846ed0e12cfcbdbeac2831eb8906fe0,2024-11-21T04:20:19.970000 CVE-2019-11003,0,0,ff92b42246a7174753edf14d1e5c940e59427c16eca1f956007e6a48f87b626e,2024-11-21T04:20:20.103000 CVE-2019-11004,0,0,89f4eb2d7c0c64f6cd5b1eed65e37382944a075492a538dc657d48d6922660a5,2024-11-21T04:20:20.247000 @@ -167089,6 +167089,7 @@ CVE-2021-2055,0,0,19ef2def0996a3eda979d21e11c85c151931ff02412b22b62ca1d283c91a81 CVE-2021-20550,0,0,bcfb998103aabb2db68eacb68d6e5e676e366b8736eddb04f9b1959de069212a,2024-11-21T05:46:45.610000 CVE-2021-20551,0,0,7599827456c11032b04f5d5521c20a3fded80a5e3c708285d2d63204629663a1,2024-11-21T05:46:45.760000 CVE-2021-20552,0,0,db1b98f153498419c0ae5ac70680b77b702feff37c6f6d82a53523aa26f56b3c,2024-11-21T05:46:45.883000 +CVE-2021-20553,1,1,e1e21ff4ee57a407a14c026e5814a85da9b2c7fa45e6f8a0fa9db7476ce7c76b,2024-12-19T00:15:04.710000 CVE-2021-20554,0,0,2e5190cabe82cd81ebbfc6a35e57e2047a5de9b2faf0ac96253685a1f61ba149,2024-11-21T05:46:46.007000 CVE-2021-20556,0,0,08db6f413d131e81353474d5ce2e943aa08b3bfd763ebf0c40b5b52497b3769f,2024-11-21T05:46:46.143000 CVE-2021-20557,0,0,d4a8b7981ff7e6cc87b1d17dad192132faa62d5127df8614b78f16f4ade1626a,2024-11-21T05:46:46.263000 @@ -174350,6 +174351,7 @@ CVE-2021-29822,0,0,09a76e7138aad6dfc7ab52ca0cd241d312de60620e492ef0053d6d402a455 CVE-2021-29823,0,0,80ee5ee893b56420ffcc59a83a4fdbfb9d09ab542430ad06550c2ee82f0de962,2024-11-21T06:01:52.670000 CVE-2021-29824,0,0,0312c92f3dad203a49fb4d74700e1473773ad1480d6687feea26a8ff93709db1,2024-11-21T06:01:52.800000 CVE-2021-29825,0,0,8f8f9b502a0b14e142a0efa7b37ed3681ff93a41715c013c12b6c888db3c222b,2024-11-21T06:01:52.923000 +CVE-2021-29827,1,1,fff930698bc1edbad67b322bb4663d58cf6ad27a708090e12f7e3104487b552b,2024-12-19T00:15:04.873000 CVE-2021-29831,0,0,545e7ff83f1458c2d806dc6f01d1f78b192c18e5db6b05fcf918272ea92a8fa2,2024-11-21T06:01:53.043000 CVE-2021-29832,0,0,8585447c8f00dd814e9f628c9d6ad0f9e20be773b44ab3e6d8b767faf489e5b0,2024-11-21T06:01:53.183000 CVE-2021-29833,0,0,94f9ab4704b65f9fb584fda861c3fc97f24530f660cce16cba412828e72809d8,2024-11-21T06:01:53.310000 @@ -192745,7 +192747,7 @@ CVE-2022-23220,0,0,587bdddc175569ce15f6940da02ed26c837c2a2634f31dc1b11143496f1ef CVE-2022-23221,0,0,5d57b4180b48987f7f4bfea9bdf7f6d1d256fcf67bfadd1791154e8dad339a61,2024-11-21T06:48:13.213000 CVE-2022-23222,0,0,fbcfcb02bfa7b24347fade63f729949c1d8bf5ab948cbe460e536a4e6f01d068,2024-11-21T06:48:13.447000 CVE-2022-23223,0,0,25ae342ae40f88bf1945d23f9f75dfe8fce27795096bf371c09a001e1246210b,2024-11-21T06:48:13.633000 -CVE-2022-23227,0,1,b3706645308eb832d5dccf185c7850eb8de3a07b35fe0eb9b007dd17f92ce0de,2024-12-18T21:15:07.780000 +CVE-2022-23227,0,0,b3706645308eb832d5dccf185c7850eb8de3a07b35fe0eb9b007dd17f92ce0de,2024-12-18T21:15:07.780000 CVE-2022-23228,0,0,4a44e8524a7adb66befd4b46314168d27b1bea7184eb2236a14910edb3b3678f,2024-11-21T06:48:13.933000 CVE-2022-2323,0,0,42b9bd1c8aca4c05c89da17a9dd6087ee600d18c2ac835582ed3b37915420177,2024-11-21T07:00:46.103000 CVE-2022-23232,0,0,dcff8a87ed3c8132e455f844254418de8e1ef002dbc4192a1cbdc4832e1bee81,2024-11-21T06:48:14.080000 @@ -206808,6 +206810,8 @@ CVE-2022-40723,0,0,47d5d97a3b0851375c2b0cd12cb373778999cbf5827d4b1ce28e8f14d38c3 CVE-2022-40724,0,0,1b728da6bac0532a4f5739b366a2da1c4452daf953fa10fb8655d678c82f9430,2024-11-21T07:21:56.407000 CVE-2022-40725,0,0,64c16d64136c36afe1300757cde787f6df6e9488f4351c1c7e2d255d5914a81b,2024-11-21T07:21:56.533000 CVE-2022-4073,0,0,eb32f2da0b9d93b3007909848cd6d56479d5d41162c4fcfd4fbb4577d9b55733,2023-11-07T03:56:51.877000 +CVE-2022-40732,1,1,4ecbe6ddae40cf548b03d78e71e932dbff4c7d240fbbed16524dae6f136ab4cb,2024-12-18T23:15:07.060000 +CVE-2022-40733,1,1,263e280b504b7e245b6924913810fea00aaae4b92505028912d9490dd262597d,2024-12-18T23:15:07.243000 CVE-2022-40734,0,0,58117b64c9a903c8fb7db1a66ef34c3128ad5b1dbf19c93c401ac9d0603417fd,2024-11-21T07:21:56.670000 CVE-2022-40735,0,0,3a7574cff56da967fce27335381a9ca4c7a727787a262097bcb905faced240ce,2024-11-21T07:21:56.900000 CVE-2022-40736,0,0,8a4e1664de00baf170086ecfcf7a348ddfc7ba65bafd4937bc20b78c9585a649,2024-11-21T07:21:57.087000 @@ -209749,7 +209753,16 @@ CVE-2022-44500,0,0,b21789a06c67e872d5d73daab04f115073f5faa5e6ec649e0d7f940af0d83 CVE-2022-44502,0,0,b5562c7b8267cf67bf0ad6ca70179251fa1596a66e437cdd39ac0d59e88570fa,2024-11-21T07:28:05.083000 CVE-2022-4451,0,0,71bd0c76cc1206fc647acf97e23ac3111e5623c6dfa8588b7cd098d39f11a0f8,2024-11-21T07:35:17.343000 CVE-2022-44510,0,0,25c4d0e9515b57632bcb3ae200f1085ef683d9e98b07dbc882d3305076a893b5,2024-11-21T07:28:05.197000 +CVE-2022-44512,1,1,a6697b3d40069e359e2a92e1659cd8e3f6d6cf9eafebfb11b3afed5e04d2c18f,2024-12-19T00:15:05.067000 +CVE-2022-44513,1,1,0dc3c342c558d6d3b5ea880dd08edcec553b9b362e84310d242fca8eb26d7e6a,2024-12-19T00:15:05.237000 +CVE-2022-44514,1,1,d390d0e1b938fb81e6f8af6e4d547e74ad8327182d8a162a57849f661e76080f,2024-12-19T00:15:05.400000 +CVE-2022-44515,1,1,164f1d12b39643bf8dfcd52a52f89b1917c8074fd5d8dd77b2bf5d8f047deb4d,2024-12-19T00:15:05.567000 +CVE-2022-44516,1,1,a38975cedcd42d7d0bcd728d44438a3b017464f349988e35d43426b04ed8f75e,2024-12-19T00:15:05.727000 +CVE-2022-44517,1,1,79890ab09738f6138a4691695c00694a4443bc98a11169f2cdbb2b560c52e9e6,2024-12-19T00:15:05.880000 +CVE-2022-44518,1,1,710af2b566f1573a6129d21a845c4388ab3915aea2d3523c49a3331a7352ce63,2024-12-19T00:15:06.037000 +CVE-2022-44519,1,1,48bffe7fa0840bca641de0f1e65e84227c78ca196675477c476c4b95d482e7fd,2024-12-19T00:15:06.200000 CVE-2022-4452,0,0,e23ff09cf254521b138d2873c6b347ecad79392d4de44954995ce14268d350c9,2024-11-21T07:35:17.463000 +CVE-2022-44520,1,1,fed01525abf96cbefa5a5c09d4fb79bbfa9e3a88474609f818f285243d3fc52f,2024-12-19T00:15:06.360000 CVE-2022-4453,0,0,9b00e366e9d0c0ef9c324b7b982b02b3dcac63ebb143aa7afbf887a477161fb4,2024-11-21T07:35:17.583000 CVE-2022-44532,0,0,4207f3e98f5233bb1738bdd6c69782a0cd2348956681f5d35417e00bb16bafe5,2024-11-21T07:28:05.340000 CVE-2022-44533,0,0,35103e589f79c98255b730dc3b424c6479616183eb90f9be40ddec7fdd1d6e6e,2024-11-21T07:28:05.460000 @@ -216332,6 +216345,7 @@ CVE-2023-21582,0,0,4f5bb933cd17a5c1613aa364a41ce8982934e8b8f3eae19a30c441e8cd6b7 CVE-2023-21583,0,0,da3e056f56ad63f7eae14f2e8d9ffa08b78397274979a093ffb37a9e5e3ee287,2024-11-21T07:43:07.860000 CVE-2023-21584,0,0,9b4764fbfdd2b085572e653159d7e41bc33dae3d1026fdf2ef7488386e1ab612,2024-11-21T07:43:07.970000 CVE-2023-21585,0,0,cff3f3c1e359f7c3a70fbba0253fdce9609b428d2fe451cc230c57a04c06c5d6,2024-11-21T07:43:08.090000 +CVE-2023-21586,1,1,c7342d9abd36c8ce439cd66ee023e93be01e88b044fb33ce9b7c5f4cb38f4702,2024-12-19T00:15:06.530000 CVE-2023-21587,0,0,529caf054840ca5e36185792609bc9be0ffc5215314f723e5c9028d34abee64c,2024-11-21T07:43:08.223000 CVE-2023-21588,0,0,baff138c9f76bdbd381c2c168eebd52f4b047936191139a0418408fd3b806d62,2024-11-21T07:43:08.360000 CVE-2023-21589,0,0,4b9a8c28267032bdbbeeb191175e5f1bfdffcc52264c17cc8c8f9227af3eddc6,2024-11-21T07:43:08.470000 @@ -232395,7 +232409,7 @@ CVE-2023-41873,0,0,144df708eec5cdc99bf9fc900b8b496963af7a10b5fe491bc7a23f78f7855 CVE-2023-41874,0,0,a273518103b67315483aec10e4142508e72449f6d8f6ebe80921f7b6ecf22161,2024-11-21T08:21:49.820000 CVE-2023-41875,0,0,0219e72c04918431bddec1b861997edbd6f7ffe58adb18a9206c7114d4b37885,2024-12-13T15:15:25.950000 CVE-2023-41876,0,0,c65a67afd85426602e7ce8d50691736379577812fe96ecc473c7a63fea44bdeb,2024-11-21T08:21:49.953000 -CVE-2023-41877,0,1,05182afcf80722c5de0a5cdefd2d1d6589a76671002a6dde20b43c88da286b35,2024-12-18T22:01:15.063000 +CVE-2023-41877,0,0,05182afcf80722c5de0a5cdefd2d1d6589a76671002a6dde20b43c88da286b35,2024-12-18T22:01:15.063000 CVE-2023-41878,0,0,69f5df70c8cf256edf441a21003ad975c00708528a81d027d3cbb62167be0250,2024-11-21T08:21:50.207000 CVE-2023-41879,0,0,26c3b9818b764a1ed064ebf13595d3ddd709f842d054238762177756b3db12b0,2024-11-21T08:21:50.350000 CVE-2023-4188,0,0,2d805671cfcf3697b72c8ab984da36d2fcc19712a1dca338f0c3f2fe40c54075,2024-11-21T08:34:34.847000 @@ -238985,8 +238999,8 @@ CVE-2023-51440,0,0,1169f2ff9e326f6a3788f618809df1fe8188ee99151bee69ee1c834192da2 CVE-2023-51441,0,0,a1f5c39c8dff7bf99bb5a5fa410c3c1174c89222db585eebd25100439c38d134,2024-11-21T08:38:07.500000 CVE-2023-51442,0,0,1c1738101beb2069f2b1a7e3fda08286945bd667c62bf8c2c6862c2db1b18d8f,2024-11-21T08:38:07.630000 CVE-2023-51443,0,0,bc5dfbcf2d47b2402929c15b90b4be90f3f7485f94767446ff8ec5a8bbd43f0a,2024-11-21T08:38:07.743000 -CVE-2023-51444,0,1,e8424d7dbab81f18c11cb58faf4fc4e186576a125c882d03ea2d7e9cf75e0421,2024-12-18T21:58:24.790000 -CVE-2023-51445,0,1,41116820fca24ff32c8b590dc0a48077ad37e3c179f86cf28f8cf11b3c34d0b5,2024-12-18T21:56:24.053000 +CVE-2023-51444,0,0,e8424d7dbab81f18c11cb58faf4fc4e186576a125c882d03ea2d7e9cf75e0421,2024-12-18T21:58:24.790000 +CVE-2023-51445,0,0,41116820fca24ff32c8b590dc0a48077ad37e3c179f86cf28f8cf11b3c34d0b5,2024-12-18T21:56:24.053000 CVE-2023-51446,0,0,477f5d27d22a3cba1e4a3cc51b0aade0149e549a265a572147ead5a7c2014b5d,2024-11-21T08:38:08.127000 CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000 CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000 @@ -244896,13 +244910,13 @@ CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33 CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000 CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 -CVE-2024-12686,1,1,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000 +CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000 CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 -CVE-2024-12692,1,1,650dea48ea2dbe7711dc0bf271331ff770ac41a6b305ff8ad09ffba0d2163ba7,2024-12-18T22:15:05.730000 -CVE-2024-12693,1,1,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84281,2024-12-18T22:15:06.293000 -CVE-2024-12694,1,1,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000 -CVE-2024-12695,1,1,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000 +CVE-2024-12692,0,0,650dea48ea2dbe7711dc0bf271331ff770ac41a6b305ff8ad09ffba0d2163ba7,2024-12-18T22:15:05.730000 +CVE-2024-12693,0,0,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84281,2024-12-18T22:15:06.293000 +CVE-2024-12694,0,0,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000 +CVE-2024-12695,0,0,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000 CVE-2024-12698,0,0,bb87160466c668f8935491c0e9c96bcd8d37f4e72410a6dabca6f522c3fa9b9a,2024-12-18T05:15:07.840000 CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 @@ -249144,7 +249158,7 @@ CVE-2024-24743,0,0,8b8eb5a56f12b6c53a7a972a91c151337f030c81d2382bab605f73cf09ae6 CVE-2024-24746,0,0,29b64eb040fe3dc6e09b5dd0640a77052b82c31dc0faef52d04d78f87eb66b86,2024-11-21T08:59:36.647000 CVE-2024-24747,0,0,8125c5ab54fcbe503d2d7453a1ee5839c17e4edb306b2c7df3df0dd863da6429,2024-11-21T08:59:36.850000 CVE-2024-24748,0,0,0cdfc68f983790a7c3e213f0da1280264c12625bb9d03e0a2404e1b3d3a4e6c4,2024-11-21T08:59:36.993000 -CVE-2024-24749,0,1,5250cf2390a657b7cf3426d2a81201c26d285bcd980c249283207a957e369a70,2024-12-18T22:08:46.760000 +CVE-2024-24749,0,0,5250cf2390a657b7cf3426d2a81201c26d285bcd980c249283207a957e369a70,2024-12-18T22:08:46.760000 CVE-2024-2475,0,0,84dd791b3d89c80d7bd01728fd7a39eb99447b51627d0914f35715b92d401100,2024-11-21T09:09:50.110000 CVE-2024-24750,0,0,cc34797da60c6d05caf20a8995e2225cf1cccf6fbd6e3c7bedfabc7705510111,2024-12-17T17:40:47.303000 CVE-2024-24751,0,0,332b3d4e3a209828a661991efd3347cced117fe88519ae4eeeb1b40b069fd0f8,2024-11-21T08:59:37.407000 @@ -249789,12 +249803,12 @@ CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0 CVE-2024-25615,0,0,50c65986bbb8dc5aafc867c9e37b361b7c08d50d65dd263fb769956dc6ae116a,2024-11-21T09:01:05.260000 CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000 CVE-2024-25617,0,0,17f484e162566f54c12e8f4f84695e904b29b76183dabdc64b901466b20a705f,2024-11-21T09:01:05.533000 -CVE-2024-25618,0,1,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000 -CVE-2024-25619,0,1,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000 +CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000 +CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000 CVE-2024-2562,0,0,6acc014ac1c8f4275f46fe82a47eb5d09d436c296b92b3bb232858f0cdeed994,2024-11-21T09:10:01.040000 CVE-2024-25620,0,0,b50e6d09af7ce768a716dc2ff7ffa7e76bd9a236ffa80ba663793968d8d53334,2024-11-21T09:01:05.923000 CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000 -CVE-2024-25623,0,1,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000 +CVE-2024-25623,0,0,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000 CVE-2024-25624,0,0,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000 CVE-2024-25625,0,0,84707cd28e1bdaa9fde780703bf2a9a7e5d5981a505df8c5ad93f3b9fec8212d,2024-11-21T09:01:06.387000 CVE-2024-25626,0,0,fd128277875e205dcfef22acbe212d50e94b3f10ad9e2e84a95cfbcc859efdc3,2024-11-21T09:01:06.513000 @@ -251029,7 +251043,7 @@ CVE-2024-27079,0,0,07de70fa8c3b809ff48e2ff24e87d600a8debe70cf3c7268624ebbd9a1379 CVE-2024-2708,0,0,bf697bc47a2f6d1f340b86849095414aa8022fd5fa182a3b6858d8aad137b35f,2024-12-12T17:29:07.680000 CVE-2024-27080,0,0,02429991ce9474cf345b7cb16f8cc48985b566887cfdb16e19d4245116b2d135,2024-11-21T09:03:49.183000 CVE-2024-27081,0,0,80ca12be4ccb643aa9b9acced80a6c8edec931ae4a7630a48e36baddb6e3240c,2024-11-21T09:03:49.310000 -CVE-2024-27082,0,1,4317d32a3e0e8ed99d5825e499a15b4bf1a86f7bc115f4ec81a78b0bcd430db5,2024-12-18T21:01:17.677000 +CVE-2024-27082,0,0,4317d32a3e0e8ed99d5825e499a15b4bf1a86f7bc115f4ec81a78b0bcd430db5,2024-12-18T21:01:17.677000 CVE-2024-27083,0,0,0a867c69f0761d5202838e0d6673017855748c22aaa12a5775e2cc98792089a5,2024-11-21T09:03:49.570000 CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416e16,2024-02-26T18:15:07.920000 CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000 @@ -253003,7 +253017,7 @@ CVE-2024-29890,0,0,d7aeef7b1a852d07093e767dae05e03ec8f713df2d306c8f69aabec8a291c CVE-2024-29891,0,0,f037b09b07aae70e8f17162cf2f9555dce693854577cc8fe640959768b6c2f9c,2024-11-21T09:08:33.593000 CVE-2024-29892,0,0,0eabeb7cb6695ef5e7c670b1dc02008d4a59b639330a4432c44db18dea85266a,2024-11-21T09:08:33.727000 CVE-2024-29893,0,0,c8af367d9c587e41584706a11632b08d7b7ae69bfffc1ce0ee4de371d408e149,2024-11-21T09:08:33.863000 -CVE-2024-29894,0,1,63a0f8ebc2b89dbefe86d49c0639f6e96b849498d3625b601a9b5117c947eff3,2024-12-18T21:10:38.887000 +CVE-2024-29894,0,0,63a0f8ebc2b89dbefe86d49c0639f6e96b849498d3625b601a9b5117c947eff3,2024-12-18T21:10:38.887000 CVE-2024-29895,0,0,304ec674d940c6c6be41bc00c8f8967d1334e98bed6f24f921965e14ed63e7ab,2024-11-21T09:08:34.137000 CVE-2024-29896,0,0,145f328aab85293779e8f763f5e2657bc5ad706121e996820012b73884b52f55,2024-11-21T09:08:34.273000 CVE-2024-29897,0,0,890ab49af1d0f2615103d1d58d4cf202a16f4b443c3efac64624c08c88a21b24,2024-11-21T09:08:34.397000 @@ -258966,6 +258980,7 @@ CVE-2024-37642,0,0,fe3461e5fb2788de711bfd9b6bb47fd5e17a67ddb0ff15346912de18f8c42 CVE-2024-37643,0,0,1d855f4bf0f785e71cea62cbc0f369511f6ea0dce9a50a9f322baa5658c69f7b,2024-11-21T09:24:10.850000 CVE-2024-37644,0,0,04b02f37a9b83c09d899849116b647177377d8a76e70c7d8db488f726c3bd5e7,2024-11-21T09:24:11.063000 CVE-2024-37645,0,0,e4c63e220f43de5878e40a5e77259bd215d94fa70db73f63ff4753c220b74c30,2024-11-21T09:24:11.293000 +CVE-2024-37649,1,1,611c86dc432bb1f4b55a852e080016fea79189b71e099793c648f84ae33340a4,2024-12-18T23:15:07.440000 CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000 CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000 CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000 @@ -260633,6 +260648,7 @@ CVE-2024-3979,0,0,0afe50bc44d6fa6b597cd86ec198fb5812e3efa26f9c96f16b2dc019765fb5 CVE-2024-39791,0,0,84800cbf50106122b4ec00c830726d3c0c16e597f5511aff68896621728fa7b5,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,a0e01fb34a5f6d0b714b844b637779a453bc01fac9209900d57b56253997cfee,2024-08-19T16:20:28.967000 CVE-2024-3980,0,0,5ed554dffef87bebecad0e1e92147ec3b9a94d4293f1f5208c881e426d70aa58,2024-10-30T15:33:12.697000 +CVE-2024-39804,1,1,1443ebe065e0e4d5717fd837b10d865cedfd8feca4b62ad4eaf3caa3103ebfa2,2024-12-18T23:15:07.640000 CVE-2024-39806,0,0,820d3b5181086101e827009cfe4b737213c68e8e8373d5aee74b56640c974b56,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,a5f08786585e608d689a1daeac36093e7823985001ef9fadb52054fa4e796736,2024-11-21T09:28:22.227000 CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa7f1,2024-09-11T16:26:11.920000 @@ -261434,11 +261450,13 @@ CVE-2024-41133,0,0,eaa006680fbe52171c055ee02d725e1b8155ec7b71c3a3acf39eb708d36d5 CVE-2024-41134,0,0,23d5c7d7f4402caa31388f429a7315bd4b4bc9813b8271b656a2f311d8a3a753,2024-11-21T09:32:18.087000 CVE-2024-41135,0,0,fcaf63fba315037fb68d1d925bded9bb7982510c754a09114db334bb9fd16881,2024-11-21T09:32:18.203000 CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000 +CVE-2024-41138,1,1,de8937ba571c423a59c7f9fe9e19d9f039af80b9830484d75c60de74332fb341,2024-12-18T23:15:07.813000 CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000 CVE-2024-4114,0,0,bffdfff59b8e8c1973fa293ec179ba5ad5b6804845f0d8c3580b8b465845a4ff,2024-11-21T09:42:12.847000 CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000 CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000 CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000 +CVE-2024-41145,1,1,77e2343197ccbb28092a01ae4f2a3524bb2b2c483f0a4f8ccc0f2107bf596127,2024-12-18T23:15:07.970000 CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000 CVE-2024-4115,0,0,b57267cb8e1bb6187223c6763b432c2e47371c5db7fb3c6e57e19714f114293c,2024-11-21T09:42:12.977000 CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000 @@ -261446,12 +261464,14 @@ CVE-2024-41151,0,0,00f13e1e96fa8ce3e2849a0ecdb2937bd23efcaa80a1d6b9e409fd228363f CVE-2024-41153,0,0,c0ab6701dfb0e7935b555b1fa094f0ee4f1bf4a1c16645e01a3ec31537dc2a4e,2024-10-31T14:37:48.533000 CVE-2024-41156,0,0,4e48f11d1fb4cd9de12eef64bee0a3ff2f5403553caa8e40519c489b9350c166,2024-12-05T15:29:31.730000 CVE-2024-41157,0,0,687c6bf6c1a2a644076449fb3f6cf8733831e4b295f95e907ece1f39dc641094,2024-09-04T16:30:40.737000 +CVE-2024-41159,1,1,03637d611014a38e6e3b05f7bde30132e51a028877d0bba9b9ae193cd7ffe82e,2024-12-18T23:15:08.140000 CVE-2024-4116,0,0,fb13e9eda5d5b0f87b4a1a6faf2d47dd767a1cd80c123d34508608e977fd6f59,2024-11-21T09:42:13.103000 CVE-2024-41160,0,0,59352b379d517c3d21973bcf1f1dabfc101e56caaa086108874e9f5a5016dec8,2024-09-09T12:21:53.383000 CVE-2024-41161,0,0,c44c40c9181bdc0411297b718d634c69b4cc443072a4bbfc4be96011581fd659,2024-08-20T17:09:50.647000 CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138759,2024-09-04T17:03:53.010000 CVE-2024-41163,0,0,acd3d59e23a7c7b4b0c3e74d19b58377cdb81402be9adbd0a5cfe7a91ece1831,2024-12-18T15:15:10.730000 CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000 +CVE-2024-41165,1,1,8f8f25c9e56a41527b25ef69ce06e4eed865113e8f19257748f26cee82a5ddfb,2024-12-18T23:15:08.300000 CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000 CVE-2024-4117,0,0,6cc086281cfe564ad1a8b73d3f7bd2e9fa0d2a40b390da51a0a4f6965f4fec1f,2024-11-21T09:42:13.230000 CVE-2024-41170,0,0,7c50c7e0ef992b5a3c278ba9993ae63d88ca15fcfd1b1982b492fe16db9c5784,2024-09-10T12:09:50.377000 @@ -261965,6 +261985,7 @@ CVE-2024-41999,0,0,b97edfde7ae6eb79fac26588dc330cd7e8dfe8ef88db849221e314600b8cf CVE-2024-4200,0,0,f038714f68ea12f4c74fb21fbba21d18e23ff4002802fc658c541b8aad8db5b3,2024-11-21T09:42:22.677000 CVE-2024-42000,0,0,2e5e6eba94260d1248a64e384ab7190b55ba9e666e827b568cb017e068a9a34b,2024-11-14T16:48:30.013000 CVE-2024-42001,0,0,7b8b45588c9e661c6cad79b697fc90c37112d9be488e1f5fc1421e2d70534ef5,2024-08-20T16:37:05.447000 +CVE-2024-42004,1,1,817bffe189720697fa27094cb065692dab1e4b1f1fda226cf8e46b370d47891a,2024-12-18T23:15:08.450000 CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447d04,2024-10-23T18:22:48.937000 CVE-2024-42006,0,0,db719e10e8f2437035bfb372f689cb5ad1b3ba987ed59129a01e11cdd446ff43,2024-08-21T13:26:54.577000 CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000 @@ -262142,6 +262163,7 @@ CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d8 CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000 CVE-2024-4222,0,0,404604444d77dc73b57c36b8a95aa3dc38057a1a3ba659619f4989018835c2b9,2024-11-21T09:42:25.043000 +CVE-2024-42220,1,1,3efaea9f9008d92d0d433576bd8e615ab7d920bd31eb633108deeefd65ebfba2,2024-12-18T23:15:08.597000 CVE-2024-42222,0,0,31d1ecceb29f6dc0a006287b8f36eb69950f688f623593894878e73f68b4744b,2024-11-21T09:33:45.030000 CVE-2024-42223,0,0,bfd3e9b2497c2cd4ce56cfc4b3f7c8c085d8282b329417cd9636c8478537873e,2024-11-21T09:33:45.160000 CVE-2024-42224,0,0,a2467d1fdcd4f892f0d1e376bc5d4807929bf44cfae506d429e598dfa3e2b882,2024-11-21T09:33:45.307000 @@ -262741,6 +262763,7 @@ CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000 CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000 CVE-2024-43105,0,0,e347f7b09a6bd72c4cce9575828cf84dd0078060fb85e7c631ae4a4f65e5a4e2,2024-08-23T16:18:28.547000 +CVE-2024-43106,1,1,7c35bd64ddd80049f7425ea57212cdb212a079b1dc41737dbd159b80835e180b,2024-12-18T23:15:08.760000 CVE-2024-43108,0,0,77fa3735512d5828a3d75fa92bafe3bf54d868b127562dbed774be5fb641f858,2024-10-17T17:15:11.883000 CVE-2024-4311,0,0,76e51b82bcf102c4a7a18c5b03d4ba2a6e78929354b4c7d54c7e39e256fd7ef3,2024-11-18T16:35:13.737000 CVE-2024-43110,0,0,51650deb7aee7ab0cf914391f943f7fe2c91b657e3cdae3cff1f5f569194dcba,2024-09-05T21:22:04.810000 @@ -263211,7 +263234,7 @@ CVE-2024-43590,0,0,56f37bed6fa12b529a536cabd867859c2b7202ec5a699f63f91ae2da59bda CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000 CVE-2024-43592,0,0,aefb3ea2eef4806b0b04bf1216ce25a8b6f83f456c5748fe7fb5b675b193040f,2024-10-22T19:30:02.777000 CVE-2024-43593,0,0,2bb48f4f0afa52430e295c1e926a52b9335896fd8f7df026028468d0b3163bed,2024-10-22T19:30:19.870000 -CVE-2024-43594,0,0,8921bf0377c016d75fd4356966ea13d61f6576d4d52419bfdffebda90cdc8066,2024-12-12T02:00:54.287000 +CVE-2024-43594,0,1,0023a318bb29ccf0663d52c356794a59ebf2071b9e9fd567a194381db13ebb6c,2024-12-18T23:15:08.920000 CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d922654387160cb,2024-10-18T16:55:06.487000 CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000 CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000 @@ -264434,7 +264457,7 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44 CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000 CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000 CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000 -CVE-2024-45338,1,1,35f6048860fb1c72b6b6ce0a98d0bb29575e2c25156ad8356eec8ef7e12f590d,2024-12-18T21:15:08.173000 +CVE-2024-45338,0,0,35f6048860fb1c72b6b6ce0a98d0bb29575e2c25156ad8356eec8ef7e12f590d,2024-12-18T21:15:08.173000 CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000 CVE-2024-45346,0,0,42bcf491a94494c9433ce7696078ac7ab2eca46d8c28dcac4158f4b2b20fa4a5,2024-08-29T03:15:05.247000 CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000 @@ -265795,16 +265818,16 @@ CVE-2024-47534,0,0,df13f2ee68fa5e66e525b7b1f66f6aa0f0e1c060ce893dece259dc49bb627 CVE-2024-47535,0,0,298d41133677422a8f6d390f12d2cec10b4d60092e295406e026ea754c8a295e,2024-11-13T17:01:58.603000 CVE-2024-47536,0,0,6f8a4b4f8220f9b26154b954ad727df271a73f901fc0c3d5863c162fae5afc51,2024-10-04T13:51:25.567000 CVE-2024-47537,0,0,0c8153afca3aac84f186ec27f0837ced55d59e8e8e65c8031c4d84dd680e9f85,2024-12-12T02:03:27.877000 -CVE-2024-47538,0,1,ad7972197a18862beb8bdd90c0ae99acdd81ab31bd6496a51470f43a9079cf2c,2024-12-18T21:51:56.203000 -CVE-2024-47539,0,1,e700345225afbdb189fa376bdd8d61a4fac3ed4f8377392883f6552c7cecac25,2024-12-18T21:52:56.307000 +CVE-2024-47538,0,0,ad7972197a18862beb8bdd90c0ae99acdd81ab31bd6496a51470f43a9079cf2c,2024-12-18T21:51:56.203000 +CVE-2024-47539,0,0,e700345225afbdb189fa376bdd8d61a4fac3ed4f8377392883f6552c7cecac25,2024-12-18T21:52:56.307000 CVE-2024-4754,0,0,f946bc350cafc376503b251e8950814dfbf85a03e7ce93cc628c4f28533490c5,2024-11-21T09:43:31.777000 -CVE-2024-47540,0,1,ff2a6bd413545302aed64a381dac3c3c798a6ff96b7902bb0d3fe72444b2dc99,2024-12-18T21:53:53.963000 +CVE-2024-47540,0,0,ff2a6bd413545302aed64a381dac3c3c798a6ff96b7902bb0d3fe72444b2dc99,2024-12-18T21:53:53.963000 CVE-2024-47541,0,0,4245d049a4573901f7770b7cf133d400396b6f6af9f5943422209e14455bd4e7,2024-12-13T19:21:49.873000 CVE-2024-47542,0,0,fa3b6dab6f59424d3e6bc955760c56fdbb1b4dc68420b8f72a81cfbb7447d6d8,2024-12-13T19:03:40.280000 -CVE-2024-47543,0,1,00b1195ce79dc116199316d3c815d4607310cfe7a5454432362672154c825d2a,2024-12-18T21:47:18.337000 -CVE-2024-47544,0,1,f80f67aec2936bf3a4215ee30c8ee9cfd457dca117e54c936aa38886d04f8fa0,2024-12-18T21:48:32.893000 -CVE-2024-47545,0,1,428cf72ec7808d91481b7207049d2e117dcbb6beb17798245f304000d1594899,2024-12-18T21:49:28.210000 -CVE-2024-47546,0,1,b95cd270aed883f8f010c4648c391da8a614c825b1b38218b56931fefba049ef,2024-12-18T21:50:08.920000 +CVE-2024-47543,0,0,00b1195ce79dc116199316d3c815d4607310cfe7a5454432362672154c825d2a,2024-12-18T21:47:18.337000 +CVE-2024-47544,0,0,f80f67aec2936bf3a4215ee30c8ee9cfd457dca117e54c936aa38886d04f8fa0,2024-12-18T21:48:32.893000 +CVE-2024-47545,0,0,428cf72ec7808d91481b7207049d2e117dcbb6beb17798245f304000d1594899,2024-12-18T21:49:28.210000 +CVE-2024-47546,0,0,b95cd270aed883f8f010c4648c391da8a614c825b1b38218b56931fefba049ef,2024-12-18T21:50:08.920000 CVE-2024-47547,0,0,2e86dfc31a612610fcd211703820a9bbd2e41912415648f4197e55f76e2b416e,2024-12-10T19:57:32.987000 CVE-2024-47549,0,0,ec88edfad973e804c3e080b206fe5d22667e6bea7ecbaa56013ae1c9427b52bf,2024-11-05T19:40:52.070000 CVE-2024-4755,0,0,cf57304aa4a44badae0bfd971e93fc9d9b32ba95a21a3c55b71d92c862671250,2024-11-21T09:43:31.903000 @@ -265842,17 +265865,17 @@ CVE-2024-47592,0,0,7514b1d0682229e8e8d72f71655b912eae2bf102984769f70b3a93113c524 CVE-2024-47593,0,0,4485a35cf6d452090b7fd36461c91f586cdd110571706bdf5c04b7a553b6ebe0,2024-11-12T15:35:13.233000 CVE-2024-47594,0,0,7e345ff54c7effa11a9979482e9e679ccb391308ea3cdbd79ee7edd65b331424,2024-11-14T16:12:13.877000 CVE-2024-47595,0,0,8487073d9f25df501ffd874ff6ba96468e413512174a07e87d56dec935df872f,2024-11-14T15:21:32.080000 -CVE-2024-47596,0,1,b152f2a6a6ebefa7b3e6b61694cb3243028cd12cc07dbd87336faa57de37e534,2024-12-18T21:51:08.200000 -CVE-2024-47597,0,1,b148e096ccc1cb4fa8263cb44f98c3d689a6158bf24ebccb58eacfececb121c4,2024-12-18T21:39:17.820000 -CVE-2024-47598,0,1,7df76f9573d9d47beac295737ee53e510ea4292cdada2b6bdcefc61567e5a1e8,2024-12-18T21:40:26.240000 -CVE-2024-47599,0,1,79a940e4ed1dc0e11d45a35557efb0692c48247304aee36c5226aab6500a00ea,2024-12-18T21:41:17.307000 +CVE-2024-47596,0,0,b152f2a6a6ebefa7b3e6b61694cb3243028cd12cc07dbd87336faa57de37e534,2024-12-18T21:51:08.200000 +CVE-2024-47597,0,0,b148e096ccc1cb4fa8263cb44f98c3d689a6158bf24ebccb58eacfececb121c4,2024-12-18T21:39:17.820000 +CVE-2024-47598,0,0,7df76f9573d9d47beac295737ee53e510ea4292cdada2b6bdcefc61567e5a1e8,2024-12-18T21:40:26.240000 +CVE-2024-47599,0,0,79a940e4ed1dc0e11d45a35557efb0692c48247304aee36c5226aab6500a00ea,2024-12-18T21:41:17.307000 CVE-2024-4760,0,0,de926bec8e8c13a7e4c13bca922cad2399c8ba3da1db5b99551a2507b2214b2e,2024-11-21T09:43:32.823000 -CVE-2024-47600,0,1,cf9fd806dd5b2bdb890624068780e8bc61c5a7e7f4b357f6028c70964d446732,2024-12-18T21:43:04.660000 -CVE-2024-47601,0,1,f075b90e2fa0550816f7530f0832934f105615b601836ec61a3f3b9371879f1c,2024-12-18T21:43:42.903000 -CVE-2024-47602,0,1,3590424c5a1e5ab2c409ce352a836f4cff6bfe6739d6dce4410c2d8f9101ee03,2024-12-18T21:27:41.137000 -CVE-2024-47603,0,1,e2f22752273db695c89b30b387b9d18f99d96e81bdc9ec5d981ef632b4380656,2024-12-18T21:28:13.987000 +CVE-2024-47600,0,0,cf9fd806dd5b2bdb890624068780e8bc61c5a7e7f4b357f6028c70964d446732,2024-12-18T21:43:04.660000 +CVE-2024-47601,0,0,f075b90e2fa0550816f7530f0832934f105615b601836ec61a3f3b9371879f1c,2024-12-18T21:43:42.903000 +CVE-2024-47602,0,0,3590424c5a1e5ab2c409ce352a836f4cff6bfe6739d6dce4410c2d8f9101ee03,2024-12-18T21:27:41.137000 +CVE-2024-47603,0,0,e2f22752273db695c89b30b387b9d18f99d96e81bdc9ec5d981ef632b4380656,2024-12-18T21:28:13.987000 CVE-2024-47604,0,0,0bc47ae414bdd6b01a65c265f3f3055e1a0a5458b44c790858631e91134d9f75,2024-11-13T23:17:14.437000 -CVE-2024-47606,0,1,4800f16c54aa7ffc30bd35e785cee8b35a6989e3b8bc32b9da0d43ad7d5700a6,2024-12-18T21:35:45.223000 +CVE-2024-47606,0,0,4800f16c54aa7ffc30bd35e785cee8b35a6989e3b8bc32b9da0d43ad7d5700a6,2024-12-18T21:35:45.223000 CVE-2024-47607,0,0,382969a888801c46134ab6b16f4a50a4d9e68502ecd36882250f06d39efd0e1d,2024-12-18T19:53:21.123000 CVE-2024-47608,0,0,6568bd19016506539b4ea82412fdcb1ecdc2fcf519cca4e0194fbcee5a3c48e7,2024-10-07T18:51:05.650000 CVE-2024-47609,0,0,20abbd49af76b9706e2ef27aa5069189f8951d7c9ed85341c5ad92d8d50e5593,2024-11-21T17:15:17.250000 @@ -266034,8 +266057,8 @@ CVE-2024-4777,0,0,0559f9fc05b16fbfafe09a51db41feace21d30c4b62adaed6c18b481b5c868 CVE-2024-47771,0,0,d9e667f8f1c80546a8045e1095310494da0b5c3573a4d135848ba5926d74346b,2024-10-16T16:38:43.170000 CVE-2024-47772,0,0,268d48580bc08bc06a9592581bf7c15b183982df7936e45259c48576c264bf04,2024-10-19T00:58:21.947000 CVE-2024-47773,0,0,2009644e404b2ecafb661ade272442df90db2955e19ee81df643af922d4ed623,2024-10-10T12:56:30.817000 -CVE-2024-47774,0,1,d9a20a982fb496f6083a435ac0a6cb4f3ec570793b74190eb6677390ddcab513,2024-12-18T21:36:58.827000 -CVE-2024-47775,0,1,4cb38872c65de22cea970d08bc6186a4cfc1da367205d3fd171bc95863a0127e,2024-12-18T21:37:59.663000 +CVE-2024-47774,0,0,d9a20a982fb496f6083a435ac0a6cb4f3ec570793b74190eb6677390ddcab513,2024-12-18T21:36:58.827000 +CVE-2024-47775,0,0,4cb38872c65de22cea970d08bc6186a4cfc1da367205d3fd171bc95863a0127e,2024-12-18T21:37:59.663000 CVE-2024-47776,0,0,4bfd490849c432ea6d8b47b8d34a3d0513182cb37ced94cdb8bdc27d44da9cd8,2024-12-18T19:28:07.190000 CVE-2024-47777,0,0,74c700c365f3ca38348532fbb82d166627257e082bc598283831bf32f30ca229,2024-12-18T19:40:54.580000 CVE-2024-47778,0,0,17041bebabee26d850eadf5a9c3c89ddec38d5af8fa65bfccd1445413536a59e,2024-12-18T19:34:23.850000 @@ -267034,13 +267057,13 @@ CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4 CVE-2024-49537,0,0,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000 CVE-2024-49538,0,0,3efeb7dc63ffb7e319a4e954aebfe791b3219c328f7308ff66639e511536c65d,2024-12-18T15:17:43.620000 CVE-2024-49541,0,0,8cb92ef5ac02101c8bfec3741ecff82e1c57862d3057b0e6d10bda1324aa00b2,2024-12-18T15:17:34.523000 -CVE-2024-49543,0,1,5c9ddcdaa9255475a13f93c1f688671e9741f1fa4d42d8398f37c3f39cc17f51,2024-12-18T21:22:33.593000 -CVE-2024-49544,0,1,3877cc8588bc5ebbb9b01f454634c8627d877bd6eca3c53e6c78ee80b13c15e2,2024-12-18T21:22:11.823000 -CVE-2024-49545,0,1,5db55d2d8d6168bdd48a7e37feac51f475cdfd768017d41a6ce988bec915da08,2024-12-18T21:21:56.527000 -CVE-2024-49546,0,1,e7406aa69daae5b3f9b186afb0fe222e3e103f09324bd3cbfa8a611fc2496e6f,2024-12-18T21:21:39.133000 -CVE-2024-49547,0,1,08ef1caad58a50d92797b22ae0aebac3032f67625ecc17a9fb0b5f29a705d8d5,2024-12-18T21:20:40.313000 -CVE-2024-49548,0,1,5a12b5b1dc8bedba17dcecf2876fb4f58ecba3b29d026dee51d4a4c474d174b3,2024-12-18T21:20:23.697000 -CVE-2024-49549,0,1,5726a49fe09ed2d4d4b15249b135eb0746c47bbc2d80be31d5669cf23ae6601a,2024-12-18T21:19:54.533000 +CVE-2024-49543,0,0,5c9ddcdaa9255475a13f93c1f688671e9741f1fa4d42d8398f37c3f39cc17f51,2024-12-18T21:22:33.593000 +CVE-2024-49544,0,0,3877cc8588bc5ebbb9b01f454634c8627d877bd6eca3c53e6c78ee80b13c15e2,2024-12-18T21:22:11.823000 +CVE-2024-49545,0,0,5db55d2d8d6168bdd48a7e37feac51f475cdfd768017d41a6ce988bec915da08,2024-12-18T21:21:56.527000 +CVE-2024-49546,0,0,e7406aa69daae5b3f9b186afb0fe222e3e103f09324bd3cbfa8a611fc2496e6f,2024-12-18T21:21:39.133000 +CVE-2024-49547,0,0,08ef1caad58a50d92797b22ae0aebac3032f67625ecc17a9fb0b5f29a705d8d5,2024-12-18T21:20:40.313000 +CVE-2024-49548,0,0,5a12b5b1dc8bedba17dcecf2876fb4f58ecba3b29d026dee51d4a4c474d174b3,2024-12-18T21:20:23.697000 +CVE-2024-49549,0,0,5726a49fe09ed2d4d4b15249b135eb0746c47bbc2d80be31d5669cf23ae6601a,2024-12-18T21:19:54.533000 CVE-2024-49550,0,0,27e56b904436c74833992eef941b9e27e78e6d34b2add18e9d4136f40cc8e03c,2024-12-10T21:15:17.903000 CVE-2024-49551,0,0,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000 CVE-2024-49552,0,0,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000 @@ -269509,10 +269532,10 @@ CVE-2024-53262,0,0,a30976483b4a3447c0f3cd137bc9d61475976254751462f53de127c8053e7 CVE-2024-53264,0,0,a32d4daa26a746493ea0f873c770ba4e99221937a3918a07719b9b2327c46ce8,2024-11-27T19:15:33.400000 CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000 CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000 -CVE-2024-53269,0,1,726b25237cecdb10013aca1f7ac22243bebf6fb79b773926a4789babcab824a5,2024-12-18T22:15:06.763000 +CVE-2024-53269,0,0,726b25237cecdb10013aca1f7ac22243bebf6fb79b773926a4789babcab824a5,2024-12-18T22:15:06.763000 CVE-2024-5327,0,0,c9fe7d7fa06a5d3d75a080dba8857bf423c18144dc7f53781589989842b7c438,2024-11-21T09:47:25.873000 -CVE-2024-53270,0,1,ab99630aa4e5713c62f25881e105086918537b9e2bad09f25843588aeb2dd649,2024-12-18T22:15:06.883000 -CVE-2024-53271,0,1,499acc75875f99bd6f3549b218af954aa74104ef78140adf13227181b20340a2,2024-12-18T22:15:07.010000 +CVE-2024-53270,0,0,ab99630aa4e5713c62f25881e105086918537b9e2bad09f25843588aeb2dd649,2024-12-18T22:15:06.883000 +CVE-2024-53271,0,0,499acc75875f99bd6f3549b218af954aa74104ef78140adf13227181b20340a2,2024-12-18T22:15:07.010000 CVE-2024-53272,0,0,f3ae5c3af00a8a1ede971886e8407e0fd8e6e8ff1a7606066ce068e53ea18328,2024-12-12T02:15:28.670000 CVE-2024-53273,0,0,4be201cb4a2a2818369414ac4a638086038f7b2129c8882fb2f8ed84d4b3ca40,2024-12-12T02:15:28.813000 CVE-2024-53274,0,0,1b082934bf5e9b4005ba0f77ebbc282458901418112daa847bcdad246d3a28e8,2024-12-12T02:15:28.940000 @@ -269596,6 +269619,7 @@ CVE-2024-53564,0,0,bf61935418f5f92f32cd62964e032ec47360caecda9e24bdf2d4ee2ea5631 CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000 CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000 CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000 +CVE-2024-53580,1,1,c3703276e05c4d594b51f46c7c6316b9cfecf5dde3914c666e4b556031b13d4f,2024-12-18T23:15:17.010000 CVE-2024-53589,0,0,728322b8c5b51205676d46003289ad227ccda2e910c9140fa8921fafd791e832,2024-12-11T17:15:20.233000 CVE-2024-5359,0,0,a1926c7cffc0ddd7cf732ce221c5b773e4f3ba3b6110f8717338c32417e29d1e,2024-11-21T09:47:29.680000 CVE-2024-53597,0,0,438026e14ae09726543276b1bb70c22feed1a3a736c09b864ce876954f4f80b7,2024-11-27T21:15:08.170000 @@ -269822,7 +269846,7 @@ CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f CVE-2024-53951,0,0,bed406754e2e414b104efd3eb1c72bdfbbfd0447862bc041d6f24ed2188caeb2,2024-12-18T15:08:14.407000 CVE-2024-53952,0,0,e709da7c68f85daad426a8b159797750fb6868aacc174441eebd3216c961f6c5,2024-12-18T15:07:51.167000 CVE-2024-53953,0,0,25545c98eaf201fa933493a2580b3dc8c368ea4fdf737cf4102803979b779545,2024-12-18T19:58:21.397000 -CVE-2024-53954,0,1,4bd87d0c098b91f29bd342f8c78da18e602b5f15127a12d69db0634c891d1cbd,2024-12-18T21:16:26.943000 +CVE-2024-53954,0,0,4bd87d0c098b91f29bd342f8c78da18e602b5f15127a12d69db0634c891d1cbd,2024-12-18T21:16:26.943000 CVE-2024-53955,0,0,8aa46e10bc17559dbedd3ecdffab1753d45263b50071af9071472921d4bbee43,2024-12-13T18:29:02.127000 CVE-2024-53956,0,0,09bc8469f16fb911c5ffda4e607436b9105e5de1566da87561ea95eda7fb2ed5,2024-12-13T18:28:36.207000 CVE-2024-53957,0,0,a6d6ebb3ae5e849219af3ed7c9ef344f0fde8547787241a0f7c5f17b54e97dcf,2024-12-13T18:24:48.200000 @@ -270373,8 +270397,9 @@ CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1a CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 -CVE-2024-55231,1,1,fc13b65817c8ac6a05de306c348d0f747f1848717936b21c85f240ddf2a7c32b,2024-12-18T22:15:07.127000 -CVE-2024-55232,1,1,a1b7652c4d868ce09f148b918944b3aa70cf5f6cfd7e2bf688258822e8d0886f,2024-12-18T22:15:07.297000 +CVE-2024-55231,0,0,fc13b65817c8ac6a05de306c348d0f747f1848717936b21c85f240ddf2a7c32b,2024-12-18T22:15:07.127000 +CVE-2024-55232,0,0,a1b7652c4d868ce09f148b918944b3aa70cf5f6cfd7e2bf688258822e8d0886f,2024-12-18T22:15:07.297000 +CVE-2024-55239,1,1,95fde9b654a58a5a4f63426beaf6b7d5bd5bf4fd927cde67b4e0e54174641b1f,2024-12-18T23:15:17.180000 CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000 CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674bab,2024-11-21T09:47:52.173000 CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000 @@ -270397,6 +270422,7 @@ CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4 CVE-2024-55451,0,0,1823afcfa4259711211e484b3a6e957134d35bc2739f7f67be50c6afb632ad1b,2024-12-17T17:15:09.687000 CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40453,2024-12-17T15:15:16.287000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 +CVE-2024-55461,1,1,9aba9528846a5e20a9950a25279e0e578fc2f2326e2132736dcd635d432a883c,2024-12-18T23:15:17.350000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000 CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000 @@ -270404,7 +270430,8 @@ CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad CVE-2024-55496,0,0,4a3321851c89fc343921299c0a2d1c4d4d998fd1f65ffe9f84e4d2aab27cd704,2024-12-17T18:15:25.683000 CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 -CVE-2024-55505,1,1,8271b89572403d1dfbfb143dcb69f9b9b60f911ca87d421e2e549f9a2e1ae17a,2024-12-18T22:15:07.477000 +CVE-2024-55505,0,0,8271b89572403d1dfbfb143dcb69f9b9b60f911ca87d421e2e549f9a2e1ae17a,2024-12-18T22:15:07.477000 +CVE-2024-55506,1,1,c8c2c622c6ffa6a174bc7b56cb9879bd5b1bab2018832221e0611539c21950fe,2024-12-18T23:15:17.523000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 CVE-2024-55513,0,0,2c70feb0b3a4b5910e279bea5f5b31284be91bf824e57138502d2e4a1a6f68ec,2024-12-18T16:15:14.720000 CVE-2024-55514,0,0,aa89c1ff2eec24c5fad92134c8d185f78ce2cace8089f0502184ccc069428486,2024-12-18T16:15:14.900000 @@ -270440,6 +270467,7 @@ CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f01 CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000 CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000 CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000 +CVE-2024-55603,1,1,1f4b42ae5da711e3fab21bbee693e839a7187a21b5759cecf8dc1873f22640a9,2024-12-19T00:15:06.713000 CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000 CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000 CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000 @@ -270581,14 +270609,16 @@ CVE-2024-56087,0,0,71bdda0ff7417396ad31c25e1bfa27f6b23e1f9a164b7da02056ec46ee4b5 CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000 CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000 +CVE-2024-56115,1,1,f05eda8263d4d568f41c89a3bd42a209f97ca709ed9920abf409adc86c73cb35,2024-12-18T23:15:17.687000 +CVE-2024-56116,1,1,e133a09045b787ca79ff39c02ab485d7fb0b9d77c65dad192cc1202addb9ea31,2024-12-18T23:15:17.857000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 CVE-2024-56128,0,0,9448cc8db9a8bd4e0b704b441f647abef22739c3613b41a4a55b8229474b0404,2024-12-18T17:15:15.003000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 CVE-2024-56139,0,0,51f3702c94f0ffd91c7bd6b4a37a8fbb30240d1963c2f10d645e10159f128016,2024-12-17T19:15:07.010000 CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000 -CVE-2024-56140,1,1,d0631548de4989ff87cb4466975c10a8b9a9a481cabea121e9d2e8c66b03ddd8,2024-12-18T21:15:08.353000 +CVE-2024-56140,0,0,d0631548de4989ff87cb4466975c10a8b9a9a481cabea121e9d2e8c66b03ddd8,2024-12-18T21:15:08.353000 CVE-2024-56142,0,0,46ee75dbf053d17753747d6ac8d88a6799cb24a1d693104ad554a951c48b711e,2024-12-18T16:15:15.433000 -CVE-2024-56145,1,1,39361c9ccf1de2097d52f9d4bd3693e26d97b41f06be9fa6d88d91286795f475,2024-12-18T21:15:08.530000 +CVE-2024-56145,0,0,39361c9ccf1de2097d52f9d4bd3693e26d97b41f06be9fa6d88d91286795f475,2024-12-18T21:15:08.530000 CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000 CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000 CVE-2024-56169,0,0,2f44b9b9fae0fb43dd077aa410d4ee16cde281ba4890fbc569e3bb73e5dfcd66,2024-12-18T05:15:08.853000 @@ -270609,6 +270639,9 @@ CVE-2024-5628,0,0,755412ba03c7f502c54c635c9705b96a4154da09bb9bfca64f93d1d41d08cf CVE-2024-5629,0,0,f9daa1fe2950a7ccef0838fb6e6cae4a7319a3ab1da6174da12e5faf2c955f5a,2024-11-21T09:48:02.860000 CVE-2024-5630,0,0,50874e31f2d6c9403bb3dbaf933b8b3f439196ea7c18b531eba9bc061324fe0f,2024-11-21T09:48:03.020000 CVE-2024-5631,0,0,2a74e658158bae900a85436e92fd017c375ea2371e9ccb7b5a67e7bbd481f6b3,2024-11-21T09:48:03.210000 +CVE-2024-56317,1,1,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826ae7,2024-12-18T23:15:18.023000 +CVE-2024-56318,1,1,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000 +CVE-2024-56319,1,1,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000 CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000 CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000 CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000