From f11bff2c22a7bf75ced1e7b3fa49b209aa52235e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 20 Dec 2024 21:03:53 +0000 Subject: [PATCH] Auto-Update: 2024-12-20T21:00:30.249993+00:00 --- CVE-2023/CVE-2023-275xx/CVE-2023-27584.json | 8 +- CVE-2023/CVE-2023-350xx/CVE-2023-35081.json | 4 +- CVE-2023/CVE-2023-48xx/CVE-2023-4863.json | 151 ++++++++-------- CVE-2023/CVE-2023-52xx/CVE-2023-5217.json | 118 ++++++------ CVE-2023/CVE-2023-63xx/CVE-2023-6345.json | 14 +- CVE-2023/CVE-2023-70xx/CVE-2023-7024.json | 30 ++-- CVE-2023/CVE-2023-70xx/CVE-2023-7028.json | 10 +- CVE-2024/CVE-2024-05xx/CVE-2024-0519.json | 4 +- CVE-2024/CVE-2024-128xx/CVE-2024-12841.json | 137 ++++++++++++++ CVE-2024/CVE-2024-128xx/CVE-2024-12842.json | 137 ++++++++++++++ CVE-2024/CVE-2024-128xx/CVE-2024-12867.json | 78 ++++++++ CVE-2024/CVE-2024-21xx/CVE-2024-2151.json | 73 +++++++- CVE-2024/CVE-2024-21xx/CVE-2024-2152.json | 73 +++++++- CVE-2024/CVE-2024-21xx/CVE-2024-2153.json | 73 +++++++- CVE-2024/CVE-2024-21xx/CVE-2024-2154.json | 71 +++++++- CVE-2024/CVE-2024-261xx/CVE-2024-26128.json | 82 ++++++++- CVE-2024/CVE-2024-377xx/CVE-2024-37758.json | 56 ++++++ CVE-2024/CVE-2024-442xx/CVE-2024-44212.json | 34 +++- CVE-2024/CVE-2024-442xx/CVE-2024-44224.json | 34 +++- CVE-2024/CVE-2024-442xx/CVE-2024-44225.json | 24 ++- CVE-2024/CVE-2024-442xx/CVE-2024-44243.json | 24 ++- CVE-2024/CVE-2024-442xx/CVE-2024-44245.json | 34 +++- CVE-2024/CVE-2024-443xx/CVE-2024-44300.json | 24 ++- CVE-2024/CVE-2024-544xx/CVE-2024-54479.json | 24 ++- CVE-2024/CVE-2024-544xx/CVE-2024-54486.json | 24 ++- CVE-2024/CVE-2024-544xx/CVE-2024-54491.json | 29 ++- CVE-2024/CVE-2024-545xx/CVE-2024-54500.json | 24 ++- CVE-2024/CVE-2024-545xx/CVE-2024-54506.json | 34 +++- CVE-2024/CVE-2024-545xx/CVE-2024-54510.json | 34 +++- CVE-2024/CVE-2024-553xx/CVE-2024-55341.json | 60 +++++++ CVE-2024/CVE-2024-553xx/CVE-2024-55342.json | 60 +++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56329.json | 82 +++++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56330.json | 78 ++++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56331.json | 60 +++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56333.json | 82 +++++++++ README.md | 71 ++++---- _state.csv | 190 ++++++++++---------- 37 files changed, 1776 insertions(+), 369 deletions(-) create mode 100644 CVE-2024/CVE-2024-128xx/CVE-2024-12841.json create mode 100644 CVE-2024/CVE-2024-128xx/CVE-2024-12842.json create mode 100644 CVE-2024/CVE-2024-128xx/CVE-2024-12867.json create mode 100644 CVE-2024/CVE-2024-377xx/CVE-2024-37758.json create mode 100644 CVE-2024/CVE-2024-553xx/CVE-2024-55341.json create mode 100644 CVE-2024/CVE-2024-553xx/CVE-2024-55342.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56329.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56330.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56331.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56333.json diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json index cf1454cb95f..b8b64f73499 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27584", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-19T23:15:11.233", - "lastModified": "2024-09-25T17:28:33.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:11:43.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:d7y:dragonfly:*:*:*:*:*:go:*:*", + "criteria": "cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*", "versionEndExcluding": "2.0.9", - "matchCriteriaId": "E4C68635-55DA-41B8-B69C-B50946D419CA" + "matchCriteriaId": "72F934F8-8793-41F8-9D9E-8D1B545683A6" } ] } diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35081.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35081.json index f95f009db37..836b5669545 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35081.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35081.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35081", "sourceIdentifier": "support@hackerone.com", "published": "2023-08-03T18:15:11.303", - "lastModified": "2024-11-21T08:07:56.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:13:39.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json index 9174632a904..4c8b1ca416e 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4863", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-12T15:15:24.327", - "lastModified": "2024-11-21T08:36:08.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:00:21.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -130,22 +130,22 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "117.0.1", - "matchCriteriaId": "54A821DA-91BA-454E-BC32-2152CD7989AE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", "versionEndExcluding": "102.15.1", - "matchCriteriaId": "F5CB1076-9147-44A4-B32F-86841DEB85DA" + "matchCriteriaId": "54B8855E-19B9-4D20-9B93-A5219F077335" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionStartIncluding": "115.0", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "117.0.1", + "matchCriteriaId": "FBA8858E-AB6C-4708-820D-3F9D8D5A077F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "115.1.0", "versionEndExcluding": "115.2.1", - "matchCriteriaId": "D288632E-E2D5-4319-BE74-882D71D699C2" + "matchCriteriaId": "6C494574-4187-4BC7-816B-6C1C288D711E" }, { "vulnerable": true, @@ -170,32 +170,29 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", - "versionEndExcluding": "117.0.2045.31", - "matchCriteriaId": "49AFFE24-5E30-46A4-A3AE-13D8EB15DE91" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", - "versionEndExcluding": "117.0.5938.62", - "matchCriteriaId": "B743C4A7-9C0F-49F3-B94E-F837F19164E2" + "versionEndExcluding": "116.0.1938.81", + "matchCriteriaId": "0C8F8BD1-1D13-4605-BF19-E4292E2D6A00" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:teams:1.6.00.26463:*:*:*:*:macos:*:*", - "matchCriteriaId": "AB030595-AF08-4FA1-819D-AC8F4AF36D20" + "criteria": "cpe:2.3:a:microsoft:teams:*:*:*:*:*:macos:*:*", + "versionEndExcluding": "1.6.00.26463", + "matchCriteriaId": "11C16818-7453-46CB-89C2-2A4D4452A198" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:teams:1.6.00.26474:*:*:*:*:desktop:*:*", - "matchCriteriaId": "4260DF96-DB1A-4E91-BE70-DE05424FF883" + "criteria": "cpe:2.3:a:microsoft:teams:*:*:*:*:desktop:*:*:*", + "versionEndExcluding": "1.6.00.26474", + "matchCriteriaId": "46625A28-312D-4406-87AE-8A7C93222A45" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:webp_image_extension:1.0.62681.0:*:*:*:*:*:*:*", - "matchCriteriaId": "99B1FD6D-F6BA-4992-BD0C-3B2A327F00BE" + "criteria": "cpe:2.3:a:microsoft:webp_image_extension:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.62681.0", + "matchCriteriaId": "201D3850-75A4-4CB4-A312-B01BF51C7C8A" } ] } @@ -247,6 +244,22 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bandisoft:honeyview:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.51", + "matchCriteriaId": "A9D1BE06-A20B-43F3-B78D-21F2FF20026C" + } + ] + } + ] } ], "references": [ @@ -368,7 +381,6 @@ "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -377,7 +389,6 @@ "source": "chrome-cve-admin@google.com", "tags": [ "Issue Tracking", - "Permissions Required", "Vendor Advisory" ] }, @@ -385,8 +396,7 @@ "url": "https://en.bandisoft.com/honeyview/history/", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", - "Third Party Advisory" + "Release Notes" ] }, { @@ -407,80 +417,70 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { @@ -488,7 +488,7 @@ "source": "chrome-cve-admin@google.com", "tags": [ "Patch", - "Vendor Advisory" + "Third Party Advisory" ] }, { @@ -561,14 +561,14 @@ "url": "https://www.debian.org/security/2023/dsa-5496", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://www.debian.org/security/2023/dsa-5497", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { @@ -703,7 +703,6 @@ "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -712,7 +711,6 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", - "Permissions Required", "Vendor Advisory" ] }, @@ -720,8 +718,7 @@ "url": "https://en.bandisoft.com/honeyview/history/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", - "Third Party Advisory" + "Release Notes" ] }, { @@ -766,56 +763,49 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { @@ -823,15 +813,14 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", - "Vendor Advisory" + "Third Party Advisory" ] }, { "url": "https://news.ycombinator.com/item?id=37478403", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Exploit", - "Third Party Advisory" + "Exploit" ] }, { @@ -896,21 +885,21 @@ "url": "https://www.debian.org/security/2023/dsa-5496", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://www.debian.org/security/2023/dsa-5497", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://www.debian.org/security/2023/dsa-5498", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { @@ -922,7 +911,11 @@ }, { "url": "https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json index 31cf6288f61..afb8a42d084 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5217", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-28T16:15:10.980", - "lastModified": "2024-11-21T08:41:18.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:01:23.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -57,7 +57,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -70,42 +69,6 @@ "matchCriteriaId": "385F58CC-4AA0-4C41-9394-C9481586689E" } ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", - "versionEndExcluding": "117.0.5938.132", - "matchCriteriaId": "8F840D02-4766-4644-8FD6-637E945E88FB" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "118.0.1", - "matchCriteriaId": "B8EE027E-A8D8-4038-B0C5-3F9ABA3079B6" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*", - "versionEndExcluding": "118.1", - "matchCriteriaId": "C0246068-275F-4D13-93B9-44AD91D2EFFB" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "115.3.1", - "matchCriteriaId": "2AAF4C02-0ED7-4AEF-BB14-A0A48DAC3B2E" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:android:*:*", - "versionEndExcluding": "118.1", - "matchCriteriaId": "54F53CD4-5766-401B-8333-1B8937112AD0" - } - ] } ] }, @@ -147,9 +110,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.3.1", + "matchCriteriaId": "93B700CD-4D4C-4D92-B105-9B02E21246BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", "versionEndExcluding": "118.0.1", - "matchCriteriaId": "B8EE027E-A8D8-4038-B0C5-3F9ABA3079B6" + "matchCriteriaId": "B6BEA417-5012-4315-AFF2-20BBF931A550" }, { "vulnerable": true, @@ -157,18 +126,6 @@ "versionEndExcluding": "118.1", "matchCriteriaId": "C0246068-275F-4D13-93B9-44AD91D2EFFB" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", - "versionEndExcluding": "115.3.1", - "matchCriteriaId": "2AAF4C02-0ED7-4AEF-BB14-A0A48DAC3B2E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:android:*:*", - "versionEndExcluding": "118.1", - "matchCriteriaId": "54F53CD4-5766-401B-8333-1B8937112AD0" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", @@ -262,6 +219,37 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "117.0.5938.132", + "matchCriteriaId": "8F840D02-4766-4644-8FD6-637E945E88FB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] } ], "references": [ @@ -454,7 +442,6 @@ "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -462,8 +449,8 @@ "url": "https://crbug.com/1486441", "source": "chrome-cve-admin@google.com", "tags": [ - "Issue Tracking", - "Permissions Required" + "Exploit", + "Issue Tracking" ] }, { @@ -575,7 +562,6 @@ "url": "https://security-tracker.debian.org/tracker/CVE-2023-5217", "source": "chrome-cve-admin@google.com", "tags": [ - "Patch", "Third Party Advisory" ] }, @@ -625,21 +611,21 @@ "url": "https://www.debian.org/security/2023/dsa-5508", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://www.debian.org/security/2023/dsa-5509", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://www.debian.org/security/2023/dsa-5510", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { @@ -846,7 +832,6 @@ "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -854,8 +839,8 @@ "url": "https://crbug.com/1486441", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Issue Tracking", - "Permissions Required" + "Exploit", + "Issue Tracking" ] }, { @@ -967,7 +952,6 @@ "url": "https://security-tracker.debian.org/tracker/CVE-2023-5217", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Patch", "Third Party Advisory" ] }, @@ -1017,21 +1001,21 @@ "url": "https://www.debian.org/security/2023/dsa-5508", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://www.debian.org/security/2023/dsa-5509", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://www.debian.org/security/2023/dsa-5510", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json index c68738c8a9b..8022e4ef505 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6345", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-29T12:15:07.077", - "lastModified": "2024-11-21T08:43:39.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:00:58.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -150,8 +150,7 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -172,7 +171,7 @@ "url": "https://www.debian.org/security/2023/dsa-5569", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { @@ -200,8 +199,7 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -222,7 +220,7 @@ "url": "https://www.debian.org/security/2023/dsa-5569", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] } ] diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json index 8d1fd8d0d10..c82cd4d5470 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7024", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-12-21T23:15:11.213", - "lastModified": "2024-11-21T08:45:03.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:01:40.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -118,7 +118,6 @@ "url": "https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -126,24 +125,22 @@ "url": "https://crbug.com/1513170", "source": "chrome-cve-admin@google.com", "tags": [ - "Issue Tracking", - "Vendor Advisory" + "Exploit", + "Issue Tracking" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -157,14 +154,13 @@ "url": "https://www.debian.org/security/2023/dsa-5585", "source": "chrome-cve-admin@google.com", "tags": [ - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -172,24 +168,22 @@ "url": "https://crbug.com/1513170", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Issue Tracking", - "Vendor Advisory" + "Exploit", + "Issue Tracking" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -203,7 +197,7 @@ "url": "https://www.debian.org/security/2023/dsa-5585", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Mailing List" ] } ] diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7028.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7028.json index 074976ea6fb..2446b8d9de8 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7028.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7028.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7028", "sourceIdentifier": "cve@gitlab.com", "published": "2024-01-12T14:15:49.420", - "lastModified": "2024-11-21T08:45:04.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:05:19.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -230,7 +230,11 @@ }, { "url": "https://www.vicarius.io/vsociety/posts/critical-gitlab-account-takeover-vulnerability-cve-2023-7028", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json index 823d5a788d4..1f3be31ba13 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0519", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-01-16T22:15:37.753", - "lastModified": "2024-11-21T08:46:46.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:01:11.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12841.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12841.json new file mode 100644 index 00000000000..d2ce7386408 --- /dev/null +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12841.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-12841", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-20T19:15:06.097", + "lastModified": "2024-12-20T19:15:06.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/emlog/emlog/issues/305", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289077", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289077", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12842.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12842.json new file mode 100644 index 00000000000..a7bf7018393 --- /dev/null +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12842.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-12842", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-20T20:15:21.880", + "lastModified": "2024-12-20T20:15:21.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/emlog/emlog/issues/305", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.289078", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.289078", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12867.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12867.json new file mode 100644 index 00000000000..2eb2a438960 --- /dev/null +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12867.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-12867", + "sourceIdentifier": "db4dfee8-a97e-4877-bfae-eba6d14a2166", + "published": "2024-12-20T20:15:22.740", + "lastModified": "2024-12-20T20:15:22.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery in URL Mapper in Arctic Security's Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to exfiltrate and modify configurations and data." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "db4dfee8-a97e-4877-bfae-eba6d14a2166", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "db4dfee8-a97e-4877-bfae-eba6d14a2166", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://www.arcticsecurity.com/security/vulnerability-note-2024-12-20", + "source": "db4dfee8-a97e-4877-bfae-eba6d14a2166" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json index 0f604be1f75..b4572d12f81 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2151.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2151", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-04T00:15:47.070", - "lastModified": "2024-11-21T09:09:08.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-20T19:36:52.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Business%20Logic%20in%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255583", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255583", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Business%20Logic%20in%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255583", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255583", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json index 3824466d7a7..b7a271e1828 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2152.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2152", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-04T00:15:47.303", - "lastModified": "2024-11-21T09:09:08.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-20T19:37:50.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255584", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255584", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255584", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255584", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json index 716086b8605..c0c1be567a6 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2153.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2153", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-04T01:15:06.953", - "lastModified": "2024-11-21T09:09:08.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-20T19:38:05.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255585", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255585", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255585", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255585", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json index 90f34c2efb6..5cf5a4b7de5 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2154.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2154", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-04T01:15:07.200", - "lastModified": "2024-11-21T09:09:08.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-20T19:38:32.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.255586", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255586", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.255586", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255586", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26128.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26128.json index 4e966f9e3a4..abd1bddd363 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26128.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26128", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T19:15:09.093", - "lastModified": "2024-11-21T09:01:59.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-20T19:30:47.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,32 +69,78 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.9", + "matchCriteriaId": "26BF6684-E207-4771-9223-1B473F279058" + } + ] + } + ] } ], "references": [ { "url": "https://basercms.net/security/JVN_73283159", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-jjxq-m8h3-4vw5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://basercms.net/security/JVN_73283159", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-jjxq-m8h3-4vw5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37758.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37758.json new file mode 100644 index 00000000000..831880a5716 --- /dev/null +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37758.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37758", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-20T19:15:06.363", + "lastModified": "2024-12-20T20:15:22.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in the endpoint /RoleMenuMapping/AddRoleMenu of Digiteam v4.21.0.0 allows authenticated attackers to escalate privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://medium.com/@hamzanadeem1337/unauthorized-full-vertical-privilege-escalation-in-digiteam-sales-gamification-portal-version-4-21-0-c3e3282e9053", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44212.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44212.json index 231ec79342f..f4d6da70f2b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44212.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44212", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:23.393", - "lastModified": "2024-12-13T18:51:05.983", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:06.570", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-346" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44224.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44224.json index aaf2ea2cc5b..5af5b37fd25 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44224.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44224", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:23.687", - "lastModified": "2024-12-18T18:34:29.640", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:06.757", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44225.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44225.json index 2ce2b51b89e..652e8d4a35b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44225.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44225.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44225", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:23.780", - "lastModified": "2024-12-18T18:33:53.503", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:06.937", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44243.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44243.json index 1ff22b96c54..5d748d27c6f 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44243.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44243.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44243", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:24.037", - "lastModified": "2024-12-18T18:32:27.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:07.120", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44245.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44245.json index affb8f9752c..6f1354efbae 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44245.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44245.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44245", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:24.113", - "lastModified": "2024-12-18T18:16:36.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:07.300", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44300.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44300.json index 5f148010bf9..b11c5d3eb70 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44300.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44300.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44300", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:24.590", - "lastModified": "2024-12-13T18:45:11.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:07.507", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54479.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54479.json index 0df46c6c8dd..39fab8dd81f 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54479.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54479.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54479", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:29.750", - "lastModified": "2024-12-13T18:24:34.090", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:07.707", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54486.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54486.json index ba0485e7a1c..5d5e441853f 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54486.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54486", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:30.010", - "lastModified": "2024-12-13T18:27:45.980", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:07.897", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json index 70414258fc3..d8494ce974b 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54491", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:30.270", - "lastModified": "2024-12-12T02:15:30.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-20T19:15:08.100", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": " El problema se resolvi\u00f3 al desinfectar el registro. Este problema se solucion\u00f3 en macOS Sequoia 15.2. Una aplicaci\u00f3n malintencionada podr\u00eda determinar la ubicaci\u00f3n actual de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121839", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54500.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54500.json index bb0b4995516..92aefddcb2b 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54500.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54500.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54500", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:30.777", - "lastModified": "2024-12-13T18:34:26.490", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:08.270", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54506.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54506.json index 7c678091327..79c92c683da 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54506.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54506.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54506", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:31.310", - "lastModified": "2024-12-13T18:05:06.697", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:08.467", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54510.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54510.json index 6394b8ecd5d..7d46e002d65 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54510.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54510.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54510", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:31.480", - "lastModified": "2024-12-13T18:07:49.633", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-20T19:15:08.667", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-553xx/CVE-2024-55341.json b/CVE-2024/CVE-2024-553xx/CVE-2024-55341.json new file mode 100644 index 00000000000..dd9ffc0706d --- /dev/null +++ b/CVE-2024/CVE-2024-553xx/CVE-2024-55341.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-55341", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-20T20:15:23.343", + "lastModified": "2024-12-20T20:15:23.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in Piranha CMS 11.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by creating a page via the /manager/pages and then adding a markdown content with the XSS payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PiranhaCMS/piranha.core", + "source": "cve@mitre.org" + }, + { + "url": "https://sec-fortress.github.io/posts/articles/posts/CVE-2024-55341.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-553xx/CVE-2024-55342.json b/CVE-2024/CVE-2024-553xx/CVE-2024-55342.json new file mode 100644 index 00000000000..67317e3ceb0 --- /dev/null +++ b/CVE-2024/CVE-2024-553xx/CVE-2024-55342.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-55342", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-20T19:15:08.853", + "lastModified": "2024-12-20T20:15:23.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed when a victim user opens or interacts with the PDF in their web browser, leading to a XSS vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PiranhaCMS/piranha.core", + "source": "cve@mitre.org" + }, + { + "url": "https://sec-fortress.github.io/posts/articles/posts/CVE-2024-55342.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56329.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56329.json new file mode 100644 index 00000000000..ce9d52c9129 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56329.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-56329", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-20T20:15:23.987", + "lastModified": "2024-12-20T20:15:23.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Socialstream is a third-party package for Laravel Jetstream. It replaces the published authentication and profile scaffolding provided by Laravel Jetstream, with scaffolding that has support for Laravel Socialite. When linking a social account to an already authenticated user, the lack of a confirmation step introduces a security risk. This is exacerbated if ->stateless() is used in the Socialite configuration, bypassing state verification and making the exploit easier. Developers should ensure that users explicitly confirm account linking and avoid configurations that skip critical security checks. Socialstream v6.2 introduces a new custom route that requires a user to \"Confirm\" or \"Deny\" a request to link a social account. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/joelbutcher/socialstream/commit/ae4dc3906f54fa792b296036d7b3dcea9a4d259b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/joelbutcher/socialstream/security/advisories/GHSA-3q97-vjpp-c8rp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56330.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56330.json new file mode 100644 index 00000000000..ace8415749f --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56330.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-56330", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-20T20:15:24.167", + "lastModified": "2024-12-20T20:15:24.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stardust is a platform for streaming isolated desktop containers. With this exploit, inter container communication (ICC) is not disabled. This would allow users within a container to access another containers agent, therefore compromising access.The problem has been patched in any Stardust build past 12/20/24. Users are advised to upgrade. Users may also manually disable ICC if they are unable to upgrade." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/spaceness/stardust/security/advisories/GHSA-h2c9-7j2r-m98p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56331.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56331.json new file mode 100644 index 00000000000..e3a2ac07f38 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56331.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-56331", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-20T20:15:24.337", + "lastModified": "2024-12-20T20:15:24.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uptime Kuma is an open source, self-hosted monitoring tool. An **Improper URL Handling Vulnerability** allows an attacker to access sensitive local files on the server by exploiting the `file:///` protocol. This vulnerability is triggered via the **\"real-browser\"** request type, which takes a screenshot of the URL provided by the attacker. By supplying local file paths, such as `file:///etc/passwd`, an attacker can read sensitive data from the server. This vulnerability arises because the system does not properly validate or sanitize the user input for the URL field. Specifically: 1. The URL input (``) allows users to input arbitrary file paths, including those using the `file:///` protocol, without server-side validation. 2. The server then uses the user-provided URL to make a request, passing it to a browser instance that performs the \"real-browser\" request, which takes a screenshot of the content at the given URL. If a local file path is entered (e.g., `file:///etc/passwd`), the browser fetches and captures the file\u2019s content. Since the user input is not validated, an attacker can manipulate the URL to request local files (e.g., `file:///etc/passwd`), and the system will capture a screenshot of the file's content, potentially exposing sensitive data. Any **authenticated user** who can submit a URL in \"real-browser\" mode is at risk of exposing sensitive data through screenshots of these files. This issue has been addressed in version 1.23.16 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/louislam/uptime-kuma/commit/6cfae01a0d3727c517afe512fc8fec1d99acf875", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/louislam/uptime-kuma/security/advisories/GHSA-2qgm-m29m-cj2h", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56333.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56333.json new file mode 100644 index 00000000000..4460fd51976 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56333.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-56333", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-20T20:15:24.520", + "lastModified": "2024-12-20T20:15:24.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Onyxia is a web app that aims at being the glue between multiple open source backend technologies to provide a state of art working environment for data scientists. This critical vulnerability allows authenticated users to remotely execute code within the Onyxia-API, leading to potential consequences such as unauthorized access to other user environments and denial of service attacks. This issue has been patched in api versions 4.2.0, 3.1.1, and 2.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://docs.onyxia.sh/vulnerability-disclosure/known-vulnerabilities/vulnerability-20241219", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/InseeFrLab/onyxia/security/advisories/GHSA-qmcw-h4f9-j3h3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0b6067bbb2f..d1d6885bcdf 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-20T19:00:21.539113+00:00 +2024-12-20T21:00:30.249993+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-20T18:59:47.850000+00:00 +2024-12-20T20:15:24.520000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274486 +274496 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `10` -- [CVE-2024-12677](CVE-2024/CVE-2024-126xx/CVE-2024-12677.json) (`2024-12-20T17:15:07.757`) +- [CVE-2024-12841](CVE-2024/CVE-2024-128xx/CVE-2024-12841.json) (`2024-12-20T19:15:06.097`) +- [CVE-2024-12842](CVE-2024/CVE-2024-128xx/CVE-2024-12842.json) (`2024-12-20T20:15:21.880`) +- [CVE-2024-12867](CVE-2024/CVE-2024-128xx/CVE-2024-12867.json) (`2024-12-20T20:15:22.740`) +- [CVE-2024-37758](CVE-2024/CVE-2024-377xx/CVE-2024-37758.json) (`2024-12-20T19:15:06.363`) +- [CVE-2024-55341](CVE-2024/CVE-2024-553xx/CVE-2024-55341.json) (`2024-12-20T20:15:23.343`) +- [CVE-2024-55342](CVE-2024/CVE-2024-553xx/CVE-2024-55342.json) (`2024-12-20T19:15:08.853`) +- [CVE-2024-56329](CVE-2024/CVE-2024-563xx/CVE-2024-56329.json) (`2024-12-20T20:15:23.987`) +- [CVE-2024-56330](CVE-2024/CVE-2024-563xx/CVE-2024-56330.json) (`2024-12-20T20:15:24.167`) +- [CVE-2024-56331](CVE-2024/CVE-2024-563xx/CVE-2024-56331.json) (`2024-12-20T20:15:24.337`) +- [CVE-2024-56333](CVE-2024/CVE-2024-563xx/CVE-2024-56333.json) (`2024-12-20T20:15:24.520`) ### CVEs modified in the last Commit -Recently modified CVEs: `64` +Recently modified CVEs: `25` -- [CVE-2024-28892](CVE-2024/CVE-2024-288xx/CVE-2024-28892.json) (`2024-12-20T17:05:48.707`) -- [CVE-2024-38861](CVE-2024/CVE-2024-388xx/CVE-2024-38861.json) (`2024-12-20T18:57:56.383`) -- [CVE-2024-4331](CVE-2024/CVE-2024-43xx/CVE-2024-4331.json) (`2024-12-20T17:22:46.783`) -- [CVE-2024-4368](CVE-2024/CVE-2024-43xx/CVE-2024-4368.json) (`2024-12-20T17:23:03.420`) -- [CVE-2024-44195](CVE-2024/CVE-2024-441xx/CVE-2024-44195.json) (`2024-12-20T17:15:14.860`) -- [CVE-2024-44211](CVE-2024/CVE-2024-442xx/CVE-2024-44211.json) (`2024-12-20T17:15:15.053`) -- [CVE-2024-44231](CVE-2024/CVE-2024-442xx/CVE-2024-44231.json) (`2024-12-20T17:15:15.277`) -- [CVE-2024-44292](CVE-2024/CVE-2024-442xx/CVE-2024-44292.json) (`2024-12-20T17:15:15.457`) -- [CVE-2024-44293](CVE-2024/CVE-2024-442xx/CVE-2024-44293.json) (`2024-12-20T17:15:15.843`) -- [CVE-2024-44298](CVE-2024/CVE-2024-442xx/CVE-2024-44298.json) (`2024-12-20T17:15:16.340`) -- [CVE-2024-4558](CVE-2024/CVE-2024-45xx/CVE-2024-4558.json) (`2024-12-20T17:18:09.597`) -- [CVE-2024-4577](CVE-2024/CVE-2024-45xx/CVE-2024-4577.json) (`2024-12-20T18:45:19.983`) -- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-12-20T17:14:27.630`) -- [CVE-2024-54150](CVE-2024/CVE-2024-541xx/CVE-2024-54150.json) (`2024-12-20T18:15:29.847`) -- [CVE-2024-54538](CVE-2024/CVE-2024-545xx/CVE-2024-54538.json) (`2024-12-20T18:15:30.117`) -- [CVE-2024-55470](CVE-2024/CVE-2024-554xx/CVE-2024-55470.json) (`2024-12-20T18:15:30.370`) -- [CVE-2024-55471](CVE-2024/CVE-2024-554xx/CVE-2024-55471.json) (`2024-12-20T18:15:30.730`) -- [CVE-2024-56327](CVE-2024/CVE-2024-563xx/CVE-2024-56327.json) (`2024-12-20T18:15:31.083`) -- [CVE-2024-7339](CVE-2024/CVE-2024-73xx/CVE-2024-7339.json) (`2024-12-20T17:37:05.217`) -- [CVE-2024-8805](CVE-2024/CVE-2024-88xx/CVE-2024-8805.json) (`2024-12-20T18:05:47.173`) -- [CVE-2024-8806](CVE-2024/CVE-2024-88xx/CVE-2024-8806.json) (`2024-12-20T17:56:56.057`) -- [CVE-2024-8807](CVE-2024/CVE-2024-88xx/CVE-2024-8807.json) (`2024-12-20T17:56:46.357`) -- [CVE-2024-8808](CVE-2024/CVE-2024-88xx/CVE-2024-8808.json) (`2024-12-20T17:46:19.670`) -- [CVE-2024-8968](CVE-2024/CVE-2024-89xx/CVE-2024-8968.json) (`2024-12-20T17:15:21.800`) -- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-12-20T18:59:47.850`) +- [CVE-2023-27584](CVE-2023/CVE-2023-275xx/CVE-2023-27584.json) (`2024-12-20T19:11:43.870`) +- [CVE-2023-35081](CVE-2023/CVE-2023-350xx/CVE-2023-35081.json) (`2024-12-20T19:13:39.710`) +- [CVE-2023-4863](CVE-2023/CVE-2023-48xx/CVE-2023-4863.json) (`2024-12-20T19:00:21.050`) +- [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2024-12-20T19:01:23.347`) +- [CVE-2023-6345](CVE-2023/CVE-2023-63xx/CVE-2023-6345.json) (`2024-12-20T19:00:58.223`) +- [CVE-2023-7024](CVE-2023/CVE-2023-70xx/CVE-2023-7024.json) (`2024-12-20T19:01:40.967`) +- [CVE-2023-7028](CVE-2023/CVE-2023-70xx/CVE-2023-7028.json) (`2024-12-20T19:05:19.913`) +- [CVE-2024-0519](CVE-2024/CVE-2024-05xx/CVE-2024-0519.json) (`2024-12-20T19:01:11.000`) +- [CVE-2024-2151](CVE-2024/CVE-2024-21xx/CVE-2024-2151.json) (`2024-12-20T19:36:52.080`) +- [CVE-2024-2152](CVE-2024/CVE-2024-21xx/CVE-2024-2152.json) (`2024-12-20T19:37:50.807`) +- [CVE-2024-2153](CVE-2024/CVE-2024-21xx/CVE-2024-2153.json) (`2024-12-20T19:38:05.173`) +- [CVE-2024-2154](CVE-2024/CVE-2024-21xx/CVE-2024-2154.json) (`2024-12-20T19:38:32.983`) +- [CVE-2024-26128](CVE-2024/CVE-2024-261xx/CVE-2024-26128.json) (`2024-12-20T19:30:47.733`) +- [CVE-2024-44212](CVE-2024/CVE-2024-442xx/CVE-2024-44212.json) (`2024-12-20T19:15:06.570`) +- [CVE-2024-44224](CVE-2024/CVE-2024-442xx/CVE-2024-44224.json) (`2024-12-20T19:15:06.757`) +- [CVE-2024-44225](CVE-2024/CVE-2024-442xx/CVE-2024-44225.json) (`2024-12-20T19:15:06.937`) +- [CVE-2024-44243](CVE-2024/CVE-2024-442xx/CVE-2024-44243.json) (`2024-12-20T19:15:07.120`) +- [CVE-2024-44245](CVE-2024/CVE-2024-442xx/CVE-2024-44245.json) (`2024-12-20T19:15:07.300`) +- [CVE-2024-44300](CVE-2024/CVE-2024-443xx/CVE-2024-44300.json) (`2024-12-20T19:15:07.507`) +- [CVE-2024-54479](CVE-2024/CVE-2024-544xx/CVE-2024-54479.json) (`2024-12-20T19:15:07.707`) +- [CVE-2024-54486](CVE-2024/CVE-2024-544xx/CVE-2024-54486.json) (`2024-12-20T19:15:07.897`) +- [CVE-2024-54491](CVE-2024/CVE-2024-544xx/CVE-2024-54491.json) (`2024-12-20T19:15:08.100`) +- [CVE-2024-54500](CVE-2024/CVE-2024-545xx/CVE-2024-54500.json) (`2024-12-20T19:15:08.270`) +- [CVE-2024-54506](CVE-2024/CVE-2024-545xx/CVE-2024-54506.json) (`2024-12-20T19:15:08.467`) +- [CVE-2024-54510](CVE-2024/CVE-2024-545xx/CVE-2024-54510.json) (`2024-12-20T19:15:08.667`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5410130c879..aa02234e935 100644 --- a/_state.csv +++ b/_state.csv @@ -164134,7 +164134,7 @@ CVE-2020-9246,0,0,8d96638980ac3e298778573b587edfb2eccd73fe5e0cafaa8dcafae20f6e42 CVE-2020-9247,0,0,1aa6d00902f7f27e25be09b6735b54522bddd93735908964695deff2c860fc97,2024-11-21T05:40:15.980000 CVE-2020-9248,0,0,ee33905a6909922672d133638d4f88fefda98b796c92d89c724a8a31cb509edb,2024-11-21T05:40:16.183000 CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b514865c,2024-11-21T05:40:16.320000 -CVE-2020-9250,0,1,7cd2c77402db68aa8cdd8880bcab0f27e8ae1115c47de8f1412e758074f2e474,2024-12-20T18:15:23.860000 +CVE-2020-9250,0,0,7cd2c77402db68aa8cdd8880bcab0f27e8ae1115c47de8f1412e758074f2e474,2024-12-20T18:15:23.860000 CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000 CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000 CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000 @@ -200172,7 +200172,7 @@ CVE-2022-32140,0,0,7a9c3b5e767b67e01c6a2a9bb3acc04d7cf1de810331770e75aa5c4a5208d CVE-2022-32141,0,0,16a67640dfbaae67e72809580d9e4e423033b75e86aa578c1911d7e92b1f7da1,2024-11-21T07:05:49.833000 CVE-2022-32142,0,0,979b129644cf56e0bea6e344238189966dd5be67873e008b080fae6175a4d135,2024-11-21T07:05:50 CVE-2022-32143,0,0,c52290a030e5a93484ef3cd8a1b6ccb290011b10331e4624cf902dca35a033dd,2024-11-21T07:05:50.140000 -CVE-2022-32144,0,1,559fb453583b115c15727357a171f240a22be43bda45b367081d3b57b2faea92,2024-12-20T18:15:25.070000 +CVE-2022-32144,0,0,559fb453583b115c15727357a171f240a22be43bda45b367081d3b57b2faea92,2024-12-20T18:15:25.070000 CVE-2022-32145,0,0,ad1c76462e7f77bf1e239e6a5bdcff318df7aae4fb302ac91733071f4fed7172,2024-11-21T07:05:50.277000 CVE-2022-32147,0,0,a2264fd8bcc7d6a0a5e02480b2de1eb82ec9c14ea909f7a9a18a929ccf930bdc,2024-07-02T17:15:03.273000 CVE-2022-32148,0,0,813429af96ec1d6c841eab58ceae185de144d2d98afeb3672c42b661bc4444ec,2024-11-21T07:05:50.420000 @@ -221252,7 +221252,7 @@ CVE-2023-27580,0,0,ca309ac422ad7631a6fc9151a3e05bd1219f8185792d3e2659ddb4a5cd2ed CVE-2023-27581,0,0,129e1df9d109fb2f48c0b8a532c3f5128cc457ae8e32a5d42b1339d5d1074a44,2024-11-21T07:53:11.620000 CVE-2023-27582,0,0,afceac12a52332053d33b64867bf18bdd849044dcbdd304d2888552b5f38fbee,2024-11-21T07:53:11.747000 CVE-2023-27583,0,0,b4138745d92d913f9bd847765dca70d372f64fa0d564b7930b96f12a375b8770,2024-11-21T07:53:11.873000 -CVE-2023-27584,0,0,1fa84ed8f9872eb0a865dcdfc06df401050ec2461e31a6f8f6a11ce9947114dd,2024-09-25T17:28:33.473000 +CVE-2023-27584,0,1,2f4e6127971db64e503d212fe043a1763367934aa10772ae8efa7c4bb921ff9e,2024-12-20T19:11:43.870000 CVE-2023-27585,0,0,02615d4fd69d4f58c142df18ec3244d3e7df0ca0ab4c0aaec6d35f25950dcbcf,2024-11-21T07:53:12.153000 CVE-2023-27586,0,0,d231bd999d5c30188900cb5d123707935a30c579814d0f4102e0a05f858756b7,2024-11-21T07:53:12.313000 CVE-2023-27587,0,0,7fbb2ae90df9becdf8fa0d57118e2edba744e2b6aaf5c4d4fe3b28a0b498ce91,2024-11-21T07:53:12.450000 @@ -222403,7 +222403,7 @@ CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590 CVE-2023-28821,0,0,3b23d992637d21ecb74fbbedbe80ce17d8ac3cda960cc9ac7ffb7824e8f934ee,2024-11-21T07:56:04.903000 CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000 CVE-2023-28824,0,0,4717652e7a590f17e3eab8927d56f9e19eb6043995d6fc66b15276d9d0ffb1e3,2024-11-21T07:56:05.187000 -CVE-2023-28826,0,1,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000 +CVE-2023-28826,0,0,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000 CVE-2023-28827,0,0,3ac013fe742eba004aa8f5d9fa84d4e0755b6248eb930477c2f597bc870b283a,2024-09-10T12:09:50.377000 CVE-2023-28828,0,0,c8219201f8c82577f62c395dc963be0ff5d9ef990f6cd114e19b9adaad0853b6,2024-11-21T07:56:06.030000 CVE-2023-28829,0,0,5f3fb9e83e6bf580b695944554c6fe1959e6a17c65d5fb240077ff50f4fa6f71,2024-11-21T07:56:06.343000 @@ -225097,7 +225097,7 @@ CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0 CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000 CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000 CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000 -CVE-2023-32435,0,1,b24e4897a2c883a2a3bff9c9b95c8b141476683de935eb975ffe17049376ebc2,2024-12-20T17:49:17.260000 +CVE-2023-32435,0,0,b24e4897a2c883a2a3bff9c9b95c8b141476683de935eb975ffe17049376ebc2,2024-12-20T17:49:17.260000 CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000 CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000 CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000 @@ -226433,7 +226433,7 @@ CVE-2023-34044,0,0,3bf28b57945e4607832313832c430b5fb65d46c8cbcb1b8c59e2ef93d00c2 CVE-2023-34045,0,0,9afcb32c5fdcdba7cbe76a7ff218499970f2930b8d17957abe1c8d9b083dd9fc,2024-11-21T08:06:27.963000 CVE-2023-34046,0,0,de891463245ea21540153bc628af3db12039aef90cd1a7c40b786c28c66e1664,2024-11-21T08:06:28.073000 CVE-2023-34047,0,0,dd1f3437471679f84d2ca3801d99b633bfb46f8ada57f190be29b0047bbb4703,2024-11-21T08:06:28.197000 -CVE-2023-34048,0,1,a09a38ad92177cb9499aa586b4ef8a5454912e55285ba5f6e04b61a5b71f301c,2024-12-20T17:41:40.150000 +CVE-2023-34048,0,0,a09a38ad92177cb9499aa586b4ef8a5454912e55285ba5f6e04b61a5b71f301c,2024-12-20T17:41:40.150000 CVE-2023-34049,0,0,556fbd76481a221eded8913f53484bd89e12180b483d52729343cbc1abb822ef,2024-11-15T13:58:08.913000 CVE-2023-3405,0,0,0acd5e423ace6877554e6af02437f7ad9780bc7bad91a698cacc1d70c30ab7ad,2024-11-21T08:17:11.903000 CVE-2023-34050,0,0,f746d338a5331d03f2052be91639c9b0334e4efc4d94f21d850928b62ea58299,2024-11-21T08:06:28.600000 @@ -226746,7 +226746,7 @@ CVE-2023-34358,0,0,92769c460eef9ee3d564450488411233fb3d0da75dee4d12b3afc7c7c5e8a CVE-2023-34359,0,0,7ecc56b0c12976fcb35ee302f0bcf60c8817191ebae574a86b814408229bd754,2024-11-21T08:07:05.620000 CVE-2023-3436,0,0,227d61f366fe1850fe1406700366dafd7937f8fe1e6fcfe508e304f713db46c8,2024-11-21T08:17:15.853000 CVE-2023-34360,0,0,e404dc026effd5b416e5c9290ae32165a3c0adced025385ca63db5abb01b8767,2024-11-21T08:07:05.733000 -CVE-2023-34362,0,1,89b1c2fc079de792e24c4e273f6840a769719bf19e59503a7a61ca7fe478c7d1,2024-12-20T17:49:01.637000 +CVE-2023-34362,0,0,89b1c2fc079de792e24c4e273f6840a769719bf19e59503a7a61ca7fe478c7d1,2024-12-20T17:49:01.637000 CVE-2023-34363,0,0,dbe01f4420c184b613f6132366b66a6f4c936030470aba7a440f08c87e69fe93,2024-11-21T08:07:06.067000 CVE-2023-34364,0,0,4267b31fff211a0295f4224cdf6955b09165b33da23b38c3e5e0770eab41e5ca,2024-11-21T08:07:06.197000 CVE-2023-34365,0,0,03eacff15cc6c3f35f845ba674e0740023198e8082f506d31bf9c9c88694f107,2024-11-21T08:07:06.330000 @@ -227155,10 +227155,10 @@ CVE-2023-35073,0,0,91676ef9234413c20056267f1b23f3fc91186085c28bf58d620ac435fb946 CVE-2023-35074,0,0,adba0e1b83d37e03fc957804d89482b802c40631fb93a2cdcda238f9d2dff867,2024-11-21T08:07:55.583000 CVE-2023-35075,0,0,2953da8da78e493f198bf6289dbc7e5d7641503e5404893e569d48f28539525c,2024-11-21T08:07:55.753000 CVE-2023-35077,0,0,eb14aac67890fa8d1fe987a9cb034d5f686d957f0f0145aaa057938b78feea0d,2024-11-21T08:07:55.893000 -CVE-2023-35078,0,1,69d2e841e784de3c352f697667efb6f6e32442f0e8ec9915f09caa28ab2c2b2f,2024-12-20T17:50:19.417000 +CVE-2023-35078,0,0,69d2e841e784de3c352f697667efb6f6e32442f0e8ec9915f09caa28ab2c2b2f,2024-12-20T17:50:19.417000 CVE-2023-3508,0,0,395b7f87ebc096b9954e0550c1d2fe07fbb8e45e4a9326e080b172d48d631a2f,2024-11-21T08:17:25.110000 CVE-2023-35080,0,0,6a6e892a44ab82355b0a0d2a7b8c1b659f457b02b6dbfe75c067e5b09fb17c02,2024-11-21T08:07:56.180000 -CVE-2023-35081,0,0,67f6fd2d7e5ef74353cb7a8ab5dd29941445538b161d320bb21d322646ce0ce4,2024-11-21T08:07:56.303000 +CVE-2023-35081,0,1,5186df070fbae81b33a245da3945d68ed20ffe05aa7c697d3133c74dca6a0832,2024-12-20T19:13:39.710000 CVE-2023-35082,0,0,64c73f638e1ea99aacc9e05831393e5321e046dd5fe66c9b148b62b40084d1dd,2024-11-21T08:07:56.430000 CVE-2023-35083,0,0,1cd4bcca5b9cfa70eed0cf37488fa381a5e331ebd127c18204dc83e903d1af15,2024-11-21T08:07:56.550000 CVE-2023-35084,0,0,b2efe09996f07357bc7d819aec8a5a2598d18e9237d1c1340d928f47c5b4eb07,2024-11-21T08:07:56.673000 @@ -227439,7 +227439,7 @@ CVE-2023-3567,0,0,5a1746b855d22f3bc6770c426b1bc9a187c738d6a1c14eeb7ccfd2f336b03c CVE-2023-35670,0,0,38494d55df7fcb1cd50e396b84188fbbbbb79aeb1bb20c46d39f680826b3fe15,2024-11-21T08:08:28.667000 CVE-2023-35671,0,0,2c8339e5588b591eed92ded4f828b3d05b1e6303493784f34dbc335b2b14a7e7,2024-11-21T08:08:28.797000 CVE-2023-35673,0,0,8def3629a98a95d2af28794c62a9db710c67f5ee2b495d5869075b9e4f1d720e,2024-11-21T08:08:28.923000 -CVE-2023-35674,0,1,a1022b87b8618552c684113a438b1c94efe6e352c747b4eb316fd9df24c62f28,2024-12-20T17:39:49.327000 +CVE-2023-35674,0,0,a1022b87b8618552c684113a438b1c94efe6e352c747b4eb316fd9df24c62f28,2024-12-20T17:39:49.327000 CVE-2023-35675,0,0,4f3461109a5f32ac0262e94d301fd6c4248144a6d513d16b13cdd315ad00446f,2024-11-21T08:08:29.187000 CVE-2023-35676,0,0,52eba2204d685162de4e8dd545bda62b1652967ee875489ff2421fc06fe9685c,2024-11-21T08:08:29.303000 CVE-2023-35677,0,0,b495dd7d2a9f1baab9298ddda35590e4064f7b554ba2738eb2dd1d976ba83e6d,2024-11-21T08:08:29.460000 @@ -229301,7 +229301,7 @@ CVE-2023-38031,0,0,43c38460745214330163d80b63c522d22fbd2236198aabb87c696f44f3f43 CVE-2023-38032,0,0,aa2f8b2079aab5d644970a30e48ac48eb85abbd522684fe17754100401e0e906,2024-11-21T08:12:42.833000 CVE-2023-38033,0,0,4be9698fa9dd0cacdb62bf1057bd9da305a437591f9194cf06d595e16802d334,2024-11-21T08:12:42.970000 CVE-2023-38034,0,0,081598c8b55d3aa43e7d310ebcf31b7ec47c08b5aae01d60a9f9e55b7cdb47cc,2024-11-21T08:12:43.107000 -CVE-2023-38035,0,1,92640fff4395ac24e8d5c20e07c44ab0e97351ee018b5491f08a52b994403d7f,2024-12-20T17:50:25.653000 +CVE-2023-38035,0,0,92640fff4395ac24e8d5c20e07c44ab0e97351ee018b5491f08a52b994403d7f,2024-12-20T17:50:25.653000 CVE-2023-38039,0,0,aa7b561d4c683a5cad232ce980133262e25984154771669a007453da54145604,2024-11-21T08:12:43.457000 CVE-2023-3804,0,0,f82e32f2db1263f9331724638e062f3a20087ab485797bbd9380b32670e68adc,2024-11-21T08:18:06.293000 CVE-2023-38040,0,0,50ded9b2062da33f47fa19ba0f8f6125ce0832d2b933587cab7df27c962ee968,2024-11-21T08:12:43.633000 @@ -230025,7 +230025,7 @@ CVE-2023-38827,0,0,15d6e2facfb6109aa5168ffa504a04d99bba843862c4ade896b7f160a2676 CVE-2023-38829,0,0,f18a04dc8235c21595d960d1c76e0c18e8aba026cbaca717e8d078afcc182e76,2024-11-21T08:14:14.883000 CVE-2023-3883,0,0,634cd7fd7d0f5ced6fd868d96b8d577b8d6108800b9ae362b62f8ad754505ea9,2024-11-21T08:18:17.027000 CVE-2023-38830,0,0,3aba0baa36880c42a16b45890d05f8d90c8dca065e6857a99618f2043633059a,2024-11-21T08:14:15.030000 -CVE-2023-38831,0,1,96b48b8190e42a2009e991c600c7fa606e5535a7306c5b4858bcffb9732d651c,2024-12-20T17:50:59.707000 +CVE-2023-38831,0,0,96b48b8190e42a2009e991c600c7fa606e5535a7306c5b4858bcffb9732d651c,2024-12-20T17:50:59.707000 CVE-2023-38836,0,0,c8d0b5eac064ddc2c8e21f03dec759378f4cbdab9f9e1b20532fde2c7d907105,2024-11-21T08:14:15.507000 CVE-2023-38838,0,0,03c3c86b6e2de6d7d4d05ce29ccc32c5a9c18e145373614ddd257b6ba8aa6b15,2024-11-21T08:14:15.650000 CVE-2023-38839,0,0,96961603879de812e272be97e578ad3139d610fe00ac937b20675102efbc4ee5,2024-11-21T08:14:15.807000 @@ -233373,7 +233373,7 @@ CVE-2023-43203,0,0,c5f43f330a0aa47742da601ce3685bd755f7f7d9ab6ebb64781eb13ff1399 CVE-2023-43204,0,0,405e036bb3184a7a179a9c4f21ed6c5f9f1635df31afbf5874dc0d62b27b1663,2024-11-21T08:23:49.803000 CVE-2023-43206,0,0,91374bcbd7fa94046c0e01ed4ab2af8ccb38a6185b4d6cce69be85defa8f3e40,2024-11-21T08:23:50.030000 CVE-2023-43207,0,0,73bef3fa73b1104259ad40cd7fc06db4d20cce747ffc2532e824570b3f5f0958,2024-11-21T08:23:50.253000 -CVE-2023-43208,0,1,10ff2c3fa5ebbc08b8c1f48bbaddae7b36de320bf7570650b531f3d7a92ff431,2024-12-20T17:41:47.143000 +CVE-2023-43208,0,0,10ff2c3fa5ebbc08b8c1f48bbaddae7b36de320bf7570650b531f3d7a92ff431,2024-12-20T17:41:47.143000 CVE-2023-4321,0,0,085e1cbb7abaeb38d420ac3b379575bc4b47d6929c3ff2b92bda924e6306d7c8,2024-11-21T08:34:51.040000 CVE-2023-43216,0,0,36f34093c9a1885a067dfd71b90fec85477364023b8581b3e15ae8b97b27ff81,2024-11-21T08:23:50.697000 CVE-2023-4322,0,0,1532a8b57387d09ae4c94e72d6fbfa510e33b1660215708f14716f6493a97a7a,2024-11-21T08:34:51.173000 @@ -233751,7 +233751,7 @@ CVE-2023-43766,0,0,1874f5bb733291888446fa8e6899fc86b101332f133975cc5c47954254b77 CVE-2023-43767,0,0,71262d6ff27787aa37a9ccff291ff315f630e05676576edeb71c5c04a91a7cf7,2024-11-21T08:24:44.860000 CVE-2023-43768,0,0,f5e6b86fff28d5fbf8ecd9b88f177624082dded6d31ce2200cd91661bd8d2363,2024-11-21T08:24:45.010000 CVE-2023-43769,0,0,06fad532324f780795fc45bdf702308c094ad389cb30e104252dc441d2a47598,2024-11-25T22:15:09.587000 -CVE-2023-43770,0,1,cdff146a566e12a04d6a3f422def399e9bda5cf5176e2678a567e58ef2db315b,2024-12-20T17:40:26.160000 +CVE-2023-43770,0,0,cdff146a566e12a04d6a3f422def399e9bda5cf5176e2678a567e58ef2db315b,2024-12-20T17:40:26.160000 CVE-2023-43771,0,0,6eb1f0ca5129e4601acf0473c7b9e92e5cddadc9a4e24dc03aed5645d8b80a26,2024-11-21T08:24:45.577000 CVE-2023-43775,0,0,54c6bf3cb2bdce0279ba011963bbb56a47cfae73d52d4b60331f30063fd846a0,2024-11-21T08:24:45.740000 CVE-2023-43776,0,0,a58bc7087928b87d9fbee013f66a621afc7de5495a408df840e5196428d5765b,2024-11-21T08:24:45.880000 @@ -234339,7 +234339,7 @@ CVE-2023-44483,0,0,5dd1c78b90b34b78bbcb6b7fd4897fa7d75ea11e70843a99524deb9e80e89 CVE-2023-44484,0,0,958fe48df29f816ed7bd34de4dd7057161c9bf53e67f5f88c174e360d7feb40e,2024-11-21T08:25:58.463000 CVE-2023-44485,0,0,1fded516443ed9d4a6dc21d78fcaff9fa6c633a261c62418d91bd847201a9be3,2024-01-02T16:15:11.810000 CVE-2023-44486,0,0,2b43d0a14e9cca4a775d6d63ef007efbe7181ff5204ebf454cdf39ffb38da42b,2024-01-02T16:15:11.897000 -CVE-2023-44487,0,1,3f3c767faf0496ff5190d4944e382f1e1f37cf57070322e8336564f615c4cc14,2024-12-20T17:40:52.067000 +CVE-2023-44487,0,0,3f3c767faf0496ff5190d4944e382f1e1f37cf57070322e8336564f615c4cc14,2024-12-20T17:40:52.067000 CVE-2023-44488,0,0,6d016cc36e101208382fa39cc61bf9a8f9d2e9bfb34d377a1cb64850fe49c283,2024-11-21T08:25:59.403000 CVE-2023-4449,0,0,e25bc1172bad64592332d0ff2b60d985ca8bf0443f05933c4051807b205fefa8,2024-11-21T08:35:10.950000 CVE-2023-4450,0,0,27f28416722497acefc6891c18ba2d3c7e85c5ed65b35fd7cdcbec298d72b3e3,2024-11-21T08:35:11.120000 @@ -235100,7 +235100,7 @@ CVE-2023-4585,0,0,2817f87c145f4e19f7fb5b2f9ef5a25943420aac1ebc75d64154fa2f4d3483 CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000 CVE-2023-45851,0,0,80fecaa08aabec651bd5f96bf43e5fb5bd05b25992d4a84aa45b313799793c98,2024-11-21T08:27:28.970000 CVE-2023-45852,0,0,e8be8e4d9b05dc3db2a9206b56fbc6a33ca64656c15b611b5c4f687a4307864b,2024-11-21T08:27:29.100000 -CVE-2023-45853,0,1,7aaa23a31605eca8fd5429fd54fe524527069595801d4d1b7b9603a041cf83c5,2024-12-20T17:41:31.237000 +CVE-2023-45853,0,0,7aaa23a31605eca8fd5429fd54fe524527069595801d4d1b7b9603a041cf83c5,2024-12-20T17:41:31.237000 CVE-2023-45854,0,0,9e1ae49a3d09e0271586bdb5cd557f4081b569b806359ca87be8e5f489faf4e8,2024-09-20T12:31:20.110000 CVE-2023-45855,0,0,0e092d0c08023f857ef2f3fd91a438ae0f6fd2ed5dc944c9aebe403789ff7d34,2024-11-21T08:27:29.720000 CVE-2023-45856,0,0,320cc0e1ee595773e36ebdcb0c1183ce0bb27bf06d83c4ba43ad9943e9532936,2024-11-21T08:27:29.880000 @@ -236158,7 +236158,7 @@ CVE-2023-47242,0,0,16bd3d3d64cacd173b0167cd7f982783fdb69c0a81e914a2606e4716b69f1 CVE-2023-47243,0,0,30340c6d26e19c59b5978c6e1842ea9075173064b605307a556387765c45d03a,2024-11-21T08:30:01.567000 CVE-2023-47244,0,0,b0ebe338ebe88a1ffec7595b1ee713231f6705784898ca7f5320bbbb8ad00dde,2024-11-21T08:30:01.720000 CVE-2023-47245,0,0,2e557a8574ffa27f286ddb7902bb72def87b3076cdcb7c1d4a5fe3c9fb82458d,2024-11-21T08:30:01.863000 -CVE-2023-47246,0,1,9ee048611e335d6ef5ca354dafc13239e090cf221f5c631602637916b05657fe,2024-12-20T17:20:48.827000 +CVE-2023-47246,0,0,9ee048611e335d6ef5ca354dafc13239e090cf221f5c631602637916b05657fe,2024-12-20T17:20:48.827000 CVE-2023-47247,0,0,6c0bd6cea993b04ace26b90d46ca9971934088213c7deda52a3ee268f6eb9ab3,2024-11-21T08:30:02.280000 CVE-2023-47248,0,0,ed273fbca0d5159bad81a6f7cbac186f7fdfb1fc723f57ebc3d6ff8172313a41,2024-11-21T08:30:02.447000 CVE-2023-47249,0,0,2c7a90e1d2da420678c292eab4af2a2635e465b566848812fbd6cbfede631d2b,2024-11-21T08:30:02.607000 @@ -236382,7 +236382,7 @@ CVE-2023-47616,0,0,b5400301c64d171fb648dd698eb7425d28632d9552e51579aec7970e72fd4 CVE-2023-47617,0,0,c671c14a0e35b7e4b7fcfe6f14521083ede774c2455bf38cd99f02889187d000,2024-11-21T08:30:32.133000 CVE-2023-47618,0,0,995acf587b8f482982ceb508d0e8791ce489e4efaecdd9f89351fb78dc19827e,2024-11-21T08:30:32.277000 CVE-2023-47619,0,0,9d2d3dc38a4dbac2e143f5e95629f63355e9767bb2787ad4114261262b6ba5f4,2024-11-21T08:30:32.397000 -CVE-2023-4762,0,1,7da8162cdaa41009455186cf8b19e27140a727d3d3fe41ffe8a6b959aa6fd124,2024-12-20T18:21:05.033000 +CVE-2023-4762,0,0,7da8162cdaa41009455186cf8b19e27140a727d3d3fe41ffe8a6b959aa6fd124,2024-12-20T18:21:05.033000 CVE-2023-47620,0,0,61bd2331ab391dfd7e97480167dc460b036db6150b0cefe01ddae2f6ded2a0f3,2024-11-21T08:30:32.550000 CVE-2023-47621,0,0,21cf5296251eccb402f361f641b2582b10c147d58de1ac4c2ade388e61a75375,2024-11-21T08:30:32.687000 CVE-2023-47622,0,0,f7c70ead952a5530a68be1db20b722e26c969ff836e3ef37efb5417689bca4f1,2024-11-21T08:30:32.830000 @@ -237179,7 +237179,7 @@ CVE-2023-48626,0,0,2af153aa2d12e8bccbdcc3121e06d29ce06f8c611c78f3430bad9a335ad97 CVE-2023-48627,0,0,79a71ad4dd8c25d41f759d2ac0f7a7ff291cbf6f42b61906743acd6cdf3ca4c2,2024-11-21T08:32:08.093000 CVE-2023-48628,0,0,9d5070980366879f7378b90806bf1c27afee4829d2fc3740328643d68bf53451,2024-11-21T08:32:08.223000 CVE-2023-48629,0,0,3a4540b0c500bb6b13df10b315420e93bbca61d5e1ac06cc30182579f8c5e35d,2024-11-21T08:32:08.353000 -CVE-2023-4863,0,0,ca78fc3c4c81663f330e9cca76642ee53ae90af7190059fff4d7eb7984fd01fb,2024-11-21T08:36:08.120000 +CVE-2023-4863,0,1,2a53abbac75949bf63e5c95c658a9b8754e230474394da72a1ba4f28e8539e56,2024-12-20T19:00:21.050000 CVE-2023-48630,0,0,323d466f78d66dde44369783936a935f801ed95b754aca894e70232a0011de21,2024-11-21T08:32:08.480000 CVE-2023-48631,0,0,5fc9ca6467e10ad9aee2039a339f1a64d3a2a8e2106834788969c7d345e5579e,2024-11-21T08:32:08.637000 CVE-2023-48632,0,0,6eb8c9a4a6fed16fcf4c60479b30c8f448167a4778b02eb7c40fd752478da1cb,2024-11-21T08:32:08.773000 @@ -237517,7 +237517,7 @@ CVE-2023-4910,0,0,d9462c36fb722b682c764276e6fcf32ffb6c6c77a4823140352ddfdc8e5d36 CVE-2023-49100,0,0,14b827de72c6f2476cae991faf762a7c0ebf71e1c78301f5cd1c6800f5f2cb87,2024-11-21T08:32:49.403000 CVE-2023-49101,0,0,dd10c9d64d2f38b78c445873ccd7284113d1dae289617a767413e999aeb421d9,2024-11-21T08:32:49.620000 CVE-2023-49102,0,0,7720153c7a021899a76b16646f6f7971df2f17668e8e3ccae3b3684f9743b90f,2024-11-21T08:32:49.773000 -CVE-2023-49103,0,1,3f33d839b382b0e2219cb7c3a407cb478ab76b5d8ff92fd036b0c64d9a39ce79,2024-12-20T17:26:50.947000 +CVE-2023-49103,0,0,3f33d839b382b0e2219cb7c3a407cb478ab76b5d8ff92fd036b0c64d9a39ce79,2024-12-20T17:26:50.947000 CVE-2023-49104,0,0,88e52f0db8231bfb716b52deb4721e9ff67988071fdbfbbe2cc30e8e20268781,2024-11-21T08:32:50.100000 CVE-2023-49105,0,0,57ea19ba2757cb0204c2ecac3a330f28472b520b37e1e16a099f8ba9ee500a97,2024-11-21T08:32:50.267000 CVE-2023-49106,0,0,af1d530882fae69f2f5601e08d91b3477b2e86275ef0f5d38e8ffbb551764592,2024-11-21T08:32:50.420000 @@ -239594,7 +239594,7 @@ CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c8 CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000 CVE-2023-52168,0,0,c7cd793d041918ccc6f2175c08a72a3489a14e0bb9eacde53b0b8fd2753e8f0d,2024-11-21T08:39:19.110000 CVE-2023-52169,0,0,9be3070ec5123d1f488bab859fcd5265610f3d610a72d91e6cf96799be93bcbb,2024-11-21T17:15:07.820000 -CVE-2023-5217,0,0,c061355adb64e6ce8caebcca7fc27ced893f361c6ef0faf00994e37c62bc8723,2024-11-21T08:41:18.923000 +CVE-2023-5217,0,1,a23e352bd9b23a72748039bab84a9e1cc678d04587ba48d3cc49f775e2a2b4b5,2024-12-20T19:01:23.347000 CVE-2023-52173,0,0,ed376452139780a426e6fb1f246c87d0fc83b96168283628454105d358c3da2f,2024-11-21T08:39:19.490000 CVE-2023-52174,0,0,cddc1bb33013f601d307d8cfe53781cf69c2773c9e4269917e19651a324e2d2a,2024-11-21T08:39:19.660000 CVE-2023-52175,0,0,9ea7be8febb1e639e6a626e1a8f3065c69288fe48574a14ecc524f01efa6bee8,2024-11-21T08:39:19.813000 @@ -241315,7 +241315,7 @@ CVE-2023-6341,0,0,8ecd43f865afd7caa5344b8fe17a3ea7a3522641beb80a8a947afe15992d37 CVE-2023-6342,0,0,2b3c455968258ed34c39ebb191327647c90e3e84685f08ccc9f067b0934df2c8,2024-11-21T08:43:39.507000 CVE-2023-6343,0,0,ed6f2c610ee4698d428e1242bb3c9253625355d55d76cd1ea75478ff32cde2fe,2024-11-21T08:43:39.670000 CVE-2023-6344,0,0,b19585bc4f92d839c4c31e3142088ddaef3492c596de4a6ec59addd057cb77ed,2024-11-21T08:43:39.823000 -CVE-2023-6345,0,0,0d59667fe6f8cf059f06e615e9be1086c56b6e0c1c89a94acf35d5b45916857f,2024-11-21T08:43:39.980000 +CVE-2023-6345,0,1,9e61a60b51254ea9d792ed1e2112a7d7a8c61ca5d58a313503e137332acfee5a,2024-12-20T19:00:58.223000 CVE-2023-6346,0,0,69b9fa64118162df8c1ca3fabc04a7b924c72ea3fba2eb0b4d4a970f8597bdb2,2024-11-21T08:43:40.143000 CVE-2023-6347,0,0,b705c1c6a4a54e8880ddce8ea8d2a41c6f19a7013e8b35f73dde8f1f7fd7e6d5,2024-11-21T08:43:40.283000 CVE-2023-6348,0,0,0f7379de56995dc0b0c187185cf9e3fc0fabaf4d795f78271a10ca073a7614ff,2024-11-21T08:43:40.500000 @@ -241890,7 +241890,7 @@ CVE-2023-6999,0,0,20badeb2c238d441cb421c48ace480ea27b8151e674b990be35a0786113f4d CVE-2023-7002,0,0,84396c0bdf73e170d66b798921a49a9f0a13dde1ac20a4cf4c9ca68c4bd2e87e,2024-11-21T08:45:00.317000 CVE-2023-7003,0,0,090dbcb22a27ae8d1249b5396e7cb61a556fd7edf17cf3f654f7795066af7307,2024-11-21T08:45:00.443000 CVE-2023-7004,0,0,2b0a1c3f594514067c80c828d3cdf50833ef4cd40d9bad21bf097cc6e6910593,2024-11-21T08:45:00.633000 -CVE-2023-7005,0,1,0d8f11c042b16ba2828314b032db06ee679fd72e36b1ca79c0dd5903b653acfb,2024-12-20T18:15:25.777000 +CVE-2023-7005,0,0,0d8f11c042b16ba2828314b032db06ee679fd72e36b1ca79c0dd5903b653acfb,2024-12-20T18:15:25.777000 CVE-2023-7006,0,0,4ed87f24fa2ac772a2f7b727b0e300912c42583637b6187ad692e5891d6c6604,2024-11-21T08:45:00.817000 CVE-2023-7007,0,0,f5e78178645c6c2c5f772707ce2e5c5b75e98e2d2f30a88b209671633b387a46,2024-11-21T08:45:00.997000 CVE-2023-7008,0,0,8f61c119937be8edfdf7101f886737120021ea2a8349db9b1b71fa74e2a2c59a,2024-11-22T12:15:17.590000 @@ -241909,11 +241909,11 @@ CVE-2023-7020,0,0,197fd2fa8d1d4a18a6a4294ec49a94d748ef7ab3b8641e1f8788b50c52350f CVE-2023-7021,0,0,c90f0d59c2315eb60681259fead187f0526d5fbf18a87677fa680c04abf0c8f3,2024-11-21T08:45:03.430000 CVE-2023-7022,0,0,856fd34983e00eb10af7bbfa2b247782306c3cd9e203e98bbb5f4bce3117af9c,2024-11-21T08:45:03.637000 CVE-2023-7023,0,0,4e802c403a190e5bf3fbdeb4ce4568b9f0ede0742b2ccbd390feda6a6eb357cf,2024-11-21T08:45:03.803000 -CVE-2023-7024,0,0,abeb3aab8359d22a337cdedf9d5c4ebd00b5262ad1773eaab5e6fe23e1d2a72c,2024-11-21T08:45:03.953000 +CVE-2023-7024,0,1,a170fdf780e8fefcbcfa8b8fbdd2e1fcc20a297924bc4aceec4d585f25d7aa51,2024-12-20T19:01:40.967000 CVE-2023-7025,0,0,145c0a7dc7eb75d64af8eb05c1d2d3dac33609c0032da4138aea95c3c490716a,2024-11-21T08:45:04.097000 CVE-2023-7026,0,0,98716ce8e87964958034bedfc875bd5c13b34d49f4803350e191e9f77d9640fe,2024-11-21T08:45:04.243000 CVE-2023-7027,0,0,1831de41a592a60eace373737109c08997b01ea4f32d34c6623fc7de027bd240,2024-11-21T08:45:04.383000 -CVE-2023-7028,0,0,283fb30817c3684eef1c65a9478daf23399f0ecef5eb85ad9eb29138ba49c227,2024-11-21T08:45:04.543000 +CVE-2023-7028,0,1,4ee0dcdbbfe45dca7e9e071dfda5a138bdc4c7e45dce780cf8604fa2c66fea59,2024-12-20T19:05:19.913000 CVE-2023-7029,0,0,ff4956ed28d25d29eca37970978058cc4c79d9b58f07982222e98f39c0eebb14,2024-11-21T08:45:04.710000 CVE-2023-7030,0,0,3c0e7e678cd5c617b5ce9677e1be89fed25cef8cbc989aad9df6d54a4663d59b,2024-11-21T08:45:04.850000 CVE-2023-7031,0,0,d56d1f243e4bd6c87e3002c4501e9fe5a78b6fc19e814625316adbaf20b3903f,2024-11-21T08:45:04.987000 @@ -242604,7 +242604,7 @@ CVE-2024-0515,0,0,38f1985b1a73900e82db865da5163417edaf0cf31c416ed8d2d94cf6fd077f CVE-2024-0516,0,0,34c976a113181e0df972bc81849a026287cf60ffe82c84642618b57781225ca1,2024-11-21T08:46:46.267000 CVE-2024-0517,0,0,c1d84921536d4f403fc308e0f21ef3e39772e61110c1ffc32ce08f0c2aac5138,2024-11-21T08:46:46.377000 CVE-2024-0518,0,0,978d463e9f50d6258d652fd532f338a779dabff722688c763fb03b911a937830,2024-11-21T08:46:46.510000 -CVE-2024-0519,0,0,7f50d7d191dcf4c85ecbd9b79c7fa05f4845b26b1b820081750642f437809b3b,2024-11-21T08:46:46.713000 +CVE-2024-0519,0,1,a6f73d962989f91484a755efd5ea0cc921464529c4019e1d89ca623170d61071,2024-12-20T19:01:11 CVE-2024-0520,0,0,d37bfae4fa7730b3a9cc06aeb5dcf086647e8ff4fbdf6452750670f89cfc933b,2024-11-21T08:46:46.930000 CVE-2024-0521,0,0,ada535247a66a7fb7cb9ec661f0e25731c911495de455595c600fc14643d32ef,2024-11-21T08:46:47.080000 CVE-2024-0522,0,0,e2cb5be42a35d4857398be65857a2974ff345e96f760453ff37c283f404797d9,2024-11-21T08:46:47.210000 @@ -243509,7 +243509,7 @@ CVE-2024-10547,0,0,b023c976bb6d488185fa01d9371074d053ec54a35f2b498daa31d6bb09884 CVE-2024-10548,0,0,387eea2f214d486d1c28afc0bdd6a3cbda871b2748526e8919d00671b70f55b1,2024-12-19T02:15:22.420000 CVE-2024-1055,0,0,399a6bc3324e5a5ab60feee10ef9f668300825e29ef0f6a3f63048abb22d1f67,2024-11-21T08:49:41.683000 CVE-2024-10551,0,0,399c3b50116ab12fecb385939dfbc291c08c34ee1143fded03cc056aa8d168fc,2024-12-06T16:15:20.160000 -CVE-2024-10555,0,1,597076a34b07f960c51e6abf9f2e54d44ce2f6716a3d1121eef23cff8900bb44,2024-12-20T17:15:07.037000 +CVE-2024-10555,0,0,597076a34b07f960c51e6abf9f2e54d44ce2f6716a3d1121eef23cff8900bb44,2024-12-20T17:15:07.037000 CVE-2024-10556,0,0,718a43e4ad6bf4f3f07d592398a4916e1e5afe3b7fda2ab7a1b90e0c73118264,2024-11-01T20:51:35.617000 CVE-2024-10557,0,0,e65f5d89b91c24f295e5cbd0f813e2ad8ed04df13cf96a919800b770566f37fc,2024-11-01T20:48:56.980000 CVE-2024-10559,0,0,16e3eab9e781d1e16f0d045b8d1d79bfb09e11f3fa816a22b4936c2b8431f9e3,2024-11-01T20:43:41.070000 @@ -243635,7 +243635,7 @@ CVE-2024-10700,0,0,47463adc515feae701fdd6df43b426f169c9e406b10e3ad8dd4832a0c6070 CVE-2024-10701,0,0,0e6acb5db36bb65b2a9a78f5a1eb22e27b99e8cd35851fc25db7c90c627071bd,2024-11-05T16:52:44.937000 CVE-2024-10702,0,0,3259585053a84cb9e4f20d6c03e98232b3f699485fefb085dfa1033c1b54da99,2024-11-05T16:52:11.193000 CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000 -CVE-2024-10706,0,1,a6197c3513fb437bfb526c424137a60bda332ee0bb647a99bd4a0b818e5fdf22,2024-12-20T17:15:07.260000 +CVE-2024-10706,0,0,a6197c3513fb437bfb526c424137a60bda332ee0bb647a99bd4a0b818e5fdf22,2024-12-20T17:15:07.260000 CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000 CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000 CVE-2024-1071,0,0,511789b6fa5ad5f82a1b86953aeffe2ca3b5c7e6b5a99f94e7636c9edfe8a8b3,2024-11-21T08:49:43.920000 @@ -243960,7 +243960,7 @@ CVE-2024-11103,0,0,525c56d7b3f8fec3123e98bad3867c199a9a90e84f6b6962f9d506a460e46 CVE-2024-11104,0,0,b75d8ded53ff668230e72c743fffcbea02289181c30609ae66856a5e9653031c,2024-11-22T06:15:19.093000 CVE-2024-11106,0,0,4f7fe956431776c4fe3e507a22b518efb5f390b9e8eff5421b62ca54ec32b13a,2024-12-10T11:15:07.030000 CVE-2024-11107,0,0,9acfc58960fd056b26158a4898d3cab204ba2e238bb413c388c6122ce49a79e3,2024-12-10T16:15:22.450000 -CVE-2024-11108,0,1,49880135218020cb99f4c9e4e13ba800c5369506de5ecd61e983da5e460d7cc8,2024-12-20T17:15:07.447000 +CVE-2024-11108,0,0,49880135218020cb99f4c9e4e13ba800c5369506de5ecd61e983da5e460d7cc8,2024-12-20T17:15:07.447000 CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000 CVE-2024-11110,0,0,d490bd60a369a1b46dbdb1050197f0676234294cb261b9f35d39066213c16bbc,2024-11-13T17:01:16.850000 CVE-2024-11111,0,0,da9ee8d75f19a39df28c4985a5537997054eaf20345ca454e34c488f64fe6a62,2024-11-13T17:01:16.850000 @@ -244333,13 +244333,13 @@ CVE-2024-11572,0,0,4bfb3b8a6cb8b5e286abee85be29182a0c2097d6ed456387011257c4ff0df CVE-2024-11573,0,0,a217cd6a5d2c1b9c15a058174aaf74db4c998e67a229e5d62add9fed37c842fd,2024-11-25T18:53:19.637000 CVE-2024-11574,0,0,c0c507d43857d57ee99aa16b84b597bf67d6a714c3740721e43431423a9700d2,2024-11-25T18:53:09.717000 CVE-2024-11575,0,0,5e1acfdb2c1dcb5dcda0fe7dfbf70613b34f2e92ce4befb7a1e3c62571d21e54,2024-11-25T18:52:56.080000 -CVE-2024-11576,0,1,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe759e,2024-12-20T17:36:12.133000 -CVE-2024-11577,0,1,030cc7ceccd9c1f1c0576f6eef9270acaa630d083b3c15257887f33704fc9630,2024-12-20T17:36:00.887000 +CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe759e,2024-12-20T17:36:12.133000 +CVE-2024-11577,0,0,030cc7ceccd9c1f1c0576f6eef9270acaa630d083b3c15257887f33704fc9630,2024-12-20T17:36:00.887000 CVE-2024-11578,0,0,c895c3d24af0012b56055e7687991fd92495e03a408f7600e49689de017772f3,2024-11-22T21:15:16.920000 -CVE-2024-11579,0,1,a092ff7ef536e96be080e898d8d872006835463f8afc1ac75354cd0671a55eda,2024-12-20T17:35:51.253000 +CVE-2024-11579,0,0,a092ff7ef536e96be080e898d8d872006835463f8afc1ac75354cd0671a55eda,2024-12-20T17:35:51.253000 CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000 -CVE-2024-11580,0,1,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 -CVE-2024-11581,0,1,268ccec9c70d91613657530fc8ca66f464b1a739ebb371f3baadda44241001cf,2024-12-20T17:32:03.967000 +CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 +CVE-2024-11581,0,0,268ccec9c70d91613657530fc8ca66f464b1a739ebb371f3baadda44241001cf,2024-12-20T17:32:03.967000 CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000 CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000 CVE-2024-11587,0,0,81baaf77887a06e025fa560b05def938c80026d91eed087e0a42822793b3fe0a,2024-11-22T21:15:27.747000 @@ -244641,7 +244641,7 @@ CVE-2024-11980,0,0,5c195702c3044363783e02640024befa9b8ad56aa6e8902b10c32e122c344 CVE-2024-11981,0,0,4e8c7d73de59078b6dc7a30279d02d329d5e4f81501d91493f618fea96f72189,2024-11-29T07:15:05.760000 CVE-2024-11982,0,0,fdbe1466c75dff41c18009236254b70f07e6dcbf8224b3254ed5447f6369f8be,2024-11-29T08:15:04.580000 CVE-2024-11983,0,0,b28164039b0dc59ec068d9e4704804a0da409a26a86a99d005cfe1af9f1df7bd,2024-11-29T08:15:04.733000 -CVE-2024-11984,0,1,ced44f2e85997433b4a6526be94d84d4444dfd73a39ca7719f03472fe24c16f2,2024-12-20T18:15:26.703000 +CVE-2024-11984,0,0,ced44f2e85997433b4a6526be94d84d4444dfd73a39ca7719f03472fe24c16f2,2024-12-20T18:15:26.703000 CVE-2024-11985,0,0,347bd715be95eb6539997f812c032a6ace7cec9111ea8a772c8788473da7f21d,2024-12-04T02:15:04.237000 CVE-2024-11986,0,0,e3ace666257325f8eafbb0b048032c0cfe2d1f4c40638fcb396e4be31115d6ce,2024-12-13T14:15:21.207000 CVE-2024-1199,0,0,60ffbfb4cdc00bf543d03a59b91efea487f9cf6b0b352d45a15655d219ef20c9,2024-11-21T08:50:01.340000 @@ -244919,7 +244919,7 @@ CVE-2024-12555,0,0,0d42d0c8cac624be8352d225c1fedeed93d78abfe4d84ed9171ab1d4e5a10 CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000 CVE-2024-12560,0,0,59d00c885b51c3e9ef9e4160d8c87472751bc46b43573f63258bdfe4a0067aed,2024-12-19T07:15:13.507000 CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772172,2024-12-12T15:15:12.097000 -CVE-2024-12569,0,1,f066721e86ab0b585b58df0c291535366f5e06bd60d39db2c198664dfbee8e4a,2024-12-20T18:15:27.230000 +CVE-2024-12569,0,0,f066721e86ab0b585b58df0c291535366f5e06bd60d39db2c198664dfbee8e4a,2024-12-20T18:15:27.230000 CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000 CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000 CVE-2024-12571,0,0,64d88bdf40a9886ffb28abd6d1e741e65a8db2fb01deaadc842b0be03349fe2e,2024-12-20T07:15:12.380000 @@ -244969,8 +244969,8 @@ CVE-2024-12669,0,0,cff9f2a304270add667ff179e86a9f065113db2e7e50955c8f0fd086a0592 CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33c4,2024-11-21T08:50:11.937000 CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000 CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000 -CVE-2024-12672,0,1,43f993d04491aa37c8f06809db5261032f93c45461f913438159eb31bb33f5a8,2024-12-20T18:15:27.537000 -CVE-2024-12677,1,1,3507790af505e09c09618fcf8a633379c9f714a2be36a2eca961aed220c8f0a4,2024-12-20T17:15:07.757000 +CVE-2024-12672,0,0,43f993d04491aa37c8f06809db5261032f93c45461f913438159eb31bb33f5a8,2024-12-20T18:15:27.537000 +CVE-2024-12677,0,0,3507790af505e09c09618fcf8a633379c9f714a2be36a2eca961aed220c8f0a4,2024-12-20T17:15:07.757000 CVE-2024-12678,0,0,a99cebbf2382fb3bdb3a5462f20e28cb436198a7494c25805c55135c7b052910,2024-12-20T02:15:05.500000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000 @@ -245018,8 +245018,11 @@ CVE-2024-12831,0,0,6a7b0e5cf4fa71c8e07ed8162e3704e196eca9cba00188a493458902a4427 CVE-2024-12832,0,0,9a101f7d70f0a623c3454123e2a257a4b7f5154c8200a2b8250142a3bbfb4bc4,2024-12-20T01:15:06.793000 CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000 CVE-2024-12840,0,0,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000 +CVE-2024-12841,1,1,ce07921741603bdc97c0ec690662775bbd4f9587340009198702b906e823f20c,2024-12-20T19:15:06.097000 +CVE-2024-12842,1,1,1e1e34a3ba74abd908652a758db38f2c95bc58aa33ed64b66f2060462a73b056,2024-12-20T20:15:21.880000 CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000 CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000 +CVE-2024-12867,1,1,01e49ed64d6e9cd55a7b69c5d48fb82a0f55b6ea873444ea934a92cdc9c1bea1,2024-12-20T20:15:22.740000 CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000 CVE-2024-1288,0,0,395f2de724425f73212a7bc39e91c09ee4289c7b4882341dd1ed370b6c884fd8,2024-11-21T08:50:14.440000 CVE-2024-1289,0,0,e65e8e4dfe8200c9b56fed0852a43d923fc5ad73370ce2516cb730a4df84b5f1,2024-11-21T08:50:14.563000 @@ -247043,7 +247046,7 @@ CVE-2024-21506,0,0,0501aa9e15543c672d3de96d3e8d3d0c1c21afb2e19e663e8d9159c8a48b6 CVE-2024-21507,0,0,978c787aed4f5f5cae3323e00374e35cb6b8afb2c65f7cd7cd3f90660aaf7935,2024-11-21T08:54:34.667000 CVE-2024-21508,0,0,65f59405ac5ea54eeb2611ecfe7a75a7000de244101642174ff20762bc442840,2024-11-21T08:54:34.803000 CVE-2024-21509,0,0,d585b74e0e844576b4e2b9f73925f27db9cb493c849100e2d3e4822b3b63d438,2024-11-21T08:54:34.940000 -CVE-2024-2151,0,0,04d1c6fecc353fb64ac9ecef71f8b639a42ead69580095e0ba0bb326785d1378,2024-11-21T09:09:08.513000 +CVE-2024-2151,0,1,3d8197a9b2f89570eca9a5f5dcba43511b744b8a6e371ac18f768f3fab2065f2,2024-12-20T19:36:52.080000 CVE-2024-21510,0,0,afbc6b2997a2bb573983b14779163d0f3e06e22acc0fbdaaa9ed684a5c819890,2024-11-01T12:57:03.417000 CVE-2024-21511,0,0,182f091c4ed017525e9e580dfda09fcbda72791994ada1f748c50419ad3b52c0,2024-11-21T08:54:35.180000 CVE-2024-21512,0,0,884928f820e984986c4127419b96993a9631f2fdda5161c1e82bb275aa893955,2024-11-21T08:54:35.300000 @@ -247054,7 +247057,7 @@ CVE-2024-21516,0,0,714e9699c666c291731df489c4a4d4b5a6b1153ab3e24d5aaedb2f6409f5c CVE-2024-21517,0,0,71e12b43226e2a3b487e6ff6fb65bd8c154254848a0a34c039dd34c5fa8f3cd6,2024-11-21T08:54:36.063000 CVE-2024-21518,0,0,d147bbbdb00d33e9919b4e00455fd4d118ef1b58e469f947369c25e12ebd2500,2024-11-21T08:54:36.223000 CVE-2024-21519,0,0,847e1cd4eb3a390981cb70fcaa8a9f794d31a430107ae76bd7b814306d528c12,2024-11-21T08:54:36.377000 -CVE-2024-2152,0,0,839b8e2879ac85e7a439107490c861fd3f41a9841ac2112a55c240fc7bef1554,2024-11-21T09:09:08.643000 +CVE-2024-2152,0,1,c1376433b3da8765c2809fe086daca92323bdf8c0d0c7833abccd0e9fbc0df64,2024-12-20T19:37:50.807000 CVE-2024-21520,0,0,9fe0eb627307afa98a7e700e94dd795cf9b826574227036cecd2dad2b9c451d1,2024-11-21T08:54:36.510000 CVE-2024-21521,0,0,dd4dbc6b6caa697a204d1f25a03cccd69d475e8249033ed79cb42c5ca4571633,2024-11-21T08:54:36.637000 CVE-2024-21522,0,0,ab99178ca7bf4d5693b2b017e36fa9c863c7d75c2a02fd0b4b775f31c0f098fa,2024-11-21T08:54:36.760000 @@ -247065,7 +247068,7 @@ CVE-2024-21526,0,0,21c2ec001b71fa277e9eb77378baa42c2688d6d406b47f453a8e4edf65c8c CVE-2024-21527,0,0,8c123627e79cd2e2e9c8cce28b6d17781236242b4098253caa26ce444d603dd9,2024-11-21T08:54:37.400000 CVE-2024-21528,0,0,3d6b20c2a05b5f6afbec19530737344fe4089fa4bd5ec5946a4edf1d9335ec4c,2024-09-10T12:09:50.377000 CVE-2024-21529,0,0,bdba9e510ad0e18a82d6f89d0f259223b0ff5ec36279ac998538b0498afe71f6,2024-09-11T16:26:11.920000 -CVE-2024-2153,0,0,bf68cf51c7a887efb4dcaade05cbfa5aa17a7f89a8fa91b9bd509c7e4f7de64e,2024-11-21T09:09:08.790000 +CVE-2024-2153,0,1,bff967ff4e88f97661d81b3bd943764a60d58db01f8cc9879a383d66d7159ecd,2024-12-20T19:38:05.173000 CVE-2024-21530,0,0,f8ea428c28eeeae44d4bc6f743e1f0c04e37e674d56062c3013deca22778d7bb,2024-10-04T13:50:43.727000 CVE-2024-21531,0,0,71028a5a06f08946d6f1b6d8bea821fdd76bca5a3c17f701ef9bccf4a7c20197,2024-10-04T13:51:25.567000 CVE-2024-21532,0,0,452ed27d306a0c99dd7fa216d9ad7fae4f5558d1c04d9331bb1115f5b8589d50,2024-10-10T12:57:21.987000 @@ -247076,7 +247079,7 @@ CVE-2024-21536,0,0,12c83b03efaaa3cc2890c754edcace2dd7ffc8b3d03f735b6e31c62550b02 CVE-2024-21537,0,0,434d7d2766b91e13cca78a0a8ea1a46a74136bc67ef591981914fba4f50ec56c,2024-11-01T12:57:03.417000 CVE-2024-21538,0,0,e897068d7d66099bb41c1a146301a4231ffaf8598a00a9e9d72bd661eae781eb,2024-11-19T14:15:17.627000 CVE-2024-21539,0,0,5b71b48f136ea0a133f42f5e9ff41239f19728230b6ea876d025e715b63e91d7,2024-11-19T21:57:32.967000 -CVE-2024-2154,0,0,0457c00e24736b547ac4f7f247e75fccaa09d13ea0de83ed7c8761e6cfd867ea,2024-11-21T09:09:08.927000 +CVE-2024-2154,0,1,f33d955d821642b9f394fc3308cb7a81ead5da205cdf1cb16dd1ebe4fd874a70,2024-12-20T19:38:32.983000 CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000 CVE-2024-21541,0,0,5334d81827b035e812e898c211255fb4104fa0827d052caba8f8153293e7f7ad,2024-11-19T16:20:37.887000 CVE-2024-21542,0,0,e36314e0d3629ecf9734bb5ba8a685163900633286b99b2fd1cecc21e5922d77,2024-12-10T05:15:07.567000 @@ -247086,7 +247089,7 @@ CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af CVE-2024-21546,0,0,374b959b014e67074043123d4e408037a721391ba09f30f003dba89985567839,2024-12-18T06:15:22.850000 CVE-2024-21547,0,0,9490da4e046bfe0261ead89061dc5ab090fcc33b7491f225d76294d9a91f7dfa,2024-12-18T06:15:23.187000 CVE-2024-21548,0,0,1234240944f7ab37f9588d239ecac84e4a1f43ed5a4b8fa4e08658630e5fe2ba,2024-12-18T15:15:09.947000 -CVE-2024-21549,0,1,facd8052f0d57246964ee421f8413f9af2b81009f9f5cb4e77b99ca3c5240e74,2024-12-20T17:15:07.983000 +CVE-2024-21549,0,0,facd8052f0d57246964ee421f8413f9af2b81009f9f5cb4e77b99ca3c5240e74,2024-12-20T17:15:07.983000 CVE-2024-2155,0,0,1def2d989b10107bcc4deca9404884628c1ba17bdc1993a4df13bb309b4ac8eb,2024-11-21T09:09:09.070000 CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000 @@ -247331,7 +247334,7 @@ CVE-2024-21850,0,0,3f4996285ba8f36af13beac4e19f7f6eaac6b7c930044e4f18b3bcd24f607 CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122fec4,2024-11-21T08:55:07.400000 CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000 CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000 -CVE-2024-21855,0,1,cd01486a1dbc0a9a886ff2827620764e44df4ea15f59879419eb00eb59af385d,2024-12-20T17:05:24.753000 +CVE-2024-21855,0,0,cd01486a1dbc0a9a886ff2827620764e44df4ea15f59879419eb00eb59af385d,2024-12-20T17:05:24.753000 CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000 CVE-2024-2186,0,0,4cd75d54d43aef363137514f65f60c9ac389db0d3c09cf411cd6f8433450c76a,2024-11-21T09:09:12.967000 CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000 @@ -248225,17 +248228,17 @@ CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee2 CVE-2024-23222,0,0,234fbc8851ab910f53af22b06eaa70a751c876141fb023e6fa28056f96c7e426,2024-11-29T15:05:53.577000 CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000 CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000 -CVE-2024-23225,0,1,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000 +CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000 CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000 CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000 CVE-2024-23228,0,0,4777eb1057e01b89423a9fc98cb690d47cbff49eeda10b8695a9f357523c2a6d,2024-12-12T14:33:00.640000 CVE-2024-23229,0,0,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000 CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000 -CVE-2024-23231,0,1,b345ca2141a2953e4d0d79a4aa59df13df9ec9881922a1f9223058754c5c8dae,2024-12-20T17:09:06.867000 +CVE-2024-23231,0,0,b345ca2141a2953e4d0d79a4aa59df13df9ec9881922a1f9223058754c5c8dae,2024-12-20T17:09:06.867000 CVE-2024-23232,0,0,2d4ff156fd4bb5acfd4c77537307a7232bbe750b532071870b7076c67ef970f3,2024-12-05T19:50:23.700000 CVE-2024-23233,0,0,ba76592c9abd6021c9cd40cd3baae71397fb7de180a79a7079e5b607a05d8d7c,2024-12-05T19:49:55.040000 CVE-2024-23234,0,0,2e6ac2948d5f78449bdbb22421c29ee97772b7e769451de805febffae9b54f22,2024-12-06T02:48:33.647000 -CVE-2024-23235,0,1,9a34f8e4ff0503040ce75a38cf6851db6360ff7441289023e99bd8eeda83344b,2024-12-20T17:08:50.517000 +CVE-2024-23235,0,0,9a34f8e4ff0503040ce75a38cf6851db6360ff7441289023e99bd8eeda83344b,2024-12-20T17:08:50.517000 CVE-2024-23236,0,0,a0ff633f4e0feb8938fa63f59f317e6731d8f14631d93c3d47b0d40500deb8f2,2024-12-09T19:30:08.453000 CVE-2024-23237,0,0,5ebc5173e614f45947ce7d8b6d251bfd9a7226ed6c5a53d978f1e15bf6e5faec,2024-09-23T19:53:51.170000 CVE-2024-23238,0,0,e055da92b65437a98bc321c417e70a8f6a5157addb3c81c8dcfe9f4937312e89,2024-12-05T20:03:43.247000 @@ -248247,7 +248250,7 @@ CVE-2024-23242,0,0,741106f9dc3463bc451723e7b8cc21ef1db5886490f98395e55dc47f2247b CVE-2024-23243,0,0,16c5de8e4ab967061eb8ee2cd6d3dd7d9074d29e6b9475fb955e98d6f2c0db20,2024-12-05T17:10:47.297000 CVE-2024-23244,0,0,5aad1663b4ed4cd78deeaed9a4afb07e9e6e364d3035e066110317350a5f9cb2,2024-12-06T02:13:06.950000 CVE-2024-23245,0,0,4a86d676d3be6cda9e360ecc9a003c7062cb405f97d6449fe5589357ff2225f8,2024-12-06T02:08:18.640000 -CVE-2024-23246,0,1,dba86fcd1448c512e3001d37ec498b089b198c155206beb9371cc0d8180b4b20,2024-12-20T17:09:02.443000 +CVE-2024-23246,0,0,dba86fcd1448c512e3001d37ec498b089b198c155206beb9371cc0d8180b4b20,2024-12-20T17:09:02.443000 CVE-2024-23247,0,0,c204ca7ef7979ea0603fec0bd8eddb1c65df637a5bcdac9a9a2ba060eb81fcf4,2024-12-06T01:58:51.233000 CVE-2024-23248,0,0,c48fd9ad2631eef3f53ac5adca0b91801108c15be181b815768304a228795f1c,2024-12-06T01:52:41.503000 CVE-2024-23249,0,0,5da154d890c56feee3aeb01a7ee9508a41a9ca6982e5c902a0c40bac654d6a2e,2024-12-06T01:51:51.123000 @@ -248259,9 +248262,9 @@ CVE-2024-23253,0,0,6fee2e03ec17eb24d88c1bed52c44c23ae4ef97327ff874a2890eaaa17222 CVE-2024-23254,0,0,3ad832d7c7a0a8a8df5739c11dd6d63a4415039b0e1baa027b884d9d2dd50195,2024-12-06T02:54:01.530000 CVE-2024-23255,0,0,7bd882417f214059f6dfc15001b2afab0607fe28723d0b0944187e5c1a7be405,2024-12-06T02:51:33.217000 CVE-2024-23256,0,0,4ea578b20137f41639da60d4790de798cbf85fd6e17c481c4d3ab161fae0f632,2024-12-05T17:05:54.973000 -CVE-2024-23257,0,1,7f06391a83a3a5d30a7d83dfdd066795af480eb581dd23a51eff9c35cfe45e80,2024-12-20T17:08:48.080000 +CVE-2024-23257,0,0,7f06391a83a3a5d30a7d83dfdd066795af480eb581dd23a51eff9c35cfe45e80,2024-12-20T17:08:48.080000 CVE-2024-23258,0,0,eba9c68188ca56a6ed74a451e7dab749f607b390492bf516b3fa96413ebc51e7,2024-12-06T15:15:59.713000 -CVE-2024-23259,0,1,4afb2ece42ac8b13385095744010dc54f98bbd06c0222dbb45caf5a65dfc644f,2024-12-20T17:08:58.297000 +CVE-2024-23259,0,0,4afb2ece42ac8b13385095744010dc54f98bbd06c0222dbb45caf5a65dfc644f,2024-12-20T17:08:58.297000 CVE-2024-2326,0,0,d09d4fc0a3fe2b3bbc5a1e657d32fe82b3fbf461a6d335455eaa162e70e203ea,2024-11-21T09:09:30.590000 CVE-2024-23260,0,0,86bee0d3b6e536addbecc74ccb792fb0e6df91f3c5ef6f2caee278d7f60aa344,2024-12-06T15:21:05.480000 CVE-2024-23261,0,0,e3d079aeae084ce00b784250816edd4a5b3e0b3c058d3918e25850cd4defbfe1,2024-11-21T08:57:20.073000 @@ -248282,7 +248285,7 @@ CVE-2024-23274,0,0,318b4df782d3c6e71148c6552d1841eeb2ed2926c2f9c1ed83914e8722226 CVE-2024-23275,0,0,f810e9a533fb793b7879304750d276d7339a9fc19b1d48344018f119825ec467,2024-11-21T08:57:22.553000 CVE-2024-23276,0,0,8870bf788099d7859136d2c15439c5ebc20315db12c7b2aa01f521c38051d30d,2024-11-21T08:57:22.707000 CVE-2024-23277,0,0,dd271aa56b91b093c3a10777496e2004db655da1636d53a91afc4735da2992f4,2024-11-21T08:57:22.923000 -CVE-2024-23278,0,1,bbdca142c86918ece4747389e32d9f5bc6660749a5e17048c8b710b2f35f9d9e,2024-12-20T17:09:14.257000 +CVE-2024-23278,0,0,bbdca142c86918ece4747389e32d9f5bc6660749a5e17048c8b710b2f35f9d9e,2024-12-20T17:09:14.257000 CVE-2024-23279,0,0,8c1ffefd196d1bd3ee9a940fb1989de48fb0d13cbe9a0d7ea19c2de439d1dfcf,2024-12-07T03:03:35.967000 CVE-2024-2328,0,0,bb3499035182a93f707cdcba0335c8ccddb9563295bc2859816e2ba7e35f79d4,2024-11-21T09:09:30.833000 CVE-2024-23280,0,0,09fe788e24d4a3f86544fff0058ed254d6dcc58242d779773f092933de0dc574,2024-12-07T03:11:21.283000 @@ -248818,7 +248821,7 @@ CVE-2024-23893,0,0,6620e8a3035678860ebb2a9b79d8366d8891e31364bf16eb5ad0a2ea3f971 CVE-2024-23894,0,0,0f613219b83c49887e0e24e38a0aac0b74ec26128f9cdeb6fc771c14075cc7e8,2024-11-21T08:58:39.270000 CVE-2024-23895,0,0,d4d544360ff9ac84901a798dd93d692846b51f3d4a3bfcbaf0a75a825a101383,2024-11-21T08:58:39.417000 CVE-2024-23896,0,0,635bb83ecb6705faee17db42ca50da7c067c8d9ac628ea959f5651246f7e310a,2024-11-21T08:58:39.560000 -CVE-2024-23897,0,1,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4ef5a,2024-12-20T17:30:33.613000 +CVE-2024-23897,0,0,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4ef5a,2024-12-20T17:30:33.613000 CVE-2024-23898,0,0,82cb86eeead29a41a26f8d43a27d3730988e662134d81188c8cd9708a0afbd78,2024-11-21T08:58:39.923000 CVE-2024-23899,0,0,4e4895235c426268ca84c39a87c44ba513bc2717de20eefcac614411ffacbafe,2024-11-21T08:58:40.040000 CVE-2024-2390,0,0,3e848f25c0e6aca1cdb589d9d47a5535f56144364579a0cdbb3a8951c3252040,2024-11-21T09:09:39.010000 @@ -250307,7 +250310,7 @@ CVE-2024-26124,0,0,52fe86902f6e328c06ed64de8c30f35b3833620ca639184264f611dd0db94 CVE-2024-26125,0,0,2c3257bf64e1f9bb73b26a4fbfc8be684d1eca4cc144ede6e81b1ca262a9034b,2024-12-03T22:21:24.047000 CVE-2024-26126,0,0,0704f19f338f2bb0acb508b253d0a2da44d884d4f86de92b6da40568e6480cad,2024-11-21T09:01:59.287000 CVE-2024-26127,0,0,a7e023b5ba5da3ad7af563324822a120bd0bfe59d4cb07ca927224a3bef75883,2024-11-21T09:01:59.407000 -CVE-2024-26128,0,0,9df5949897ce7c69270146da5bd3134451620505fd1160746941a2673fcc7f8e,2024-11-21T09:01:59.530000 +CVE-2024-26128,0,1,6ec59e3a008feca6738de761b3be3df5c35466eb2f92117550b0e2c3bfd06b31,2024-12-20T19:30:47.733000 CVE-2024-26129,0,0,a6f7f76734cd7be7877e8eb9720ae56f141a5750a9360530a9fc14c3cca18af6,2024-11-21T09:01:59.643000 CVE-2024-2613,0,0,d197187bcc99168b56c5741e81bf4f56ddcbecc0552953fc5cd8c3d8ca371b17,2024-11-21T09:10:07.777000 CVE-2024-26130,0,0,59dbefc86c1031aba378031c672a5f376743b0d682ff90d25ffac7caadc4d1ea,2024-11-21T09:01:59.757000 @@ -252435,7 +252438,7 @@ CVE-2024-28889,0,0,56e4da21fbc62908e65bc9d6315a2b989ea164aaccf23dde236dcd94fbd50 CVE-2024-2889,0,0,1885c0f2ecfe4bdb417129f70852e4157a6de85584ef6ee4549701263ae39757,2024-11-21T09:10:45.900000 CVE-2024-28890,0,0,3bbdab4f532fab507ef698fd11be91e1ccfe6d2327e03eb3fd78e1be839e0795,2024-11-21T09:07:07.400000 CVE-2024-28891,0,0,89149026c6e5f7e226ede146241710be24ae96a683eeb359126523d37dd3135e,2024-11-21T09:07:07.617000 -CVE-2024-28892,0,1,0675780aff3c9ab12c12dfa28834b58fee94e67a571b3eca76e1a2ca00b4044d,2024-12-20T17:05:48.707000 +CVE-2024-28892,0,0,0675780aff3c9ab12c12dfa28834b58fee94e67a571b3eca76e1a2ca00b4044d,2024-12-20T17:05:48.707000 CVE-2024-28893,0,0,db742559f8c06478e8575a7b0b3efd5fffbc67fba44a19cb78f8e38f79742eca,2024-11-21T09:07:07.740000 CVE-2024-28894,0,0,b9faf34ec909306221ab162d492936e7fd18d2418e4f829a4af1d6fc9a632145,2024-11-21T09:07:07.920000 CVE-2024-28895,0,0,d2dda34349233b4529d0456a907510ce0ea82c958aeef35d6f0b65b75c4f7cc9,2024-11-21T09:07:08.117000 @@ -259108,6 +259111,7 @@ CVE-2024-3774,0,0,7a7a597b589690c12f919940345595f31743063972f70d8b4f9ea657d33a59 CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb10b,2024-11-21T09:24:16.130000 CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000 CVE-2024-3775,0,0,f76bedb52b04452b1e969173a1a2922973eae698b0d18e93debe0543f0b67d29,2024-11-21T09:30:22.403000 +CVE-2024-37758,1,1,dd47323a7a2c94eacc21ead7d948334d2858daaa32401e922818368c61ca635c,2024-12-20T20:15:22.937000 CVE-2024-37759,0,0,18b1e88dc7a3b7f932762ee7014dce51b56c599cd2ee7466ac0b38dc37564402,2024-11-21T09:24:16.593000 CVE-2024-3776,0,0,289e09e15a504f1464bfd485ba808e84aa2aef8c29154b4e946fa3d463421b69,2024-11-21T09:30:22.537000 CVE-2024-37762,0,0,f73bf4c4d5b076a67c41dc17aaf07f5b5021aedfe4f7bfded7c4e50f0cbcd240,2024-11-21T09:24:16.827000 @@ -260089,7 +260093,7 @@ CVE-2024-38858,0,0,0905a6edb93734f4ba33225c6937d7fb9b4d2ff2a1ff03b7aa90c2c6088f2 CVE-2024-38859,0,0,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000 CVE-2024-3886,0,0,3a026cacc2b1da5f32776c4ad857a17f67d1a004181736ab52c33a72e8789c33,2024-09-03T18:48:14.927000 CVE-2024-38860,0,0,2fe29335e4516ea3256064dfc26190ce7cc189e9ac31e94fea538574e1933f86,2024-12-11T03:01:28.130000 -CVE-2024-38861,0,1,8da578c77bfff9b3cb89303f8d565b44ff8e7d7f6b8164aa2636ec20b509176f,2024-12-20T18:57:56.383000 +CVE-2024-38861,0,0,8da578c77bfff9b3cb89303f8d565b44ff8e7d7f6b8164aa2636ec20b509176f,2024-12-20T18:57:56.383000 CVE-2024-38862,0,0,9b3effa57af127d210fa99d38decd49715030f753336a9c99109dcc9d2bae0d1,2024-12-03T16:56:19.887000 CVE-2024-38863,0,0,19f40d0a8efdafcf1661471e0d88ded3ea1f1a6ed7ed00a5524865119c45bf20,2024-12-03T16:47:15.693000 CVE-2024-38864,0,0,7cf8731e9c51bad4951a528c23c1b0408734f55fcddd88e6429508c444ccc918,2024-12-19T16:15:08.197000 @@ -263050,7 +263054,7 @@ CVE-2024-43306,0,0,c5ce1c97ee2c551a6fa8788a19dd2d6978c52a875878f2df83b699738b025 CVE-2024-43307,0,0,8fbf744048c958ae300202c5f818de882814571bc06ebfdd9e652305b61701ed,2024-08-19T12:59:59.177000 CVE-2024-43308,0,0,aa22fcffc7041917127d93081d908e34cd627d4d10793307f6ba8195eaa761c6,2024-09-12T16:30:02.100000 CVE-2024-43309,0,0,1eaec8ce276c06048348327945103c6d2ea21efb7203b88971dc793e38e026ea,2024-09-12T16:39:09.187000 -CVE-2024-4331,0,1,f5ca1d6fdd6953854d0576448fbefa9c08c3e2e9e03b6d1583ca81462518a288,2024-12-20T17:22:46.783000 +CVE-2024-4331,0,0,f5ca1d6fdd6953854d0576448fbefa9c08c3e2e9e03b6d1583ca81462518a288,2024-12-20T17:22:46.783000 CVE-2024-43310,0,0,b1d5a62175828009d1f8c4d3ede330d4f35a1cc114a8594b5b483fcdc438086d,2024-11-13T01:15:24.813000 CVE-2024-43311,0,0,4220c8475b216fd0e41f386621500391cf8e0c6c4ca697b2e57893c49cc8fafd,2024-08-20T15:44:20.567000 CVE-2024-43312,0,0,0805c2de8f1c51a2a656b3648824ea7e8e23571ad9dc623405e8aea5c7c3f94e,2024-11-13T01:13:26.633000 @@ -263387,7 +263391,7 @@ CVE-2024-43647,0,0,8afbf70ad2cef6fb4b1caf7e1a2477d89764414a1ebb1b6c70d7bf7b3d244 CVE-2024-4365,0,0,8395a37d6a53a1070a3da8569444b421529dea178299a0f784e109ce6848c89d,2024-11-21T09:42:42.317000 CVE-2024-4366,0,0,3c382e606a72e58f20f6afa38987a3fb436df349cdb6108f029876febf16f59e,2024-11-21T09:42:42.433000 CVE-2024-4367,0,0,3318beab631cb74f2943c39bf29b1939a0ea63fcc5350b19cb44402c5adc35db,2024-11-21T09:42:42.537000 -CVE-2024-4368,0,1,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000 +CVE-2024-4368,0,0,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000 CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000 CVE-2024-43684,0,0,4a243a48ba516eb20e6ab29bdd16712edb7b93acf46d8d67ea6d12ff5a4303fa,2024-11-01T17:15:17.127000 CVE-2024-43685,0,0,f6b41b4fe43ce77455d2f85a9164c265be40037da33cc3a92bd45f51667e1ef9,2024-10-17T15:17:20.217000 @@ -263881,7 +263885,7 @@ CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5 CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000 CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000 -CVE-2024-44195,0,1,5fd3b107528189bd2e705cef466fbbff2b7f08fe3e4e94dc8e4a02df1db2d1b2,2024-12-20T17:15:14.860000 +CVE-2024-44195,0,0,5fd3b107528189bd2e705cef466fbbff2b7f08fe3e4e94dc8e4a02df1db2d1b2,2024-12-20T17:15:14.860000 CVE-2024-44196,0,0,efba4227fd693646a405367aa8a07c9ade4c0b362274669a348a2035392544af,2024-11-14T02:15:57.873000 CVE-2024-44197,0,0,4d5ea1ffd5ac300a8aef7ddcdb7d03d5b4f53fc506b231f15824ab1d8acba09c,2024-11-14T02:16:23.927000 CVE-2024-44198,0,0,ac9983938813bdb2273db436dba2e85817aa94ffd182ac96898511d49f70472b,2024-09-24T15:45:32.787000 @@ -263895,8 +263899,8 @@ CVE-2024-44205,0,0,479ce40b4658e11ccfe7113f730a76d2315c870d209a012f733f4449cc380 CVE-2024-44206,0,0,d8e5aac347cb04d8524629aaf70121480231b4f8b4280238ac4fc071f1a60444,2024-11-21T21:15:21.477000 CVE-2024-44207,0,0,df8e300cf7f6b361cf79cc82a13f930868069c30b911e0bc1e5fb07b5725fa64,2024-10-04T17:31:41.970000 CVE-2024-44208,0,0,0f110c58ea3b1936a6fa272413b21f60fe5e44f11a840cf53eeb8d5bd692f5ed,2024-10-30T19:35:18.340000 -CVE-2024-44211,0,1,759f37a7e4b839af60feef985653c9f39bbd51a751db1d2f2824acacc4e586dc,2024-12-20T17:15:15.053000 -CVE-2024-44212,0,0,e65cf132c6860c96df39727fc583565899ae979073c6e43c4e56dcedfb1d08ea,2024-12-13T18:51:05.983000 +CVE-2024-44211,0,0,759f37a7e4b839af60feef985653c9f39bbd51a751db1d2f2824acacc4e586dc,2024-12-20T17:15:15.053000 +CVE-2024-44212,0,1,7535d563779e625850b85dac200bcdac9ff61370543d5a527301902571d866fd,2024-12-20T19:15:06.570000 CVE-2024-44213,0,0,d54c85400318007c85dac3cf8abc38cb1350827f6126f81634ef8d1828179ea9,2024-10-30T19:35:19.187000 CVE-2024-44215,0,0,e32762ff0bf2f6f2e22b7422e9deddd79856979cb2bda3d837557df7bdb5d6cf,2024-10-30T21:35:06.770000 CVE-2024-44216,0,0,e207c9047398aa16280b349e1f263399dd58d00878c7a8d8ca180fe88f7ada73,2024-12-12T19:38:27.887000 @@ -263906,12 +263910,12 @@ CVE-2024-4422,0,0,88e38c8f81c558e863db276496d3d3966ccaae5dc31d3db1528474edcaac1c CVE-2024-44220,0,0,bad2b508e552d1a09c11c8017d22721370fec111da93bdc30606a926bfe3892d,2024-12-18T18:37:48.003000 CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370f17,2024-10-30T17:25:30.903000 CVE-2024-44223,0,0,84e8bb717698b65e38cdd2316c5466c890813aea6f001515f11f5ba87db1c455,2024-12-20T04:15:05.523000 -CVE-2024-44224,0,0,478fc3b0c95a949d4e842b832997fdde945aaf1429034cea5cca1e538adf5c18,2024-12-18T18:34:29.640000 -CVE-2024-44225,0,0,09c2c91a46b4b824bbe1350f723a18758e0297c6f1159cd080a69de8af433ffc,2024-12-18T18:33:53.503000 +CVE-2024-44224,0,1,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000 +CVE-2024-44225,0,1,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000 CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000 -CVE-2024-44231,0,1,9aa4e4a66e55b91e9905bf8d1bb79d682ff9da10e92f9d9c8de25cdd7384553f,2024-12-20T17:15:15.277000 +CVE-2024-44231,0,0,9aa4e4a66e55b91e9905bf8d1bb79d682ff9da10e92f9d9c8de25cdd7384553f,2024-12-20T17:15:15.277000 CVE-2024-44232,0,0,c9e60a0c1965d8b25770744bfea513326538d2727d3411f3ea53393806685d07,2024-11-04T21:35:07.233000 CVE-2024-44233,0,0,faa9cc95169f99a6ba5b7b809b52a3296f8f8d5cfb2ab7775af98f1caeb58709,2024-11-04T22:35:07.613000 CVE-2024-44234,0,0,1b996be4e23122b67d229b562bc4172f47ad474e322c6880a3e7f0b7746d3c2c,2024-11-04T21:35:08.147000 @@ -263923,9 +263927,9 @@ CVE-2024-4424,0,0,e4fbc59b97d3ab662d4c41a8eae50b7dfed7720bc7b4a2def773ac1eb5bfa8 CVE-2024-44240,0,0,9bc323d27f86d6960aa1222a9e26c88d792bd4aad06dc8f69654b31d341144be,2024-12-12T18:28:02.370000 CVE-2024-44241,0,0,5de5135e9daa9ea3932dc5be16d16b7865edaf492a839b039e4c4fbe95d68350,2024-12-18T18:33:14.830000 CVE-2024-44242,0,0,a958eb1aae159d251dc553158bb2964b5f9e244336b1daa4c93e0c6249ebc6a3,2024-12-18T18:32:50.917000 -CVE-2024-44243,0,0,d6cfdd5f1066d6c0e224f6d87004610ac4f064d7389b9f36e6402c36244adc4c,2024-12-18T18:32:27.760000 +CVE-2024-44243,0,1,87fc67284c2d0a1fd1bd0f57758a004ce48222f265b8da6c69d372afab164fe5,2024-12-20T19:15:07.120000 CVE-2024-44244,0,0,573c6be3aefd70d7c10a9a2e90a39d7e9b0481351a0f285c1fb9ad7116e70d3d,2024-12-06T15:15:08.857000 -CVE-2024-44245,0,0,5b4237740580d452bcb6a01c2de76c04bd8ed45aaa5fc9abc6458d5b8d0c0c38,2024-12-18T18:16:36.817000 +CVE-2024-44245,0,1,b8561b9b02855fc8feaf7bd29923806fdf1f8c2ce1493af9e91c0d7256517565,2024-12-20T19:15:07.300000 CVE-2024-44246,0,0,cd2f91cb0aad4b03f37030b4a6f9038d6ffa2e28f62fba897e7832821b36bc04,2024-12-18T18:08:57.380000 CVE-2024-44247,0,0,e5d19c840bb58be3d8febe871a15e2408881be2e884d262abcdad60ec348a828,2024-10-30T17:49:05.693000 CVE-2024-44248,0,0,125187bbc2924e801a26c62b8603e876f53840b8993cd3e771790c0ab61ddb4f,2024-12-16T19:15:07.777000 @@ -263968,16 +263972,16 @@ CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9 CVE-2024-4429,0,0,a4a8f97ae1846585dda39a340897585bd413fb1368db5055aa3e7c7ef6d4f3eb,2024-11-21T09:42:48.820000 CVE-2024-44290,0,0,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000 CVE-2024-44291,0,0,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000 -CVE-2024-44292,0,1,aff4c88fbda4b4b6e685651306bae87e194e89f532a38adbd7445e4d38cf296d,2024-12-20T17:15:15.457000 -CVE-2024-44293,0,1,0506803fcbf6afb69ef6a4b195e2554f7ec57c0c79393dcdc16a52ccce4c88cd,2024-12-20T17:15:15.843000 +CVE-2024-44292,0,0,aff4c88fbda4b4b6e685651306bae87e194e89f532a38adbd7445e4d38cf296d,2024-12-20T17:15:15.457000 +CVE-2024-44293,0,0,0506803fcbf6afb69ef6a4b195e2554f7ec57c0c79393dcdc16a52ccce4c88cd,2024-12-20T17:15:15.843000 CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000 CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000 CVE-2024-44296,0,0,5fa9d13f224f3a0a67aaaa3541de4a3651fe9910d7529312fb8483d35af02925,2024-11-14T14:58:09.900000 CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8eaa,2024-10-30T15:35:17.777000 -CVE-2024-44298,0,1,c3ca9b080a765eb7800ab2d41b4733d38b2ee4df6997cf8987c4b165307c381f,2024-12-20T17:15:16.340000 +CVE-2024-44298,0,0,c3ca9b080a765eb7800ab2d41b4733d38b2ee4df6997cf8987c4b165307c381f,2024-12-20T17:15:16.340000 CVE-2024-44299,0,0,3fad1e1fc6e494d5112c8007d008afd8a0cdb0129eb46588d4ade8d86481d2e9,2024-12-13T18:47:10.657000 CVE-2024-4430,0,0,d5d36fbeccc483ac36a1692cd3da44d019b58c951236b193b64bdfb1c1fbb731,2024-11-21T09:42:48.940000 -CVE-2024-44300,0,0,8389b09c1b09329ca93ee14d306e2b10682c4c3041dafd4737f0d3e5a21e6eac,2024-12-13T18:45:11.343000 +CVE-2024-44300,0,1,bae43a573b0fc5576aad7e68076991c0fff3f7113750dddf3be341943a7729db,2024-12-20T19:15:07.507000 CVE-2024-44301,0,0,10f1c2e87bf42ace95d4c598f50b3f632b94819bfa4a1517624dd03460e1d549,2024-12-12T18:06:12.680000 CVE-2024-44302,0,0,8e2df0f8c8bbf990ae9e0c0188d5dc060a503901afef39bb207c003562ed13c7,2024-12-06T15:15:09.050000 CVE-2024-44306,0,0,8fb83c68a3960e43ecba5e716ce2c319df21cea60529cc8954824fbcac0a96d6,2024-12-11T20:34:16.127000 @@ -264703,7 +264707,7 @@ CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f984834 CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000 CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000 CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df83,2024-11-21T09:43:06.003000 -CVE-2024-4558,0,1,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000 +CVE-2024-4558,0,0,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000 CVE-2024-45586,0,0,c5742d0b574ab22b2df0aff8f44af2d16b298829271ece1a5c24a5de23ca2b0a,2024-09-04T12:15:05.320000 CVE-2024-45587,0,0,676b2002aac47e9967f7d32f0f4cca8f2986385214e3c17fc6693869db40c1a7,2024-09-04T12:15:05.530000 CVE-2024-45588,0,0,e602a5b67a431535ce7343d20bd27a01a8e11f9a6a3313f6b0f98fb929ec70a0,2024-09-04T12:15:05.673000 @@ -264817,7 +264821,7 @@ CVE-2024-45765,0,0,d08df3289bc68e719740469698ac413966bdff60f13781ac62b99dc021094 CVE-2024-45766,0,0,3c96c4b692f72cef2f3b9553cac8d6f167af7d571a147249c8f73e3c5c52eb55,2024-12-02T14:37:32.017000 CVE-2024-45767,0,0,7c5b48c8e706e6c8ae501761d8be0d401e1b87d8e52b758c1a580381e866ae36,2024-12-02T14:32:37.183000 CVE-2024-45769,0,0,b04be771ec22a94fd636520cce7793ef84bf69518cc6b17c7f3bae1b59effde1,2024-11-12T18:15:35.427000 -CVE-2024-4577,0,1,474670197f5b401b0f7966aa2604f0e876d2981d00c3e623c8f6cb422c084d74,2024-12-20T18:45:19.983000 +CVE-2024-4577,0,0,474670197f5b401b0f7966aa2604f0e876d2981d00c3e623c8f6cb422c084d74,2024-12-20T18:45:19.983000 CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf0a5,2024-11-12T18:15:35.643000 CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000 CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000 @@ -268570,7 +268574,7 @@ CVE-2024-51596,0,0,5f7957abcc65695fbbbad369f30f56995f2266af1552e60fdcef5cab61a0c CVE-2024-51597,0,0,62ae94ab5483c8d914f03c3a46d4ad60c3488941e5f47bbc41dd3d393a27d642,2024-11-14T20:27:46.943000 CVE-2024-51598,0,0,b4e6d650a73e1979019c94432440fb4ee1a330b76ce10aeee6076e05c49770c4,2024-11-18T16:37:58.447000 CVE-2024-51599,0,0,41501685029147c7f1c1c0dd3faf8f8f30cd0ee0cdea7acc19942d2a1a69cdd9,2024-11-15T16:55:34.480000 -CVE-2024-5160,0,1,462a8d8a97ff197783bab283d57d42e89329228755b3d0d006ae98342028e950,2024-12-20T17:14:27.630000 +CVE-2024-5160,0,0,462a8d8a97ff197783bab283d57d42e89329228755b3d0d006ae98342028e950,2024-12-20T17:14:27.630000 CVE-2024-51601,0,0,6ea142c530f0aae8d6a6871925766314779a5853c3a3fd2488392521b8763ae7,2024-11-12T13:56:24.513000 CVE-2024-51602,0,0,630897b856830c417cfbfc6f31a1ad6d5f36ec4cb1e807fd8c47eecb679f5e29,2024-11-12T13:56:24.513000 CVE-2024-51603,0,0,a00fc055583804474eecc8fe08a40d10c605dbcb3203377f2692135c26defd6c,2024-11-15T16:24:18.843000 @@ -270085,7 +270089,7 @@ CVE-2024-54143,0,0,39896e76381b970ed0c53caca39df9efa5206ded9e17479626eb381c775f3 CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000 CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000 CVE-2024-5415,0,0,74eb25978de9e4a46066392a5c5808fd8612c02bf2d68d6ca3b049d5a2727bf3,2024-11-21T09:47:36.587000 -CVE-2024-54150,0,1,2df54d94caae27dd20c93dacb8da181f1ca94c7f90068ee4b0f13c650c491939,2024-12-20T18:15:29.847000 +CVE-2024-54150,0,0,2df54d94caae27dd20c93dacb8da181f1ca94c7f90068ee4b0f13c650c491939,2024-12-20T18:15:29.847000 CVE-2024-54151,0,0,783d6d59d625f0bdd386ea3afbe7da13ff4dd113b20f53b68a2b065516a078c2,2024-12-10T18:15:42.663000 CVE-2024-54152,0,0,64d47547e5307ed80a7f425b825ed1812b96ec6e10500fe8d7bfb0506a4a9529,2024-12-10T16:15:23.947000 CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000 @@ -270366,31 +270370,31 @@ CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 -CVE-2024-54479,0,0,8bf37387c4dde8f9cdb0a9e834e8462f66fa3d4a2f05b2799b2fc0f12fb282aa,2024-12-13T18:24:34.090000 +CVE-2024-54479,0,1,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000 CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000 CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000 CVE-2024-54485,0,0,982a0baa0ac099695fc21f36de9b06236d26b846e1534a93622dae435e1fc457,2024-12-13T19:15:09.380000 -CVE-2024-54486,0,0,e33ae333b83953b305014f4c92969aef413885dda3f3148e1a1844a776b4bece,2024-12-13T18:27:45.980000 +CVE-2024-54486,0,1,5df005d0d8864aa5a133b3a90c1c09a871b54e236cb0257a1e40ecfc6e05f5a4,2024-12-20T19:15:07.897000 CVE-2024-54489,0,0,1ce8b5ab65a55735f38feb96fae54ecbe9c5aa5b683277170ac859678b8dcc0a,2024-12-13T19:15:09.570000 CVE-2024-5449,0,0,1d8d63580d1cb9064d797bded58f9169ad76c503e92c814880090cdd281d631c,2024-11-21T09:47:42.400000 CVE-2024-54490,0,0,2c61af9f099ad6e59b9a01082060a877b296ae3dacfdcd653badbfc16c369658,2024-12-19T15:27:32.170000 -CVE-2024-54491,0,0,afc05a90c1d51c0b62bf52d12f45769b8d505c87568084c8c093af75ff19393c,2024-12-12T02:15:30.270000 +CVE-2024-54491,0,1,35268ef9f2f927ce5946dac0f34cbb7757084aa4bce4e8f202e1bc3be6e35bee,2024-12-20T19:15:08.100000 CVE-2024-54492,0,0,85af0b7e8310e62bdbb661f9396591c8a16f77bd78856ca16684e2e3405868de,2024-12-19T15:36:15.687000 CVE-2024-54493,0,0,fa153b7b9aa4539638e8a2a5a8a0f6bc0ba6e98aa0e9ed776ffdda5b5b98dbb4,2024-12-13T18:30:16.170000 CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d056236b8,2024-12-16T19:15:08.730000 CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000 CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000 CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000 -CVE-2024-54500,0,0,657f282c345a307f53f35dde04bf557f78e33359ddf485d7b8b3507dfe14769f,2024-12-13T18:34:26.490000 +CVE-2024-54500,0,1,1e87cc2025246725b4af3b87a7de7fc4a4a59dd0b835eebc8b8a5f44f93c0dd3,2024-12-20T19:15:08.270000 CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000 CVE-2024-54502,0,0,0d530603cb62daf612c8e9f528cce0e30598037590c6f193eadb47d9a4b82777,2024-12-18T14:13:13.297000 CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1dffb7,2024-12-13T19:15:09.727000 CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 -CVE-2024-54506,0,0,f3c9936de04cf0352e94a0776d19df77b7b910899450a047ad1a7929caefdd5e,2024-12-13T18:05:06.697000 +CVE-2024-54506,0,1,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000 CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000 CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000 -CVE-2024-54510,0,0,41760ed29ca005a3bcf19679bc5f9d3112d6162f99c7272e8e6073225291c2cc,2024-12-13T18:07:49.633000 +CVE-2024-54510,0,1,dff09d19d4956196d4a463b8d2bc4d60d0285ffe6cf366aa3f34a0cc4cb339a9,2024-12-20T19:15:08.667000 CVE-2024-54513,0,0,59e90aab7af338ce166e9f6872df66dd31c7c6fbffec6972f97a29bde7559e69,2024-12-13T18:09:28.273000 CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309873,2024-12-18T14:05:50.673000 CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000 @@ -270403,7 +270407,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 -CVE-2024-54538,0,1,852dbad43cdeedfebb43616219b77e4f71051ccf9eb6e4f37330d9a15dcb3456,2024-12-20T18:15:30.117000 +CVE-2024-54538,0,0,852dbad43cdeedfebb43616219b77e4f71051ccf9eb6e4f37330d9a15dcb3456,2024-12-20T18:15:30.117000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 @@ -270540,6 +270544,8 @@ CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325 CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000 CVE-2024-5532,0,0,2d2bf83a78417d10d52c4a01e85b6f2193544544907107cc079e690b9848506f,2024-10-29T14:34:50.257000 CVE-2024-5533,0,0,6ea3c0edbbc0effb3cedc69539f40670649944720fc318b090494d3e8d8cf1b2,2024-11-21T09:47:52.963000 +CVE-2024-55341,1,1,13208e4e9d7b83b7eb0190cf5e1d6b00ecd78531876e86136e9733dada33dd17,2024-12-20T20:15:23.343000 +CVE-2024-55342,1,1,47999db2c629e08a941b6aceecfc1220a6a83dcfe8d45cd307c48c5774aeabc2,2024-12-20T20:15:23.660000 CVE-2024-5535,0,0,b70b433a28b7d7ab0e1d2beceba590e517cc88af55d524db84cbd7ff3afa5ee3,2024-11-21T09:47:53.090000 CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000 CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000 @@ -270554,8 +270560,8 @@ CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55461,0,0,9aba9528846a5e20a9950a25279e0e578fc2f2326e2132736dcd635d432a883c,2024-12-18T23:15:17.350000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 -CVE-2024-55470,0,1,f10f88d381c38a6bb90a0cdcf59cafaf3bca46a0e69a80516bbcddff56813b8e,2024-12-20T18:15:30.370000 -CVE-2024-55471,0,1,8197056e8f9960cec09b7a262aff3c8a7edfb21525e204bb4dac240446354cbd,2024-12-20T18:15:30.730000 +CVE-2024-55470,0,0,f10f88d381c38a6bb90a0cdcf59cafaf3bca46a0e69a80516bbcddff56813b8e,2024-12-20T18:15:30.370000 +CVE-2024-55471,0,0,8197056e8f9960cec09b7a262aff3c8a7edfb21525e204bb4dac240446354cbd,2024-12-20T18:15:30.730000 CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000 CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000 CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad7c0,2024-12-18T19:15:11.777000 @@ -270777,8 +270783,12 @@ CVE-2024-56317,0,0,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826 CVE-2024-56318,0,0,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000 CVE-2024-56319,0,0,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000 CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000 -CVE-2024-56327,0,1,7f279bf8e8dad1abfccdde7f80cf3a1198eceeaed727f435a201d9524ff4caea,2024-12-20T18:15:31.083000 +CVE-2024-56327,0,0,7f279bf8e8dad1abfccdde7f80cf3a1198eceeaed727f435a201d9524ff4caea,2024-12-20T18:15:31.083000 +CVE-2024-56329,1,1,1a706ee72fb5ffbcf058c8a20d98c3cc77e376296ceef183209bf8faa8566f9b,2024-12-20T20:15:23.987000 CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000 +CVE-2024-56330,1,1,0948df413a5c69f9b84ac0d2f9d73f87e1412fd86c2aab133f127598ac011144,2024-12-20T20:15:24.167000 +CVE-2024-56331,1,1,656088f14ab95d37562c79ca09b01fad53094f76aca2313baf371cb86cef2cbe,2024-12-20T20:15:24.337000 +CVE-2024-56333,1,1,68c1c791aa9456c9142c5ee23526a03e66d9256bf45f0935a9a3e1ddc89ba6bc,2024-12-20T20:15:24.520000 CVE-2024-56337,0,0,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000 CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000 CVE-2024-56348,0,0,cb28f0ed181f8223b2a47a2fb92147cc1a57b8274cdd4b7dbeaa070416c64567,2024-12-20T15:15:05.507000 @@ -272303,7 +272313,7 @@ CVE-2024-7335,0,0,6efef3e91e3c352c21a4a20104c1849917c99aa0cb8c29a317c82bf80219ce CVE-2024-7336,0,0,72fe049a9c4a42327f24842fd4a4696aeed616b51612841f704f8cb6d51709cc,2024-08-09T14:38:01.050000 CVE-2024-7337,0,0,2cd8270b417854f033216917f41d138f4d99c785eb4b08e1968382f45f87c011,2024-08-09T14:15:19.283000 CVE-2024-7338,0,0,8a7fe0b32a7363bf332020943a56b4fd58e7fadb61846e600b7d3232ab649d6e,2024-08-09T14:51:45.677000 -CVE-2024-7339,0,1,237e183fe2ab6169b5254e999c16693fd3f1e5326834530750ba0a0993957986,2024-12-20T17:37:05.217000 +CVE-2024-7339,0,0,237e183fe2ab6169b5254e999c16693fd3f1e5326834530750ba0a0993957986,2024-12-20T17:37:05.217000 CVE-2024-7340,0,0,afceb6b3fac1138f8cb83e0f415cec5ebdcab90ac887ac6cc7416d04596c3384,2024-11-25T13:15:08.107000 CVE-2024-7341,0,0,9879605967e8521e630e3508fca649ab0616466777cf91cc4c4478c8d606e537,2024-10-04T12:48:43.523000 CVE-2024-7342,0,0,bbab372366d62b7492fd885c0fd46da4598051b512f5991327f8cfce46915879,2024-08-15T18:40:22.537000 @@ -273530,10 +273540,10 @@ CVE-2024-8801,0,0,1e0aae29be9c0cb744c09fcf6b871e68e47c8e0119f25e788bcd23b055cde1 CVE-2024-8802,0,0,519ccb5eaf9bc8f3d38918f4150aeae97a2c25ee8bbd45cda3cfef957efbe87a,2024-10-08T21:49:10.173000 CVE-2024-8803,0,0,545e61fa61f0ce131642be6837336dfca74425fdd247a1c1bbc9c5682d94d2b1,2024-10-02T17:15:12.677000 CVE-2024-8804,0,0,522f84c5f3d62fdb46aab7f45c91feee68128f2626214a0b2e00b68dfdfedbeb,2024-10-10T20:56:49.403000 -CVE-2024-8805,0,1,dcb9955ad68abfddebfd4e5bbca8162f29f9659b32eab2eee4abd640abddb92c,2024-12-20T18:05:47.173000 -CVE-2024-8806,0,1,4b9ed01ad6f672a2c6917fa3d7270b3791ade8f8d7c799fd1977d8d49125e25d,2024-12-20T17:56:56.057000 -CVE-2024-8807,0,1,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a976b,2024-12-20T17:56:46.357000 -CVE-2024-8808,0,1,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000 +CVE-2024-8805,0,0,dcb9955ad68abfddebfd4e5bbca8162f29f9659b32eab2eee4abd640abddb92c,2024-12-20T18:05:47.173000 +CVE-2024-8806,0,0,4b9ed01ad6f672a2c6917fa3d7270b3791ade8f8d7c799fd1977d8d49125e25d,2024-12-20T17:56:56.057000 +CVE-2024-8807,0,0,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a976b,2024-12-20T17:56:46.357000 +CVE-2024-8808,0,0,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000 CVE-2024-8809,0,0,df2af4ed972c3756a9ce5829b125387cf06c9bd85112caf7f226db4fce399e8f,2024-11-22T21:15:19.110000 CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000 CVE-2024-8811,0,0,418d39ac888dbd68c2a13d5c78c52a880b2f463323c747a1361b39471602e241,2024-11-22T21:15:19.220000 @@ -273672,7 +273682,7 @@ CVE-2024-8963,0,0,581521bb2c8b1b5f22bc02521a37b1605cb082ee4bc9fbe4e287e83cb93654 CVE-2024-8964,0,0,c3c0787fe6644e5ecb28ab585ed80f03eded601812c8114e1e7b6807baaa0335,2024-10-10T12:56:30.817000 CVE-2024-8965,0,0,f8e90b5b67b70a8381e6e9eacdc79df30f60298bdd1400482e72c97cbc06eff9,2024-10-04T19:04:03.157000 CVE-2024-8967,0,0,7898714718fda7e623053515c819c9ef828b8e1f849f0008b801f032918cd46a,2024-10-08T18:47:12.110000 -CVE-2024-8968,0,1,0a7f9362d7e255d4c1311c1efcc8d15f2865f5f917558bd1ff65379f6a9f7791,2024-12-20T17:15:21.800000 +CVE-2024-8968,0,0,0a7f9362d7e255d4c1311c1efcc8d15f2865f5f917558bd1ff65379f6a9f7791,2024-12-20T17:15:21.800000 CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab304109,2024-09-20T12:30:51.220000 CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000 CVE-2024-8972,0,0,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000 @@ -274217,7 +274227,7 @@ CVE-2024-9683,0,0,e0cd26df0500a0cc9db7c9689d39531f945e069407d58ce00900c54b93d56e CVE-2024-9685,0,0,cc3d7e9b75de00d1df5b699f1225e3406f130ded3472b38175cabcbf3eacf7fe,2024-10-15T14:30:00.483000 CVE-2024-9686,0,0,1eb5e9681f976db1ddb26c27583f7f31c774b0e8d030243eb6a1a3ae9e4e826e,2024-11-06T16:19:04.333000 CVE-2024-9687,0,0,70a9bb470b4d3f8dcd4b2d1d45e9a9c3021b1c31156ba9f4250d50e915b4527e,2024-10-17T21:11:14.197000 -CVE-2024-9689,0,1,c2f301aff56dc675215855fe0f01b6009756e74ad68004e6c120b70b465093eb,2024-12-20T18:59:47.850000 +CVE-2024-9689,0,0,c2f301aff56dc675215855fe0f01b6009756e74ad68004e6c120b70b465093eb,2024-12-20T18:59:47.850000 CVE-2024-9692,0,0,c09412d3ade796bbe36fcbdc283e7a2ecfb61423341d9a573b10de9b4af8a991,2024-10-25T12:56:07.750000 CVE-2024-9693,0,0,96c2aa2e3e432eefa572dcd34b83d0c8393d8a6c0331136462b7a8bf8e88cb01,2024-11-26T01:57:19.427000 CVE-2024-9694,0,0,300f71d40bb815a23c3a0bc83a96e03beb3f23d9fc0b94128148bd02f8e753bb,2024-12-03T03:15:05.123000