Auto-Update: 2024-12-20T19:00:21.539113+00:00

This commit is contained in:
cad-safe-bot 2024-12-20 19:03:44 +00:00
parent 45d7a648bb
commit f70e459510
67 changed files with 2661 additions and 807 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-9250",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-20T02:15:05.150",
"lastModified": "2024-12-20T02:15:05.150",
"lastModified": "2024-12-20T18:15:23.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-32144",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-20T02:15:05.320",
"lastModified": "2024-12-20T02:15:05.320",
"lastModified": "2024-12-20T18:15:25.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28826",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:47.160",
"lastModified": "2024-12-05T15:30:17.053",
"lastModified": "2024-12-20T17:09:10.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
@ -99,14 +99,16 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -148,14 +150,16 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32435",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:13.767",
"lastModified": "2024-12-16T20:15:06.797",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:49:17.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -137,7 +137,6 @@
"url": "https://support.apple.com/en-us/HT213670",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -145,7 +144,6 @@
"url": "https://support.apple.com/en-us/HT213671",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -153,7 +151,6 @@
"url": "https://support.apple.com/en-us/HT213676",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -161,7 +158,6 @@
"url": "https://support.apple.com/en-us/HT213811",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -169,7 +165,6 @@
"url": "https://support.apple.com/en-us/HT213670",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -177,7 +172,6 @@
"url": "https://support.apple.com/en-us/HT213671",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -185,7 +179,6 @@
"url": "https://support.apple.com/en-us/HT213676",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -193,7 +186,6 @@
"url": "https://support.apple.com/en-us/HT213811",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34048",
"sourceIdentifier": "security@vmware.com",
"published": "2023-10-25T18:17:27.897",
"lastModified": "2024-11-21T08:06:28.310",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:41:40.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -294,7 +294,11 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0023.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34362",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T14:15:09.487",
"lastModified": "2024-11-21T08:07:05.843",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:49:01.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35078",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-07-25T07:15:10.897",
"lastModified": "2024-11-21T08:07:56.027",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:50:19.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -93,8 +93,22 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.10",
"matchCriteriaId": "1AADBE71-2697-49C9-8FC1-B77B700980AE"
"versionEndExcluding": "11.8.1.1",
"matchCriteriaId": "7C48786C-399D-4B0C-8082-64112C4DA5C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.9.0",
"versionEndExcluding": "11.9.1.1",
"matchCriteriaId": "50C1A12C-5862-48B6-ADA3-4222516DA152"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.10",
"versionEndExcluding": "11.10.0.2",
"matchCriteriaId": "76DAE9E0-15F0-40AB-8D03-E64423AD0E07"
}
]
}
@ -114,7 +128,6 @@
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
@ -145,7 +158,6 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35674",
"sourceIdentifier": "security@android.com",
"published": "2023-09-11T21:15:42.193",
"lastModified": "2024-11-21T08:08:29.043",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:39:49.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -102,13 +102,14 @@
"url": "https://android.googlesource.com/platform/frameworks/base/+/7428962d3b064ce1122809d87af65099d1129c9e",
"source": "security@android.com",
"tags": [
"Issue Tracking"
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-09-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
@ -116,13 +117,14 @@
"url": "https://android.googlesource.com/platform/frameworks/base/+/7428962d3b064ce1122809d87af65099d1129c9e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2023-09-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38035",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-08-21T17:15:47.457",
"lastModified": "2024-11-21T08:12:43.250",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:50:25.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38831",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-23T17:15:43.863",
"lastModified": "2024-11-21T08:14:15.183",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:50:59.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -121,8 +121,7 @@
"url": "https://news.ycombinator.com/item?id=37236100",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
"Issue Tracking"
]
},
{
@ -130,6 +129,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Press/Media Coverage",
"Third Party Advisory"
]
},
@ -138,6 +138,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Press/Media Coverage",
"Third Party Advisory"
]
},
@ -162,8 +163,7 @@
"url": "https://news.ycombinator.com/item?id=37236100",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
"Issue Tracking"
]
},
{
@ -171,6 +171,7 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Press/Media Coverage",
"Third Party Advisory"
]
},
@ -179,6 +180,7 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Press/Media Coverage",
"Third Party Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43208",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-26T17:15:09.033",
"lastModified": "2024-11-21T08:23:50.473",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:41:47.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43770",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T06:15:10.090",
"lastModified": "2024-11-21T08:24:45.360",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:40:26.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -144,16 +144,14 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "https://roundcube.net/news/2023/09/15/security-update-1.6.3-released",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
"Release Notes"
]
},
{
@ -167,16 +165,14 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "https://roundcube.net/news/2023/09/15/security-update-1.6.3-released",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
"Release Notes"
]
}
]

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45853",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T02:15:09.323",
"lastModified": "2024-11-21T08:27:29.250",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:41:31.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -91,8 +91,24 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3",
"matchCriteriaId": "BCAD5846-089D-4749-88B4-20243BC19B29"
"versionEndExcluding": "1.3.1",
"matchCriteriaId": "D9777259-9187-4F85-AF5A-48C12FD65A2F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smihica:pyminizip:*:*:*:*:*:python:*:*",
"versionEndIncluding": "0.2.6",
"matchCriteriaId": "5C7D42DB-C5AE-41AF-A6DB-A9B12E064DDE"
}
]
}
@ -102,11 +118,17 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/24/10",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356",
@ -141,19 +163,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://pypi.org/project/pyminizip/#history",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-18",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231130-0009/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.winimage.com/zLibDll/minizip.html",
@ -164,11 +199,17 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/20/9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/24/10",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356",
@ -203,19 +244,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://pypi.org/project/pyminizip/#history",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-18",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231130-0009/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.winimage.com/zLibDll/minizip.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47246",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-10T06:15:30.510",
"lastModified": "2024-11-21T08:30:02.010",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:20:48.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4762",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.677",
"lastModified": "2024-11-21T08:35:55.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T18:21:05.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -169,7 +169,6 @@
"url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -206,7 +205,7 @@
"source": "chrome-cve-admin@google.com",
"tags": [
"Patch",
"Vendor Advisory"
"Third Party Advisory"
]
},
{
@ -242,7 +241,6 @@
"url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -279,7 +277,7 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
"Third Party Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49103",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-21T22:15:08.277",
"lastModified": "2024-11-21T08:32:49.923",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:26:50.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,16 +2,43 @@
"id": "CVE-2023-7005",
"sourceIdentifier": "cret@cert.org",
"published": "2024-12-19T18:15:06.313",
"lastModified": "2024-12-19T18:15:06.313",
"lastModified": "2024-12-20T18:15:25.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication, and can be utilized to compromise the lock, such as through revealing the unlockKey field."
},
{
"lang": "es",
"value": "Se puede enviar un mensaje especialmente manipulado a la aplicaci\u00f3n TTLock que degrada el protocolo de cifrado utilizado para la comunicaci\u00f3n y puede utilizarse para comprometer la cerradura, por ejemplo, revelando el campo unlockKey."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10555",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-12-20T06:15:22.450",
"lastModified": "2024-12-20T06:15:22.450",
"lastModified": "2024-12-20T17:15:07.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "The WordPress Button Plugin MaxButtons WordPress plugin before 9.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/fcc97635-e939-4cb4-9851-6f6ac4f6ad47/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10706",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-12-20T06:15:22.710",
"lastModified": "2024-12-20T06:15:22.710",
"lastModified": "2024-12-20T17:15:07.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "The Download Manager WordPress plugin before 3.3.03 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/01193420-9a4c-4961-93b6-aa2e37e36be1/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11108",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-12-20T06:15:22.827",
"lastModified": "2024-12-20T06:15:22.827",
"lastModified": "2024-12-20T17:15:07.447",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "The Serious Slider WordPress plugin before 1.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7790af9d-621b-474c-b28c-c774e2a292bb/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11576",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:16.693",
"lastModified": "2024-11-22T21:15:16.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:36:12.133",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,16 +71,50 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3",
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
}
]
}
]
}
],
"references": [
{
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1607/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11577",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:16.810",
"lastModified": "2024-11-22T21:15:16.810",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:36:00.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3",
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
}
]
}
]
}
],
"references": [
{
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1608/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11579",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:17.027",
"lastModified": "2024-11-22T21:15:17.027",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:35:51.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3",
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
}
]
}
]
}
],
"references": [
{
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1610/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11580",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:17.133",
"lastModified": "2024-11-22T21:15:17.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:35:39.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,16 +71,50 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3",
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
}
]
}
]
}
],
"references": [
{
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1611/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11581",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:17.257",
"lastModified": "2024-11-22T21:15:17.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:32:03.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3",
"matchCriteriaId": "43DD8506-9BCC-4827-9347-D728392947F2"
}
]
}
]
}
],
"references": [
{
"url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0&_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1612/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11984",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-12-19T04:15:05.127",
"lastModified": "2024-12-19T04:15:05.127",
"lastModified": "2024-12-20T18:15:26.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A unrestricted upload of file with dangerous type vulnerability in epaper draft function in Corporate Training Management System before 10.13 allows remote authenticated users to bypass file upload restrictions and perform arbitrary system commands with SYSTEM privilege via a crafted ZIP file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga sin restricciones de archivos con un tipo peligroso en la funci\u00f3n de borrador de documento electr\u00f3nico en Corporate Training Management System anterior a la versi\u00f3n 10.13 permite a usuarios remotos autenticados eludir las restricciones de carga de archivos y ejecutar comandos arbitrarios del sistema con privilegios de SYSTEM a trav\u00e9s de un archivo ZIP manipulado espec\u00edficamente."
}
],
"metrics": {
@ -55,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12569",
"sourceIdentifier": "cf45122d-9d50-442a-9b23-e05cde9943d8",
"published": "2024-12-19T09:16:13.830",
"lastModified": "2024-12-19T09:16:13.830",
"lastModified": "2024-12-20T18:15:27.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Disclosure of sensitive information in HikVision camera driver's log file in XProtect Device Pack allows an attacker to read camera credentials stored in the Recording Server under specific conditions."
},
{
"lang": "es",
"value": "La divulgaci\u00f3n de informaci\u00f3n confidencial en el archivo de registro del controlador de la c\u00e1mara HikVision en XProtect Device Pack permite a un atacante leer las credenciales de la c\u00e1mara almacenadas en el servidor de grabaci\u00f3n bajo condiciones espec\u00edficas."
}
],
"metrics": {
@ -55,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12672",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-12-19T21:15:07.627",
"lastModified": "2024-12-19T21:15:07.627",
"lastModified": "2024-12-20T18:15:27.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A third-party vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de terceros en Rockwell Automation Arena\u00ae que podr\u00eda permitir que un actor de amenazas escriba m\u00e1s all\u00e1 de los l\u00edmites de la memoria asignada en un archivo DOE. Si se explota, un actor de amenazas podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario. Para explotar esta vulnerabilidad, un usuario leg\u00edtimo debe ejecutar el c\u00f3digo malicioso manipulado por el actor de amenazas."
}
],
"metrics": {
@ -57,6 +61,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1713.html",

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2024-12677",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-20T17:15:07.757",
"lastModified": "2024-12-20T17:15:07.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://downloadcenter.deltaww.com/en-US/DownloadCenter?v=1&q=dtm&sort_expr=cdate&sort_dir=DESC",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-354-03",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21549",
"sourceIdentifier": "report@snyk.io",
"published": "2024-12-20T05:15:06.780",
"lastModified": "2024-12-20T05:15:06.780",
"lastModified": "2024-12-20T17:15:07.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -89,6 +89,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21855",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-11-21T15:15:26.940",
"lastModified": "2024-11-21T16:15:22.370",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:05:24.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayuresh82:gocast:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D05D6000-69B5-4BE9-8E11-3BB4EC5A575F"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1962",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1962",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23225",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-05T20:16:01.370",
"lastModified": "2024-12-20T16:51:15.130",
"lastModified": "2024-12-20T17:08:54.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -94,16 +94,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23231",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:47.780",
"lastModified": "2024-12-05T16:27:10.467",
"lastModified": "2024-12-20T17:09:06.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,16 +80,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
},
{
"vulnerable": true,
@ -134,21 +134,24 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -197,21 +200,24 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23235",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:47.970",
"lastModified": "2024-12-06T02:36:27.937",
"lastModified": "2024-12-20T17:08:50.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -90,16 +90,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
},
{
"vulnerable": true,
@ -149,28 +149,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -219,28 +223,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23246",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:48.337",
"lastModified": "2024-12-06T02:02:26.433",
"lastModified": "2024-12-20T17:09:02.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -90,16 +90,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
},
{
"vulnerable": true,
@ -149,28 +149,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -219,28 +223,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23257",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:48.760",
"lastModified": "2024-12-06T15:07:41.487",
"lastModified": "2024-12-20T17:08:48.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
@ -107,28 +107,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -170,28 +174,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/23",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/26",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23259",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:48.847",
"lastModified": "2024-12-13T16:49:32.297",
"lastModified": "2024-12-20T17:08:58.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,16 +60,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
},
{
"vulnerable": true,
@ -101,7 +101,8 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -129,7 +130,8 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23278",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.647",
"lastModified": "2024-12-07T02:21:44.657",
"lastModified": "2024-12-20T17:09:14.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -90,16 +90,16 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.6",
"matchCriteriaId": "E4D5AB12-A4B6-4456-A560-DD1FFE8E8CA8"
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.4",
"matchCriteriaId": "E9F4BB50-D14B-4807-8F38-69ADFCE433BC"
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438"
},
{
"vulnerable": true,
@ -150,28 +150,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
"source": "product-security@apple.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -227,28 +231,32 @@
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/24",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/25",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23897",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-01-24T18:15:09.370",
"lastModified": "2024-11-21T08:58:39.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:30:33.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -190,7 +190,11 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/the-anatomy-of-a-jenkins-vulnerability-cve-2024-23897-revealed-1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28892",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-11-21T15:15:29.007",
"lastModified": "2024-11-21T16:15:23.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T17:05:48.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayuresh82:gocast:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D05D6000-69B5-4BE9-8E11-3BB4EC5A575F"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1960",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38861",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-09-27T09:15:02.873",
"lastModified": "2024-12-11T02:59:59.170",
"lastModified": "2024-12-20T18:57:56.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -115,9 +115,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tomtretbar:mikrotik:*:*:*:*:*:checkmk:*:*",
"versionStartIncluding": "2.0.0",
"versionEndIncluding": "2.5.5",
"matchCriteriaId": "2D5CB426-4414-4CCD-8E0F-A4ADE860A8D9"
"matchCriteriaId": "A47E4014-102B-4584-8F41-372C2D609AA3"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4331",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-01T13:15:52.343",
"lastModified": "2024-11-21T09:42:38.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:22:46.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,62 +81,149 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.118",
"matchCriteriaId": "6581DD86-223C-40F6-8879-D7E358A355AE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/335003891",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/335003891",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4368",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-01T13:15:52.390",
"lastModified": "2024-11-21T09:42:42.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:23:03.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,62 +59,161 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.118",
"matchCriteriaId": "6581DD86-223C-40F6-8879-D7E358A355AE"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/333508731",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/333508731",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44195",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.313",
"lastModified": "2024-12-20T04:15:05.313",
"lastModified": "2024-12-20T17:15:14.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to read arbitrary files."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44211",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.410",
"lastModified": "2024-12-20T04:15:05.410",
"lastModified": "2024-12-20T17:15:15.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sequoia 15.1. An app may be able to access user-sensitive data."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44231",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.620",
"lastModified": "2024-12-20T04:15:05.620",
"lastModified": "2024-12-20T17:15:15.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.1. A person with physical access to a Mac may be able to bypass Login Window during a software update."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://support.apple.com/en-us/121564",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44292",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.713",
"lastModified": "2024-12-20T04:15:05.713",
"lastModified": "2024-12-20T17:15:15.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. An app may be able to access sensitive user data."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44293",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.800",
"lastModified": "2024-12-20T04:15:05.800",
"lastModified": "2024-12-20T17:15:15.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. A user may be able to view sensitive user information."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44298",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.893",
"lastModified": "2024-12-20T04:15:05.893",
"lastModified": "2024-12-20T17:15:16.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.1. An app may be able to access information about a user's contacts."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4558",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-07T19:15:08.577",
"lastModified": "2024-11-21T09:43:06.137",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:18:09.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,86 +81,225 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.155",
"matchCriteriaId": "85B5F2FF-0514-421A-8FBF-A7CFEA7F2294"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.6",
"matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.6",
"matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.6",
"matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.6",
"matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/15",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/337766133",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/15",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/16",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/337766133",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4577",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T20:15:09.550",
"lastModified": "2024-11-21T09:43:08.587",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T18:45:19.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,9 +95,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.29",
"matchCriteriaId": "A8DF5D29-9ADB-4CE9-9DCE-9FFECA97800C"
"matchCriteriaId": "7DC2EEF8-834B-42A1-8DA3-0C2CF22A7070"
},
{
"vulnerable": true,
@ -144,7 +144,7 @@
"source": "security@php.net",
"tags": [
"Mailing List",
"Release Notes"
"Third Party Advisory"
]
},
{
@ -197,7 +197,8 @@
"source": "security@php.net",
"tags": [
"Exploit",
"Issue Tracking"
"Issue Tracking",
"Patch"
]
},
{
@ -236,16 +237,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/",
"source": "security@php.net",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
"source": "security@php.net",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -288,7 +287,7 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Release Notes"
"Third Party Advisory"
]
},
{
@ -333,7 +332,8 @@
"url": "https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
"Exploit",
"Third Party Advisory"
]
},
{
@ -341,7 +341,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
"Issue Tracking",
"Patch"
]
},
{
@ -380,16 +381,14 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
"Mailing List"
]
},
{
@ -429,11 +428,19 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5160",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-22T16:15:11.087",
"lastModified": "2024-11-21T09:47:05.947",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:14:27.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,38 +81,114 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "125.0.6422.76",
"matchCriteriaId": "3C0A06C7-8D33-4887-B12D-B009D878FF2A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/338161969",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/338161969",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KEVD4433KTOCYY6V4I7MMYKQ6URUS4L/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX6IYZ6XF7B2WE66NFPNI2NHWJFI6VDF/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-54150",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-19T19:15:07.747",
"lastModified": "2024-12-19T19:15:07.747",
"lastModified": "2024-12-20T18:15:29.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "cjwt is a C JSON Web Token (JWT) Implementation. Algorithm confusion occurs when a system improperly verifies the type of signature used, allowing attackers to exploit the lack of distinction between signing methods. If the system doesn't differentiate between an HMAC signed token and an RS/EC/PS signed token during verification, it becomes vulnerable to this kind of attack. For instance, an attacker could craft a token with the alg field set to \"HS256\" while the server expects an asymmetric algorithm like \"RS256\". The server might mistakenly use the wrong verification method, such as using a public key as the HMAC secret, leading to unauthorised access. For RSA, the key can be computed from a few signatures. For Elliptic Curve (EC), two potential keys can be recovered from one signature. This can be used to bypass the signature mechanism if an application relies on asymmetrically signed tokens. This issue has been addressed in version 2.3.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "cjwt es una implementaci\u00f3n de token web JSON (JWT) en C. La confusi\u00f3n de algoritmos ocurre cuando un sistema verifica incorrectamente el tipo de firma utilizada, lo que permite a los atacantes explotar la falta de distinci\u00f3n entre los m\u00e9todos de firma. Si el sistema no diferencia entre un token firmado HMAC y un token firmado RS/EC/PS durante la verificaci\u00f3n, se vuelve vulnerable a este tipo de ataque. Por ejemplo, un atacante podr\u00eda crear un token con el campo alg establecido en \"HS256\" mientras que el servidor espera un algoritmo asim\u00e9trico como \"RS256\". El servidor podr\u00eda usar por error el m\u00e9todo de verificaci\u00f3n incorrecto, como usar una clave p\u00fablica como secreto HMAC, lo que lleva a un acceso no autorizado. Para RSA, la clave se puede calcular a partir de algunas firmas. Para Elliptic Curve (EC), se pueden recuperar dos claves potenciales de una firma. Esto se puede utilizar para eludir el mecanismo de firma si una aplicaci\u00f3n depende de tokens firmados asim\u00e9tricamente. Este problema se ha solucionado en la versi\u00f3n 2.3.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
@ -55,12 +59,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-54538",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T01:15:06.927",
"lastModified": "2024-12-20T01:15:06.927",
"lastModified": "2024-12-20T18:15:30.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A denial-of-service issue was addressed with improved input validation. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, tvOS 18.1, macOS Sonoma 14.7.1, watchOS 11.1, macOS Ventura 13.7.1. A remote attacker may be able to cause a denial-of-service."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121563",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55470",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-20T16:15:23.977",
"lastModified": "2024-12-20T16:15:23.977",
"lastModified": "2024-12-20T18:15:30.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Kaushikjoshi/2d8ad350ba5e72030fcee2536498cfe4",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55471",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-20T16:15:24.120",
"lastModified": "2024-12-20T16:15:24.120",
"lastModified": "2024-12-20T18:15:30.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Oqtane Framework is vulnerable to Insecure Direct Object Reference (IDOR) in Oqtane.Controllers.UserController. This allows unauthorized users to access sensitive information of other users by manipulating the id parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/oqtane/oqtane.framework/pull/4880/files",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56327",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-19T23:15:07.147",
"lastModified": "2024-12-19T23:15:07.147",
"lastModified": "2024-12-20T18:15:31.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7339",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-01T04:15:05.320",
"lastModified": "2024-08-23T16:53:31.643",
"lastModified": "2024-12-20T17:37:05.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -160,24 +160,49 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:dvr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB471339-6C04-439B-BD9C-E24C9AAE8533"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tvt:td-2104ts-cl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "041D05A2-AAC2-4C8C-BE37-2689A0660A68"
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F0BD8D-86EC-4FDD-8233-F976EDE2E059"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8A9FEABE-417A-4C66-9DBE-9134AE578C2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "837DBE02-ECF9-4339-8B3B-1CD1F1748F87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A5337128-593E-4CBB-8FA0-FB247C399356"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "88125319-423B-4C91-9B1C-E342B6AEA298"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "588453E2-7B29-4E8F-B057-8E9583AB2D1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:provision-isr:sh-4050a5-5l\\(mm\\)_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "06716F9E-6E87-45FB-8B7F-D83600556D33"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tvt:td-2108ts-hp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FFDCC816-5F0C-4620-87CA-26FF282160DC"
"criteria": "cpe:2.3:h:provision-isr:sh-4050a5-5l\\(mm\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE711370-1732-4BAD-B2CE-C0B0516E93F1"
}
]
}
@ -192,8 +217,38 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:provision-isr:dvr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5C3CC2-6720-43E7-BC54-FB3EDDD80C13"
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3480B92A-91A1-4513-89D9-DF9C3C223271"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5325B77-45BF-4699-B74D-CEBC86879753"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "45AD5F3A-5C00-4D78-AAB1-84B266E66BC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7319DE1D-9D81-4606-9FE6-EAEB8BA58DE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A5F15CBC-553A-4CE4-B093-BFA125D9782E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "613AEF48-C8A6-4921-8E4F-8130673E5703"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:avision_av108t_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FDB4193C-20CB-4D46-BBC4-FAA33326BBE7"
}
]
},
@ -203,8 +258,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:provision-isr:sh-4050a5-5l\\(mm\\):*:*:*:*:*:*:*:*",
"matchCriteriaId": "885D1A58-9A4C-43A1-8174-46E65E4A6F1D"
"criteria": "cpe:2.3:h:tvt:avision_av108t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "342B2170-958A-47C5-A3BA-DE7A22A1CD6A"
}
]
}
@ -219,8 +274,38 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:artion-sec:dvr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF72C99-0627-4A39-8875-76817D0771A5"
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07B0F4D4-4D1B-4CCF-843F-3E3EA345C9D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4FFAF8E9-FF11-487E-8808-611ED540241D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "512B7BDB-4310-4206-A273-C5F20C2DB26A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "08BB0DA9-AD29-4776-869E-516BD60FA4F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A69090E6-3C36-45F5-82E7-2656E59039D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C5B90-8FE3-4DE7-AD7C-547D203693C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2104ts-cl_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "898DDB25-73B8-43A1-A5DA-852B40FE1B4E"
}
]
},
@ -230,8 +315,65 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:artion-sec:av108t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF52CECB-EFFA-491A-BEE1-2C2649B393DD"
"criteria": "cpe:2.3:h:tvt:td-2104ts-cl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26307205-124C-4A1D-B2F2-24504760D79C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9EB09A-CAD5-4FCA-AED3-4FF98B01F1B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.3.20657b180918.d06.u2\\(4a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7C74C7B5-04E3-460A-82A6-1D84CEF66E3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d00.u1\\(4a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "68520B3C-4986-4569-957C-85B0CA39DB98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d14.u1\\(8a41t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7205D233-C959-491B-846D-6A203F5EA443"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.22966b181219.d44.u1\\(16a82t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9BDA93F9-D661-458C-B89A-2C16A42BEE79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.24513b190218.d00.u1\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E525793F-5F6F-4078-85FC-4A56B5078BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tvt:td-2108ts-hp_firmware:1.3.4.24879b190222.d00.u2\\(8a21s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A1FB66ED-009B-425E-876E-07D6002DF46F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tvt:td-2108ts-hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D19AC196-4BDC-44E9-BE14-418D4BED8A16"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8805",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:18.660",
"lastModified": "2024-11-22T21:15:18.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T18:05:47.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,12 +71,42 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bluez:bluez:5.77:*:*:*:*:*:*:*",
"matchCriteriaId": "55E1D2F1-2073-4451-8D1A-A60DDD0E2ABD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1229/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8806",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:18.770",
"lastModified": "2024-11-22T21:15:18.770",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:56:56.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.8",
"matchCriteriaId": "F0281C89-647C-4620-B1B1-7E2A503A3D0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndExcluding": "6.6.7",
"matchCriteriaId": "EF2C8255-9D77-40F2-94FE-7C380C84FA4B"
}
]
}
]
}
],
"references": [
{
"url": "https://cohesive.net/support/security-responses/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1230/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8807",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:18.880",
"lastModified": "2024-11-22T21:15:18.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:56:46.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.8",
"matchCriteriaId": "F0281C89-647C-4620-B1B1-7E2A503A3D0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndExcluding": "6.6.7",
"matchCriteriaId": "EF2C8255-9D77-40F2-94FE-7C380C84FA4B"
}
]
}
]
}
],
"references": [
{
"url": "https://cohesive.net/support/security-responses/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1231/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8808",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:18.993",
"lastModified": "2024-11-22T21:15:18.993",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-20T17:46:19.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,14 +73,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.8",
"matchCriteriaId": "F0281C89-647C-4620-B1B1-7E2A503A3D0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cohesive:vns3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndExcluding": "6.6.7",
"matchCriteriaId": "EF2C8255-9D77-40F2-94FE-7C380C84FA4B"
}
]
}
]
}
],
"references": [
{
"url": "https://cohesive.net/support/security-responses/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1232/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8968",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-12-20T06:15:23.110",
"lastModified": "2024-12-20T06:15:23.110",
"lastModified": "2024-12-20T17:15:21.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "The WordPress Button Plugin MaxButtons WordPress plugin before 9.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/cab4d23e-e857-4b2f-b1ca-fbafd37524e0/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9689",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-05T06:15:06.360",
"lastModified": "2024-11-07T20:35:16.807",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-20T18:59:47.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -94,6 +94,7 @@
"url": "https://wpscan.com/vulnerability/ea501d37-1ec2-43ec-873a-ec204e965f60/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-20T17:00:21.908448+00:00
2024-12-20T19:00:21.539113+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-20T16:52:43.217000+00:00
2024-12-20T18:59:47.850000+00:00
```
### Last Data Feed Release
@ -33,59 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274485
274486
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `1`
- [CVE-2024-10385](CVE-2024/CVE-2024-103xx/CVE-2024-10385.json) (`2024-12-20T16:15:21.523`)
- [CVE-2024-12840](CVE-2024/CVE-2024-128xx/CVE-2024-12840.json) (`2024-12-20T16:15:23.417`)
- [CVE-2024-55186](CVE-2024/CVE-2024-551xx/CVE-2024-55186.json) (`2024-12-20T16:15:23.853`)
- [CVE-2024-55470](CVE-2024/CVE-2024-554xx/CVE-2024-55470.json) (`2024-12-20T16:15:23.977`)
- [CVE-2024-55471](CVE-2024/CVE-2024-554xx/CVE-2024-55471.json) (`2024-12-20T16:15:24.120`)
- [CVE-2024-56337](CVE-2024/CVE-2024-563xx/CVE-2024-56337.json) (`2024-12-20T16:15:24.260`)
- [CVE-2024-56348](CVE-2024/CVE-2024-563xx/CVE-2024-56348.json) (`2024-12-20T15:15:05.507`)
- [CVE-2024-56349](CVE-2024/CVE-2024-563xx/CVE-2024-56349.json) (`2024-12-20T15:15:08.300`)
- [CVE-2024-56350](CVE-2024/CVE-2024-563xx/CVE-2024-56350.json) (`2024-12-20T15:15:08.513`)
- [CVE-2024-56351](CVE-2024/CVE-2024-563xx/CVE-2024-56351.json) (`2024-12-20T15:15:08.720`)
- [CVE-2024-56352](CVE-2024/CVE-2024-563xx/CVE-2024-56352.json) (`2024-12-20T15:15:08.970`)
- [CVE-2024-56353](CVE-2024/CVE-2024-563xx/CVE-2024-56353.json) (`2024-12-20T15:15:09.183`)
- [CVE-2024-56354](CVE-2024/CVE-2024-563xx/CVE-2024-56354.json) (`2024-12-20T15:15:09.400`)
- [CVE-2024-56355](CVE-2024/CVE-2024-563xx/CVE-2024-56355.json) (`2024-12-20T15:15:09.630`)
- [CVE-2024-56356](CVE-2024/CVE-2024-563xx/CVE-2024-56356.json) (`2024-12-20T15:15:09.847`)
- [CVE-2024-12677](CVE-2024/CVE-2024-126xx/CVE-2024-12677.json) (`2024-12-20T17:15:07.757`)
### CVEs modified in the last Commit
Recently modified CVEs: `30`
Recently modified CVEs: `64`
- [CVE-2024-0012](CVE-2024/CVE-2024-00xx/CVE-2024-0012.json) (`2024-12-20T15:47:59.293`)
- [CVE-2024-11297](CVE-2024/CVE-2024-112xx/CVE-2024-11297.json) (`2024-12-20T16:15:22.107`)
- [CVE-2024-12014](CVE-2024/CVE-2024-120xx/CVE-2024-12014.json) (`2024-12-20T16:15:23.030`)
- [CVE-2024-12356](CVE-2024/CVE-2024-123xx/CVE-2024-12356.json) (`2024-12-20T15:25:37.347`)
- [CVE-2024-23225](CVE-2024/CVE-2024-232xx/CVE-2024-23225.json) (`2024-12-20T16:51:15.130`)
- [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-12-20T16:51:47.810`)
- [CVE-2024-26792](CVE-2024/CVE-2024-267xx/CVE-2024-26792.json) (`2024-12-20T16:15:54.653`)
- [CVE-2024-26793](CVE-2024/CVE-2024-267xx/CVE-2024-26793.json) (`2024-12-20T15:56:00.320`)
- [CVE-2024-26800](CVE-2024/CVE-2024-268xx/CVE-2024-26800.json) (`2024-12-20T15:55:10.150`)
- [CVE-2024-26801](CVE-2024/CVE-2024-268xx/CVE-2024-26801.json) (`2024-12-20T15:52:36.293`)
- [CVE-2024-27122](CVE-2024/CVE-2024-271xx/CVE-2024-27122.json) (`2024-12-20T15:48:58.860`)
- [CVE-2024-27126](CVE-2024/CVE-2024-271xx/CVE-2024-27126.json) (`2024-12-20T15:49:05.487`)
- [CVE-2024-32113](CVE-2024/CVE-2024-321xx/CVE-2024-32113.json) (`2024-12-20T16:51:57.577`)
- [CVE-2024-37085](CVE-2024/CVE-2024-370xx/CVE-2024-37085.json) (`2024-12-20T16:52:43.217`)
- [CVE-2024-37383](CVE-2024/CVE-2024-373xx/CVE-2024-37383.json) (`2024-12-20T16:52:05.623`)
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-12-20T16:35:41.330`)
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-12-20T16:15:33.687`)
- [CVE-2024-40711](CVE-2024/CVE-2024-407xx/CVE-2024-40711.json) (`2024-12-20T16:35:59.103`)
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-12-20T16:38:02.830`)
- [CVE-2024-47732](CVE-2024/CVE-2024-477xx/CVE-2024-47732.json) (`2024-12-20T15:44:01.303`)
- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2024-12-20T15:04:26.097`)
- [CVE-2024-53677](CVE-2024/CVE-2024-536xx/CVE-2024-53677.json) (`2024-12-20T16:15:23.723`)
- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-20T15:21:39.287`)
- [CVE-2024-7726](CVE-2024/CVE-2024-77xx/CVE-2024-7726.json) (`2024-12-20T16:15:24.403`)
- [CVE-2024-9474](CVE-2024/CVE-2024-94xx/CVE-2024-9474.json) (`2024-12-20T16:49:55.993`)
- [CVE-2024-28892](CVE-2024/CVE-2024-288xx/CVE-2024-28892.json) (`2024-12-20T17:05:48.707`)
- [CVE-2024-38861](CVE-2024/CVE-2024-388xx/CVE-2024-38861.json) (`2024-12-20T18:57:56.383`)
- [CVE-2024-4331](CVE-2024/CVE-2024-43xx/CVE-2024-4331.json) (`2024-12-20T17:22:46.783`)
- [CVE-2024-4368](CVE-2024/CVE-2024-43xx/CVE-2024-4368.json) (`2024-12-20T17:23:03.420`)
- [CVE-2024-44195](CVE-2024/CVE-2024-441xx/CVE-2024-44195.json) (`2024-12-20T17:15:14.860`)
- [CVE-2024-44211](CVE-2024/CVE-2024-442xx/CVE-2024-44211.json) (`2024-12-20T17:15:15.053`)
- [CVE-2024-44231](CVE-2024/CVE-2024-442xx/CVE-2024-44231.json) (`2024-12-20T17:15:15.277`)
- [CVE-2024-44292](CVE-2024/CVE-2024-442xx/CVE-2024-44292.json) (`2024-12-20T17:15:15.457`)
- [CVE-2024-44293](CVE-2024/CVE-2024-442xx/CVE-2024-44293.json) (`2024-12-20T17:15:15.843`)
- [CVE-2024-44298](CVE-2024/CVE-2024-442xx/CVE-2024-44298.json) (`2024-12-20T17:15:16.340`)
- [CVE-2024-4558](CVE-2024/CVE-2024-45xx/CVE-2024-4558.json) (`2024-12-20T17:18:09.597`)
- [CVE-2024-4577](CVE-2024/CVE-2024-45xx/CVE-2024-4577.json) (`2024-12-20T18:45:19.983`)
- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-12-20T17:14:27.630`)
- [CVE-2024-54150](CVE-2024/CVE-2024-541xx/CVE-2024-54150.json) (`2024-12-20T18:15:29.847`)
- [CVE-2024-54538](CVE-2024/CVE-2024-545xx/CVE-2024-54538.json) (`2024-12-20T18:15:30.117`)
- [CVE-2024-55470](CVE-2024/CVE-2024-554xx/CVE-2024-55470.json) (`2024-12-20T18:15:30.370`)
- [CVE-2024-55471](CVE-2024/CVE-2024-554xx/CVE-2024-55471.json) (`2024-12-20T18:15:30.730`)
- [CVE-2024-56327](CVE-2024/CVE-2024-563xx/CVE-2024-56327.json) (`2024-12-20T18:15:31.083`)
- [CVE-2024-7339](CVE-2024/CVE-2024-73xx/CVE-2024-7339.json) (`2024-12-20T17:37:05.217`)
- [CVE-2024-8805](CVE-2024/CVE-2024-88xx/CVE-2024-8805.json) (`2024-12-20T18:05:47.173`)
- [CVE-2024-8806](CVE-2024/CVE-2024-88xx/CVE-2024-8806.json) (`2024-12-20T17:56:56.057`)
- [CVE-2024-8807](CVE-2024/CVE-2024-88xx/CVE-2024-8807.json) (`2024-12-20T17:56:46.357`)
- [CVE-2024-8808](CVE-2024/CVE-2024-88xx/CVE-2024-8808.json) (`2024-12-20T17:46:19.670`)
- [CVE-2024-8968](CVE-2024/CVE-2024-89xx/CVE-2024-8968.json) (`2024-12-20T17:15:21.800`)
- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-12-20T18:59:47.850`)
## Download and Usage

View File

@ -65025,7 +65025,7 @@ CVE-2014-0542,0,0,fbbae5aa5bd2b99837b91bc5a55d0d23bc0909ce012aa658a0a70de3681197
CVE-2014-0543,0,0,b274c780f0466077acaf027916a755319f6e77f2db6123359b58b5b34ee1a354,2024-11-21T02:02:21.360000
CVE-2014-0544,0,0,0fa0ea93aa9a3f0a22963adfb2e80712f5ab07190ea3e8b339366579d2c88455,2024-11-21T02:02:21.500000
CVE-2014-0545,0,0,528d5e5b2f44f2a0536e86fe2e8c2c1c24a8ab5b69df4e81e30d9f0fa2293a72,2024-11-21T02:02:21.623000
CVE-2014-0546,0,1,55ac9bdd18a03eadc98dc1e8a4e26bde5e555855a130d1597346cd314df9f2c7,2024-12-20T15:33:24.647000
CVE-2014-0546,0,0,55ac9bdd18a03eadc98dc1e8a4e26bde5e555855a130d1597346cd314df9f2c7,2024-12-20T15:33:24.647000
CVE-2014-0547,0,0,b30a2293b7d47a6ccba0e0df5c871196625c5e65ff5adfc657babd1c1b1be8ed,2024-11-21T02:02:21.870000
CVE-2014-0548,0,0,fb4c5f4dc7a5879154d5c4c94ade40155233e90da3caaeda714406abdcecdd40,2024-11-21T02:02:22.010000
CVE-2014-0549,0,0,0d1e6ae4e25c16d5596402e35fb70d20b3121eb60ba76da993d65abdfa62050a,2024-11-21T02:02:22.150000
@ -72127,7 +72127,7 @@ CVE-2014-8428,0,0,b6d02e02c49a36849b94bfa2e8298b2fdce7ad8f942d2b8e3972a618f499c8
CVE-2014-8429,0,0,ba76cc0b542a1e6ef32a49b2bbf728928dbb9278d43b163f756a0f09365813e3,2024-11-21T02:19:04.347000
CVE-2014-8437,0,0,5f0759d205fb824ffc9f2a5d3bf7275a4e92b524fcf7167b84c824643fc00c2e,2024-11-21T02:19:04.490000
CVE-2014-8438,0,0,09019b643d315e20bd38630e491eef717606dc406acc6fa450a3b164168e8a6f,2024-11-21T02:19:04.613000
CVE-2014-8439,0,1,37264590e8d1c4410cbcf7b0e8d527e2e5c9ebfc2295bbfdf568cfe41847f4b8,2024-12-20T15:33:13.333000
CVE-2014-8439,0,0,37264590e8d1c4410cbcf7b0e8d527e2e5c9ebfc2295bbfdf568cfe41847f4b8,2024-12-20T15:33:13.333000
CVE-2014-8440,0,0,c59e2dd21f18dc4d9270faf0637afef41495fc809d000125cf23ff2f98dfbc56,2024-11-21T02:19:04.877000
CVE-2014-8441,0,0,079dd71d71eaba192d369ef5bef8c303c0b643ab5b684909fe11569d9d3d090e,2024-11-21T02:19:05.007000
CVE-2014-8442,0,0,55b5523b35d331d0247e90863527d0601ee5808be966ff34d107437f3eb1b5df,2024-11-21T02:19:05.137000
@ -72701,7 +72701,7 @@ CVE-2014-9159,0,0,8291b393617f554987feab103f3ce6daa4585c739a4ec9eb8679dd843ddf3b
CVE-2014-9160,0,0,61db40fdcd07dcbe04d1e45ff3bab0b58ca1b636d8f2f7ae0226f15b42558908,2024-11-21T02:20:19.067000
CVE-2014-9161,0,0,989ea6a38561f6a93f8227fc8aa74e2981b55d061c3c5d8f8e3a0f48baafa198,2024-11-21T02:20:19.183000
CVE-2014-9162,0,0,e6a41539b18d793eafd23a996a4d9a2bee3216f076219c2affe6594067e67432,2024-11-21T02:20:19.300000
CVE-2014-9163,0,1,50aa9fb804bf51548e5adf8fb56d6cbd84920001559d8af22d2ab86e888a17b7,2024-12-20T15:32:40.123000
CVE-2014-9163,0,0,50aa9fb804bf51548e5adf8fb56d6cbd84920001559d8af22d2ab86e888a17b7,2024-12-20T15:32:40.123000
CVE-2014-9164,0,0,2563b05438fd704a7dfc65c7c64543ab1fbfd18cb53644ec20ab2640d7555809,2024-11-21T02:20:19.520000
CVE-2014-9165,0,0,15ef39c6f19c2a53b3e86470f783a83cdcc34953a6c7971d6e311d55881c6894,2024-11-21T02:20:19.623000
CVE-2014-9166,0,0,2e4a860f13fedd28e8e852d81eb16862c30c1cf2c907d592f29293128a248d04,2024-11-21T02:20:19.743000
@ -73764,9 +73764,9 @@ CVE-2015-0307,0,0,a65ed1098ff025c2c4bcadd58072f76beb976964e14f3c1bef8f075c54c113
CVE-2015-0308,0,0,66fb6aaa33515371aefd0e332532fd32bfd1b7a59d29d40893b3b7dc52edf7ce,2024-11-21T02:22:47.210000
CVE-2015-0309,0,0,b10430c9604d0e67194403ac5cf78bcd1f9cc1f8eedc9c51a65b7d27332ccc02,2024-11-21T02:22:47.360000
CVE-2015-0310,0,0,f2b3e7a633061f90c37b323cebda45ea27cf1548d97dd9f5d1c9e9294301b76f,2024-11-21T02:22:47.480000
CVE-2015-0311,0,1,c97415c926606830f400f0e31f0f6e8ae4019d0122235f0816a5452560260e02,2024-12-20T15:33:05.107000
CVE-2015-0311,0,0,c97415c926606830f400f0e31f0f6e8ae4019d0122235f0816a5452560260e02,2024-12-20T15:33:05.107000
CVE-2015-0312,0,0,83f4c3c42e755f4100a5e3b670350c469b5dec2be6cb9601117390221a3ed06f,2024-11-21T02:22:47.727000
CVE-2015-0313,0,1,afb51731f024e7489e33793a6f577432acd96d38dce7da9738282c6295980e2c,2024-12-20T15:29:17.507000
CVE-2015-0313,0,0,afb51731f024e7489e33793a6f577432acd96d38dce7da9738282c6295980e2c,2024-12-20T15:29:17.507000
CVE-2015-0314,0,0,8cfdbc8341fa6444aac0f621f0cd99191bed11d672f66f44aec0b40900e95a7b,2024-11-21T02:22:48
CVE-2015-0315,0,0,2a9c122d89e8278f69b82ad7ba11155f5dbeef41b37639827f1ee01a3b57f44e,2024-11-21T02:22:48.120000
CVE-2015-0316,0,0,741ccb2def53c6e62937fb3b7557670d368b8447f100b25f10a5a9246821c87a,2024-11-21T02:22:48.243000
@ -164134,7 +164134,7 @@ CVE-2020-9246,0,0,8d96638980ac3e298778573b587edfb2eccd73fe5e0cafaa8dcafae20f6e42
CVE-2020-9247,0,0,1aa6d00902f7f27e25be09b6735b54522bddd93735908964695deff2c860fc97,2024-11-21T05:40:15.980000
CVE-2020-9248,0,0,ee33905a6909922672d133638d4f88fefda98b796c92d89c724a8a31cb509edb,2024-11-21T05:40:16.183000
CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b514865c,2024-11-21T05:40:16.320000
CVE-2020-9250,0,0,7a91b0eca5467e17bb9946adcda83c7637d6fb534af8e16a41b913562a6ad3a0,2024-12-20T02:15:05.150000
CVE-2020-9250,0,1,7cd2c77402db68aa8cdd8880bcab0f27e8ae1115c47de8f1412e758074f2e474,2024-12-20T18:15:23.860000
CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000
CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000
CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000
@ -200172,7 +200172,7 @@ CVE-2022-32140,0,0,7a9c3b5e767b67e01c6a2a9bb3acc04d7cf1de810331770e75aa5c4a5208d
CVE-2022-32141,0,0,16a67640dfbaae67e72809580d9e4e423033b75e86aa578c1911d7e92b1f7da1,2024-11-21T07:05:49.833000
CVE-2022-32142,0,0,979b129644cf56e0bea6e344238189966dd5be67873e008b080fae6175a4d135,2024-11-21T07:05:50
CVE-2022-32143,0,0,c52290a030e5a93484ef3cd8a1b6ccb290011b10331e4624cf902dca35a033dd,2024-11-21T07:05:50.140000
CVE-2022-32144,0,0,1ac63804ed0a0ec29097ed1c90e27fd60f2c962ddf27e7a9eeddcbeb79aa9ac8,2024-12-20T02:15:05.320000
CVE-2022-32144,0,1,559fb453583b115c15727357a171f240a22be43bda45b367081d3b57b2faea92,2024-12-20T18:15:25.070000
CVE-2022-32145,0,0,ad1c76462e7f77bf1e239e6a5bdcff318df7aae4fb302ac91733071f4fed7172,2024-11-21T07:05:50.277000
CVE-2022-32147,0,0,a2264fd8bcc7d6a0a5e02480b2de1eb82ec9c14ea909f7a9a18a929ccf930bdc,2024-07-02T17:15:03.273000
CVE-2022-32148,0,0,813429af96ec1d6c841eab58ceae185de144d2d98afeb3672c42b661bc4444ec,2024-11-21T07:05:50.420000
@ -222403,7 +222403,7 @@ CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590
CVE-2023-28821,0,0,3b23d992637d21ecb74fbbedbe80ce17d8ac3cda960cc9ac7ffb7824e8f934ee,2024-11-21T07:56:04.903000
CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000
CVE-2023-28824,0,0,4717652e7a590f17e3eab8927d56f9e19eb6043995d6fc66b15276d9d0ffb1e3,2024-11-21T07:56:05.187000
CVE-2023-28826,0,0,061d57499e91aa7f7d7e9a5cdbe935c63e6d5b1984dfae847aae42bb570c0771,2024-12-05T15:30:17.053000
CVE-2023-28826,0,1,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000
CVE-2023-28827,0,0,3ac013fe742eba004aa8f5d9fa84d4e0755b6248eb930477c2f597bc870b283a,2024-09-10T12:09:50.377000
CVE-2023-28828,0,0,c8219201f8c82577f62c395dc963be0ff5d9ef990f6cd114e19b9adaad0853b6,2024-11-21T07:56:06.030000
CVE-2023-28829,0,0,5f3fb9e83e6bf580b695944554c6fe1959e6a17c65d5fb240077ff50f4fa6f71,2024-11-21T07:56:06.343000
@ -225097,7 +225097,7 @@ CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0
CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000
CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000
CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000
CVE-2023-32435,0,0,6bac78abc427ff33571521c6cab6b4bceb7bbc8cb3c895636a3a87721ccf6e68,2024-12-16T20:15:06.797000
CVE-2023-32435,0,1,b24e4897a2c883a2a3bff9c9b95c8b141476683de935eb975ffe17049376ebc2,2024-12-20T17:49:17.260000
CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000
CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000
CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000
@ -226433,7 +226433,7 @@ CVE-2023-34044,0,0,3bf28b57945e4607832313832c430b5fb65d46c8cbcb1b8c59e2ef93d00c2
CVE-2023-34045,0,0,9afcb32c5fdcdba7cbe76a7ff218499970f2930b8d17957abe1c8d9b083dd9fc,2024-11-21T08:06:27.963000
CVE-2023-34046,0,0,de891463245ea21540153bc628af3db12039aef90cd1a7c40b786c28c66e1664,2024-11-21T08:06:28.073000
CVE-2023-34047,0,0,dd1f3437471679f84d2ca3801d99b633bfb46f8ada57f190be29b0047bbb4703,2024-11-21T08:06:28.197000
CVE-2023-34048,0,0,38caf4ce9793e2ebf180709be85a40f86d6039c2e6274e7a7ae8edbfa7ea02a6,2024-11-21T08:06:28.310000
CVE-2023-34048,0,1,a09a38ad92177cb9499aa586b4ef8a5454912e55285ba5f6e04b61a5b71f301c,2024-12-20T17:41:40.150000
CVE-2023-34049,0,0,556fbd76481a221eded8913f53484bd89e12180b483d52729343cbc1abb822ef,2024-11-15T13:58:08.913000
CVE-2023-3405,0,0,0acd5e423ace6877554e6af02437f7ad9780bc7bad91a698cacc1d70c30ab7ad,2024-11-21T08:17:11.903000
CVE-2023-34050,0,0,f746d338a5331d03f2052be91639c9b0334e4efc4d94f21d850928b62ea58299,2024-11-21T08:06:28.600000
@ -226746,7 +226746,7 @@ CVE-2023-34358,0,0,92769c460eef9ee3d564450488411233fb3d0da75dee4d12b3afc7c7c5e8a
CVE-2023-34359,0,0,7ecc56b0c12976fcb35ee302f0bcf60c8817191ebae574a86b814408229bd754,2024-11-21T08:07:05.620000
CVE-2023-3436,0,0,227d61f366fe1850fe1406700366dafd7937f8fe1e6fcfe508e304f713db46c8,2024-11-21T08:17:15.853000
CVE-2023-34360,0,0,e404dc026effd5b416e5c9290ae32165a3c0adced025385ca63db5abb01b8767,2024-11-21T08:07:05.733000
CVE-2023-34362,0,0,fc0723e4a1c0f2ec8367d98701150cae9c1e4246bd554e06bc72031a07a191ed,2024-11-21T08:07:05.843000
CVE-2023-34362,0,1,89b1c2fc079de792e24c4e273f6840a769719bf19e59503a7a61ca7fe478c7d1,2024-12-20T17:49:01.637000
CVE-2023-34363,0,0,dbe01f4420c184b613f6132366b66a6f4c936030470aba7a440f08c87e69fe93,2024-11-21T08:07:06.067000
CVE-2023-34364,0,0,4267b31fff211a0295f4224cdf6955b09165b33da23b38c3e5e0770eab41e5ca,2024-11-21T08:07:06.197000
CVE-2023-34365,0,0,03eacff15cc6c3f35f845ba674e0740023198e8082f506d31bf9c9c88694f107,2024-11-21T08:07:06.330000
@ -227155,7 +227155,7 @@ CVE-2023-35073,0,0,91676ef9234413c20056267f1b23f3fc91186085c28bf58d620ac435fb946
CVE-2023-35074,0,0,adba0e1b83d37e03fc957804d89482b802c40631fb93a2cdcda238f9d2dff867,2024-11-21T08:07:55.583000
CVE-2023-35075,0,0,2953da8da78e493f198bf6289dbc7e5d7641503e5404893e569d48f28539525c,2024-11-21T08:07:55.753000
CVE-2023-35077,0,0,eb14aac67890fa8d1fe987a9cb034d5f686d957f0f0145aaa057938b78feea0d,2024-11-21T08:07:55.893000
CVE-2023-35078,0,0,ae371e0f12add94ed3c7aaf46ab70d9907e49e2eed0b13eb89591a945541a2ff,2024-11-21T08:07:56.027000
CVE-2023-35078,0,1,69d2e841e784de3c352f697667efb6f6e32442f0e8ec9915f09caa28ab2c2b2f,2024-12-20T17:50:19.417000
CVE-2023-3508,0,0,395b7f87ebc096b9954e0550c1d2fe07fbb8e45e4a9326e080b172d48d631a2f,2024-11-21T08:17:25.110000
CVE-2023-35080,0,0,6a6e892a44ab82355b0a0d2a7b8c1b659f457b02b6dbfe75c067e5b09fb17c02,2024-11-21T08:07:56.180000
CVE-2023-35081,0,0,67f6fd2d7e5ef74353cb7a8ab5dd29941445538b161d320bb21d322646ce0ce4,2024-11-21T08:07:56.303000
@ -227439,7 +227439,7 @@ CVE-2023-3567,0,0,5a1746b855d22f3bc6770c426b1bc9a187c738d6a1c14eeb7ccfd2f336b03c
CVE-2023-35670,0,0,38494d55df7fcb1cd50e396b84188fbbbbb79aeb1bb20c46d39f680826b3fe15,2024-11-21T08:08:28.667000
CVE-2023-35671,0,0,2c8339e5588b591eed92ded4f828b3d05b1e6303493784f34dbc335b2b14a7e7,2024-11-21T08:08:28.797000
CVE-2023-35673,0,0,8def3629a98a95d2af28794c62a9db710c67f5ee2b495d5869075b9e4f1d720e,2024-11-21T08:08:28.923000
CVE-2023-35674,0,0,8f54c1433a58d05ca4875c526c141191836172f1b86e27d115b0c90e00be1d8a,2024-11-21T08:08:29.043000
CVE-2023-35674,0,1,a1022b87b8618552c684113a438b1c94efe6e352c747b4eb316fd9df24c62f28,2024-12-20T17:39:49.327000
CVE-2023-35675,0,0,4f3461109a5f32ac0262e94d301fd6c4248144a6d513d16b13cdd315ad00446f,2024-11-21T08:08:29.187000
CVE-2023-35676,0,0,52eba2204d685162de4e8dd545bda62b1652967ee875489ff2421fc06fe9685c,2024-11-21T08:08:29.303000
CVE-2023-35677,0,0,b495dd7d2a9f1baab9298ddda35590e4064f7b554ba2738eb2dd1d976ba83e6d,2024-11-21T08:08:29.460000
@ -229301,7 +229301,7 @@ CVE-2023-38031,0,0,43c38460745214330163d80b63c522d22fbd2236198aabb87c696f44f3f43
CVE-2023-38032,0,0,aa2f8b2079aab5d644970a30e48ac48eb85abbd522684fe17754100401e0e906,2024-11-21T08:12:42.833000
CVE-2023-38033,0,0,4be9698fa9dd0cacdb62bf1057bd9da305a437591f9194cf06d595e16802d334,2024-11-21T08:12:42.970000
CVE-2023-38034,0,0,081598c8b55d3aa43e7d310ebcf31b7ec47c08b5aae01d60a9f9e55b7cdb47cc,2024-11-21T08:12:43.107000
CVE-2023-38035,0,0,b643980268b5e1bb1992090ece6f414a88944b744ba76c2d39229556df25e6e1,2024-11-21T08:12:43.250000
CVE-2023-38035,0,1,92640fff4395ac24e8d5c20e07c44ab0e97351ee018b5491f08a52b994403d7f,2024-12-20T17:50:25.653000
CVE-2023-38039,0,0,aa7b561d4c683a5cad232ce980133262e25984154771669a007453da54145604,2024-11-21T08:12:43.457000
CVE-2023-3804,0,0,f82e32f2db1263f9331724638e062f3a20087ab485797bbd9380b32670e68adc,2024-11-21T08:18:06.293000
CVE-2023-38040,0,0,50ded9b2062da33f47fa19ba0f8f6125ce0832d2b933587cab7df27c962ee968,2024-11-21T08:12:43.633000
@ -230025,7 +230025,7 @@ CVE-2023-38827,0,0,15d6e2facfb6109aa5168ffa504a04d99bba843862c4ade896b7f160a2676
CVE-2023-38829,0,0,f18a04dc8235c21595d960d1c76e0c18e8aba026cbaca717e8d078afcc182e76,2024-11-21T08:14:14.883000
CVE-2023-3883,0,0,634cd7fd7d0f5ced6fd868d96b8d577b8d6108800b9ae362b62f8ad754505ea9,2024-11-21T08:18:17.027000
CVE-2023-38830,0,0,3aba0baa36880c42a16b45890d05f8d90c8dca065e6857a99618f2043633059a,2024-11-21T08:14:15.030000
CVE-2023-38831,0,0,919e699c5b8269e1d68a319e1562e4ac498792f2dd3d81e876282aeb942e94e9,2024-11-21T08:14:15.183000
CVE-2023-38831,0,1,96b48b8190e42a2009e991c600c7fa606e5535a7306c5b4858bcffb9732d651c,2024-12-20T17:50:59.707000
CVE-2023-38836,0,0,c8d0b5eac064ddc2c8e21f03dec759378f4cbdab9f9e1b20532fde2c7d907105,2024-11-21T08:14:15.507000
CVE-2023-38838,0,0,03c3c86b6e2de6d7d4d05ce29ccc32c5a9c18e145373614ddd257b6ba8aa6b15,2024-11-21T08:14:15.650000
CVE-2023-38839,0,0,96961603879de812e272be97e578ad3139d610fe00ac937b20675102efbc4ee5,2024-11-21T08:14:15.807000
@ -233373,7 +233373,7 @@ CVE-2023-43203,0,0,c5f43f330a0aa47742da601ce3685bd755f7f7d9ab6ebb64781eb13ff1399
CVE-2023-43204,0,0,405e036bb3184a7a179a9c4f21ed6c5f9f1635df31afbf5874dc0d62b27b1663,2024-11-21T08:23:49.803000
CVE-2023-43206,0,0,91374bcbd7fa94046c0e01ed4ab2af8ccb38a6185b4d6cce69be85defa8f3e40,2024-11-21T08:23:50.030000
CVE-2023-43207,0,0,73bef3fa73b1104259ad40cd7fc06db4d20cce747ffc2532e824570b3f5f0958,2024-11-21T08:23:50.253000
CVE-2023-43208,0,0,88f0100284cc957bf8e59fb1f74ed1c71888b62902f489d9f8755fa7e8e1ce66,2024-11-21T08:23:50.473000
CVE-2023-43208,0,1,10ff2c3fa5ebbc08b8c1f48bbaddae7b36de320bf7570650b531f3d7a92ff431,2024-12-20T17:41:47.143000
CVE-2023-4321,0,0,085e1cbb7abaeb38d420ac3b379575bc4b47d6929c3ff2b92bda924e6306d7c8,2024-11-21T08:34:51.040000
CVE-2023-43216,0,0,36f34093c9a1885a067dfd71b90fec85477364023b8581b3e15ae8b97b27ff81,2024-11-21T08:23:50.697000
CVE-2023-4322,0,0,1532a8b57387d09ae4c94e72d6fbfa510e33b1660215708f14716f6493a97a7a,2024-11-21T08:34:51.173000
@ -233751,7 +233751,7 @@ CVE-2023-43766,0,0,1874f5bb733291888446fa8e6899fc86b101332f133975cc5c47954254b77
CVE-2023-43767,0,0,71262d6ff27787aa37a9ccff291ff315f630e05676576edeb71c5c04a91a7cf7,2024-11-21T08:24:44.860000
CVE-2023-43768,0,0,f5e6b86fff28d5fbf8ecd9b88f177624082dded6d31ce2200cd91661bd8d2363,2024-11-21T08:24:45.010000
CVE-2023-43769,0,0,06fad532324f780795fc45bdf702308c094ad389cb30e104252dc441d2a47598,2024-11-25T22:15:09.587000
CVE-2023-43770,0,0,96819117ef67a25547e10bf837ba15ecb1dc78eee8a54bb65bd740bc4210bcf7,2024-11-21T08:24:45.360000
CVE-2023-43770,0,1,cdff146a566e12a04d6a3f422def399e9bda5cf5176e2678a567e58ef2db315b,2024-12-20T17:40:26.160000
CVE-2023-43771,0,0,6eb1f0ca5129e4601acf0473c7b9e92e5cddadc9a4e24dc03aed5645d8b80a26,2024-11-21T08:24:45.577000
CVE-2023-43775,0,0,54c6bf3cb2bdce0279ba011963bbb56a47cfae73d52d4b60331f30063fd846a0,2024-11-21T08:24:45.740000
CVE-2023-43776,0,0,a58bc7087928b87d9fbee013f66a621afc7de5495a408df840e5196428d5765b,2024-11-21T08:24:45.880000
@ -234339,7 +234339,7 @@ CVE-2023-44483,0,0,5dd1c78b90b34b78bbcb6b7fd4897fa7d75ea11e70843a99524deb9e80e89
CVE-2023-44484,0,0,958fe48df29f816ed7bd34de4dd7057161c9bf53e67f5f88c174e360d7feb40e,2024-11-21T08:25:58.463000
CVE-2023-44485,0,0,1fded516443ed9d4a6dc21d78fcaff9fa6c633a261c62418d91bd847201a9be3,2024-01-02T16:15:11.810000
CVE-2023-44486,0,0,2b43d0a14e9cca4a775d6d63ef007efbe7181ff5204ebf454cdf39ffb38da42b,2024-01-02T16:15:11.897000
CVE-2023-44487,0,0,45b563ae0f2cec30756484351a788d522e14763ecf6fa8ba45700503e21c7053,2024-11-21T08:25:58.613000
CVE-2023-44487,0,1,3f3c767faf0496ff5190d4944e382f1e1f37cf57070322e8336564f615c4cc14,2024-12-20T17:40:52.067000
CVE-2023-44488,0,0,6d016cc36e101208382fa39cc61bf9a8f9d2e9bfb34d377a1cb64850fe49c283,2024-11-21T08:25:59.403000
CVE-2023-4449,0,0,e25bc1172bad64592332d0ff2b60d985ca8bf0443f05933c4051807b205fefa8,2024-11-21T08:35:10.950000
CVE-2023-4450,0,0,27f28416722497acefc6891c18ba2d3c7e85c5ed65b35fd7cdcbec298d72b3e3,2024-11-21T08:35:11.120000
@ -235100,7 +235100,7 @@ CVE-2023-4585,0,0,2817f87c145f4e19f7fb5b2f9ef5a25943420aac1ebc75d64154fa2f4d3483
CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000
CVE-2023-45851,0,0,80fecaa08aabec651bd5f96bf43e5fb5bd05b25992d4a84aa45b313799793c98,2024-11-21T08:27:28.970000
CVE-2023-45852,0,0,e8be8e4d9b05dc3db2a9206b56fbc6a33ca64656c15b611b5c4f687a4307864b,2024-11-21T08:27:29.100000
CVE-2023-45853,0,0,97db543d361ee03bc16dbb3f16aaa37ccae38ee02a6116214eb4a9046bb40353,2024-11-21T08:27:29.250000
CVE-2023-45853,0,1,7aaa23a31605eca8fd5429fd54fe524527069595801d4d1b7b9603a041cf83c5,2024-12-20T17:41:31.237000
CVE-2023-45854,0,0,9e1ae49a3d09e0271586bdb5cd557f4081b569b806359ca87be8e5f489faf4e8,2024-09-20T12:31:20.110000
CVE-2023-45855,0,0,0e092d0c08023f857ef2f3fd91a438ae0f6fd2ed5dc944c9aebe403789ff7d34,2024-11-21T08:27:29.720000
CVE-2023-45856,0,0,320cc0e1ee595773e36ebdcb0c1183ce0bb27bf06d83c4ba43ad9943e9532936,2024-11-21T08:27:29.880000
@ -236158,7 +236158,7 @@ CVE-2023-47242,0,0,16bd3d3d64cacd173b0167cd7f982783fdb69c0a81e914a2606e4716b69f1
CVE-2023-47243,0,0,30340c6d26e19c59b5978c6e1842ea9075173064b605307a556387765c45d03a,2024-11-21T08:30:01.567000
CVE-2023-47244,0,0,b0ebe338ebe88a1ffec7595b1ee713231f6705784898ca7f5320bbbb8ad00dde,2024-11-21T08:30:01.720000
CVE-2023-47245,0,0,2e557a8574ffa27f286ddb7902bb72def87b3076cdcb7c1d4a5fe3c9fb82458d,2024-11-21T08:30:01.863000
CVE-2023-47246,0,0,80ecfdaaddaa68e961020611d6165d3685b090fd22bcda9e74a116f74abfd466,2024-11-21T08:30:02.010000
CVE-2023-47246,0,1,9ee048611e335d6ef5ca354dafc13239e090cf221f5c631602637916b05657fe,2024-12-20T17:20:48.827000
CVE-2023-47247,0,0,6c0bd6cea993b04ace26b90d46ca9971934088213c7deda52a3ee268f6eb9ab3,2024-11-21T08:30:02.280000
CVE-2023-47248,0,0,ed273fbca0d5159bad81a6f7cbac186f7fdfb1fc723f57ebc3d6ff8172313a41,2024-11-21T08:30:02.447000
CVE-2023-47249,0,0,2c7a90e1d2da420678c292eab4af2a2635e465b566848812fbd6cbfede631d2b,2024-11-21T08:30:02.607000
@ -236382,7 +236382,7 @@ CVE-2023-47616,0,0,b5400301c64d171fb648dd698eb7425d28632d9552e51579aec7970e72fd4
CVE-2023-47617,0,0,c671c14a0e35b7e4b7fcfe6f14521083ede774c2455bf38cd99f02889187d000,2024-11-21T08:30:32.133000
CVE-2023-47618,0,0,995acf587b8f482982ceb508d0e8791ce489e4efaecdd9f89351fb78dc19827e,2024-11-21T08:30:32.277000
CVE-2023-47619,0,0,9d2d3dc38a4dbac2e143f5e95629f63355e9767bb2787ad4114261262b6ba5f4,2024-11-21T08:30:32.397000
CVE-2023-4762,0,0,2e0b5d08ab7d6185cc19331b768de26dd4d00c028d46cf413fa66b09bff50174,2024-11-21T08:35:55.690000
CVE-2023-4762,0,1,7da8162cdaa41009455186cf8b19e27140a727d3d3fe41ffe8a6b959aa6fd124,2024-12-20T18:21:05.033000
CVE-2023-47620,0,0,61bd2331ab391dfd7e97480167dc460b036db6150b0cefe01ddae2f6ded2a0f3,2024-11-21T08:30:32.550000
CVE-2023-47621,0,0,21cf5296251eccb402f361f641b2582b10c147d58de1ac4c2ade388e61a75375,2024-11-21T08:30:32.687000
CVE-2023-47622,0,0,f7c70ead952a5530a68be1db20b722e26c969ff836e3ef37efb5417689bca4f1,2024-11-21T08:30:32.830000
@ -237517,7 +237517,7 @@ CVE-2023-4910,0,0,d9462c36fb722b682c764276e6fcf32ffb6c6c77a4823140352ddfdc8e5d36
CVE-2023-49100,0,0,14b827de72c6f2476cae991faf762a7c0ebf71e1c78301f5cd1c6800f5f2cb87,2024-11-21T08:32:49.403000
CVE-2023-49101,0,0,dd10c9d64d2f38b78c445873ccd7284113d1dae289617a767413e999aeb421d9,2024-11-21T08:32:49.620000
CVE-2023-49102,0,0,7720153c7a021899a76b16646f6f7971df2f17668e8e3ccae3b3684f9743b90f,2024-11-21T08:32:49.773000
CVE-2023-49103,0,0,fe53937c3112531a53327787a1602e75ee8be13af5a409cd81e22164574b01c6,2024-11-21T08:32:49.923000
CVE-2023-49103,0,1,3f33d839b382b0e2219cb7c3a407cb478ab76b5d8ff92fd036b0c64d9a39ce79,2024-12-20T17:26:50.947000
CVE-2023-49104,0,0,88e52f0db8231bfb716b52deb4721e9ff67988071fdbfbbe2cc30e8e20268781,2024-11-21T08:32:50.100000
CVE-2023-49105,0,0,57ea19ba2757cb0204c2ecac3a330f28472b520b37e1e16a099f8ba9ee500a97,2024-11-21T08:32:50.267000
CVE-2023-49106,0,0,af1d530882fae69f2f5601e08d91b3477b2e86275ef0f5d38e8ffbb551764592,2024-11-21T08:32:50.420000
@ -241890,7 +241890,7 @@ CVE-2023-6999,0,0,20badeb2c238d441cb421c48ace480ea27b8151e674b990be35a0786113f4d
CVE-2023-7002,0,0,84396c0bdf73e170d66b798921a49a9f0a13dde1ac20a4cf4c9ca68c4bd2e87e,2024-11-21T08:45:00.317000
CVE-2023-7003,0,0,090dbcb22a27ae8d1249b5396e7cb61a556fd7edf17cf3f654f7795066af7307,2024-11-21T08:45:00.443000
CVE-2023-7004,0,0,2b0a1c3f594514067c80c828d3cdf50833ef4cd40d9bad21bf097cc6e6910593,2024-11-21T08:45:00.633000
CVE-2023-7005,0,0,06324bd3ddead253be014782a15f4b191f6b96547c2707715a8cd1e2c38b2ab9,2024-12-19T18:15:06.313000
CVE-2023-7005,0,1,0d8f11c042b16ba2828314b032db06ee679fd72e36b1ca79c0dd5903b653acfb,2024-12-20T18:15:25.777000
CVE-2023-7006,0,0,4ed87f24fa2ac772a2f7b727b0e300912c42583637b6187ad692e5891d6c6604,2024-11-21T08:45:00.817000
CVE-2023-7007,0,0,f5e78178645c6c2c5f772707ce2e5c5b75e98e2d2f30a88b209671633b387a46,2024-11-21T08:45:00.997000
CVE-2023-7008,0,0,8f61c119937be8edfdf7101f886737120021ea2a8349db9b1b71fa74e2a2c59a,2024-11-22T12:15:17.590000
@ -242155,7 +242155,7 @@ CVE-2024-0008,0,0,f3a0e819c9497c2b0a342098a12d293c5c599f8657da82ca7edaa709641c72
CVE-2024-0009,0,0,2705c70b35d4cbd0491e81eb024f836acd6b6b1ca2b25c3adbf3699cab842c62,2024-12-09T15:13:34.713000
CVE-2024-0010,0,0,31a4fe9c570d054c731419e8dbca609fd313e658d7d97a146536a70ebab80db7,2024-12-09T15:08:43.783000
CVE-2024-0011,0,0,0cdc1a416dec7958965d013c501cb250e08e95b67733c03001a98f99c411ee1c,2024-12-09T15:05:57.857000
CVE-2024-0012,0,1,93cccc6ea5c711652172ca0de063d48a9408dc8b9bd12e62a1b6d2395fd8db9b,2024-12-20T15:47:59.293000
CVE-2024-0012,0,0,93cccc6ea5c711652172ca0de063d48a9408dc8b9bd12e62a1b6d2395fd8db9b,2024-12-20T15:47:59.293000
CVE-2024-0014,0,0,265161d9949465d3602447cae25f01c0800ff61c134bf258208b213d42b830ab,2024-12-13T20:04:22.733000
CVE-2024-0015,0,0,ac153671c8f32bfd786c082dd9dcbf06514472c0792e3af9411b311c680fd9cc,2024-12-16T14:39:02.223000
CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b99,2024-12-16T14:33:13.613000
@ -243357,7 +243357,7 @@ CVE-2024-1038,0,0,b9222a411b1bc3d07cf4c05f9c610f06b56f337f87abb77c0147739734ce67
CVE-2024-10380,0,0,aef46b3de7d53b555c16faf90957b5795e7ff38edc57bb3987b023ae2ffcb5c0,2024-11-01T16:11:00.217000
CVE-2024-10381,0,0,487fc7c9d16cacf4d1afd228d87369ba897cce3ee6a5ff470497aebb255413ac,2024-11-14T21:44:53.280000
CVE-2024-10382,0,0,1c875f1ae2ed66eebbc6e7f1a875f8ec0ccb16ddce83c24470dd6868acfcbaa3,2024-11-26T11:21:57.823000
CVE-2024-10385,1,1,2459d78c3508aa616ad4e90307c1255cc6a75e3bad1918f6f1132f6353703d40,2024-12-20T16:15:21.523000
CVE-2024-10385,0,0,2459d78c3508aa616ad4e90307c1255cc6a75e3bad1918f6f1132f6353703d40,2024-12-20T16:15:21.523000
CVE-2024-10386,0,0,7aff12031680710648573b87d488e50b0294f20a294313dd69f5a61164db5fd1,2024-11-05T20:07:59.487000
CVE-2024-10387,0,0,57470acac2a2dbbd0df691895c55ce7e9f6693f342e79f6c8afed7fe3b526ff6,2024-11-05T20:05:55.323000
CVE-2024-10388,0,0,e9ec8dd17e88ba202ee792d712ed48b3ff6fd0d0e6fbe5270057fa94b498de97,2024-11-19T21:57:32.967000
@ -243509,7 +243509,7 @@ CVE-2024-10547,0,0,b023c976bb6d488185fa01d9371074d053ec54a35f2b498daa31d6bb09884
CVE-2024-10548,0,0,387eea2f214d486d1c28afc0bdd6a3cbda871b2748526e8919d00671b70f55b1,2024-12-19T02:15:22.420000
CVE-2024-1055,0,0,399a6bc3324e5a5ab60feee10ef9f668300825e29ef0f6a3f63048abb22d1f67,2024-11-21T08:49:41.683000
CVE-2024-10551,0,0,399c3b50116ab12fecb385939dfbc291c08c34ee1143fded03cc056aa8d168fc,2024-12-06T16:15:20.160000
CVE-2024-10555,0,0,554f3a35edc31885c63cdb5a9029d786cc47cad0c097b2babddbd6303acf3649,2024-12-20T06:15:22.450000
CVE-2024-10555,0,1,597076a34b07f960c51e6abf9f2e54d44ce2f6716a3d1121eef23cff8900bb44,2024-12-20T17:15:07.037000
CVE-2024-10556,0,0,718a43e4ad6bf4f3f07d592398a4916e1e5afe3b7fda2ab7a1b90e0c73118264,2024-11-01T20:51:35.617000
CVE-2024-10557,0,0,e65f5d89b91c24f295e5cbd0f813e2ad8ed04df13cf96a919800b770566f37fc,2024-11-01T20:48:56.980000
CVE-2024-10559,0,0,16e3eab9e781d1e16f0d045b8d1d79bfb09e11f3fa816a22b4936c2b8431f9e3,2024-11-01T20:43:41.070000
@ -243635,7 +243635,7 @@ CVE-2024-10700,0,0,47463adc515feae701fdd6df43b426f169c9e406b10e3ad8dd4832a0c6070
CVE-2024-10701,0,0,0e6acb5db36bb65b2a9a78f5a1eb22e27b99e8cd35851fc25db7c90c627071bd,2024-11-05T16:52:44.937000
CVE-2024-10702,0,0,3259585053a84cb9e4f20d6c03e98232b3f699485fefb085dfa1033c1b54da99,2024-11-05T16:52:11.193000
CVE-2024-10704,0,0,ba32dc9400bcf601c7de3ed1f96e389b9876b8709121dc8baeae8e0502050909,2024-11-29T15:15:15.777000
CVE-2024-10706,0,0,e61b32cc5553d00e0f7f872b5d719e44eb2608b60448b5c82ea3bc34ed625b29,2024-12-20T06:15:22.710000
CVE-2024-10706,0,1,a6197c3513fb437bfb526c424137a60bda332ee0bb647a99bd4a0b818e5fdf22,2024-12-20T17:15:07.260000
CVE-2024-10708,0,0,eea3aeda96ee17aa2e34b8299f4fa63911654caae1b5976f2282c61fc39e2c7d,2024-12-10T16:15:22.327000
CVE-2024-10709,0,0,41eadf98fd4f942149bd2d66f39b1d32e2fbc20d0415ec457a4d209de40f95b0,2024-11-25T21:15:08.837000
CVE-2024-1071,0,0,511789b6fa5ad5f82a1b86953aeffe2ca3b5c7e6b5a99f94e7636c9edfe8a8b3,2024-11-21T08:49:43.920000
@ -243960,7 +243960,7 @@ CVE-2024-11103,0,0,525c56d7b3f8fec3123e98bad3867c199a9a90e84f6b6962f9d506a460e46
CVE-2024-11104,0,0,b75d8ded53ff668230e72c743fffcbea02289181c30609ae66856a5e9653031c,2024-11-22T06:15:19.093000
CVE-2024-11106,0,0,4f7fe956431776c4fe3e507a22b518efb5f390b9e8eff5421b62ca54ec32b13a,2024-12-10T11:15:07.030000
CVE-2024-11107,0,0,9acfc58960fd056b26158a4898d3cab204ba2e238bb413c388c6122ce49a79e3,2024-12-10T16:15:22.450000
CVE-2024-11108,0,0,c1be6b34c7d61522c6a05f2a8110ded17dd42c6e68c9945ca15a84f9c2fbd097,2024-12-20T06:15:22.827000
CVE-2024-11108,0,1,49880135218020cb99f4c9e4e13ba800c5369506de5ecd61e983da5e460d7cc8,2024-12-20T17:15:07.447000
CVE-2024-1111,0,0,1e2a4c53f023bbf8c3b556fe6d8a896ca169d10bbf6dcef8f8f730e5e086694a,2024-11-21T08:49:49.257000
CVE-2024-11110,0,0,d490bd60a369a1b46dbdb1050197f0676234294cb261b9f35d39066213c16bbc,2024-11-13T17:01:16.850000
CVE-2024-11111,0,0,da9ee8d75f19a39df28c4985a5537997054eaf20345ca454e34c488f64fe6a62,2024-11-13T17:01:16.850000
@ -244099,7 +244099,7 @@ CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5
CVE-2024-11294,0,0,2eb006c700872e4221a5d65f1f84540c18c42b5a19bdffcef60597b889db391d,2024-12-17T09:15:05.193000
CVE-2024-11295,0,0,33f60bf01a9cdc709e5955974a036a6d640572051acba82f69d600e268adeb3e,2024-12-18T07:15:06.737000
CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000
CVE-2024-11297,0,1,dcc20cf881101ac7914684418643db28e12f1dadcf16d43050679625656d4eee,2024-12-20T16:15:22.107000
CVE-2024-11297,0,0,dcc20cf881101ac7914684418643db28e12f1dadcf16d43050679625656d4eee,2024-12-20T16:15:22.107000
CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000
CVE-2024-1130,0,0,a3e19aef9eb3382013136f74a42e19afeb0e606b8f2206b5fca2ea0a53428b21,2024-11-21T08:49:51.890000
CVE-2024-11303,0,0,ad607bb34f4cabffd121b35b6cb4bdf73670583d2b4d1068bee702934c5fa785,2024-11-21T22:15:07.213000
@ -244333,13 +244333,13 @@ CVE-2024-11572,0,0,4bfb3b8a6cb8b5e286abee85be29182a0c2097d6ed456387011257c4ff0df
CVE-2024-11573,0,0,a217cd6a5d2c1b9c15a058174aaf74db4c998e67a229e5d62add9fed37c842fd,2024-11-25T18:53:19.637000
CVE-2024-11574,0,0,c0c507d43857d57ee99aa16b84b597bf67d6a714c3740721e43431423a9700d2,2024-11-25T18:53:09.717000
CVE-2024-11575,0,0,5e1acfdb2c1dcb5dcda0fe7dfbf70613b34f2e92ce4befb7a1e3c62571d21e54,2024-11-25T18:52:56.080000
CVE-2024-11576,0,0,c7d7d317f472862d5929ac8ee84a294c536b8a9fecb2952e2f6e3e511ca7a1b2,2024-11-22T21:15:16.693000
CVE-2024-11577,0,0,e073807575170d04dd02d49ee7f74cd0fea2331beb3198e76582b45a90d93332,2024-11-22T21:15:16.810000
CVE-2024-11576,0,1,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe759e,2024-12-20T17:36:12.133000
CVE-2024-11577,0,1,030cc7ceccd9c1f1c0576f6eef9270acaa630d083b3c15257887f33704fc9630,2024-12-20T17:36:00.887000
CVE-2024-11578,0,0,c895c3d24af0012b56055e7687991fd92495e03a408f7600e49689de017772f3,2024-11-22T21:15:16.920000
CVE-2024-11579,0,0,e48b7dca71ae340305444f03509bcf3d1b662335e3d92760abeb8621e7f008e3,2024-11-22T21:15:17.027000
CVE-2024-11579,0,1,a092ff7ef536e96be080e898d8d872006835463f8afc1ac75354cd0671a55eda,2024-12-20T17:35:51.253000
CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000
CVE-2024-11580,0,0,2ac5adf7790484251619a48c743e1d8dacb8bd828ca61b81b9c9a1ef518a997f,2024-11-22T21:15:17.133000
CVE-2024-11581,0,0,538eef954f61c29b7e5164457927ca2e195d3c5ec7bf5543f4f83fe97f3a4e35,2024-11-22T21:15:17.257000
CVE-2024-11580,0,1,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
CVE-2024-11581,0,1,268ccec9c70d91613657530fc8ca66f464b1a739ebb371f3baadda44241001cf,2024-12-20T17:32:03.967000
CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000
CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000
CVE-2024-11587,0,0,81baaf77887a06e025fa560b05def938c80026d91eed087e0a42822793b3fe0a,2024-11-22T21:15:27.747000
@ -244641,7 +244641,7 @@ CVE-2024-11980,0,0,5c195702c3044363783e02640024befa9b8ad56aa6e8902b10c32e122c344
CVE-2024-11981,0,0,4e8c7d73de59078b6dc7a30279d02d329d5e4f81501d91493f618fea96f72189,2024-11-29T07:15:05.760000
CVE-2024-11982,0,0,fdbe1466c75dff41c18009236254b70f07e6dcbf8224b3254ed5447f6369f8be,2024-11-29T08:15:04.580000
CVE-2024-11983,0,0,b28164039b0dc59ec068d9e4704804a0da409a26a86a99d005cfe1af9f1df7bd,2024-11-29T08:15:04.733000
CVE-2024-11984,0,0,e4cb8f12f5f76216954f82cc003c009be1d8ec253ba314ea40b01ce15d04236f,2024-12-19T04:15:05.127000
CVE-2024-11984,0,1,ced44f2e85997433b4a6526be94d84d4444dfd73a39ca7719f03472fe24c16f2,2024-12-20T18:15:26.703000
CVE-2024-11985,0,0,347bd715be95eb6539997f812c032a6ace7cec9111ea8a772c8788473da7f21d,2024-12-04T02:15:04.237000
CVE-2024-11986,0,0,e3ace666257325f8eafbb0b048032c0cfe2d1f4c40638fcb396e4be31115d6ce,2024-12-13T14:15:21.207000
CVE-2024-1199,0,0,60ffbfb4cdc00bf543d03a59b91efea487f9cf6b0b352d45a15655d219ef20c9,2024-11-21T08:50:01.340000
@ -244662,7 +244662,7 @@ CVE-2024-12003,0,0,14ef5c0679ec50bb5e5014c8e7b631b4905f5419df127668fd74fc6d22bcf
CVE-2024-12004,0,0,3dce40ab1e8f9f1b73bc9bad8477202dd665f9594517ea95d989e909aeed6010,2024-12-11T09:15:05.500000
CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000
CVE-2024-1201,0,0,98150b7d086d80b767e6802e39750bc86f0479b7a9cd93495263225678c4d4a5,2024-11-21T08:50:01.647000
CVE-2024-12014,0,1,0fbaf047a11b22ead04fafadea66904b0c2d7feefee4cd71ef9629ea9f715d06,2024-12-20T16:15:23.030000
CVE-2024-12014,0,0,0fbaf047a11b22ead04fafadea66904b0c2d7feefee4cd71ef9629ea9f715d06,2024-12-20T16:15:23.030000
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
@ -244829,7 +244829,7 @@ CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c
CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
CVE-2024-12355,0,0,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000
CVE-2024-12356,0,1,105dac76f068e0a7df26029c27e4dd4c6eb4193ba09a6f3d1c3ed5326b9fe200,2024-12-20T15:25:37.347000
CVE-2024-12356,0,0,105dac76f068e0a7df26029c27e4dd4c6eb4193ba09a6f3d1c3ed5326b9fe200,2024-12-20T15:25:37.347000
CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
@ -244919,7 +244919,7 @@ CVE-2024-12555,0,0,0d42d0c8cac624be8352d225c1fedeed93d78abfe4d84ed9171ab1d4e5a10
CVE-2024-1256,0,0,ea8829298a5ced036094d7fead955f33827bc36bbc0a7f87a81ee1f95b95b282,2024-11-21T08:50:10.293000
CVE-2024-12560,0,0,59d00c885b51c3e9ef9e4160d8c87472751bc46b43573f63258bdfe4a0067aed,2024-12-19T07:15:13.507000
CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772172,2024-12-12T15:15:12.097000
CVE-2024-12569,0,0,85ba460436494f476697b315ff16d44cb76ffc76b518eda7d927b0e3a48ad1e9,2024-12-19T09:16:13.830000
CVE-2024-12569,0,1,f066721e86ab0b585b58df0c291535366f5e06bd60d39db2c198664dfbee8e4a,2024-12-20T18:15:27.230000
CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000
CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000
CVE-2024-12571,0,0,64d88bdf40a9886ffb28abd6d1e741e65a8db2fb01deaadc842b0be03349fe2e,2024-12-20T07:15:12.380000
@ -244969,7 +244969,8 @@ CVE-2024-12669,0,0,cff9f2a304270add667ff179e86a9f065113db2e7e50955c8f0fd086a0592
CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33c4,2024-11-21T08:50:11.937000
CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000
CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000
CVE-2024-12672,0,0,5cd1d3b4cfb441dfdf1d1b86c433e5f5cf40997f4b5be8408d5185dc7fd334c9,2024-12-19T21:15:07.627000
CVE-2024-12672,0,1,43f993d04491aa37c8f06809db5261032f93c45461f913438159eb31bb33f5a8,2024-12-20T18:15:27.537000
CVE-2024-12677,1,1,3507790af505e09c09618fcf8a633379c9f714a2be36a2eca961aed220c8f0a4,2024-12-20T17:15:07.757000
CVE-2024-12678,0,0,a99cebbf2382fb3bdb3a5462f20e28cb436198a7494c25805c55135c7b052910,2024-12-20T02:15:05.500000
CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000
CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
@ -245016,7 +245017,7 @@ CVE-2024-12830,0,0,d198fb1fd8ccf96839a414659389d58b36662edb43142fcb13bdf22550e95
CVE-2024-12831,0,0,6a7b0e5cf4fa71c8e07ed8162e3704e196eca9cba00188a493458902a4427e43,2024-12-20T01:15:06.670000
CVE-2024-12832,0,0,9a101f7d70f0a623c3454123e2a257a4b7f5154c8200a2b8250142a3bbfb4bc4,2024-12-20T01:15:06.793000
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
CVE-2024-12840,1,1,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000
CVE-2024-12840,0,0,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000
CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
@ -247085,7 +247086,7 @@ CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af
CVE-2024-21546,0,0,374b959b014e67074043123d4e408037a721391ba09f30f003dba89985567839,2024-12-18T06:15:22.850000
CVE-2024-21547,0,0,9490da4e046bfe0261ead89061dc5ab090fcc33b7491f225d76294d9a91f7dfa,2024-12-18T06:15:23.187000
CVE-2024-21548,0,0,1234240944f7ab37f9588d239ecac84e4a1f43ed5a4b8fa4e08658630e5fe2ba,2024-12-18T15:15:09.947000
CVE-2024-21549,0,0,dc243ef0e42daf7dcd8db82f6f1c86a16547df01e3cb286c549c98c29096c4c9,2024-12-20T05:15:06.780000
CVE-2024-21549,0,1,facd8052f0d57246964ee421f8413f9af2b81009f9f5cb4e77b99ca3c5240e74,2024-12-20T17:15:07.983000
CVE-2024-2155,0,0,1def2d989b10107bcc4deca9404884628c1ba17bdc1993a4df13bb309b4ac8eb,2024-11-21T09:09:09.070000
CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000
CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000
@ -247330,7 +247331,7 @@ CVE-2024-21850,0,0,3f4996285ba8f36af13beac4e19f7f6eaac6b7c930044e4f18b3bcd24f607
CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122fec4,2024-11-21T08:55:07.400000
CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000
CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000
CVE-2024-21855,0,0,abc4e6b5fa8456e02ce60ff7eff16c5d7844cea27d489d0ca11365f1824782fe,2024-11-21T16:15:22.370000
CVE-2024-21855,0,1,cd01486a1dbc0a9a886ff2827620764e44df4ea15f59879419eb00eb59af385d,2024-12-20T17:05:24.753000
CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000
CVE-2024-2186,0,0,4cd75d54d43aef363137514f65f60c9ac389db0d3c09cf411cd6f8433450c76a,2024-11-21T09:09:12.967000
CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000
@ -248224,17 +248225,17 @@ CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee2
CVE-2024-23222,0,0,234fbc8851ab910f53af22b06eaa70a751c876141fb023e6fa28056f96c7e426,2024-11-29T15:05:53.577000
CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000
CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000
CVE-2024-23225,0,1,d9417ddf22a7e380727b54cb6838be4f9e33517682bdefff5dd3056836e5a3dc,2024-12-20T16:51:15.130000
CVE-2024-23225,0,1,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000
CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000
CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000
CVE-2024-23228,0,0,4777eb1057e01b89423a9fc98cb690d47cbff49eeda10b8695a9f357523c2a6d,2024-12-12T14:33:00.640000
CVE-2024-23229,0,0,b503f4043ad887688ebabe0f99f6dc2e750bec5ee240a1c13bf5cff65542fd4a,2024-12-09T17:37:58.303000
CVE-2024-23230,0,0,156b934172dbb493756c9b28b3091ed6cf989cf09f6556b0519517d3a710f9a9,2024-12-05T16:29:16.003000
CVE-2024-23231,0,0,ba1d2593aea3c4c4a174d2e33b5049749196fa54034828f6beef5b71f462e4b8,2024-12-05T16:27:10.467000
CVE-2024-23231,0,1,b345ca2141a2953e4d0d79a4aa59df13df9ec9881922a1f9223058754c5c8dae,2024-12-20T17:09:06.867000
CVE-2024-23232,0,0,2d4ff156fd4bb5acfd4c77537307a7232bbe750b532071870b7076c67ef970f3,2024-12-05T19:50:23.700000
CVE-2024-23233,0,0,ba76592c9abd6021c9cd40cd3baae71397fb7de180a79a7079e5b607a05d8d7c,2024-12-05T19:49:55.040000
CVE-2024-23234,0,0,2e6ac2948d5f78449bdbb22421c29ee97772b7e769451de805febffae9b54f22,2024-12-06T02:48:33.647000
CVE-2024-23235,0,0,d147655623feed7f676315427c134a6bbfb5863ecb6102302089b527b673a106,2024-12-06T02:36:27.937000
CVE-2024-23235,0,1,9a34f8e4ff0503040ce75a38cf6851db6360ff7441289023e99bd8eeda83344b,2024-12-20T17:08:50.517000
CVE-2024-23236,0,0,a0ff633f4e0feb8938fa63f59f317e6731d8f14631d93c3d47b0d40500deb8f2,2024-12-09T19:30:08.453000
CVE-2024-23237,0,0,5ebc5173e614f45947ce7d8b6d251bfd9a7226ed6c5a53d978f1e15bf6e5faec,2024-09-23T19:53:51.170000
CVE-2024-23238,0,0,e055da92b65437a98bc321c417e70a8f6a5157addb3c81c8dcfe9f4937312e89,2024-12-05T20:03:43.247000
@ -248246,7 +248247,7 @@ CVE-2024-23242,0,0,741106f9dc3463bc451723e7b8cc21ef1db5886490f98395e55dc47f2247b
CVE-2024-23243,0,0,16c5de8e4ab967061eb8ee2cd6d3dd7d9074d29e6b9475fb955e98d6f2c0db20,2024-12-05T17:10:47.297000
CVE-2024-23244,0,0,5aad1663b4ed4cd78deeaed9a4afb07e9e6e364d3035e066110317350a5f9cb2,2024-12-06T02:13:06.950000
CVE-2024-23245,0,0,4a86d676d3be6cda9e360ecc9a003c7062cb405f97d6449fe5589357ff2225f8,2024-12-06T02:08:18.640000
CVE-2024-23246,0,0,ff2f47b01d9db6b76018b7e6f09021055c9d6e6c8c480cbe244aa09f8dc0edb3,2024-12-06T02:02:26.433000
CVE-2024-23246,0,1,dba86fcd1448c512e3001d37ec498b089b198c155206beb9371cc0d8180b4b20,2024-12-20T17:09:02.443000
CVE-2024-23247,0,0,c204ca7ef7979ea0603fec0bd8eddb1c65df637a5bcdac9a9a2ba060eb81fcf4,2024-12-06T01:58:51.233000
CVE-2024-23248,0,0,c48fd9ad2631eef3f53ac5adca0b91801108c15be181b815768304a228795f1c,2024-12-06T01:52:41.503000
CVE-2024-23249,0,0,5da154d890c56feee3aeb01a7ee9508a41a9ca6982e5c902a0c40bac654d6a2e,2024-12-06T01:51:51.123000
@ -248258,9 +248259,9 @@ CVE-2024-23253,0,0,6fee2e03ec17eb24d88c1bed52c44c23ae4ef97327ff874a2890eaaa17222
CVE-2024-23254,0,0,3ad832d7c7a0a8a8df5739c11dd6d63a4415039b0e1baa027b884d9d2dd50195,2024-12-06T02:54:01.530000
CVE-2024-23255,0,0,7bd882417f214059f6dfc15001b2afab0607fe28723d0b0944187e5c1a7be405,2024-12-06T02:51:33.217000
CVE-2024-23256,0,0,4ea578b20137f41639da60d4790de798cbf85fd6e17c481c4d3ab161fae0f632,2024-12-05T17:05:54.973000
CVE-2024-23257,0,0,1467811b3c7f8cf950ef1db91c554bcbf97ae8444c35241cda16dc8b09cb98b0,2024-12-06T15:07:41.487000
CVE-2024-23257,0,1,7f06391a83a3a5d30a7d83dfdd066795af480eb581dd23a51eff9c35cfe45e80,2024-12-20T17:08:48.080000
CVE-2024-23258,0,0,eba9c68188ca56a6ed74a451e7dab749f607b390492bf516b3fa96413ebc51e7,2024-12-06T15:15:59.713000
CVE-2024-23259,0,0,9a77ed20922da727c3072a1cf32453c8882821d91d08eeb5a6c078386db2182d,2024-12-13T16:49:32.297000
CVE-2024-23259,0,1,4afb2ece42ac8b13385095744010dc54f98bbd06c0222dbb45caf5a65dfc644f,2024-12-20T17:08:58.297000
CVE-2024-2326,0,0,d09d4fc0a3fe2b3bbc5a1e657d32fe82b3fbf461a6d335455eaa162e70e203ea,2024-11-21T09:09:30.590000
CVE-2024-23260,0,0,86bee0d3b6e536addbecc74ccb792fb0e6df91f3c5ef6f2caee278d7f60aa344,2024-12-06T15:21:05.480000
CVE-2024-23261,0,0,e3d079aeae084ce00b784250816edd4a5b3e0b3c058d3918e25850cd4defbfe1,2024-11-21T08:57:20.073000
@ -248281,7 +248282,7 @@ CVE-2024-23274,0,0,318b4df782d3c6e71148c6552d1841eeb2ed2926c2f9c1ed83914e8722226
CVE-2024-23275,0,0,f810e9a533fb793b7879304750d276d7339a9fc19b1d48344018f119825ec467,2024-11-21T08:57:22.553000
CVE-2024-23276,0,0,8870bf788099d7859136d2c15439c5ebc20315db12c7b2aa01f521c38051d30d,2024-11-21T08:57:22.707000
CVE-2024-23277,0,0,dd271aa56b91b093c3a10777496e2004db655da1636d53a91afc4735da2992f4,2024-11-21T08:57:22.923000
CVE-2024-23278,0,0,05f06307755bc372c5900f30956d4183ee606440e23a62135c1df4bd1bc99ee6,2024-12-07T02:21:44.657000
CVE-2024-23278,0,1,bbdca142c86918ece4747389e32d9f5bc6660749a5e17048c8b710b2f35f9d9e,2024-12-20T17:09:14.257000
CVE-2024-23279,0,0,8c1ffefd196d1bd3ee9a940fb1989de48fb0d13cbe9a0d7ea19c2de439d1dfcf,2024-12-07T03:03:35.967000
CVE-2024-2328,0,0,bb3499035182a93f707cdcba0335c8ccddb9563295bc2859816e2ba7e35f79d4,2024-11-21T09:09:30.833000
CVE-2024-23280,0,0,09fe788e24d4a3f86544fff0058ed254d6dcc58242d779773f092933de0dc574,2024-12-07T03:11:21.283000
@ -248301,7 +248302,7 @@ CVE-2024-23292,0,0,bc50b53ba7fc65e1b34d769e31ab336ca0f8e999265f13d76265950343381
CVE-2024-23293,0,0,d58b5f27056e68bd03b53bf47f5a1d1e1ad4098d585ea2403d8a798a0b2f0289,2024-12-09T16:19:06.307000
CVE-2024-23294,0,0,cada88db211fe9d398c8417c264ee5745765f39de0ee8dbdd7036758c5310c0f,2024-12-09T16:16:05.597000
CVE-2024-23295,0,0,b9bc21e6e4256230eb4f3c16a88e9c46286188aef9199fc0975ac3a816885626,2024-12-09T16:09:27.130000
CVE-2024-23296,0,1,d47e2db1cb3bc410f41d6dae280a8977c797ac9bcbcf817b122d792aeb8730dd,2024-12-20T16:51:47.810000
CVE-2024-23296,0,0,d47e2db1cb3bc410f41d6dae280a8977c797ac9bcbcf817b122d792aeb8730dd,2024-12-20T16:51:47.810000
CVE-2024-23297,0,0,30f7ae35603cb3fdf468d260c3681252597c2f5392d5a475631d593e531bfaac,2024-12-09T15:06:14.650000
CVE-2024-23298,0,0,801dc4397d9cb442b2a863f1bc826d70b8fd4009aa54eb2ce4e4f0bf9137623d,2024-12-09T14:44:22.810000
CVE-2024-23299,0,0,a4c59975d9e4debf492651a9710e74c1d53dab4df40f27acc3fdd4d1a0a06c1a,2024-11-21T08:57:27.153000
@ -248817,7 +248818,7 @@ CVE-2024-23893,0,0,6620e8a3035678860ebb2a9b79d8366d8891e31364bf16eb5ad0a2ea3f971
CVE-2024-23894,0,0,0f613219b83c49887e0e24e38a0aac0b74ec26128f9cdeb6fc771c14075cc7e8,2024-11-21T08:58:39.270000
CVE-2024-23895,0,0,d4d544360ff9ac84901a798dd93d692846b51f3d4a3bfcbaf0a75a825a101383,2024-11-21T08:58:39.417000
CVE-2024-23896,0,0,635bb83ecb6705faee17db42ca50da7c067c8d9ac628ea959f5651246f7e310a,2024-11-21T08:58:39.560000
CVE-2024-23897,0,0,e1655bc71678f0b46896b5ce1732a6437c51808472bcaa8be9eed65cb55b9257,2024-11-21T08:58:39.693000
CVE-2024-23897,0,1,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4ef5a,2024-12-20T17:30:33.613000
CVE-2024-23898,0,0,82cb86eeead29a41a26f8d43a27d3730988e662134d81188c8cd9708a0afbd78,2024-11-21T08:58:39.923000
CVE-2024-23899,0,0,4e4895235c426268ca84c39a87c44ba513bc2717de20eefcac614411ffacbafe,2024-11-21T08:58:40.040000
CVE-2024-2390,0,0,3e848f25c0e6aca1cdb589d9d47a5535f56144364579a0cdbb3a8951c3252040,2024-11-21T09:09:39.010000
@ -250815,8 +250816,8 @@ CVE-2024-26789,0,0,f7649e1b7c5a364fa580133d1685007324d1099fc792f6438373857993899
CVE-2024-2679,0,0,feedb7257c60d2502ade5cb9e097bb8b59af8da697b75c19a9c077cee1ddd6f4,2024-11-21T09:10:16.573000
CVE-2024-26790,0,0,2b9b84ef81d8de6aa3dc57d8ff4dfc7945973722731a99c9b7f67727cfc494ad,2024-11-21T09:03:04.763000
CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
CVE-2024-26792,0,1,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
CVE-2024-26793,0,1,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
CVE-2024-26795,0,0,5d4eabef0c456f46f9992c03723452a3a8d635aa76f96f4b5da9c93ac3ba4967,2024-11-21T09:03:05.433000
CVE-2024-26796,0,0,aca8e32fdc5cd17befaa7f3f672c165db4946a599ea680ba270a021c886d5cbc,2024-11-21T09:03:05.557000
@ -250824,8 +250825,8 @@ CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
CVE-2024-26799,0,0,94e40360a58865d9d67dfe9e60236d4a43830fc422ed0bb78cda58451cb646a0,2024-11-21T09:03:05.970000
CVE-2024-2680,0,0,f440ad10db5cf562a76ee6e3ce6f89409737492b5e2c89786a4d0fe716aad3cf,2024-11-21T09:10:16.717000
CVE-2024-26800,0,1,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000
CVE-2024-26801,0,1,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000
CVE-2024-26800,0,0,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000
CVE-2024-26801,0,0,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000
CVE-2024-26802,0,0,c3eb25f159f3d9e97001cc75436ed032ab724692e7cfb5cb782ce74be6d22c98,2024-11-21T09:03:06.387000
CVE-2024-26803,0,0,da1a5e4a8e1ccdf52da3c008697a74e25b55e57ecff04da71adde2377c898cae,2024-11-21T09:03:06.517000
CVE-2024-26804,0,0,59bfb883bba3b84feb6cabc2a731628af8063660636b34871b628531b08d0367,2024-11-21T09:03:06.640000
@ -251171,10 +251172,10 @@ CVE-2024-27115,0,0,23a704a991128549e4058297cc183510e2f019911bda8330d9d373e7628e6
CVE-2024-2712,0,0,4b4fb0ad063b2d4f190eb365c70c98a488f4f0017bb4835e23c70bcc528b4ca7,2024-11-21T09:10:21.153000
CVE-2024-27120,0,0,978b2d808accd7bc8081bc8a0bd6550ccb316467ae17faddcc157095d9d04beb,2024-08-20T19:08:54.490000
CVE-2024-27121,0,0,be0329e24db65a8da36a413498190604f5646307297a4d866c7be2e68be90acf,2024-11-21T09:03:53.850000
CVE-2024-27122,0,1,185f0648513e97bbf03bb758600504cd9e9f116f22af26eb5d561914b444f922,2024-12-20T15:48:58.860000
CVE-2024-27122,0,0,185f0648513e97bbf03bb758600504cd9e9f116f22af26eb5d561914b444f922,2024-12-20T15:48:58.860000
CVE-2024-27124,0,0,c86f0b5badee79ea9e80b752eefc6c1bae17c637d8b10b0c9ae6ebb140d07d47,2024-11-21T09:03:54.147000
CVE-2024-27125,0,0,62447c94edd533b7ea117fa63d76000c06cae5d78dc21800bb3ac647a710fa6f,2024-09-13T21:06:37.417000
CVE-2024-27126,0,1,3793bc1732fc2d346704b0b1504a0754792f903d694561b105633abfaff80bb1,2024-12-20T15:49:05.487000
CVE-2024-27126,0,0,3793bc1732fc2d346704b0b1504a0754792f903d694561b105633abfaff80bb1,2024-12-20T15:49:05.487000
CVE-2024-27127,0,0,56f7770e9c17ad7419c2c7a4c9b3a0f42f7e5ab48afbee6ee86b77eec58bfbe7,2024-11-21T09:03:54.430000
CVE-2024-27128,0,0,25abf69fc83895a13784e9349a98139b1d75374ed7ab65f669ba6c5628c6f842,2024-11-21T09:03:54.590000
CVE-2024-27129,0,0,675d38ad59f656bb9de2a8532dded9ee79e6e9ec1860c1ad35fe28a7fec1161e,2024-11-21T09:03:54.740000
@ -252434,7 +252435,7 @@ CVE-2024-28889,0,0,56e4da21fbc62908e65bc9d6315a2b989ea164aaccf23dde236dcd94fbd50
CVE-2024-2889,0,0,1885c0f2ecfe4bdb417129f70852e4157a6de85584ef6ee4549701263ae39757,2024-11-21T09:10:45.900000
CVE-2024-28890,0,0,3bbdab4f532fab507ef698fd11be91e1ccfe6d2327e03eb3fd78e1be839e0795,2024-11-21T09:07:07.400000
CVE-2024-28891,0,0,89149026c6e5f7e226ede146241710be24ae96a683eeb359126523d37dd3135e,2024-11-21T09:07:07.617000
CVE-2024-28892,0,0,942f9c42ca113b1904656bf01dc6f72f8c312c0e67d90dfbe99963ef9c0d4a83,2024-11-21T16:15:23.977000
CVE-2024-28892,0,1,0675780aff3c9ab12c12dfa28834b58fee94e67a571b3eca76e1a2ca00b4044d,2024-12-20T17:05:48.707000
CVE-2024-28893,0,0,db742559f8c06478e8575a7b0b3efd5fffbc67fba44a19cb78f8e38f79742eca,2024-11-21T09:07:07.740000
CVE-2024-28894,0,0,b9faf34ec909306221ab162d492936e7fd18d2418e4f829a4af1d6fc9a632145,2024-11-21T09:07:07.920000
CVE-2024-28895,0,0,d2dda34349233b4529d0456a907510ce0ea82c958aeef35d6f0b65b75c4f7cc9,2024-11-21T09:07:08.117000
@ -254867,7 +254868,7 @@ CVE-2024-32109,0,0,c9a7cac737476956b9fbf72c1e5d6a8a50bb5a1742710bddb0f71999ccd9d
CVE-2024-3211,0,0,98aac495f2a7a17ab7cb4a24950a45aa52e6a13f3e3a0c46ae3956f9c49aadf2,2024-11-21T09:29:09.530000
CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599a80,2024-11-21T09:14:29.573000
CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000
CVE-2024-32113,0,1,758bc627df310f7de0704ae877061bf72b342caa11ef83c397db20df8b50d04e,2024-12-20T16:51:57.577000
CVE-2024-32113,0,0,758bc627df310f7de0704ae877061bf72b342caa11ef83c397db20df8b50d04e,2024-12-20T16:51:57.577000
CVE-2024-32114,0,0,ec761db7a5ad46df257b60e3bffba3183bd48091e424b77fbddb80d44570b8c2,2024-11-21T09:14:30.127000
CVE-2024-32116,0,0,f10f3c24dc00a2826d06434dd27b29c41c2c38d776ae02f6706b238c0f312734,2024-11-13T17:01:16.850000
CVE-2024-32117,0,0,6ced7b5df85b7cf270709040a6c78ad7915ac1694cdc1063e73cbc492ca11ee8,2024-11-13T17:01:16.850000
@ -258595,7 +258596,7 @@ CVE-2024-37080,0,0,c235125cb88a4c9eb5712f08a6a48067f0e62027eebca5877060642029c78
CVE-2024-37081,0,0,5f3b3ea879aeb2af37255c2c906f01b45b1cdb7f35a5125d3d7fa22d1134f005,2024-11-21T09:23:09.430000
CVE-2024-37082,0,0,6bf6931c6e4458306423d88f4c271b58742a49de22a708b3fa70ace5c58eee64,2024-11-21T09:23:09.607000
CVE-2024-37084,0,0,17b4d0ebb2893714179426a840ba58f383f2be234d957361f160ee486693c99f,2024-11-21T09:23:09.750000
CVE-2024-37085,0,1,a9ac54e9575fe85a29aaa945441fdb0d2c9bc9f2949737b6f857d56202f45ca8,2024-12-20T16:52:43.217000
CVE-2024-37085,0,0,a9ac54e9575fe85a29aaa945441fdb0d2c9bc9f2949737b6f857d56202f45ca8,2024-12-20T16:52:43.217000
CVE-2024-37086,0,0,a717eb3545be15590ba6655f1537e213e7110c01723f60e35623cea4a358284b,2024-11-21T09:23:10.060000
CVE-2024-37087,0,0,32aef3b54e03c06293ea895653eb63d65e548a458126992ae45a78a65cd58343,2024-11-21T09:23:10.200000
CVE-2024-37089,0,0,8d387479d3a2a6e03e30baefa0716f09d2a1a735bef61b94a2cbba881bf018ea,2024-11-21T09:23:10.330000
@ -258869,7 +258870,7 @@ CVE-2024-3738,0,0,6b7c5ee43d749786d04736c3425539aee3d10b90489eb5acbf775617e1e2b2
CVE-2024-37380,0,0,77cf3dfb25923a81bead84472c82f0af78f2d433b4d7604e764b919f8522c470,2024-11-21T09:23:44.180000
CVE-2024-37381,0,0,9f8a1e24016e672c46f9ac1942c6c3e469697399412e29900bea76bbfcf0caef,2024-11-21T09:23:44.310000
CVE-2024-37382,0,0,351acbbb35c6e810a4a4b14170847f37e61db11e04c62933e1148863747f62d1,2024-08-29T14:29:32.920000
CVE-2024-37383,0,1,b1ff3cb6598ed1ba41af52ada946067c26e1f9b448619cfbacc86943333f66e9,2024-12-20T16:52:05.623000
CVE-2024-37383,0,0,b1ff3cb6598ed1ba41af52ada946067c26e1f9b448619cfbacc86943333f66e9,2024-12-20T16:52:05.623000
CVE-2024-37384,0,0,fc4471efd9bb23449fa9db31dee7f8a0d5954ec59042d211a974e2576d8626f9,2024-11-21T09:23:44.963000
CVE-2024-37385,0,0,42dba148074eb68f96dc3032ef510bc428ca2ec23394b14e18ac5efc7f3674b6,2024-11-21T09:23:45.193000
CVE-2024-37386,0,0,b3b80f364518cfd17d5ee452f25d6cb7775d8ae7b1e0df3e35aae4575b507127,2024-11-21T09:23:45.460000
@ -260082,13 +260083,13 @@ CVE-2024-38832,0,0,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101
CVE-2024-38833,0,0,4362568a75fe4ff6f0b022eb6319bcf28879b08f368dc59d539bcf2b96b0e3c0,2024-12-06T20:15:26.097000
CVE-2024-38834,0,0,d1e4df2457be3688e7ecbb94c62f14ef708bf2a35a15ef98a11a7f707840deba,2024-12-06T20:15:26.207000
CVE-2024-3885,0,0,d8203bf975259cc7c9b8096eb8aae188572edbc7f75dcaea8b5f71a9e139f772,2024-11-21T09:30:37.807000
CVE-2024-38856,0,1,1179c7b2db8de0f6b621a0e591d1f9edf5c96f25bb4617d01659a6586ed94c66,2024-12-20T16:35:41.330000
CVE-2024-38856,0,0,1179c7b2db8de0f6b621a0e591d1f9edf5c96f25bb4617d01659a6586ed94c66,2024-12-20T16:35:41.330000
CVE-2024-38857,0,0,392b260a009bcf153896a24b0ca2ef35f6f5d57e012aa080627851164a4da679,2024-12-04T15:37:16.290000
CVE-2024-38858,0,0,0905a6edb93734f4ba33225c6937d7fb9b4d2ff2a1ff03b7aa90c2c6088f27ac,2024-09-04T14:39:10.203000
CVE-2024-38859,0,0,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000
CVE-2024-3886,0,0,3a026cacc2b1da5f32776c4ad857a17f67d1a004181736ab52c33a72e8789c33,2024-09-03T18:48:14.927000
CVE-2024-38860,0,0,2fe29335e4516ea3256064dfc26190ce7cc189e9ac31e94fea538574e1933f86,2024-12-11T03:01:28.130000
CVE-2024-38861,0,0,d90c23362d2b5bb6263f8e48f50317e3d53e04f0a4469c9dd3ff57b01dc1140b,2024-12-11T02:59:59.170000
CVE-2024-38861,0,1,8da578c77bfff9b3cb89303f8d565b44ff8e7d7f6b8164aa2636ec20b509176f,2024-12-20T18:57:56.383000
CVE-2024-38862,0,0,9b3effa57af127d210fa99d38decd49715030f753336a9c99109dcc9d2bae0d1,2024-12-03T16:56:19.887000
CVE-2024-38863,0,0,19f40d0a8efdafcf1661471e0d88ded3ea1f1a6ed7ed00a5524865119c45bf20,2024-12-03T16:47:15.693000
CVE-2024-38864,0,0,7cf8731e9c51bad4951a528c23c1b0408734f55fcddd88e6429508c444ccc918,2024-12-19T16:15:08.197000
@ -260812,7 +260813,7 @@ CVE-2024-39887,0,0,8ee03603ace192c884ceda52f2aacab6ea4c099a303b374fdd80802d5de2e
CVE-2024-39888,0,0,81c1a1a3b559fb766c964d813b74871c335741225eeead7406d8629b71ea8739,2024-11-21T09:28:30.540000
CVE-2024-3989,0,0,282bf7f86f8761318f492d12462b4a7880646f788a5c46f5a9950ff45ab93cd5,2024-11-21T09:30:50.250000
CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000
CVE-2024-39891,0,1,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000
CVE-2024-39895,0,0,48e965215ad9f93f32302de4cc2925636a5990f6518710e75a7792ea0f466f5a,2024-11-21T09:28:31.113000
CVE-2024-39896,0,0,633e65a00d4c10f39b58379fe78094ad8927ec99c74b82d38cd2d53912355928,2024-11-21T09:28:31.230000
@ -261137,7 +261138,7 @@ CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88f
CVE-2024-40709,0,0,fc599183e9661cbcade523183f2c327fbd248e82b89d065b196cf8d66176a6c5,2024-09-09T15:35:08.283000
CVE-2024-4071,0,0,6b7a15c8812d01f9851365bf0640804d8a54a0d07fe306e122faf1e050f7c253,2024-11-21T09:42:08.097000
CVE-2024-40710,0,0,770af878a2a59ef82e06d03d07cf0408429abb3e03291325079d2d5ef2519547,2024-09-09T17:35:04.207000
CVE-2024-40711,0,1,7b916b0711bc44aabe5c56eee896ffffaf138f2a0c03f97b9d1731ef29c51dd9,2024-12-20T16:35:59.103000
CVE-2024-40711,0,0,7b916b0711bc44aabe5c56eee896ffffaf138f2a0c03f97b9d1731ef29c51dd9,2024-12-20T16:35:59.103000
CVE-2024-40712,0,0,9b2697b2eba4c69fff39e4fe2868a8adaaae993e23627840ecc81e505d9046d1,2024-09-09T16:35:06.673000
CVE-2024-40713,0,0,a9216adf51dc1ca930e362df269647bc0ed1c0502b95ef822b4a8bff7019db6c,2024-09-09T15:35:08.970000
CVE-2024-40714,0,0,026f680bbc0efd7928869ee7a08cabe88c5295f087ce979f6303318acfabe463,2024-09-09T14:35:02.980000
@ -263049,7 +263050,7 @@ CVE-2024-43306,0,0,c5ce1c97ee2c551a6fa8788a19dd2d6978c52a875878f2df83b699738b025
CVE-2024-43307,0,0,8fbf744048c958ae300202c5f818de882814571bc06ebfdd9e652305b61701ed,2024-08-19T12:59:59.177000
CVE-2024-43308,0,0,aa22fcffc7041917127d93081d908e34cd627d4d10793307f6ba8195eaa761c6,2024-09-12T16:30:02.100000
CVE-2024-43309,0,0,1eaec8ce276c06048348327945103c6d2ea21efb7203b88971dc793e38e026ea,2024-09-12T16:39:09.187000
CVE-2024-4331,0,0,3cedc0db0348f65ce723ea0811e25c358730e1a9a5555a1c1173136c3c5e20c6,2024-11-21T09:42:38.520000
CVE-2024-4331,0,1,f5ca1d6fdd6953854d0576448fbefa9c08c3e2e9e03b6d1583ca81462518a288,2024-12-20T17:22:46.783000
CVE-2024-43310,0,0,b1d5a62175828009d1f8c4d3ede330d4f35a1cc114a8594b5b483fcdc438086d,2024-11-13T01:15:24.813000
CVE-2024-43311,0,0,4220c8475b216fd0e41f386621500391cf8e0c6c4ca697b2e57893c49cc8fafd,2024-08-20T15:44:20.567000
CVE-2024-43312,0,0,0805c2de8f1c51a2a656b3648824ea7e8e23571ad9dc623405e8aea5c7c3f94e,2024-11-13T01:13:26.633000
@ -263386,7 +263387,7 @@ CVE-2024-43647,0,0,8afbf70ad2cef6fb4b1caf7e1a2477d89764414a1ebb1b6c70d7bf7b3d244
CVE-2024-4365,0,0,8395a37d6a53a1070a3da8569444b421529dea178299a0f784e109ce6848c89d,2024-11-21T09:42:42.317000
CVE-2024-4366,0,0,3c382e606a72e58f20f6afa38987a3fb436df349cdb6108f029876febf16f59e,2024-11-21T09:42:42.433000
CVE-2024-4367,0,0,3318beab631cb74f2943c39bf29b1939a0ea63fcc5350b19cb44402c5adc35db,2024-11-21T09:42:42.537000
CVE-2024-4368,0,0,664dc928d0c9e01e299c88a57ce3fffb65186eb11c8fe2d70992c5794d71a2c0,2024-11-21T09:42:42.673000
CVE-2024-4368,0,1,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000
CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000
CVE-2024-43684,0,0,4a243a48ba516eb20e6ab29bdd16712edb7b93acf46d8d67ea6d12ff5a4303fa,2024-11-01T17:15:17.127000
CVE-2024-43685,0,0,f6b41b4fe43ce77455d2f85a9164c265be40037da33cc3a92bd45f51667e1ef9,2024-10-17T15:17:20.217000
@ -263880,7 +263881,7 @@ CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
CVE-2024-44195,0,0,7bd8e2e2361587a210a6ab99d7aaa0b678351afc50600d74deca91365acb4039,2024-12-20T04:15:05.313000
CVE-2024-44195,0,1,5fd3b107528189bd2e705cef466fbbff2b7f08fe3e4e94dc8e4a02df1db2d1b2,2024-12-20T17:15:14.860000
CVE-2024-44196,0,0,efba4227fd693646a405367aa8a07c9ade4c0b362274669a348a2035392544af,2024-11-14T02:15:57.873000
CVE-2024-44197,0,0,4d5ea1ffd5ac300a8aef7ddcdb7d03d5b4f53fc506b231f15824ab1d8acba09c,2024-11-14T02:16:23.927000
CVE-2024-44198,0,0,ac9983938813bdb2273db436dba2e85817aa94ffd182ac96898511d49f70472b,2024-09-24T15:45:32.787000
@ -263894,7 +263895,7 @@ CVE-2024-44205,0,0,479ce40b4658e11ccfe7113f730a76d2315c870d209a012f733f4449cc380
CVE-2024-44206,0,0,d8e5aac347cb04d8524629aaf70121480231b4f8b4280238ac4fc071f1a60444,2024-11-21T21:15:21.477000
CVE-2024-44207,0,0,df8e300cf7f6b361cf79cc82a13f930868069c30b911e0bc1e5fb07b5725fa64,2024-10-04T17:31:41.970000
CVE-2024-44208,0,0,0f110c58ea3b1936a6fa272413b21f60fe5e44f11a840cf53eeb8d5bd692f5ed,2024-10-30T19:35:18.340000
CVE-2024-44211,0,0,ad2d9d2b5d41c1bf436d1576f95234417ca2a015dbbdd186b29eba7cad8a6bee,2024-12-20T04:15:05.410000
CVE-2024-44211,0,1,759f37a7e4b839af60feef985653c9f39bbd51a751db1d2f2824acacc4e586dc,2024-12-20T17:15:15.053000
CVE-2024-44212,0,0,e65cf132c6860c96df39727fc583565899ae979073c6e43c4e56dcedfb1d08ea,2024-12-13T18:51:05.983000
CVE-2024-44213,0,0,d54c85400318007c85dac3cf8abc38cb1350827f6126f81634ef8d1828179ea9,2024-10-30T19:35:19.187000
CVE-2024-44215,0,0,e32762ff0bf2f6f2e22b7422e9deddd79856979cb2bda3d837557df7bdb5d6cf,2024-10-30T21:35:06.770000
@ -263910,7 +263911,7 @@ CVE-2024-44225,0,0,09c2c91a46b4b824bbe1350f723a18758e0297c6f1159cd080a69de8af433
CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000
CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000
CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000
CVE-2024-44231,0,0,6ed9f85e02d34972a50180e92b21c9b7e76d1ba95bdf8ef72b6b04f0a1ef40b8,2024-12-20T04:15:05.620000
CVE-2024-44231,0,1,9aa4e4a66e55b91e9905bf8d1bb79d682ff9da10e92f9d9c8de25cdd7384553f,2024-12-20T17:15:15.277000
CVE-2024-44232,0,0,c9e60a0c1965d8b25770744bfea513326538d2727d3411f3ea53393806685d07,2024-11-04T21:35:07.233000
CVE-2024-44233,0,0,faa9cc95169f99a6ba5b7b809b52a3296f8f8d5cfb2ab7775af98f1caeb58709,2024-11-04T22:35:07.613000
CVE-2024-44234,0,0,1b996be4e23122b67d229b562bc4172f47ad474e322c6880a3e7f0b7746d3c2c,2024-11-04T21:35:08.147000
@ -263967,13 +263968,13 @@ CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9
CVE-2024-4429,0,0,a4a8f97ae1846585dda39a340897585bd413fb1368db5055aa3e7c7ef6d4f3eb,2024-11-21T09:42:48.820000
CVE-2024-44290,0,0,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000
CVE-2024-44291,0,0,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000
CVE-2024-44292,0,0,deba1c1a617ab52c53d33ba7a55102d682cd706ce79c79024575d45391273dbe,2024-12-20T04:15:05.713000
CVE-2024-44293,0,0,39fa9dfc6d70a4a01360ad7ba07c9c0f683bf6a41315a92bf7b02238f934a0cd,2024-12-20T04:15:05.800000
CVE-2024-44292,0,1,aff4c88fbda4b4b6e685651306bae87e194e89f532a38adbd7445e4d38cf296d,2024-12-20T17:15:15.457000
CVE-2024-44293,0,1,0506803fcbf6afb69ef6a4b195e2554f7ec57c0c79393dcdc16a52ccce4c88cd,2024-12-20T17:15:15.843000
CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000
CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000
CVE-2024-44296,0,0,5fa9d13f224f3a0a67aaaa3541de4a3651fe9910d7529312fb8483d35af02925,2024-11-14T14:58:09.900000
CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8eaa,2024-10-30T15:35:17.777000
CVE-2024-44298,0,0,cd6213cd42f8806ee5cc384f66e51d4f155c3a8da9c31b8460127de9a21a4795,2024-12-20T04:15:05.893000
CVE-2024-44298,0,1,c3ca9b080a765eb7800ab2d41b4733d38b2ee4df6997cf8987c4b165307c381f,2024-12-20T17:15:16.340000
CVE-2024-44299,0,0,3fad1e1fc6e494d5112c8007d008afd8a0cdb0129eb46588d4ade8d86481d2e9,2024-12-13T18:47:10.657000
CVE-2024-4430,0,0,d5d36fbeccc483ac36a1692cd3da44d019b58c951236b193b64bdfb1c1fbb731,2024-11-21T09:42:48.940000
CVE-2024-44300,0,0,8389b09c1b09329ca93ee14d306e2b10682c4c3041dafd4737f0d3e5a21e6eac,2024-12-13T18:45:11.343000
@ -264688,7 +264689,7 @@ CVE-2024-45513,0,0,25383385e2481e17b58af0b6e8f56bf94670b2d8f40ad98216966f161261e
CVE-2024-45514,0,0,7c4b7c6d70b14b13f42d6ce3c0114c4be691ac359315234fcdf5201ecc180838,2024-11-21T18:15:08.980000
CVE-2024-45517,0,0,9ae29652a251f6463a9327eae29d2e48904246c6a1726faacae2bdc1383f4e16,2024-11-21T18:15:09.360000
CVE-2024-45518,0,0,097e334ff5ea6e41f366599c72134c8651cb553e492c30874b146dfc7c023e19,2024-10-30T21:23:59.893000
CVE-2024-45519,0,1,a4e00f7b7b350923f5ea9829bd557075a8c7be45eaef48586624621fdc66f332,2024-12-20T16:38:02.830000
CVE-2024-45519,0,0,a4e00f7b7b350923f5ea9829bd557075a8c7be45eaef48586624621fdc66f332,2024-12-20T16:38:02.830000
CVE-2024-4552,0,0,0ac013621f010657983b95b3c9656c63a7805aea50fe3c0c1148c97b70e80ccb,2024-11-21T09:43:05.410000
CVE-2024-45520,0,0,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab69d,2024-09-05T14:29:32.737000
@ -264702,7 +264703,7 @@ CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f984834
CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000
CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000
CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df83,2024-11-21T09:43:06.003000
CVE-2024-4558,0,0,6319ac274b3ab76bffc38c725a48d555c771268c9442fa37616694385120fee1,2024-11-21T09:43:06.137000
CVE-2024-4558,0,1,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000
CVE-2024-45586,0,0,c5742d0b574ab22b2df0aff8f44af2d16b298829271ece1a5c24a5de23ca2b0a,2024-09-04T12:15:05.320000
CVE-2024-45587,0,0,676b2002aac47e9967f7d32f0f4cca8f2986385214e3c17fc6693869db40c1a7,2024-09-04T12:15:05.530000
CVE-2024-45588,0,0,e602a5b67a431535ce7343d20bd27a01a8e11f9a6a3313f6b0f98fb929ec70a0,2024-09-04T12:15:05.673000
@ -264816,7 +264817,7 @@ CVE-2024-45765,0,0,d08df3289bc68e719740469698ac413966bdff60f13781ac62b99dc021094
CVE-2024-45766,0,0,3c96c4b692f72cef2f3b9553cac8d6f167af7d571a147249c8f73e3c5c52eb55,2024-12-02T14:37:32.017000
CVE-2024-45767,0,0,7c5b48c8e706e6c8ae501761d8be0d401e1b87d8e52b758c1a580381e866ae36,2024-12-02T14:32:37.183000
CVE-2024-45769,0,0,b04be771ec22a94fd636520cce7793ef84bf69518cc6b17c7f3bae1b59effde1,2024-11-12T18:15:35.427000
CVE-2024-4577,0,0,3625836163a5f3e5e389ab3d9e0be9ab45faf95f0245dc9e05c551541a077c34,2024-11-21T09:43:08.587000
CVE-2024-4577,0,1,474670197f5b401b0f7966aa2604f0e876d2981d00c3e623c8f6cb422c084d74,2024-12-20T18:45:19.983000
CVE-2024-45770,0,0,267f93e21ecc31e4fc632c3f76596fa0f17b118159b4949d285e04a4fd4cf0a5,2024-11-12T18:15:35.643000
CVE-2024-45771,0,0,84e68bbbb4be0001ff7299935d532d5147425a2dd756db5ffa7c61cd227dec6b,2024-09-09T15:35:11.567000
CVE-2024-45772,0,0,749d9c0457e8d2cebf6e758f71d81f70d7548cb8ba90f16f72c767b31006b29b,2024-12-12T17:15:10.457000
@ -266119,7 +266120,7 @@ CVE-2024-47729,0,0,fb9a3faae532a190b209638889d4832a1d191c04842bce7afb041141eec36
CVE-2024-4773,0,0,f07928dcaaae5547ae54333e5752e7ed4bba50f109f8629be58c47cb4fadd4f8,2024-11-21T09:43:34.870000
CVE-2024-47730,0,0,c6a9de9e049a16d83f626647f6f2c8b4ce794fd7c5922ed53347a89cb17a969d,2024-12-14T21:15:26
CVE-2024-47731,0,0,2756673f447be2086c764fb0084779dae2a0a2504478f334b1544eccc1563c5d,2024-10-23T17:06:14.323000
CVE-2024-47732,0,1,05bbc804c4a0c0d9d685cce21a450e0245c74d19ed4566d6c1d9947b0a7b8a56,2024-12-20T15:44:01.303000
CVE-2024-47732,0,0,05bbc804c4a0c0d9d685cce21a450e0245c74d19ed4566d6c1d9947b0a7b8a56,2024-12-20T15:44:01.303000
CVE-2024-47733,0,0,11a8a1225a2051b1e4caaabdc12052064513ae3d9225538c36ed409eb08ff462,2024-10-23T17:11:29.537000
CVE-2024-47734,0,0,5e5700382d355b46474a0bfa92c47869d8da9e178f09ce7eb5625a5032dba08c,2024-10-23T17:16:13.457000
CVE-2024-47735,0,0,a0c8f15cafb24e18391bda11b17021459a43e5529c34748cf489eefd8dea5af4,2024-10-23T21:00:03.940000
@ -268134,7 +268135,7 @@ CVE-2024-50614,0,0,29f22ac93163ff1303a42a1fec38fde0552d285d63129bbab00c726fede4a
CVE-2024-50615,0,0,4d2a2e353be570a02fcdfff0b42fb37b106e2c1e8ab4e77f1c580e4daa183aa0,2024-10-30T20:35:37.310000
CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac77217c,2024-10-30T20:35:38.380000
CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000
CVE-2024-50623,0,1,fbc7180051d21f3b882ce8b014ba2136036caba5e6fb74887641a3e6975ea4c8,2024-12-20T15:04:26.097000
CVE-2024-50623,0,0,fbc7180051d21f3b882ce8b014ba2136036caba5e6fb74887641a3e6975ea4c8,2024-12-20T15:04:26.097000
CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000
CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000
CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000
@ -268569,7 +268570,7 @@ CVE-2024-51596,0,0,5f7957abcc65695fbbbad369f30f56995f2266af1552e60fdcef5cab61a0c
CVE-2024-51597,0,0,62ae94ab5483c8d914f03c3a46d4ad60c3488941e5f47bbc41dd3d393a27d642,2024-11-14T20:27:46.943000
CVE-2024-51598,0,0,b4e6d650a73e1979019c94432440fb4ee1a330b76ce10aeee6076e05c49770c4,2024-11-18T16:37:58.447000
CVE-2024-51599,0,0,41501685029147c7f1c1c0dd3faf8f8f30cd0ee0cdea7acc19942d2a1a69cdd9,2024-11-15T16:55:34.480000
CVE-2024-5160,0,0,3988dd66d5b268540866cfffcf2e32587e4a470f8718cc9928d30184f9c32f97,2024-11-21T09:47:05.947000
CVE-2024-5160,0,1,462a8d8a97ff197783bab283d57d42e89329228755b3d0d006ae98342028e950,2024-12-20T17:14:27.630000
CVE-2024-51601,0,0,6ea142c530f0aae8d6a6871925766314779a5853c3a3fd2488392521b8763ae7,2024-11-12T13:56:24.513000
CVE-2024-51602,0,0,630897b856830c417cfbfc6f31a1ad6d5f36ec4cb1e807fd8c47eecb679f5e29,2024-11-12T13:56:24.513000
CVE-2024-51603,0,0,a00fc055583804474eecc8fe08a40d10c605dbcb3203377f2692135c26defd6c,2024-11-15T16:24:18.843000
@ -269762,7 +269763,7 @@ CVE-2024-53673,0,0,998c285a4fe0e35cbecbdb698279013b408c1bb4163a1e69369fac314d145
CVE-2024-53674,0,0,f555b7f03d33cd061d1493d8fc99309d52915e66d5ae0672802dcf1d36a50f32,2024-12-12T19:49:49.800000
CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681ab0,2024-12-12T19:48:48.443000
CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000
CVE-2024-53677,0,1,2c82f6dfafd4ab59665cd854e88961198dbdaaddbf165399a6a329129ec73fad,2024-12-20T16:15:23.723000
CVE-2024-53677,0,0,2c82f6dfafd4ab59665cd854e88961198dbdaaddbf165399a6a329129ec73fad,2024-12-20T16:15:23.723000
CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f416,2024-11-21T09:47:30.877000
CVE-2024-53688,0,0,39c0c1265bef5471cee144abe50646778e59e18b4acc0bb850c0ac5745fa9205,2024-12-18T07:15:08.233000
CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000
@ -270084,7 +270085,7 @@ CVE-2024-54143,0,0,39896e76381b970ed0c53caca39df9efa5206ded9e17479626eb381c775f3
CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000
CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000
CVE-2024-5415,0,0,74eb25978de9e4a46066392a5c5808fd8612c02bf2d68d6ca3b049d5a2727bf3,2024-11-21T09:47:36.587000
CVE-2024-54150,0,0,8b87272eabeaaecd01e7e74c6972cd286cf6e22ccb1ca9a224533e8bfcff8a60,2024-12-19T19:15:07.747000
CVE-2024-54150,0,1,2df54d94caae27dd20c93dacb8da181f1ca94c7f90068ee4b0f13c650c491939,2024-12-20T18:15:29.847000
CVE-2024-54151,0,0,783d6d59d625f0bdd386ea3afbe7da13ff4dd113b20f53b68a2b065516a078c2,2024-12-10T18:15:42.663000
CVE-2024-54152,0,0,64d47547e5307ed80a7f425b825ed1812b96ec6e10500fe8d7bfb0506a4a9529,2024-12-10T16:15:23.947000
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
@ -270402,7 +270403,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
CVE-2024-54538,0,0,a341d84e7331b4f88e4a4de0734a6dbc63f4461b5355f04ec78215b07d52330e,2024-12-20T01:15:06.927000
CVE-2024-54538,0,1,852dbad43cdeedfebb43616219b77e4f71051ccf9eb6e4f37330d9a15dcb3456,2024-12-20T18:15:30.117000
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
@ -270519,7 +270520,7 @@ CVE-2024-5515,0,0,71f85130fea0d24f5b9be7e16c835c5ed3481816e9a79890f353f21aacfd58
CVE-2024-5516,0,0,c08d269a372fc11280e8cde7e2bd4dd476d490152ebd7e95c97d81e21a24e07b,2024-11-21T09:47:50.973000
CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced73e,2024-11-21T09:47:51.110000
CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000
CVE-2024-55186,1,1,1f80915f47017fe86c95b39d3d0d7dcf5d470e148856f0979d72772ad48b8e03,2024-12-20T16:15:23.853000
CVE-2024-55186,0,0,1f80915f47017fe86c95b39d3d0d7dcf5d470e148856f0979d72772ad48b8e03,2024-12-20T16:15:23.853000
CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000
CVE-2024-55196,0,0,9d11e523a63faa541fa5f25136e4bd3a5a9a55216c26bfb1ac46188bd003d9d8,2024-12-19T19:15:07.947000
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
@ -270553,8 +270554,8 @@ CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
CVE-2024-55461,0,0,9aba9528846a5e20a9950a25279e0e578fc2f2326e2132736dcd635d432a883c,2024-12-18T23:15:17.350000
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
CVE-2024-55470,1,1,e1f3abfd521ac0af47361a762a69061690ca9aef330cb7d7a15e941d9fd00ebc,2024-12-20T16:15:23.977000
CVE-2024-55471,1,1,b52a4062fc8e7185ce5e7d77a0f964031e849f7988863d57c0330bb2e29dbcf6,2024-12-20T16:15:24.120000
CVE-2024-55470,0,1,f10f88d381c38a6bb90a0cdcf59cafaf3bca46a0e69a80516bbcddff56813b8e,2024-12-20T18:15:30.370000
CVE-2024-55471,0,1,8197056e8f9960cec09b7a262aff3c8a7edfb21525e204bb4dac240446354cbd,2024-12-20T18:15:30.730000
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad7c0,2024-12-18T19:15:11.777000
@ -270661,7 +270662,7 @@ CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b50
CVE-2024-55951,0,0,0f2ba68ba5d937d3f08ffc28ee064a50ef5129020d2db58a508d614718a5fb19,2024-12-16T20:15:13.823000
CVE-2024-55952,0,0,b12980f18101c5484cb3f148aff3182385a343546fffaeb697cc810a408ff07f,2024-12-18T19:15:11.933000
CVE-2024-55953,0,0,2fb8456a2c636a9e07d81fd7dc8a938cab1a83bda21c4d2b67051aa5d8d86cd7,2024-12-18T19:15:12.067000
CVE-2024-55956,0,1,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000
CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000
CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000
CVE-2024-55969,0,0,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000
CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000
@ -270776,20 +270777,20 @@ CVE-2024-56317,0,0,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826
CVE-2024-56318,0,0,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000
CVE-2024-56319,0,0,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
CVE-2024-56327,0,0,ca1393112b26d20553e2748693dd0e68f578c32c973ba4c41abc461ad3896c85,2024-12-19T23:15:07.147000
CVE-2024-56327,0,1,7f279bf8e8dad1abfccdde7f80cf3a1198eceeaed727f435a201d9524ff4caea,2024-12-20T18:15:31.083000
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
CVE-2024-56337,1,1,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000
CVE-2024-56337,0,0,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
CVE-2024-56348,1,1,cb28f0ed181f8223b2a47a2fb92147cc1a57b8274cdd4b7dbeaa070416c64567,2024-12-20T15:15:05.507000
CVE-2024-56349,1,1,ab14f92d286039eccb0c2484d14d266ee0cd7866bd8293eb806c755563ca97b6,2024-12-20T15:15:08.300000
CVE-2024-56348,0,0,cb28f0ed181f8223b2a47a2fb92147cc1a57b8274cdd4b7dbeaa070416c64567,2024-12-20T15:15:05.507000
CVE-2024-56349,0,0,ab14f92d286039eccb0c2484d14d266ee0cd7866bd8293eb806c755563ca97b6,2024-12-20T15:15:08.300000
CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000
CVE-2024-56350,1,1,7b1812d59665b11db258f739125b115bbd155cd393574b71b353cb44b75e793d,2024-12-20T15:15:08.513000
CVE-2024-56351,1,1,155dac26658e047b267d56461d036ea027f9b3814fe902c765b71e10add7ea74,2024-12-20T15:15:08.720000
CVE-2024-56352,1,1,ca4f1b58a65d31e84d3749d8cf8b089736d75cab42a699b3d1eb93935d436c05,2024-12-20T15:15:08.970000
CVE-2024-56353,1,1,ae4bf97a5e1ee216e5415c2193a6048425b28543177ec16a6fe8cfcd94c082af,2024-12-20T15:15:09.183000
CVE-2024-56354,1,1,61538a6f4130866818f35928ce5defeadc2b6e7d958e8e8cab12bd8ba0484ab0,2024-12-20T15:15:09.400000
CVE-2024-56355,1,1,21efaad8f1c58d999a4416cf6d326431dedd314af26993c0e70693f39d0a6552,2024-12-20T15:15:09.630000
CVE-2024-56356,1,1,0311ad340d8557b44a140f6e660b54052200e785ccacf5ea6656b7d035c17abc,2024-12-20T15:15:09.847000
CVE-2024-56350,0,0,7b1812d59665b11db258f739125b115bbd155cd393574b71b353cb44b75e793d,2024-12-20T15:15:08.513000
CVE-2024-56351,0,0,155dac26658e047b267d56461d036ea027f9b3814fe902c765b71e10add7ea74,2024-12-20T15:15:08.720000
CVE-2024-56352,0,0,ca4f1b58a65d31e84d3749d8cf8b089736d75cab42a699b3d1eb93935d436c05,2024-12-20T15:15:08.970000
CVE-2024-56353,0,0,ae4bf97a5e1ee216e5415c2193a6048425b28543177ec16a6fe8cfcd94c082af,2024-12-20T15:15:09.183000
CVE-2024-56354,0,0,61538a6f4130866818f35928ce5defeadc2b6e7d958e8e8cab12bd8ba0484ab0,2024-12-20T15:15:09.400000
CVE-2024-56355,0,0,21efaad8f1c58d999a4416cf6d326431dedd314af26993c0e70693f39d0a6552,2024-12-20T15:15:09.630000
CVE-2024-56356,0,0,0311ad340d8557b44a140f6e660b54052200e785ccacf5ea6656b7d035c17abc,2024-12-20T15:15:09.847000
CVE-2024-5636,0,0,be674ee7db367fbb27ae45f825fa3b6cac855c767643bde3f8b1378da8ddb51a,2024-11-21T09:48:03.883000
CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000
CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000
@ -272302,7 +272303,7 @@ CVE-2024-7335,0,0,6efef3e91e3c352c21a4a20104c1849917c99aa0cb8c29a317c82bf80219ce
CVE-2024-7336,0,0,72fe049a9c4a42327f24842fd4a4696aeed616b51612841f704f8cb6d51709cc,2024-08-09T14:38:01.050000
CVE-2024-7337,0,0,2cd8270b417854f033216917f41d138f4d99c785eb4b08e1968382f45f87c011,2024-08-09T14:15:19.283000
CVE-2024-7338,0,0,8a7fe0b32a7363bf332020943a56b4fd58e7fadb61846e600b7d3232ab649d6e,2024-08-09T14:51:45.677000
CVE-2024-7339,0,0,8854018e2511471ed50cf61fcd659bbf523f553173576f19bd620025a67a8900,2024-08-23T16:53:31.643000
CVE-2024-7339,0,1,237e183fe2ab6169b5254e999c16693fd3f1e5326834530750ba0a0993957986,2024-12-20T17:37:05.217000
CVE-2024-7340,0,0,afceb6b3fac1138f8cb83e0f415cec5ebdcab90ac887ac6cc7416d04596c3384,2024-11-25T13:15:08.107000
CVE-2024-7341,0,0,9879605967e8521e630e3508fca649ab0616466777cf91cc4c4478c8d606e537,2024-10-04T12:48:43.523000
CVE-2024-7342,0,0,bbab372366d62b7492fd885c0fd46da4598051b512f5991327f8cfce46915879,2024-08-15T18:40:22.537000
@ -272646,7 +272647,7 @@ CVE-2024-7722,0,0,1be42e9fa865f14842632e753ce2fd5525bfe496ac913b8198c3458ae138ff
CVE-2024-7723,0,0,53ce768e0253fabfcdcbee8bbee79e38aca674fab610c16e178e185de0bd0f10,2024-10-18T15:45:47.643000
CVE-2024-7724,0,0,ab2131ce24737b6ffb1c65566389459a8a15a8bc524a621ec3a84a692ed10d3f,2024-10-18T15:45:35.440000
CVE-2024-7725,0,0,146b8c15ef088fe775e30ab61f308dfc209693724a7604dc64296c7f791074f5,2024-10-18T15:45:29.083000
CVE-2024-7726,0,1,74ee1598c997bc48280475811f61395f508d9d73ccce708888a3fe6630a6e839,2024-12-20T16:15:24.403000
CVE-2024-7726,0,0,74ee1598c997bc48280475811f61395f508d9d73ccce708888a3fe6630a6e839,2024-12-20T16:15:24.403000
CVE-2024-7727,0,0,552f222c31326559d81397831be64909c21cf9eddea22427bcac75d9d64f596e,2024-09-18T18:07:55.450000
CVE-2024-7728,0,0,db37ae32cb8fbaca95eaf3a5d1c8bd7414f6cbc0b1d146de5c8b8ffc1f589031,2024-08-14T13:00:37.107000
CVE-2024-7729,0,0,3216985110d2bf3d58df21572b65b285ec97282c2bbccb9ffa801e1ebdc5c925,2024-08-14T13:00:37.107000
@ -273529,10 +273530,10 @@ CVE-2024-8801,0,0,1e0aae29be9c0cb744c09fcf6b871e68e47c8e0119f25e788bcd23b055cde1
CVE-2024-8802,0,0,519ccb5eaf9bc8f3d38918f4150aeae97a2c25ee8bbd45cda3cfef957efbe87a,2024-10-08T21:49:10.173000
CVE-2024-8803,0,0,545e61fa61f0ce131642be6837336dfca74425fdd247a1c1bbc9c5682d94d2b1,2024-10-02T17:15:12.677000
CVE-2024-8804,0,0,522f84c5f3d62fdb46aab7f45c91feee68128f2626214a0b2e00b68dfdfedbeb,2024-10-10T20:56:49.403000
CVE-2024-8805,0,0,1b664a3c9c360dd3541ca17d0fcce8885e89d2f9c8577a041bbe012514c911f4,2024-11-22T21:15:18.660000
CVE-2024-8806,0,0,bb65f0da9d3937ae21d515d57a2bf2dad6def2829efe52b6ce8ac49e13431770,2024-11-22T21:15:18.770000
CVE-2024-8807,0,0,b964b80d57fb5b155e00f943c40878048b4b4f70fd7e34f634fbc7d8697a2335,2024-11-22T21:15:18.880000
CVE-2024-8808,0,0,a3340507b2641d51a561cf119c1180b58d18782c90de62ffea3cc877e5afd060,2024-11-22T21:15:18.993000
CVE-2024-8805,0,1,dcb9955ad68abfddebfd4e5bbca8162f29f9659b32eab2eee4abd640abddb92c,2024-12-20T18:05:47.173000
CVE-2024-8806,0,1,4b9ed01ad6f672a2c6917fa3d7270b3791ade8f8d7c799fd1977d8d49125e25d,2024-12-20T17:56:56.057000
CVE-2024-8807,0,1,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a976b,2024-12-20T17:56:46.357000
CVE-2024-8808,0,1,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000
CVE-2024-8809,0,0,df2af4ed972c3756a9ce5829b125387cf06c9bd85112caf7f226db4fce399e8f,2024-11-22T21:15:19.110000
CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000
CVE-2024-8811,0,0,418d39ac888dbd68c2a13d5c78c52a880b2f463323c747a1361b39471602e241,2024-11-22T21:15:19.220000
@ -273671,7 +273672,7 @@ CVE-2024-8963,0,0,581521bb2c8b1b5f22bc02521a37b1605cb082ee4bc9fbe4e287e83cb93654
CVE-2024-8964,0,0,c3c0787fe6644e5ecb28ab585ed80f03eded601812c8114e1e7b6807baaa0335,2024-10-10T12:56:30.817000
CVE-2024-8965,0,0,f8e90b5b67b70a8381e6e9eacdc79df30f60298bdd1400482e72c97cbc06eff9,2024-10-04T19:04:03.157000
CVE-2024-8967,0,0,7898714718fda7e623053515c819c9ef828b8e1f849f0008b801f032918cd46a,2024-10-08T18:47:12.110000
CVE-2024-8968,0,0,c7a16d386151e00dcac012f34369d8416279fb51787e8aeab959c965eeccc8e5,2024-12-20T06:15:23.110000
CVE-2024-8968,0,1,0a7f9362d7e255d4c1311c1efcc8d15f2865f5f917558bd1ff65379f6a9f7791,2024-12-20T17:15:21.800000
CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab304109,2024-09-20T12:30:51.220000
CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000
CVE-2024-8972,0,0,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000
@ -274056,7 +274057,7 @@ CVE-2024-9470,0,0,de8cca0bb7ecf5d73abf3ec8e7b79c63cfe78584b08d2a23419e01da944fb1
CVE-2024-9471,0,0,ee64edae62595652f9e031febeb106a9fef6ec8a4689e59ac10dd4c0ff3f66e2,2024-10-15T16:55:45.090000
CVE-2024-9472,0,0,c51f71a634d16101c114efc02d664c96ad53e9b116baeb90934dcb6dd53dd3d1,2024-11-15T13:58:08.913000
CVE-2024-9473,0,0,f6c9a898171a9d9c49db03ffaa7b31e8eb0b14f099d64d8ee3734d2400d39156,2024-11-21T09:54:26.150000
CVE-2024-9474,0,1,1d31eb3d081616c7758209c9a8d15ae6b9664d71a1b6a74a48b1d5ad5547d62e,2024-12-20T16:49:55.993000
CVE-2024-9474,0,0,1d31eb3d081616c7758209c9a8d15ae6b9664d71a1b6a74a48b1d5ad5547d62e,2024-12-20T16:49:55.993000
CVE-2024-9475,0,0,549f03349a4c2962b2a1e78fa0de4a2bf552d6361ecca4c48badd4c65e80d21d,2024-10-28T13:58:09.230000
CVE-2024-9476,0,0,9a4bfa275479230ca0990279f5d3aa6d6ef96696231e23741760bea23fb13726,2024-11-21T17:15:28
CVE-2024-9477,0,0,cedb77cc76ea529b92650dd6e41d358747c6c58bf375896899351c8fde982982,2024-11-15T22:54:21.233000
@ -274216,7 +274217,7 @@ CVE-2024-9683,0,0,e0cd26df0500a0cc9db7c9689d39531f945e069407d58ce00900c54b93d56e
CVE-2024-9685,0,0,cc3d7e9b75de00d1df5b699f1225e3406f130ded3472b38175cabcbf3eacf7fe,2024-10-15T14:30:00.483000
CVE-2024-9686,0,0,1eb5e9681f976db1ddb26c27583f7f31c774b0e8d030243eb6a1a3ae9e4e826e,2024-11-06T16:19:04.333000
CVE-2024-9687,0,0,70a9bb470b4d3f8dcd4b2d1d45e9a9c3021b1c31156ba9f4250d50e915b4527e,2024-10-17T21:11:14.197000
CVE-2024-9689,0,0,eb87b30eceb7d26aeaa908ddada87c691821397ec06ff7ba148ffaab7271bc31,2024-11-07T20:35:16.807000
CVE-2024-9689,0,1,c2f301aff56dc675215855fe0f01b6009756e74ad68004e6c120b70b465093eb,2024-12-20T18:59:47.850000
CVE-2024-9692,0,0,c09412d3ade796bbe36fcbdc283e7a2ecfb61423341d9a573b10de9b4af8a991,2024-10-25T12:56:07.750000
CVE-2024-9693,0,0,96c2aa2e3e432eefa572dcd34b83d0c8393d8a6c0331136462b7a8bf8e88cb01,2024-11-26T01:57:19.427000
CVE-2024-9694,0,0,300f71d40bb815a23c3a0bc83a96e03beb3f23d9fc0b94128148bd02f8e753bb,2024-12-03T03:15:05.123000

Can't render this file because it is too large.