Auto-Update: 2024-11-19T17:00:28.336990+00:00

This commit is contained in:
cad-safe-bot 2024-11-19 17:03:31 +00:00
parent 65ea59b623
commit f92f7f9d20
81 changed files with 3886 additions and 426 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2016-7514",
"sourceIdentifier": "security@debian.org",
"published": "2017-04-20T18:59:00.873",
"lastModified": "2017-05-09T12:40:05.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:51:22.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.1-0",
"matchCriteriaId": "3CF7D553-5B42-467A-A21D-B3AE0E97DDE8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-13312",
"sourceIdentifier": "security@android.com",
"published": "2024-11-15T22:15:14.300",
"lastModified": "2024-11-18T17:11:56.587",
"lastModified": "2024-11-19T16:35:02.293",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En createFromParcel de MediaCas.java, existe una posible discrepancia entre la lectura y la escritura de paquetes debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, donde una aplicaci\u00f3n puede iniciar una actividad con privilegios del sistema sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-13313",
"sourceIdentifier": "security@android.com",
"published": "2024-11-15T22:15:14.373",
"lastModified": "2024-11-18T17:11:56.587",
"lastModified": "2024-11-19T16:35:03.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En ElementaryStreamQueue::dequeueAccessUnitMPEG4Video de ESQueue.cpp, existe un posible bucle infinito que conduce al agotamiento de los recursos debido a una comprobaci\u00f3n incorrecta de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-13314",
"sourceIdentifier": "security@android.com",
"published": "2024-11-15T22:15:14.440",
"lastModified": "2024-11-18T17:11:56.587",
"lastModified": "2024-11-19T16:35:03.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En setAllowOnlyVpnForUids de NetworkManagementService.java, existe una posible omisi\u00f3n de la configuraci\u00f3n de seguridad debido a la falta de una verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios que permita a los usuarios acceder a redes que no sean VPN, cuando se supone que deben estar restringidos a las redes VPN, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",

View File

@ -2,13 +2,13 @@
"id": "CVE-2020-11001",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-04-14T23:15:11.917",
"lastModified": "2020-04-15T19:15:41.207",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-19T16:15:18.007",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Wagtail before versions 2.8.1 and 2.7.2, a cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch)."
"value": "In Wagtail before versions 2.8.1 and 2.7.2, a cross-site scripting (XSS) vulnerability exists on the page revision\ncomparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail\nadmin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform\nactions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to\nthe Wagtail admin.\n\nPatched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch)."
},
{
"lang": "es",
@ -86,22 +86,26 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-80"
}
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
"value": "CWE-79"
}
]
}
@ -131,22 +135,6 @@
}
],
"references": [
{
"url": "https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/wagtail/wagtail/releases/tag/v2.8.1",
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
]
},
{
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6",
"source": "security-advisories@github.com",

View File

@ -2,13 +2,13 @@
"id": "CVE-2020-11037",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-04-30T23:15:11.887",
"lastModified": "2020-05-08T15:57:02.020",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-19T16:15:18.243",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Wagtail before versions 2.7.2 and 2.8.2, a potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's \"Privacy\" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. This is understood to be feasible on a local network, but not on the public internet. Privacy settings that restrict access to pages/documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability. This has been patched in 2.7.3, 2.8.2, 2.9."
"value": "In Wagtail before versions 2.7.3 and 2.8.2, a potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's \"Privacy\" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. This is [understood to be feasible on a local network, but not on the public internet](https://groups.google.com/d/msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ).\n\nPrivacy settings that restrict access to pages/documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability.\n\nThis has been patched in 2.7.3, 2.8.2, 2.9."
},
{
"lang": "es",
@ -133,6 +133,22 @@
}
],
"references": [
{
"url": "https://github.com/wagtail/wagtail/commit/3c030490ed575bb9cd01dfb3a890477dcaeb2edf",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/wagtail/wagtail/commit/b76ab57ee859732b9cf9287d380493ab24061090",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/wagtail/wagtail/commit/ba9d424bd1ca5ce1910d3de74f5cc07214fbfb11",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/wagtail/wagtail/commit/bac3cd0a26b023e595cf2959aae7da15bb5e4340",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6",
"source": "security-advisories@github.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3987",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:06.610",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:44:38.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +83,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.15",
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/janeczku/calibre-web/commit/bcdc97641447965af486964537f3821f47b28874",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/29fcc091-87b6-43bc-ab4b-3c0bec3f71df",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3988",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:06.877",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:43:01.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.15",
"matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/fa4c8fd1-7846-4dad-9112-2c07461f0609",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3991",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:07.173",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:31:47.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +83,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "20.0.2",
"matchCriteriaId": "4AD52BB9-72D2-4369-9301-456090AC4CAA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dolibarr/dolibarr/commit/63cd06394f39d60784d6e6a0ccf4867a71a6568f",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/58ddbd8a-0faf-4b3f-aec9-5850bb19ab67",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1226",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:07.527",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:30:53.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.7",
"matchCriteriaId": "423B42AB-F118-4DFE-89ED-2480875972AE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/phpipam/phpipam/commit/50e36b9e4fff5eaa51dc6e42bc684748da378002",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/3fdcf653-fe26-4592-94a1-98ce664618ec",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31667",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:16.390",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:25:29.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -51,10 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.4.3",
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.5.0",
"versionEndExcluding": "2.5.2",
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31668",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:16.607",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:25:25.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -51,10 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.4.3",
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.5.0",
"versionEndExcluding": "2.5.2",
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31669",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:16.817",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:20:01.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -51,10 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.4.3",
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.5.0",
"versionEndExcluding": "2.5.2",
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-8c6p-v837-77f6",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31670",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:17.040",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:20:54.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -51,10 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.10.13",
"matchCriteriaId": "2A003057-D07D-42FC-823E-750DE181D14D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.4.3",
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.5.0",
"versionEndExcluding": "2.5.2",
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3637-v6vq-xqqw",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31671",
"sourceIdentifier": "security@vmware.com",
"published": "2024-11-14T12:15:17.250",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:40:44.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -51,14 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.4.3",
"matchCriteriaId": "14BEA987-A012-4745-A79A-7BCF5E9CD567"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.5.0",
"versionEndExcluding": "2.5.2",
"matchCriteriaId": "1B643770-6018-4D81-B386-91011E437F0D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-3wpx-625q-22j7",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/goharbor/harbor/security/advisories/GHSA-q76q-q8hw-hmpw",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20593",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-07-24T20:15:10.237",
"lastModified": "2024-06-10T18:15:20.270",
"lastModified": "2024-11-19T16:35:07.333",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2332",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:08.643",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:55:24.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimcore:pimcore:10.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE99AD3-E02D-4FAE-AF25-AD88E502338B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/commit/a4491551967d879141a3fdf0986a9dd3d891abfe",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/e436ed71-6741-4b30-89db-f7f3de4aca2c",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4679",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:08.917",
"lastModified": "2024-11-15T20:35:03.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:54:32.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -73,14 +93,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.3.0-dev:*:*:*:*:*:*:*",
"matchCriteriaId": "AF29EFBA-0C6D-4504-8EA9-E03D3814A261"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-49952",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T18:15:05.927",
"lastModified": "2024-11-18T18:15:05.927",
"lastModified": "2024-11-19T16:35:08.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mastodon 4.1.x before 4.1.17 and 4.2.x before 4.2.9 allows a bypass of rate limiting via a crafted HTTP request header."
},
{
"lang": "es",
"value": "Mastodon 4.1.x anterior a 4.1.17 y 4.2.x anterior a 4.2.9 permiten eludir la limitaci\u00f3n de velocidad a trav\u00e9s de un encabezado de solicitud HTTP manipulado espec\u00edficamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mastodon/mastodon/security",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0787",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:09.213",
"lastModified": "2024-11-15T19:35:04.380",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:53:59.093",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -73,14 +93,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.0",
"matchCriteriaId": "896B6AA4-8068-41F4-ACD4-92893E5BB0AD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00b5",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5bab",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0875",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-11-15T11:15:09.490",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:03:56.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-emr:openemr:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "49234EA5-1593-40E1-93AF-A71F05056639"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openemr/openemr/commit/d141d2ca06fb2171a202c7302dd5d5af8539f255",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/16cba0fc-748d-4ea8-9573-1f6fbe9a27c9",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-10103",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-19T06:15:17.740",
"lastModified": "2024-11-19T06:15:17.740",
"lastModified": "2024-11-19T15:35:04.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the process of testing the MailPoet WordPress plugin before 5.3.2, a vulnerability was found that allows you to implement Stored XSS on behalf of the editor by embedding malicious script, which entails account takeover backdoor"
},
{
"lang": "es",
"value": "En el proceso de prueba del complemento MailPoet para WordPress anterior a la versi\u00f3n 5.3.2, se encontr\u00f3 una vulnerabilidad que permite implementar XSS almacenado en nombre del editor mediante la incorporaci\u00f3n de un script malicioso, lo que implica una puerta trasera de apropiaci\u00f3n de cuentas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/89660883-5f34-426a-ad06-741c0c213ecc/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10394",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T20:15:20.777",
"lastModified": "2024-11-15T13:58:08.913",
"lastModified": "2024-11-19T16:35:09.703",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 0.0
}
]
},
"weaknesses": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10396",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T20:15:20.917",
"lastModified": "2024-11-15T13:58:08.913",
"lastModified": "2024-11-19T16:35:09.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 0.0
}
]
},
"weaknesses": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10397",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-14T20:15:21.057",
"lastModified": "2024-11-15T13:58:08.913",
"lastModified": "2024-11-19T16:35:10.143",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 0.0
}
]
},
"weaknesses": [

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-10524",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-11-19T15:15:06.740",
"lastModified": "2024-11-19T15:15:06.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "reefs@jfrog.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "reefs@jfrog.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778",
"source": "reefs@jfrog.com"
},
{
"url": "https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/",
"source": "reefs@jfrog.com"
},
{
"url": "https://seclists.org/oss-sec/2024/q4/107",
"source": "reefs@jfrog.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10571",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-14T11:15:04.630",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:46:52.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ays-pro:chartify:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "2.9.6",
"matchCriteriaId": "92AB71F0-6DDD-4FCA-81E4-C31699DB8116"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/chart-builder/tags/2.9.6/admin/partials/charts/actions/chart-builder-charts-actions-options.php?rev=3184238",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4837258-c749-4194-926c-22b67e20c1fc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10877",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T07:15:06.197",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:52:44.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:advancedformintegration:advanced_form_integration:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.92.1",
"matchCriteriaId": "E42DC547-EF2B-4942-B7C9-A11A14EDADC5"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-form-integration/tags/1.91.4/includes/class-adfoin-log-table.php#L245",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3185778/advanced-form-integration/trunk/includes/class-adfoin-log-table.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/936de04d-9b80-430b-a8b7-9755b68e2a02?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11028",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T10:15:04.237",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:38:19.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:icdsoft:multimanager_wp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "BC69E7B4-166A-4804-874E-DC59E5FBA8B7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3184657/multimanager-wp",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3184678/multimanager-wp",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3184826/multimanager-wp",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de8e7adc-3777-4fb1-a708-68da950e3d4f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11150",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T05:15:12.337",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T16:57:05.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vanquish:user_extra_fields:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "16.7",
"matchCriteriaId": "51950C34-787B-4170-BD3D-E8D82995ACDB"
}
]
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/user-extra-fields/12949844",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad39d797-9230-41d9-a335-864845b56aa0?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11212",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-14T15:15:08.360",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:48:22.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,26 +154,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/physicszq/web_issue/blob/main/Management/sql_injection01.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.284528",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.284528",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.442035",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11213",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-14T16:15:18.450",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:48:58.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,26 +154,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/authenticated_sqli_Employee_management_system.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.284529",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.284529",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.443298",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11214",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-14T16:15:18.707",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:38:59.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -109,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -124,26 +154,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "085DDBB3-1FD4-4947-916D-1AEF70F258C3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/Employee_management%20_system_RCE.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.284530",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.284530",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.443304",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1367",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-02-14T22:15:47.753",
"lastModified": "2024-02-15T06:23:39.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:06:33.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.0",
"matchCriteriaId": "E4F24FE6-9C35-4B06-99E7-B38E07712148"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/tns-2024-02",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1471",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-02-14T22:15:47.953",
"lastModified": "2024-02-15T06:23:39.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:05:53.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.0",
"matchCriteriaId": "E4F24FE6-9C35-4B06-99E7-B38E07712148"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/tns-2024-02",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21287",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-11-18T22:15:05.897",
"lastModified": "2024-11-18T22:15:05.897",
"lastModified": "2024-11-19T16:35:10.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Software Development Kit, Process Extension). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto Oracle Agile PLM Framework de Oracle Supply Chain (componente: Kit de desarrollo de software, extensi\u00f3n de proceso). La versi\u00f3n compatible afectada es la 9.3.6. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Agile PLM Framework. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle Agile PLM Framework. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/alert-cve-2024-21287.html",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-21539",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-19T05:15:16.453",
"lastModified": "2024-11-19T05:15:16.453",
"lastModified": "2024-11-19T16:35:11.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by exploiting this vulnerability."
},
{
"lang": "es",
"value": "Las versiones del paquete @eslint/plugin-kit anteriores a la 0.2.3 son vulnerables a la denegaci\u00f3n de servicio por expresi\u00f3n regular (ReDoS) debido a una desinfecci\u00f3n de entrada incorrecta. Un atacante puede aumentar el uso de la CPU y bloquear el programa al explotar esta vulnerabilidad."
}
],
"metrics": {
@ -45,6 +49,16 @@
"value": "CWE-1333"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21541",
"sourceIdentifier": "report@snyk.io",
"published": "2024-11-13T05:15:14.680",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T16:20:37.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:matthewmueller:dom-iterator:*:*:*:*:*:node.js:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "23F03C7B-1A8B-4FB7-9A5D-FE3C08D3ED56"
}
]
}
]
}
],
"references": [
{
"url": "https://security.snyk.io/vuln/SNYK-JS-DOMITERATOR-6157199",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31141",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-19T09:15:03.860",
"lastModified": "2024-11-19T09:15:03.860",
"lastModified": "2024-11-19T15:35:06.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Archivos o directorios accesibles para terceros, vulnerabilidad de administraci\u00f3n incorrecta de privilegios en clientes Apache Kafka. Los clientes Apache Kafka aceptan datos de configuraci\u00f3n para personalizar el comportamiento e incluyen complementos ConfigProvider para manipular estas configuraciones. Apache Kafka tambi\u00e9n proporciona implementaciones FileConfigProvider, DirectoryConfigProvider y EnvVarConfigProvider que incluyen la capacidad de leer desde el disco o variables de entorno. En aplicaciones donde las configuraciones de los clientes Apache Kafka pueden ser especificadas por un tercero que no es de confianza, los atacantes pueden usar estos ConfigProviders para leer contenido arbitrario del disco y las variables de entorno. En particular, esta falla puede usarse en Apache Kafka Connect para escalar desde el acceso a la API REST al acceso al sistema de archivos/entorno, lo que puede ser indeseable en ciertos entornos, incluidos los productos SaaS. Este problema afecta a los clientes Apache Kafka: desde 2.3.0 hasta 3.5.2, 3.6.2, 3.7.0. Se recomienda a los usuarios con aplicaciones afectadas que actualicen los clientes de Kafka a la versi\u00f3n >=3.8.0 y configuren la propiedad del sistema JVM \"org.apache.kafka.automatic.config.providers=none\". Tambi\u00e9n se recomienda a los usuarios de Kafka Connect con una de las implementaciones de ConfigProvider enumeradas en la configuraci\u00f3n de su trabajador que agreguen \"allowlist.pattern\" y \"allowed.paths\" adecuados para restringir su funcionamiento a los l\u00edmites adecuados. Para los usuarios de Kafka Clients o Kafka Connect en entornos que conf\u00edan a los usuarios el acceso a discos y variables de entorno, no se recomienda configurar la propiedad del sistema. Para los usuarios de Kafka Broker, Kafka MirrorMaker 2.0, Kafka Streams y las herramientas de l\u00ednea de comandos de Kafka, no se recomienda configurar la propiedad del sistema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-33231",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T23:15:04.783",
"lastModified": "2024-11-18T23:15:04.783",
"lastModified": "2024-11-19T15:35:06.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Ferozo Email version 1.1 allows a local attacker to execute arbitrary code via a crafted payload to the PDF preview component."
},
{
"lang": "es",
"value": "La vulnerabilidad de cross-site scripting en Ferozo Email versi\u00f3n 1.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el componente de vista previa de PDF."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fdzdev/CVE-2024-33231",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47208",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-18T09:15:06.100",
"lastModified": "2024-11-18T17:11:17.393",
"lastModified": "2024-11-19T15:35:09.570",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de falsificaci\u00f3n de solicitud del lado del servidor (SSRF) y control inadecuado de la generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en Apache OFBiz. Este problema afecta a Apache OFBiz: anterior a la versi\u00f3n 18.12.17. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.17, que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48284",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T18:15:19.150",
"lastModified": "2024-11-18T18:35:04.410",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T15:45:55.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48B4855A-8E96-4F34-8235-27971366F46E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/Reflected%20XSS%20-%20Search.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48292",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T18:15:06.260",
"lastModified": "2024-11-18T18:15:06.260",
"lastModified": "2024-11-19T16:35:12.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the wssrvc.exe service of QuickHeal Antivirus Pro Version v24.0 and Quick Heal Total Security v24.0 allows authenticated attackers to escalate privileges."
},
{
"lang": "es",
"value": "Un problema en el servicio wssrvc.exe de QuickHeal Antivirus Pro versi\u00f3n v24.0 y Quick Heal Total Security v24.0 permite a atacantes autenticados escalar privilegios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Nero22k/Disclosures/blob/main/QuickHealAV/CVE-2024-48292.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48293",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T19:15:05.527",
"lastModified": "2024-11-18T19:15:05.527",
"lastModified": "2024-11-19T16:35:13.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in QuickHeal Antivirus Pro 24.1.0.182 and earlier allows authenticated attackers with low-level privileges to arbitrarily modify antivirus settings."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en QuickHeal Antivirus Pro 24.1.0.182 y versiones anteriores permite a atacantes autenticados con privilegios de bajo nivel modificar arbitrariamente la configuraci\u00f3n del antivirus."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Nero22k/Disclosures/blob/main/QuickHealAV/CVE-2024-48293.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48294",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T19:15:05.590",
"lastModified": "2024-11-18T19:15:05.590",
"lastModified": "2024-11-19T16:35:14.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference in the component libPdfCore.dll of Wondershare PDF Reader v1.0.9.2544 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file."
},
{
"lang": "es",
"value": "Una desreferencia de puntero NULL en el componente libPdfCore.dll de Wondershare PDF Reader v1.0.9.2544 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo PDF manipulado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Nero22k/Disclosures/tree/main/Wondershare%20PDF%20Reader",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48897",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-18T12:15:18.243",
"lastModified": "2024-11-18T17:11:17.393",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:35:09.867",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Se encontr\u00f3 una vulnerabilidad en Moodle. Se requieren verificaciones adicionales para garantizar que los usuarios solo puedan editar o eliminar los feeds RSS que tengan permiso para modificar."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48962",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-18T09:15:06.237",
"lastModified": "2024-11-18T17:11:17.393",
"lastModified": "2024-11-19T16:35:14.930",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50201",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-08T06:15:16.663",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:08:36.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,146 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/radeon: Fix encoder->possible_clones Incluir el codificador en s\u00ed mismo en su m\u00e1scara de bits possible_clones. En el pasado, nada validaba que los controladores estuvieran completando possible_clones correctamente, pero eso cambi\u00f3 en el commit 74d2aacbe840 (\"drm: Validate encoder->possible_clones\"). Parece que Radeon nunca recibi\u00f3 la nota y todav\u00eda no sigue las reglas correctamente al 100%. Esto genera algunas advertencias durante la inicializaci\u00f3n del controlador: Possible_clones falsos: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) ADVERTENCIA: CPU: 0 PID: 170 en drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ... (seleccionado de el commit 3b6e7d40649c0d75572039aff9d0911864c689db)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.228",
"matchCriteriaId": "375994E0-BEE6-4DEC-928A-BE3C9E3A211D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.169",
"matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.114",
"matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.58",
"matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1a235af0216411a32ab4db54f7bd19020b46c86d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/28127dba64d8ae1a0b737b973d6d029908599611",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/68801730ebb9393460b30cd3885e407f15da27a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c3cd27d85f0778f4ec07384d7516b33153759b8e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/df75c78bfeff99f9b4815c3e79e2b1b1e34fe264",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fda5dc80121b12871dc343ab37e0c3f0d138825d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50202",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-08T06:15:16.723",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:12:17.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,174 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: propagar errores de lectura de directorio desde nilfs_find_entry() Syzbot inform\u00f3 que se produce un bloqueo de tarea en vcs_open() durante una prueba de fuzzing para nilfs2. La causa ra\u00edz de este problema es que en nilfs_find_entry(), que busca entradas de directorio, ignora los errores cuando falla la carga de una p\u00e1gina/folio de directorio a trav\u00e9s de nilfs_get_folio(). Si las im\u00e1genes del sistema de archivos est\u00e1n da\u00f1adas, y el i_size del inodo del directorio es grande, y la p\u00e1gina/folio del directorio se lee correctamente pero falla la comprobaci\u00f3n de cordura, por ejemplo, cuando est\u00e1 llena de ceros, nilfs_check_folio() puede seguir arrojando mensajes de error en r\u00e1fagas. Solucione este problema propagando el error a los llamadores cuando falla la carga de una p\u00e1gina/folio en nilfs_find_entry(). La interfaz actual de nilfs_find_entry() y sus llamadores est\u00e1 desactualizada y no puede propagar c\u00f3digos de error como -EIO y -ENOMEM devueltos a trav\u00e9s de nilfs_find_entry(), as\u00ed que arr\u00e9glenlo juntos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.30",
"versionEndExcluding": "4.19.323",
"matchCriteriaId": "68A7ECD8-BE83-4540-8A15-A841E57A82E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.285",
"matchCriteriaId": "B5A89369-320F-47FC-8695-56F61F87E4C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.228",
"matchCriteriaId": "9062315F-AB89-4ABE-8C13-B75927689F66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.169",
"matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.114",
"matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.58",
"matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.5",
"matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/08cfa12adf888db98879dbd735bc741360a34168",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/270a6f9df35fa2aea01ec23770dc9b3fc9a12989",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9698088ac7704e260f492d9c254e29ed7dd8729a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4b3dc9e7e604be98a222e9f941f5e93798ca475",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb857ae1efd3138c653239ed1e7aef14e1242c81",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c1d0476885d708a932980b0f28cd90d9bd71db39",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/edf8146057264191d5bfe5b91773f13d936dadd3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/efa810b15a25531cbc2f527330947b9fe16916e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50203",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-08T06:15:16.787",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:16:09.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, arm64: Se corrige la emisi\u00f3n de direcciones con KASAN basado en etiquetas habilitado Cuando BPF_TRAMP_F_CALL_ORIG est\u00e1 habilitado, la direcci\u00f3n de una estructura bpf_tramp_image en la pila se pasa durante el paso de c\u00e1lculo de tama\u00f1o y se pasa una direcci\u00f3n en el mont\u00f3n durante la generaci\u00f3n de c\u00f3digo. Esto puede causar un desbordamiento del b\u00fafer del mont\u00f3n si la direcci\u00f3n del mont\u00f3n est\u00e1 etiquetada porque emit_a64_mov_i64() emitir\u00e1 un c\u00f3digo m\u00e1s largo que el que emiti\u00f3 durante el paso de c\u00e1lculo de tama\u00f1o. El mismo problema podr\u00eda ocurrir sin KASAN basado en etiquetas si una de las palabras de 16 bits de la direcci\u00f3n de la pila fuera todo unos durante el paso de c\u00e1lculo de tama\u00f1o. Solucione el problema asumiendo el peor caso (4 instrucciones) al calcular el tama\u00f1o de la emisi\u00f3n de la direcci\u00f3n bpf_tramp_image."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10.3",
"versionEndExcluding": "6.11",
"matchCriteriaId": "F2A79BF8-4D40-4CD5-9AF5-B6A3B67539DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.6",
"matchCriteriaId": "35973F0F-C32F-4D88-B0FE-C75F65A0002B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/7db1a2121f3c7903b8e397392beec563c3d00950",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a552e2ef5fd1a6c78267cd4ec5a9b49aa11bbb1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50204",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-08T06:15:16.853",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:17:04.663",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,95 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs: no intente eliminar un nodo rbtree vac\u00edo Al copiar un espacio de nombres, no habremos agregado la nueva copia al rbtree del espacio de nombres hasta que la copia haya tenido \u00e9xito. Al llamar a free_mnt_ns() se intentar\u00e1 eliminar la copia del rbtree que no es v\u00e1lida. Simplemente libere el esqueleto del espacio de nombres directamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.6",
"matchCriteriaId": "35973F0F-C32F-4D88-B0FE-C75F65A0002B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/229fd15908fe1f99b1de4cde3326e62d1e892611",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a8b155a2c30dc9a5ba837aa5fcba9a47cc031a9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50207",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-08T06:15:17.053",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:18:57.473",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ring-buffer: corrige el bloqueo del lector al cambiar el orden de los subbuffer La funci\u00f3n ring_buffer_subbuf_order_set() actualiza cada ring_buffer_per_cpu e instala nuevos subbuffers que coinciden con el orden de p\u00e1ginas solicitado. Esta operaci\u00f3n se puede invocar simult\u00e1neamente con lectores que dependen de algunos de los datos modificados, como el bit de cabecera (RB_PAGE_HEAD) o los punteros ring_buffer_per_cpu.pages y reader_page. Sin embargo, ring_buffer_subbuf_order_set() no adquiere acceso exclusivo. Modificar los datos mencionados mientras un lector tambi\u00e9n opera sobre ellos puede provocar un acceso incorrecto a la memoria y varios fallos. Solucione el problema tomando el reader_lock al actualizar un ring_buffer_per_cpu espec\u00edfico en ring_buffer_subbuf_order_set()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.11.6",
"matchCriteriaId": "2CAA29A6-36B4-4C90-A862-A816F65153DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/09661f75e75cb6c1d2d8326a70c311d46729235f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a569290525a05162d5dd26d9845591eaf46e5802",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50208",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-08T06:15:17.203",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:23:48.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,146 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/bnxt_re: Se corrige un error al configurar p\u00e1ginas PBL de nivel 2 Evita la corrupci\u00f3n de memoria al configurar p\u00e1ginas PBL de nivel 2 para los recursos que no son MR cuando num_pages > 256K. Habr\u00e1 una \u00fanica direcci\u00f3n de p\u00e1gina PDE (p\u00e1ginas contiguas en el caso de > PAGE_SIZE), pero la l\u00f3gica actual supone varias p\u00e1ginas, lo que genera un acceso a memoria no v\u00e1lido despu\u00e9s de 256K entradas PBL en el PDE."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "5.10.229",
"matchCriteriaId": "2EADCAD4-13A5-494E-8458-135A798BE1A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.170",
"matchCriteriaId": "A9BA1C73-2D2E-45E3-937B-276A28AEB5FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.115",
"matchCriteriaId": "C08A77A6-E42E-4EFD-B5A1-2BF6CBBB42AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.59",
"matchCriteriaId": "5D15CA59-D15C-4ACD-8B03-A072DEAD2081"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.6",
"matchCriteriaId": "E4486B12-007B-4794-9857-F07145637AA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/7988bdbbb85ac85a847baf09879edcd0f70521dc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/87cb3b0054e53e0155b630bdf8fb714ded62565f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/daac56dd98e1ba814c878ac0acd482a37f2ab94b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/de5857fa7bcc9a496a914c7e21390be873109f26",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/df6fed0a2a1a5e57f033bca40dc316b18e0d0ce6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ea701c1849e7250ea41a4f7493e0a5f136c1d47e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50210",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-08T06:15:17.350",
"lastModified": "2024-11-08T19:01:03.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-19T16:26:34.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,142 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: posix-clock: posix-clock: Corregir bloqueo desequilibrado en pc_clock_settime() Si get_clock_desc() tiene \u00e9xito, llama a fget() para el fd del clockid y obtiene el bloqueo de lectura clk->rwsem, por lo que la ruta de error deber\u00eda liberar el bloqueo para equilibrar el bloqueo y fput el fd del clockid para equilibrar el refcount y liberar el recurso relacionado con el fd. Sin embargo, la siguiente confirmaci\u00f3n dej\u00f3 la ruta de error bloqueada, lo que result\u00f3 en un bloqueo desequilibrado. Verifique timespec64_valid_strict() antes de get_clock_desc() para corregirlo, porque el \"ts\" no se cambia despu\u00e9s de eso. [pabeni@redhat.com: se corrigi\u00f3 un error tipogr\u00e1fico en el mensaje de confirmaci\u00f3n]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.228",
"versionEndExcluding": "5.11",
"matchCriteriaId": "7CEF9F93-A67A-45C9-9C51-0024664ACC19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.15.169:*:*:*:*:*:*:*",
"matchCriteriaId": "65E5B4C5-20C7-42FD-B670-6B09641CC073"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1.114:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC6719E-D39A-44B0-90DD-F606EE505404"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6.58:*:*:*:*:*:*:*",
"matchCriteriaId": "38BA5D36-31FC-4EF3-9E92-9B67AB6F2D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "101C7DA2-28FF-4CC0-A476-2C8D49CD2AC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1ba33b327c3f88a7baee598979d73ab5b44d41cc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f063bbf1ee6b01611c016b54e050a41506eb794",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6e62807c7fbb3c758d233018caf94dfea9c65dbd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a8219446b95a859488feaade674d13f9efacfa32",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b27330128eca25179637c1816d5a72d6cc408c66",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c7fcfdba35abc9f39b83080c2bce398dad13a943",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d005400262ddaf1ca1666bbcd1acf42fe81d57ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e56e0ec1b79f5a6272c6e78b36e9d593aa0449af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-50803",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T16:15:19.840",
"lastModified": "2024-11-19T16:15:19.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges"
}
],
"metrics": {},
"references": [
{
"url": "http://redaxo-core.com",
"source": "cve@mitre.org"
},
{
"url": "http://redaxo.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Praison001/CVE-2024-50803-Redaxo",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50804",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T21:15:06.220",
"lastModified": "2024-11-18T21:15:06.220",
"lastModified": "2024-11-19T16:35:15.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure Permissions vulnerability in Micro-star International MSI Center Pro 2.1.37.0 allows a local attacker to execute arbitrary code via the Device_DeviceID.dat.bak file within the C:\\ProgramData\\MSI\\One Dragon Center\\Data folder"
},
{
"lang": "es",
"value": "La vulnerabilidad de permisos inseguros en Micro-star International MSI Center Pro 2.1.37.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo Device_DeviceID.dat.bak dentro de la carpeta C:\\ProgramData\\MSI\\One Dragon Center\\Data"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://g3tsyst3m.github.io/cve/msi/Arbitrary-Write-Privilege-Escalation-CVE-2024-50804/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50848",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T21:15:06.293",
"lastModified": "2024-11-18T21:15:06.293",
"lastModified": "2024-11-19T15:35:10.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XML External Entity (XXE) vulnerability in the Import object and Translation Memory import functionalities of WorldServer v11.8.2 to access sensitive information and execute arbitrary commands via supplying a crafted .tmx file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de entidad externa XML (XXE) en las funcionalidades de importaci\u00f3n de objetos y memoria de traducci\u00f3n de WorldServer v11.8.2 para acceder a informaci\u00f3n confidencial y ejecutar comandos arbitrarios mediante el suministro de un archivo .tmx manipulado espec\u00edficamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Wh1teSnak3/CVE-2024-50848",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50849",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T21:15:06.360",
"lastModified": "2024-11-18T21:15:06.360",
"lastModified": "2024-11-19T15:35:11.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) in the \"Rules\" functionality in WordServer 11.8.2 allows a remote authenticated attacker to execute arbitrary code."
},
{
"lang": "es",
"value": "Cross-Site Scripting (XSS) en la funcionalidad \"Reglas\" de WordServer 11.8.2 permite que un atacante remoto autenticado ejecute c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Wh1teSnak3/CVE-2024-50849",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50919",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T20:15:05.650",
"lastModified": "2024-11-18T20:15:05.650",
"lastModified": "2024-11-19T16:35:15.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such as .jsp. can lead to arbitrary command execution"
},
{
"lang": "es",
"value": "Hasta la versi\u00f3n v5.1.1, Jpress permite cargar archivos arbitrarios en la plataforma Windows, y la construcci\u00f3n de formatos de archivos no est\u00e1ndar como .jsp puede provocar la ejecuci\u00f3n arbitraria de comandos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/microvorld/516552dcef65acc2d1ab0fb969cd34a3",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-51051",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T22:15:06.190",
"lastModified": "2024-11-18T22:15:06.190",
"lastModified": "2024-11-19T15:35:11.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AVSCMS v8.2.0 was discovered to contain weak default credentials for the Administrator account."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que AVSCMS v8.2.0 conten\u00eda credenciales predeterminadas d\u00e9biles para la cuenta de administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://binqqer.com/posts/CVE-2024-51051/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-51053",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T21:15:06.423",
"lastModified": "2024-11-18T21:15:06.423",
"lastModified": "2024-11-19T15:35:12.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component /main/fileupload.php of AVSCMS v8.2.0 allows attackers to execute arbitrary code via uploading a crafted file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /main/fileupload.php de AVSCMS v8.2.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://binqqer.com/posts/CVE-2024-51053/",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-51743",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-18T20:15:05.900",
"lastModified": "2024-11-18T20:15:05.900",
"lastModified": "2024-11-19T15:35:13.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MarkUs is a web application for the submission and grading of student assignments. In versions prior to 2.4.8, an arbitrary file write vulnerability in the update/upload/create file methods in Controllers allows authenticated instructors to write arbitrary files to any location on the web server MarkUs is running on (depending on the permissions of the underlying filesystem). e.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading."
},
{
"lang": "es",
"value": "MarkUs es una aplicaci\u00f3n web para el env\u00edo y calificaci\u00f3n de tareas de los estudiantes. En versiones anteriores a la 2.4.8, una vulnerabilidad de escritura de archivos arbitrarios en los m\u00e9todos de actualizaci\u00f3n/carga/creaci\u00f3n de archivos en los controladores permite a los instructores autenticados escribir archivos arbitrarios en cualquier ubicaci\u00f3n del servidor web en el que se ejecuta MarkUs (seg\u00fan los permisos del sistema de archivos subyacente). Esto puede provocar una ejecuci\u00f3n de c\u00f3digo remoto retrasada en caso de que un atacante pueda escribir un archivo Ruby en la subcarpeta config/initializers/ de la aplicaci\u00f3n Ruby on Rails. MarkUs v2.4.8 ha solucionado este problema. No hay workarounds disponibles a nivel de aplicaci\u00f3n aparte de la actualizaci\u00f3n."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52268",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-11-13T06:15:14.903",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:57:03.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
@ -51,14 +73,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vektor-inc:vk_all_in_one_expansion_unit:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.100.1.0",
"matchCriteriaId": "5C50E627-160C-4091-A630-E38CBC029967"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN05136799/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vektor-inc.co.jp/en/update/regarding-vulnerabilities-in-vk-all-in-one-expansion-unit-version-9-100-0-and-earlier/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-52303",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-18T20:15:06.047",
"lastModified": "2024-11-18T20:15:06.047",
"lastModified": "2024-11-19T15:35:13.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In versions starting with 3.10.6 and prior to 3.10.11, a memory leak can occur when a request produces a MatchInfoError. This was caused by adding an entry to a cache on each request, due to the building of each MatchInfoError producing a unique cache entry. An attacker may be able to exhaust the memory resources of a server by sending a substantial number (100,000s to millions) of such requests. Those who use any middlewares with aiohttp.web should upgrade to version 3.10.11 to receive a patch."
},
{
"lang": "es",
"value": "aiohttp es un framework de trabajo de cliente/servidor HTTP asincr\u00f3nico para asyncio y Python. En las versiones a partir de la 3.10.6 y anteriores a la 3.10.11, puede producirse una p\u00e9rdida de memoria cuando una solicitud produce un MatchInfoError. Esto se deb\u00eda a que se a\u00f1ad\u00eda una entrada a una memoria cach\u00e9 en cada solicitud, debido a que la creaci\u00f3n de cada MatchInfoError produc\u00eda una entrada de memoria cach\u00e9 \u00fanica. Un atacante podr\u00eda agotar los recursos de memoria de un servidor enviando una cantidad sustancial (entre cientos y millones) de dichas solicitudes. Quienes utilicen cualquier middleware con aiohttp.web deber\u00edan actualizar a la versi\u00f3n 3.10.11 para recibir un parche."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-52304",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-18T21:15:06.500",
"lastModified": "2024-11-18T21:15:06.500",
"lastModified": "2024-11-19T16:35:16.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.10.11, the Python parser parses newlines in chunk extensions incorrectly which can lead to request smuggling vulnerabilities under certain conditions. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or `AIOHTTP_NO_EXTENSIONS` is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.10.11 fixes the issue."
},
{
"lang": "es",
"value": "aiohttp es un framework de trabajo de cliente/servidor HTTP asincr\u00f3nico para asyncio y Python. Antes de la versi\u00f3n 3.10.11, el analizador de Python analiza incorrectamente las nuevas l\u00edneas en las extensiones de fragmentos, lo que puede provocar vulnerabilidades de contrabando de solicitudes en determinadas condiciones. Si se instala una versi\u00f3n Python pura de aiohttp (es decir, sin las extensiones C habituales) o se habilita `AIOHTTP_NO_EXTENSIONS`, un atacante puede ejecutar un ataque de contrabando de solicitudes para eludir determinados cortafuegos o protecciones de proxy. La versi\u00f3n 3.10.11 soluciona el problema."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 0.0
}
]
},
"weaknesses": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52306",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-13T16:15:20.723",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:02:45.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:backpackforlaravel:filemanager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.2",
"matchCriteriaId": "3916EFA1-114A-4622-9384-A01A4D874D87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:backpackforlaravel:filemanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.0.9",
"matchCriteriaId": "20B83E97-268F-47A7-A199-24F2AC570DD0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Laravel-Backpack/FileManager/commit/2830498b85e05fb3c92179053b4d7c4a0fdb880b",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Laravel-Backpack/FileManager/security/advisories/GHSA-8237-957h-h2c2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-52506",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-18T21:15:06.633",
"lastModified": "2024-11-18T21:15:06.633",
"lastModified": "2024-11-19T16:35:17.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Graylog is a free and open log management platform. The reporting functionality in Graylog allows the creation and scheduling of reports which contain dashboard widgets displaying individual log messages or metrics aggregated from fields of multiple log messages. This functionality, as included in Graylog 6.1.0 & 6.1.1, is vulnerable to information leakage triggered by multiple concurrent report rendering requests from authorized users. When multiple report renderings are requested at the same start time, the headless browser instance used to render the PDF will be reused. Depending on the timing, either a check for the browser instance \"freshness\" hits, resulting in an error instead of the report being returned, or one of the concurrent report rendering requests \"wins\" and this report is returned for all report rendering requests that do not return an error. This might lead to one user getting the report of a different user, potentially leaking indexed log messages or aggregated data that this user normally has no access to. This problem is fixed in Graylog 6.1.2. There is no known workaround besides disabling the reporting functionality."
},
{
"lang": "es",
"value": "Graylog es una plataforma de gesti\u00f3n de registros abierta y gratuita. La funci\u00f3n de generaci\u00f3n de informes de Graylog permite la creaci\u00f3n y programaci\u00f3n de informes que contienen widgets de panel que muestran mensajes de registro individuales o m\u00e9tricas agregadas de campos de m\u00faltiples mensajes de registro. Esta funci\u00f3n, incluida en Graylog 6.1.0 y 6.1.1, es vulnerable a la fuga de informaci\u00f3n provocada por m\u00faltiples solicitudes de generaci\u00f3n de informes simult\u00e1neas de usuarios autorizados. Cuando se solicitan m\u00faltiples representaciones de informes al mismo tiempo de inicio, se reutilizar\u00e1 la instancia del navegador sin interfaz gr\u00e1fica utilizada para generar el PDF. Seg\u00fan el momento, se realiza una comprobaci\u00f3n de la \"actualidad\" de la instancia del navegador, lo que genera un error en lugar de devolver el informe, o bien una de las solicitudes de generaci\u00f3n de informes simult\u00e1neas \"gana\" y este informe se devuelve para todas las solicitudes de generaci\u00f3n de informes que no devuelven un error. Esto puede provocar que un usuario obtenga el informe de un usuario diferente, lo que podr\u00eda filtrar mensajes de registro indexados o datos agregados a los que este usuario normalmente no tiene acceso. Este problema se solucion\u00f3 en Graylog 6.1.2. No existe ning\u00fan workaround conocido, adem\u00e1s de deshabilitar la funci\u00f3n de generaci\u00f3n de informes."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 0.0
}
]
},
"weaknesses": [

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-52582",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-19T16:15:20.207",
"lastModified": "2024-11-19T16:15:20.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cachi2 is a command-line interface tool that pre-fetches a project's dependencies to aid in making the project's build process network-isolated. Prior to version 0.14.0, secrets may be shown in logs when an unhandled exception is triggered because the tool is logging locals of each function. This may uncover secrets if tool used in CI/build pipelines as it's the main use case. Version 0.14.0 contains a patch for the issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://github.com/containerbuildsystem/cachi2/commit/d6638e5e14474061a1ab1ba5d0ee72f58b9a11a9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/containerbuildsystem/cachi2/security/advisories/GHSA-w9qc-9m5h-qqmh",
"source": "security-advisories@github.com"
},
{
"url": "https://typer.tiangolo.com/tutorial/exceptions/?h=#disable-local-variables-for-security",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-52584",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-18T21:15:07.047",
"lastModified": "2024-11-18T21:15:07.047",
"lastModified": "2024-11-19T16:35:18.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Autolab is a course management service that enables auto-graded programming assignments. There is a vulnerability in version 3.0.1 where CAs can view or edit the grade for any submission ID, even if they are not a CA for the class that has the submission. The endpoints only check that the CAs have the authorization level of a CA in the class in the endpoint, which is not necessarily the class the submission is attached to. Version 3.0.2 contains a patch. No known workarounds are available."
},
{
"lang": "es",
"value": "Autolab es un servicio de gesti\u00f3n de cursos que permite la calificaci\u00f3n autom\u00e1tica de tareas de programaci\u00f3n. Existe una vulnerabilidad en la versi\u00f3n 3.0.1 en la que los CA pueden ver o editar la calificaci\u00f3n de cualquier ID de env\u00edo, incluso si no son CA de la clase que tiene el env\u00edo. Los endpoints solo verifican que los CA tengan el nivel de autorizaci\u00f3n de un CA de la clase en el endpoint, que no es necesariamente la clase a la que est\u00e1 asociado el env\u00edo. La versi\u00f3n 3.0.2 contiene un parche. No hay workarounds disponibles."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 0.0
}
]
},
"weaknesses": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-52585",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-18T21:15:07.183",
"lastModified": "2024-11-18T21:15:07.183",
"lastModified": "2024-11-19T16:35:18.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Autolab is a course management service that enables auto-graded programming assignments. There is an HTML injection vulnerability in version 3.0.1 that can affect instructors and CAs on the grade submissions page. The issue is patched in version 3.0.2. One may apply the patch manually by editing line 589 on `gradesheet.js.erb` to take in feedback as text rather than html."
},
{
"lang": "es",
"value": "Autolab es un servicio de gesti\u00f3n de cursos que permite la calificaci\u00f3n autom\u00e1tica de tareas de programaci\u00f3n. Existe una vulnerabilidad de inyecci\u00f3n de HTML en la versi\u00f3n 3.0.1 que puede afectar a los instructores y a los CA en la p\u00e1gina de env\u00edo de calificaciones. El problema se solucion\u00f3 en la versi\u00f3n 3.0.2. Se puede aplicar el parche manualmente editando la l\u00ednea 589 en `gradesheet.js.erb` para que los comentarios se tomen como texto en lugar de HTML."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-52587",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-18T22:15:09.557",
"lastModified": "2024-11-18T22:15:09.557",
"lastModified": "2024-11-19T15:35:15.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "StepSecurity's Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to v2.10.2 contain multiple command injection weaknesses via environment variables that could potentially be exploited under specific conditions. However, due to the current execution order of pre-steps in GitHub Actions and the placement of harden-runner as the first step in a job, the likelihood of exploitation is low as the Harden-Runner action reads the environment variable during the pre-step stage. There are no known exploits at this time. Version 2.10.2 contains a patch."
},
{
"lang": "es",
"value": "Harden-Runner de StepSecurity proporciona filtrado de salida de red y seguridad en tiempo de ejecuci\u00f3n para ejecutores alojados en GitHub y alojados por cuenta propia. Las versiones de step-security/harden-runner anteriores a la v2.10.2 contienen m\u00faltiples debilidades de inyecci\u00f3n de comandos a trav\u00e9s de variables de entorno que podr\u00edan explotarse potencialmente en condiciones espec\u00edficas. Sin embargo, debido al orden de ejecuci\u00f3n actual de los pasos previos en las acciones de GitHub y la ubicaci\u00f3n de harden-runner como el primer paso en un trabajo, la probabilidad de explotaci\u00f3n es baja ya que la acci\u00f3n Harden-Runner lee la variable de entorno durante la etapa previa al paso. No se conocen explotaciones en este momento. La versi\u00f3n 2.10.2 contiene un parche."
}
],
"metrics": {
@ -55,6 +59,28 @@
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52867",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-17T03:15:04.003",
"lastModified": "2024-11-18T17:11:17.393",
"lastModified": "2024-11-19T16:35:18.583",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://git.savannah.gnu.org/cgit/guix.git/commit/?id=558224140dab669cabdaebabff18504a066c48d4",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52944",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T06:15:06.017",
"lastModified": "2024-11-18T17:11:17.393",
"lastModified": "2024-11-19T16:35:19.310",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.veritas.com/support/en_US/security/VTS24-013",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52945",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-18T06:15:06.250",
"lastModified": "2024-11-18T17:11:17.393",
"lastModified": "2024-11-19T16:35:20.020",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.veritas.com/content/support/en_US/security/VTS24-012",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-13T10:15:04.593",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:41:25.973",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -124,14 +144,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:viwis:learning_management_system:9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCC7D38-AC54-4E99-95B0-78AC3049258C"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.284352",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.284352",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9059",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T09:15:03.897",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:53:56.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.1002",
"matchCriteriaId": "F28BF487-ECD8-48A2-9ACF-4AABEE6A4F01"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/modules/google-maps/widgets/wpr-google-maps.php?rev=3184222",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37223d1f-82c8-414f-bf39-63e728541aa3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9409",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-11-13T05:15:27.610",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:59:21.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cybersecurity@se.com",
"type": "Secondary",
@ -95,10 +115,101 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:powerlogic_pm5341_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "2C518E91-E251-4278-83D6-144B1CC6331F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:powerlogic_pm5341:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C575247-0AE3-408C-8154-71A256FD0292"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:powerlogic_pm5340_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0",
"matchCriteriaId": "65E456CF-4247-4FB9-858D-6920EF946CF2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:powerlogic_pm5340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C8EA2A-37CF-435F-A1ED-789255404CD6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:powerlogic_pm5320_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.0",
"matchCriteriaId": "EB64AE9B-637D-48A5-AE98-6F120C7E355A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:powerlogic_pm5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47592B0C-9E15-4D4C-B284-F2390678E1AC"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/doc/SEVD-2024-317-01/SEVD-2024-317-01.pdf",
"source": "cybersecurity@se.com"
"source": "cybersecurity@se.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9668",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T09:15:04.163",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:55:00.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.1002",
"matchCriteriaId": "F28BF487-ECD8-48A2-9ACF-4AABEE6A4F01"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/modules/countdown/widgets/wpr-countdown.php?rev=3184222",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e39f0b-eb4c-4568-9f5a-60a0dc3eb6ba?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9682",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T09:15:04.390",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-19T15:47:07.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.1002",
"matchCriteriaId": "F28BF487-ECD8-48A2-9ACF-4AABEE6A4F01"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1002/assets/js/frontend.js?rev=3184222#L8771",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bd90b85e-22a9-4c08-b2cf-4f75406e7ca3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-19T15:00:21.040708+00:00
2024-11-19T17:00:28.336990+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-19T14:56:37.800000+00:00
2024-11-19T16:57:05.407000+00:00
```
### Last Data Feed Release
@ -33,52 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
270319
270322
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `3`
- [CVE-2024-10204](CVE-2024/CVE-2024-102xx/CVE-2024-10204.json) (`2024-11-19T14:15:16.940`)
- [CVE-2024-11075](CVE-2024/CVE-2024-110xx/CVE-2024-11075.json) (`2024-11-19T14:15:17.340`)
- [CVE-2024-11198](CVE-2024/CVE-2024-111xx/CVE-2024-11198.json) (`2024-11-19T13:15:04.157`)
- [CVE-2024-11224](CVE-2024/CVE-2024-112xx/CVE-2024-11224.json) (`2024-11-19T13:15:04.423`)
- [CVE-2024-52675](CVE-2024/CVE-2024-526xx/CVE-2024-52675.json) (`2024-11-19T13:15:04.700`)
- [CVE-2024-52711](CVE-2024/CVE-2024-527xx/CVE-2024-52711.json) (`2024-11-19T14:15:18.207`)
- [CVE-2024-9777](CVE-2024/CVE-2024-97xx/CVE-2024-9777.json) (`2024-11-19T13:15:04.850`)
- [CVE-2024-9830](CVE-2024/CVE-2024-98xx/CVE-2024-9830.json) (`2024-11-19T13:15:05.107`)
- [CVE-2024-10524](CVE-2024/CVE-2024-105xx/CVE-2024-10524.json) (`2024-11-19T15:15:06.740`)
- [CVE-2024-50803](CVE-2024/CVE-2024-508xx/CVE-2024-50803.json) (`2024-11-19T16:15:19.840`)
- [CVE-2024-52582](CVE-2024/CVE-2024-525xx/CVE-2024-52582.json) (`2024-11-19T16:15:20.207`)
### CVEs modified in the last Commit
Recently modified CVEs: `28`
Recently modified CVEs: `76`
- [CVE-2021-4164](CVE-2021/CVE-2021-41xx/CVE-2021-4164.json) (`2024-11-19T13:55:30.697`)
- [CVE-2021-4170](CVE-2021/CVE-2021-41xx/CVE-2021-4170.json) (`2024-11-19T13:55:30.697`)
- [CVE-2021-4171](CVE-2021/CVE-2021-41xx/CVE-2021-4171.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0273](CVE-2022/CVE-2022-02xx/CVE-2022-0273.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0339](CVE-2022/CVE-2022-03xx/CVE-2022-0339.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0352](CVE-2022/CVE-2022-03xx/CVE-2022-0352.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0405](CVE-2022/CVE-2022-04xx/CVE-2022-0405.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0406](CVE-2022/CVE-2022-04xx/CVE-2022-0406.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0766](CVE-2022/CVE-2022-07xx/CVE-2022-0766.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0767](CVE-2022/CVE-2022-07xx/CVE-2022-0767.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0939](CVE-2022/CVE-2022-09xx/CVE-2022-0939.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-0990](CVE-2022/CVE-2022-09xx/CVE-2022-0990.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-1884](CVE-2022/CVE-2022-18xx/CVE-2022-1884.json) (`2024-11-19T14:47:48.443`)
- [CVE-2022-2525](CVE-2022/CVE-2022-25xx/CVE-2022-2525.json) (`2024-11-19T13:55:30.697`)
- [CVE-2022-30765](CVE-2022/CVE-2022-307xx/CVE-2022-30765.json) (`2024-11-19T13:55:30.697`)
- [CVE-2023-0109](CVE-2023/CVE-2023-01xx/CVE-2023-0109.json) (`2024-11-19T14:44:24.977`)
- [CVE-2023-0737](CVE-2023/CVE-2023-07xx/CVE-2023-0737.json) (`2024-11-19T14:43:04.257`)
- [CVE-2023-2106](CVE-2023/CVE-2023-21xx/CVE-2023-2106.json) (`2024-11-19T13:55:30.697`)
- [CVE-2023-47124](CVE-2023/CVE-2023-471xx/CVE-2023-47124.json) (`2024-11-19T14:15:16.660`)
- [CVE-2024-10924](CVE-2024/CVE-2024-109xx/CVE-2024-10924.json) (`2024-11-19T14:15:17.187`)
- [CVE-2024-11159](CVE-2024/CVE-2024-111xx/CVE-2024-11159.json) (`2024-11-19T14:56:37.800`)
- [CVE-2024-21538](CVE-2024/CVE-2024-215xx/CVE-2024-21538.json) (`2024-11-19T14:15:17.627`)
- [CVE-2024-23715](CVE-2024/CVE-2024-237xx/CVE-2024-23715.json) (`2024-11-19T14:03:09.400`)
- [CVE-2024-44206](CVE-2024/CVE-2024-442xx/CVE-2024-44206.json) (`2024-11-19T13:47:18.787`)
- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-19T14:15:17.763`)
- [CVE-2024-50208](CVE-2024/CVE-2024-502xx/CVE-2024-50208.json) (`2024-11-19T16:23:48.507`)
- [CVE-2024-50210](CVE-2024/CVE-2024-502xx/CVE-2024-50210.json) (`2024-11-19T16:26:34.767`)
- [CVE-2024-50804](CVE-2024/CVE-2024-508xx/CVE-2024-50804.json) (`2024-11-19T16:35:15.173`)
- [CVE-2024-50848](CVE-2024/CVE-2024-508xx/CVE-2024-50848.json) (`2024-11-19T15:35:10.213`)
- [CVE-2024-50849](CVE-2024/CVE-2024-508xx/CVE-2024-50849.json) (`2024-11-19T15:35:11.063`)
- [CVE-2024-50919](CVE-2024/CVE-2024-509xx/CVE-2024-50919.json) (`2024-11-19T16:35:15.973`)
- [CVE-2024-51051](CVE-2024/CVE-2024-510xx/CVE-2024-51051.json) (`2024-11-19T15:35:11.920`)
- [CVE-2024-51053](CVE-2024/CVE-2024-510xx/CVE-2024-51053.json) (`2024-11-19T15:35:12.750`)
- [CVE-2024-51743](CVE-2024/CVE-2024-517xx/CVE-2024-51743.json) (`2024-11-19T15:35:13.590`)
- [CVE-2024-52268](CVE-2024/CVE-2024-522xx/CVE-2024-52268.json) (`2024-11-19T15:57:03.780`)
- [CVE-2024-52303](CVE-2024/CVE-2024-523xx/CVE-2024-52303.json) (`2024-11-19T15:35:13.847`)
- [CVE-2024-52304](CVE-2024/CVE-2024-523xx/CVE-2024-52304.json) (`2024-11-19T16:35:16.793`)
- [CVE-2024-52306](CVE-2024/CVE-2024-523xx/CVE-2024-52306.json) (`2024-11-19T15:02:45.053`)
- [CVE-2024-52506](CVE-2024/CVE-2024-525xx/CVE-2024-52506.json) (`2024-11-19T16:35:17.897`)
- [CVE-2024-52584](CVE-2024/CVE-2024-525xx/CVE-2024-52584.json) (`2024-11-19T16:35:18.180`)
- [CVE-2024-52585](CVE-2024/CVE-2024-525xx/CVE-2024-52585.json) (`2024-11-19T16:35:18.380`)
- [CVE-2024-52587](CVE-2024/CVE-2024-525xx/CVE-2024-52587.json) (`2024-11-19T15:35:15.427`)
- [CVE-2024-52867](CVE-2024/CVE-2024-528xx/CVE-2024-52867.json) (`2024-11-19T16:35:18.583`)
- [CVE-2024-52944](CVE-2024/CVE-2024-529xx/CVE-2024-52944.json) (`2024-11-19T16:35:19.310`)
- [CVE-2024-52945](CVE-2024/CVE-2024-529xx/CVE-2024-52945.json) (`2024-11-19T16:35:20.020`)
- [CVE-2024-8001](CVE-2024/CVE-2024-80xx/CVE-2024-8001.json) (`2024-11-19T15:41:25.973`)
- [CVE-2024-9059](CVE-2024/CVE-2024-90xx/CVE-2024-9059.json) (`2024-11-19T15:53:56.680`)
- [CVE-2024-9409](CVE-2024/CVE-2024-94xx/CVE-2024-9409.json) (`2024-11-19T15:59:21.690`)
- [CVE-2024-9668](CVE-2024/CVE-2024-96xx/CVE-2024-9668.json) (`2024-11-19T15:55:00.840`)
- [CVE-2024-9682](CVE-2024/CVE-2024-96xx/CVE-2024-9682.json) (`2024-11-19T15:47:07.517`)
## Download and Usage

View File

@ -90442,7 +90442,7 @@ CVE-2016-7509,0,0,0b1c21cb9424a49e93f5c37cad1af90a10222077bea180053907da8c42c4e9
CVE-2016-7510,0,0,0b5b8d18c8957782ad8fb925a838d95cf4fa7b34c3e40f119a9ad58cd4df5fba,2022-03-01T19:08:12.087000
CVE-2016-7511,0,0,b62155948673159bb5869244d626fcf37545c3e7fd4c8eb55ad8f62881f067b9,2022-03-01T14:30:27.027000
CVE-2016-7513,0,0,9c0045a3237c81afdf3e07faf9927bc74ef0987391ab69733e7a634626609421,2017-05-09T12:40:08.853000
CVE-2016-7514,0,0,6e2321753ae7bcce1e4a7c3cbe07a2b2d30258b29b4c7a8394d4f362223b7340,2017-05-09T12:40:05.697000
CVE-2016-7514,0,1,39aaf0298170faeea1b713c0f167b61036c8df094a4365fee0005fc9db119453,2024-11-19T15:51:22.097000
CVE-2016-7515,0,0,fb21f83cddf722a0fa141decdcb6439bb9471e713258d2e816160282eb06f528,2024-07-03T15:16:39.567000
CVE-2016-7516,0,0,16f3cb2e75aa3271d960b831f33e06b2ac04b1f800e594681cff4861326c988c,2024-07-03T15:23:36.440000
CVE-2016-7517,0,0,ba6d8f42f3bed4f3167468c0c8b26ac137e75f436e56310716e1ba6e03647184,2024-07-03T15:17:05.433000
@ -97060,9 +97060,9 @@ CVE-2017-13309,0,0,491cd9f7b41a6bb9dabc0009989d6e787b291b96b83a3c335f7bb247a54fd
CVE-2017-1331,0,0,fbfa6b4058c65afc0dadcb6abf2b300b566ab5bd4820053710fa36c8414eaba4,2017-08-09T12:43:53.857000
CVE-2017-13310,0,0,ce5d5d0144d27d0c152dcf2d0a14c2de82217b009894ba3718d993208d2695f5,2024-11-18T17:11:56.587000
CVE-2017-13311,0,0,ef29872b5c74a8fdce3835bfeeee51a10190cccc30135b0dd02f413b37d7bfb4,2024-11-18T17:11:56.587000
CVE-2017-13312,0,0,341acd1f29824d27667da2d51a5097bca3ea48c03574c9031db93205af5bc5ea,2024-11-18T17:11:56.587000
CVE-2017-13313,0,0,ab7dd02cb9e6c4caccb7bc4e1543e83c4ab14f4d075f0865d34b82227ae6479a,2024-11-18T17:11:56.587000
CVE-2017-13314,0,0,172c46525901902599df22b71e6e0ed50cad6803b92c51596c1ca7804d1172ab,2024-11-18T17:11:56.587000
CVE-2017-13312,0,1,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000
CVE-2017-13313,0,1,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
CVE-2017-13314,0,1,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
@ -146031,7 +146031,7 @@ CVE-2020-10996,0,0,47a8e826d6532a30023b9d707d6802138016d41b64ac1672fccc5913e0db6
CVE-2020-10997,0,0,9b1c61e782dda557a71cb53eb6d61e9ad3b5a823d5b9e07767c4f1b62ef3a094,2021-07-21T11:39:23.747000
CVE-2020-1100,0,0,3f91df61b6db7ab02ed7698670dfd0c570cf3f1746acfa0224d746a05bcf456b,2020-05-22T15:42:31.430000
CVE-2020-11000,0,0,67c70949c7f7214f8cec2b275e3087ce4f245c2fe317c4037148b7b3f0c9548a,2021-10-26T20:02:51.943000
CVE-2020-11001,0,0,d7f996cade0b0c6851d809befdb5b1aa07dd45e10bdf9d4a8ba10210b6372d25,2020-04-15T19:15:41.207000
CVE-2020-11001,0,1,ca19ed57e7ae62a9b9df074ddd1a6d02ac7f5061de45a8b2ac0e8712c945dc77,2024-11-19T16:15:18.007000
CVE-2020-11002,0,0,6bae180aab26f78c357099f9f2e4f0a047c68dd3935404e92e9ba611178c4b89,2020-04-13T15:17:07.317000
CVE-2020-11003,0,0,b1f6a40c60dc91e7eed1191ba37ea1cdaeef213e36611b08e75d9aa93e4a7262,2020-04-15T19:44:11.063000
CVE-2020-11004,0,0,9216201bdcf2378700ab69f29cfdc45ce754216ba12703454002bd0cddf8ba43,2020-05-01T19:25:26.237000
@ -146070,7 +146070,7 @@ CVE-2020-11033,0,0,99181f785abd07090e339c37e6002332032014dbddbae6e05836d3d1b8053
CVE-2020-11034,0,0,59de03bb22421324ecf1fa1ac5b9417e3475dd3ba074cd4ef5bb311f3e9e7b19,2023-11-07T03:14:28.117000
CVE-2020-11035,0,0,4fc551e4510d4ff82ac98d5e01fc62c5089a7dc8e4900bc5f8317e67bc789b61,2023-11-07T03:14:28.207000
CVE-2020-11036,0,0,ae1c78eb553ae8f5d8b51ae33d4dbf29a62d3e9f39af61e95c140cf2c15fc553,2023-11-07T03:14:28.313000
CVE-2020-11037,0,0,f7fd8d210270a1d4d217a49c86c41bda4439530088d6d256c4f088b5221f0443,2020-05-08T15:57:02.020000
CVE-2020-11037,0,1,d380802cb260a43ce177783dfea8ae14b1eaa14b50eaa93ba15f8e561ff752f6,2024-11-19T16:15:18.243000
CVE-2020-11038,0,0,61ad726e49210d73d4096496022b21657a00e81b4d84c8954159c823bc201940,2023-10-24T15:31:29.087000
CVE-2020-11039,0,0,18dd073af597d3947f5fecd4bb83a01d615b505b0fc72420463d7915b352826c,2023-10-24T15:30:22.390000
CVE-2020-1104,0,0,2464ad9a53937bdbb9394dfb79c6f222fcc57ab22f36f962745beac437588868,2020-05-26T18:44:10.763000
@ -147540,7 +147540,7 @@ CVE-2020-12621,0,0,8ce7e90cf5d38925e940068a7ae81f0e149cc8eb6774d0a2c1c7e217670dc
CVE-2020-12624,0,0,8a0fc770343fdc04bd996cf45f0ff8eee77a483d3005ca548b79b2bbdd4878fd,2021-07-21T11:39:23.747000
CVE-2020-12625,0,0,ba670072932e2f84ce8a6ee211183dd0aafd451a1d585c003e4b8f0ee8b0710c,2022-09-02T15:42:45.577000
CVE-2020-12626,0,0,ef4ab069cdfdd918b1dfdbdff6dc1e10a89ec07b516956413a5df9b27f4d80a5,2022-09-02T15:42:13.713000
CVE-2020-12627,0,1,7e8740e74bef375c203c420eadadfc5b0f0a3be281f621e0bb304f065c1e51e4,2024-11-19T13:55:30.697000
CVE-2020-12627,0,0,7e8740e74bef375c203c420eadadfc5b0f0a3be281f621e0bb304f065c1e51e4,2024-11-19T13:55:30.697000
CVE-2020-12629,0,0,6302c256329ddcf42ee813098eb846d57616b48336546370f0e8d1971103bb7c,2020-05-06T20:44:34.660000
CVE-2020-1263,0,0,9a370617ef73138b079100cfabf08396db758880aa61ac1612d7dd94a8f958b0,2021-07-21T11:39:23.747000
CVE-2020-12635,0,0,20c8e4b2f600aed040904c974ad6e679133a1f04f71dd085db50281f95159af7,2024-02-14T01:17:43.863000
@ -171654,8 +171654,8 @@ CVE-2021-25960,0,0,8966318153632386e613d3da07433d0898ebe541ac0542fbd833b88414c9a
CVE-2021-25961,0,0,22b470ce8b666ea20e5d0cab6ff8f13de084ad6910d45348aef26ed926ddac00,2021-10-07T17:05:48.717000
CVE-2021-25962,0,0,935f7ba91aea9f19056fdc881199025fe86ee6e75a7a00550a994ee72bbc4ce8,2021-10-06T20:30:01.977000
CVE-2021-25963,0,0,eef6fbaad1cf210ebcdcb4dde111b82ed2ae28fe021f79460bcb208f56e7438b,2021-10-07T03:02:46.987000
CVE-2021-25964,0,1,bd17926c15c6aafe59c4d31c62272369f814e16dd285b716ff509b30016eb446,2024-11-19T13:55:30.697000
CVE-2021-25965,0,1,e8c380577323e71372b14eb1db6dea116d02a5d1c09bca2a20f9fba85d976a73,2024-11-19T13:55:30.697000
CVE-2021-25964,0,0,bd17926c15c6aafe59c4d31c62272369f814e16dd285b716ff509b30016eb446,2024-11-19T13:55:30.697000
CVE-2021-25965,0,0,e8c380577323e71372b14eb1db6dea116d02a5d1c09bca2a20f9fba85d976a73,2024-11-19T13:55:30.697000
CVE-2021-25966,0,0,6631aa3daac52e584c6ac4608617627ea90e46497039ab1b233e796a5197021e,2022-02-25T16:10:26.793000
CVE-2021-25967,0,0,4ab84532fd7ed4fc14ba083adea1ce2392a7e866ae5f01e12da82d39bc860ffa,2021-12-02T18:59:55.443000
CVE-2021-25968,0,0,182c7f567a0aaa94a30caeae3513295d58f799b9efd65c2c904f1dab7bc4d009,2021-10-21T23:39:03.337000
@ -181910,7 +181910,7 @@ CVE-2021-39866,0,0,6fabb561196e392a171b14d09332d010f59de8a7ed9880963cc586df8f988
CVE-2021-39867,0,0,cf1dad99c282faabc5cb3cf833ed6f5b91097d777779477ac24fd680f378127d,2021-10-12T19:08:05.167000
CVE-2021-39868,0,0,01bf76261c9d86e2825302310d8b1d110b2d4f6a0f91c6aea468c32be845a7f5,2021-10-12T19:47:47.650000
CVE-2021-39869,0,0,50c4bfd31656adba59cb9dc37b7b350e99a58491e593864693fd3f1525a21185,2022-06-28T14:11:45.273000
CVE-2021-3987,0,0,5e744b8c7b75d6d0697e6a76da79f117735cee1d599e3d1ad3c0c12d1921ab65,2024-11-15T13:58:08.913000
CVE-2021-3987,0,1,9bed2e72e8d78f1a6acc2c0eee9b4082c17ffc30cf9954091036d7b20f6c3aac,2024-11-19T15:44:38.113000
CVE-2021-39870,0,0,f4d27e6e382702365ecb6b123ea92ce819b6bff3f3b19cf8c54ff152bc410640,2021-10-09T03:31:41.567000
CVE-2021-39871,0,0,9da9bbcde2429b6f2a3b8c36de5587428d893fba2ba1c35d4bc22836c49d3722,2021-10-12T19:52:42.127000
CVE-2021-39872,0,0,389f57b77d45e9d1425003b8b643833784e02c6171170491cb4db28b7e8fd74c,2021-10-12T18:24:40.737000
@ -181921,7 +181921,7 @@ CVE-2021-39876,0,0,163386dcc440f8e6b66258fe9f8087aeebbd81b74bcfe526af8eddfb343a7
CVE-2021-39877,0,0,f9748be5890f45dbfe5a909268c2e810aed0fd7cef3df47f2f844678254c3d6c,2021-10-12T15:55:42.793000
CVE-2021-39878,0,0,9d9437315fc043e2589cca1b010554d7ecb9e451d3d2157288a1e88191aca38b,2021-10-12T17:15:02.807000
CVE-2021-39879,0,0,429da5caba14265b91489ac72fa37fdea760044ee3fb62e1cd11f34e878ac20f,2021-10-12T15:57:48.810000
CVE-2021-3988,0,0,8ed5b3d56ac136bbdab27f7c44f0e596bd34296008375dd25bc70af4f992be57,2024-11-15T13:58:08.913000
CVE-2021-3988,0,1,e1e0bf60403d6fae3412ba077b574726c30cc26a4ae5a546f7206097a49b73d3,2024-11-19T15:43:01.723000
CVE-2021-39880,0,0,f43fbf46512fe0da98b08e588e5c97c52ff7199b5c05f615aa05257e460043bf,2022-10-19T18:25:02.617000
CVE-2021-39881,0,0,5445efe9c4c4cf5d576eca639b40a53c718d8c7b4fa50521ccc2d6c6aff6a28d,2021-10-09T03:31:08.827000
CVE-2021-39882,0,0,989fca2f5d44fb7d0c221b794ff55417ebd0a1be5be524bdad69ce4323e8c8b4,2021-10-12T18:39:13.573000
@ -181954,7 +181954,7 @@ CVE-2021-39906,0,0,e04ad55a1100d2964d2fe24a0d9044d99aa4ff75b0959894c4e77599d608f
CVE-2021-39907,0,0,fb47addbd6bbabad003567f698b756cafc4248e663cf3186ea0c076027d378af,2021-11-08T18:11:09.323000
CVE-2021-39908,0,0,f72dfff8f0de9ab8ced78ab85d925d77e9a0ab0762baa52bbd5bcb5844b20d7a,2022-09-30T12:58:54.010000
CVE-2021-39909,0,0,0eb46c843aee997f319542a3de59e07a425b198542987db6d18b92f2cd302bc6,2022-10-06T19:55:19.013000
CVE-2021-3991,0,0,574390f555a94c6c50681f89cb7783da922771c152c564d76dbcc9c11c7eae82,2024-11-15T13:58:08.913000
CVE-2021-3991,0,1,dec2ad2abf0d33a9f41c3ab761273d52387a01f6ed0fb84dce9c69ea9742332e,2024-11-19T15:31:47.833000
CVE-2021-39910,0,0,282b0ca251be46e18bfa01121795127e6cadb5a2fbd4e673f7596e1fdc2179ea,2022-07-12T17:42:04.277000
CVE-2021-39911,0,0,b91f499ed64b9404e4620abe987fe34a286f26afde4bd21996a2f7b358c0c585,2022-10-06T20:14:22.410000
CVE-2021-39912,0,0,6b1571a12bafe3ca8eacf93314ab0c9c2bfaa878e8fb257fb7f993e04329f737,2021-11-08T18:38:05.060000
@ -183333,7 +183333,7 @@ CVE-2021-41636,0,0,63eecb7b37c7497bc2d0e66fda0c87c3bb39b2ae9ef4daaf774dfdae2e15c
CVE-2021-41637,0,0,3e7106415adaddf34c5f560098cc1181920e94facbddb201ad017dee908edb96,2022-07-01T16:48:40.010000
CVE-2021-41638,0,0,613e6d48da7577b6a41011f792da0d6bf850458d5b4d0fcad9ddc862b5e440cb,2022-07-01T16:54:44.490000
CVE-2021-41639,0,0,e4459c0cc2a18f37534ab8228cfd8beba9d057a0a4566969f9e85d8579ad29e7,2022-07-01T16:54:56.413000
CVE-2021-4164,0,1,20f9d58376f073b688db27821f1a5a1437caea09888301760c03328ec9b9d6e0,2024-11-19T13:55:30.697000
CVE-2021-4164,0,0,20f9d58376f073b688db27821f1a5a1437caea09888301760c03328ec9b9d6e0,2024-11-19T13:55:30.697000
CVE-2021-41641,0,0,471e4e684c15a020d266300f4f064d2429fafbadc4766e60775831b2cf58f0b5,2022-06-21T14:47:44.067000
CVE-2021-41643,0,0,e459bb9b3ae61ce1c0c6d285d271ea229748355da335583ec31fcdddf509d6f3,2021-11-02T19:39:02.490000
CVE-2021-41644,0,0,9865dd6292c1189e24150efd40a621f72aa038c9804a6547447118cc86d16ed2,2021-11-02T18:49:45.500000
@ -183373,8 +183373,8 @@ CVE-2021-41694,0,0,f50452abd758a90efb8659fe89ef0455f4d267a5131c762b8f8e62ab5bbf1
CVE-2021-41695,0,0,dd9e067ec3b53cda9f935034e15232d6d5e79f62a053b26d0f77f6909e4ac1ef,2021-12-14T15:36:10.400000
CVE-2021-41696,0,0,8e34760fd4621f0aa12fba1e5efd349f7fa4de5d0772846e528bcb8650f3de63,2021-12-14T15:30:11.617000
CVE-2021-41697,0,0,33b358b7127382c3f55513ad663c443b6239f7d67ea40b4e900a1c92ef4cc59d,2021-12-14T15:14:33.733000
CVE-2021-4170,0,1,b8beab78ed9dc354a058ea96afab8166fc3706648030e4f45ecdff702a9bd3fb,2024-11-19T13:55:30.697000
CVE-2021-4171,0,1,4f42b83a708d15892b3fcad03307106e62689103423e13da2e9868050bf6a831,2024-11-19T13:55:30.697000
CVE-2021-4170,0,0,b8beab78ed9dc354a058ea96afab8166fc3706648030e4f45ecdff702a9bd3fb,2024-11-19T13:55:30.697000
CVE-2021-4171,0,0,4f42b83a708d15892b3fcad03307106e62689103423e13da2e9868050bf6a831,2024-11-19T13:55:30.697000
CVE-2021-41714,0,0,fc9e637af1a0036f13895530a7345d717282538ded5aaa19ffc08da024090e87,2022-06-03T14:15:01.887000
CVE-2021-41715,0,0,e54eedea66b5b1eee4cce4189c84d7d77fe6adbb9ea079fcd98fdaf28b2809e3,2022-04-14T20:28:35.890000
CVE-2021-41716,0,0,cadf2b7de621cc4d3a3a955adc24a880843a6c905295b60f449a49d359880f71,2021-12-08T14:48:53.020000
@ -187846,7 +187846,7 @@ CVE-2022-0269,0,0,0b042406ed722bed4f08f80b4f00c84357c8cea0b40b051befc2509217a3a6
CVE-2022-0270,0,0,547484ec0a42fe3acfc13bd179336b2c7cf9e5bfa133be62f505695ac6b594fe,2023-07-21T16:53:18.197000
CVE-2022-0271,0,0,b9998bff8556a3e9dd78071b57144ad5eb927440f09838acadc201638d9c53a4,2022-04-15T17:54:39.720000
CVE-2022-0272,0,0,ba39c601e8f8ad770ec51471a81d25ffe2f0563ea1a0215aed7e5549b2ba80bc,2022-04-28T18:40:19.163000
CVE-2022-0273,0,1,e1fb46576506bdae178f09dce4f55598d868a4d0fde059b8dd2653558e6b68bf,2024-11-19T13:55:30.697000
CVE-2022-0273,0,0,e1fb46576506bdae178f09dce4f55598d868a4d0fde059b8dd2653558e6b68bf,2024-11-19T13:55:30.697000
CVE-2022-0274,0,0,5b464b8245e5321eeea5cde4c0986f9d63275f8e971c1a66b7e4500348e1edc6,2022-01-25T14:48:16.997000
CVE-2022-0277,0,0,54014335e700fab8a415cb3d21845a08a975de96657a8cbd1df94a58e34845ed,2023-06-29T08:15:09.807000
CVE-2022-0278,0,0,bbe12ed35bb88da2486e8c13a6baaafb99e94fb880ba9c3fdbf3c9d24bfb016a,2022-01-26T03:22:09.423000
@ -187906,7 +187906,7 @@ CVE-2022-0335,0,0,c87f7140ccb139e3761172aa2f563e4109797f37ee8bf08d3125bcc7f75ad6
CVE-2022-0336,0,0,307b1c206992ca977db64c933e94fd941cf38b8332fd987ef4968a8aafac3993,2023-09-17T09:15:10.277000
CVE-2022-0337,0,0,75762347a627388711d1f024fb68d21bc655a56ca3208dec8afc0cf007c526e8,2023-01-09T19:17:54.197000
CVE-2022-0338,0,0,2606c9f2afde98ccb459d99f4a20258712105b5775cab8d092cb1216a49083f9,2023-08-02T09:15:11.420000
CVE-2022-0339,0,1,5d793d5e53c6da4433011b5271c0b87f58dd5cf7dcbd4198915acb20e4dc641e,2024-11-19T13:55:30.697000
CVE-2022-0339,0,0,5d793d5e53c6da4433011b5271c0b87f58dd5cf7dcbd4198915acb20e4dc641e,2024-11-19T13:55:30.697000
CVE-2022-0341,0,0,6bc29c60602591923783e75b9647c6eedf344c6d18b4537b8c917185e44cb4b4,2022-03-18T18:00:28.817000
CVE-2022-0342,0,0,192c7e727dc228b67703fcbfa825f1994bc25fe903e9046ec3ccd660229b0664,2022-04-04T17:27:58.343000
CVE-2022-0343,0,0,9b4662c7106d8ca9b502a9d147c3d0debb4425324b85f0dcc86bf35395bea467,2022-04-07T16:31:33.783000
@ -187918,7 +187918,7 @@ CVE-2022-0348,0,0,41d5c28d0d1ab089ac68d1912e05f4337627e5cea9fba44ca38c395f8d8254
CVE-2022-0349,0,0,068d099492481419d374d2003ba2aab3b7d6988afb1cc3a820cd310c5c5be982,2022-03-11T20:44:24.327000
CVE-2022-0350,0,0,4d2f2dd515eed464ce450a16a96b9a4c6b0b857965f9f86d554d1100c638b80f,2023-03-07T22:40:44.473000
CVE-2022-0351,0,0,d8c1cca7ff8811855948a48757571f7f9926e2f30bbcb8ecf722b183b33e26f4,2022-11-09T19:20:23.007000
CVE-2022-0352,0,1,0db67f24e45f8cba6dbb901f2e90ca2aaf82b10e7d4d2ffa04beed0cc939d610,2024-11-19T13:55:30.697000
CVE-2022-0352,0,0,0db67f24e45f8cba6dbb901f2e90ca2aaf82b10e7d4d2ffa04beed0cc939d610,2024-11-19T13:55:30.697000
CVE-2022-0353,0,0,1bde6ae86e109805348b0fe8a1ea22f783b296f97417591fd534964877f7a921,2023-10-30T18:18:25.037000
CVE-2022-0354,0,0,08d2a7b0ab08e8bc6919039c3edf04df57c0887581b95ac3307601a9b6d27779,2023-08-08T14:22:24.967000
CVE-2022-0355,0,0,6f40eae045470357a76ef57564a0e59b6ca2e456718480f7cb2332766b81d912,2023-08-02T09:15:11.547000
@ -187970,8 +187970,8 @@ CVE-2022-0401,0,0,fd0c1ff73b88c5d9692a05caa80d58d887c8a37e7f114a6685c34c493b8913
CVE-2022-0402,0,0,92f9b155923211e2ceee2d42d296863f6f1f38af6d18510a65170addd06c966c,2024-01-22T21:01:52.430000
CVE-2022-0403,0,0,54d3a8e21af141a32e192ed41de5542c8ee2cafce593d7553180addfbe7d22f5,2022-04-11T16:16:43.773000
CVE-2022-0404,0,0,298dccd25c1952207280414f8bd7e0b22fde3e98e64d2fb17b1031e8a652b119,2023-11-07T03:41:14.680000
CVE-2022-0405,0,1,3fe2c2fa664b847b5ebb82208e2adeb820c86039416485597b89d2c3c29fb9e8,2024-11-19T13:55:30.697000
CVE-2022-0406,0,1,ac6dc798d52e1d9df0954afaddd06fcd05ab5e74ee3bd2e718cf9ddf02b5d3c0,2024-11-19T13:55:30.697000
CVE-2022-0405,0,0,3fe2c2fa664b847b5ebb82208e2adeb820c86039416485597b89d2c3c29fb9e8,2024-11-19T13:55:30.697000
CVE-2022-0406,0,0,ac6dc798d52e1d9df0954afaddd06fcd05ab5e74ee3bd2e718cf9ddf02b5d3c0,2024-11-19T13:55:30.697000
CVE-2022-0407,0,0,0155b2a87f71b0b7fb0916580421bf8b007742dea3e03201cc1d9b516db1f9a1,2022-08-26T17:35:22.767000
CVE-2022-0408,0,0,c5724b74e67f805cb7cef848135fd972bd1216e01e032e5ee72fd927b68010c6,2023-11-07T03:41:15.057000
CVE-2022-0409,0,0,bdddcb1bc9179f07dc0a4ae2adcd12204cfc01caa1f9bd597938d2e20a4a0885,2022-03-01T01:57:03.397000
@ -188319,8 +188319,8 @@ CVE-2022-0762,0,0,92ae39eefd66ea7cbc32a8686599ec741c84b55a252f147df8d414c0e43894
CVE-2022-0763,0,0,d8fa3da7528e8203bd3a9ef37cccbd85be752760dc10937953f39359a9f93d3b,2022-03-08T17:25:17.980000
CVE-2022-0764,0,0,343066202ab53f2821e9e5df90301b5dd58745b58610e9036f49df289f6d59d2,2023-07-21T17:13:18.700000
CVE-2022-0765,0,0,f45389e2abd373ef50c4b2eaf76af5c989711ff021560b421d272973fd1993b0,2022-04-27T00:07:20.813000
CVE-2022-0766,0,1,d537f4274da704d1dd3273ac0b381b2b0424512e0ef2fa096f40080f0bc4abf5,2024-11-19T13:55:30.697000
CVE-2022-0767,0,1,4a8b1abf7bc65f3da8bb9d672e959713f33737890d786c063681fdda56def6c0,2024-11-19T13:55:30.697000
CVE-2022-0766,0,0,d537f4274da704d1dd3273ac0b381b2b0424512e0ef2fa096f40080f0bc4abf5,2024-11-19T13:55:30.697000
CVE-2022-0767,0,0,4a8b1abf7bc65f3da8bb9d672e959713f33737890d786c063681fdda56def6c0,2024-11-19T13:55:30.697000
CVE-2022-0768,0,0,7413d50a96f5047476d4044fe93ebaaab8948f5b8b6e5644533ed04e60d94495,2022-03-08T17:34:05.377000
CVE-2022-0769,0,0,186d87009c3299115358ed003347610f261ff2fff63be099b887bf8e21eab2ea,2022-05-04T13:59:27.377000
CVE-2022-0770,0,0,2b2c8df5ef6f7c812d46374c4465bb9d474ff8112a462c85978629ead78fc435,2022-04-04T18:55:52.103000
@ -188485,7 +188485,7 @@ CVE-2022-0935,0,0,4937ede48adff99b8a82685ce1c47ab995cfa52213926d00546e0ed28661fc
CVE-2022-0936,0,0,5e1301a868c51f32d9b1d38c3bd9d5c4e7b252e5c9034d5c170399428a55d018,2022-04-14T20:39:32.157000
CVE-2022-0937,0,0,6ebd398e67ed3e0577049a7473f2e9b69a1755b2dd70b6e7cd0177ef47d0ed36,2022-03-18T18:14:39.940000
CVE-2022-0938,0,0,53311bc36c380c526ea038cf13a8d2ff3d90835a99184a433f43babd3148fad1,2022-03-18T18:09:18.637000
CVE-2022-0939,0,1,3282bbb661657d8be93f4071e72224ecc54e53305f8949acb7b8846808175f6e,2024-11-19T13:55:30.697000
CVE-2022-0939,0,0,3282bbb661657d8be93f4071e72224ecc54e53305f8949acb7b8846808175f6e,2024-11-19T13:55:30.697000
CVE-2022-0940,0,0,70c545df86ee91c07e5f16b8db56ecfe025f705cbd301d61814768bd18a46665,2022-03-18T17:58:19.337000
CVE-2022-0941,0,0,ac156d3ea26d89f38610a523301b2336456b75734150d52009650c143803332b,2022-03-18T17:37:51.753000
CVE-2022-0942,0,0,dec36e5bdc2646c8ba8c9b40004d57a13bf18d262c0580e836243465cf2f3bee,2022-03-22T18:06:16.860000
@ -188536,7 +188536,7 @@ CVE-2022-0986,0,0,1f3d8cfe5b4034f8cb2379ef060f1b0fce7bd502c6c6229913f30a0e5af318
CVE-2022-0987,0,0,f2c42d4d9f95e9749a4c445c80a51b63228a99080839ef62a18bb9765a5a0f2b,2022-07-09T02:16:41.140000
CVE-2022-0988,0,0,f1199d2b132d579bf0e13054467a88fb08e72497869a87789662b30278c0d972,2022-04-01T12:24:18.417000
CVE-2022-0989,0,0,7454afdecfc72b7e4a57bd0f5cbdf02a26a78ca6613e027ac6b4e5823196793c,2022-04-15T20:22:57.330000
CVE-2022-0990,0,1,6457303ddf0d06207cdd8d7192c493deae26fbe206e51758fb7bc61df6f18665,2024-11-19T13:55:30.697000
CVE-2022-0990,0,0,6457303ddf0d06207cdd8d7192c493deae26fbe206e51758fb7bc61df6f18665,2024-11-19T13:55:30.697000
CVE-2022-0991,0,0,8ca24c514df2eadfc1666ca1ace95d3168a9e969f9b3fcbe0a2a99e49de31694,2022-03-28T18:54:03.633000
CVE-2022-0992,0,0,6fd70fc3b7474ab91729ad584c70484a0877149adc006c6f9bd7347bb2357681,2023-11-07T03:41:41.573000
CVE-2022-0993,0,0,78c1b936011bd648dc08da3df4bfe29b3fe82fd44846684d5bf8f67b8b826931,2024-01-11T09:15:43.237000
@ -188763,7 +188763,7 @@ CVE-2022-1222,0,0,b3920337094656db702d78f1c526ab2ae12658b8e98c28c5c4ab7be3ad3344
CVE-2022-1223,0,0,637b2827dcaf7417e78dbd542a64935d1a8b67bacce03b5481a1f13bfe63287f,2023-08-02T09:15:12.567000
CVE-2022-1224,0,0,1f7e411e11108d7458b51eab22eb66a24149a5879c00141ef2f28fe0fafb05dc,2022-04-11T16:42:06.027000
CVE-2022-1225,0,0,5748f4f5345a9f6c3175311aa2738ab2bf9651a24ed3aa3e4677372333de4ca4,2022-04-11T16:44:30.957000
CVE-2022-1226,0,0,bf5f888bf31be4b098386ee9d479d6c8983b1f336de6d7d59c67ef66072982c7,2024-11-15T13:58:08.913000
CVE-2022-1226,0,1,8bf5870804954667b90d0745c8de8a5961788bc74620aa97f31ef3a31714c7fe,2024-11-19T15:30:53.477000
CVE-2022-1227,0,0,83b90259bbaaaa877c52c1a6a345ecac76277c5a49b8d7b2e55d5609ee2638a9,2024-06-28T16:15:03.017000
CVE-2022-1228,0,0,7d23d45a83435d1e3bd4ca47a231881fd502cebe5b74cef074758e121829a08b,2022-05-03T17:07:53.397000
CVE-2022-1229,0,0,224e2e97e97497a42291fdfe93e44428659fa5e137ea549dec7de44ffe085b98,2023-04-04T16:24:30.943000
@ -189401,7 +189401,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0
CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000
CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000
CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000
CVE-2022-1884,0,1,b5e47b6fa991326fd5d1cb1d70695a1190edb3eb7f45e2a68cb3debb9e1a9c6d,2024-11-19T14:47:48.443000
CVE-2022-1884,0,0,b5e47b6fa991326fd5d1cb1d70695a1190edb3eb7f45e2a68cb3debb9e1a9c6d,2024-11-19T14:47:48.443000
CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000
CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000
CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000
@ -194407,7 +194407,7 @@ CVE-2022-25246,0,0,470d73336081fafe2504c5ae930c1bc5c3b04d6c1d5bca8e82a1ca62a276c
CVE-2022-25247,0,0,f1828753959f3a8ddb7cef9c2b17b9ebe6e005ad9804df2524e5e91b5305ed43,2022-03-28T13:25:59.947000
CVE-2022-25248,0,0,1e003ed9c345c86a0ae7342705f6b5b76c7a524c725fb9f26e480a2de2ce199c,2022-03-28T13:27:40.890000
CVE-2022-25249,0,0,5096787f68913f3af8deec7d28059622eee59c935f342d23008ba2d1adcdb681,2022-03-28T13:29:31.777000
CVE-2022-2525,0,1,082d8f171c6cc07e4b131d4117af1cdfc7074009c41676c35c6dc892fa94881d,2024-11-19T13:55:30.697000
CVE-2022-2525,0,0,082d8f171c6cc07e4b131d4117af1cdfc7074009c41676c35c6dc892fa94881d,2024-11-19T13:55:30.697000
CVE-2022-25250,0,0,70256af592b9c49051cb696e3e98b6b318b6b9bd7c026c62389ebc173f763a81,2022-03-28T13:29:56.907000
CVE-2022-25251,0,0,30aa9f042433ef7f24b6a381a3a50cfd25bc3a4fa4c2ee4d2a94c9598ed3cb9e,2022-03-28T13:30:39.300000
CVE-2022-25252,0,0,40a835ffc450f4499e9c229b3d3a44e165cbb918e6082351e6d9edd95f09ca0d,2022-03-28T13:32:35.907000
@ -198901,7 +198901,7 @@ CVE-2022-30759,0,0,bd8543e5a8b11fb4636241908ba990e450528de2ca3ce6a2cc2c2e92c529e
CVE-2022-3076,0,0,04a5db7a7c3a6c41fc8643ca8ef27e8b694c85120ab617b9e4549a6d82fe6ea6,2022-09-27T04:37:44.793000
CVE-2022-30760,0,0,33981d8f48d80e2e251879e187507ead15290cf13fe04528ee7cc8601a8463a9,2022-06-17T19:57:09.527000
CVE-2022-30763,0,0,99c247d1a877e52090357101b5b4001a96c949c6e441faf9185997c22c969e91,2022-10-12T15:32:50.077000
CVE-2022-30765,0,1,21088860b0170d3618cfd9335e6710743a7cf725d376c1f938c4afaf2c7d00aa,2024-11-19T13:55:30.697000
CVE-2022-30765,0,0,21088860b0170d3618cfd9335e6710743a7cf725d376c1f938c4afaf2c7d00aa,2024-11-19T13:55:30.697000
CVE-2022-30767,0,0,4775e6dfb882ca3a196625f46d2186ce01f414513db4c144b862289f8c58d6a5,2023-11-07T03:47:24.783000
CVE-2022-30768,0,0,19753dea6aeae531834932bdbe525a85c3a36862042bf97e7f1ddd6d4e4b3d91,2023-11-07T03:47:24.853000
CVE-2022-30769,0,0,15fa8cc9f9e5fd9012a9ab8a52b506ef029d295e9d752a237cf87b7e4f8050e9,2023-11-07T03:47:24.913000
@ -199681,12 +199681,12 @@ CVE-2022-31663,0,0,c250a0e102f60432d255e827fdd6db289d62d1a4e1292229b591504e22573
CVE-2022-31664,0,0,8ae94e3e4b372e5f45259d81541342947ae361ebba4e6da89206986ea919de52,2023-08-08T14:22:24.967000
CVE-2022-31665,0,0,7a06345a1942d5d52d9b06c0ee41416d4ed2364fdc0d69c8a0c3f480ee888cbb,2022-08-11T16:14:08.620000
CVE-2022-31666,0,0,fddd08a0275cd2757989dfe397f2a0364bee8be87b326ee85f29b843beb3c153,2024-11-15T13:58:08.913000
CVE-2022-31667,0,0,b4a2682ab6a2c61a30b5ca48c8773b6de7eb3905450bd89ef570ad1acdf43de2,2024-11-15T13:58:08.913000
CVE-2022-31668,0,0,649520a20bcea91bc592e945ea0bf7164dd3b5b8c3ed608c13d7d8dc1202f9a7,2024-11-15T13:58:08.913000
CVE-2022-31669,0,0,7b7f0d45e10bdc4d686c91fec1cc514e5851e6c4574d4f86fe9975fe1ca3ecc9,2024-11-15T13:58:08.913000
CVE-2022-31667,0,1,a86622694c580be2148aebd4cf7f233d4cdf3ef9af10848165fe7bd7e2ff5779,2024-11-19T15:25:29.643000
CVE-2022-31668,0,1,389a2176cdcdbac326dc9a97b32bac0dee4c4446a86e9ff41851f4fa9bb05259,2024-11-19T15:25:25.797000
CVE-2022-31669,0,1,1ffdf862df8b02cea52ed799f65002be0a0a3e9db5602fbbdf399b87d7bf8911,2024-11-19T15:20:01.913000
CVE-2022-3167,0,0,47921e8a9cb97995d6f2ce8276ccf118a65fe4731d6ac6de65dd0ec114eec596,2022-09-14T15:32:08.950000
CVE-2022-31670,0,0,727719948637a94160cef27d7d8bf8aa400ade68f40e45eb16ee91476d183a3f,2024-11-15T13:58:08.913000
CVE-2022-31671,0,0,2c2cbee5d14eaf0dc34fd68103cb6c2805514c4e88ddbd449a05e40e50807870,2024-11-15T13:58:08.913000
CVE-2022-31670,0,1,e7d2b70f3a49fa7e681074911a3f5d96940d2022fc580c58bb8ceb9bb2fca5ea,2024-11-19T15:20:54.243000
CVE-2022-31671,0,1,e1d29a729eb1da37697d524bff97f426d3e52f3398b52abf59cd32ad79c7a6dc,2024-11-19T15:40:44.150000
CVE-2022-31672,0,0,f935cb14a924ae93702f89793daf0806536a0ce42ff8289dde093642be80a068,2023-08-08T14:22:24.967000
CVE-2022-31673,0,0,da7dcaa4140053d84527543292fb585bb296fa966885cdf6f4d876302e1f87da,2023-08-08T14:21:49.707000
CVE-2022-31674,0,0,332df8a6563c46e3b27acddce953af7226cedea008975ba4b629bdb187c43e75,2022-08-15T18:56:24.003000
@ -212973,7 +212973,7 @@ CVE-2023-0105,0,0,2b12a003cd73110318e79298dd730b028944de31b3b2fd49ae09c6e6c34faf
CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000
CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000
CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000
CVE-2023-0109,0,1,f50d684cb180753275a60be1ec93d7781dcc8b49ad130338582e06440ef189bf,2024-11-19T14:44:24.977000
CVE-2023-0109,0,0,f50d684cb180753275a60be1ec93d7781dcc8b49ad130338582e06440ef189bf,2024-11-19T14:44:24.977000
CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000
CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000
CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000
@ -213577,7 +213577,7 @@ CVE-2023-0733,0,0,e09491ec0935323a2fec770c3ecd0ead271e6d263c55ec182afeeb068268d5
CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000
CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000
CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000
CVE-2023-0737,0,1,51425d6267ef46092b2ea719385b1a24795974b2751701ad1000a997f859dafc,2024-11-19T14:43:04.257000
CVE-2023-0737,0,0,51425d6267ef46092b2ea719385b1a24795974b2751701ad1000a997f859dafc,2024-11-19T14:43:04.257000
CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000
CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000
CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000
@ -215151,7 +215151,7 @@ CVE-2023-20589,0,0,8f5169c7803605972ea983b305f7f4a772b29887c902f9b718a3f97d8c8a1
CVE-2023-2059,0,0,0677a9a340cebf1ede4fa5405d77be76b826f28940ff2b5e0fd7dfe518b5d2d4,2024-05-17T02:22:37.890000
CVE-2023-20591,0,0,1e7df92e3260281a7f93a15b060fa9a08e3ae1935869b5acd83a46486c7b2bef,2024-08-14T02:07:05.410000
CVE-2023-20592,0,0,b0a06d1e3946cee9f0f28e7ed70215f197005399701a88546b468891da1b0cea,2023-11-28T18:04:11.733000
CVE-2023-20593,0,0,530d6596a07cbc314aa9738f5f27a912fa1e4a0638fe8dd3fac9dbd8b5f37664,2024-06-10T18:15:20.270000
CVE-2023-20593,0,1,7abc99ea43cac16867e8379103894870c8c627e5561a73e7e35a8dc522f378b6,2024-11-19T16:35:07.333000
CVE-2023-20594,0,0,1216232d26ab1c6c51b8b6cc614329be0442409fee752464c8c4238b36f64f7a,2023-09-22T19:16:57.037000
CVE-2023-20596,0,0,6a82acc121f37ef310d42099b7aae05b4dd32a0c7d12ee42d78925db1cf9d2d9,2023-11-21T20:28:27.040000
CVE-2023-20597,0,0,15f8fd1c7036f945b94c70b747ee09d37b148ebd22da23b8a6409d9bb0d84e4f,2023-09-22T22:35:09.617000
@ -215621,7 +215621,7 @@ CVE-2023-21056,0,0,995fad705f650ff3eaf185ebe882d06b6e4d09c0956a6bcd2bfea6b654417
CVE-2023-21057,0,0,3d44097c3c200f0b17f1879819349cdc18de4e2156ff8226812a4d0777ba6c61,2023-03-30T16:50:36.527000
CVE-2023-21058,0,0,48052587152b716354e8911d9a2a29e6d938c8f474058afbe6f8a5041cd7974a,2023-03-29T15:05:03.910000
CVE-2023-21059,0,0,8db890a27c915f00d6fed020c9f8a480e62ed6ce4dac0ac01a34a7dce78a02ec,2023-03-29T18:44:14.857000
CVE-2023-2106,0,1,c92407a6d17b0e3d5e08d0917e8500d57e0daaab221d4d9671a90019b78f71f2,2024-11-19T13:55:30.697000
CVE-2023-2106,0,0,c92407a6d17b0e3d5e08d0917e8500d57e0daaab221d4d9671a90019b78f71f2,2024-11-19T13:55:30.697000
CVE-2023-21060,0,0,031442d7f4ea5b6ae0e29837a4bbaed861fbcc303822a358b5dc59a5149bb3dd,2023-03-29T18:43:53.737000
CVE-2023-21061,0,0,6490da526ed7065eccbcc696f9f962795cc2b014c6d53d64a6adbd94120f5d18,2023-03-29T15:04:11.227000
CVE-2023-21062,0,0,40c76e318792cc0f78ca458ad4e9dad427e83b5b91f7684d0d6fa2943a6292e0,2023-03-31T12:58:57.567000
@ -217542,7 +217542,7 @@ CVE-2023-2331,0,0,e433c8f28124f99de996fe1b6c3691e25c108649c8ab730059c257d74b0a50
CVE-2023-23313,0,0,5ab564b75d72781324830922b5feefff3026f2101be70bbaad014ca9b998958c,2023-11-07T04:07:40.137000
CVE-2023-23314,0,0,b80392fd9584b433a38a78e2530c4db30446fa40b35f645f6acfbdcc1e22626e,2023-01-30T19:31:41.750000
CVE-2023-23315,0,0,32244c72a2b7eabff29fdd785e8853617587d6b657a16b1b687badeb31ddeb6a,2023-03-10T02:31:23.757000
CVE-2023-2332,0,0,ead77168c46a2d62d5740ffee8e05cb4272633cde2d7436b3259f38775199f58,2024-11-15T13:58:08.913000
CVE-2023-2332,0,1,3be3d5bdb3aa84ff76247ddc8e5ebfeb1869fc617ae96a6127557011a5701f3e,2024-11-19T15:55:24.137000
CVE-2023-23324,0,0,95dd911b066baa0858b7b409d73bcd14ff22686691096373e30e8c5721aa2257,2023-12-05T12:39:44.770000
CVE-2023-23325,0,0,94e1a8e3ac75f1a3bc2a74e7374f6d9f0e838c3c3932b61fa7dac52d90f8e0d8,2023-12-05T12:48:15.773000
CVE-2023-23326,0,0,af8ef32c5b2a0d921fed756052ef1d0183c04f71130cb143f8686b6d4c026c5b,2023-03-16T15:56:41.620000
@ -235417,7 +235417,7 @@ CVE-2023-46786,0,0,bf4916e892e13d9bd5f18249e97f7ed4aeb5247f2854f8c308efd96466799
CVE-2023-46787,0,0,eee6ea113b686659f2a66a8e2e38db99b180a9cdd992ed45b258359c2fbbafb0,2023-11-13T18:00:08.857000
CVE-2023-46788,0,0,fa89ddc1e582ea32e59694cd588090422058d73f3e55d49cdf4218b1d27bcb24,2023-11-13T18:00:01.510000
CVE-2023-46789,0,0,9fbdb411cccdb011e81628500fbc3b74a0a6d06d2a8237255e6accafa55442cd,2023-11-13T17:59:42.877000
CVE-2023-4679,0,0,9696f8639661f4ff600ec910a28b0621ec509409b2c3dcff5c480894998943b2,2024-11-15T20:35:03.507000
CVE-2023-4679,0,1,2dbae0eabb83ce2e9f092fd25bd577d8e7623c11a5f4ff5c35c222f033544779,2024-11-19T15:54:32.670000
CVE-2023-46790,0,0,7414a678623b3a8d31eda7749ee35a2bdf61169d6ade6fd91b06a5a0e4bffda9,2024-01-02T22:15:08.290000
CVE-2023-46791,0,0,4f7a7ce04b20ee1c59664fc3196bc82b7bf68c16659759baf914252cd593ed28,2024-01-02T22:15:08.367000
CVE-2023-46792,0,0,7e34df21be011e0e859102a1381c46b673dbda14e06d4aaaab00023b1fb66f87,2024-01-02T22:15:08.440000
@ -235651,7 +235651,7 @@ CVE-2023-47120,0,0,6e5cf7aa1dce9f494a0c860253344a3950368bcf8ff7b583963ba86c8e76d
CVE-2023-47121,0,0,8ef00758c3dec2ac6ff6b649dadab0f948ffb4a5bbb58a181a1e6c7b3ef58d87,2023-11-17T20:20:26.137000
CVE-2023-47122,0,0,a9df5fa9c0e8414d44cffae9c5acb48e2a1801978cf6443f04f6610b9193b585,2023-11-16T17:50:16.327000
CVE-2023-47123,0,0,8d361c371341412b84dc54774df576d9fe69de84d066d55765bb32cbb6494159,2024-04-15T19:12:25.887000
CVE-2023-47124,0,1,bfbe18ebea14402829f796430da020434ba5becbf2d6a1123f98fe9408be1de7,2024-11-19T14:15:16.660000
CVE-2023-47124,0,0,bfbe18ebea14402829f796430da020434ba5becbf2d6a1123f98fe9408be1de7,2024-11-19T14:15:16.660000
CVE-2023-47125,0,0,9a2f9293b1bb6384f4c490717940892ab731bd46d8233a43c41e51a52ebe67c3,2023-11-21T02:58:51.787000
CVE-2023-47126,0,0,d7db4dfe43677893f510f67d44655eb1bfaaec58afed097e3332356dc994ae85,2023-11-21T03:01:46.133000
CVE-2023-47127,0,0,3b142b710453a1850b566c196150901604dda76b0ed8a77543fe3542a15724c1,2023-11-21T03:05:46.807000
@ -237673,7 +237673,7 @@ CVE-2023-49948,0,0,622d9877751c0fa8476e6eb6ccc5c249d44e758cb56060b3304a0ce82f6c3
CVE-2023-49949,0,0,1dc65feedc7312a850dd1c1186247ca09a75a8ee1c325a4190092bc71db83437,2024-01-04T17:32:10.933000
CVE-2023-4995,0,0,840d09cb8136711cfe5ecb29c665b6962cd70cccd1b93ffc2baa91d722a31a59,2023-11-07T04:23:17.390000
CVE-2023-49950,0,0,66cd1b1f7e3e23c0144a8871a6842f9873670fe0ad92e9d833ed9c626bc2d8ee,2024-02-13T00:42:06.777000
CVE-2023-49952,0,0,92ae5f5a26ca344cd43f699ec7810925c5d2d6842777a716f253e9f544c4d788,2024-11-18T18:15:05.927000
CVE-2023-49952,0,1,806b4e36516a83852bafa9fc914a8a9ab7798a485a040a68320a9f650f96a56a,2024-11-19T16:35:08.620000
CVE-2023-49954,0,0,5f2dd99d2d2c5535eeb8bba62a2016b84ef33eebb943b9df4f5ddb0db1b1410d,2024-01-03T22:32:37.550000
CVE-2023-49955,0,0,cbf9c53c0bb64b06b75bdbba368b6a283ee8d6496dcad41687ecb7908881f040,2023-12-13T15:20:11.417000
CVE-2023-49956,0,0,3a870fcbca81b4abff15e228414f86cd1d698ffd0c027bfafed8702887aef856,2023-12-13T15:14:46.320000
@ -242338,7 +242338,7 @@ CVE-2024-0782,0,0,dd227a8b469ce6630eb22142a87d0da772ecdb0285534b1bcdde3ca20e489d
CVE-2024-0783,0,0,889b3aec94f8730e9264c4087d63efb1328316b4df2b41f572aa9ab243eedd51,2024-05-17T02:34:58.020000
CVE-2024-0784,0,0,05fccc58af077ffcd0eb7b186f39f412c8126936ae9b879608bee8086b2c9a33,2024-05-17T02:34:58.123000
CVE-2024-0786,0,0,09a89f715683ba83fe81b0a3f3fbdcf9cf5cb4fbf3001ded7457bfdf3b510a57,2024-02-28T14:06:45.783000
CVE-2024-0787,0,0,da307c985a5d2f7277ca10e0fa3477284443893dbdb87e2624f6bc584ee82d36,2024-11-15T19:35:04.380000
CVE-2024-0787,0,1,5c62152a41f236ad30ca32437df7edb5ed362f38d739b75ff3f17e0cda84776c,2024-11-19T15:53:59.093000
CVE-2024-0788,0,0,77f61568ad57c437194aa13eed7b7f4a244f0c473b6deae4d7ecf1e9a4375c8f,2024-09-05T23:15:11.527000
CVE-2024-0789,0,0,dd4dfae2cf9c1e14c885c435e4946684b1e28fce4e56958a0b475f730b1ce5ce,2024-06-20T12:44:01.637000
CVE-2024-0790,0,0,faf5037c158d063c7d3783eeaaf8baa8e520d90b8a2f56f0b34167c00c86529b,2024-02-13T19:42:38.757000
@ -242421,7 +242421,7 @@ CVE-2024-0871,0,0,2a81c9221f676df23b70ee25b96f92b79bd7fe2d47d83d3cf9575aeab8537e
CVE-2024-0872,0,0,59570f703919134c83976c0a589bd002a09343b74061ad8cfeb778f494366fb8,2024-04-10T13:24:00.070000
CVE-2024-0873,0,0,0d017532f0822fb01a43bd5a5b6fb8ed2d6c3075b76ac0b6436fcb6d890c9423,2024-04-10T13:24:00.070000
CVE-2024-0874,0,0,e6fb28781735bc896300880a10982c06b4a0d863ac3f7c9c0e53997a057bc6f4,2024-09-11T22:15:01.933000
CVE-2024-0875,0,0,f31e002a29f537e711f752e183aa6bbd3c25ff8a3c9b2ab0e1449dedd6211068,2024-11-15T13:58:08.913000
CVE-2024-0875,0,1,acff56f9908f520ef0b16f4218d127878a4eb6d2a097c3731d535db49d9d57ab,2024-11-19T16:03:56.163000
CVE-2024-0879,0,0,40ca4d922e04a74721c93cda9d6ef307a09b39f845db5f9dd6db6b694e034cf2,2024-01-31T19:16:07.630000
CVE-2024-0880,0,0,44431bf4f01e73978bc2a282db63f61857269e71b91d3e3d902140e76c6dd1ce,2024-05-17T02:35:00.317000
CVE-2024-0881,0,0,1252bf71170a54b7a474d354bacf2afe464c57991281e1919b7ffd68baf1e1ed,2024-10-31T15:35:20.223000
@ -242602,7 +242602,7 @@ CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615a
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000
CVE-2024-10103,0,0,4259a45e1665318ed535f7305838a4cb3abef1b7dc3496a387dfd27ceff4334f,2024-11-19T06:15:17.740000
CVE-2024-10103,0,1,0779f9ce417e1d0612538deec42aafb8bf2624fcb68250e57738659111623c27,2024-11-19T15:35:04.260000
CVE-2024-10104,0,0,72cf69759458c44313ae635dcdff8a669fdc4ab81a7522ae21a712b6681cb93c,2024-11-15T19:35:04.683000
CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000
CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000
@ -242688,7 +242688,7 @@ CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c4430
CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000
CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
CVE-2024-10203,0,0,2281dae8a6da10bb152783d708df85babb66d3a8b4310b54237aa5d49f660e26,2024-11-08T19:01:03.880000
CVE-2024-10204,1,1,2bd02e2bac83ab0ac328aa1fc70614cb2060e2635606781eb4764e16fcb43f84,2024-11-19T14:15:16.940000
CVE-2024-10204,0,0,2bd02e2bac83ab0ac328aa1fc70614cb2060e2635606781eb4764e16fcb43f84,2024-11-19T14:15:16.940000
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
CVE-2024-10214,0,0,f1ffbc47d38f848fe742b18a6312c0e8ed0dcf6ee0fac4acd3827be3368439e7,2024-11-05T17:03:22.953000
CVE-2024-10217,0,0,eb6516ec82f77e9f107386542d4ffb8464a3e61001620c55c2f842dbfbb03b5d,2024-11-13T17:01:16.850000
@ -242810,9 +242810,9 @@ CVE-2024-10389,0,0,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077
CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000
CVE-2024-10390,0,0,0f765d0806cdf9196d329bdcf23025ca64b02fa3979afe4c4c743c1ebcd10d41,2024-11-18T17:15:10.897000
CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000
CVE-2024-10394,0,0,4035dfc5a5bcf296734e398f64f1bd6d0cad9615950c5c863b2c2a3b361b6828,2024-11-15T13:58:08.913000
CVE-2024-10396,0,0,eea82678934a4b6027473b74cdd3b7d449ff1d094dd2f74343b30dcc0b4b3531,2024-11-15T13:58:08.913000
CVE-2024-10397,0,0,641d68ac85205cf509805150d7c0a339ca6da65bef2e6ec008aeac4464cea320,2024-11-15T13:58:08.913000
CVE-2024-10394,0,1,02596ae06c5bb141cc27325cb3ea0b733d518188270c6208b5959c6689e0822c,2024-11-19T16:35:09.703000
CVE-2024-10396,0,1,23b0066c6f7cdcb293601458f22628165cc0e812b2fb044f3cb3017e9dba4c6b,2024-11-19T16:35:09.930000
CVE-2024-10397,0,1,374b7be741df9473f38e7b5516b7fbf0facc2b9b90e4a4d784e3697245414519,2024-11-19T16:35:10.143000
CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000
CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000
CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000
@ -242903,6 +242903,7 @@ CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
CVE-2024-10524,1,1,2ae4e46e57695b617ac52d594e902ce57dfaaf48b1ad264a69c7c238334e30fd,2024-11-19T15:15:06.740000
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000
CVE-2024-10529,0,0,9539d9165463c4ef6062f503e118501e5313e51d190262ed2198af5f2a5dc85d,2024-11-18T14:59:15.043000
@ -242926,7 +242927,7 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
CVE-2024-10571,0,0,9b43d5204e096ac23dcaf641ac7bbe8cdfae64a689418deaf6fe49df30a6f4fb,2024-11-15T13:58:08.913000
CVE-2024-10571,0,1,764d0722def38a147b3ba290b54cc9e9aebe855b12c99828d9c801c2e02fe1a0,2024-11-19T15:46:52.187000
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
CVE-2024-10575,0,0,d60bf0a0bfff7c064a609e35a84fef721491108a3e1293beb652d4120d21f4e8,2024-11-13T17:01:16.850000
CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000
@ -243115,7 +243116,7 @@ CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679
CVE-2024-10871,0,0,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000
CVE-2024-10875,0,0,f25d99b636c46f59305dd89e678091362bb421c122afe8c605690d8f28fedaa5,2024-11-18T17:11:17.393000
CVE-2024-10876,0,0,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000
CVE-2024-10877,0,0,6810956c657226900e229ce822592489c5a84819a35920ec22d1da0843174d84,2024-11-13T17:01:16.850000
CVE-2024-10877,0,1,301531ad65e2e5f16ea91c20f67a17c0b37faac5d5c530e39dd36f416491799c,2024-11-19T15:52:44.487000
CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df78257a,2024-03-05T13:41:01.900000
CVE-2024-10882,0,0,d50cca8abf620c67a958717eb4d933afb7abd51207b4b48e13771e9f1de70410,2024-11-13T17:01:16.850000
CVE-2024-10883,0,0,591fb34dd03e0d1e5f0e5dcf7a5df450cfd7ed4e0c6fa74361f3a75f2590a9a6,2024-11-18T17:11:17.393000
@ -243135,7 +243136,7 @@ CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f32574438
CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000
CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000
CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000
CVE-2024-10924,0,1,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000
CVE-2024-10924,0,0,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000
CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000
CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000
CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000
@ -243196,7 +243197,7 @@ CVE-2024-11020,0,0,d8da56d08b04c1b6283579c38861d54ff29b7503469ff5458753549fabf50
CVE-2024-11021,0,0,5330750d11b3fde718ec5c3eb7f0a1e1a342a8ecd281acc88c611cccbde0d765,2024-11-18T19:00:03.487000
CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc056df,2024-11-18T17:11:17.393000
CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000
CVE-2024-11028,0,0,a5fce876a39d3e00d472044131a8d336932258a82ff3a02e40bb7ab1cc37c8ff,2024-11-13T17:01:16.850000
CVE-2024-11028,0,1,048d97dceb7a67eae16e2a68b764bd9aa80522dc4afab479a09ba11fca5d2735,2024-11-19T15:38:19.023000
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
CVE-2024-11036,0,0,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000
CVE-2024-11038,0,0,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000
@ -243228,7 +243229,7 @@ CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
CVE-2024-11073,0,0,ef922d07a39eeb6c1fcac9a877724098fbbee23a8a49829a797889d4fd66dae6,2024-11-18T17:21:19.557000
CVE-2024-11074,0,0,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000
CVE-2024-11075,1,1,761e28be6547bbc411fda08607dcebea89c364c1988e928612231af9ea8d1c8c,2024-11-19T14:15:17.340000
CVE-2024-11075,0,0,761e28be6547bbc411fda08607dcebea89c364c1988e928612231af9ea8d1c8c,2024-11-19T14:15:17.340000
CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000
CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
@ -243272,8 +243273,8 @@ CVE-2024-11138,0,0,7b0edb369e2d9df427aea00759a3991acb4ee32080a1e83cba9502f5a7a36
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
CVE-2024-11150,0,0,3e3c713e3eaad09aa014087e1c0cf6ec0a3f52a733d6f796982bf46a36311d42,2024-11-13T17:01:16.850000
CVE-2024-11159,0,1,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
CVE-2024-11150,0,1,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf362,2024-11-19T16:57:05.407000
CVE-2024-11159,0,0,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
@ -243285,7 +243286,7 @@ CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3
CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000
CVE-2024-11194,0,0,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000
CVE-2024-11195,0,0,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000
CVE-2024-11198,1,1,b9e7cd4a54abc30d31dfc1fb824895a4c6c40ac2f9a16df5a8050d3c2c382b13,2024-11-19T13:15:04.157000
CVE-2024-11198,0,0,b9e7cd4a54abc30d31dfc1fb824895a4c6c40ac2f9a16df5a8050d3c2c382b13,2024-11-19T13:15:04.157000
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000
@ -243294,13 +243295,13 @@ CVE-2024-11209,0,0,6796931fa86300b3e2b9543bd1b280cd5b640012f3ea8899a042d616c6df0
CVE-2024-1121,0,0,19a454e1b0b19f003a8998da71d81afc60a591ff2c6ec5f42743662bb8a72434,2024-02-13T19:42:57.107000
CVE-2024-11210,0,0,0cca9b9ced96b815f23a2adf405f6ef8ca2d51de736dbd61610d0077a6858d38,2024-11-15T13:58:08.913000
CVE-2024-11211,0,0,5a3ff1958288000dff9efbfd9636a1e83dea10099aa8993b255e34f281aec47b,2024-11-15T13:58:08.913000
CVE-2024-11212,0,0,43e01b89fe14437dd38553215518a345f9b4f3c5a332d84f096e358f79ffdd19,2024-11-15T13:58:08.913000
CVE-2024-11213,0,0,ee77e6ceb60ab1d90b798383d9261a2a203dfc92f44de28084954782c85c360a,2024-11-15T13:58:08.913000
CVE-2024-11214,0,0,0aa99902e65dc6c03e1ca05b11000c9116be8bf762f91cf55a9d960757e4b1b5,2024-11-15T13:58:08.913000
CVE-2024-11212,0,1,6ce4b0d9c397a1dd5322881479267c29f70cf20d6eb3902b0d9bdaaa6e88979d,2024-11-19T15:48:22.163000
CVE-2024-11213,0,1,7557f50533e93e1d9807ee94d982f4c81ae50d0d6cd07fa8bc5cfe3b5343c650,2024-11-19T15:48:58.680000
CVE-2024-11214,0,1,b2fe1002cda17d5a6c6ef54ef9bdc32c337ee68abdd41ef46560fc24a9eb5fb4,2024-11-19T15:38:59.060000
CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000
CVE-2024-11217,0,0,5d4ed802680b391d1dbfc3e3b561791ea824d61f478d755424e831d8c9d2195c,2024-11-18T17:11:56.587000
CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000
CVE-2024-11224,1,1,c84c6a83be66d403219cac660dbc9e43d81813e8fb46336977cd7169ad26f887,2024-11-19T13:15:04.423000
CVE-2024-11224,0,0,c84c6a83be66d403219cac660dbc9e43d81813e8fb46336977cd7169ad26f887,2024-11-19T13:15:04.423000
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
CVE-2024-11237,0,0,14e448a6a8c58bda6358b06dade390c2a1921b884cc94a3ba12fc6ad79696644,2024-11-15T13:58:08.913000
CVE-2024-11238,0,0,5db87c5bb65e54461cba31fd593252a458b17b662806ea71f4893354fc62157d,2024-11-15T13:58:08.913000
@ -243568,7 +243569,7 @@ CVE-2024-1363,0,0,9db209eb4df171c49382deb38316e39b3051f713f9efe4f059c3f041989c42
CVE-2024-1364,0,0,26eff95b5ea507fb650ff43b925604fe4570257b15b61d96a5e4f3e174924f17,2024-03-27T12:29:30.307000
CVE-2024-1365,0,0,50bc65449d28e3d0be1a7988a8f321027f7e99fc40f3b41e934eae2792442067,2024-03-13T18:16:18.563000
CVE-2024-1366,0,0,d6e1b0b8f1fb7fecd3c16a6e1310267bf73a3fb307e94e1c4e92cf5bf3d8ea35,2024-03-07T13:52:27.110000
CVE-2024-1367,0,0,c843688aa7628264f8fd1ac837b929dd0b5161d8e34b4c9239e0860f7f7c8a91,2024-02-15T06:23:39.303000
CVE-2024-1367,0,1,59415fbd85ea89a386574704553c3e6b047082de8e043119c200d45389db3dc0,2024-11-19T16:06:33.410000
CVE-2024-1368,0,0,e542ce390f0e16cb90fcb6e519becd5b4c3df0f65910c369a949d876ea19230e,2024-02-28T14:06:45.783000
CVE-2024-1369,0,0,e597b83a7e128fca63a4bc63e17c5a8e03e91d11ad1142a6c7a845781954c329,2024-03-05T17:42:45.630000
CVE-2024-1370,0,0,dc8f3c7ad8fc581551ff3b6afee20c00a9c2d359908d145e82ffa4dd53a816c6,2024-03-13T18:16:18.563000
@ -243670,7 +243671,7 @@ CVE-2024-1467,0,0,658a1988a70c4c2c249e73aff8e81bcb98febc108bfc84a04dfcc277633a65
CVE-2024-1468,0,0,6736dbd3e8f986f2a61b32c16ee1fe7d77d5f3969065edc19564694f74a8dd1c,2024-02-29T13:49:29.390000
CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000
CVE-2024-1470,0,0,954feb69ba8d0981ae24b05afe2cd99dd03e28a9adc0df6bbf32dcb18e2cae18,2024-02-29T13:49:29.390000
CVE-2024-1471,0,0,1e2e5a926ecc5bcb54d6ca4c3f80c573f83e6b4f782fd9e139b3dba630d49b5e,2024-02-15T06:23:39.303000
CVE-2024-1471,0,1,b3e3fd9ad8f5cfb98b02c9d6bced741169ca97c23c127fb5f8acbbaa8cdb3830,2024-11-19T16:05:53.247000
CVE-2024-1472,0,0,43e3213a7fac5988f5375dba8e6f873d7b2f32f63bebde8773195c4d00c61a87,2024-02-29T13:49:29.390000
CVE-2024-1473,0,0,b115ab76e1a21554af0fe82f30b4d6e4829d0a4cae1d3a6bf6221ec5e7521abe,2024-03-20T13:00:16.367000
CVE-2024-1474,0,0,04a26a5a9be86f78a72e8b434bae250f7f09eec589916415d8e90a0a06af86fd,2024-02-22T19:07:27.197000
@ -245267,7 +245268,7 @@ CVE-2024-21283,0,0,0ddbb462ca0821dacd37d3533c526ba14fd88aa793b081385070a77512efd
CVE-2024-21284,0,0,b26beb8928847ddda7596ad1b5456aaf9e461763a25565fb76df745f1499af72,2024-10-18T16:45:58.217000
CVE-2024-21285,0,0,94befa20d99f1e44a7a6e1443028684d2864251495f642087aa70fa909cebf20,2024-10-18T16:46:27.283000
CVE-2024-21286,0,0,165be3dcf0a6405bd236710f2cf171c0d7219a16c20a273c1cdda02d4e5f4acd,2024-10-21T16:16:31.867000
CVE-2024-21287,0,0,c0c228f1b41d08b35e1096b06e55b7c2e1cf9802800b27b583054d70577a0ad7,2024-11-18T22:15:05.897000
CVE-2024-21287,0,1,495a874900a5a5c31155b9956eaadb0baf8bbd7a2bf3ddae25a960bfa10fd0ae,2024-11-19T16:35:10.963000
CVE-2024-2129,0,0,5f52407743c1f969b3fa77917deda7339874ee16ffe5a9c10d3a77b843fb1d95,2024-03-20T13:00:16.367000
CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000
CVE-2024-21302,0,0,7f391d893a5dfcd3f80503750e1f19b379a4e74727dc288c2f0c00e1775f3cc9,2024-09-18T00:15:03.243000
@ -245524,11 +245525,11 @@ CVE-2024-21534,0,0,9ac533dcca689f9e7455af7cbf2332420a35c484bd84c22299ec85a68ccdc
CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000
CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f5b5,2024-11-01T18:03:15.897000
CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000
CVE-2024-21538,0,1,5afe4e6e1afdfc45cdb7e871efdb22a4d29e294c97100d961be6f2afaeab3910,2024-11-19T14:15:17.627000
CVE-2024-21539,0,0,dfd9359e0c564c537268368db999f7713955785d7a4a9df91fee71b6b45e0530,2024-11-19T05:15:16.453000
CVE-2024-21538,0,0,5afe4e6e1afdfc45cdb7e871efdb22a4d29e294c97100d961be6f2afaeab3910,2024-11-19T14:15:17.627000
CVE-2024-21539,0,1,6e973ff02bdbb328246a5c9d86e2da2310b9429f874babc62cf389af92218fe1,2024-11-19T16:35:11.720000
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000
CVE-2024-21541,0,0,373acd5e14ddf4ee5ebb476557660e01f865be6144d1960555899268f402376b,2024-11-13T17:01:16.850000
CVE-2024-21541,0,1,d3f24a0e2c0487bfb682166662f1d43caa2aa65e691edaab80c8e424809bc2c0,2024-11-19T16:20:37.887000
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
CVE-2024-21550,0,0,0a53a3a179cb6ecaf9ed04811bdf34ec295d6a8521b7681bf2ba3945e955d773,2024-08-13T17:33:13.537000
@ -247074,7 +247075,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
CVE-2024-23715,0,1,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000
CVE-2024-23715,0,0,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
@ -252499,7 +252500,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b
CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000
CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
CVE-2024-31141,0,0,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000
CVE-2024-31141,0,1,f4d8cb347af72e170cf1c8a4ea5301ad80d39e377be2406a234c38a203f3a7e1,2024-11-19T15:35:06.263000
CVE-2024-31142,0,0,79f9844398996d5cb9999387049c1b1a171c758196287f587729d5ce656d252f,2024-05-16T15:44:44.683000
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000
@ -254093,7 +254094,7 @@ CVE-2024-33226,0,0,118644c9a4526f22ebac7f7b4738b46fc0e07956b270365957b518f88d5f0
CVE-2024-33227,0,0,7642d7b0dea4438aa6cf20447aa6ccfb5a37e8289abc2e50d39a48026159e609,2024-08-21T21:35:06.933000
CVE-2024-33228,0,0,85cdbd71550aee88b5f9d8549e2c2f09f274676ddc09487eba7cc0a4fad357e8,2024-08-15T15:35:10.277000
CVE-2024-3323,0,0,35a6027c28bfec2d03f21e8dc2fb44053ba20d6734735309aeaba44e533a0061,2024-07-03T02:06:09.693000
CVE-2024-33231,0,0,74936ae5cbba0f7bb9fdc05b3207e557a61870571e9bb2181297c5960d574f1b,2024-11-18T23:15:04.783000
CVE-2024-33231,0,1,3e19f3c1f5ccfc7d8e08ced5ac486f06149ce606b1fd2134075163429cca987e,2024-11-19T15:35:06.980000
CVE-2024-33247,0,0,40a5fef5b7dc3488c3170d87b3d0b3fdeccf50a4efd249dd8f1c8814c02594a3,2024-04-25T13:18:02.660000
CVE-2024-3325,0,0,eba92195eac782e585c88625ca97b48ddac98c797259bb726a1fc19af0b8d9a8,2024-07-12T16:11:57.460000
CVE-2024-33250,0,0,b9c4a2bf1fe2b649998281997c3158803cce2200d868ae2afbc03c684a35b009,2024-11-07T00:35:02.163000
@ -262014,7 +262015,7 @@ CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd
CVE-2024-44203,0,0,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000
CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000
CVE-2024-44205,0,0,89e79a6b18bf86e5c6fe07ffb754b6a30f0a4b722301be4dfe77863fc3ec3818,2024-11-05T22:35:09.383000
CVE-2024-44206,0,1,decc7a643b8a2098ec3c807c883f42411d858ab45b0846bdf8377857f89c0036,2024-11-19T13:47:18.787000
CVE-2024-44206,0,0,decc7a643b8a2098ec3c807c883f42411d858ab45b0846bdf8377857f89c0036,2024-11-19T13:47:18.787000
CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000
CVE-2024-44208,0,0,4d7aa9405d343d17597bfad70ff83a926fbd31054b5ebc02d6d462dcb9f00027,2024-10-30T19:35:18.340000
CVE-2024-44213,0,0,c6cff758bc03ecbfd99946547b6f803038e23fd3515589348ba94d44f5467231,2024-10-30T19:35:19.187000
@ -263670,7 +263671,7 @@ CVE-2024-47195,0,0,13778db546c78cfe27d2d127a511510e1d599b625eb31f21fc4e65992e212
CVE-2024-47196,0,0,854c9d23e22c82e5339f8a331c929fb519fa43506b02445ee87a1d94228daed1,2024-10-16T18:07:38.850000
CVE-2024-47197,0,0,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000
CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000
CVE-2024-47208,0,0,6115ccff310bcba51176654c87cc93aecc95cc99df2dad8188699f844a319269,2024-11-18T17:11:17.393000
CVE-2024-47208,0,1,238739b0baf2019e9540adcd5c9e66ecdc3f88b8bf18ae31375334ae76ed08a1,2024-11-19T15:35:09.570000
CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000
CVE-2024-47210,0,0,ca2b900fbd9eb194b293e1ce40d6ad1fe1c427789838eaeabb19878edb5f2c77,2024-09-26T13:32:55.343000
CVE-2024-47211,0,0,8d8dc13d8cf35ee447487a09511da084431dcb4b69bd4c3291b15cb655fdb03c,2024-11-05T15:35:15.623000
@ -264397,13 +264398,13 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737
CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
CVE-2024-48284,0,0,29099906f5c76c6be09cef9255b3f47720bedd738e3cd24d7ed7b7e95c71290e,2024-11-18T18:35:04.410000
CVE-2024-48284,0,1,eb90b699830934fa3cc834b15ddaff775406850c427104902573172c28bf14d3,2024-11-19T15:45:55.450000
CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
CVE-2024-48290,0,0,470dc7a365392aceea819604e300f16b964336068e4f6e607d709f5104e50d51,2024-11-08T19:01:03.880000
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
CVE-2024-48292,0,0,b0f0239355fa7645e28a857f954af51b7bf5af0d20814dc645fc7b82b5bda8b3,2024-11-18T18:15:06.260000
CVE-2024-48293,0,0,74e42b008410124f0453f495b5d537d12a54a6ef1d7274cafa40741115b46903,2024-11-18T19:15:05.527000
CVE-2024-48294,0,0,7a854c0c79778776536a1b38066dfb92c85f53c2135daf9b309d24aeeb7cf905,2024-11-18T19:15:05.590000
CVE-2024-48292,0,1,b81f051a972c777da6c01c45fe7e4e372d7f47ed85b06eedb92e94a07c9bf55f,2024-11-19T16:35:12.460000
CVE-2024-48293,0,1,346c636f987845d9516b3d14e1a953ad2277f0a1722cc8f5062479fd89b916b0,2024-11-19T16:35:13.320000
CVE-2024-48294,0,1,5d5e8f6cd5e80a4a61594965b71f34da203e325db6ddafd7a22b353bb9740057,2024-11-19T16:35:14.130000
CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000
CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000
CVE-2024-48312,0,0,ed565171c6e4291e871155bd5278a308c07670573cfb5e604423e67b93f19726,2024-11-06T18:17:17.287000
@ -264593,7 +264594,7 @@ CVE-2024-48878,0,0,2b15f82c5be65c88d261c3882a75397babc580305d6a252ad1dbf2de5b500
CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000
CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
CVE-2024-48896,0,0,b992316378dc674c4f86c74292b7b1938dedf579a456c4b81377a2d803cc86e3,2024-11-18T17:11:17.393000
CVE-2024-48897,0,0,cccb8709bd8247a505b1b9368cdd4af0954cf5613e56c1df64987273881b9b0a,2024-11-18T17:11:17.393000
CVE-2024-48897,0,1,fb7520e1e59589ecdc201007a2560e0bbe0080044e959003906b061ba053cf71,2024-11-19T15:35:09.867000
CVE-2024-48898,0,0,8529d519dd40a302fbe6ba08ef52420551e621ec79dd55c48ad2c7b84db09711,2024-11-18T17:11:17.393000
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
CVE-2024-48900,0,0,2b3a5e56342c363922328f10e6f3d06b5c266c3768636276b8919e3a3cee88b7,2024-11-13T17:01:16.850000
@ -264643,7 +264644,7 @@ CVE-2024-48955,0,0,84de7be29efb285e46fc24626f552063b1e23de7f9dbbe9943b534f430e23
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
CVE-2024-48962,0,0,712463568a779c1852b0a7b8be627039bb608e56bf81f6056000f8ffe081852d,2024-11-18T17:11:17.393000
CVE-2024-48962,0,1,14108fb7b73c0b556a184000052b7efc5bcd8ed17ac4fdb955d4d3bd57456592,2024-11-19T16:35:14.930000
CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000
CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000
CVE-2024-48966,0,0,6ce21af485b8f7bde854dc6fa73e4754262c2c902a98462d651b3be5a8dc03bb,2024-11-15T13:58:08.913000
@ -265465,17 +265466,17 @@ CVE-2024-50197,0,0,59a6be3df417d3a3c55a1bbb45af16915fd95dff36c9159ced00351e34496
CVE-2024-50198,0,0,3ea33cdf4ab9bb3fd3852a87897dffcacdce0ff880fdd50c45b48b25cf5b6305,2024-11-08T19:01:03.880000
CVE-2024-50199,0,0,790411aeb1eb3c29f71ef981d65498f2cd8c66850ab6f2c0880f47cb2a5c0da3,2024-11-08T19:01:03.880000
CVE-2024-50200,0,0,39818810e6a92ba66da874110ced722f11de013303f8d602e577eeb9e4e93e06,2024-11-08T19:01:03.880000
CVE-2024-50201,0,0,a9f1641fd144b1eba4040a801650258c325a92766a46c37f6972674a475d8514,2024-11-08T19:01:03.880000
CVE-2024-50202,0,0,7ee70c313547ab57bdd1503c7bdb05d1942bd0b441ebd441e63c63ab1d367f12,2024-11-08T19:01:03.880000
CVE-2024-50203,0,0,735c368a5bdd4ec913da0ec904c57517561ff23f14dfe5d0723f80de73e64d00,2024-11-08T19:01:03.880000
CVE-2024-50204,0,0,8ef878f204e8455b525410988e0b4871dee273e6be8c26873a73200c3320a435,2024-11-08T19:01:03.880000
CVE-2024-50201,0,1,09a1d2ed13abd2226e3074bd37eb9876228c60757af6992d6779c0487fabffe2,2024-11-19T16:08:36.890000
CVE-2024-50202,0,1,e310c41388d08879a2605fc86ca05cc293de9a409d6751330b377d2eccd78f94,2024-11-19T16:12:17.660000
CVE-2024-50203,0,1,2f91b4b2894ee3a89f4c5832ea8c3d90b950bfef9019d1f438ff9efd649bfc10,2024-11-19T16:16:09.207000
CVE-2024-50204,0,1,b2cb43281767397b3de0b3d55362f25f2a11c5d3b5f521d4589b19526f194043,2024-11-19T16:17:04.663000
CVE-2024-50205,0,0,a84e65dd24aa4797775474afc89933e7c6eb36aa2d99c42218f91074baf7cf00,2024-11-13T17:00:32.007000
CVE-2024-50206,0,0,fcc19a4fffbe5034be4ad713517887336a2e1957714f25908ee29435848d166c,2024-11-13T16:56:25.937000
CVE-2024-50207,0,0,893753a178b77364e97b5eecfb63ffa7b2e959169d9b0e14404fe7a60d85d8bf,2024-11-08T19:01:03.880000
CVE-2024-50208,0,0,f1e50c72fc138e7d85b5992c0354f8f2105f49615411e882090d07c45089dd20,2024-11-08T19:01:03.880000
CVE-2024-50207,0,1,ea65c3ac01cc2a6ae488dc95325391f4feba715303d472ed76a5eb1e984a9c26,2024-11-19T16:18:57.473000
CVE-2024-50208,0,1,aa2c754b216c301a16dd1b02b41ab3f96c7167f562327e4d2aa799b6afbd68ca,2024-11-19T16:23:48.507000
CVE-2024-50209,0,0,6f9fdecd174340ce3aff1a66396f0a6c7eafb8a225926b46627731165dbf5bf8,2024-11-18T19:44:46.863000
CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000
CVE-2024-50210,0,0,4bee68a419d5fe89f5fc6d87111cb6b0e7000f7ba8b30899a8483d5dbab39927,2024-11-08T19:01:03.880000
CVE-2024-50210,0,1,e89b8f73a45b5aecd785289d9a57b6a04641efc14db721c7908c0d3c0e99da00,2024-11-19T16:26:34.767000
CVE-2024-50211,0,0,43cec65618b913fe30d755b5206c50e632a5959377286e96ecfc817df8ba51bf,2024-11-18T19:04:51.793000
CVE-2024-50212,0,0,befc3c4f2399c98b74eaa8ec2965db6d6768d3d3be42bd748e5e2378cdaa8f99,2024-11-12T13:56:24.513000
CVE-2024-50213,0,0,d7da9f888c34c1dd4195bd9776c301a02d7788da5c1b9af054d3c0af657523bd,2024-11-13T17:01:12.827000
@ -265830,7 +265831,8 @@ CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b2
CVE-2024-50800,0,0,41d08e703d2d0d1bc76e1244af52877536c0238af8df7745121db1f62bee0ba9,2024-11-18T17:11:56.587000
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
CVE-2024-50804,0,0,5cb9a04c08194ca4737e9d5b63684459f53a546896bac23b3da676ada88515d5,2024-11-18T21:15:06.220000
CVE-2024-50803,1,1,982479384cb990091ac96847a620da8db7bc088fe4c8588b46eea36a404d9a77,2024-11-19T16:15:19.840000
CVE-2024-50804,0,1,0d95f876af31515d3a13ada7121872d2819952d101c0913f9f7aeed82f96ed9c,2024-11-19T16:35:15.173000
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
CVE-2024-50809,0,0,c875db6c22acfe1e061d0cebbfeb9f3b7b26f693a5f07b91a9c5ce4621ac2b6f,2024-11-18T14:35:04.110000
CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000
@ -265860,8 +265862,8 @@ CVE-2024-50840,0,0,601608d1ca95a74cd56c0dd2a1a4b49ba28181e146695e4569128379dc5e5
CVE-2024-50841,0,0,024c85eb651d2b498ef517f63a06a689ce4d3e3c9e9daff3a7c4a6f00269c068,2024-11-15T13:58:08.913000
CVE-2024-50842,0,0,cd0c52715782c1f793f61b49abf65f7f712f1badfd90077c866b2e48024a0004,2024-11-15T13:58:08.913000
CVE-2024-50843,0,0,4477435381e6083c9119592b1603e3c4197eb68378d57b4a3fc0ce6a1344e25c,2024-11-15T13:58:08.913000
CVE-2024-50848,0,0,cdca62d1bdb7d252106654ce55fe15fc98b6360649128ac4e8c6c214d7794470,2024-11-18T21:15:06.293000
CVE-2024-50849,0,0,46adb909fec368fe6518477a5be24c435c71753b8ee0d41ea114b8eb3ba63618,2024-11-18T21:15:06.360000
CVE-2024-50848,0,1,19ec8f5e8c7dbe3e796e9d3d2c4dc4800acbe8e0c94a0cab7e7897c4417ffb41,2024-11-19T15:35:10.213000
CVE-2024-50849,0,1,9b3cfaab3d69cfc6e55e1bec049d0d4a544e4304cffe78b92b28cf4556499b58,2024-11-19T15:35:11.063000
CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000
CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000
CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000
@ -265872,7 +265874,7 @@ CVE-2024-5088,0,0,cba5e9039c2295e22c8cb155a75af3aef347c6e9813c2bf0c73f71f25ef001
CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000
CVE-2024-5090,0,0,be816c3666262b2758beb88ae86bd9e45d3334ddca99a5e32c28feea44799dd8,2024-06-11T13:54:12.057000
CVE-2024-5091,0,0,ebfc63df063962b42c546da9b063b838d4cc3405e8f86d8f0f4a8a37b0ebeb5c,2024-07-03T02:08:29.633000
CVE-2024-50919,0,0,fb72b94bf12dfa0a5e9ec266485d1c6c4092454d259a46d11777d137791b9425,2024-11-18T20:15:05.650000
CVE-2024-50919,0,1,50637c783efd924faf08bea180b2e2fd1ec2ca8009854c12e60923948fef2704,2024-11-19T16:35:15.973000
CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133d2,2024-05-22T12:46:53.887000
CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000
CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000
@ -265938,8 +265940,8 @@ CVE-2024-51032,0,0,8ef48ff90dee211a4695fed712dc76f07ccf41b216d3f511e2ee570e4fc12
CVE-2024-51037,0,0,2070f9754baeb5ebfb5ce762d110636e28a0455b141fa07f8e034775af971022,2024-11-18T19:35:06.770000
CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000
CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000
CVE-2024-51051,0,0,2acbd7048e8deeab8f5456c0aa84878fe5d8f54a6f2b4cf23776968ace363cfc,2024-11-18T22:15:06.190000
CVE-2024-51053,0,0,4998296858b2c73e738f922860d5401512988c3d54346fc1701c74d303692944,2024-11-18T21:15:06.423000
CVE-2024-51051,0,1,3b5ddbf513ad177e6a1e31eba4793dd830b729815bcafe0918a06bbdf61ad6a0,2024-11-19T15:35:11.920000
CVE-2024-51053,0,1,3da7e1ecf8978ae0d940fd81cf8283d794f909ff9c96e632fd7847abfccb530f,2024-11-19T15:35:12.750000
CVE-2024-51054,0,0,5f7e39a7aaba6174905b6372920760418cc96f41e26463faa8167a7c26d82367,2024-11-12T20:35:17.823000
CVE-2024-51055,0,0,01ccd52478b3519c5dabbf4568ac988a576ee058f14d536ab175a95478255e40,2024-11-13T16:35:25.810000
CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000
@ -266271,7 +266273,7 @@ CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df
CVE-2024-51736,0,0,51a90df0a63a59dfcfd7064d61bc8f9e655fb6163871684916ac6a876bcb19b0,2024-11-08T19:01:25.633000
CVE-2024-51739,0,0,4d0d8cd202212f5e2caa967ce03eee4a69352aa3ef71ff626fc2224d73faea32,2024-11-08T15:56:18.753000
CVE-2024-51740,0,0,74dcd62c794431349724c21a2a10e6fc9dfce3314bc46b9aad9df5d89f4c0431,2024-11-08T21:09:45.387000
CVE-2024-51743,0,0,cbe9702440bd519d8dc940900dd308598da2792d920432c1716af89e24097f08,2024-11-18T20:15:05.900000
CVE-2024-51743,0,1,5d5698db10bc042f3c0a1fd5c86a738299a2e529ddee5d5fef26c01859fbec0e,2024-11-19T15:35:13.590000
CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000
CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000
CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000
@ -266286,7 +266288,7 @@ CVE-2024-51754,0,0,7bb02b0dadfa6351503359aa64d9360522f7dd1d2e17f399adc659a202b69
CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882a03,2024-11-08T19:01:25.633000
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000
CVE-2024-51758,0,1,cea74a57b3a5b78703ebb8f80aace1e82108cebb51552a8b14adb1167ed76c66,2024-11-19T14:15:17.763000
CVE-2024-51758,0,0,cea74a57b3a5b78703ebb8f80aace1e82108cebb51552a8b14adb1167ed76c66,2024-11-19T14:15:17.763000
CVE-2024-51759,0,0,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000
@ -266403,7 +266405,7 @@ CVE-2024-5223,0,0,e1518fa1e9fb0970a33863c1b1a7313f3247c5958916de9a4b07f2b8f6f2eb
CVE-2024-5224,0,0,db9f297ce85558665780a2b5ea4fe3a1e31ac4d111566a8ba052aeb7472c35ff,2024-07-23T21:04:43.353000
CVE-2024-5225,0,0,908db7200208aad82f301f521b9dc90a90551560079e967278f95345fdc58383,2024-09-23T19:46:53.890000
CVE-2024-5226,0,0,343bea1ef6104d1a60d532c3087e707033a7d2cea2eb006f3e8cf7d609df1199,2024-08-08T13:04:18.753000
CVE-2024-52268,0,0,bc43f19fc7b3b42ba395f6b1a7bb785132d4ad8472f3a9942e43bec4123149a9,2024-11-13T17:01:16.850000
CVE-2024-52268,0,1,ea9ce8fc39b5cc2a56555dd9c667efdad9c8d1fb9ef5135ccde9e9b88f547032,2024-11-19T15:57:03.780000
CVE-2024-5227,0,0,782d407fd59442ae1cd49577c63d7b8236dddc237a48b5fa6a3df2e3ceec540d,2024-05-24T01:15:30.977000
CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad837,2024-05-24T01:15:30.977000
CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000
@ -266421,10 +266423,10 @@ CVE-2024-5230,0,0,f45c8274ba28e0dc58bed98870ed092580a9c18662584e7c3debbd7f7cd359
CVE-2024-52300,0,0,79b0d837d6ed018cc1d7f4872a1b8952ec440441022015378fe0f1720fe4ce32,2024-11-18T17:29:46.807000
CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc3311911d8,2024-11-13T17:01:16.850000
CVE-2024-52302,0,0,07877ae667924fcd5dc6349e2bbc5755286c2a37cd731fe353996ab7a3354ec7,2024-11-15T13:58:08.913000
CVE-2024-52303,0,0,a3b0bb85d61ed52facf7d9ec6d0faa9daea276746378ac606ca25c8d8d86c27e,2024-11-18T20:15:06.047000
CVE-2024-52304,0,0,d25bca6cb267afee52d89be999b15b8d6e7c5b072457bbba9097b2e08266db1c,2024-11-18T21:15:06.500000
CVE-2024-52303,0,1,2626067843e172810fba2e6863a84bbf77398797810b56cbdeeae8c75ec48467,2024-11-19T15:35:13.847000
CVE-2024-52304,0,1,ebf98891a9386cb1c3454a1a391e278d89de340cdd87aa50fe084ed8e755b876,2024-11-19T16:35:16.793000
CVE-2024-52305,0,0,88b149b5f0a3a8070aa2ae381ffe02a88504a00370b84c79cfb2b490d2da2492,2024-11-13T19:15:08.853000
CVE-2024-52306,0,0,1b9ce4c56d7ceae407f1508bb897699dd90021aca31b5ca63511c2afa50e85a1,2024-11-13T17:01:16.850000
CVE-2024-52306,0,1,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000
CVE-2024-52308,0,0,68dbd5663bc1fce9463187e86de0183ed1b47f7db3824a2242b39ee69302613a,2024-11-15T13:58:08.913000
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
@ -266532,7 +266534,7 @@ CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee6603
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000
CVE-2024-52506,0,0,84cdde2b84e04ac6ad03785684c00e2ad7ff6808941bbb26dfc03f89e5ad625e,2024-11-18T21:15:06.633000
CVE-2024-52506,0,1,1f1798b23ff6d9188de62387a8dacf2eb2588af451024836f7f12c174165bc70,2024-11-19T16:35:17.897000
CVE-2024-52507,0,0,18377407544f5a86346c3ba14b439e11d26f6fdcec177783785d2e2abbc40b48,2024-11-18T17:11:56.587000
CVE-2024-52508,0,0,fa3075ebe1eb0237a457fbaec2942230ebf45f577a1b7c74400d5371749c8a2d,2024-11-18T17:11:56.587000
CVE-2024-52509,0,0,70a256c5b98dc4a98287533c2f4556bc0a54b2011fdde26406b866d5725d4987,2024-11-18T17:11:56.587000
@ -266583,10 +266585,11 @@ CVE-2024-52572,0,0,ebb7d32af991ea946ce7b08397e09643d24f4d57c60b8d5741c60f1a71b90
CVE-2024-52573,0,0,cce17e8c7eac72f4f0bd4de019ed716652f5c5bc2155e2ccd9cbdc8c71188bd0,2024-11-18T17:11:17.393000
CVE-2024-52574,0,0,f9f905d7d81dd0480b5a16770f5f6f4db17a72ca814858644fca40063e1c8a42,2024-11-18T17:11:17.393000
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
CVE-2024-52582,1,1,978d5539534d9accb3a2088797ab35afeadf6cc002801a01ce1e2705a709493b,2024-11-19T16:15:20.207000
CVE-2024-52583,0,0,3f74b228ab64088216191bfcab227a1a2ea6855c6a93b9a484f9332b231d47f4,2024-11-18T21:15:06.810000
CVE-2024-52584,0,0,d2b7950e5cd1ed8945feddf6cf51c8abf30da2c40a1a73fd6ae66bd7da83b57b,2024-11-18T21:15:07.047000
CVE-2024-52585,0,0,69a1fca89c1d0eb429ab56c8a4d32afbcc612ce9cc5c2249b1896c5a16b5f7dd,2024-11-18T21:15:07.183000
CVE-2024-52587,0,0,f2a2f41cb4d8f27ae863025f28f49edcc4abfbe7242c2d4d882b27237626995d,2024-11-18T22:15:09.557000
CVE-2024-52584,0,1,23a26c97848e4c401f63f6b5b612d4f27d57ad71dbf8b810d2f44645b1279cee,2024-11-19T16:35:18.180000
CVE-2024-52585,0,1,c99253a3594402b71c7620d674ac85d650f754e205581c2ecef2a30b146e8e0b,2024-11-19T16:35:18.380000
CVE-2024-52587,0,1,b753c478eb1e07f984a98bf0ed57f7cd4222c704b268dc10ece20d391056a018,2024-11-19T15:35:15.427000
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
@ -266597,12 +266600,12 @@ CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b2976
CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000
CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000
CVE-2024-5267,0,0,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000
CVE-2024-52675,1,1,2b3759886469230e81e4630134f8a90022497ce2cdfd34c020e9b1c3fe70eda4,2024-11-19T13:15:04.700000
CVE-2024-52675,0,0,2b3759886469230e81e4630134f8a90022497ce2cdfd34c020e9b1c3fe70eda4,2024-11-19T13:15:04.700000
CVE-2024-5268,0,0,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000
CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
CVE-2024-52711,1,1,ec17aaf4daa36a3b4840ae9c2e59c39b0dfdc1e3f4c268a568196421c142ac48,2024-11-19T14:15:18.207000
CVE-2024-52711,0,0,ec17aaf4daa36a3b4840ae9c2e59c39b0dfdc1e3f4c268a568196421c142ac48,2024-11-19T14:15:18.207000
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
@ -266618,7 +266621,7 @@ CVE-2024-5283,0,0,b38d3b6d84c245f47c02c6b1221c64126cc1590c1b6b303a3d39721ab1dfca
CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7e5,2024-08-01T13:59:43.927000
CVE-2024-5285,0,0,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a648f,2024-08-01T13:59:44.103000
CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000
CVE-2024-52867,0,0,0b0882acd5de52cdfd31646d879cc4d64802f76ec8f0a66bcd2a8d5bda665151,2024-11-18T17:11:17.393000
CVE-2024-52867,0,1,6bac765312da56bf51c82cb7e47db1a297720d6556228f4058b497d0cb4d9042,2024-11-19T16:35:18.583000
CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000
CVE-2024-52871,0,0,fbb45245ca19e2c77e29db135af4fe37412081323f711d5753aa0acf28d33d5d,2024-11-18T18:35:09.027000
CVE-2024-52872,0,0,d563b0c61f4165e3ef70090846ba3ce24408d217ad938562d8cab8356c89722b,2024-11-18T18:35:09.270000
@ -266646,8 +266649,8 @@ CVE-2024-52940,0,0,4899ba7a4b0253bf6736cdb115d3b83a6d38ef8f644ea7c3b0ceff9826e83
CVE-2024-52941,0,0,994a90a347299304b8eae5625a81e79879ba1642baaa7bb0fd2515230fec7b46,2024-11-18T17:11:17.393000
CVE-2024-52942,0,0,2d71991d3f620c8d414abd7959e93219f8ba421f1204035494c4ef43cfc04a08,2024-11-18T17:11:17.393000
CVE-2024-52943,0,0,1b61c110823c3190af49de4fecc893fde6501d47c2afacf8e23cc10dc5b35773,2024-11-18T17:11:17.393000
CVE-2024-52944,0,0,ef607cc6d31e32417624ea6ea83186d7e60f5493f4efdfbaafbb44b80ae9aabe,2024-11-18T17:11:17.393000
CVE-2024-52945,0,0,245fda9a6f281ef2fc6d1964888db2508fd69b063898a2bbffc6d6c19d7ff415,2024-11-18T17:11:17.393000
CVE-2024-52944,0,1,891b166dc630c154b3b088f9607ee62ecd73eada6f254a4630122c61f4fa3591,2024-11-19T16:35:19.310000
CVE-2024-52945,0,1,63027697b61e71930738cff69e21a659b1ff06f97d852d7c9fcc49bfd776881d,2024-11-19T16:35:20.020000
CVE-2024-52946,0,0,ef4806982226269ca873cfccc34dff633254ace5ad4fa6e29d31cbf5dd0c16de,2024-11-18T17:11:17.393000
CVE-2024-52947,0,0,032f06f1ece995cd81c8fde69d4726dfc9340376c69a3aad6534cd5f5b5e3ade,2024-11-18T18:35:09.517000
CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000
@ -268954,7 +268957,7 @@ CVE-2024-7993,0,0,f5d8ce4e740e416affd8e0aa81b49c04864f17ee770befacf4a96c4d998858
CVE-2024-7994,0,0,5869f45b11df8c023b86ee171f284a639849bded2dfdba799d5d6a2b878c2a64,2024-10-21T18:35:55.397000
CVE-2024-7995,0,0,9b722cec7fe5ddfbfa2ed97d7d4fe0f5947f1a72064ec24ff3d88276777efbc5,2024-11-06T18:17:17.287000
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
CVE-2024-8001,0,0,48cc38c0b32ef1bad6a49e2d1565da4e291140d61179cde5d8642db4a28d5257,2024-11-13T17:01:16.850000
CVE-2024-8001,0,1,806349a97813103cc3e8eb86d0f86a64cc01077a115d397b4a475acb9a23d258,2024-11-19T15:41:25.973000
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
@ -269711,7 +269714,7 @@ CVE-2024-9050,0,0,78b9638634d0ff28e0659c218fd386df1d4e4f7c5c88d6469370350eb2679b
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
CVE-2024-9059,0,0,3bf1e313ffb5fa569199e5ef4c73b4067e7879bf62d303bf4aa5a8a83e0558c4,2024-11-13T17:01:16.850000
CVE-2024-9059,0,1,4d4eca66fdabff300ba12a6c3aa840e717659fd399e0c46eca6a0c562dee781c,2024-11-19T15:53:56.680000
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
CVE-2024-9061,0,0,68964a8d24a934fad1df20bd8f6d5ba6a330caf51ca0e0445a293becf4ee4892,2024-10-30T21:11:17.450000
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
@ -269946,7 +269949,7 @@ CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b
CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000
CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000
CVE-2024-9407,0,0,97b0f3234f51cc30c3a97226cb930f5fbbe39fd25f9f23131a758552af9f8ee9,2024-11-12T18:15:48.057000
CVE-2024-9409,0,0,bd26a6d58a7fb40d2ba0ec55a264bb1d6254e13220d49c2ad9283b1761c05cc3,2024-11-13T17:01:16.850000
CVE-2024-9409,0,1,3e506ee5c668e864fe32d06ea4b7a74953a7f1e2f6b3e039755ec706eb3daca9,2024-11-19T15:59:21.690000
CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000
CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000
CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000
@ -270114,7 +270117,7 @@ CVE-2024-9655,0,0,5f64b0ed215cc4c47eaa212ce6a6578c092759946c6128b0f32509f44691e3
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
CVE-2024-9657,0,0,fb687953042b10eb922558cb840c65de9e3c4da22e7016c1d2e6ab79c6132615,2024-11-08T16:00:28.320000
CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff13d,2024-11-08T15:27:25.697000
CVE-2024-9668,0,0,a2b64111ed3fcb39da017ed8dd6ee17b6527527483477a555ba970e89525e620,2024-11-13T17:01:16.850000
CVE-2024-9668,0,1,f818a6b8cdaa67cfd4295b3c202a4554201abb8c6b4c20c52c4343e3261d3200,2024-11-19T15:55:00.840000
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
@ -270123,7 +270126,7 @@ CVE-2024-9676,0,0,1897b84483cd6c89b04e83ecacec899f569bb352f44e2b4ce92e396a9b4e4b
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
CVE-2024-9680,0,0,1340ffd522c0f98d94e438210e293691db5000f0c9358d314e16255a4e3643c8,2024-11-18T19:15:05.853000
CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000
CVE-2024-9682,0,0,75407b3c90c4cc5de15f8d94b112a96c95f23c932b7e7d251fb761382ea8f8af,2024-11-13T17:01:16.850000
CVE-2024-9682,0,1,2122d85927443e1998d90f1dfaf0e30f87a59df9f9140f4f34d3cb7460150d67,2024-11-19T15:47:07.517000
CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f185407,2024-10-18T12:52:33.507000
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
@ -270141,7 +270144,7 @@ CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da64
CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000
CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000
CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000
CVE-2024-9777,1,1,19b139ad7dcd6fccfeb635876a4cf8731bb5d59162a8950e9feb0f7c70c4529b,2024-11-19T13:15:04.850000
CVE-2024-9777,0,0,19b139ad7dcd6fccfeb635876a4cf8731bb5d59162a8950e9feb0f7c70c4529b,2024-11-19T13:15:04.850000
CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000
CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000
CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000
@ -270187,7 +270190,7 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379
CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000
CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000
CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
CVE-2024-9830,1,1,c466e8da0db30e41d5f5f4af952931114240163fd91e6216b7b894fd7be529e6,2024-11-19T13:15:05.107000
CVE-2024-9830,0,0,c466e8da0db30e41d5f5f4af952931114240163fd91e6216b7b894fd7be529e6,2024-11-19T13:15:05.107000
CVE-2024-9832,0,0,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000
CVE-2024-9834,0,0,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000
CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000

Can't render this file because it is too large.