diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47142.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47142.json index 2c4fe80660e..4d17e96ca24 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47142.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47142.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47142", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-25T09:15:08.843", - "lastModified": "2024-11-21T06:35:28.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T14:56:12.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,224 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: se soluciona un problema de use-after-free que parece que nos olvidamos de configurar ttm->sg en NULL. Se produce p\u00e1nico a continuaci\u00f3n [1235.844104] falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0x6b6b6b6b6b6b7b4b: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI [1235.989074] Seguimiento de llamadas: [1235.991751] sg_free_table+0x17/0x20 [ 123 5.995667] amdgpu_ttm_backend_unbind.cold+0x4d/0xf7 [amdgpu] [ 1236.002288] amdgpu_ttm_backend_destroy+0x29/0x130 [amdgpu] [ 1236.008464] ttm_tt_destroy+0x1e/0x30 [ttm] [ 1236.013066] ttm_bo_cleanup_memtype_use+0x51/0xa 0 [ttm] [ 1236.018783] ttm_bo_release+0x262/0xa50 [ttm] [ 1236.023547] ttm_bo_put+0x82/0xd0 [ttm] [ 1236.027766] amdgpu_bo_unref+0x26/0x50 [amdgpu] [ 1236.032809] amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x7aa/0xd90 [amdgpu] [ 123 6.040400] kfd_ioctl_alloc_memory_of_gpu+0xe2/0x330 [amdgpu] [ 1236.046912] kfd_ioctl+0x463/0x690 [ amdgpu]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.271", + "matchCriteriaId": "3B637FF8-3372-4BEA-89EE-EC94A37C4E6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9.0", + "versionEndExcluding": "4.9.271", + "matchCriteriaId": "C01BF34A-CD21-4B2F-9877-C89B8202B09A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.0", + "versionEndExcluding": "4.14.235", + "matchCriteriaId": "EB08F414-2E2A-4A3A-B0F9-34971290361E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.0", + "versionEndExcluding": "4.19.193", + "matchCriteriaId": "3D9A274D-8292-4470-A4BC-05F346C5C26B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.0", + "versionEndExcluding": "5.4.124", + "matchCriteriaId": "F717E3E3-B420-411F-AECC-2D26A9F33F0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.0", + "versionEndExcluding": "5.10.42", + "matchCriteriaId": "18765089-FB00-4E06-82C2-69FE64CAB42D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12.0", + "versionEndExcluding": "5.12.9", + "matchCriteriaId": "B1F28E29-3C08-49BB-BCE1-C601F43C091D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0707c3fea8102d211631ba515ef2159707561b0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e5c37385097c35911b0f8a0c67ffd10ee1af9a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3293cf3513d69f00c14d43e2020826d45ea0e46a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7398c2aab4da960761ec182d04d6d5abbb4a226e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/952ab3f9f48eb0e8050596d41951cf516be6b122", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a849e218556f932576c0fb1c5a88714b61709a17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4ea141fd4b40636a8326df5a377d9c5cf9b3faa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f98cdf084405333ee2f5be548a91b2d168e49276", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0707c3fea8102d211631ba515ef2159707561b0d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e5c37385097c35911b0f8a0c67ffd10ee1af9a2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3293cf3513d69f00c14d43e2020826d45ea0e46a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7398c2aab4da960761ec182d04d6d5abbb4a226e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/952ab3f9f48eb0e8050596d41951cf516be6b122", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a849e218556f932576c0fb1c5a88714b61709a17", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4ea141fd4b40636a8326df5a377d9c5cf9b3faa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f98cdf084405333ee2f5be548a91b2d168e49276", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json index 1c3fb259025..21cc7fa9b32 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47144.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47144", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-25T09:15:08.950", - "lastModified": "2024-11-21T06:35:29.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T14:49:22.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,161 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/amdgpu: corrige la fuga de refcount [Por qu\u00e9] el objeto gema rfb->base.obj[0] se obtiene seg\u00fan num_planes en amdgpufb_create, pero no se coloca seg\u00fan num_planes en amdgpufb_create num_planes [C\u00f3mo] poner rfb->base.obj[0] en amdgpu_fbdev_destroy seg\u00fan num_planes" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.193", + "matchCriteriaId": "A3FDF344-70E4-41FE-8424-F05D70B8DC0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.0", + "versionEndExcluding": "5.4.124", + "matchCriteriaId": "F717E3E3-B420-411F-AECC-2D26A9F33F0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.0", + "versionEndExcluding": "5.10.42", + "matchCriteriaId": "18765089-FB00-4E06-82C2-69FE64CAB42D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12.0", + "versionEndExcluding": "5.12.9", + "matchCriteriaId": "B1F28E29-3C08-49BB-BCE1-C601F43C091D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1298.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1298.json index 4bb5f79dad8..21e72164bae 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1298.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1298.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1298", "sourceIdentifier": "psirt@servicenow.com", "published": "2023-07-06T18:15:10.497", - "lastModified": "2024-11-21T07:38:52.160", + "lastModified": "2024-12-17T13:58:11.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -351,8 +351,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch1:*:*:*:*:*:*", - "matchCriteriaId": "A2D3CBD5-6241-4DA1-9D98-FA6076ACD696" + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*", + "matchCriteriaId": "DB5CA109-5DC1-4952-AC15-69FAC332BCA2" } ] } diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json new file mode 100644 index 00000000000..24ffd646038 --- /dev/null +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10356.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-10356", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-17T13:15:17.520", + "lastModified": "2024-12-17T13:15:17.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ElementsReady Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.4.8 in inc/Widgets/accordion/output/content.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3204333/element-ready-lite", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0a48c91-7e2c-4708-b5af-dfbcfea08f83?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43713.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43713.json index b75b6ba8057..8bdb8740646 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43713.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43713.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43713", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.017", - "lastModified": "2024-12-10T22:15:06.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:55:13.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43714.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43714.json index 6acc68217af..30f332ca048 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43714.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43714.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43714", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.200", - "lastModified": "2024-12-10T22:15:06.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:55:24.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43715.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43715.json index 7b7bef8ad85..713f460c037 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43715.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43715.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43715", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.377", - "lastModified": "2024-12-10T22:15:06.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:56:06.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json index 6b4a42d6b92..4f16a2b93c2 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43716.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43716", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.533", - "lastModified": "2024-12-10T22:15:06.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:58:24.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,25 +36,82 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json index 831a283a1d7..145134d7090 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43717.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43717", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.703", - "lastModified": "2024-12-10T22:15:06.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:59:13.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,25 +36,82 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43718.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43718.json index 9123245ab4b..592d40edd8d 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43718.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43718.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43718", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:06.860", - "lastModified": "2024-12-10T22:15:06.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:59:24.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43721.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43721.json index 18558f36f4e..eea186b62d0 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43721.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43721.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43721", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:07.310", - "lastModified": "2024-12-10T22:15:07.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:49:18.897", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22", + "matchCriteriaId": "BC30813D-D80E-446E-BDC7-F1CF9193202B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43722.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43722.json index e9ef76acc55..78eb325c5b6 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43722.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43722.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43722", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:07.500", - "lastModified": "2024-12-10T22:15:07.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:49:31.107", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22", + "matchCriteriaId": "BC30813D-D80E-446E-BDC7-F1CF9193202B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43723.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43723.json index 06e872bb93a..464038acf0f 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43723.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43723.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43723", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:07.663", - "lastModified": "2024-12-10T22:15:07.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:54:52.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43724.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43724.json index 32e13cbeeb6..67064ea7798 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43724.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43724", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:07.827", - "lastModified": "2024-12-10T22:15:07.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T14:54:45.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50379.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50379.json new file mode 100644 index 00000000000..8b51b13c94e --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50379.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-50379", + "sourceIdentifier": "security@apache.org", + "published": "2024-12-17T13:15:18.810", + "lastModified": "2024-12-17T13:15:18.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.08, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54677.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54677.json new file mode 100644 index 00000000000..894fae59a5d --- /dev/null +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54677.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-54677", + "sourceIdentifier": "security@apache.org", + "published": "2024-12-17T13:15:18.957", + "lastModified": "2024-12-17T13:15:18.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/tdtbbxpg5trdwc2wnopcth9ccvdftq2n", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json index 4b953f1ef6d..96e7a22c63e 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8434", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:04.213", - "lastModified": "2024-10-02T17:25:30.140", + "lastModified": "2024-12-17T14:36:19.633", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:themehunk:easy_mega_menu_plugin:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:themehunk:mega_menu:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.1.0", - "matchCriteriaId": "A0A3958A-90B9-48C9-8BDB-4E310B2318E8" + "matchCriteriaId": "49F58642-ED2D-4389-91FF-A752CEAA069D" } ] } diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8972.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8972.json new file mode 100644 index 00000000000..843b499f0d7 --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8972.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8972", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-12-17T14:15:20.110", + "lastModified": "2024-12-17T14:15:20.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mobil365 Informatics Saha365 App allows SQL Injection.This issue affects Saha365 App: before 30.09.2024." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1890", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9819.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9819.json new file mode 100644 index 00000000000..43c847030b3 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9819.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9819", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-12-17T13:15:19.100", + "lastModified": "2024-12-17T13:15:19.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in NextGeography NG Analyser allows Functionality Misuse.This issue affects NG Analyser: before 2.2.711." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1889", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5046814d878..a51fdda593c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-17T13:00:39.782151+00:00 +2024-12-17T15:00:52.615812+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-17T12:15:21.157000+00:00 +2024-12-17T14:59:24.850000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274124 +274129 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `5` -- [CVE-2024-11280](CVE-2024/CVE-2024-112xx/CVE-2024-11280.json) (`2024-12-17T12:15:19.343`) -- [CVE-2024-12395](CVE-2024/CVE-2024-123xx/CVE-2024-12395.json) (`2024-12-17T12:15:20.377`) -- [CVE-2024-12601](CVE-2024/CVE-2024-126xx/CVE-2024-12601.json) (`2024-12-17T12:15:20.543`) -- [CVE-2024-52542](CVE-2024/CVE-2024-525xx/CVE-2024-52542.json) (`2024-12-17T12:15:20.703`) -- [CVE-2024-8429](CVE-2024/CVE-2024-84xx/CVE-2024-8429.json) (`2024-12-17T12:15:20.853`) -- [CVE-2024-8475](CVE-2024/CVE-2024-84xx/CVE-2024-8475.json) (`2024-12-17T12:15:21.010`) -- [CVE-2024-9654](CVE-2024/CVE-2024-96xx/CVE-2024-9654.json) (`2024-12-17T12:15:21.157`) +- [CVE-2024-10356](CVE-2024/CVE-2024-103xx/CVE-2024-10356.json) (`2024-12-17T13:15:17.520`) +- [CVE-2024-50379](CVE-2024/CVE-2024-503xx/CVE-2024-50379.json) (`2024-12-17T13:15:18.810`) +- [CVE-2024-54677](CVE-2024/CVE-2024-546xx/CVE-2024-54677.json) (`2024-12-17T13:15:18.957`) +- [CVE-2024-8972](CVE-2024/CVE-2024-89xx/CVE-2024-8972.json) (`2024-12-17T14:15:20.110`) +- [CVE-2024-9819](CVE-2024/CVE-2024-98xx/CVE-2024-9819.json) (`2024-12-17T13:15:19.100`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` - -- [CVE-2024-4109](CVE-2024/CVE-2024-41xx/CVE-2024-4109.json) (`2024-12-17T11:15:05.717`) +Recently modified CVEs: `14` + +- [CVE-2021-47142](CVE-2021/CVE-2021-471xx/CVE-2021-47142.json) (`2024-12-17T14:56:12.967`) +- [CVE-2021-47144](CVE-2021/CVE-2021-471xx/CVE-2021-47144.json) (`2024-12-17T14:49:22.333`) +- [CVE-2023-1298](CVE-2023/CVE-2023-12xx/CVE-2023-1298.json) (`2024-12-17T13:58:11.560`) +- [CVE-2024-43713](CVE-2024/CVE-2024-437xx/CVE-2024-43713.json) (`2024-12-17T14:55:13.953`) +- [CVE-2024-43714](CVE-2024/CVE-2024-437xx/CVE-2024-43714.json) (`2024-12-17T14:55:24.553`) +- [CVE-2024-43715](CVE-2024/CVE-2024-437xx/CVE-2024-43715.json) (`2024-12-17T14:56:06.787`) +- [CVE-2024-43716](CVE-2024/CVE-2024-437xx/CVE-2024-43716.json) (`2024-12-17T14:58:24.220`) +- [CVE-2024-43717](CVE-2024/CVE-2024-437xx/CVE-2024-43717.json) (`2024-12-17T14:59:13.620`) +- [CVE-2024-43718](CVE-2024/CVE-2024-437xx/CVE-2024-43718.json) (`2024-12-17T14:59:24.850`) +- [CVE-2024-43721](CVE-2024/CVE-2024-437xx/CVE-2024-43721.json) (`2024-12-17T14:49:18.897`) +- [CVE-2024-43722](CVE-2024/CVE-2024-437xx/CVE-2024-43722.json) (`2024-12-17T14:49:31.107`) +- [CVE-2024-43723](CVE-2024/CVE-2024-437xx/CVE-2024-43723.json) (`2024-12-17T14:54:52.780`) +- [CVE-2024-43724](CVE-2024/CVE-2024-437xx/CVE-2024-43724.json) (`2024-12-17T14:54:45.177`) +- [CVE-2024-8434](CVE-2024/CVE-2024-84xx/CVE-2024-8434.json) (`2024-12-17T14:36:19.633`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8b4678bd418..4b937f283ef 100644 --- a/_state.csv +++ b/_state.csv @@ -187291,9 +187291,9 @@ CVE-2021-47138,0,0,6c8c0f5b22ac8d3f7fe50b996f063af62c0fa9ca4ccfd871f306e97dfefb9 CVE-2021-47139,0,0,8151d11e41d234e3fea0f6402fb7f8363013282a5b5430ac83a28afdb4d80397,2024-11-21T06:35:28.607000 CVE-2021-47140,0,0,94f2f57f0a6639487b4034158249e543c52bf9de60178bdcf9913a0f4ecf57a8,2024-11-21T06:35:28.713000 CVE-2021-47141,0,0,3fe12ffe1e35800eb3c9c890b65e5835a8f47ca96f20757b98e83b5d63b56dba,2024-11-21T06:35:28.880000 -CVE-2021-47142,0,0,e1f44df6393472ca2098edaae1367fa074b28894b4d3324ad75db619199687d0,2024-11-21T06:35:28.980000 +CVE-2021-47142,0,1,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000 CVE-2021-47143,0,0,c2a5c3dec1ae09dafacf9db55e558de20b9cffc7e28e40cda9f938eecc51f74e,2024-11-21T06:35:29.097000 -CVE-2021-47144,0,0,24958dae31ddbc4ff808756c79a346a469b979310736f44d4466f3df7ed42945,2024-11-21T06:35:29.197000 +CVE-2021-47144,0,1,7ae5f718c8b8ace4f33fb239cb219fe990a890405bf96e6eb5781eebe4403842,2024-12-17T14:49:22.333000 CVE-2021-47145,0,0,9662b9acd69919df2b6c6523f20e36e5e12471e8983fe7ba75453e11f65886d1,2024-11-21T06:35:29.310000 CVE-2021-47146,0,0,766576e3afc6f1a61aa6a76ec9ea79593634c7e928cfab3230cf4009861e61dc,2024-11-21T06:35:29.427000 CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000 @@ -214283,7 +214283,7 @@ CVE-2023-1294,0,0,5be21b679db8fbd6e50c8166e958b90336b85301bba575e2dea421588754db CVE-2023-1295,0,0,0b2fa8e04010bb98a116638f947318099e07fc1c2df75799e1a83165a0c77312,2024-11-21T07:38:51.727000 CVE-2023-1296,0,0,cd5052b21b7f39357ff50de27df684a18e5a579e8c4add5582dd35505e15fc1d,2024-11-21T07:38:51.880000 CVE-2023-1297,0,0,01d6c781b80781162574189a91b457a9b75cd298810a4392459a16b8f4eb910f,2024-11-21T07:38:52.020000 -CVE-2023-1298,0,0,dfcb3659e6266c3102c1fcfe93f767be1d7bf22a0dcacac22edd81bba83d7545,2024-11-21T07:38:52.160000 +CVE-2023-1298,0,1,11c3712c31bef2e08193b2fb77e5ad999b2e8700101ec1bc70baee0f9efffe5b,2024-12-17T13:58:11.560000 CVE-2023-1299,0,0,59fad68cd54d996e455437c597bf5aaf941ea506968ce8059728febaf173de36,2024-11-21T07:38:52.323000 CVE-2023-1300,0,0,df34bf5d1ba95b4d966521b8a545c32f09d65f2b15e906d25ca57f2355fa540c,2024-11-21T07:38:52.453000 CVE-2023-1301,0,0,7028900776d23e7f2caa69e19470efbd07c876a36537c6b5f3247ff082115b04,2024-11-21T07:38:52.597000 @@ -243293,6 +243293,7 @@ CVE-2024-10352,0,0,9f442342a9d7a5d646e145e32e9e4a092e972a0587ef0751f4ee0e2e0d901 CVE-2024-10353,0,0,a585a417ee4101a8a96932d3d7b1883f168d83679786880e61d32893305af8e7,2024-10-30T16:21:35.113000 CVE-2024-10354,0,0,533c75da0eda1e32f34af28874b401835cbfefd05865e3baec6bec1215a8ff9e,2024-10-30T16:32:48.453000 CVE-2024-10355,0,0,edd144d42239514a5040e45977c91b9661e0e5e1ef732ff2d1a515e8bda77acf,2024-10-30T17:13:02.417000 +CVE-2024-10356,1,1,8ea0dcfb94413f23a1deaf5bffd76da13078dcdcac48547b9b6c9d356425d892,2024-12-17T13:15:17.520000 CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 CVE-2024-10360,0,0,fdf4c91801296b2986624cb9668818820fc8f9a592678464010c300dd47a90aa,2024-10-29T14:34:04.427000 @@ -244036,7 +244037,7 @@ CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b48 CVE-2024-11278,0,0,3f323ea4c088ae11099db65ea7e4647c3e5f880422ea2bf5351a2656e281a2c7,2024-11-21T13:57:24.187000 CVE-2024-11279,0,0,b2556a8750e158a7be1dc7b8c7e9a28d5376397dde30d88838c627e7fc39e344,2024-12-12T04:15:04.970000 CVE-2024-1128,0,0,b5697d53bd1cc8361103858a196325f5d64208a9e9a1888a08b3143838ba1702,2024-11-21T08:49:51.657000 -CVE-2024-11280,1,1,c6c99c2b8008dd804efc112557dc7f34f3207d1ea9c17d95b04cb9020689b542,2024-12-17T12:15:19.343000 +CVE-2024-11280,0,0,c6c99c2b8008dd804efc112557dc7f34f3207d1ea9c17d95b04cb9020689b542,2024-12-17T12:15:19.343000 CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000 CVE-2024-1129,0,0,cbf5818dce2e4cd60590d30546d905436cb36b8ec16eeb56ee9382ffddfc0bc3,2024-11-21T08:49:51.773000 CVE-2024-11292,0,0,44d76ae9b7e309446be6c076fee918f16faf12f6eba1bd4aed88a2108eee73db,2024-12-06T09:15:05.993000 @@ -244742,7 +244743,7 @@ CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3 CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000 CVE-2024-1239,0,0,a515a367dab4b48d00e7f390a15c0d107266b53b28358b9f5ebf3476b0a625f5,2024-11-21T08:50:08.180000 CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000 -CVE-2024-12395,1,1,ac6ec951f4199ee2a3ac9be672f7e445ca4e4769b0c1ade81e28eb82a466a674,2024-12-17T12:15:20.377000 +CVE-2024-12395,0,0,ac6ec951f4199ee2a3ac9be672f7e445ca4e4769b0c1ade81e28eb82a466a674,2024-12-17T12:15:20.377000 CVE-2024-12397,0,0,661288be67552f431f0a0bf144bed2d313b12b592e50cdc78451d7c1272f6fb5,2024-12-12T09:15:05.570000 CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000 CVE-2024-12401,0,0,ba741c7b51198b95eba245807f65253a1c54ea777ddd918337cd97bd144396fe,2024-12-12T09:15:05.790000 @@ -244814,7 +244815,7 @@ CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6c CVE-2024-12581,0,0,899275a869b7c967a158446f680d5b1e6ee7fb8c13fa325a1164dc54186bea7f,2024-12-13T06:15:26.433000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 -CVE-2024-12601,1,1,2ca4ea21e5bfaf124d19bbe4bee1a196aca18d8d864e8b042ec1fe94e0d48399,2024-12-17T12:15:20.543000 +CVE-2024-12601,0,0,2ca4ea21e5bfaf124d19bbe4bee1a196aca18d8d864e8b042ec1fe94e0d48399,2024-12-17T12:15:20.543000 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000 CVE-2024-1262,0,0,b26d9641a8cbc2c5642fa36dfff4a6fef92b6772e7113385af431217d75dfe5b,2024-11-21T08:50:11.167000 @@ -261322,7 +261323,7 @@ CVE-2024-41086,0,0,0fe02eb9844a090bdca199e5ad62a105b2a4d9aaeffc6addd405c7e22990e CVE-2024-41087,0,0,2e61f3e7be1eacdb075b13a51b643098d8639780e9943507e16da696e299c52d,2024-11-21T09:32:13.063000 CVE-2024-41088,0,0,754ebc4f8ac7b57a5fff3fb2a7d9bdfa765fcddce74b7f844be0fc47aff866eb,2024-11-21T09:32:13.197000 CVE-2024-41089,0,0,2b23e7475804c066a4ea9b8a0f301e5008cbbfb9d5318eea5d282a397715808a,2024-11-21T09:32:13.320000 -CVE-2024-4109,0,1,1d1d87442114cd97495887c89bbc483c79311d9b04448f63dd649e1d9c7a74b0,2024-12-17T11:15:05.717000 +CVE-2024-4109,0,0,1d1d87442114cd97495887c89bbc483c79311d9b04448f63dd649e1d9c7a74b0,2024-12-17T11:15:05.717000 CVE-2024-41090,0,0,6e406ad9415fc1e7e6a216667df09c15b6ed6f6aaa3b1b114952b821deea1913,2024-11-21T09:32:13.460000 CVE-2024-41091,0,0,a0433796ee677d0c166a58c773745dbf539d3398d767f468c0128a83251368bd,2024-11-21T09:32:13.587000 CVE-2024-41092,0,0,313eda38a8533d8fba9497775d21071868685eb90955615a5d9e61f43ec4e28b,2024-11-21T09:32:13.713000 @@ -263220,19 +263221,19 @@ CVE-2024-43703,0,0,e564d47a3ea8e2e59e7c0c62fe5b37de767d270b87bc716325b902fc07b61 CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5dc8,2024-11-18T17:11:17.393000 CVE-2024-4371,0,0,e83d972dfd798c0045589442b000f085f252e3d21fb48583dd2590000a3618ae,2024-11-21T09:42:43.087000 CVE-2024-43712,0,0,95d6c6a30a048a036e8f159699d0ba49c9b6d9ac67cefddb6d5078e5dc3bfe0d,2024-12-10T22:15:05.830000 -CVE-2024-43713,0,0,b6343d1ac66b373641fd86847b50b0e21560a931f59e0da2bf5726630bd99753,2024-12-10T22:15:06.017000 -CVE-2024-43714,0,0,20853c0db17b2f29dcef9c1effdc8390e0ce0df8326ef0a1e47ad728e99e9724,2024-12-10T22:15:06.200000 -CVE-2024-43715,0,0,8b1cac0975e28efc15927aae692c72f3b9c7aa260a3c95a1c2c324ae5e5a1a0c,2024-12-10T22:15:06.377000 -CVE-2024-43716,0,0,9f7f3f3fbafe2e28a63d31cfb0cc4690673a40eb3f6bed5727857b26ca76958a,2024-12-10T22:15:06.533000 -CVE-2024-43717,0,0,a9fb0d402f14f6b10e812f9a70f74389bad2b71f913f91135494eaa45f6f24a1,2024-12-10T22:15:06.703000 -CVE-2024-43718,0,0,ed3a1649dc7c71192c2bfd8812da2c45b579fae3a531c34eca5ead701dd452cc,2024-12-10T22:15:06.860000 +CVE-2024-43713,0,1,2351d2ccf5a9bdfa299b6fe1f3d7c7e3a4bbc01a6f8443c4348a36cf5880bc04,2024-12-17T14:55:13.953000 +CVE-2024-43714,0,1,73ad98cab774040abdc9b8e9830549831c35b419b45dea5dc85f0b3962eb2d25,2024-12-17T14:55:24.553000 +CVE-2024-43715,0,1,4cf84ce10fab9827937044c82277f713ec455de0838fd3078877d96d6d43fbdc,2024-12-17T14:56:06.787000 +CVE-2024-43716,0,1,f90c2b7c357bddfe8d5a74436152e07d34c10373ddacb26f30e6dda4e203b918,2024-12-17T14:58:24.220000 +CVE-2024-43717,0,1,6a66b67dbafdf186ec2cff04181d7c35b20a480e8dd5fa7b5c7ac4986486df38,2024-12-17T14:59:13.620000 +CVE-2024-43718,0,1,394dea2bb63e682641a18a050280c4d9fb559e75c8d8f769c6d9d796d651463e,2024-12-17T14:59:24.850000 CVE-2024-43719,0,0,178a9efccbccdab2f796f362c72edbe2331c1c3d71a8068b3b101dffd05f4177,2024-12-10T22:15:07.010000 CVE-2024-4372,0,0,80047d29f24899dba9fb9823b96bdeb83dfdd1716f145c555f0448a73bb4cc01,2024-11-21T09:42:43.207000 CVE-2024-43720,0,0,2da03cc33ec8e17e48b1590d303d23bc1812477815dec0051acf1558aae9b230,2024-12-10T22:15:07.160000 -CVE-2024-43721,0,0,da07a869670b81c3c160e032558e91e4e40fd35cf6f830a1c1e7c785b9d336a6,2024-12-10T22:15:07.310000 -CVE-2024-43722,0,0,f0c56cd50df62fc41fb7982bba3d68ffb11e266556ae21ca2fcbe50a972b107f,2024-12-10T22:15:07.500000 -CVE-2024-43723,0,0,ee76446b3577bdba39649a3f6290aa35568ec5c41776492c7cd6d8a91502f5d6,2024-12-10T22:15:07.663000 -CVE-2024-43724,0,0,23e9b62cd80fe946764e53662ff79d2156155ebafca256e58627a8065639ca7b,2024-12-10T22:15:07.827000 +CVE-2024-43721,0,1,75c88b03a556609853a499c7a5323350ad23aaaec8dd9d2e1678a26617c51f1d,2024-12-17T14:49:18.897000 +CVE-2024-43722,0,1,cc8b74ada6c7c79c0264c0f5e04a7bc6c4f737d01440296d2a8557fac6025140,2024-12-17T14:49:31.107000 +CVE-2024-43723,0,1,231be03bef60a4e3122ec2aab227799d333096856154345ddf3c9ae6fb81ac9a,2024-12-17T14:54:52.780000 +CVE-2024-43724,0,1,3a9480844092ca94639fb464767ab4b92b22af6742a5752486a26253c54de03c,2024-12-17T14:54:45.177000 CVE-2024-43725,0,0,42aa540cd7514f5706e1f2f5a8f4d8c7c4abd979a075300dbd173e0b0da11ae3,2024-12-10T22:15:07.987000 CVE-2024-43726,0,0,e4029b09c83bc1ed43b9eb01f26e65b2539cc0bf1a2c02ccfc50fa7298066386,2024-12-10T22:15:08.170000 CVE-2024-43727,0,0,fac3e63a2d867205589bebc8d7e3f00e8135ff7ecd2adc32b816d000185d2327,2024-12-10T22:15:08.330000 @@ -267683,6 +267684,7 @@ CVE-2024-50375,0,0,56fac947e422fb64269f533486d0dc1ba9144509c581ce0bcf7e3c3e84436 CVE-2024-50376,0,0,1c676d8cee989c82ac8ed765a7b894a6388eed787e438d8c71eaa753adab0d7f,2024-11-26T11:22:08.323000 CVE-2024-50377,0,0,f6840753b5713fbe96faae600e2c62c2c1e93f11e2b524402c997c7946e91ee2,2024-11-26T11:22:08.767000 CVE-2024-50378,0,0,900ee50327f5385f2403e248242013736ebb85dd213456a5c5c919b232de1cfd,2024-11-21T09:44:35.040000 +CVE-2024-50379,1,1,887c64a0cf5475bbf017b1206d4e2afd4aacf9bbae36e9efa2e7c9d6e75e7544,2024-12-17T13:15:18.810000 CVE-2024-5038,0,0,58120a5c504a9a5dd9c3a22b44d30b89afa2b5f02020ba28c9cce702a8c38af9,2024-11-21T09:46:49.963000 CVE-2024-50380,0,0,f10ef598ecccc7ed544ab2722f10c84c2a5e78255563c7513653ff94676d3b30,2024-12-02T17:15:11.980000 CVE-2024-50381,0,0,2c2c5a4847c05b7db6d3d96ff87c82f854de4222974bc5963df25dc7516f2d78,2024-12-02T17:15:12.160000 @@ -269019,7 +269021,7 @@ CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff0 CVE-2024-52537,0,0,79d5bab7a316a4a5e36b347dfcb08651d568dc7cb64073148e1c1e42669123b6,2024-12-11T08:15:05.747000 CVE-2024-52538,0,0,1bae7e87d532ab1b896b47e33928c8b9835fb6690e8325140679d38a93ad90cb,2024-12-16T11:15:06.523000 CVE-2024-5254,0,0,b08a56d01443c9abf44ee33ecfae9cdfa73a8d20318044fcd2f5caa1e9d31f2e,2024-11-21T09:47:17.063000 -CVE-2024-52542,1,1,680d90fbec10acd3c427ef8eb07f993d75db3e8d38cb214a105bea1b6d67ec91,2024-12-17T12:15:20.703000 +CVE-2024-52542,0,0,680d90fbec10acd3c427ef8eb07f993d75db3e8d38cb214a105bea1b6d67ec91,2024-12-17T12:15:20.703000 CVE-2024-52544,0,0,c58d604e70e1d52d10e6c46ba91f7cf731eb4ad32c0c46522333c5ba2eb214aa,2024-12-03T21:15:07.390000 CVE-2024-52545,0,0,387ccc5d59fa5b7f0e29a5a9d3b818216a2c3bea1d9e491918de17e5ca055044,2024-12-03T21:15:07.490000 CVE-2024-52546,0,0,5387c491d047007733dddf4928762fe4affacc09ddf2859617c316a62a5513e1,2024-12-03T21:15:07.593000 @@ -270154,6 +270156,7 @@ CVE-2024-54664,0,0,d20f70ea69f653338f16a7f1cc2d57f70600da4ca2ed7cb633c4eef985633 CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000 CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000 CVE-2024-54675,0,0,14b4e742326580d47a2a009f3e3f65a46d84415cc785ea77b3a28630132c9018,2024-12-05T19:15:09.100000 +CVE-2024-54677,1,1,dd78d5a278a6f999c5830172836de8432bcfdcfae83c9232f8411eac628211d9,2024-12-17T13:15:18.957000 CVE-2024-54679,0,0,381ad7e6890c67d9b6c47b47a43cd175dd5b1319ea7d6b78a90445a532dafd14,2024-12-06T15:15:09.693000 CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb4279,2024-11-21T09:47:44.527000 CVE-2024-54682,0,0,47c1e4bea5a44559550e8b3ac687261daadaa3d8113a6cea9c496aa4796df1ff,2024-12-16T08:15:05.513000 @@ -272867,12 +272870,12 @@ CVE-2024-8422,0,0,595c3a4c4569e5d22b76db5956453d2a1a1a701b00065efde8acf9a79c387c CVE-2024-8424,0,0,70e0efba1b7474fd71ae798ee933fd249d2e6d2cb69d7469e257caaac30ab429,2024-11-08T19:01:03.880000 CVE-2024-8427,0,0,b84207915031e0f3fd8ae31fc1649578b63ca815fcdfb9b3c22054b4863be5e4,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,16614a0b61f86dd0b83d47d6c77d8385fb4c68c4d0f570f88f7c5094d2f7b53a,2024-09-26T21:58:45.393000 -CVE-2024-8429,1,1,4a69b5edfa7b84a4924e912db8f791e37990ccf964c64ced5c4c6826032ba77d,2024-12-17T12:15:20.853000 +CVE-2024-8429,0,0,4a69b5edfa7b84a4924e912db8f791e37990ccf964c64ced5c4c6826032ba77d,2024-12-17T12:15:20.853000 CVE-2024-8430,0,0,641bd91854296613ca357534b0f9d1be45bbed60220fc9e60563be11e11873dc,2024-10-04T13:51:25.567000 CVE-2024-8431,0,0,c57d1819aff02d7cef3d4f58b7fb7798fe1e0ad5c7dc00a6c26fb8aba099957a,2024-10-10T12:56:30.817000 CVE-2024-8432,0,0,fe1677a12edb0ed37c4bfb900e47d1aca0c63158bb3a82d245d901f88a3a1e05,2024-09-27T12:58:58.433000 CVE-2024-8433,0,0,64becb357e0272a653ad69b5163439c556b02ace2d502da92fcfc6deb7caa4c4,2024-10-10T12:56:30.817000 -CVE-2024-8434,0,0,39f50c90562562fa000014c229a9c606892572850dc8e7148333dc8a661e0023,2024-10-02T17:25:30.140000 +CVE-2024-8434,0,1,0e5c3c041d44fe6867811e83187aa5478d596e83a995d06c6c786cdbe826e9e9,2024-12-17T14:36:19.633000 CVE-2024-8436,0,0,3901a53f2b69cf2fa9da70154fc69e5fb4af692c880115c4415c499eedc18c1c,2024-09-26T13:32:02.803000 CVE-2024-8437,0,0,e4efc23a5bf0d18afaa377517546a9b174c328585ec4f4a98a164a6336829fcb,2024-09-26T13:32:02.803000 CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 @@ -272908,7 +272911,7 @@ CVE-2024-8470,0,0,0b09aa8b8067433b7afb73b61c7aa44d3ef7ce8628b7e8d3b9e29fa3afb00f CVE-2024-8471,0,0,3934935f0a31bf82a596702efda6613996b08d7c183fa97f6a84e3cc4bc42129,2024-09-06T11:44:22.510000 CVE-2024-8472,0,0,a6a3ced3bf4a7f20791a06fac7764ccd2d88fa692882742c77836c8aae9605ea,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,bbd4d04523589cb8c745e9ab16e4a2c78d73b9497ab6f7282bb7e3bf6a9bfe27,2024-09-06T11:44:45.017000 -CVE-2024-8475,1,1,5d86149f83664d555cc91cd524c7ea6798d72eab792d84b2bf6674a9ede476a7,2024-12-17T12:15:21.010000 +CVE-2024-8475,0,0,5d86149f83664d555cc91cd524c7ea6798d72eab792d84b2bf6674a9ede476a7,2024-12-17T12:15:21.010000 CVE-2024-8476,0,0,e10a403d1e51fb18d41d013015e6a782c14511b4b5a178aec34efa9588c9653e,2024-10-02T17:31:00.583000 CVE-2024-8477,0,0,19e1a50b82df4e949fc45923ac7e1924aea3a0df2879078ebf532cd95acaecd0,2024-10-15T13:30:52.877000 CVE-2024-8478,0,0,484f2c68e6e7a76a908ae4220aa78a61277af4da3d4158c47b9f9bfdd22b29a6,2024-09-26T15:53:44.297000 @@ -273321,6 +273324,7 @@ CVE-2024-8965,0,0,f8e90b5b67b70a8381e6e9eacdc79df30f60298bdd1400482e72c97cbc06ef CVE-2024-8967,0,0,7898714718fda7e623053515c819c9ef828b8e1f849f0008b801f032918cd46a,2024-10-08T18:47:12.110000 CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab304109,2024-09-20T12:30:51.220000 CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000 +CVE-2024-8972,1,1,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000 CVE-2024-8974,0,0,9dfe7c1e1fc096d25206dd031b2e4236d5ec5630433070bbc83f3c7af62bcf85,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,2e1af783568cf7ad44e3b33e6ac71980410920ee6be566fa4a01ec060d747af4,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,cb8e4225cbeae27a4d5cd5a6caff3e78c74f90a4a117f3ebee8859bf0cf66b60,2024-10-16T17:10:13.220000 @@ -273830,7 +273834,7 @@ CVE-2024-9650,0,0,2327d0b00f83aa6287d8e0fc737d152f9293bbe0c165388e74c80db5393555 CVE-2024-9651,0,0,076e1970a9e34c701b84bb911d74f70417194b77dcccb012468991739fbcab41,2024-12-09T18:15:24.657000 CVE-2024-9652,0,0,2278cc3d85ab1e64d09ab82bc023556b887dca2b4a3045a553483dbbc6e7952b,2024-10-16T16:38:14.557000 CVE-2024-9653,0,0,f158e4ac0dd55a24d4b3927fa7e93113f3b2a80fd6a1d97e078c1fc3c150282b,2024-11-26T20:37:07.913000 -CVE-2024-9654,1,1,5a3b56c8a74d1f09d49213a1c2e8ed07d5fa2417cc9f12f2e785364d1965c107,2024-12-17T12:15:21.157000 +CVE-2024-9654,0,0,5a3b56c8a74d1f09d49213a1c2e8ed07d5fa2417cc9f12f2e785364d1965c107,2024-12-17T12:15:21.157000 CVE-2024-9655,0,0,f949df8d6e7799757a56c3413a4960a9956ec7f349370b1e9da1784dc8394ce3,2024-11-01T12:57:03.417000 CVE-2024-9656,0,0,fe9df299e1627df8ed3d1b46925ce86dfb46c361033644f0c6f5f5d626358e4f,2024-10-15T12:57:46.880000 CVE-2024-9657,0,0,d6a40760f79cba273a7653e656cf0460e958ee7ff325e76af903d63b399e35b9,2024-11-08T16:00:28.320000 @@ -273968,6 +273972,7 @@ CVE-2024-9815,0,0,888a21261db26e5e3abcb23eef5b5554231068cd5e2c09b2853a7d6a14e6b1 CVE-2024-9816,0,0,0c9e91c9c76ee23d16ff6c1da9e6512722ed7b3f956a306b3f3091de7b2176e7,2024-10-17T14:53:05.630000 CVE-2024-9817,0,0,f4ce773fca9e42014a1f6c1f24b7b847a90c6cfc337d02bfc8f72f1902c7d7fa,2024-10-17T18:12:58.953000 CVE-2024-9818,0,0,7fb572b98937aa55829f4476928bad8b1fb5601f9555683143fad81392780e70,2024-10-17T18:13:37.347000 +CVE-2024-9819,1,1,5664413e6c1068e0f57cec1134b206efd3af2ddd762d6ec8a2b686b615dcf27c,2024-12-17T13:15:19.100000 CVE-2024-9820,0,0,fd87ed6a28af139962800259a754dbde67b7483a77ceed7f1e754d00989c64ca,2024-10-19T00:44:10.420000 CVE-2024-9821,0,0,998cb484708b6d639b88d328380d97e10182c41ce084a3bdd91de81a020e2e5e,2024-10-15T12:57:46.880000 CVE-2024-9822,0,0,f1bf0282ddb6c40708926a0c5359bb5d5e793e9f09b41cd8b96a11f1b887969d,2024-11-15T16:41:41.507000