diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29476.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29476.json index ec4d5f71dc1..eb9c7c576b9 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29476.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29476.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29476", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-14T02:15:05.010", - "lastModified": "2024-12-14T02:15:05.010", + "lastModified": "2024-12-16T18:15:05.407", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Menlo On-Premise Appliance before 2.88, web policy may not be consistently applied properly to intentionally malformed client requests. This is fixed in 2.88.2+, 2.89.1+, and 2.90.1+." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], "references": [ { "url": "https://www.menlosecurity.com/published-security-vulnerabilities", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json index f6ce4f62d29..a3fb333b053 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0020", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.667", - "lastModified": "2024-11-21T08:45:43.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T18:59:20.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,87 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/87f791f2351e366f842a0fd6fcb744069160d9a1", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/87f791f2351e366f842a0fd6fcb744069160d9a1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json index 6e4eb1228e2..6b388e1507b 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0021", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.717", - "lastModified": "2024-11-21T08:45:43.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T18:55:59.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/53ea491d276f9a7c586c7983c08105a9bb7051f1", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/53ea491d276f9a7c586c7983c08105a9bb7051f1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0023.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0023.json index 8a45bccfd63..379efdadc3e 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0023.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0023.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0023", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.767", - "lastModified": "2024-11-21T08:45:43.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T18:52:54.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0032.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0032.json index 49c76caa4bf..a5a5ddf12b4 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0032.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0032", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:50.823", - "lastModified": "2024-11-21T08:45:45.123", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T18:45:35.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/4af5db76f25348849252e0b8a08f4a517ef842b7", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/packages/providers/DownloadProvider/+/5acd646e0cf63e2c9c0862da7e03531ef0074394", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/4af5db76f25348849252e0b8a08f4a517ef842b7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/packages/providers/DownloadProvider/+/5acd646e0cf63e2c9c0862da7e03531ef0074394", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10095.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10095.json new file mode 100644 index 00000000000..de75f9550f5 --- /dev/null +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10095.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-10095", + "sourceIdentifier": "security@progress.com", + "published": "2024-12-16T17:15:06.757", + "lastModified": "2024-12-16T17:15:06.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress Telerik UI for WPF versions prior to 2024 Q4 (2024.4.1213), a code execution attack is possible through an insecure deserialization vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://docs.telerik.com/devtools/wpf/knowledge-base/kb-security-unsafe-deserialization-vulnerability-cve-2024-10095", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11144.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11144.json new file mode 100644 index 00000000000..53afa354aff --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11144.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-11144", + "sourceIdentifier": "disclosure@synopsys.com", + "published": "2024-12-16T17:15:07.327", + "lastModified": "2024-12-16T17:15:07.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The server lacks thread safety and can be crashed by anomalous data sent by an anonymous user from a remote network. The crash causes the FTP service to become unavailable, affecting all users and processes that rely on it for file transfers. If the crash occurs during file upload or download, it could lead to incomplete file transfers, potentially corrupting data. The repeated crash might also affect the stability of the underlying system, especially if it leads to resource leaks or affects other services." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "disclosure@synopsys.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "disclosure@synopsys.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "disclosure@synopsys.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://www.blackduck.com/blog/cyrc-advisory-LightFTP.html", + "source": "disclosure@synopsys.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11358.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11358.json new file mode 100644 index 00000000000..a88c72def06 --- /dev/null +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11358.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11358", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2024-12-16T17:15:07.543", + "lastModified": "2024-12-16T17:15:07.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost Android Mobile Apps versions <=2.21.0 fail to properly configure file providers which allows an attacker with local access to access files via file provider." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11834.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11834.json index 560346fcd3b..2e54f285e7f 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11834.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11834.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11834", "sourceIdentifier": "5fea7123-217b-4b2d-ada8-8892719b43cd", "published": "2024-12-13T06:15:25.440", - "lastModified": "2024-12-13T06:15:25.440", + "lastModified": "2024-12-16T18:15:08.243", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,28 @@ "providerUrgency": "RED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json index 6b274f95f10..103cf711bc0 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11841.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11841", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-16T06:15:05.967", - "lastModified": "2024-12-16T06:15:05.967", + "lastModified": "2024-12-16T17:15:07.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Tithe.ly Giving Button WordPress plugin through 1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/e344c722-c9b3-4527-a50d-50cdf07ebace/", diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12655.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12655.json new file mode 100644 index 00000000000..9a197d047d1 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12655.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12655", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T17:15:09.147", + "lastModified": "2024-12-16T17:15:09.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in FabulaTech USB over Network 6.0.6.1. Affected by this issue is the function 0x220420 in the library ftusbbus2.sys of the component IOCT Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/FabulaTech-USB-over-Network-Client-ftusbbus2-0x220420-NPD-DOS-15160437bb1e80898c8bf2dc1f7a24e7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288524", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288524", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.456029", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12656.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12656.json new file mode 100644 index 00000000000..887f1af215d --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12656.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12656", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T17:15:09.340", + "lastModified": "2024-12-16T17:15:09.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in FabulaTech USB over Network 6.0.6.1. This affects the function 0x220448 in the library ftusbbus2.sys of the component IOCT Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/FabulaTech-USB-over-Network-Client-ftusbbus2-0x220448-NPD-DOS-15160437bb1e80cb837cd715680be6ea", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288525", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288525", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.456030", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12657.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12657.json new file mode 100644 index 00000000000..60804ffac3f --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12657.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12657", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T17:15:09.520", + "lastModified": "2024-12-16T17:15:09.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This vulnerability affects the function 0x8001E000 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E000-NPD-DOS-15160437bb1e8068a470ca1611fd7317", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288526", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288526", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.456035", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12658.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12658.json new file mode 100644 index 00000000000..ed3ac57ae69 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12658.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12658", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T18:15:10.120", + "lastModified": "2024-12-16T18:15:10.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This issue affects the function 0x8001E01C in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288527", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288527", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.456036", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12659.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12659.json new file mode 100644 index 00000000000..ecf04119883 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12659.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12659", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T18:15:10.320", + "lastModified": "2024-12-16T18:15:10.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been classified as problematic. Affected is the function 0x8001E004 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E004-NPD-DOS-15160437bb1e804cbe8fd4d826f8564f", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288528", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288528", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.456038", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12660.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12660.json new file mode 100644 index 00000000000..645fdc9697f --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12660.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12660", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T18:15:10.533", + "lastModified": "2024-12-16T18:15:10.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been declared as problematic. Affected by this vulnerability is the function 0x8001E018 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E018-NPD-DOS-15260437bb1e80c5ab28da895ed46227", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288529", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288529", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.456337", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12668.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12668.json index 05cbe0ea07e..909346a5e81 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12668.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12668.json @@ -2,13 +2,13 @@ "id": "CVE-2024-12668", "sourceIdentifier": "cve@rapid7.com", "published": "2024-12-16T15:15:06.807", - "lastModified": "2024-12-16T15:15:06.807", + "lastModified": "2024-12-16T17:15:09.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Velocidex WinPmem versions below 4.1 suffer from an Out of Bounds Write vulnerability whereby an attacker can subvert code-signing facilities leading to the ability to write the value zero anywhere in memory with the driver \u2013 without using the\\nPMEM_WRITE_ENABLED compilation flag. This issue is remediated in version 4.1." + "value": "Velocidex WinPmem versions below 4.1 suffer from an Out of Bounds Write vulnerability.\u00a0By using an IO Control, a user space program can trick the driver into writing a 0 into any chosen memory location. In conjunction with information leakage from the WinPmem driver, attackers can discover the location in memory for the g_CiOptions global symbol. This can be leveraged to disable signed driver enforcement on the target system - allowing attackers to load unsigned drivers." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46971.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46971.json index 83b91b7e2d3..70a3f97e84d 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46971.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46971.json @@ -2,16 +2,43 @@ "id": "CVE-2024-46971", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2024-12-13T18:15:20.460", - "lastModified": "2024-12-13T18:15:20.460", + "lastModified": "2024-12-16T17:15:09.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Software installed and run as a non-privileged user may conduct GPU system calls to read and write freed physical memory from the GPU." + }, + { + "lang": "es", + "value": "El software instalado y ejecutado como un usuario sin privilegios puede realizar llamadas al sistema de GPU para leer y escribir la memoria f\u00edsica liberada de la GPU." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4762.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4762.json new file mode 100644 index 00000000000..867a94f7147 --- /dev/null +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4762.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-4762", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-12-16T17:15:10.293", + "lastModified": "2024-12-16T17:15:10.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper validation vulnerability was reported in the firmware update mechanism of LADM and LDCC that could allow a local attacker to escalate privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.co/us/en/product_security/LEN-174319", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json index d65df57d93e..143b2299f8f 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json @@ -2,13 +2,13 @@ "id": "CVE-2024-49513", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:16.343", - "lastModified": "2024-12-10T21:15:16.343", + "lastModified": "2024-12-16T17:15:10.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Not a product versions 21.0.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + "value": "PDFL SDK versions 21.0.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." }, { "lang": "es", @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52063.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52063.json index 6a2a193e56a..378a7eccd46 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52063.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52063.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52063", "sourceIdentifier": "3f572a00-62e2-4423-959a-7ea25eff1638", "published": "2024-12-13T11:15:08.810", - "lastModified": "2024-12-13T11:15:08.810", + "lastModified": "2024-12-16T17:15:10.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5333.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5333.json index 44579fc4020..caa054e6d1e 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5333.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5333.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5333", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-16T06:15:08.100", - "lastModified": "2024-12-16T06:15:08.100", + "lastModified": "2024-12-16T17:15:14.070", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Events Calendar WordPress plugin before 6.8.2.1 is missing access checks in the REST API, allowing for unauthenticated users to access information about password protected events." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/764b5a23-8b51-4882-b899-beb54f684984/", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54465.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54465.json index 106de721850..ec1a26ac406 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54465.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54465", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:29.243", - "lastModified": "2024-12-13T18:42:50.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T18:15:11.023", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54504.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54504.json index cd12089687b..cc4b20fac4a 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54504.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54504.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54504", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:31.140", - "lastModified": "2024-12-13T18:40:20.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T18:15:11.317", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55636.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55636.json index dd926204382..c57badeef5c 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55636.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55636.json @@ -2,13 +2,13 @@ "id": "CVE-2024-55636", "sourceIdentifier": "mlhess@drupal.org", "published": "2024-12-10T00:15:22.540", - "lastModified": "2024-12-10T22:15:28.347", + "lastModified": "2024-12-16T18:15:11.463", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8." + "value": "Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.\n\nDrupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site. This so called gadget chain presents no direct threat, but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55637.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55637.json index eaa39dc1e49..b4e1b0c4f95 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55637.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55637.json @@ -2,13 +2,13 @@ "id": "CVE-2024-55637", "sourceIdentifier": "mlhess@drupal.org", "published": "2024-12-10T00:15:22.650", - "lastModified": "2024-12-10T22:15:28.500", + "lastModified": "2024-12-16T18:15:11.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8." + "value": "Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.\n\nDrupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site. This so-called gadget chain presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55638.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55638.json index 93e6b6a6ce7..f9606271b09 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55638.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55638.json @@ -2,13 +2,13 @@ "id": "CVE-2024-55638", "sourceIdentifier": "mlhess@drupal.org", "published": "2024-12-10T00:15:22.770", - "lastModified": "2024-12-10T22:15:28.640", + "lastModified": "2024-12-16T18:15:11.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 7.0 before 7.102, from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9." + "value": "Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 7.0 before 7.102, from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9.\n\nDrupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site. This so-called gadget chain presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-556xx/CVE-2024-55663.json b/CVE-2024/CVE-2024-556xx/CVE-2024-55663.json index 2d8198a3f62..b349bd0a391 100644 --- a/CVE-2024/CVE-2024-556xx/CVE-2024-55663.json +++ b/CVE-2024/CVE-2024-556xx/CVE-2024-55663.json @@ -2,13 +2,13 @@ "id": "CVE-2024-55663", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-12T19:15:13.827", - "lastModified": "2024-12-12T19:15:13.827", + "lastModified": "2024-12-16T18:15:12.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "XWiki Platform is a generic wiki platform. Starting in version 11.10.6 and prior to versions 13.10.5 and 14.3-rc-1, in `getdocument.vm`; the ordering of the returned documents is defined from an unsanitized request parameter (request.sort) and can allow any user to inject HQL. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This has been patched in 13.10.5 and 14.3-rc-1. There is no known workaround, other than upgrading XWiki." + "value": "XWiki Platform is a generic wiki platform. Starting in version 6.3-milestone-2 and prior to versions 13.10.5 and 14.3-rc-1, in `getdocument.vm`; the ordering of the returned documents is defined from an unsanitized request parameter (request.sort) and can allow any user to inject HQL. Depending on the used database backend, the attacker may be able to not only obtain confidential information such as password hashes from the database, but also execute UPDATE/INSERT/DELETE queries. This has been patched in 13.10.5 and 14.3-rc-1. There is no known workaround, other than upgrading XWiki." }, { "lang": "es", @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json index f69c0339003..76356e40ff6 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55956", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-13T21:15:13.767", - "lastModified": "2024-12-13T22:15:09.013", + "lastModified": "2024-12-16T18:15:12.170", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory." + }, + { + "lang": "es", + "value": "En Cleo Harmony anterior a 5.8.0.24, VLTrader anterior a 5.8.0.24 y LexiCom anterior a 5.8.0.24, un usuario no autenticado puede importar y ejecutar comandos Bash o PowerShell arbitrarios en el sistema host aprovechando la configuraci\u00f3n predeterminada del directorio Autorun." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Pending", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55969.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55969.json index 7122e614372..dfd75d9d673 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55969.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55969.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55969", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-15T04:15:04.657", - "lastModified": "2024-12-15T04:15:04.657", + "lastModified": "2024-12-16T17:15:12.337", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "DocIO in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 throws XMLException during the resaving of a DOCX document with an external reference XML, aka I640714." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://ej2.syncfusion.com/aspnetmvc/documentation/release-notes/27.1.55?type=all", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55970.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55970.json index 6e16669419b..e1f12979937 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55970.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55970.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55970", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-15T03:15:15.263", - "lastModified": "2024-12-15T03:15:15.263", + "lastModified": "2024-12-16T17:15:12.517", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "File Manager in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 has a traversal issue that is related to the request parameter, aka I644734." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://ej2.syncfusion.com/aspnetmvc/documentation/release-notes/27.1.55?type=all", diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56072.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56072.json index 5d6c8435abb..4fd8d102e82 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56072.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56072.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56072", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-15T03:15:16.323", - "lastModified": "2024-12-15T03:15:16.323", + "lastModified": "2024-12-16T17:15:13.500", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/pavel-odintsov/fastnetmon/commit/5164a29603fff9dd445b7660a35090989f005000", diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56073.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56073.json index a3941c71271..bf48e1ae881 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56073.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56073.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56073", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-15T03:15:16.433", - "lastModified": "2024-12-15T03:15:16.433", + "lastModified": "2024-12-16T17:15:13.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue was discovered in FastNetMon Community Edition through 1.2.7. Zero-length templates for Netflow v9 allow remote attackers to cause a denial of service (divide-by-zero error and application crash)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], "references": [ { "url": "https://cwe.mitre.org/data/definitions/369.html", diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56083.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56083.json index 7489332c2a0..3f596bfdf73 100644 --- a/CVE-2024/CVE-2024-560xx/CVE-2024-56083.json +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56083", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T03:15:04.650", - "lastModified": "2024-12-16T03:15:04.650", + "lastModified": "2024-12-16T17:15:13.883", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Cognition Devin before 2024-12-12 provides write access to code by an attacker who discovers the https://vscode-randomly_generated_string.devinapps.com URL (aka the VSCode live share URL) for a specific \"Use Devin's Machine\" session. For example, this URL may be discovered if a customer posts a screenshot of a Devin session to social media, or publicly streams their Devin session." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://news.ycombinator.com/item?id=42420423", diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6001.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6001.json new file mode 100644 index 00000000000..ba457399426 --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6001.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6001", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-12-16T17:15:14.197", + "lastModified": "2024-12-16T17:15:14.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper certificate validation vulnerability was reported in LADM that could allow a network attacker with the ability to redirect an update request to a remote server and execute code with elevated privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.co/us/en/product_security/LEN-174319", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6002.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6002.json new file mode 100644 index 00000000000..5d0654ad962 --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6002.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-6002", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-12-16T18:15:12.450", + "lastModified": "2024-12-16T18:15:12.450", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8058.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8058.json new file mode 100644 index 00000000000..4e3ddd34232 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8058.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-8058", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2024-12-16T17:15:14.377", + "lastModified": "2024-12-16T18:15:12.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper parsing vulnerability was reported in the FileZ client that could allow a crafted file in the FileZ directory to read arbitrary files on the device due to URL preloading." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.filez.com/securityPolicy/1.html?1733849740", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0b236df7ca9..39e920d801b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-16T17:00:55.175005+00:00 +2024-12-16T19:01:01.791812+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-16T16:15:10.313000+00:00 +2024-12-16T18:59:20.550000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274051 +274064 ``` ### CVEs added in the last Commit -Recently added CVEs: `140` - -- [CVE-2024-55979](CVE-2024/CVE-2024-559xx/CVE-2024-55979.json) (`2024-12-16T15:15:24.983`) -- [CVE-2024-55980](CVE-2024/CVE-2024-559xx/CVE-2024-55980.json) (`2024-12-16T15:15:25.130`) -- [CVE-2024-55981](CVE-2024/CVE-2024-559xx/CVE-2024-55981.json) (`2024-12-16T15:15:25.283`) -- [CVE-2024-55982](CVE-2024/CVE-2024-559xx/CVE-2024-55982.json) (`2024-12-16T15:15:25.433`) -- [CVE-2024-55986](CVE-2024/CVE-2024-559xx/CVE-2024-55986.json) (`2024-12-16T15:15:25.577`) -- [CVE-2024-55987](CVE-2024/CVE-2024-559xx/CVE-2024-55987.json) (`2024-12-16T15:15:25.733`) -- [CVE-2024-55988](CVE-2024/CVE-2024-559xx/CVE-2024-55988.json) (`2024-12-16T15:15:25.890`) -- [CVE-2024-55989](CVE-2024/CVE-2024-559xx/CVE-2024-55989.json) (`2024-12-16T15:15:26.073`) -- [CVE-2024-55990](CVE-2024/CVE-2024-559xx/CVE-2024-55990.json) (`2024-12-16T15:15:26.223`) -- [CVE-2024-55992](CVE-2024/CVE-2024-559xx/CVE-2024-55992.json) (`2024-12-16T15:15:26.377`) -- [CVE-2024-55993](CVE-2024/CVE-2024-559xx/CVE-2024-55993.json) (`2024-12-16T15:15:26.523`) -- [CVE-2024-55994](CVE-2024/CVE-2024-559xx/CVE-2024-55994.json) (`2024-12-16T15:15:26.677`) -- [CVE-2024-55996](CVE-2024/CVE-2024-559xx/CVE-2024-55996.json) (`2024-12-16T15:15:26.820`) -- [CVE-2024-55998](CVE-2024/CVE-2024-559xx/CVE-2024-55998.json) (`2024-12-16T15:15:26.957`) -- [CVE-2024-55999](CVE-2024/CVE-2024-559xx/CVE-2024-55999.json) (`2024-12-16T16:15:08.973`) -- [CVE-2024-56001](CVE-2024/CVE-2024-560xx/CVE-2024-56001.json) (`2024-12-16T15:15:27.090`) -- [CVE-2024-56003](CVE-2024/CVE-2024-560xx/CVE-2024-56003.json) (`2024-12-16T16:15:09.113`) -- [CVE-2024-56004](CVE-2024/CVE-2024-560xx/CVE-2024-56004.json) (`2024-12-16T15:15:27.233`) -- [CVE-2024-56005](CVE-2024/CVE-2024-560xx/CVE-2024-56005.json) (`2024-12-16T15:15:27.370`) -- [CVE-2024-56007](CVE-2024/CVE-2024-560xx/CVE-2024-56007.json) (`2024-12-16T15:15:27.507`) -- [CVE-2024-56009](CVE-2024/CVE-2024-560xx/CVE-2024-56009.json) (`2024-12-16T15:15:27.643`) -- [CVE-2024-56011](CVE-2024/CVE-2024-560xx/CVE-2024-56011.json) (`2024-12-16T15:15:27.803`) -- [CVE-2024-56012](CVE-2024/CVE-2024-560xx/CVE-2024-56012.json) (`2024-12-16T15:15:27.943`) -- [CVE-2024-56013](CVE-2024/CVE-2024-560xx/CVE-2024-56013.json) (`2024-12-16T15:15:28.090`) -- [CVE-2024-56015](CVE-2024/CVE-2024-560xx/CVE-2024-56015.json) (`2024-12-16T15:15:28.230`) +Recently added CVEs: `13` + +- [CVE-2024-10095](CVE-2024/CVE-2024-100xx/CVE-2024-10095.json) (`2024-12-16T17:15:06.757`) +- [CVE-2024-11144](CVE-2024/CVE-2024-111xx/CVE-2024-11144.json) (`2024-12-16T17:15:07.327`) +- [CVE-2024-11358](CVE-2024/CVE-2024-113xx/CVE-2024-11358.json) (`2024-12-16T17:15:07.543`) +- [CVE-2024-12655](CVE-2024/CVE-2024-126xx/CVE-2024-12655.json) (`2024-12-16T17:15:09.147`) +- [CVE-2024-12656](CVE-2024/CVE-2024-126xx/CVE-2024-12656.json) (`2024-12-16T17:15:09.340`) +- [CVE-2024-12657](CVE-2024/CVE-2024-126xx/CVE-2024-12657.json) (`2024-12-16T17:15:09.520`) +- [CVE-2024-12658](CVE-2024/CVE-2024-126xx/CVE-2024-12658.json) (`2024-12-16T18:15:10.120`) +- [CVE-2024-12659](CVE-2024/CVE-2024-126xx/CVE-2024-12659.json) (`2024-12-16T18:15:10.320`) +- [CVE-2024-12660](CVE-2024/CVE-2024-126xx/CVE-2024-12660.json) (`2024-12-16T18:15:10.533`) +- [CVE-2024-4762](CVE-2024/CVE-2024-47xx/CVE-2024-4762.json) (`2024-12-16T17:15:10.293`) +- [CVE-2024-6001](CVE-2024/CVE-2024-60xx/CVE-2024-6001.json) (`2024-12-16T17:15:14.197`) +- [CVE-2024-6002](CVE-2024/CVE-2024-60xx/CVE-2024-6002.json) (`2024-12-16T18:15:12.450`) +- [CVE-2024-8058](CVE-2024/CVE-2024-80xx/CVE-2024-8058.json) (`2024-12-16T17:15:14.377`) ### CVEs modified in the last Commit -Recently modified CVEs: `36` - -- [CVE-2024-29880](CVE-2024/CVE-2024-298xx/CVE-2024-29880.json) (`2024-12-16T15:37:50.093`) -- [CVE-2024-31134](CVE-2024/CVE-2024-311xx/CVE-2024-31134.json) (`2024-12-16T15:53:28.913`) -- [CVE-2024-31136](CVE-2024/CVE-2024-311xx/CVE-2024-31136.json) (`2024-12-16T15:54:25.227`) -- [CVE-2024-31139](CVE-2024/CVE-2024-311xx/CVE-2024-31139.json) (`2024-12-16T15:56:36.237`) -- [CVE-2024-31140](CVE-2024/CVE-2024-311xx/CVE-2024-31140.json) (`2024-12-16T15:58:11.000`) -- [CVE-2024-35300](CVE-2024/CVE-2024-353xx/CVE-2024-35300.json) (`2024-12-16T15:48:36.930`) -- [CVE-2024-35301](CVE-2024/CVE-2024-353xx/CVE-2024-35301.json) (`2024-12-16T15:51:28.007`) -- [CVE-2024-35302](CVE-2024/CVE-2024-353xx/CVE-2024-35302.json) (`2024-12-16T15:42:19.513`) -- [CVE-2024-36362](CVE-2024/CVE-2024-363xx/CVE-2024-36362.json) (`2024-12-16T15:41:48.623`) -- [CVE-2024-36363](CVE-2024/CVE-2024-363xx/CVE-2024-36363.json) (`2024-12-16T15:41:02.967`) -- [CVE-2024-36364](CVE-2024/CVE-2024-363xx/CVE-2024-36364.json) (`2024-12-16T15:40:49.667`) -- [CVE-2024-36365](CVE-2024/CVE-2024-363xx/CVE-2024-36365.json) (`2024-12-16T15:52:04.303`) -- [CVE-2024-36366](CVE-2024/CVE-2024-363xx/CVE-2024-36366.json) (`2024-12-16T15:52:21.477`) -- [CVE-2024-36367](CVE-2024/CVE-2024-363xx/CVE-2024-36367.json) (`2024-12-16T15:15:11.200`) -- [CVE-2024-36368](CVE-2024/CVE-2024-363xx/CVE-2024-36368.json) (`2024-12-16T15:14:56.433`) -- [CVE-2024-36369](CVE-2024/CVE-2024-363xx/CVE-2024-36369.json) (`2024-12-16T15:14:39.120`) -- [CVE-2024-36370](CVE-2024/CVE-2024-363xx/CVE-2024-36370.json) (`2024-12-16T15:42:30.397`) -- [CVE-2024-4835](CVE-2024/CVE-2024-48xx/CVE-2024-4835.json) (`2024-12-16T15:10:13.577`) -- [CVE-2024-56074](CVE-2024/CVE-2024-560xx/CVE-2024-56074.json) (`2024-12-16T16:15:09.250`) -- [CVE-2024-56082](CVE-2024/CVE-2024-560xx/CVE-2024-56082.json) (`2024-12-16T16:15:09.460`) -- [CVE-2024-56084](CVE-2024/CVE-2024-560xx/CVE-2024-56084.json) (`2024-12-16T16:15:09.647`) -- [CVE-2024-56085](CVE-2024/CVE-2024-560xx/CVE-2024-56085.json) (`2024-12-16T16:15:09.803`) -- [CVE-2024-56086](CVE-2024/CVE-2024-560xx/CVE-2024-56086.json) (`2024-12-16T16:15:09.980`) -- [CVE-2024-56087](CVE-2024/CVE-2024-560xx/CVE-2024-56087.json) (`2024-12-16T16:15:10.147`) -- [CVE-2024-56112](CVE-2024/CVE-2024-561xx/CVE-2024-56112.json) (`2024-12-16T16:15:10.313`) +Recently modified CVEs: `24` + +- [CVE-2023-29476](CVE-2023/CVE-2023-294xx/CVE-2023-29476.json) (`2024-12-16T18:15:05.407`) +- [CVE-2024-0020](CVE-2024/CVE-2024-00xx/CVE-2024-0020.json) (`2024-12-16T18:59:20.550`) +- [CVE-2024-0021](CVE-2024/CVE-2024-00xx/CVE-2024-0021.json) (`2024-12-16T18:55:59.723`) +- [CVE-2024-0023](CVE-2024/CVE-2024-00xx/CVE-2024-0023.json) (`2024-12-16T18:52:54.037`) +- [CVE-2024-0032](CVE-2024/CVE-2024-00xx/CVE-2024-0032.json) (`2024-12-16T18:45:35.897`) +- [CVE-2024-11834](CVE-2024/CVE-2024-118xx/CVE-2024-11834.json) (`2024-12-16T18:15:08.243`) +- [CVE-2024-11841](CVE-2024/CVE-2024-118xx/CVE-2024-11841.json) (`2024-12-16T17:15:07.830`) +- [CVE-2024-12668](CVE-2024/CVE-2024-126xx/CVE-2024-12668.json) (`2024-12-16T17:15:09.700`) +- [CVE-2024-46971](CVE-2024/CVE-2024-469xx/CVE-2024-46971.json) (`2024-12-16T17:15:09.957`) +- [CVE-2024-49513](CVE-2024/CVE-2024-495xx/CVE-2024-49513.json) (`2024-12-16T17:15:10.130`) +- [CVE-2024-52063](CVE-2024/CVE-2024-520xx/CVE-2024-52063.json) (`2024-12-16T17:15:10.447`) +- [CVE-2024-5333](CVE-2024/CVE-2024-53xx/CVE-2024-5333.json) (`2024-12-16T17:15:14.070`) +- [CVE-2024-54465](CVE-2024/CVE-2024-544xx/CVE-2024-54465.json) (`2024-12-16T18:15:11.023`) +- [CVE-2024-54504](CVE-2024/CVE-2024-545xx/CVE-2024-54504.json) (`2024-12-16T18:15:11.317`) +- [CVE-2024-55636](CVE-2024/CVE-2024-556xx/CVE-2024-55636.json) (`2024-12-16T18:15:11.463`) +- [CVE-2024-55637](CVE-2024/CVE-2024-556xx/CVE-2024-55637.json) (`2024-12-16T18:15:11.673`) +- [CVE-2024-55638](CVE-2024/CVE-2024-556xx/CVE-2024-55638.json) (`2024-12-16T18:15:11.840`) +- [CVE-2024-55663](CVE-2024/CVE-2024-556xx/CVE-2024-55663.json) (`2024-12-16T18:15:12.030`) +- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-16T18:15:12.170`) +- [CVE-2024-55969](CVE-2024/CVE-2024-559xx/CVE-2024-55969.json) (`2024-12-16T17:15:12.337`) +- [CVE-2024-55970](CVE-2024/CVE-2024-559xx/CVE-2024-55970.json) (`2024-12-16T17:15:12.517`) +- [CVE-2024-56072](CVE-2024/CVE-2024-560xx/CVE-2024-56072.json) (`2024-12-16T17:15:13.500`) +- [CVE-2024-56073](CVE-2024/CVE-2024-560xx/CVE-2024-56073.json) (`2024-12-16T17:15:13.700`) +- [CVE-2024-56083](CVE-2024/CVE-2024-560xx/CVE-2024-56083.json) (`2024-12-16T17:15:13.883`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0f3de27fd37..dfb5814fb97 100644 --- a/_state.csv +++ b/_state.csv @@ -222938,7 +222938,7 @@ CVE-2023-29471,0,0,72b13cb96b5651ca7898f495eb65cda22ef4f5f9064813e6aa6721de200f1 CVE-2023-29473,0,0,962b25368971eecc0256cc5b0b5fd386654955c54f9062b5d68c4eba7d43005e,2024-11-21T07:57:08.040000 CVE-2023-29474,0,0,4d49bb7998baa32821ffa2bda0888222ce3e7ecfecd2a3e20e56cc265682b2cc,2024-11-21T07:57:08.170000 CVE-2023-29475,0,0,33c83edd70229d4c831ae9bdd415364683573ea08af12a4ddc98823fa2c19e92,2024-11-21T07:57:08.320000 -CVE-2023-29476,0,0,c552ab9c8deba3b35895b2328a155a527925be4b99b0449fd5edf1a549a3beec,2024-12-14T02:15:05.010000 +CVE-2023-29476,0,1,f4467f4a63c07a4c1a484e903608aee20437efb62449a239dc234f1002de3f1f,2024-12-16T18:15:05.407000 CVE-2023-29478,0,0,26a52af1e5d65e98c54e4beb2236d3bd1d72cbaf6c697669c6c21aef239832ad,2024-11-21T07:57:08.477000 CVE-2023-29479,0,0,75350b83cbe774edaed33a6f0ed3e2780cfb5405492749d3c46a0119080823c2,2024-11-21T07:57:08.613000 CVE-2023-2948,0,0,55ff93f2536f57f582b4c866dbe6ee94baa3d857520bccfc83121a8e8d3e0770,2024-11-21T07:59:37.673000 @@ -238972,7 +238972,7 @@ CVE-2023-51437,0,0,3584720eedf04b04f2e09058cca23f5afdd9d02462918fd964831be4c70a5 CVE-2023-51438,0,0,8b57066a2170f7efa5f617638585454da7553cffe77ff12e85c87b51307a3b43,2024-11-21T08:38:07.097000 CVE-2023-51439,0,0,07e3f967adf6e067a5007c2997189ef647925bb49dc0cac9e75e7eb78e5a19a0,2024-11-21T08:38:07.233000 CVE-2023-5144,0,0,e230aee2f50c279d6a7bf97e9d423e73ca96e7d03ac8e790fe03edf225e226bf,2024-11-21T08:41:09.130000 -CVE-2023-51440,0,1,1169f2ff9e326f6a3788f618809df1fe8188ee99151bee69ee1c834192da21a5,2024-12-16T15:17:29.160000 +CVE-2023-51440,0,0,1169f2ff9e326f6a3788f618809df1fe8188ee99151bee69ee1c834192da21a5,2024-12-16T15:17:29.160000 CVE-2023-51441,0,0,a1f5c39c8dff7bf99bb5a5fa410c3c1174c89222db585eebd25100439c38d134,2024-11-21T08:38:07.500000 CVE-2023-51442,0,0,1c1738101beb2069f2b1a7e3fda08286945bd667c62bf8c2c6862c2db1b18d8f,2024-11-21T08:38:07.630000 CVE-2023-51443,0,0,bc5dfbcf2d47b2402929c15b90b4be90f3f7485f94767446ff8ec5a8bbd43f0a,2024-11-21T08:38:07.743000 @@ -242114,10 +242114,10 @@ CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b CVE-2024-0017,0,0,c3ae32d0f7f4b3aee825adaba904bd8ea33c38296423e6c492125686085b5834,2024-12-16T14:32:15.203000 CVE-2024-0018,0,0,d830c3744ce7a1ea7f6c39445a382f844f81a27df6247e0448e915abade197f3,2024-11-21T08:45:42.823000 CVE-2024-0019,0,0,32676e58ef99a34d73bcad3e1d9b1fffb8ca52e74728e2a4d9bd79fcb16e9aba,2024-11-26T15:17:07.267000 -CVE-2024-0020,0,0,a7f71403b00e8819c568cbd4da089b2f2d73314abaa1e33ca09f6668eaa3ac63,2024-11-21T08:45:43.150000 -CVE-2024-0021,0,0,0b09419c631a83c2e0173ea081d8d4d431c85176d3367d4108e4376ab043cfaf,2024-11-21T08:45:43.327000 +CVE-2024-0020,0,1,84928478478ec6809853ed64e00fe038f952f115b30fa79973cc6031347ede5f,2024-12-16T18:59:20.550000 +CVE-2024-0021,0,1,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000 CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000 -CVE-2024-0023,0,0,2c5283ba5f69d5b35bdcafacd8c3bb3fc1b47a021cd1395277d3176d88dc20de,2024-11-21T08:45:43.637000 +CVE-2024-0023,0,1,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000 CVE-2024-0024,0,0,8b2a7fecb30ba159a81d4a685b53d71dcaa17cb8849060989b248099d4dec740,2024-11-21T08:45:43.840000 CVE-2024-0025,0,0,fcc23fa9a29c464037587349b9e70e9f44d7e9735554b5b727ef0a2ddc8f76ab,2024-11-21T08:45:44.037000 CVE-2024-0026,0,0,402f95a09c007a153e715c72fcc1825728454f11232829fa5e802f731eb2394a,2024-11-21T08:45:44.270000 @@ -242125,11 +242125,11 @@ CVE-2024-0027,0,0,b2a84f2d4b2f53d34ad30427c6bd8e738cf3e7ce005b8b01e2ee1d9785af83 CVE-2024-0029,0,0,54ad939fb09b28b9a1b5b297173525d0cf8c95e5cd8fd33ef3e316cfd2aa0803,2024-11-26T16:30:39.007000 CVE-2024-0030,0,0,392408319dcaec46385fe693f357c0df3e50b5e2fa5a22a71957a26c641ecb59,2024-11-21T08:45:44.747000 CVE-2024-0031,0,0,5f5175781e0edb19e7130aa9448b97602753567266b28a532105d12cce9e7c14,2024-11-21T08:45:44.933000 -CVE-2024-0032,0,0,7123161259f1e9254478469320c78d2c0889db98bc8b43ff7620177129fc9761,2024-11-21T08:45:45.123000 +CVE-2024-0032,0,1,2869a92c4ec4dc0012478b0fee11fee5d3cd82b831431d094d1665ef7a26fc62,2024-12-16T18:45:35.897000 CVE-2024-0033,0,0,78c45fcb534fdaa9e2d5a3aa73cdc05c9dd9a5f18840670fac4782be689257dd,2024-11-21T08:45:45.323000 -CVE-2024-0034,0,1,471bb92a857d05af28fe1adbdefa9a500cdf4aefc38bc7d55963449cb47c1cf3,2024-12-16T16:07:35.377000 -CVE-2024-0035,0,1,8f7e78db3211a3833a978a1f4a85563c71b64db0c3d044ea96edc4f8e2a75fad,2024-12-16T15:59:54.053000 -CVE-2024-0036,0,1,f9a5e9ac00eb63f9c5368c4edb5f07dae83774a08385359f41cf881322018329,2024-12-16T15:58:38.657000 +CVE-2024-0034,0,0,471bb92a857d05af28fe1adbdefa9a500cdf4aefc38bc7d55963449cb47c1cf3,2024-12-16T16:07:35.377000 +CVE-2024-0035,0,0,8f7e78db3211a3833a978a1f4a85563c71b64db0c3d044ea96edc4f8e2a75fad,2024-12-16T15:59:54.053000 +CVE-2024-0036,0,0,f9a5e9ac00eb63f9c5368c4edb5f07dae83774a08385359f41cf881322018329,2024-12-16T15:58:38.657000 CVE-2024-0037,0,0,394cfced2a2723a704c6cbe26977af45d337b3a1bb3716915c523e280e7c05c0,2024-12-03T16:15:20.440000 CVE-2024-0038,0,0,3d81078dd62d86232d623581052ff5d9f3751e2257f7c896e2d37fe459fcab8b,2024-11-21T08:45:46.180000 CVE-2024-0039,0,0,f51d4c38ebb3cc46492f31896efa747baab58b2bc83ee86fcd45588ba3e8a558,2024-11-26T14:26:56.233000 @@ -243075,6 +243075,7 @@ CVE-2024-10091,0,0,244835544befc14a0ba664699f50b681fca0c5387af75b0db99291b956c48 CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000 CVE-2024-10093,0,0,c59046555fb4e55c30f34ec91ac62910be408e9628c1cf31aaf113495f33e4fd,2024-11-01T18:07:07.003000 CVE-2024-10094,0,0,e63fac5d529dc5bceb010fd479146f46858cd90c1e360601f682aec7c32291c2,2024-11-21T13:57:24.187000 +CVE-2024-10095,1,1,f02d4c4afddaa224b97fe2844cf121a9dc5e62c057c943ae30314d6029474d8f,2024-12-16T17:15:06.757000 CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000 CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000 CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000 @@ -243786,7 +243787,7 @@ CVE-2024-10968,0,0,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1 CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000 CVE-2024-1097,0,0,f1ad2b99b98b2176c3b3ccdd494bed6625a86a9f96e0ed3a25e7d4f3cd789ac4,2024-11-19T19:05:30.620000 CVE-2024-10971,0,0,f8d3e9d67661e4546a1e254ebb74d5d0c1dddae1c4d768a7ce5fd78bda7de46d,2024-11-21T08:49:10.613000 -CVE-2024-10972,1,1,a8452c8051948f0543ecfcf985d65809bb0e2321a958294c43af09b4639f54ea,2024-12-16T16:15:05.880000 +CVE-2024-10972,0,0,a8452c8051948f0543ecfcf985d65809bb0e2321a958294c43af09b4639f54ea,2024-12-16T16:15:05.880000 CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000 CVE-2024-10976,0,0,74ddf3e112f382a760946f483990fa0747a570c018c9e28cec5188371748074d,2024-11-15T13:58:08.913000 CVE-2024-10977,0,0,e54cdfcf4a6415150b7b9a534f3117ac0a47dcbb5949b9162862d5471ded9bdf,2024-11-15T13:58:08.913000 @@ -243927,6 +243928,7 @@ CVE-2024-11136,0,0,725bf56498e2623c27a356d77c56c56ec2fbb4238d9582d18b0c73a291d68 CVE-2024-11138,0,0,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000 CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000 CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7fdab,2024-11-18T15:03:56.927000 +CVE-2024-11144,1,1,f08526b432b1f1ab099a892695aa9093b7e404008207635206c0eaaf7eabe184,2024-12-16T17:15:07.327000 CVE-2024-11145,0,0,49d8db8e9affdc9bd928055d93b635f15e5703854689b5be5f582242400a9150,2024-11-26T20:15:25.270000 CVE-2024-11148,0,0,98721a67b15a1bf200a0df48032e3c1b10f0381f700111d548ae742962375902,2024-12-05T20:15:21.577000 CVE-2024-11149,0,0,bed9c80af9d2c073bb9f97513f448d6c4275a45d3277b166d6da853b66ab77cf,2024-12-06T02:15:18.127000 @@ -244074,6 +244076,7 @@ CVE-2024-11352,0,0,de3582e15d7397e011d69382c9fedc502b246facf9b57003a974bb327fc47 CVE-2024-11353,0,0,9cdabea534e964700c7cde9ffd2f1a82245a0291b01694ff89cf8e86136ee6b3,2024-12-07T02:15:17.850000 CVE-2024-11354,0,0,87986c107f2d598ec9b5e54e0419b4149d63b452699e5d17cc10ffbc61f46d56,2024-11-26T17:34:55.767000 CVE-2024-11355,0,0,bcd06b7aaf6858bb0e6c5d2b1c10c8ea5c66a082156d2df4f7c406b73d08ca66,2024-11-22T06:15:19.450000 +CVE-2024-11358,1,1,9c29acb19be432b0d1c8b4571c77fdd7aac25afd1a8c7b51109e23b01d05753a,2024-12-16T17:15:07.543000 CVE-2024-11359,0,0,df4c05f348228b2c2882e44a6e533849bb9a56f9c6073e32478ef7ab197c57b9,2024-12-12T06:15:21.157000 CVE-2024-1136,0,0,f1cac8b5fbb038c0eb6351f127c8e971963556b8c2146fbf8d7dfc6a2c8abb13,2024-11-21T08:49:52.597000 CVE-2024-11360,0,0,659b24fc81e4938ca0374fdfc531183f0da8359af24c60f66cd39ca705cc7b8c,2024-11-26T17:36:08.113000 @@ -244085,7 +244088,7 @@ CVE-2024-11367,0,0,eea02b3c7a7e23b6b50200379882a96782686712f1c754d90239651a5f9c3 CVE-2024-11368,0,0,bf7c67e11e8f973c6ac3bae21678c3dfeb626f80e34696e9e29adffce5777903,2024-12-06T09:15:06.810000 CVE-2024-1137,0,0,9367f9a1347684403f58a1a7490fd736dd1a246a1ba5d989931872114e882ed8,2024-11-21T08:49:52.723000 CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a5a5,2024-11-26T17:53:22.707000 -CVE-2024-11371,0,1,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000 +CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000 CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000 CVE-2024-11379,0,0,9fd00eb3fec3062cfc458a7971d09425d25dcca0c806b20326864d85b70adea6,2024-12-06T05:15:05.813000 CVE-2024-1138,0,0,786863f5efe71d0a9eaa305ef044215c6743ec975f6d66476179ca38c53c9996,2024-11-21T08:49:52.860000 @@ -244452,7 +244455,7 @@ CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000 CVE-2024-11832,0,0,8b0dd6cab9b72e2220ce0d13c7004e80ede6e8f2153990f5deeb098e304f1be6,2024-12-13T09:15:06.113000 CVE-2024-11833,0,0,2f00371e995b5b3574e742c8a1281cd097aa61871ee6812330dd6292e5403d49,2024-12-13T06:15:25.233000 -CVE-2024-11834,0,0,32a52d49234816e9557fa45f6a76ac8c14f4ea0db12d1634f2d048caa457b493,2024-12-13T06:15:25.440000 +CVE-2024-11834,0,1,124fbdacb7bd4bad593c6266594bab85739315b08458d1106e21c16eada45fb6,2024-12-16T18:15:08.243000 CVE-2024-11835,0,0,5262f682f44a74d58169f278da5e25511d007423370483539a8b966372b21d48,2024-12-13T06:15:25.600000 CVE-2024-11836,0,0,003744d3f220361dcb4831ee31d575701f7d105a01b33cc3a4ff7944dfd2fe7a,2024-12-13T06:15:25.773000 CVE-2024-11837,0,0,8b7bd567beedbfd0c18387b1888c8edd3260895c266bf5814b72efe7fb0a74ee,2024-12-13T06:15:25.940000 @@ -244460,7 +244463,7 @@ CVE-2024-11838,0,0,8994bf4ba33c708774af24b47413b334fdb73ca6b30384c2ca962cc19efcb CVE-2024-11839,0,0,c6c976e0661e60ecd7ad88e86bf60ee8d9fd80cc1c530b3d2b4318b3ad131ec6,2024-12-13T06:15:26.273000 CVE-2024-1184,0,0,7b0789c4e91a5162e06df6289a54d1b7f2607f1e0a44e814477ad9c07a354474,2024-11-21T08:49:59.067000 CVE-2024-11840,0,0,4f72dc8e1aec5c10e4842e27b0438d261a566769857022259f6d9b1c51e882be,2024-12-11T11:15:06.453000 -CVE-2024-11841,0,0,fdd18db2374966bd7dc4cfdbec465833272ac15516b4a57ac873a01de2ea53c0,2024-12-16T06:15:05.967000 +CVE-2024-11841,0,1,5c0f2d8274526d4090561f62dace7be849ae77b1db667d3f21e08e09571358c4,2024-12-16T17:15:07.830000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 @@ -244587,11 +244590,11 @@ CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af0 CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000 CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669a9,2024-11-21T08:50:02.590000 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 -CVE-2024-12089,1,1,35579275f245f8abce3408536aa5095aa5e154dac9874b34a8b8a8f03b8928ca,2024-12-16T15:15:06.250000 +CVE-2024-12089,0,0,35579275f245f8abce3408536aa5095aa5e154dac9874b34a8b8a8f03b8928ca,2024-12-16T15:15:06.250000 CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf29,2024-11-21T08:50:02.720000 -CVE-2024-12090,1,1,592f70094ac2defca897b0b815661e4e72d372434ec3a36d037560a2bd533869,2024-12-16T15:15:06.393000 -CVE-2024-12091,1,1,55429089808d3b1b0c87db110a9ba30611724cc492c723f42d30aed06c679a68,2024-12-16T15:15:06.540000 -CVE-2024-12092,1,1,3f535d8ca993ecc4a654c9afeb7c9accc42dadb82d4deddb5adc62262546f5c6,2024-12-16T15:15:06.677000 +CVE-2024-12090,0,0,592f70094ac2defca897b0b815661e4e72d372434ec3a36d037560a2bd533869,2024-12-16T15:15:06.393000 +CVE-2024-12091,0,0,55429089808d3b1b0c87db110a9ba30611724cc492c723f42d30aed06c679a68,2024-12-16T15:15:06.540000 +CVE-2024-12092,0,0,3f535d8ca993ecc4a654c9afeb7c9accc42dadb82d4deddb5adc62262546f5c6,2024-12-16T15:15:06.677000 CVE-2024-12094,0,0,918109c0341953bed354c9dc0c1e3bf994d002b139d0d147a6756e1d0b4180c2,2024-12-05T13:15:05.923000 CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e262d,2024-12-04T04:15:04.287000 CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf76,2024-11-21T08:50:02.867000 @@ -244801,10 +244804,16 @@ CVE-2024-12644,0,0,4fe46a77976cb26c8db1a8817f8d60588d7d627c677def113b1f0c3da34da CVE-2024-12645,0,0,e2bf7e02fc7f9b197fb94f8f3f7739958eb1e7eb714f268785ecfdf27c30d30a,2024-12-16T07:15:06.560000 CVE-2024-12646,0,0,edf55cca2f63c5514783a7adeb1b585499807b56f798173f78bff573d5a90371,2024-12-16T07:15:06.737000 CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000 -CVE-2024-12653,1,1,6f848225024de4c14a49213377e690a08093550ba762598c765246a77e1e7837,2024-12-16T16:15:06.593000 -CVE-2024-12654,1,1,1a7da902bc86773b1718a5279a6b089664e285ca426600f81a29cdf8c07c3da6,2024-12-16T16:15:06.810000 +CVE-2024-12653,0,0,6f848225024de4c14a49213377e690a08093550ba762598c765246a77e1e7837,2024-12-16T16:15:06.593000 +CVE-2024-12654,0,0,1a7da902bc86773b1718a5279a6b089664e285ca426600f81a29cdf8c07c3da6,2024-12-16T16:15:06.810000 +CVE-2024-12655,1,1,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000 +CVE-2024-12656,1,1,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000 +CVE-2024-12657,1,1,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000 +CVE-2024-12658,1,1,7138d2d849a9c48736414141f6e0f5483806b353b70b5f0986a2bb641f83c92f,2024-12-16T18:15:10.120000 +CVE-2024-12659,1,1,57b490eadd8ce7187dbe6a8f2a837f89476ea13c3f86aa8843b1da895a3678e6,2024-12-16T18:15:10.320000 CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000 -CVE-2024-12668,1,1,48a2fb57d83e468aa496fa3a0255cb41d017e39cd852327d1b47084911750b1d,2024-12-16T15:15:06.807000 +CVE-2024-12660,1,1,bb60da334f54db48dcd94342bf183fd2a72d6a12db86075b10598ae509d99f19,2024-12-16T18:15:10.533000 +CVE-2024-12668,0,1,2d75ced822d853be6c6d0f513771edc99398324227c8582be01ec3a2f5a7e3b4,2024-12-16T17:15:09.700000 CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33c4,2024-11-21T08:50:11.937000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 @@ -251834,8 +251843,8 @@ CVE-2024-2817,0,0,a8e11bee63949fb5218bd8db482262b5fdebf72e6367810e717aa9c25999d5 CVE-2024-28170,0,0,7e6501225f83f8e70d6fbf4eb86cd8c9cc85dbebd043b17850d89b9ed51ed334,2024-09-23T14:49:17.057000 CVE-2024-28171,0,0,b5eb85b06e2fe7be5f52608a9079412a2fea6983ee47a02bf32589033a75973c,2024-11-21T09:05:57.300000 CVE-2024-28172,0,0,ba5b0fee0a00ad08e11b31067bab56fedfbf935900fad85372a5827fc2a22a1a,2024-09-06T18:36:10.863000 -CVE-2024-28173,0,1,ea128472b844ae9d393924075ea3785042942393668417797d1acc5674d32bd2,2024-12-16T15:11:43.620000 -CVE-2024-28174,0,1,6dfd63f7b3e20facd0f59fc87c055b11b6d81d8ff8cd2c3f65e9da350b856bce,2024-12-16T15:07:02.497000 +CVE-2024-28173,0,0,ea128472b844ae9d393924075ea3785042942393668417797d1acc5674d32bd2,2024-12-16T15:11:43.620000 +CVE-2024-28174,0,0,6dfd63f7b3e20facd0f59fc87c055b11b6d81d8ff8cd2c3f65e9da350b856bce,2024-12-16T15:07:02.497000 CVE-2024-28175,0,0,d3ff2e666b1aedf8b388410f078a1d5d7af943680bbf262f67250c6a4b9da239,2024-11-21T09:05:57.817000 CVE-2024-28176,0,0,8e2712bfe1ea7116f11f8ad9a2861387b20c6463817c56944eede5e5ddf4bb41,2024-11-21T09:05:57.947000 CVE-2024-28179,0,0,7f82026281e2dd9f15927caa04d85bc2295c5beb1cf03576e742ef34b4c15043,2024-11-21T09:05:58.083000 @@ -251875,10 +251884,10 @@ CVE-2024-2822,0,0,eac17cb2010c91c3b838b4ace8eb55a7b3846d55205a1f1ec1bcafa75ea3a9 CVE-2024-28222,0,0,a6f532e094121d2d3ca88f2594b97947ed6d0fe5027ca5c1ac4a5899d887e85c,2024-11-21T09:06:02.470000 CVE-2024-28224,0,0,4dc495d1b5391a5805b35b2cccf549718cba127cbcdb7a2bab566e35ee9808ef,2024-11-21T09:06:02.613000 CVE-2024-28226,0,0,a04adc45d47426d327f332ffc617a958172e7494aece288fc40840e9be086147,2024-11-21T09:06:02.767000 -CVE-2024-28228,0,1,4c70949e6df8bcf2882fac2da178d0d5c63a3ff277dc66365cbdd98196ca17b4,2024-12-16T15:06:31.563000 -CVE-2024-28229,0,1,91f2c6bf4f4cd9f37b886899d3e16c101d8f0aeb77afc57f338cfea95f7a2e46,2024-12-16T15:06:00.407000 +CVE-2024-28228,0,0,4c70949e6df8bcf2882fac2da178d0d5c63a3ff277dc66365cbdd98196ca17b4,2024-12-16T15:06:31.563000 +CVE-2024-28229,0,0,91f2c6bf4f4cd9f37b886899d3e16c101d8f0aeb77afc57f338cfea95f7a2e46,2024-12-16T15:06:00.407000 CVE-2024-2823,0,0,616fd3f02b6fbcafbe8ddb74810cbccaf8c5a31f6fdd4cffc69174176dca38cf,2024-11-21T09:10:36.770000 -CVE-2024-28230,0,1,6ee006a554d642707dd81d0df925d8a02a1d248529abab0f06a8e2dc084c1b89,2024-12-16T15:05:43.290000 +CVE-2024-28230,0,0,6ee006a554d642707dd81d0df925d8a02a1d248529abab0f06a8e2dc084c1b89,2024-12-16T15:05:43.290000 CVE-2024-28231,0,0,879955e0d3b6b3f4d0d07366e36d2b8c1d2a204b3e9eb4c9d2fa328320c752b1,2024-11-21T09:06:03.257000 CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b268b,2024-11-21T09:06:03.400000 CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd7903646892b5,2024-11-21T09:06:03.527000 @@ -252113,7 +252122,7 @@ CVE-2024-28734,0,0,248da8578808414567db67c3b503066a14a98351080fe64fbc15bb46c363a CVE-2024-28735,0,0,81c41919d4a8ef295ba05c2dc2d0919e7f08d346fde9111b328dce84910fee98,2024-11-21T09:06:51.010000 CVE-2024-28736,0,0,df782a0cdc83649a96a984c1b8ce3c2c9e002e8bd9b3d64936ef7e71c1609578,2024-11-21T09:06:51.233000 CVE-2024-28739,0,0,6f446ff59c9537aa4b5a8742ebfdad671a80a577ee582bd1a98b3db07755c8bd,2024-08-12T18:18:17.717000 -CVE-2024-2874,0,1,a31e28465fa71f9062d6319cfc3c8d1fe0a152aed175717a5e9e88a324585636,2024-12-16T15:16:54.830000 +CVE-2024-2874,0,0,a31e28465fa71f9062d6319cfc3c8d1fe0a152aed175717a5e9e88a324585636,2024-12-16T15:16:54.830000 CVE-2024-28740,0,0,59845f313cbdf7224a1102cca1548a45ffb7fb3b8466fe620d06a9769009859b,2024-08-21T18:35:02.877000 CVE-2024-28741,0,0,335d1d75b1ec6bbbe9be7839da86be48fa75d600721df7343911718962694585,2024-11-21T09:06:51.950000 CVE-2024-28744,0,0,d80a636691f100f09a75e0a042c51fb3034a953b6a967d3f70a481b8b5994955,2024-11-21T09:06:52.213000 @@ -252885,7 +252894,7 @@ CVE-2024-29877,0,0,1774d4393b3ff2ccfcfc5a29fc6ef0d37b991c57ff8178133ee1c75ebd25c CVE-2024-29878,0,0,b112e821bf25760d8f5117d180bbfc649df8c2437b8c0edc8c25982c8862833e,2024-11-21T09:08:31.983000 CVE-2024-29879,0,0,1b8943394f9c1e900ed5064335f48840161d8b3aac0cefe300ca3a232ca4d80c,2024-11-21T09:08:32.130000 CVE-2024-2988,0,0,0d8a449922d54da18a868cebeeb21ba624977357d60b1e4dc7eac81c52a5d04b,2024-11-21T09:10:59.853000 -CVE-2024-29880,0,1,9ac6e81333477f282048eba209d47dc5f78b687ca71971db5702c5608a33ba05,2024-12-16T15:37:50.093000 +CVE-2024-29880,0,0,9ac6e81333477f282048eba209d47dc5f78b687ca71971db5702c5608a33ba05,2024-12-16T15:37:50.093000 CVE-2024-29881,0,0,26411cffafa6bc6e69a94607cec3788fdb2462e04af812e3926cbb73aee7ce39,2024-11-21T09:08:32.393000 CVE-2024-29882,0,0,5a7d27dfebf9283de120d3cc19d723effc0c21b4416e04c71ef61e855a255211,2024-11-21T09:08:32.530000 CVE-2024-29883,0,0,a32da929a11d0ffe72f11a5dde39ceab05026d6c4c48b837c40a2f2a8b8c6318,2024-11-21T09:08:32.667000 @@ -253896,14 +253905,14 @@ CVE-2024-31121,0,0,17a27d33fe8a21f76c62822e8bd0b5425e66dca9d6d98c456685474852fd8 CVE-2024-31122,0,0,c51a5712bdbe0f189f233e0d8822c1782400145d92344ed8488a068152cb5597,2024-11-21T09:12:53.767000 CVE-2024-31123,0,0,403d3e968ce2b5e26d5481a0f21ce8d416f8c3ec1d4ca02c2071acb75c924ac7,2024-11-21T09:12:53.900000 CVE-2024-3113,0,0,32406a8ec0c24639328b41deaf4f2ff4769d38d909f91472c26a9693bb2f9a7c,2024-11-21T09:28:55.750000 -CVE-2024-31134,0,1,684ec4fb3ab1d4b94622e466bd62b4b2952a0217846316306405c4f6193f7b3b,2024-12-16T15:53:28.913000 +CVE-2024-31134,0,0,684ec4fb3ab1d4b94622e466bd62b4b2952a0217846316306405c4f6193f7b3b,2024-12-16T15:53:28.913000 CVE-2024-31135,0,0,6f570ab7f122a6ad49c3fa62728d41ae46d24bf44d47ac54c704b6fb6a9d101f,2024-11-21T09:12:54.143000 -CVE-2024-31136,0,1,f5b8b98e9005d7bb3352f2ee91334c4ca64999580be42c2fe381aa49e3d825e8,2024-12-16T15:54:25.227000 +CVE-2024-31136,0,0,f5b8b98e9005d7bb3352f2ee91334c4ca64999580be42c2fe381aa49e3d825e8,2024-12-16T15:54:25.227000 CVE-2024-31137,0,0,aecbff13a0ee8c906b42d718c3c8ed151cfc9064e4b1a866402d907eb4710bbd,2024-11-21T09:12:54.400000 CVE-2024-31138,0,0,a14830dd632eab19efd921efe1eecfd04c7766923aade8813413aec3b3c0940b,2024-11-21T09:12:54.537000 -CVE-2024-31139,0,1,d91f493db8c81bb4b5d794b8f2a363ddcea640c7742984db8441987b1d195e49,2024-12-16T15:56:36.237000 +CVE-2024-31139,0,0,d91f493db8c81bb4b5d794b8f2a363ddcea640c7742984db8441987b1d195e49,2024-12-16T15:56:36.237000 CVE-2024-3114,0,0,ade433a65127555302d65b2c164d94e533c3b45e4239cf2791c7a999f14d794c,2024-08-30T14:15:15.937000 -CVE-2024-31140,0,1,8d4feb999561527fd03ad2e67dd311029f29e7334774d14942143f4dc9376a40,2024-12-16T15:58:11 +CVE-2024-31140,0,0,8d4feb999561527fd03ad2e67dd311029f29e7334774d14942143f4dc9376a40,2024-12-16T15:58:11 CVE-2024-31141,0,0,63f66ffcfa72f4318f3e7b758344a36b89d8424c883759a26f5d11cd5df1f6b7,2024-11-21T09:12:54.913000 CVE-2024-31142,0,0,f0e25bdb8c8839bef9c14d66586bad0c1ebbce2b2125a4db27230c001518faa1,2024-11-21T09:12:55.110000 CVE-2024-31143,0,0,4790e02a9527ae34971a6ec375e16b193baf2e8575d041b48c7869872729bd6c,2024-11-21T09:12:55.220000 @@ -257015,9 +257024,9 @@ CVE-2024-35297,0,0,23e69c7fa8758d2839ba0f21232e1c70c9a4debd79526bb77618b215f0e86 CVE-2024-35298,0,0,fa7788bf317a71a84bf8146795eafa26bcb4ed57f180f49f693caedd58415924,2024-11-21T09:20:06.100000 CVE-2024-35299,0,0,66ebbab2b0a692e2b1d921e2a31108ce541366992eb29d6d2df1746eef7b2b2c,2024-11-21T09:20:06.297000 CVE-2024-3530,0,0,19a26ee56ded29d2e11b10a192b107effee98b98e60c5d0c5a925841596c5055,2024-11-21T09:29:47.480000 -CVE-2024-35300,0,1,8476854df88ded7ab4fe4db1007017684a43223b3513105c5d461b5e9e5fe242,2024-12-16T15:48:36.930000 -CVE-2024-35301,0,1,3aa290a2314ba6b70fc37ae1db563a8252a1099fb3aea3ee731b4ca2cd8d2137,2024-12-16T15:51:28.007000 -CVE-2024-35302,0,1,9009b11838ab554d52fcc535f98537996a71e65b1368667d6ed2e3cf5074b624,2024-12-16T15:42:19.513000 +CVE-2024-35300,0,0,8476854df88ded7ab4fe4db1007017684a43223b3513105c5d461b5e9e5fe242,2024-12-16T15:48:36.930000 +CVE-2024-35301,0,0,3aa290a2314ba6b70fc37ae1db563a8252a1099fb3aea3ee731b4ca2cd8d2137,2024-12-16T15:51:28.007000 +CVE-2024-35302,0,0,9009b11838ab554d52fcc535f98537996a71e65b1368667d6ed2e3cf5074b624,2024-12-16T15:42:19.513000 CVE-2024-35303,0,0,dbcf22354574acb019f75dca9d06610c5fcb14a1dfda0fbfd65584d0226f9c1e,2024-11-21T09:20:06.837000 CVE-2024-35304,0,0,7ed4f146fd33b6171600587adcbdeaead1decee1ed73e0b90178e1b104d7c926,2024-11-21T09:20:06.967000 CVE-2024-35305,0,0,0461a720e668c8959039a3652a36f33095f7babd165ee84239e034d727297a97,2024-11-21T09:20:07.110000 @@ -257871,16 +257880,16 @@ CVE-2024-36359,0,0,3cc0d651469873089668811614995b932e2a134931c52e95469939b03a9b9 CVE-2024-3636,0,0,4c7744b51293bd4e3a9aa3d916a63e7f32e699b3ac0ad0263818bae7fdeef663,2024-08-07T16:35:14.110000 CVE-2024-36360,0,0,86c2fec55966fb8ed1d52aee7a156763ceca1ae898ea75dea3ecbf7fdfbcc5e9,2024-11-21T09:22:01.170000 CVE-2024-36361,0,0,e4343f7ee38acd675bd11a78326fa9c9897eb116b95daf33a3c1581431d81b95,2024-11-21T09:22:01.357000 -CVE-2024-36362,0,1,3ff8b5091e460c716d44f313160232b1d6394a6c30faf8d66a18a697350ec2db,2024-12-16T15:41:48.623000 -CVE-2024-36363,0,1,af475d26473cb95c39d9a0b42996cb69848ffd5b957d41d1fad04fa0f7680c9f,2024-12-16T15:41:02.967000 -CVE-2024-36364,0,1,23c721ef2dd5dc0d28660a89f5c4460c041ac784dbb72ef83ff9a454e255184d,2024-12-16T15:40:49.667000 -CVE-2024-36365,0,1,dc44a45656061ade89d768d4fa2e992d74d2c4428342db72c2a67b9b28e1ca18,2024-12-16T15:52:04.303000 -CVE-2024-36366,0,1,1ad2bd86ee83972344f0b6d1bad7348c121df781e8bfb5e105b00680fac7ebfd,2024-12-16T15:52:21.477000 -CVE-2024-36367,0,1,641557a81dbb2c7e627cce689572504d103545c194da9b835536d1ed1a22c9ed,2024-12-16T15:15:11.200000 -CVE-2024-36368,0,1,db58c03bed12cd47c6e92371f3cee4963e9f815b9a39d4dd27c6c09d87c5337d,2024-12-16T15:14:56.433000 -CVE-2024-36369,0,1,86335f126149b45fcfe791d3a51b05f9b5c2ef6682670204bff02f19d0fd3666,2024-12-16T15:14:39.120000 +CVE-2024-36362,0,0,3ff8b5091e460c716d44f313160232b1d6394a6c30faf8d66a18a697350ec2db,2024-12-16T15:41:48.623000 +CVE-2024-36363,0,0,af475d26473cb95c39d9a0b42996cb69848ffd5b957d41d1fad04fa0f7680c9f,2024-12-16T15:41:02.967000 +CVE-2024-36364,0,0,23c721ef2dd5dc0d28660a89f5c4460c041ac784dbb72ef83ff9a454e255184d,2024-12-16T15:40:49.667000 +CVE-2024-36365,0,0,dc44a45656061ade89d768d4fa2e992d74d2c4428342db72c2a67b9b28e1ca18,2024-12-16T15:52:04.303000 +CVE-2024-36366,0,0,1ad2bd86ee83972344f0b6d1bad7348c121df781e8bfb5e105b00680fac7ebfd,2024-12-16T15:52:21.477000 +CVE-2024-36367,0,0,641557a81dbb2c7e627cce689572504d103545c194da9b835536d1ed1a22c9ed,2024-12-16T15:15:11.200000 +CVE-2024-36368,0,0,db58c03bed12cd47c6e92371f3cee4963e9f815b9a39d4dd27c6c09d87c5337d,2024-12-16T15:14:56.433000 +CVE-2024-36369,0,0,86335f126149b45fcfe791d3a51b05f9b5c2ef6682670204bff02f19d0fd3666,2024-12-16T15:14:39.120000 CVE-2024-3637,0,0,21120798a280816ab7cf3ed70bbd1f108404954e011a1d26b78f2314da517882,2024-11-21T09:30:03.153000 -CVE-2024-36370,0,1,7197b09dbd5b84f4171470c9be6f834edd16667f764d0dab4aed81738c95555d,2024-12-16T15:42:30.397000 +CVE-2024-36370,0,0,7197b09dbd5b84f4171470c9be6f834edd16667f764d0dab4aed81738c95555d,2024-12-16T15:42:30.397000 CVE-2024-36371,0,0,beae7d114ca51288bcc971c126cbd91dfe3a175d32b595469dfc3189b7a03bfa,2024-11-21T09:22:02.753000 CVE-2024-36372,0,0,f904fafce93cdb574512bc8038996ce8f1b1abc255493f4b077cf5906c5d7cda,2024-11-21T09:22:02.920000 CVE-2024-36373,0,0,14e86239fe2f2a099c98ef8abdeb611c7d0c29cd7d8e7616ee91094ab38c7a74,2024-11-21T09:22:03.053000 @@ -258530,7 +258539,7 @@ CVE-2024-37248,0,0,ec62e8d4fe2e7579113c2b37456d725796d20d1311148f2bb7c100ae2eef8 CVE-2024-37249,0,0,b28111764a4c58ed81f56cdf7ecccc4cecf9efe2cdc39c1ad5678b6845adaa22,2024-11-01T20:24:53.730000 CVE-2024-3725,0,0,18364719a7ffb6dcc031c07ec17bc162c26f3b343f96940fbe622dc91ac280c0,2024-11-21T09:30:15.123000 CVE-2024-37250,0,0,162a7b18dc3b3934e704845f5211211f8c1a8ee9037e336cce22b77790194428,2024-11-01T20:24:53.730000 -CVE-2024-37251,1,1,7c398b2bfbbabad1c95432ccf3ecaad2492e3c0433f3b9ae5c03871ccccb3e17,2024-12-16T15:15:06.970000 +CVE-2024-37251,0,0,7c398b2bfbbabad1c95432ccf3ecaad2492e3c0433f3b9ae5c03871ccccb3e17,2024-12-16T15:15:06.970000 CVE-2024-37252,0,0,352abc05f60f2e4fbc6355cda6bac20bf4066a5734bd84d216e40d333c970822,2024-11-21T09:23:28.390000 CVE-2024-37253,0,0,6ad326c6ab9256d1c78d972af311b89fce01e900376b835d2b2b0e35a35a97f0,2024-11-21T09:23:28.510000 CVE-2024-37254,0,0,7d8e71419a3130a86567c36341c002c59c1fc9f1c27411c09dfcb40f68500996,2024-11-01T20:24:53.730000 @@ -262727,7 +262736,7 @@ CVE-2024-43230,0,0,3438c9ccfea127a956b5025f46fc0219f157584c782a74b31fb7851ceb9b9 CVE-2024-43231,0,0,44c239b38fbd55455653753b3fd25fe2d8d919b27d08f15ee1b05fad9edf9d6b,2024-08-13T12:58:25.437000 CVE-2024-43232,0,0,52a1852c046c09034701352a38e8ac744730c5fd62b6924733c81dd9ea3e74f7,2024-08-19T18:36:07.297000 CVE-2024-43233,0,0,a3cb80d788fcdefbe82efd5cb7c46f3e83ae874c20df2ef7eb293b519d517ebb,2024-08-13T12:58:25.437000 -CVE-2024-43234,1,1,6499b67f98984de01105beabb063b8d176940a6244f2236cde120b320d33bd16,2024-12-16T16:15:07.037000 +CVE-2024-43234,0,0,6499b67f98984de01105beabb063b8d176940a6244f2236cde120b320d33bd16,2024-12-16T16:15:07.037000 CVE-2024-43235,0,0,153cf4f640991e76b1fd90c9e2d70c020b64700c307856901f74189cc7743bee,2024-11-01T20:24:53.730000 CVE-2024-43236,0,0,31b49ca6a31d05d0d0a34fd55ac45950bc1127c323529a1cff3b9cca0de7458c,2024-08-19T18:36:07.297000 CVE-2024-43237,0,0,b06cb1da3f0bf78839a44face593f3df310ca1b2e53335b15d64a161ba7d3890,2024-09-26T13:32:02.803000 @@ -265226,7 +265235,7 @@ CVE-2024-46965,0,0,1066f06ee90db61e408bbe2d843509e64ad66e7a9a1562e4d7a7d1ae721e0 CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf77c4,2024-11-12T16:35:20.790000 CVE-2024-4697,0,0,6e9eec3fc18bbe27148fb3ae709181d18ecd5466c486132eee5af6541f60f69a,2024-11-21T09:43:23.923000 CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000 -CVE-2024-46971,0,0,2dd1e4fa55177a6dff3331b97f9146325cacc283115f221648d8996ed22f4f35,2024-12-13T18:15:20.460000 +CVE-2024-46971,0,1,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 CVE-2024-46976,0,0,4a868e4ee15a8784e07959c2ee26d78428d60c159c11da76b493608d7f56cb35,2024-09-23T18:27:05.920000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000 @@ -265736,6 +265745,7 @@ CVE-2024-47615,0,0,1e7e51bc45d5cf3054b50029ee0b74c6141b26d094987b2cc502887a8837f CVE-2024-47616,0,0,e468a01c0ad8c1681bd9bcca10b68d0dc49f1762ba4c73b0fcd42c94c3a03664,2024-10-04T13:50:43.727000 CVE-2024-47617,0,0,6808f4f1a39cfd172fc3fb97ceefa056192d82fd1335e0915ad2252e36090af2,2024-10-08T14:23:38.597000 CVE-2024-47618,0,0,78fd78bfc1ee9f9650f798677686d5a20d8d5637ae000c91b6ecc17157cb2c51,2024-10-08T14:31:08.180000 +CVE-2024-4762,1,1,a3163a743228cda70c3e716dec6fd5f6ada0ce0400946d6f1092a9a2ebfdaf62,2024-12-16T17:15:10.293000 CVE-2024-47621,0,0,24c7d12632fae81dae57a37a5b9f4d27578d7bdf885d211dcd4b13e46e4d9403,2024-10-07T17:47:48.410000 CVE-2024-47622,0,0,a3dc84911791c77b917c749c1e01448deaa7e792ce6d73c8d1758a783dc6cc2e,2024-10-07T17:47:48.410000 CVE-2024-47623,0,0,2d2a09587308ade86dc798bcbea924f9fd883ad7f0d040d292d0dfffee2e7737,2024-10-07T17:47:48.410000 @@ -266213,7 +266223,7 @@ CVE-2024-48336,0,0,5cb1b4f35926e19009664116e71be8fd3716294889352a8f25534443259aa CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 CVE-2024-48343,0,0,0bfa348b5d2d42e48044b97cff0f001dba38954dec1f095fe3ec5f9d82ed0dc5,2024-10-29T19:35:23.657000 CVE-2024-48346,0,0,137121b06c9d03025a14db47b13e30e3704002468bdea02ff387b29ce7f68d9a,2024-11-01T12:57:03.417000 -CVE-2024-4835,0,1,e5afebda31e3d00337280146c689aefe524c3c5fc6e420e48bcb5298cdef38fb,2024-12-16T15:10:13.577000 +CVE-2024-4835,0,0,e5afebda31e3d00337280146c689aefe524c3c5fc6e420e48bcb5298cdef38fb,2024-12-16T15:10:13.577000 CVE-2024-48352,0,0,0630b5d0648f49e8f5e7ffc77997954c036846dfd8121959ae1ed5204e6959c4,2024-11-05T21:35:31.063000 CVE-2024-48353,0,0,6e062ef59024cab9444cec2113ba798ef28bfd7e30a0322f5c3671f058c6654a,2024-11-05T21:09:34.780000 CVE-2024-48356,0,0,eac70a56b90ec2a9ea89c90d1bd0f8f40240711b9bd71861f168af2fe20e0990,2024-10-30T17:35:12.420000 @@ -266870,7 +266880,7 @@ CVE-2024-49509,0,0,15e897a9631a64e5146680986f3191fcf788babf34f3f0ba79ae3fe2c381d CVE-2024-49510,0,0,5e39a02e4fdffae2c7a663bfd00500c029c1db2acc5c0e5406cd285743c01041,2024-11-16T00:35:01.073000 CVE-2024-49511,0,0,1ccfa6e8c66c4ee14d0fcfa1d4c2c0cb523a129998f43db64fa514a90d65cbbe,2024-11-16T00:34:33.607000 CVE-2024-49512,0,0,a84d30bdef56eee22b653ecf431eedca8d6beb3b76f7aeffe4966ed165543146,2024-11-16T00:34:20.890000 -CVE-2024-49513,0,0,7a1e0f3d8a491f22aa8aec99c1d148df25296647a11f5d3d70af4c5904d3c1a8,2024-12-10T21:15:16.343000 +CVE-2024-49513,0,1,b2fb61682fed6cde802ab0730fb1c05405d7c8608105274c8ac6621cfcde654b,2024-12-16T17:15:10.130000 CVE-2024-49514,0,0,49167289c5b9d01fc885a7ca0339bf6627a9365daa3fab2d195910d5101cdbe8,2024-11-18T18:06:39.030000 CVE-2024-49515,0,0,79d1cd1b41e183c3a6d8383ca22dee59ebc2441ad64ca67571e15c6d3f39714a,2024-11-13T19:14:24.320000 CVE-2024-49516,0,0,44da5d94482e4b65792e0d29a7ef15205438256f74e207e521457b4cb0fb7589,2024-11-13T18:52:31.573000 @@ -267058,7 +267068,7 @@ CVE-2024-49771,0,0,8c6be80f6c66464327581fe20dca305196ea80220132086a57a1f206da8b3 CVE-2024-49772,0,0,32b7e95857890df8c85cd4e02aad79ee44554209662330cf7f8cc7a1c9ccfb02,2024-11-13T20:19:54.597000 CVE-2024-49773,0,0,5bfedd952fbe471dc43c1bdd3c2dee35821f6f90ccb32f5b65a888e216008a47,2024-11-13T20:29:11.297000 CVE-2024-49774,0,0,73af62f273d436afb14d667598c160b834c1cd8d93ad602898a66d14ddd85e8d,2024-11-13T20:40:26.100000 -CVE-2024-49775,1,1,8dc782eedaedb37ab685c0d011f75cd0f6b35d0a4024c3e2d7203025ee844c58,2024-12-16T15:15:07.173000 +CVE-2024-49775,0,0,8dc782eedaedb37ab685c0d011f75cd0f6b35d0a4024c3e2d7203025ee844c58,2024-12-16T15:15:07.173000 CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000 CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 @@ -268685,7 +268695,7 @@ CVE-2024-5206,0,0,8862c9be0fc374f53d6a02e5cb7505c5867d3e503357cffe44c63c1a9e66a5 CVE-2024-52060,0,0,18f1256ab3d6852f48f968f1902cb4107c271bb78216cc646a4bcef88942b790,2024-12-13T11:15:08.250000 CVE-2024-52061,0,0,ab981c6d91409a6ac5416291455be06ffe6402aac260743b410c3675ec9b7081,2024-12-13T11:15:08.457000 CVE-2024-52062,0,0,9cef536c00eb4351a80045adcdd7e506152ef4f270748c6e5bddc1880cd2bc7c,2024-12-13T11:15:08.650000 -CVE-2024-52063,0,0,cf50f75baed245022cf9f7c234ca8440e3f5a36a95ac7d1550d1dc9e956e5745,2024-12-13T11:15:08.810000 +CVE-2024-52063,0,1,7a6afd44d161800d9c8740fa49dea8feee1ef81467e8a3706ccf15445337afc7,2024-12-16T17:15:10.447000 CVE-2024-52064,0,0,0d18e131fc7e89f10cf68b52ce32e2b2f1c76e1c25d8a9de9298ac2a236b87a3,2024-12-13T11:15:08.963000 CVE-2024-52065,0,0,20622e3b8298552e80849fb5202abcc08093790cf97372052dda001ec3b1b8e9,2024-12-13T11:15:09.153000 CVE-2024-52066,0,0,fde8b125981152661f1db0f33a3e6317391aee06310a64853575f1255982c717,2024-12-13T11:15:09.330000 @@ -269366,7 +269376,7 @@ CVE-2024-53292,0,0,67896e5cb823d0bbe120641ca2bcb7973e9580249f1b4ecda20948602273c CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000 -CVE-2024-5333,0,0,8a7fac0c9eeee2a3a66ad874201cc3f055a06adc9fa6889be0bb6c2b276946c2,2024-12-16T06:15:08.100000 +CVE-2024-5333,0,1,1d3705c6bc4744e8e3eb9c87a588924584572eaf82247ac0ac89df0229e84c6a,2024-12-16T17:15:14.070000 CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04a94,2024-11-25T22:15:18.437000 CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000 CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e004,2024-11-26T18:15:19.850000 @@ -269815,7 +269825,7 @@ CVE-2024-54225,0,0,718637207634ce393328c74b719f6195ce980edfa43845f62d44bb51a571b CVE-2024-54226,0,0,96db7c741f0175e61ef18acd2b8374057aea5d1c8bb19c9b0568d7c49ff45ed5,2024-12-09T13:15:42.787000 CVE-2024-54227,0,0,4593859a9f1e1945e9c644d6e0c78fb64e4629e76e799479c9b09ceaf5cb45d6,2024-12-09T13:15:42.910000 CVE-2024-54228,0,0,6f834b81fce618f10b8ed8b4ad3a2e1b64ca1965e08839904498c2d07f83404a,2024-12-09T13:15:43.030000 -CVE-2024-54229,1,1,01ce418eece3168af7fc4aa39406a218d00786d97a22f372f56e0862ab27d26c,2024-12-16T16:15:07.290000 +CVE-2024-54229,0,0,01ce418eece3168af7fc4aa39406a218d00786d97a22f372f56e0862ab27d26c,2024-12-16T16:15:07.290000 CVE-2024-5423,0,0,7a628fbcf4260b47e4020abba26bee837e84024c4fe4430cc553749e9117b851,2024-08-29T15:41:13.247000 CVE-2024-54230,0,0,426c8bebe1be09c2b500b620f91c66be5d61bf6bb3718239e0e8f03edd648ca2,2024-12-09T13:15:43.163000 CVE-2024-54231,0,0,9adcdde5c484a4d3f0dd1e31829015eeff2948e3ce8bc45ba8c48e25b0cd1e13,2024-12-13T15:15:27.250000 @@ -269837,7 +269847,7 @@ CVE-2024-54245,0,0,d20f133a954dc4c596025d36115c231a80c0fbd5170dce03102f0ee8f95d7 CVE-2024-54246,0,0,15daf4a2b62ef54a26b3eac69e8c06a7dac15327dcfa5c7d8ce92ce792d13929,2024-12-13T15:15:29.260000 CVE-2024-54247,0,0,57d6dfcdd22519bf9e88a21ff9b1df9ea70c0a456cff6a228e959919d7875998,2024-12-09T13:15:43.440000 CVE-2024-54248,0,0,e68b4c2dc745e43018b4703d2fc23e8081ba817bfa6eedd2e3331a83fad0f245,2024-12-13T15:15:29.397000 -CVE-2024-54249,1,1,a1ea740c4155539e63a62a469dc27bffe720abc4f72ddb3aef4a994a99b066f3,2024-12-16T16:15:07.430000 +CVE-2024-54249,0,0,a1ea740c4155539e63a62a469dc27bffe720abc4f72ddb3aef4a994a99b066f3,2024-12-16T16:15:07.430000 CVE-2024-5425,0,0,39c2f07d9a14a501f6a62a9467f6ca87f9b63c1b18438a7bf6cb3ddf24a3b17c,2024-11-21T09:47:37.743000 CVE-2024-54250,0,0,c4b42575991b30db16b66f5f2527fcdac57048da933445876ee01033406f52ba,2024-12-13T15:15:29.540000 CVE-2024-54251,0,0,88555ba4b3a32f180346f6738dcf0b83adaa6db6974925f721d191bb83a4f8fd,2024-12-09T13:15:43.587000 @@ -269846,7 +269856,7 @@ CVE-2024-54253,0,0,3e7f14d57faa9aa8a35c642a9452a28b4636dd0d4a1cba0850dcbd3450d69 CVE-2024-54254,0,0,04373a59529aaae92a87c4a192571d7f42eb990ce554ec6c5442265fabd555f6,2024-12-09T13:15:43.860000 CVE-2024-54255,0,0,9be77e20322099703040d9eab39da1153fb30df746e4acd9c4440dfc860382ad,2024-12-09T13:15:44.007000 CVE-2024-54256,0,0,68f49eb4fc73bafed807a2f9302fb90d0f3380f706ca0b1cc8789b65608043a8,2024-12-13T15:15:29.800000 -CVE-2024-54257,1,1,e1900dd3dcec0b3981bada6012589575172879299ab61de2de491f38a04207d8,2024-12-16T16:15:07.577000 +CVE-2024-54257,0,0,e1900dd3dcec0b3981bada6012589575172879299ab61de2de491f38a04207d8,2024-12-16T16:15:07.577000 CVE-2024-54258,0,0,40977d96bf1a1150018840b2b1887904bb081d20b00fc4f685b4add8fdc994cf,2024-12-13T15:15:29.940000 CVE-2024-54259,0,0,e9f0ce56454eab10162f84a029346ed7917509eebe036edc5de188a026e2b971,2024-12-13T15:15:30.080000 CVE-2024-5426,0,0,5ea29bfa6e12ae428a874da685da80617819a2a2873f1c2f03b3a2184d9a719d,2024-11-21T09:47:37.890000 @@ -269868,13 +269878,13 @@ CVE-2024-54275,0,0,01fbef7f9c6ad844b0359d42c1c6681f9b0c0492c41862dc18fb3364644fb CVE-2024-54276,0,0,e3c82beb3b4ba680352d6c4bb853d8f039dfab5c0430baa84349eeb1655a525e,2024-12-13T15:15:31.907000 CVE-2024-54277,0,0,644b1ec7ce0758a42e7cadcffb0abfa7c6f1936d66b8693dca02d7c7d7cb373a,2024-12-13T15:15:32.037000 CVE-2024-54278,0,0,c988ba1fd990c34dbe34c4a48f2ebfe9d973cee978e4f753f42cd41487e5054a,2024-12-13T15:15:32.177000 -CVE-2024-54279,1,1,e9e061a05c05e9670ae8b86b67e8959107d7761f6eebb2d442786dbe2074a636,2024-12-16T16:15:07.717000 +CVE-2024-54279,0,0,e9e061a05c05e9670ae8b86b67e8959107d7761f6eebb2d442786dbe2074a636,2024-12-16T16:15:07.717000 CVE-2024-5428,0,0,30a1e5798ba964c256509639dbff6325801c2c8107993bac46e8095f1112ddf1,2024-12-09T22:51:14.763000 -CVE-2024-54280,1,1,ab03c103faa0d589807e4deeb24e5efc3229691c0ee761c91fd1f67f799ac3ec,2024-12-16T16:15:07.880000 +CVE-2024-54280,0,0,ab03c103faa0d589807e4deeb24e5efc3229691c0ee761c91fd1f67f799ac3ec,2024-12-16T16:15:07.880000 CVE-2024-54282,0,0,ee7697592655debc3b68f7db6daeea6f7366421cd50262ef4e8451e234989509,2024-12-13T15:15:32.303000 -CVE-2024-54283,1,1,f5f6b15f0c1118757767a88ae2452c0f9fe78ac618167f70e18bdd76cf809445,2024-12-16T16:15:08.023000 -CVE-2024-54284,1,1,d6e5417501aded07a918ea054c3153ba42489d4b4e9b30b6b0253984d31ac50b,2024-12-16T16:15:08.153000 -CVE-2024-54285,1,1,9f55f81344a782b4205fd5e19ac95e86c860da2df70c17f271a767c8637dfd61,2024-12-16T16:15:08.320000 +CVE-2024-54283,0,0,f5f6b15f0c1118757767a88ae2452c0f9fe78ac618167f70e18bdd76cf809445,2024-12-16T16:15:08.023000 +CVE-2024-54284,0,0,d6e5417501aded07a918ea054c3153ba42489d4b4e9b30b6b0253984d31ac50b,2024-12-16T16:15:08.153000 +CVE-2024-54285,0,0,9f55f81344a782b4205fd5e19ac95e86c860da2df70c17f271a767c8637dfd61,2024-12-16T16:15:08.320000 CVE-2024-54286,0,0,1fe2cb3deb2f99ff7236b99fa2a4b0205d97f9a1acdae17f77055dc910d4910a,2024-12-13T15:15:32.440000 CVE-2024-54287,0,0,2aeb2989c5e0f2e258b8daadd407d0b8265934aab0500d9baeccfc9630f029e7,2024-12-13T15:15:32.573000 CVE-2024-54288,0,0,f1c978e6daab8ee4837d7bce1aab9cf6db2b02a12777cc4bf5c0cac0b889cf00,2024-12-13T15:15:32.707000 @@ -269924,8 +269934,8 @@ CVE-2024-54328,0,0,d7fed70435f871dcf6236ee52206f0f433a9a0f42f54bb6174bbfcc5c71cd CVE-2024-54329,0,0,e948e1a0a6429b416ec6d4b5157b877ff4c27051991ba97181245142f86fe5fc,2024-12-13T15:15:40.107000 CVE-2024-5433,0,0,85754fd697f4f5b622bb075df4ed4549c19f6bb5edf752c62289239c9b05d91f,2024-11-21T09:47:40.537000 CVE-2024-54330,0,0,a675d635313b6a5a1e335866161fb4feec8173053fb82fde7b523836a1a5b3fe,2024-12-13T15:15:40.243000 -CVE-2024-54331,1,1,90fe907b9c9742596de187183b59cd3308226ec6f8480a9b7815560094319510,2024-12-16T15:15:07.377000 -CVE-2024-54332,1,1,ac683aab5f7a8d02b137bd9c571219f1b6e2e2f3affddc27910e904defa2a8b3,2024-12-16T15:15:07.547000 +CVE-2024-54331,0,0,90fe907b9c9742596de187183b59cd3308226ec6f8480a9b7815560094319510,2024-12-16T15:15:07.377000 +CVE-2024-54332,0,0,ac683aab5f7a8d02b137bd9c571219f1b6e2e2f3affddc27910e904defa2a8b3,2024-12-16T15:15:07.547000 CVE-2024-54333,0,0,3b0a26eef2dd8c691b14f6849e93855ed5c79a54aa49ad306c7a7b87b37aaf58,2024-12-13T15:15:40.387000 CVE-2024-54334,0,0,bc3e80ec549ecd263a38a7bdd34eb19b5ff44199e30f954fa8b4e5ed8ee9953f,2024-12-13T15:15:40.517000 CVE-2024-54335,0,0,13d8c858c47a3826946720d9f4d27480ac6ea7973dd85f9fc3a3887a4ded1e8d,2024-12-13T15:15:40.643000 @@ -269942,107 +269952,107 @@ CVE-2024-54344,0,0,2d09f07c3cbb27f7fb028c0560b3cdaf3555242004f5fc3c293313ba5e9c4 CVE-2024-54345,0,0,befba314e564cec96abc9b60242ec5f528d6f5d0a0a172ded32adcd159090e3f,2024-12-13T15:15:42.010000 CVE-2024-54346,0,0,4f1d43cd11fa56bf1cad60578ee49dc94d2860a632a88cb8a11447dc0f45a148,2024-12-13T15:15:42.147000 CVE-2024-54347,0,0,9ecffa953e0884bbd46d6103688207c54883dbdda010bfeb70a36a3a1d570889,2024-12-13T15:15:42.300000 -CVE-2024-54348,1,1,aa27cf6b15bab24c6c600c9630a13cf2537b1e8caebdcb4ef68f3fe5d90bcee2,2024-12-16T16:15:08.477000 +CVE-2024-54348,0,0,aa27cf6b15bab24c6c600c9630a13cf2537b1e8caebdcb4ef68f3fe5d90bcee2,2024-12-16T16:15:08.477000 CVE-2024-54349,0,0,1827028321e929a3a9304e3cc0db0d3b606a5800582305628e60ae52cd7428a1,2024-12-13T15:15:42.440000 CVE-2024-5435,0,0,be7b01e002899800d7c367843f4cb71728bce729e4821fb8e6b5065711ce87d0,2024-11-21T09:47:40.767000 CVE-2024-54351,0,0,c7129cdf0b23517dec940400cbe9c6a0f2d69d5f8af88980273177b73e05253c,2024-12-13T15:15:42.573000 -CVE-2024-54352,1,1,d6b00b28bc731c1d7480280f5844dfeeba94e7552fbc8fc902c4d74620e2809a,2024-12-16T15:15:07.707000 -CVE-2024-54353,1,1,56c899c16f980be7d5ae16bb63bd232789506aa08518290600f7451bf40d052c,2024-12-16T15:15:07.867000 -CVE-2024-54354,1,1,22aee8b8cd7daf2dc8e90d68268db256ccdea105971cbe4aab3a3d9f30ef39fd,2024-12-16T15:15:08.023000 -CVE-2024-54355,1,1,b3c3427c0fb86ec5e7c4bfbd797bb64c7feff4315bd7478eb4f4767690ed453b,2024-12-16T15:15:08.180000 -CVE-2024-54356,1,1,4e02e8dd033bffe2a93215089bbb2f3b3997857535e57f329a5782be62c47096,2024-12-16T15:15:08.327000 -CVE-2024-54357,1,1,80da106218284b3a0c7a7149660863113a09dfc504570f394a68d11a70056114,2024-12-16T16:15:08.617000 -CVE-2024-54358,1,1,21b2a8a2a2efed35487e62c6767160f26f3dcec2e4d60c69ef5462a7582a67b6,2024-12-16T15:15:08.477000 -CVE-2024-54359,1,1,6bd4a8122e09b88b4d92ac28992e9216936e643d24f522952060f7bcf28ba03c,2024-12-16T15:15:08.630000 +CVE-2024-54352,0,0,d6b00b28bc731c1d7480280f5844dfeeba94e7552fbc8fc902c4d74620e2809a,2024-12-16T15:15:07.707000 +CVE-2024-54353,0,0,56c899c16f980be7d5ae16bb63bd232789506aa08518290600f7451bf40d052c,2024-12-16T15:15:07.867000 +CVE-2024-54354,0,0,22aee8b8cd7daf2dc8e90d68268db256ccdea105971cbe4aab3a3d9f30ef39fd,2024-12-16T15:15:08.023000 +CVE-2024-54355,0,0,b3c3427c0fb86ec5e7c4bfbd797bb64c7feff4315bd7478eb4f4767690ed453b,2024-12-16T15:15:08.180000 +CVE-2024-54356,0,0,4e02e8dd033bffe2a93215089bbb2f3b3997857535e57f329a5782be62c47096,2024-12-16T15:15:08.327000 +CVE-2024-54357,0,0,80da106218284b3a0c7a7149660863113a09dfc504570f394a68d11a70056114,2024-12-16T16:15:08.617000 +CVE-2024-54358,0,0,21b2a8a2a2efed35487e62c6767160f26f3dcec2e4d60c69ef5462a7582a67b6,2024-12-16T15:15:08.477000 +CVE-2024-54359,0,0,6bd4a8122e09b88b4d92ac28992e9216936e643d24f522952060f7bcf28ba03c,2024-12-16T15:15:08.630000 CVE-2024-5436,0,0,33c3768bf6b957789e9fd4520192cd7f52d0101d89a4b841a8c4d92b239bee32,2024-11-21T09:47:40.917000 -CVE-2024-54360,1,1,39508cedc7d8f23daba9a2b00ca88fb5f3080f2daa9c1316e418d67595d2cb8e,2024-12-16T15:15:08.793000 -CVE-2024-54361,1,1,1916a09f30132297bb917bdd38ad3600a1ce159210dc76b6fa9090645897ca34,2024-12-16T15:15:08.970000 -CVE-2024-54363,1,1,d4335cae104d5c5ab97728da2d8d897c90b40129adc54aa8307bfe224b121049,2024-12-16T15:15:09.130000 -CVE-2024-54364,1,1,dece08cc2bb49cf93f758c15ca6ad6e9d9f9ef88582ce5d6ea3062d2e6e95135,2024-12-16T15:15:09.283000 -CVE-2024-54365,1,1,5a3c7ba6aafbf728201d04cf236f645e532cc0aff2fb0a9d2e8a35b9c1e956a0,2024-12-16T15:15:09.437000 -CVE-2024-54366,1,1,bd2f401d647575d3dd62c0c35779d221211985530e3efaf67568696c7de7d7e9,2024-12-16T15:15:09.610000 -CVE-2024-54367,1,1,8db81081dfcc8c13696b3cfb578fe0e13595a501b3be9d9af29799f3940394e0,2024-12-16T15:15:10.027000 -CVE-2024-54368,1,1,944c5cb6f4c2406f9c67882a1fec37a2f3a40060c78abba8fadc1a78949ec554,2024-12-16T15:15:10.223000 -CVE-2024-54369,1,1,4c89da48552c4ea41ea6dfe82659722b58f4ea346c30754adb6b5646f31cf955,2024-12-16T15:15:10.410000 +CVE-2024-54360,0,0,39508cedc7d8f23daba9a2b00ca88fb5f3080f2daa9c1316e418d67595d2cb8e,2024-12-16T15:15:08.793000 +CVE-2024-54361,0,0,1916a09f30132297bb917bdd38ad3600a1ce159210dc76b6fa9090645897ca34,2024-12-16T15:15:08.970000 +CVE-2024-54363,0,0,d4335cae104d5c5ab97728da2d8d897c90b40129adc54aa8307bfe224b121049,2024-12-16T15:15:09.130000 +CVE-2024-54364,0,0,dece08cc2bb49cf93f758c15ca6ad6e9d9f9ef88582ce5d6ea3062d2e6e95135,2024-12-16T15:15:09.283000 +CVE-2024-54365,0,0,5a3c7ba6aafbf728201d04cf236f645e532cc0aff2fb0a9d2e8a35b9c1e956a0,2024-12-16T15:15:09.437000 +CVE-2024-54366,0,0,bd2f401d647575d3dd62c0c35779d221211985530e3efaf67568696c7de7d7e9,2024-12-16T15:15:09.610000 +CVE-2024-54367,0,0,8db81081dfcc8c13696b3cfb578fe0e13595a501b3be9d9af29799f3940394e0,2024-12-16T15:15:10.027000 +CVE-2024-54368,0,0,944c5cb6f4c2406f9c67882a1fec37a2f3a40060c78abba8fadc1a78949ec554,2024-12-16T15:15:10.223000 +CVE-2024-54369,0,0,4c89da48552c4ea41ea6dfe82659722b58f4ea346c30754adb6b5646f31cf955,2024-12-16T15:15:10.410000 CVE-2024-5437,0,0,192ebfba1ee0c535fd80257f20084502c6785a2aaa34b88a17d7df43ec70e510,2024-12-09T22:52:00.683000 -CVE-2024-54370,1,1,ee8940e4d9b28ca9b47b65b892e904d7b0e768bf361266e6018cc23f210c92d2,2024-12-16T15:15:10.593000 -CVE-2024-54372,1,1,22211bda6363f60f5bd9a86809a26315798446615659751e14c7b1b328cf04dc,2024-12-16T15:15:10.810000 -CVE-2024-54373,1,1,38fe09965260602f6487a151c4048df11b8e187948261771a615c5194802205f,2024-12-16T15:15:11.013000 -CVE-2024-54374,1,1,7abaa673bd6c8c7d9a0bd3e23009bd97b692b7d0fbde45edeaa22b83359790ac,2024-12-16T15:15:11.200000 -CVE-2024-54375,1,1,3068deaa377a4ea093666c49c420b08b23f95a1b226b08f1e9db404dde4c6bec,2024-12-16T15:15:11.553000 -CVE-2024-54376,1,1,bc4adacbc175a967a5098c28357743eba44e9ea26c69a92a58d56e931187e29e,2024-12-16T16:15:08.763000 -CVE-2024-54378,1,1,e0793cb140d3daaf22451976989e673c35e2a847e6003dbe8cf15bddee267d2d,2024-12-16T15:15:11.740000 -CVE-2024-54379,1,1,1ceccc11425fe839deb2312ef4df013d80a5d3134346932fc2a9e2266469d5b1,2024-12-16T15:15:11.930000 +CVE-2024-54370,0,0,ee8940e4d9b28ca9b47b65b892e904d7b0e768bf361266e6018cc23f210c92d2,2024-12-16T15:15:10.593000 +CVE-2024-54372,0,0,22211bda6363f60f5bd9a86809a26315798446615659751e14c7b1b328cf04dc,2024-12-16T15:15:10.810000 +CVE-2024-54373,0,0,38fe09965260602f6487a151c4048df11b8e187948261771a615c5194802205f,2024-12-16T15:15:11.013000 +CVE-2024-54374,0,0,7abaa673bd6c8c7d9a0bd3e23009bd97b692b7d0fbde45edeaa22b83359790ac,2024-12-16T15:15:11.200000 +CVE-2024-54375,0,0,3068deaa377a4ea093666c49c420b08b23f95a1b226b08f1e9db404dde4c6bec,2024-12-16T15:15:11.553000 +CVE-2024-54376,0,0,bc4adacbc175a967a5098c28357743eba44e9ea26c69a92a58d56e931187e29e,2024-12-16T16:15:08.763000 +CVE-2024-54378,0,0,e0793cb140d3daaf22451976989e673c35e2a847e6003dbe8cf15bddee267d2d,2024-12-16T15:15:11.740000 +CVE-2024-54379,0,0,1ceccc11425fe839deb2312ef4df013d80a5d3134346932fc2a9e2266469d5b1,2024-12-16T15:15:11.930000 CVE-2024-5438,0,0,ffa2cf18257657249bf4324d169209d5b77afdfcf36ba5cbe26b4a5e29aa156e,2024-11-21T09:47:41.163000 -CVE-2024-54380,1,1,45c25d50ae5052d82986ff15482682ca30bd2ece78e3ec0e65c2fe22d025ad96,2024-12-16T15:15:12.123000 -CVE-2024-54382,1,1,d70895b9723d8dc4b6916078b2a54e6e03b8bbf44fc762436619765bab30fd6e,2024-12-16T15:15:12.313000 -CVE-2024-54384,1,1,8f8d2ccf33e387e4b711949c951451ebecb0140d34035d48d8452d2e5154f98b,2024-12-16T15:15:12.497000 -CVE-2024-54385,1,1,decfdc74d2854badf867203e8f29e393979ad5029990fdba4cb698db019b4036,2024-12-16T15:15:12.653000 -CVE-2024-54386,1,1,233dc3c04ed6c0cd086632a6711be15443f56fe0e238c795984ad866ad0bbda8,2024-12-16T15:15:12.837000 -CVE-2024-54387,1,1,4b32b85509bbf265bfd44697af629a643666a49a637478d7cb26ff1160748cc6,2024-12-16T15:15:12.987000 -CVE-2024-54388,1,1,a162feaf63d3b38ec1bebe413f2fca895776e1ebda0f446e7f2a3548147a500e,2024-12-16T15:15:13.163000 -CVE-2024-54389,1,1,d3ae4126a9d34ecaf2dc66deffc5f181b2a520a0a342fffb949a15e4c2d2dac4,2024-12-16T15:15:13.303000 +CVE-2024-54380,0,0,45c25d50ae5052d82986ff15482682ca30bd2ece78e3ec0e65c2fe22d025ad96,2024-12-16T15:15:12.123000 +CVE-2024-54382,0,0,d70895b9723d8dc4b6916078b2a54e6e03b8bbf44fc762436619765bab30fd6e,2024-12-16T15:15:12.313000 +CVE-2024-54384,0,0,8f8d2ccf33e387e4b711949c951451ebecb0140d34035d48d8452d2e5154f98b,2024-12-16T15:15:12.497000 +CVE-2024-54385,0,0,decfdc74d2854badf867203e8f29e393979ad5029990fdba4cb698db019b4036,2024-12-16T15:15:12.653000 +CVE-2024-54386,0,0,233dc3c04ed6c0cd086632a6711be15443f56fe0e238c795984ad866ad0bbda8,2024-12-16T15:15:12.837000 +CVE-2024-54387,0,0,4b32b85509bbf265bfd44697af629a643666a49a637478d7cb26ff1160748cc6,2024-12-16T15:15:12.987000 +CVE-2024-54388,0,0,a162feaf63d3b38ec1bebe413f2fca895776e1ebda0f446e7f2a3548147a500e,2024-12-16T15:15:13.163000 +CVE-2024-54389,0,0,d3ae4126a9d34ecaf2dc66deffc5f181b2a520a0a342fffb949a15e4c2d2dac4,2024-12-16T15:15:13.303000 CVE-2024-5439,0,0,5a44e3fd4aa453ab2ad6437ae67e94335e6990f31b7d3e0d4c8ca40e0afb67a0,2024-11-21T09:47:41.280000 -CVE-2024-54390,1,1,51e7e8015be03752319bad0d2e3f5a818c467fce2e1971e96a33783a518e2252,2024-12-16T15:15:13.467000 -CVE-2024-54391,1,1,97a45738ce3484cb5d07d32bd75ddcdd8cfa6122aa2c9cdff3884bd6d628cc1f,2024-12-16T15:15:13.700000 -CVE-2024-54392,1,1,bf73ec768029bff1e079d43098f72e4ae4450bc0a7280f74d004fd39ab81f7f8,2024-12-16T15:15:13.873000 -CVE-2024-54393,1,1,2ee065d58dfa59dcf0e3f98f6db75c8b17ae0234532d777e77e9ac127c5bb5b7,2024-12-16T15:15:14.030000 -CVE-2024-54394,1,1,c9ea511b3ec0302b3caad5208bcdc3cb007c9c682015a0dd8c58bb196bf99ffa,2024-12-16T15:15:14.220000 -CVE-2024-54395,1,1,cbc804c3cf520707bf0db63f10d15569a487ccf077ba226942e6b07372e47928,2024-12-16T15:15:14.377000 -CVE-2024-54396,1,1,8157fafbd65964fc9a74aa473d4ebab060f3548f9f6c723fdef15adbd71914f4,2024-12-16T15:15:14.610000 -CVE-2024-54397,1,1,bdf7d80aa450d49caeabc53910c9cbdc6e23180f887853b0a60debce2c5de9c4,2024-12-16T15:15:14.983000 -CVE-2024-54398,1,1,5e8ea34cb0211573624138cba0cc49f3c251625b68084500f500c80ec096fc20,2024-12-16T15:15:15.153000 -CVE-2024-54399,1,1,ff6b86af74ba45eec4e2391473eb656a537bc427c66979f4c29441f505ae29c8,2024-12-16T15:15:15.317000 -CVE-2024-54400,1,1,8cd0da4da9e82b29af382546b34322a95b9c2b47defbb97e62c24aa9d50d1541,2024-12-16T15:15:15.587000 -CVE-2024-54401,1,1,e8423b7db86089cdc1f52920fcad2ad069c4a00726f80ca9c37433a674d03b40,2024-12-16T15:15:15.970000 -CVE-2024-54402,1,1,68f97c1768805310667bcbd4ee4ab85763831463ec3a4ec47832bf33a64a626a,2024-12-16T15:15:16.153000 -CVE-2024-54403,1,1,640758deba575628ce70c6df3a418cb0fe412adaa3ae52d1b877b915ccf9220f,2024-12-16T15:15:16.327000 -CVE-2024-54404,1,1,c7698f335fcabc9086785c31d5e5142ee2534a6f6867dc90700ed714eecfbb4c,2024-12-16T15:15:16.500000 -CVE-2024-54405,1,1,7b53cb7b5bdad09441f7ee72d99d5e52c147b9f2c6e4bf1edfd5137ba894f97d,2024-12-16T15:15:16.673000 -CVE-2024-54406,1,1,5cd10b05f522e08920ef06d5c67a76d415e9d98e90a4dfa9a8c4c9e80337f371,2024-12-16T15:15:17.197000 -CVE-2024-54407,1,1,cc9ff24537883b75b3063ba176d4c20d80474bea68eb4cc4e7480661d62791ea,2024-12-16T15:15:17.493000 -CVE-2024-54408,1,1,b257cfa79f09aacb8be16be4f84d0b8bbd7197046a8be8184d62b6c31f2b3cce,2024-12-16T15:15:17.693000 -CVE-2024-54409,1,1,896a54386bf79e08acebdebacba7f8fe8c8463902d58fee784e1279b718954c6,2024-12-16T15:15:17.980000 +CVE-2024-54390,0,0,51e7e8015be03752319bad0d2e3f5a818c467fce2e1971e96a33783a518e2252,2024-12-16T15:15:13.467000 +CVE-2024-54391,0,0,97a45738ce3484cb5d07d32bd75ddcdd8cfa6122aa2c9cdff3884bd6d628cc1f,2024-12-16T15:15:13.700000 +CVE-2024-54392,0,0,bf73ec768029bff1e079d43098f72e4ae4450bc0a7280f74d004fd39ab81f7f8,2024-12-16T15:15:13.873000 +CVE-2024-54393,0,0,2ee065d58dfa59dcf0e3f98f6db75c8b17ae0234532d777e77e9ac127c5bb5b7,2024-12-16T15:15:14.030000 +CVE-2024-54394,0,0,c9ea511b3ec0302b3caad5208bcdc3cb007c9c682015a0dd8c58bb196bf99ffa,2024-12-16T15:15:14.220000 +CVE-2024-54395,0,0,cbc804c3cf520707bf0db63f10d15569a487ccf077ba226942e6b07372e47928,2024-12-16T15:15:14.377000 +CVE-2024-54396,0,0,8157fafbd65964fc9a74aa473d4ebab060f3548f9f6c723fdef15adbd71914f4,2024-12-16T15:15:14.610000 +CVE-2024-54397,0,0,bdf7d80aa450d49caeabc53910c9cbdc6e23180f887853b0a60debce2c5de9c4,2024-12-16T15:15:14.983000 +CVE-2024-54398,0,0,5e8ea34cb0211573624138cba0cc49f3c251625b68084500f500c80ec096fc20,2024-12-16T15:15:15.153000 +CVE-2024-54399,0,0,ff6b86af74ba45eec4e2391473eb656a537bc427c66979f4c29441f505ae29c8,2024-12-16T15:15:15.317000 +CVE-2024-54400,0,0,8cd0da4da9e82b29af382546b34322a95b9c2b47defbb97e62c24aa9d50d1541,2024-12-16T15:15:15.587000 +CVE-2024-54401,0,0,e8423b7db86089cdc1f52920fcad2ad069c4a00726f80ca9c37433a674d03b40,2024-12-16T15:15:15.970000 +CVE-2024-54402,0,0,68f97c1768805310667bcbd4ee4ab85763831463ec3a4ec47832bf33a64a626a,2024-12-16T15:15:16.153000 +CVE-2024-54403,0,0,640758deba575628ce70c6df3a418cb0fe412adaa3ae52d1b877b915ccf9220f,2024-12-16T15:15:16.327000 +CVE-2024-54404,0,0,c7698f335fcabc9086785c31d5e5142ee2534a6f6867dc90700ed714eecfbb4c,2024-12-16T15:15:16.500000 +CVE-2024-54405,0,0,7b53cb7b5bdad09441f7ee72d99d5e52c147b9f2c6e4bf1edfd5137ba894f97d,2024-12-16T15:15:16.673000 +CVE-2024-54406,0,0,5cd10b05f522e08920ef06d5c67a76d415e9d98e90a4dfa9a8c4c9e80337f371,2024-12-16T15:15:17.197000 +CVE-2024-54407,0,0,cc9ff24537883b75b3063ba176d4c20d80474bea68eb4cc4e7480661d62791ea,2024-12-16T15:15:17.493000 +CVE-2024-54408,0,0,b257cfa79f09aacb8be16be4f84d0b8bbd7197046a8be8184d62b6c31f2b3cce,2024-12-16T15:15:17.693000 +CVE-2024-54409,0,0,896a54386bf79e08acebdebacba7f8fe8c8463902d58fee784e1279b718954c6,2024-12-16T15:15:17.980000 CVE-2024-5441,0,0,9a188de2800fac4e34dbb82ed230985cafee97f2cb127a657423bd77bdb5a0c1,2024-11-21T09:47:41.390000 -CVE-2024-54410,1,1,4c42cfabc3fb4ca241057f931aaf45b833cc0147a8df8f6f9e665eca68f7fe70,2024-12-16T15:15:18.173000 -CVE-2024-54411,1,1,cec1e1c5d743ece3ec14f865a0570354da6e20ab714c2628aeb56c536a4f776f,2024-12-16T15:15:18.370000 -CVE-2024-54412,1,1,36b0dfecf8e2f62133d150f92d2b8e6d7585699049f88fc8ffc9f795f192d9b5,2024-12-16T15:15:18.547000 -CVE-2024-54413,1,1,da5d81165726eea37c53ee571c43ef05fe5ae8aa1570bd44aab4eebf29542578,2024-12-16T15:15:18.770000 -CVE-2024-54414,1,1,31371ede249edc56d1bb00e40d5410c43c4a069ea4b803bf65c5058f33b86f6f,2024-12-16T15:15:18.923000 -CVE-2024-54415,1,1,64b568706462ff6c4ea8f85916d0214c2f43173d60268e17af0a8d3db6d31570,2024-12-16T15:15:19.100000 -CVE-2024-54416,1,1,ba21c5c6494db39c41f6a5ff0bfa764232266b84d2e7ca1bef3bcec6e12c72d0,2024-12-16T15:15:19.263000 -CVE-2024-54417,1,1,761fd479c5fbddc6fef39f46f793260bc2c3490da57b55ab3b6fa716eb4eac85,2024-12-16T15:15:19.437000 -CVE-2024-54418,1,1,a8f874217e1144e033b9ca982fa9166214b0d65ada42ae337374b8f639ab2186,2024-12-16T15:15:19.703000 -CVE-2024-54419,1,1,3118a80cc4fab64c61673aa6ea9f63296acdaeae899d8d49890402efaee29e3f,2024-12-16T15:15:19.897000 +CVE-2024-54410,0,0,4c42cfabc3fb4ca241057f931aaf45b833cc0147a8df8f6f9e665eca68f7fe70,2024-12-16T15:15:18.173000 +CVE-2024-54411,0,0,cec1e1c5d743ece3ec14f865a0570354da6e20ab714c2628aeb56c536a4f776f,2024-12-16T15:15:18.370000 +CVE-2024-54412,0,0,36b0dfecf8e2f62133d150f92d2b8e6d7585699049f88fc8ffc9f795f192d9b5,2024-12-16T15:15:18.547000 +CVE-2024-54413,0,0,da5d81165726eea37c53ee571c43ef05fe5ae8aa1570bd44aab4eebf29542578,2024-12-16T15:15:18.770000 +CVE-2024-54414,0,0,31371ede249edc56d1bb00e40d5410c43c4a069ea4b803bf65c5058f33b86f6f,2024-12-16T15:15:18.923000 +CVE-2024-54415,0,0,64b568706462ff6c4ea8f85916d0214c2f43173d60268e17af0a8d3db6d31570,2024-12-16T15:15:19.100000 +CVE-2024-54416,0,0,ba21c5c6494db39c41f6a5ff0bfa764232266b84d2e7ca1bef3bcec6e12c72d0,2024-12-16T15:15:19.263000 +CVE-2024-54417,0,0,761fd479c5fbddc6fef39f46f793260bc2c3490da57b55ab3b6fa716eb4eac85,2024-12-16T15:15:19.437000 +CVE-2024-54418,0,0,a8f874217e1144e033b9ca982fa9166214b0d65ada42ae337374b8f639ab2186,2024-12-16T15:15:19.703000 +CVE-2024-54419,0,0,3118a80cc4fab64c61673aa6ea9f63296acdaeae899d8d49890402efaee29e3f,2024-12-16T15:15:19.897000 CVE-2024-5442,0,0,d04c2bb3cc8f82a2c7270c721f12e5a9b2940fb0a26db1ab02f9941e2c6a7785,2024-11-21T09:47:41.530000 -CVE-2024-54420,1,1,facff9f8f95c6d3204932843751b8e2d3246a54249d6445340ee6927612dfbdf,2024-12-16T15:15:20.100000 -CVE-2024-54421,1,1,7e2534b4fbdb8d38aee4c72dc99c99286b4e8e22b86384a7f91203601c91b992,2024-12-16T15:15:20.257000 -CVE-2024-54422,1,1,162324eb205b53ed3e7896b6fed495f401588ac80de15c94300da2b188a786bb,2024-12-16T15:15:20.410000 -CVE-2024-54423,1,1,747ddfb32b376e9a8e8ab7f9a3a87c5d58a5b861dbc613ecdba9f6dddef3f014,2024-12-16T15:15:20.550000 -CVE-2024-54424,1,1,a34f704033090a4f28cfc748684fa0d23a0dc15b496ba093a6959c48959a4e32,2024-12-16T15:15:20.697000 -CVE-2024-54425,1,1,609a1c1e639c1fe93ce83b25ccf2eb400690a313dc1529789b05d55f3d4ca985,2024-12-16T15:15:20.853000 -CVE-2024-54426,1,1,1a503ca24fd2fd0040fa174b0e2d2ee6b3b63f8646741fd246d92d68c9c3dc65,2024-12-16T15:15:21 -CVE-2024-54427,1,1,5fc5c1c9853f7533fc7e06d87d6c906d1e88988489a4a53522659ca2c49884e6,2024-12-16T15:15:21.140000 -CVE-2024-54428,1,1,08f1adec342adbbc700949d9fe2079753ab8898e68c88d7a0100185e7385893f,2024-12-16T15:15:21.280000 -CVE-2024-54429,1,1,4d331caab19a7d85dbfe304e8ccca7dda090b044d688c9f912ddf5a3f1c6d2f6,2024-12-16T15:15:21.417000 +CVE-2024-54420,0,0,facff9f8f95c6d3204932843751b8e2d3246a54249d6445340ee6927612dfbdf,2024-12-16T15:15:20.100000 +CVE-2024-54421,0,0,7e2534b4fbdb8d38aee4c72dc99c99286b4e8e22b86384a7f91203601c91b992,2024-12-16T15:15:20.257000 +CVE-2024-54422,0,0,162324eb205b53ed3e7896b6fed495f401588ac80de15c94300da2b188a786bb,2024-12-16T15:15:20.410000 +CVE-2024-54423,0,0,747ddfb32b376e9a8e8ab7f9a3a87c5d58a5b861dbc613ecdba9f6dddef3f014,2024-12-16T15:15:20.550000 +CVE-2024-54424,0,0,a34f704033090a4f28cfc748684fa0d23a0dc15b496ba093a6959c48959a4e32,2024-12-16T15:15:20.697000 +CVE-2024-54425,0,0,609a1c1e639c1fe93ce83b25ccf2eb400690a313dc1529789b05d55f3d4ca985,2024-12-16T15:15:20.853000 +CVE-2024-54426,0,0,1a503ca24fd2fd0040fa174b0e2d2ee6b3b63f8646741fd246d92d68c9c3dc65,2024-12-16T15:15:21 +CVE-2024-54427,0,0,5fc5c1c9853f7533fc7e06d87d6c906d1e88988489a4a53522659ca2c49884e6,2024-12-16T15:15:21.140000 +CVE-2024-54428,0,0,08f1adec342adbbc700949d9fe2079753ab8898e68c88d7a0100185e7385893f,2024-12-16T15:15:21.280000 +CVE-2024-54429,0,0,4d331caab19a7d85dbfe304e8ccca7dda090b044d688c9f912ddf5a3f1c6d2f6,2024-12-16T15:15:21.417000 CVE-2024-5443,0,0,adadd9c694860afcdd394e8dee0fe463a311b2c2fa5a4e181ef4b87c4458e44d,2024-11-21T09:47:41.690000 -CVE-2024-54430,1,1,a656dd701a2668f957e552e8a07e5d7b7192e7b03c2645eb9f6b46a3f2a19364,2024-12-16T15:15:21.567000 -CVE-2024-54431,1,1,d7dba430b8aa996716a2c0a9b992c36d439aaa7317598bb8e0d5796886213fef,2024-12-16T15:15:21.727000 -CVE-2024-54432,1,1,f2dfe631f8b46a0dc6f9169bbf46861096ad2c017c4d41ad39c824864b7026b7,2024-12-16T15:15:21.883000 -CVE-2024-54433,1,1,a912f9700a7908b93524d6d87f8723051eac23332ea05936c08ae67547590638,2024-12-16T15:15:22.023000 -CVE-2024-54434,1,1,60607e47dd4bfd485a7eebe98bb663f6d43e5c22b85980c4e5a13a7b9ce2f6ce,2024-12-16T15:15:22.160000 -CVE-2024-54435,1,1,6cb280132fba53914ea7857424fd76c3802011d15881003df4b52222da1e5fe5,2024-12-16T15:15:22.293000 -CVE-2024-54436,1,1,92e43f5e7840d583eafa042bf0b51d2eeb0ad5a7d442fc66a4131981cd87bb12,2024-12-16T15:15:22.437000 -CVE-2024-54437,1,1,932fb33e8a78630c47848053d87a0882ea2cf84d1aeb9c98a6885a49f42fe12b,2024-12-16T15:15:22.570000 -CVE-2024-54438,1,1,b918533ce20dd8454099eeb2d3103c58686db0d7cd225408c317fc119ae24dbb,2024-12-16T15:15:22.713000 -CVE-2024-54439,1,1,4c5ecdbd9fe0ed07bf3ce032df03c05747a9a650f613280d3fe2cea7f3e216ff,2024-12-16T15:15:22.843000 +CVE-2024-54430,0,0,a656dd701a2668f957e552e8a07e5d7b7192e7b03c2645eb9f6b46a3f2a19364,2024-12-16T15:15:21.567000 +CVE-2024-54431,0,0,d7dba430b8aa996716a2c0a9b992c36d439aaa7317598bb8e0d5796886213fef,2024-12-16T15:15:21.727000 +CVE-2024-54432,0,0,f2dfe631f8b46a0dc6f9169bbf46861096ad2c017c4d41ad39c824864b7026b7,2024-12-16T15:15:21.883000 +CVE-2024-54433,0,0,a912f9700a7908b93524d6d87f8723051eac23332ea05936c08ae67547590638,2024-12-16T15:15:22.023000 +CVE-2024-54434,0,0,60607e47dd4bfd485a7eebe98bb663f6d43e5c22b85980c4e5a13a7b9ce2f6ce,2024-12-16T15:15:22.160000 +CVE-2024-54435,0,0,6cb280132fba53914ea7857424fd76c3802011d15881003df4b52222da1e5fe5,2024-12-16T15:15:22.293000 +CVE-2024-54436,0,0,92e43f5e7840d583eafa042bf0b51d2eeb0ad5a7d442fc66a4131981cd87bb12,2024-12-16T15:15:22.437000 +CVE-2024-54437,0,0,932fb33e8a78630c47848053d87a0882ea2cf84d1aeb9c98a6885a49f42fe12b,2024-12-16T15:15:22.570000 +CVE-2024-54438,0,0,b918533ce20dd8454099eeb2d3103c58686db0d7cd225408c317fc119ae24dbb,2024-12-16T15:15:22.713000 +CVE-2024-54439,0,0,4c5ecdbd9fe0ed07bf3ce032df03c05747a9a650f613280d3fe2cea7f3e216ff,2024-12-16T15:15:22.843000 CVE-2024-5444,0,0,d122b54e471150af4b6bf3b5aac169a49909a5e1c30b12ec4d263232852abd0e,2024-11-21T09:47:41.810000 -CVE-2024-54440,1,1,723f44632275f06c5e23d1e1f6274f82a8029f776b495170e076f2f1d0119ef1,2024-12-16T15:15:22.987000 -CVE-2024-54441,1,1,a08b486e295172eb894273ccaf7d82132ef8ac3f77926b6a73e4266679abbd24,2024-12-16T15:15:23.130000 -CVE-2024-54442,1,1,69dca484a65627a3db8bf4fb838f1eb265ef0927a339a4c7e14aeb30335cda17,2024-12-16T15:15:23.273000 -CVE-2024-54443,1,1,a43da47516f57b915c394add4b1398be1ec579a2e3d328952334629aec11fe1e,2024-12-16T15:15:23.420000 +CVE-2024-54440,0,0,723f44632275f06c5e23d1e1f6274f82a8029f776b495170e076f2f1d0119ef1,2024-12-16T15:15:22.987000 +CVE-2024-54441,0,0,a08b486e295172eb894273ccaf7d82132ef8ac3f77926b6a73e4266679abbd24,2024-12-16T15:15:23.130000 +CVE-2024-54442,0,0,69dca484a65627a3db8bf4fb838f1eb265ef0927a339a4c7e14aeb30335cda17,2024-12-16T15:15:23.273000 +CVE-2024-54443,0,0,a43da47516f57b915c394add4b1398be1ec579a2e3d328952334629aec11fe1e,2024-12-16T15:15:23.420000 CVE-2024-5445,0,0,868cf662746874f2c335da1d583d2882ec8b61a1e57de341d372842bb0244e3a,2024-08-12T13:41:36.517000 -CVE-2024-54465,0,0,649545beb8fbf7b7dcaa754e8f5868f87d1993a29b4f4f1eae2282e5919a3339,2024-12-13T18:42:50.737000 +CVE-2024-54465,0,1,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,007391ad25f3f19d155f1bab4a612386e47b938cdb46a1c1a05637652e9969fd,2024-12-12T22:15:08.213000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54471,0,0,3399111b76a7b53e131dff58753f99905e82fd008f1a9ed162ad52c89d594216,2024-12-12T16:15:55.950000 @@ -270068,7 +270078,7 @@ CVE-2024-54500,0,0,657f282c345a307f53f35dde04bf557f78e33359ddf485d7b8b3507dfe147 CVE-2024-54501,0,0,53a4207c1a9b8c09d2aa36aac95634b59bf35106c5d727899990d0735b43a2db,2024-12-12T17:15:10.837000 CVE-2024-54502,0,0,4fcd6d230b9c5da2bf606cc321abba798a8639dec496d3faadfe85d3a2ced000,2024-12-12T16:15:56.587000 CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1dffb7,2024-12-13T19:15:09.727000 -CVE-2024-54504,0,0,efdf541272993c9eae54bdd21b0193b688616166a2d364e25ee1c4f70db28d41,2024-12-13T18:40:20.540000 +CVE-2024-54504,0,1,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 CVE-2024-54506,0,0,f3c9936de04cf0352e94a0776d19df77b7b910899450a047ad1a7929caefdd5e,2024-12-13T18:05:06.697000 CVE-2024-54508,0,0,d82aafd1ac83ca8b155b333126afeb5d4f991f9c386a8ce4d7c2372e8c125034,2024-12-13T18:12:13.617000 @@ -270245,9 +270255,9 @@ CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b0 CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000 CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000 CVE-2024-55635,0,0,392082c131c01336e2210c07f5a3e2fcbd7cb3b3f9054eec0bafd4ca472aaecc,2024-12-10T22:15:28.190000 -CVE-2024-55636,0,0,b846f7f55660e66f5cfa3709ff40b2fdf700cfc1b8d31829a6eac8d4d94114c3,2024-12-10T22:15:28.347000 -CVE-2024-55637,0,0,c2de133e0c67e5353c065e4adbb8d495de35396dc73e5cdfbaa8788051308df4,2024-12-10T22:15:28.500000 -CVE-2024-55638,0,0,f4cc4cde824faa11a70135e898c63fd17a5dca5afc2db948390ad92b6a9960cd,2024-12-10T22:15:28.640000 +CVE-2024-55636,0,1,e49650b1673b5336fe0733d223e8fc2e472caad48f40b65ffc4ecff5eab92986,2024-12-16T18:15:11.463000 +CVE-2024-55637,0,1,418fc59eaddba6292c7ca9a157c9abc724d8230c1bf6179e0194990ea93fb105,2024-12-16T18:15:11.673000 +CVE-2024-55638,0,1,27d92259e0a78066bb2529c55e1965f2134ea587303667a5ef98e650405575d4,2024-12-16T18:15:11.840000 CVE-2024-5564,0,0,3aa73f6c6404c243b9f6f394613afc94e063551efa8746acdefa8554437d3ac7,2024-11-21T09:47:56.340000 CVE-2024-5565,0,0,d611550f5bcf5e6c3db2413f5bd8aaf6eb30fde2563331d26a9ad58249b7304a,2024-11-25T13:15:07.310000 CVE-2024-55652,0,0,4e4448d6da8b16d3811a29eb55a690e8e4ef0fe299bd552eafd44d61141bd125,2024-12-12T17:15:11.360000 @@ -270260,7 +270270,7 @@ CVE-2024-5566,0,0,55157068cefe792f617f9d985299d525c0156c753cbd8d7bb670501225f08f CVE-2024-55660,0,0,bb75a16480348fa6d1893b3e4763c05ed3e1549b7a047b3a3d210779427c4866,2024-12-12T02:15:32.883000 CVE-2024-55661,0,0,4f0405ceece48b162a2157b55e3981ad45cff9a2e9b9b9367364f1a6b02720e8,2024-12-13T18:15:22.190000 CVE-2024-55662,0,0,5f3e0832ea8bbd347e885237023ed979e1c2fc577ad7a47ca0fcd7d157677ad6,2024-12-13T15:15:42.707000 -CVE-2024-55663,0,0,f6c31e21626e1514b3b2f8e10b3eb2e32c91ca7b84ed09a407fb65631a1cfe3e,2024-12-12T19:15:13.827000 +CVE-2024-55663,0,1,6066b47367f611fab692f0fb249f3441422f3b2dae28d65605194c6e1d397dab,2024-12-16T18:15:12.030000 CVE-2024-5567,0,0,58e82791c8fea00e3d24c3a38ca7e73d8284e730929acebb640917b4f39b60a1,2024-09-26T18:27:51.817000 CVE-2024-5569,0,0,af3784ad99fd1d8f40146e3cc0f791571d7dbaa8c15694f8f3c51428e2663498,2024-11-21T09:47:56.840000 CVE-2024-5570,0,0,af32f7b53ec97ba40a01429c66641e4f606201cbce98a2ca05767d4db7dc87d4,2024-11-21T09:47:56.960000 @@ -270298,64 +270308,64 @@ CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c8981452067 CVE-2024-55918,0,0,764befe1a81d30c325050e2d2ea25c5ad49296c459456a79ce12e40a8529ce8f,2024-12-13T07:15:04.827000 CVE-2024-55946,0,0,fc4f0ce08741733d6f453b541d54aef404252708bb0bc4e901bbe32fa2942160,2024-12-13T21:15:13.603000 CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000 -CVE-2024-55956,0,0,81c3cad6625cca2dc9c6e2c7eba0cc7c8787ebc12787027faf98ccab900ffa6e,2024-12-13T22:15:09.013000 +CVE-2024-55956,0,1,f8dba9cc41cb9c12a5d90cb11c5a713786122e87fdd5f0d27b32d4206660fe63,2024-12-16T18:15:12.170000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 -CVE-2024-55969,0,0,b8d6e744182357bf303692c68a99b6881f3335ee6e7002ef516b5a8e35aa9140,2024-12-15T04:15:04.657000 +CVE-2024-55969,0,1,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000 CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000 -CVE-2024-55970,0,0,5b1dff250587b29c9634d8ef8df7f76368a1e76dee21d3944f7629ccef50be40,2024-12-15T03:15:15.263000 -CVE-2024-55972,1,1,1c44851ff34933b5d9d20c1d43229f33a01d18ccacf7c33b8ab8ff687a3ae63c,2024-12-16T15:15:23.613000 -CVE-2024-55973,1,1,88c683f476bee0b08a38ad5028fbfed3d3c5274f5b3a1ebfb1df181a1a2f2141,2024-12-16T15:15:23.767000 -CVE-2024-55974,1,1,64a3805e2dde6492ed0dae16ddb2d242bbca0f63953aa16f3a50643bc6d911ba,2024-12-16T15:15:24.397000 -CVE-2024-55976,1,1,677d9056c69dbe1fb1ca305a501c341e634fb161039746fcfd3fad470d57a092,2024-12-16T15:15:24.550000 -CVE-2024-55977,1,1,00bde74b9c09b028f5e45be95decc038680e51a23a68e23798ad262b3f6d0941,2024-12-16T15:15:24.700000 -CVE-2024-55978,1,1,70de8549de34b7beae6d0c7d53f0c88e5e5163d577c6d4b77e1e9a0d3587d5cb,2024-12-16T15:15:24.840000 -CVE-2024-55979,1,1,1de4e7a9a25645de571f57b84769f72b703a9ae20466abdf28ac0f56e198e2e4,2024-12-16T15:15:24.983000 +CVE-2024-55970,0,1,758b82af3b693a427bceeb6ff3980817487e79e485f9519217bb4cb4cf8b571e,2024-12-16T17:15:12.517000 +CVE-2024-55972,0,0,1c44851ff34933b5d9d20c1d43229f33a01d18ccacf7c33b8ab8ff687a3ae63c,2024-12-16T15:15:23.613000 +CVE-2024-55973,0,0,88c683f476bee0b08a38ad5028fbfed3d3c5274f5b3a1ebfb1df181a1a2f2141,2024-12-16T15:15:23.767000 +CVE-2024-55974,0,0,64a3805e2dde6492ed0dae16ddb2d242bbca0f63953aa16f3a50643bc6d911ba,2024-12-16T15:15:24.397000 +CVE-2024-55976,0,0,677d9056c69dbe1fb1ca305a501c341e634fb161039746fcfd3fad470d57a092,2024-12-16T15:15:24.550000 +CVE-2024-55977,0,0,00bde74b9c09b028f5e45be95decc038680e51a23a68e23798ad262b3f6d0941,2024-12-16T15:15:24.700000 +CVE-2024-55978,0,0,70de8549de34b7beae6d0c7d53f0c88e5e5163d577c6d4b77e1e9a0d3587d5cb,2024-12-16T15:15:24.840000 +CVE-2024-55979,0,0,1de4e7a9a25645de571f57b84769f72b703a9ae20466abdf28ac0f56e198e2e4,2024-12-16T15:15:24.983000 CVE-2024-5598,0,0,2cf80b31fb178896d7f3a9a8e95bb15f7d3d96fd4d258d8fe02fb96f5cf5629d,2024-11-21T09:47:59.580000 -CVE-2024-55980,1,1,c8db833ec7e6e3c339e99eae8d44a99f2eed3deef5836a2ec493c77fc198dde4,2024-12-16T15:15:25.130000 -CVE-2024-55981,1,1,f883699a36d99fb40d792fa40c88a353cf593e1183b7ec4c5e05b2733ffab54f,2024-12-16T15:15:25.283000 -CVE-2024-55982,1,1,5d9583881751b8be02c821a9caf92f4429cb26fc56f032f5634573dbe01fe6ce,2024-12-16T15:15:25.433000 -CVE-2024-55986,1,1,38dc69c582c764aa6783802fb0171e7b5042b834a050391697f2a15e6b5a2ec7,2024-12-16T15:15:25.577000 -CVE-2024-55987,1,1,320fc215a551586a71623e41c709ba0ae15b4b8c18f560d8881b040eb63bf602,2024-12-16T15:15:25.733000 -CVE-2024-55988,1,1,78318cefbf0a9cd3679cf8f17eeba7d821228ea534660f38950e54bc7283ddc6,2024-12-16T15:15:25.890000 -CVE-2024-55989,1,1,c38f3b2500e13c7423110e839aeebbc43ee4f66bb272c1e11d3951190aba708f,2024-12-16T15:15:26.073000 +CVE-2024-55980,0,0,c8db833ec7e6e3c339e99eae8d44a99f2eed3deef5836a2ec493c77fc198dde4,2024-12-16T15:15:25.130000 +CVE-2024-55981,0,0,f883699a36d99fb40d792fa40c88a353cf593e1183b7ec4c5e05b2733ffab54f,2024-12-16T15:15:25.283000 +CVE-2024-55982,0,0,5d9583881751b8be02c821a9caf92f4429cb26fc56f032f5634573dbe01fe6ce,2024-12-16T15:15:25.433000 +CVE-2024-55986,0,0,38dc69c582c764aa6783802fb0171e7b5042b834a050391697f2a15e6b5a2ec7,2024-12-16T15:15:25.577000 +CVE-2024-55987,0,0,320fc215a551586a71623e41c709ba0ae15b4b8c18f560d8881b040eb63bf602,2024-12-16T15:15:25.733000 +CVE-2024-55988,0,0,78318cefbf0a9cd3679cf8f17eeba7d821228ea534660f38950e54bc7283ddc6,2024-12-16T15:15:25.890000 +CVE-2024-55989,0,0,c38f3b2500e13c7423110e839aeebbc43ee4f66bb272c1e11d3951190aba708f,2024-12-16T15:15:26.073000 CVE-2024-5599,0,0,f3e32e76596c8dfbbbc9f620e9218f469ed68b0de9d9b75b168201bc4595067e,2024-11-21T09:47:59.700000 -CVE-2024-55990,1,1,2260d2c1e688c78ac510d9e6e1f0c916a427cc4ab382059bff4f2235835970a8,2024-12-16T15:15:26.223000 -CVE-2024-55992,1,1,66c21f67530201c357756290067290b55d9160751eedffe023b99fe9beda4546,2024-12-16T15:15:26.377000 -CVE-2024-55993,1,1,01857b4340d022453a35608fc0d89f3b2236d7e97f49b7795fa10f528b7ad3bf,2024-12-16T15:15:26.523000 -CVE-2024-55994,1,1,11be206618ebd59d6dd447780d180264658d58838f7be46230ab26bdde64cecd,2024-12-16T15:15:26.677000 -CVE-2024-55996,1,1,2565ba93c1f065db19de84241b28dc4a2fba083a567a0913fd4af777e3b95656,2024-12-16T15:15:26.820000 -CVE-2024-55998,1,1,710f5de4b14b0c0d8579bbf1dfad86e9bc65fb05373752f5527d05614fac6aa3,2024-12-16T15:15:26.957000 -CVE-2024-55999,1,1,bbc3255d877ba6fbd7a1898cc98740c856c51f1d6439a774d8af06fc147ebd17,2024-12-16T16:15:08.973000 +CVE-2024-55990,0,0,2260d2c1e688c78ac510d9e6e1f0c916a427cc4ab382059bff4f2235835970a8,2024-12-16T15:15:26.223000 +CVE-2024-55992,0,0,66c21f67530201c357756290067290b55d9160751eedffe023b99fe9beda4546,2024-12-16T15:15:26.377000 +CVE-2024-55993,0,0,01857b4340d022453a35608fc0d89f3b2236d7e97f49b7795fa10f528b7ad3bf,2024-12-16T15:15:26.523000 +CVE-2024-55994,0,0,11be206618ebd59d6dd447780d180264658d58838f7be46230ab26bdde64cecd,2024-12-16T15:15:26.677000 +CVE-2024-55996,0,0,2565ba93c1f065db19de84241b28dc4a2fba083a567a0913fd4af777e3b95656,2024-12-16T15:15:26.820000 +CVE-2024-55998,0,0,710f5de4b14b0c0d8579bbf1dfad86e9bc65fb05373752f5527d05614fac6aa3,2024-12-16T15:15:26.957000 +CVE-2024-55999,0,0,bbc3255d877ba6fbd7a1898cc98740c856c51f1d6439a774d8af06fc147ebd17,2024-12-16T16:15:08.973000 CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000 -CVE-2024-56001,1,1,189bca167b525ae14d039dc3f779fec34ac038e0d9f16b9139fc10002162db0f,2024-12-16T15:15:27.090000 -CVE-2024-56003,1,1,625ce523f1770738acc9f8f197189066eb7c396a7124f58b14e9fc0502e63bd0,2024-12-16T16:15:09.113000 -CVE-2024-56004,1,1,000434e0597f438da98218913e2ee2cb6238f56be36ccc6ef3c06ee0c32a6af1,2024-12-16T15:15:27.233000 -CVE-2024-56005,1,1,548e74b83a6ea05a9027b723682f0bf87d4d468fe2385c211a67a524bf422b89,2024-12-16T15:15:27.370000 -CVE-2024-56007,1,1,44c512d713a31fc6d0d0b8146683eb2f5c27273cd3a84a44340acadf5fa1a6bf,2024-12-16T15:15:27.507000 -CVE-2024-56009,1,1,775ac8634fcf4ecad99e9b5042c330f466f24f7950d7edd2b87f8adc82ecdec5,2024-12-16T15:15:27.643000 +CVE-2024-56001,0,0,189bca167b525ae14d039dc3f779fec34ac038e0d9f16b9139fc10002162db0f,2024-12-16T15:15:27.090000 +CVE-2024-56003,0,0,625ce523f1770738acc9f8f197189066eb7c396a7124f58b14e9fc0502e63bd0,2024-12-16T16:15:09.113000 +CVE-2024-56004,0,0,000434e0597f438da98218913e2ee2cb6238f56be36ccc6ef3c06ee0c32a6af1,2024-12-16T15:15:27.233000 +CVE-2024-56005,0,0,548e74b83a6ea05a9027b723682f0bf87d4d468fe2385c211a67a524bf422b89,2024-12-16T15:15:27.370000 +CVE-2024-56007,0,0,44c512d713a31fc6d0d0b8146683eb2f5c27273cd3a84a44340acadf5fa1a6bf,2024-12-16T15:15:27.507000 +CVE-2024-56009,0,0,775ac8634fcf4ecad99e9b5042c330f466f24f7950d7edd2b87f8adc82ecdec5,2024-12-16T15:15:27.643000 CVE-2024-5601,0,0,acbfc7658ae08d87e0393a42bceb6ed0cbea62f439f049ccb260c38457891d44,2024-11-21T09:47:59.930000 -CVE-2024-56011,1,1,0a424cb818da7335bf1f0c462b0a349e91b8f3641cc66bb68166f781c159c53b,2024-12-16T15:15:27.803000 -CVE-2024-56012,1,1,1294e1b9cfda889d2897343dbdd5a8f0d69df1b88d00748e64c163cc5857799d,2024-12-16T15:15:27.943000 -CVE-2024-56013,1,1,98d5f16619c75bf7700fe13a8918184b7016cc1b87371ca36dfb3fcf7e341f9c,2024-12-16T15:15:28.090000 -CVE-2024-56015,1,1,a40d49c757aa948f90c29b7c6bdf9b80dad98326d3e52005d5d7b1f0a780c74b,2024-12-16T15:15:28.230000 +CVE-2024-56011,0,0,0a424cb818da7335bf1f0c462b0a349e91b8f3641cc66bb68166f781c159c53b,2024-12-16T15:15:27.803000 +CVE-2024-56012,0,0,1294e1b9cfda889d2897343dbdd5a8f0d69df1b88d00748e64c163cc5857799d,2024-12-16T15:15:27.943000 +CVE-2024-56013,0,0,98d5f16619c75bf7700fe13a8918184b7016cc1b87371ca36dfb3fcf7e341f9c,2024-12-16T15:15:28.090000 +CVE-2024-56015,0,0,a40d49c757aa948f90c29b7c6bdf9b80dad98326d3e52005d5d7b1f0a780c74b,2024-12-16T15:15:28.230000 CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000 CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000 CVE-2024-5605,0,0,a58f7d5ea1a1f097543f1fa828fe0f4d77e53004da146d280334895bad6f3fd1,2024-11-21T09:48:00.363000 CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000 CVE-2024-5607,0,0,2f2e883967a2421396c2c72ed671760bd1b0ce90e12a34d10be305825ec8d97f,2024-11-21T09:48:00.667000 -CVE-2024-56072,0,0,bd6e4433d11f02012078ec78b3d640c7b5f2f1fd75efb6e332973e1bbc62319d,2024-12-15T03:15:16.323000 -CVE-2024-56073,0,0,01824a247f09195beb347683faab76db49c5c6281fc26b7356c5505b6ae504c1,2024-12-15T03:15:16.433000 -CVE-2024-56074,0,1,4a0e54489986d9a8929c35bb21fa99462f381a7418844c952c8f6fe6d433d784,2024-12-16T16:15:09.250000 +CVE-2024-56072,0,1,88ae4fab448aef17d7ce79e69ee4a7b01a08327e8323b97aaa0bf31e47edc0fa,2024-12-16T17:15:13.500000 +CVE-2024-56073,0,1,0848d69945fe346d4c559540376bcd3a06c98d1fb7ba30ac0206a01b1e587ab0,2024-12-16T17:15:13.700000 +CVE-2024-56074,0,0,4a0e54489986d9a8929c35bb21fa99462f381a7418844c952c8f6fe6d433d784,2024-12-16T16:15:09.250000 CVE-2024-5608,0,0,ced92374bfec9f9526a30572e667eb2d7d2eee08d2b8c010b292f0924bebbe2c,2024-11-26T01:42:21.587000 -CVE-2024-56082,0,1,df77aa083621f3cbe4f477b0149a9cf1724aee6e10bd2b96a61219d972b348a1,2024-12-16T16:15:09.460000 -CVE-2024-56083,0,0,d5ae267ba83e28c541445d0350006e64b5fe517cb65a3dc2c39e4da3ee6ab5c3,2024-12-16T03:15:04.650000 -CVE-2024-56084,0,1,6555848ae48b9f6dd50622badb3bd2ee416e5c7c85e8d4c41399c1928fe22792,2024-12-16T16:15:09.647000 -CVE-2024-56085,0,1,84b6c02bec28fda12b581609dc9c482f299fc4f7b2fdd8ef29c683562f037bcf,2024-12-16T16:15:09.803000 -CVE-2024-56086,0,1,55b2e18e9093ba91193d6a87cd1d557d79b0006f86d41a690637db3e2c4eeda7,2024-12-16T16:15:09.980000 -CVE-2024-56087,0,1,71bdda0ff7417396ad31c25e1bfa27f6b23e1f9a164b7da02056ec46ee4b5351,2024-12-16T16:15:10.147000 +CVE-2024-56082,0,0,df77aa083621f3cbe4f477b0149a9cf1724aee6e10bd2b96a61219d972b348a1,2024-12-16T16:15:09.460000 +CVE-2024-56083,0,1,fd98be0687525a64c3d2adcf2c9aeb18be62f2da53efa9ebfffaaf9bc8f12f62,2024-12-16T17:15:13.883000 +CVE-2024-56084,0,0,6555848ae48b9f6dd50622badb3bd2ee416e5c7c85e8d4c41399c1928fe22792,2024-12-16T16:15:09.647000 +CVE-2024-56085,0,0,84b6c02bec28fda12b581609dc9c482f299fc4f7b2fdd8ef29c683562f037bcf,2024-12-16T16:15:09.803000 +CVE-2024-56086,0,0,55b2e18e9093ba91193d6a87cd1d557d79b0006f86d41a690637db3e2c4eeda7,2024-12-16T16:15:09.980000 +CVE-2024-56087,0,0,71bdda0ff7417396ad31c25e1bfa27f6b23e1f9a164b7da02056ec46ee4b5351,2024-12-16T16:15:10.147000 CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000 -CVE-2024-56112,0,1,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000 +CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000 @@ -270711,6 +270721,8 @@ CVE-2024-5996,0,0,ab938dbc15262bb65cf82c58e85d96d3d9a41bba3218e574f8e961fd3a4906 CVE-2024-5997,0,0,f6cf4585516235311dc7c2c69a92d03bff08a1630eacba144d0b12e98a2e8657,2024-11-21T09:48:43.213000 CVE-2024-5998,0,0,7ba9585e81929506742dd30133b73214729ccaf495e2aa027e4714602d643d3a,2024-09-20T12:31:20.110000 CVE-2024-6000,0,0,c0a8f2199fd2fc04da26fd71b681e578569b3771e08f3f8f75db1489fb51c7ac,2024-11-21T09:48:43.430000 +CVE-2024-6001,1,1,957fe6d4263378be18d134528e5428759b67132090ddb85901a9e793426494f5,2024-12-16T17:15:14.197000 +CVE-2024-6002,1,1,3350b4fcbe46a034a4e9ee31a02622ace816cc3f126f77f8e0afd03f3f95671f,2024-12-16T18:15:12.450000 CVE-2024-6003,0,0,adb3112b68aa60fc319f3564467d2c4f7d8c9831c68441a431a933e87ad435a6,2024-11-21T09:48:43.547000 CVE-2024-6004,0,0,258c39032f92beea0e983412df12cc6591803e84d5bdedbab39737c02a0d5b1e,2024-08-19T13:00:23.117000 CVE-2024-6005,0,0,1699306c262156bd4b14bac7e2ef337c50c9b17dd77b065bdf89f8998bd042d6,2024-11-21T09:48:43.753000 @@ -272500,6 +272512,7 @@ CVE-2024-8051,0,0,8e9fee878d5e7631408c4906ee6d422d2dad39846c3e9dba922a4347408bef CVE-2024-8052,0,0,01bfdadf93739fc2d4fcd8ca2ee549a442e377fc63e756e286ed6ad0eef90332,2024-09-27T16:55:57.383000 CVE-2024-8054,0,0,7587a87813e515f4d1b36dbcf3c7051a83e94df022103a0c59749ae8c66becaa,2024-09-27T21:29:57.607000 CVE-2024-8056,0,0,0063e3259bfec678c90e65014b514e3fc5b53335b06f114b8add8272bc670dcc,2024-09-27T21:29:42.600000 +CVE-2024-8058,1,1,5efe7e7e9014524245ca57089952638fc63f2431b68fe541d88c7d12ec883d0c,2024-12-16T18:15:12.540000 CVE-2024-8059,0,0,1cb4facf7c91a3d9a97ccb8a1f3191711112656d77de35de0353c495e40da8b5,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8066,0,0,23914c4c07a72976bf77323f8c8c88f9f1b5c360164b6197b2a6c72e85e345f6,2024-11-28T09:15:05.547000