From 8dbbdf839768b5fd1c3827ffca67fef8976c86c3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 3 Dec 2024 19:03:35 +0000 Subject: [PATCH] Auto-Update: 2024-12-03T19:00:25.275105+00:00 --- CVE-2018/CVE-2018-94xx/CVE-2018-9414.json | 43 +- CVE-2021/CVE-2021-298xx/CVE-2021-29892.json | 56 ++ CVE-2023/CVE-2023-313xx/CVE-2023-31307.json | 22 +- CVE-2023/CVE-2023-313xx/CVE-2023-31348.json | 77 ++- CVE-2023/CVE-2023-313xx/CVE-2023-31349.json | 75 ++- CVE-2023/CVE-2023-313xx/CVE-2023-31366.json | 77 ++- CVE-2023/CVE-2023-428xx/CVE-2023-42855.json | 78 ++- CVE-2023/CVE-2023-428xx/CVE-2023-42858.json | 109 +++- CVE-2023/CVE-2023-428xx/CVE-2023-42859.json | 109 +++- CVE-2023/CVE-2023-428xx/CVE-2023-42860.json | 107 +++- CVE-2023/CVE-2023-428xx/CVE-2023-42878.json | 142 ++++- CVE-2023/CVE-2023-523xx/CVE-2023-52345.json | 34 +- CVE-2023/CVE-2023-72xx/CVE-2023-7255.json | 16 + CVE-2024/CVE-2024-209xx/CVE-2024-20995.json | 14 +- CVE-2024/CVE-2024-210xx/CVE-2024-21044.json | 14 +- CVE-2024/CVE-2024-210xx/CVE-2024-21052.json | 30 +- CVE-2024/CVE-2024-210xx/CVE-2024-21063.json | 26 +- CVE-2024/CVE-2024-227xx/CVE-2024-22727.json | 31 +- CVE-2024/CVE-2024-244xx/CVE-2024-24426.json | 39 +- CVE-2024/CVE-2024-250xx/CVE-2024-25019.json | 56 ++ CVE-2024/CVE-2024-250xx/CVE-2024-25020.json | 56 ++ CVE-2024/CVE-2024-250xx/CVE-2024-25035.json | 56 ++ CVE-2024/CVE-2024-250xx/CVE-2024-25036.json | 56 ++ CVE-2024/CVE-2024-288xx/CVE-2024-28829.json | 639 ++++++++++++++++++- CVE-2024/CVE-2024-294xx/CVE-2024-29404.json | 29 + CVE-2024/CVE-2024-302xx/CVE-2024-30205.json | 63 +- CVE-2024/CVE-2024-316xx/CVE-2024-31695.json | 39 +- CVE-2024/CVE-2024-349xx/CVE-2024-34931.json | 43 +- CVE-2024/CVE-2024-373xx/CVE-2024-37302.json | 56 ++ CVE-2024/CVE-2024-373xx/CVE-2024-37303.json | 60 ++ CVE-2024/CVE-2024-373xx/CVE-2024-37392.json | 21 +- CVE-2024/CVE-2024-380xx/CVE-2024-38036.json | 30 +- CVE-2024/CVE-2024-388xx/CVE-2024-38859.json | 654 +++++++++++++++++++- CVE-2024/CVE-2024-406xx/CVE-2024-40691.json | 56 ++ CVE-2024/CVE-2024-417xx/CVE-2024-41775.json | 56 ++ CVE-2024/CVE-2024-417xx/CVE-2024-41776.json | 56 ++ CVE-2024/CVE-2024-417xx/CVE-2024-41777.json | 56 ++ CVE-2024/CVE-2024-456xx/CVE-2024-45676.json | 56 ++ CVE-2024/CVE-2024-506xx/CVE-2024-50647.json | 39 +- CVE-2024/CVE-2024-506xx/CVE-2024-50648.json | 39 +- CVE-2024/CVE-2024-506xx/CVE-2024-50649.json | 39 +- CVE-2024/CVE-2024-506xx/CVE-2024-50650.json | 39 +- CVE-2024/CVE-2024-507xx/CVE-2024-50724.json | 39 +- CVE-2024/CVE-2024-511xx/CVE-2024-51164.json | 39 +- CVE-2024/CVE-2024-525xx/CVE-2024-52544.json | 56 ++ CVE-2024/CVE-2024-525xx/CVE-2024-52545.json | 56 ++ CVE-2024/CVE-2024-525xx/CVE-2024-52546.json | 56 ++ CVE-2024/CVE-2024-525xx/CVE-2024-52547.json | 56 ++ CVE-2024/CVE-2024-525xx/CVE-2024-52548.json | 56 ++ CVE-2024/CVE-2024-528xx/CVE-2024-52805.json | 86 +++ CVE-2024/CVE-2024-528xx/CVE-2024-52815.json | 78 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53863.json | 78 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53867.json | 60 ++ CVE-2024/CVE-2024-87xx/CVE-2024-8775.json | 18 +- CVE-2024/CVE-2024-99xx/CVE-2024-9902.json | 7 +- README.md | 93 +-- _state.csv | 257 ++++---- 57 files changed, 4127 insertions(+), 301 deletions(-) create mode 100644 CVE-2021/CVE-2021-298xx/CVE-2021-29892.json create mode 100644 CVE-2023/CVE-2023-72xx/CVE-2023-7255.json create mode 100644 CVE-2024/CVE-2024-250xx/CVE-2024-25019.json create mode 100644 CVE-2024/CVE-2024-250xx/CVE-2024-25020.json create mode 100644 CVE-2024/CVE-2024-250xx/CVE-2024-25035.json create mode 100644 CVE-2024/CVE-2024-250xx/CVE-2024-25036.json create mode 100644 CVE-2024/CVE-2024-294xx/CVE-2024-29404.json create mode 100644 CVE-2024/CVE-2024-373xx/CVE-2024-37302.json create mode 100644 CVE-2024/CVE-2024-373xx/CVE-2024-37303.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40691.json create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41775.json create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41776.json create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41777.json create mode 100644 CVE-2024/CVE-2024-456xx/CVE-2024-45676.json create mode 100644 CVE-2024/CVE-2024-525xx/CVE-2024-52544.json create mode 100644 CVE-2024/CVE-2024-525xx/CVE-2024-52545.json create mode 100644 CVE-2024/CVE-2024-525xx/CVE-2024-52546.json create mode 100644 CVE-2024/CVE-2024-525xx/CVE-2024-52547.json create mode 100644 CVE-2024/CVE-2024-525xx/CVE-2024-52548.json create mode 100644 CVE-2024/CVE-2024-528xx/CVE-2024-52805.json create mode 100644 CVE-2024/CVE-2024-528xx/CVE-2024-52815.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53863.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53867.json diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9414.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9414.json index 13236f9b2b1..b4f9ec2aa00 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9414.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9414.json @@ -2,16 +2,55 @@ "id": "CVE-2018-9414", "sourceIdentifier": "security@android.com", "published": "2024-12-02T21:15:09.757", - "lastModified": "2024-12-02T21:15:09.757", + "lastModified": "2024-12-03T18:15:11.267", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In gattServerSendResponseNative of com_android_bluetooth_gatt.cpp, there is\u00a0a possible out of bounds stack write due to a missing bounds check. This\u00a0could lead to local escalation of privilege with User execution privileges\u00a0needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En gattServerSendResponseNative de com_android_bluetooth_gatt.cpp, existe una posible escritura en la pila fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios con privilegios de ejecuci\u00f3n de usuario necesarios. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", diff --git a/CVE-2021/CVE-2021-298xx/CVE-2021-29892.json b/CVE-2021/CVE-2021-298xx/CVE-2021-29892.json new file mode 100644 index 00000000000..4561cd11745 --- /dev/null +++ b/CVE-2021/CVE-2021-298xx/CVE-2021-29892.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2021-29892", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T17:15:05.760", + "lastModified": "2024-12-03T17:15:05.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31307.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31307.json index f97eb1834fc..6446af02df8 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31307.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31307", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:20.500", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:15:07.017", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.3, + "baseSeverity": "LOW", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -30,15 +32,25 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "LOW", - "baseScore": 2.3, - "baseSeverity": "LOW" + "availabilityImpact": "LOW" }, "exploitabilityScore": 0.8, "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31348.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31348.json index ae980552f82..24d6f1c3978 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31348.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31348.json @@ -2,13 +2,13 @@ "id": "CVE-2023-31348", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:21.307", - "lastModified": "2024-08-14T15:35:02.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T18:46:38.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A DLL hijacking vulnerability in AMD \u03bcProf could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution." + "value": "A DLL hijacking vulnerability in AMD ?Prof could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution." }, { "lang": "es", @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,16 +32,44 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.3, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.3, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,43 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "4.1.424", + "matchCriteriaId": "4B13FA61-9E51-45AF-A0F8-0C3A518B390A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:freebsd:*:*", + "versionEndExcluding": "4.2.816", + "matchCriteriaId": "50D6F227-1657-451F-AF90-A68B6A4BF03A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "4.2.845", + "matchCriteriaId": "E175F21E-6872-42B1-8C4C-6B473440EE12" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-9001", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31349.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31349.json index b3f826e4805..3de0c6ca52b 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31349.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31349.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31349", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:21.500", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T18:37:37.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,12 +32,30 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.3, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.3, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,55 @@ "value": "CWE-276" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "4.1.424", + "matchCriteriaId": "4B13FA61-9E51-45AF-A0F8-0C3A518B390A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:freebsd:*:*", + "versionEndExcluding": "4.2.816", + "matchCriteriaId": "50D6F227-1657-451F-AF90-A68B6A4BF03A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "4.2.845", + "matchCriteriaId": "E175F21E-6872-42B1-8C4C-6B473440EE12" + } + ] + } + ] } ], "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-9001", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-313xx/CVE-2023-31366.json b/CVE-2023/CVE-2023-313xx/CVE-2023-31366.json index 3f2cdfbb6a2..8d5b79c78d5 100644 --- a/CVE-2023/CVE-2023-313xx/CVE-2023-31366.json +++ b/CVE-2023/CVE-2023-313xx/CVE-2023-31366.json @@ -2,13 +2,13 @@ "id": "CVE-2023-31366", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:21.913", - "lastModified": "2024-08-14T17:15:14.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T18:30:25.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper input validation in AMD \u03bcProf could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service." + "value": "Improper input validation in AMD ?Prof could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service." }, { "lang": "es", @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,12 +32,30 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "LOW", - "baseScore": 3.3, - "baseSeverity": "LOW" + "availabilityImpact": "LOW" }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,55 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "4.1.424", + "matchCriteriaId": "4B13FA61-9E51-45AF-A0F8-0C3A518B390A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:freebsd:*:*", + "versionEndExcluding": "4.2.816", + "matchCriteriaId": "50D6F227-1657-451F-AF90-A68B6A4BF03A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amd:uprof:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "4.2.845", + "matchCriteriaId": "E175F21E-6872-42B1-8C4C-6B473440EE12" + } + ] + } + ] } ], "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-9001", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42855.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42855.json index d716653e947..466c80908af 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42855.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42855.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42855", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:49.460", - "lastModified": "2024-11-01T20:35:01.867", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:32:38.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,12 +17,34 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", "attackVector": "PHYSICAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,19 +52,63 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 4.6, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 0.9, "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213982", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42858.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42858.json index 6481b4a60e0..638c0c92200 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42858.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42858.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42858", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:49.533", - "lastModified": "2024-11-05T20:35:12.087", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:30:04.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,12 +17,34 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,27 +52,98 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.1", + "matchCriteriaId": "BA796DD3-80AF-4E65-8080-EC309577F00D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.1", + "matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213983", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213984", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213985", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213984", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213985", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json index 4109fb1c785..bbf655247fb 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42859.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42859", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:49.670", - "lastModified": "2024-08-01T13:44:47.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:27:41.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,12 +17,34 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,27 +52,98 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 7.7, - "baseSeverity": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.5, "impactScore": 5.2 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.1", + "matchCriteriaId": "BA796DD3-80AF-4E65-8080-EC309577F00D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.1", + "matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213983", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213984", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213985", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213984", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213985", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json index 7c13559746b..5c5e68b863a 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42860.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42860", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:49.827", - "lastModified": "2024-10-28T20:35:06.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:24:43.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,12 +17,34 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +52,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 7.7, - "baseSeverity": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.5, "impactScore": 5.2 @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7.1", + "matchCriteriaId": "BA796DD3-80AF-4E65-8080-EC309577F00D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.1", + "matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213983", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213984", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213985", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213983", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213984", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213985", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42878.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42878.json index 8df597a33bc..531e64b2e47 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42878.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42878.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42878", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.357", - "lastModified": "2024-02-22T19:07:27.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:17:41.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,149 @@ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en watchOS 10.1, macOS Sonoma 14.1, iOS 17.1 y iPadOS 17.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.1", + "matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213982", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213984", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213988", + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213984", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213988", - "source": "product-security@apple.com" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52345.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52345.json index 4fbd9939dad..04b840e9daa 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52345.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52345", "sourceIdentifier": "security@unisoc.com", "published": "2024-04-08T03:15:08.457", - "lastModified": "2024-11-27T16:22:10.590", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T17:15:08.390", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7255.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7255.json new file mode 100644 index 00000000000..945bf169ae6 --- /dev/null +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7255.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2023-7255", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-12-03T18:15:12.743", + "lastModified": "2024-12-03T18:15:12.743", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Assigned as duplicate and no longer used." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20995.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20995.json index ad5f78f74eb..17c3045f6c1 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20995.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20995.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20995", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:12.793", - "lastModified": "2024-11-27T16:37:10.153", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T17:15:08.597", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21044.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21044.json index ab5357eb4b5..532cc552bf8 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21044.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21044.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21044", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:21.110", - "lastModified": "2024-11-27T16:29:16.483", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T17:15:08.787", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21052.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21052.json index da6519ede2b..07105780147 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21052.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21052.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21052", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:22.500", - "lastModified": "2024-04-26T09:15:10.767", + "lastModified": "2024-12-03T17:15:08.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -30,15 +32,25 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 4.9, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.2, "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240426-0012/", @@ -47,6 +59,14 @@ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "source": "secalert_us@oracle.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20240426-0012/", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21063.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21063.json index 477a4206d24..ac916bfdd5a 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21063.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21063.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21063", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:24.417", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-12-03T17:15:09.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,19 +32,33 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" + "availabilityImpact": "LOW" }, "exploitabilityScore": 1.3, "impactScore": 4.7 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "source": "secalert_us@oracle.com" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22727.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22727.json index a9e8dcb607c..e7f1d9dc366 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22727.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22727.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22727", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-17T04:15:07.573", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-12-03T17:15:09.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,38 @@ "value": "Los dispositivos Teltonika de la serie TRB1 con firmware anterior a TRB1_R_00.07.05.2 permiten a los atacantes explotar una vulnerabilidad del firmware a trav\u00e9s de Ethernet LAN o USB." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, "references": [ { "url": "https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways", "source": "cve@mitre.org" + }, + { + "url": "https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24426.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24426.json index 424193dbf3e..e1f1488845e 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24426.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24426.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24426", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T19:15:06.057", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-12-03T17:15:09.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las afirmaciones alcanzables en la funci\u00f3n NGAP_FIND_PROTOCOLIE_BY_ID de OpenAirInterface Magma v1.8.0 y OAI EPC Federation v1.2.0 permiten a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NGAP manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25019.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25019.json new file mode 100644 index 00000000000..1ffaecdd9ab --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25019.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25019", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T17:15:09.560", + "lastModified": "2024-12-03T17:15:09.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\ncould be vulnerable to malicious file upload by not validating the type of file uploaded to Journal entry attachments. Attackers can make use of this weakness and upload malicious executable files into the system that can be sent to victims for performing further attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25020.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25020.json new file mode 100644 index 00000000000..b563b0bfc1c --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25020.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25020", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T18:15:12.997", + "lastModified": "2024-12-03T18:15:12.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\n\n\n\n\n\n\n\n\n\n\n\n\nis vulnerable to malicious file upload by allowing unrestricted filetype attachments in the Journal entry page. Attackers can make use of this weakness and upload malicious executable files into the system and can be sent to victims for performing further attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25035.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25035.json new file mode 100644 index 00000000000..d1a8e3324cf --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25035.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25035", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T17:15:09.753", + "lastModified": "2024-12-03T17:15:09.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\n\n\nexposes server details that could allow an attacker to obtain information of the application environment to conduct further attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25036.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25036.json new file mode 100644 index 00000000000..1cd95e18490 --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25036.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25036", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T17:15:09.923", + "lastModified": "2024-12-03T17:15:09.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\n\n\n\n\ncould allow an authenticated user with local access to bypass security allowing users to circumvent restrictions imposed on input fields." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json index 3debc476080..44ec1ca6b99 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28829.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28829", "sourceIdentifier": "security@checkmk.com", "published": "2024-08-20T10:15:05.693", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:55:48.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "PRESENT", @@ -54,11 +56,31 @@ "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED", - "baseScore": 5.2, - "baseSeverity": "MEDIUM" + "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -75,12 +97,617 @@ "value": "CWE-807" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FFBDA1FD-7112-4309-AFDC-57DFF865365A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", + "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*", + "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*", + "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*", + "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*", + "matchCriteriaId": "8A34B28B-2BD9-4F28-9428-8CF7FCEAD7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*", + "matchCriteriaId": "D3FC491E-DE27-4C8F-B699-DB5260935D51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*", + "matchCriteriaId": "0BE2C8FE-20CC-4B7E-B27B-54C873DC7530" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*", + "matchCriteriaId": "5C3C3714-C696-4456-88AA-B6E4EFC73C92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*", + "matchCriteriaId": "BFF9D1C9-C340-4C31-A3EA-74EF85C6F34D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*", + "matchCriteriaId": "A70FBA9D-F7DF-4961-9518-F7AE14FE174D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*", + "matchCriteriaId": "FB38424F-0955-4FE3-9C1D-69D21A08AA8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*", + "matchCriteriaId": "4EE19624-17FB-45DD-926D-1A745FF02CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p46:*:*:*:*:*:*", + "matchCriteriaId": "C7E289B5-B6C6-4514-9CA1-5EBE155ECFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", + "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194" + } + ] + } + ] } ], "references": [ { "url": "https://checkmk.com/werk/16249", - "source": "security@checkmk.com" + "source": "security@checkmk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29404.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29404.json new file mode 100644 index 00000000000..aeee83ee154 --- /dev/null +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29404.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-29404", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T17:15:10.087", + "lastModified": "2024-12-03T17:15:10.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Razer Synapse 3 v.3.9.131.20813 and Synapse 3 App v.20240213 allows a local attacker to execute arbitrary code via the export parameter of the Chroma Effects function in the Profiles component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mansk1es/CVE-2024-29404_Razer", + "source": "cve@mitre.org" + }, + { + "url": "https://www.razer.com/synapse-3", + "source": "cve@mitre.org" + }, + { + "url": "https://www.zerodayinitiative.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30205.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30205.json index cd8edb2cf46..a517dd04109 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30205.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30205.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30205", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-25T15:15:52.567", - "lastModified": "2024-05-01T17:15:32.820", + "lastModified": "2024-12-03T17:15:10.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Emacs anterior a 29.3, el modo Org considera que el contenido de los archivos remotos es confiable. Esto afecta al modo de organizaci\u00f3n anterior a la versi\u00f3n 9.6.23." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/25/2", @@ -40,6 +75,30 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00024.html", "source": "cve@mitre.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/03/25/2", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=2bc865ace050ff118db43f01457f95f95112b877", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=4255d5dcc0657915f90e4fba7e0a5514cced514d", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00023.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json index 200d9f2ccc8..d716e826054 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31695", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T22:15:15.953", - "lastModified": "2024-11-15T13:58:08.913", + "lastModified": "2024-12-03T17:15:10.377", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una mala configuraci\u00f3n en el mecanismo de autenticaci\u00f3n de huellas dactilares de Binance: BTC, Crypto y NFTS v2.85.4, permite a los atacantes eludir la autenticaci\u00f3n al agregar una nueva huella dactilar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://zzzxiin.github.io/post/binance/", diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34931.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34931.json index d0806dbeb81..625626eb85a 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34931.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34931.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34931", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:29.930", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-12-03T17:15:10.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/update_subject.php en Campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de nombre." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2024.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2024.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37302.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37302.json new file mode 100644 index 00000000000..bcff16e89f1 --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37302.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37302", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-03T17:15:10.733", + "lastModified": "2024-12-03T17:15:10.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Synapse is an open-source Matrix homeserver. Synapse versions before 1.106 are vulnerable to a disk fill attack, where an unauthenticated adversary can induce Synapse to download and cache large amounts of remote media. The default rate limit strategy is insufficient to mitigate this. This can lead to a denial of service, ranging from further media uploads/downloads failing to completely unavailability of the Synapse process, depending on how Synapse was deployed. Synapse 1.106 introduces a new \"leaky bucket\" rate limit on remote media downloads to reduce the amount of data a user can request at a time. This does not fully address the issue, but does limit an unauthenticated user's ability to request large amounts of data to be cached." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37303.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37303.json new file mode 100644 index 00000000000..a628d5b5e74 --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37303.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-37303", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-03T17:15:10.890", + "lastModified": "2024-12-03T17:15:10.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/matrix-spec-proposals/pull/3916", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json index 02ac70b05eb..052e90079c2 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37392", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T21:15:07.253", - "lastModified": "2024-10-27T14:35:09.803", + "lastModified": "2024-12-03T18:15:13.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 @@ -43,6 +43,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -50,9 +52,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 @@ -101,11 +101,8 @@ ], "references": [ { - "url": "https://www.smseagle.eu/2024/08/21/resolved-xss-in-smseagle-software-cve-2024-37392/", - "source": "cve@mitre.org", - "tags": [ - "Vendor Advisory" - ] + "url": "https://www.smseagle.eu/security-advisory/resolved-xss-in-smseagle-software-cve-2024-37392/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json b/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json index 6b562c6356c..dd6390507b7 100644 --- a/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json +++ b/CVE-2024/CVE-2024-380xx/CVE-2024-38036.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38036", "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.973", - "lastModified": "2024-10-15T14:34:51.537", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T18:15:13.710", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,11 +18,13 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "psirt@esri.com", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,39 +32,37 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 }, { - "source": "psirt@esri.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 4.6, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.1, - "impactScore": 2.5 + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38859.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38859.json index 222037043cf..09e04f72af7 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38859.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38859.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38859", "sourceIdentifier": "security@checkmk.com", "published": "2024-08-26T15:15:08.183", - "lastModified": "2024-08-26T15:15:23.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T17:47:02.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -54,11 +56,31 @@ "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED", - "baseScore": 4.8, - "baseSeverity": "MEDIUM" + "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -71,12 +93,632 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FFBDA1FD-7112-4309-AFDC-57DFF865365A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", + "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*", + "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*", + "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*", + "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*", + "matchCriteriaId": "8A34B28B-2BD9-4F28-9428-8CF7FCEAD7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*", + "matchCriteriaId": "D3FC491E-DE27-4C8F-B699-DB5260935D51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*", + "matchCriteriaId": "0BE2C8FE-20CC-4B7E-B27B-54C873DC7530" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*", + "matchCriteriaId": "5C3C3714-C696-4456-88AA-B6E4EFC73C92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*", + "matchCriteriaId": "BFF9D1C9-C340-4C31-A3EA-74EF85C6F34D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*", + "matchCriteriaId": "A70FBA9D-F7DF-4961-9518-F7AE14FE174D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*", + "matchCriteriaId": "FB38424F-0955-4FE3-9C1D-69D21A08AA8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*", + "matchCriteriaId": "4EE19624-17FB-45DD-926D-1A745FF02CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p46:*:*:*:*:*:*", + "matchCriteriaId": "C7E289B5-B6C6-4514-9CA1-5EBE155ECFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", + "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*", + "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194" + } + ] + } + ] } ], "references": [ { "url": "https://checkmk.com/werk/17026", - "source": "security@checkmk.com" + "source": "security@checkmk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40691.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40691.json new file mode 100644 index 00000000000..6d8d458cd45 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40691.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-40691", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T17:15:11.037", + "lastModified": "2024-12-03T17:15:11.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\ncould be vulnerable to malicious file upload by not validating the content of the file uploaded to the web interface. Attackers can make use of this weakness and upload malicious executable files into the system, and it can be sent to victim for performing further attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41775.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41775.json new file mode 100644 index 00000000000..d84374a3277 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41775.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41775", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T18:15:13.920", + "lastModified": "2024-12-03T18:15:13.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1\u00a0uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41776.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41776.json new file mode 100644 index 00000000000..ae8600f0cb3 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41776.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41776", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T18:15:14.107", + "lastModified": "2024-12-03T18:15:14.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\n\n\n\n\n\n\n\n\n\n\nis vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41777.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41777.json new file mode 100644 index 00000000000..ad305e5c7c4 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41777.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41777", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T18:15:14.293", + "lastModified": "2024-12-03T18:15:14.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\n\n\n\n\n\n\n\n\ncontains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45676.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45676.json new file mode 100644 index 00000000000..4bb0232f296 --- /dev/null +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45676.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45676", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-03T18:15:14.480", + "lastModified": "2024-12-03T18:15:14.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\n\n\n\n\n\n\ncould allow an authenticated user to upload insecure files, due to insufficient file type distinction." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-351" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177220", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50647.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50647.json index e48fa51f75d..3d88a0f948b 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50647.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50647.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50647", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.467", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-12-03T17:15:11.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "python_food ordering system V1.0 tiene una vulnerabilidad no autorizada que provoca la filtraci\u00f3n de informaci\u00f3n confidencial del usuario. Los atacantes pueden acceder a \u00e9l a trav\u00e9s de https://ip:port/api/myapp/index/user/info?id=1 y modificar el valor de la identificaci\u00f3n para obtener informaci\u00f3n confidencial del usuario sin autorizaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://github.com/Yllxx03/CVE/blob/main/python_food_Information_Disclosure.md", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json index 06e34a6fa48..31cafe1a3f4 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50648", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.547", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-12-03T17:15:11.357", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "yshopmall V1.0 tiene una vulnerabilidad de carga de archivos arbitrarios, que puede habilitar RCE o incluso tomar el control del servidor cuando est\u00e1 configurado incorrectamente para analizar archivos JSP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/Yllxx03/CVE/blob/main/yshop_fileu_pload.md", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json index 6ea28277a85..4190d6bcca2 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50649", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.637", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-12-03T17:15:11.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La funci\u00f3n de carga de avatar de usuario en python_book V1.0 tiene una vulnerabilidad de carga de archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/Yllxx03/CVE/blob/main/python_book/FileUpload.md", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json index 044d48c384f..5711670e44b 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50650", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.710", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-12-03T17:15:11.683", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "python_book V1.0 es vulnerable a un control de acceso incorrecto, que permite a los atacantes obtener informaci\u00f3n confidencial de usuarios con diferentes ID modificando el par\u00e1metro ID." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://github.com/Yllxx03/CVE/blob/main/python_book/BrokenAccessControl.md", diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50724.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50724.json index ca4071de399..04a1d5b9e58 100644 --- a/CVE-2024/CVE-2024-507xx/CVE-2024-50724.json +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50724.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50724", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:36.943", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-12-03T17:15:11.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que KASO v9.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro person_id en /cardcase/editcard.jsp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/youyuzhongli/KASO-SQL/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51164.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51164.json index 02b510f7cd6..e53d1df0a09 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51164.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51164.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51164", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T16:15:37.057", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-12-03T17:15:11.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Varios par\u00e1metros tienen una vulnerabilidad de inyecci\u00f3n SQL en JEPaaS 7.2.8 a trav\u00e9s de /je/login/btnLog/insertBtnLog, lo que podr\u00eda permitir que un usuario remoto env\u00ede una consulta especialmente manipulada, permitiendo a un atacante recuperar toda la informaci\u00f3n almacenada en la base de datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gitee.com/ketr/jepaas-release", diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52544.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52544.json new file mode 100644 index 00000000000..517c3f812d3 --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52544.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52544", + "sourceIdentifier": "cve@rapid7.com", + "published": "2024-12-03T18:15:15.327", + "lastModified": "2024-12-03T18:15:15.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can trigger a stack based buffer overflow in the DP Service (TCP port 3500). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sfewer-r7/LorexExploit", + "source": "cve@rapid7.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52545.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52545.json new file mode 100644 index 00000000000..463140d953b --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52545.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52545", + "sourceIdentifier": "cve@rapid7.com", + "published": "2024-12-03T18:15:15.543", + "lastModified": "2024-12-03T18:15:15.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can perform an out of bounds heap read in the IQ Service (TCP port 9876). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sfewer-r7/LorexExploit", + "source": "cve@rapid7.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52546.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52546.json new file mode 100644 index 00000000000..8d55cdf3498 --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52546.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52546", + "sourceIdentifier": "cve@rapid7.com", + "published": "2024-12-03T18:15:15.710", + "lastModified": "2024-12-03T18:15:15.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can perform a null pointer dereference in the DHIP Service (UDP port 37810). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sfewer-r7/LorexExploit", + "source": "cve@rapid7.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52547.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52547.json new file mode 100644 index 00000000000..4b868280cd1 --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52547.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52547", + "sourceIdentifier": "cve@rapid7.com", + "published": "2024-12-03T18:15:15.860", + "lastModified": "2024-12-03T18:15:15.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated attacker can trigger a stack based buffer overflow in the DHIP Service (TCP port 80). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sfewer-r7/LorexExploit", + "source": "cve@rapid7.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52548.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52548.json new file mode 100644 index 00000000000..8171c56100f --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52548.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52548", + "sourceIdentifier": "cve@rapid7.com", + "published": "2024-12-03T18:15:16.023", + "lastModified": "2024-12-03T18:15:16.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve@rapid7.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sfewer-r7/LorexExploit", + "source": "cve@rapid7.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52805.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52805.json new file mode 100644 index 00000000000..2d032080213 --- /dev/null +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52805.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-52805", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-03T17:15:12.120", + "lastModified": "2024-12-03T17:15:12.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Synapse is an open-source Matrix homeserver. In Synapse before 1.120.1, multipart/form-data requests can in certain configurations transiently increase memory consumption beyond expected levels while processing the request, which can be used to amplify denial of service attacks. Synapse 1.120.1 resolves the issue by denying requests with unsupported multipart/form-data content type." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/twisted/twisted/issues/4688#issuecomment-1167705518", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/twisted/twisted/issues/4688#issuecomment-2385711609", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52815.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52815.json new file mode 100644 index 00000000000..9d540144ede --- /dev/null +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52815.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-52815", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-03T17:15:12.267", + "lastModified": "2024-12-03T17:15:12.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Synapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a specially crafted invite that disrupts the invited user's /sync functionality. Synapse 1.120.1 rejects such invalid invites received over federation and restores the ability to sync for affected users." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53863.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53863.json new file mode 100644 index 00000000000..55a576f0add --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53863.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-53863", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-03T17:15:12.633", + "lastModified": "2024-12-03T17:15:12.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Synapse is an open-source Matrix homeserver. In Synapse versions before 1.120.1, enabling the dynamic_thumbnails option or processing a specially crafted request could trigger the decoding and thumbnail generation of uncommon image formats, potentially invoking external tools like Ghostscript for processing. This significantly expands the attack surface in a historically vulnerable area, presenting a risk that far outweighs the benefit, particularly since these formats are rarely used on the open web or within the Matrix ecosystem. Synapse 1.120.1 addresses the issue by restricting thumbnail generation to images in the following widely used formats: PNG, JPEG, GIF, and WebP. This vulnerability is fixed in 1.120.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53867.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53867.json new file mode 100644 index 00000000000..035a89937b1 --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53867.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-53867", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-03T17:15:12.787", + "lastModified": "2024-12-03T17:15:12.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Synapse is an open-source Matrix homeserver. The Sliding Sync feature on Synapse versions between 1.113.0rc1 and 1.120.0 can leak partial room state changes to users no longer in a room. Non-state events, like messages, are unaffected. This vulnerability is fixed in 1.120.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/synapse/security/advisories/GHSA-56w4-5538-8v8h", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/matrix-spec-proposals/pull/4186", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8775.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8775.json index be7eff1d320..6a114709051 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8775.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8775.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8775", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-14T03:15:08.987", - "lastModified": "2024-11-06T20:15:06.763", + "lastModified": "2024-12-03T17:15:14.090", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -52,10 +52,18 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:10762", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:8969", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9894", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8775", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json index f1738af1970..68212fb9894 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9902.json @@ -2,8 +2,9 @@ "id": "CVE-2024-9902", "sourceIdentifier": "secalert@redhat.com", "published": "2024-11-06T10:15:06.200", - "lastModified": "2024-11-24T23:15:04.537", + "lastModified": "2024-12-03T17:15:14.390", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -51,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:10762", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:8969", "source": "secalert@redhat.com" diff --git a/README.md b/README.md index d8a13566fde..3eb5bf4cf9f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-03T17:01:01.472617+00:00 +2024-12-03T19:00:25.275105+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-03T16:56:19.887000+00:00 +2024-12-03T18:46:38.467000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -271993 +272016 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` - -- [CVE-2024-11391](CVE-2024/CVE-2024-113xx/CVE-2024-11391.json) (`2024-12-03T15:15:09.973`) -- [CVE-2024-12101](CVE-2024/CVE-2024-121xx/CVE-2024-12101.json) (`2024-12-03T16:15:20.910`) -- [CVE-2024-53257](CVE-2024/CVE-2024-532xx/CVE-2024-53257.json) (`2024-12-03T16:15:23.693`) -- [CVE-2024-53429](CVE-2024/CVE-2024-534xx/CVE-2024-53429.json) (`2024-11-21T15:15:35.530`) -- [CVE-2024-53999](CVE-2024/CVE-2024-539xx/CVE-2024-53999.json) (`2024-12-03T16:15:24.250`) -- [CVE-2024-54000](CVE-2024/CVE-2024-540xx/CVE-2024-54000.json) (`2024-12-03T16:15:24.380`) +Recently added CVEs: `23` + +- [CVE-2021-29892](CVE-2021/CVE-2021-298xx/CVE-2021-29892.json) (`2024-12-03T17:15:05.760`) +- [CVE-2023-7255](CVE-2023/CVE-2023-72xx/CVE-2023-7255.json) (`2024-12-03T18:15:12.743`) +- [CVE-2024-25019](CVE-2024/CVE-2024-250xx/CVE-2024-25019.json) (`2024-12-03T17:15:09.560`) +- [CVE-2024-25020](CVE-2024/CVE-2024-250xx/CVE-2024-25020.json) (`2024-12-03T18:15:12.997`) +- [CVE-2024-25035](CVE-2024/CVE-2024-250xx/CVE-2024-25035.json) (`2024-12-03T17:15:09.753`) +- [CVE-2024-25036](CVE-2024/CVE-2024-250xx/CVE-2024-25036.json) (`2024-12-03T17:15:09.923`) +- [CVE-2024-29404](CVE-2024/CVE-2024-294xx/CVE-2024-29404.json) (`2024-12-03T17:15:10.087`) +- [CVE-2024-37302](CVE-2024/CVE-2024-373xx/CVE-2024-37302.json) (`2024-12-03T17:15:10.733`) +- [CVE-2024-37303](CVE-2024/CVE-2024-373xx/CVE-2024-37303.json) (`2024-12-03T17:15:10.890`) +- [CVE-2024-40691](CVE-2024/CVE-2024-406xx/CVE-2024-40691.json) (`2024-12-03T17:15:11.037`) +- [CVE-2024-41775](CVE-2024/CVE-2024-417xx/CVE-2024-41775.json) (`2024-12-03T18:15:13.920`) +- [CVE-2024-41776](CVE-2024/CVE-2024-417xx/CVE-2024-41776.json) (`2024-12-03T18:15:14.107`) +- [CVE-2024-41777](CVE-2024/CVE-2024-417xx/CVE-2024-41777.json) (`2024-12-03T18:15:14.293`) +- [CVE-2024-45676](CVE-2024/CVE-2024-456xx/CVE-2024-45676.json) (`2024-12-03T18:15:14.480`) +- [CVE-2024-52544](CVE-2024/CVE-2024-525xx/CVE-2024-52544.json) (`2024-12-03T18:15:15.327`) +- [CVE-2024-52545](CVE-2024/CVE-2024-525xx/CVE-2024-52545.json) (`2024-12-03T18:15:15.543`) +- [CVE-2024-52546](CVE-2024/CVE-2024-525xx/CVE-2024-52546.json) (`2024-12-03T18:15:15.710`) +- [CVE-2024-52547](CVE-2024/CVE-2024-525xx/CVE-2024-52547.json) (`2024-12-03T18:15:15.860`) +- [CVE-2024-52548](CVE-2024/CVE-2024-525xx/CVE-2024-52548.json) (`2024-12-03T18:15:16.023`) +- [CVE-2024-52805](CVE-2024/CVE-2024-528xx/CVE-2024-52805.json) (`2024-12-03T17:15:12.120`) +- [CVE-2024-52815](CVE-2024/CVE-2024-528xx/CVE-2024-52815.json) (`2024-12-03T17:15:12.267`) +- [CVE-2024-53863](CVE-2024/CVE-2024-538xx/CVE-2024-53863.json) (`2024-12-03T17:15:12.633`) +- [CVE-2024-53867](CVE-2024/CVE-2024-538xx/CVE-2024-53867.json) (`2024-12-03T17:15:12.787`) ### CVEs modified in the last Commit -Recently modified CVEs: `79` - -- [CVE-2024-29507](CVE-2024/CVE-2024-295xx/CVE-2024-29507.json) (`2024-12-03T16:15:21.343`) -- [CVE-2024-30274](CVE-2024/CVE-2024-302xx/CVE-2024-30274.json) (`2024-12-03T16:31:14.377`) -- [CVE-2024-30298](CVE-2024/CVE-2024-302xx/CVE-2024-30298.json) (`2024-12-03T16:30:43.050`) -- [CVE-2024-31669](CVE-2024/CVE-2024-316xx/CVE-2024-31669.json) (`2024-12-03T16:15:21.540`) -- [CVE-2024-32256](CVE-2024/CVE-2024-322xx/CVE-2024-32256.json) (`2024-12-03T16:15:21.697`) -- [CVE-2024-32610](CVE-2024/CVE-2024-326xx/CVE-2024-32610.json) (`2024-12-03T16:15:21.880`) -- [CVE-2024-36611](CVE-2024/CVE-2024-366xx/CVE-2024-36611.json) (`2024-12-03T16:15:22.057`) -- [CVE-2024-36615](CVE-2024/CVE-2024-366xx/CVE-2024-36615.json) (`2024-12-03T16:15:22.197`) -- [CVE-2024-36622](CVE-2024/CVE-2024-366xx/CVE-2024-36622.json) (`2024-12-03T16:15:22.343`) -- [CVE-2024-38862](CVE-2024/CVE-2024-388xx/CVE-2024-38862.json) (`2024-12-03T16:56:19.887`) -- [CVE-2024-38863](CVE-2024/CVE-2024-388xx/CVE-2024-38863.json) (`2024-12-03T16:47:15.693`) -- [CVE-2024-39890](CVE-2024/CVE-2024-398xx/CVE-2024-39890.json) (`2024-12-03T16:15:22.483`) -- [CVE-2024-44759](CVE-2024/CVE-2024-447xx/CVE-2024-44759.json) (`2024-12-03T16:15:22.597`) -- [CVE-2024-45106](CVE-2024/CVE-2024-451xx/CVE-2024-45106.json) (`2024-12-03T15:15:10.470`) -- [CVE-2024-48530](CVE-2024/CVE-2024-485xx/CVE-2024-48530.json) (`2024-12-03T16:15:22.973`) -- [CVE-2024-48533](CVE-2024/CVE-2024-485xx/CVE-2024-48533.json) (`2024-12-03T16:15:23.117`) -- [CVE-2024-48536](CVE-2024/CVE-2024-485xx/CVE-2024-48536.json) (`2024-12-03T16:15:23.253`) -- [CVE-2024-49203](CVE-2024/CVE-2024-492xx/CVE-2024-49203.json) (`2024-12-03T16:15:23.393`) -- [CVE-2024-52724](CVE-2024/CVE-2024-527xx/CVE-2024-52724.json) (`2024-12-03T15:15:10.943`) -- [CVE-2024-52732](CVE-2024/CVE-2024-527xx/CVE-2024-52732.json) (`2024-12-03T16:15:23.540`) -- [CVE-2024-53484](CVE-2024/CVE-2024-534xx/CVE-2024-53484.json) (`2024-12-03T16:15:23.980`) -- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2024-12-03T15:15:11.373`) -- [CVE-2024-53900](CVE-2024/CVE-2024-539xx/CVE-2024-53900.json) (`2024-12-03T16:15:24.113`) -- [CVE-2024-54159](CVE-2024/CVE-2024-541xx/CVE-2024-54159.json) (`2024-12-03T15:15:12.097`) -- [CVE-2024-9683](CVE-2024/CVE-2024-96xx/CVE-2024-9683.json) (`2024-12-03T16:14:52.690`) +Recently modified CVEs: `32` + +- [CVE-2023-42859](CVE-2023/CVE-2023-428xx/CVE-2023-42859.json) (`2024-12-03T17:27:41.293`) +- [CVE-2023-42860](CVE-2023/CVE-2023-428xx/CVE-2023-42860.json) (`2024-12-03T17:24:43.420`) +- [CVE-2023-42878](CVE-2023/CVE-2023-428xx/CVE-2023-42878.json) (`2024-12-03T17:17:41.227`) +- [CVE-2023-52345](CVE-2023/CVE-2023-523xx/CVE-2023-52345.json) (`2024-12-03T17:15:08.390`) +- [CVE-2024-20995](CVE-2024/CVE-2024-209xx/CVE-2024-20995.json) (`2024-12-03T17:15:08.597`) +- [CVE-2024-21044](CVE-2024/CVE-2024-210xx/CVE-2024-21044.json) (`2024-12-03T17:15:08.787`) +- [CVE-2024-21052](CVE-2024/CVE-2024-210xx/CVE-2024-21052.json) (`2024-12-03T17:15:08.950`) +- [CVE-2024-21063](CVE-2024/CVE-2024-210xx/CVE-2024-21063.json) (`2024-12-03T17:15:09.103`) +- [CVE-2024-22727](CVE-2024/CVE-2024-227xx/CVE-2024-22727.json) (`2024-12-03T17:15:09.237`) +- [CVE-2024-24426](CVE-2024/CVE-2024-244xx/CVE-2024-24426.json) (`2024-12-03T17:15:09.400`) +- [CVE-2024-28829](CVE-2024/CVE-2024-288xx/CVE-2024-28829.json) (`2024-12-03T17:55:48.257`) +- [CVE-2024-30205](CVE-2024/CVE-2024-302xx/CVE-2024-30205.json) (`2024-12-03T17:15:10.187`) +- [CVE-2024-31695](CVE-2024/CVE-2024-316xx/CVE-2024-31695.json) (`2024-12-03T17:15:10.377`) +- [CVE-2024-34931](CVE-2024/CVE-2024-349xx/CVE-2024-34931.json) (`2024-12-03T17:15:10.530`) +- [CVE-2024-37392](CVE-2024/CVE-2024-373xx/CVE-2024-37392.json) (`2024-12-03T18:15:13.410`) +- [CVE-2024-38036](CVE-2024/CVE-2024-380xx/CVE-2024-38036.json) (`2024-12-03T18:15:13.710`) +- [CVE-2024-38859](CVE-2024/CVE-2024-388xx/CVE-2024-38859.json) (`2024-12-03T17:47:02.467`) +- [CVE-2024-50647](CVE-2024/CVE-2024-506xx/CVE-2024-50647.json) (`2024-12-03T17:15:11.193`) +- [CVE-2024-50648](CVE-2024/CVE-2024-506xx/CVE-2024-50648.json) (`2024-12-03T17:15:11.357`) +- [CVE-2024-50649](CVE-2024/CVE-2024-506xx/CVE-2024-50649.json) (`2024-12-03T17:15:11.520`) +- [CVE-2024-50650](CVE-2024/CVE-2024-506xx/CVE-2024-50650.json) (`2024-12-03T17:15:11.683`) +- [CVE-2024-50724](CVE-2024/CVE-2024-507xx/CVE-2024-50724.json) (`2024-12-03T17:15:11.820`) +- [CVE-2024-51164](CVE-2024/CVE-2024-511xx/CVE-2024-51164.json) (`2024-12-03T17:15:11.970`) +- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-12-03T17:15:14.090`) +- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-12-03T17:15:14.390`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 78b7773cd8c..cbd111afeb3 100644 --- a/_state.csv +++ b/_state.csv @@ -126946,36 +126946,36 @@ CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e CVE-2018-9411,0,0,e176a59ad08b39fe1e6853540b0f5379b5df64366124dc7ef673195cfcdd7002,2024-11-22T22:30:25.617000 CVE-2018-9412,0,0,8f50260d1e8b65957e2cb05a966f6136a2dee829d699d386c0ca2a63e589e17c,2024-11-23T00:56:14.623000 CVE-2018-9413,0,0,c96c3efa9a30492ac98f18f0022a88627e5c62aad3ceec520d5c6c6e2465f89e,2024-12-02T21:15:09.653000 -CVE-2018-9414,0,0,ff411e1453b6d328c9937c931929b28e4db55740686db80ad8901a21ffa183de,2024-12-02T21:15:09.757000 +CVE-2018-9414,0,1,1502707cba8022d2a56ca7e99daf57548667b3f30de1f8fb22b96c6af7e6c423,2024-12-03T18:15:11.267000 CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000 CVE-2018-9417,0,0,d14f6cd2cf635e766e90a973936df96c48a6f5ddbb0b86d066715267e8c688d6,2024-11-22T22:08:46.630000 -CVE-2018-9418,0,1,e851384c008e3a0dde6b54cd54b3ee4e68c29533e11960a94ecde9efdfeb4b80,2024-12-03T16:15:18.587000 +CVE-2018-9418,0,0,e851384c008e3a0dde6b54cd54b3ee4e68c29533e11960a94ecde9efdfeb4b80,2024-12-03T16:15:18.587000 CVE-2018-9419,0,0,c18c29ca18cc221fa9a8a8c05cd34721a5a1c5a074ea2d5aabaa414db75bd8e3,2024-11-22T22:07:33.540000 CVE-2018-9420,0,0,66fc0f4acf821ffb8066676839446733124360b845f6c5c453f18b9e6c40661b,2024-11-22T22:06:41.107000 CVE-2018-9421,0,0,52ba484018943b73a71b64289663d9ef88b221366cb0d59b8c78fc2228d30f11,2024-11-22T22:05:41.297000 CVE-2018-9422,0,0,b22e8a2bc8d5adc29f8bdfbdd7dc1e05001e055bf24c72ec70cb010b3e16095b,2019-08-19T20:15:10.567000 -CVE-2018-9423,0,1,7b17958f5e3168f428bc9354965c2b08cc077840d35b7e45594d4f2bf0234971,2024-12-03T15:15:05.530000 +CVE-2018-9423,0,0,7b17958f5e3168f428bc9354965c2b08cc077840d35b7e45594d4f2bf0234971,2024-12-03T15:15:05.530000 CVE-2018-9424,0,0,071ed5e03e559b374e1e944c883e1f76b850eb82b86ac5533496dbfc405cbff1,2024-11-22T21:26:59.867000 CVE-2018-9425,0,0,8bb9fe5d8897d0c1ee991ea8f216f809874791aaa9aa06201b1a1ea7da995c7f,2019-10-02T12:37:35.567000 -CVE-2018-9426,0,1,986dd15b7c03529179be38e974e464d55709f848156ecd02193caed3e4c52cff,2024-12-03T15:15:05.730000 +CVE-2018-9426,0,0,986dd15b7c03529179be38e974e464d55709f848156ecd02193caed3e4c52cff,2024-12-03T15:15:05.730000 CVE-2018-9427,0,0,5486e933f7e8fc1bc0bff04d24f293fbfbce11d5548d03ed415827a8763827af,2018-12-18T17:33:53.610000 CVE-2018-9428,0,0,3b5ce7df2963b04e24e60241e4f43e4dd0d84039a25f956359e2baadc53434c2,2024-11-22T22:04:52.717000 -CVE-2018-9429,0,1,f5ebd7f7f31f971d3af44c8145269dd2ae12d94294dbeae60b29b7b3910c64c3,2024-12-03T15:15:05.927000 -CVE-2018-9430,0,1,17ce67eec50cdf1ddf24fa00c1a77c31a4403919ae595976987d49e3a6797413,2024-12-03T15:15:06.087000 -CVE-2018-9431,0,1,c912b5573ab37af5b271c506e44c742055f1fcdf91107e2934aecd60d90fd41d,2024-12-03T15:15:06.270000 +CVE-2018-9429,0,0,f5ebd7f7f31f971d3af44c8145269dd2ae12d94294dbeae60b29b7b3910c64c3,2024-12-03T15:15:05.927000 +CVE-2018-9430,0,0,17ce67eec50cdf1ddf24fa00c1a77c31a4403919ae595976987d49e3a6797413,2024-12-03T15:15:06.087000 +CVE-2018-9431,0,0,c912b5573ab37af5b271c506e44c742055f1fcdf91107e2934aecd60d90fd41d,2024-12-03T15:15:06.270000 CVE-2018-9432,0,0,df057bd665a08e609e489b18ec44ef01d41efdbc35ca27192e24b02968fc98c8,2024-11-22T21:11:15.770000 CVE-2018-9433,0,0,7eb797c3d8bd260ec2ed1dbbfc9bf065ef873715e18a47f18908c92e08feb4be,2024-11-22T21:13:28.557000 -CVE-2018-9435,0,1,d7acfbd9b6a8baf8942238ac46af38dbe5f587b828fc107ea7ec1738ffbada18,2024-12-03T15:15:06.450000 +CVE-2018-9435,0,0,d7acfbd9b6a8baf8942238ac46af38dbe5f587b828fc107ea7ec1738ffbada18,2024-12-03T15:15:06.450000 CVE-2018-9436,0,0,c8a247a24c83592bc549534ae7eaaefb20fd255e25c6b61b4321b051f8f1edfb,2018-12-12T21:25:58.460000 CVE-2018-9437,0,0,2fe7c032447c4aee2d71cdb7773a63d008648862a1635a0096aea7442fa776a0,2018-12-12T21:23:38.690000 CVE-2018-9438,0,0,9dbca74422ec533040b998a41e1e9831a0ef457b53367dc472271daa39aa9ea8,2019-10-03T00:03:26.223000 CVE-2018-9440,0,0,5d528d97aa009b19faaf4b76b2810035a508f7ff2a656fcd3a5ea6d1c0d4ebd7,2024-11-22T21:30:26.993000 -CVE-2018-9441,0,1,71136ecdc98eab935890efab417789f90a76dae71108e4492cad31255e59036a,2024-12-03T15:15:06.620000 +CVE-2018-9441,0,0,71136ecdc98eab935890efab417789f90a76dae71108e4492cad31255e59036a,2024-12-03T15:15:06.620000 CVE-2018-9444,0,0,845df1a91dbb86e10e94c2948d2846f136bb91fcf20699ed819d25cc42061c97,2019-10-03T00:03:26.223000 CVE-2018-9445,0,0,98705da52e00a08c614b22fd78898c2cac0a1a38aa43d2cb54a22be54b025a7f,2018-12-12T21:11:21.837000 CVE-2018-9446,0,0,aade2e9dd27e08888d7772668cb279781f71a8adf195cc015d694763f350e194,2018-12-12T21:04:55.173000 CVE-2018-9448,0,0,6f09b1e98acf930f94a509976debb4b57f40d675d8c3078ca467fb9170d1e624,2018-12-12T21:02:17.877000 -CVE-2018-9449,0,1,d46f6bb000c174f5d4853de6418cf958172d5b97c886e5814895a318df98e87a,2024-12-03T15:15:06.793000 +CVE-2018-9449,0,0,d46f6bb000c174f5d4853de6418cf958172d5b97c886e5814895a318df98e87a,2024-12-03T15:15:06.793000 CVE-2018-9450,0,0,88a5539155afc3838696edab4f8304f63eba50f73be2aafec2b62ff10c75122f,2018-12-12T20:55:12.133000 CVE-2018-9451,0,0,129d08baf0933d3fb93461fbfc4f9a2f145f8900af6404108ecd3acb357d36b8,2018-12-12T20:48:51.673000 CVE-2018-9452,0,0,780910fe7d2739fa64e821536152992dd248be72f6bf6989ab9ade5896bbdc38,2023-11-07T03:01:36.743000 @@ -174357,6 +174357,7 @@ CVE-2021-29880,0,0,69bfd213ac99c9f317e412cd5b1bc2e634cda2cc6eee5ed72e94a00793187 CVE-2021-29883,0,0,3ab50cc1fe1f7bad26d22921bf3dab11c24a06808b4f77ba4b912277dc8be5f1,2022-07-12T17:42:04.277000 CVE-2021-29888,0,0,1f80d3b985dc28be5fdec5211f7b487be5eee1d5f8e7bc38bc8ccbab35964ee5,2021-11-03T16:16:07.383000 CVE-2021-29891,0,0,fa30c10bce4a74aaf93785d724e72a41a0181a0c0bdeffe46d8b46a15c82337d,2022-08-25T16:04:47.897000 +CVE-2021-29892,1,1,2a788ff8d94f0260991535b6718b55b3f5e8bd5d066449be3210ad97c3e9a3fa,2024-12-03T17:15:05.760000 CVE-2021-29894,0,0,cfc28faf33197707204b466c20194044e417df1fc619abda3664ad2944ff52df,2021-10-04T17:14:35.150000 CVE-2021-29899,0,0,81d9b5a8576f3b5fb2617342d2e97387f6d63d198698041961a6a74b03dcb8a5,2022-03-24T14:16:35.617000 CVE-2021-29903,0,0,a03223953564f2473b4b3f6b95893a3020ab7abdbf104166aa48e9facd558572,2021-10-14T17:58:13.797000 @@ -224111,7 +224112,7 @@ CVE-2023-31301,0,0,8b4aa9e0020370e9364f1514c1548d00f13f3a6f7e88a244d5ac3dcc05554 CVE-2023-31302,0,0,7db878fe5302d808bd5001becdb205fd1302d85ff5b5989c39244fbd498603b5,2024-01-08T13:04:07.097000 CVE-2023-31304,0,0,d35cbd3c1a51f731cb3021ec4d7f26ebe776aa5c814e8a89e6392f12283085fa,2024-11-04T17:35:02.577000 CVE-2023-31305,0,0,af1a24ed09ae428da28818e3b6639df4c603d6ee1ac78ab0a5cce894745493cd,2024-11-06T16:35:06.613000 -CVE-2023-31307,0,0,927363a24df9ec7431f47a682d4205fb756e21f24bd0cd30e96e1e5c0bf4352a,2024-08-14T02:07:05.410000 +CVE-2023-31307,0,1,bd36d7a04bc83cef99bb89abed7c063b2ce8d88d8531a61df7b75a4c3106f86b,2024-12-03T17:15:07.017000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 CVE-2023-31310,0,0,f17e30a0294060da2ce7aa247bba7d7e4f3746a8423691dd74baefa96f0eead0,2024-10-31T15:35:04.980000 CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19a27,2024-08-27T15:35:00.983000 @@ -224123,13 +224124,13 @@ CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f5 CVE-2023-31341,0,0,dd24cf83580387b35de43a1761935afa05605b69789156e33c8226af92558012,2024-08-14T02:07:05.410000 CVE-2023-31346,0,0,baf70a7fbcbac8ee2109bb0ede410a1f9d8a0f3d16eca151ea162e0c8735e373,2024-10-24T15:22:58.270000 CVE-2023-31347,0,0,5703df889e7697d9a941bc897ce8eaa50a95592c03760c9ac7c4b13dd799542a,2024-10-22T13:30:27.637000 -CVE-2023-31348,0,0,c306f0d237e2d8af9608a978530584d20b1bf70ff2c23a680094507cc83d2886,2024-08-14T15:35:02.560000 -CVE-2023-31349,0,0,fec448b23889f050ed9b2294a5aa334ceb009f790e378982e075155aa7b4ad20,2024-08-14T02:07:05.410000 +CVE-2023-31348,0,1,1a3486380e50f76a445d391370e4805d98ed6ff38802308c1313b3e7b10cbf98,2024-12-03T18:46:38.467000 +CVE-2023-31349,0,1,bba5c58401546853f0e31eb0c8f3a091ae43f3f0fcdd313b2330d0e9a09e883b,2024-12-03T18:37:37.340000 CVE-2023-3135,0,0,6bf4d178b889b1c4b1b5225d3bec9008408415fe638f98a0c794b0c27b2df020,2023-11-07T04:17:58.450000 CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000 CVE-2023-31356,0,0,bea061db9cade12e882f1ffccc4c3b6bf3ed6261d08ca2362e9f4fdc16dd90c9,2024-10-30T19:35:03.503000 CVE-2023-3136,0,0,89749c73105b8a3b2f93105e2704853e3e122996e34e8067a103f24e2d5a7180,2023-11-07T04:17:58.613000 -CVE-2023-31366,0,0,44bbd1f8a094e73a70261f57615c2508c43003e09aed16040afe9f888e90fdaa,2024-08-14T17:15:14.097000 +CVE-2023-31366,0,1,3024397a0d4aae2ef43f623686a8e01fdf5340c2590abe5ed9b21fc83aaebfed,2024-12-03T18:30:25.240000 CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000 CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000 CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000 @@ -232883,12 +232884,12 @@ CVE-2023-42850,0,0,5931fe57c3cb62fdf93e9d6d5bba7fbf9095bc3582c436c90d2fc77b3d0c3 CVE-2023-42852,0,0,51d77abb6759e9386f3b21858804f456fc03ea58878e60b6b3f15e2a16417e72,2024-02-16T15:24:56.403000 CVE-2023-42853,0,0,11982b71ebb82c39e5a22e76bdacfb10bcbdae2a4ea889624b1a4d786842c3e5,2024-03-13T21:15:53.957000 CVE-2023-42854,0,0,f4708dff484f0bcd55c5eebd0727c6d52308a3a96b5b683962e21f1a51d10b6b,2023-11-02T17:59:51.330000 -CVE-2023-42855,0,0,ef56331be2ebb9bf1fd07c8e5a04b083ff7d68cd73fc1986802a98717f00a240,2024-11-01T20:35:01.867000 +CVE-2023-42855,0,1,d73b683210c471439f24418097a00ff275f56fb1ccaca4b4a1db0b2a4b8449aa,2024-12-03T17:32:38.343000 CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458a60,2023-11-02T18:00:05.630000 CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000 -CVE-2023-42858,0,0,0ca90a84dfc8b02d6d95b934875f7c052e6aeafc95516e43095aff87e0e088bc,2024-11-05T20:35:12.087000 -CVE-2023-42859,0,0,056e476b883af3601285b7d51ae8531980184ba9abc1b8c0a16964226a0b857e,2024-08-01T13:44:47.733000 -CVE-2023-42860,0,0,43200365f2c2a67f0f64357f0e35d6b6146a61d566657fb5e9ae9cd85f292f64,2024-10-28T20:35:06.520000 +CVE-2023-42858,0,1,b9607fd2e91253bfa70d0cbe127add6cb388b786bf9502e7a4f533f578678b5e,2024-12-03T17:30:04.683000 +CVE-2023-42859,0,1,80a8a2bf5783b9593620673ca1588995af64e7c57b56ee53234d4c605dd1f23a,2024-12-03T17:27:41.293000 +CVE-2023-42860,0,1,deb5203476f8e10dae004b1a553ababb9a26bdca00f61493796b1a710a2a4d1e,2024-12-03T17:24:43.420000 CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000 CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000 CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000 @@ -232901,7 +232902,7 @@ CVE-2023-42873,0,0,f1055070f5d2c8964679f9d4c375bc90c864cdc2b3efb5cf9fe0466754f26 CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000 CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000 CVE-2023-42877,0,0,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000 -CVE-2023-42878,0,0,18d26538c3c540f160b380da6481aa70db571efaa8701a38f15863e5493dee5c,2024-02-22T19:07:27.197000 +CVE-2023-42878,0,1,5d257e70cffd5eb040ee0fb607130b1e7299ba45d71793ad390ba88b3cfe997d,2024-12-03T17:17:41.227000 CVE-2023-42881,0,0,70098e759836313249a706e0cb3a6283e2dcaf1ae77d9c5e80b4ac943c30b13e,2024-01-26T20:50:42.450000 CVE-2023-42882,0,0,d25d8200d86ee6aec5cd25ed7c72a0a44dcf7931e005d38d26518af2e78b4882,2024-02-02T03:10:11.640000 CVE-2023-42883,0,0,034dd058692240ba2f6c465611c8e36bfdac6f60d9f46a4108296185e978baa7,2024-06-12T10:15:26.310000 @@ -234136,7 +234137,7 @@ CVE-2023-44848,0,0,970c0dfa22e1278f9e0582743c6ed3fabbbe9eed143c78d47a3794736c9d3 CVE-2023-4485,0,0,d526a2f954c2736d53f3460e51a08ad20649b599f0f9d65c5a7ab7793bc309d9,2023-11-07T04:22:39.683000 CVE-2023-44852,0,0,81fa0729ea0f25cfdf47c83b9b359d370eb0ad757ed0d34e038272288625118d,2024-04-12T12:43:46.210000 CVE-2023-44853,0,0,063d78de1e79f39a8a7ba8b021087b2fe317ac5c06b40bbf2260beeeda1a9bd3,2024-07-11T15:05:11.010000 -CVE-2023-44854,0,1,2f387dfb8951922484f04eba6c7c9648e5771307e982e4e9f580db0c3e860943,2024-12-03T16:15:20.170000 +CVE-2023-44854,0,0,2f387dfb8951922484f04eba6c7c9648e5771307e982e4e9f580db0c3e860943,2024-12-03T16:15:20.170000 CVE-2023-44855,0,0,92111c6cfff436f5910c36b2425cefcca54a17fd5b869b376ff0baaabbc0006e,2024-08-01T13:44:55.020000 CVE-2023-44856,0,0,a76d181d88ad79e84650e79a2b1f7da6f319c0fddcf5a6791d43e3b94d0e0f48,2024-11-01T15:35:04.937000 CVE-2023-44857,0,0,26efa4526fba2775c0abb30007c2cd5f8e11cb8211d852c759d226044c613250,2024-07-03T01:41:47.663000 @@ -239363,7 +239364,7 @@ CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661 CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000 CVE-2023-52343,0,0,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000 CVE-2023-52344,0,0,2746ce7294f9dd645e743c241e219d96848cd26c1bbf2a1d45c502d1d5d069c5,2024-11-08T22:35:05.047000 -CVE-2023-52345,0,0,9b0f7e720892a08eb597995237cf0041e77eb1cbbac52014266e50a5c094fa0b,2024-11-27T16:22:10.590000 +CVE-2023-52345,0,1,a60bc116f4901082dea5e8bcacc413c82b3427a572478b12fbcd48cf42f44a18,2024-12-03T17:15:08.390000 CVE-2023-52346,0,0,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000 CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000 CVE-2023-52348,0,0,a78f5b9171ee88d03834f0039162b0633f8a198afe00aea2be4a4f4c2fbe83ff,2024-11-19T22:35:02.473000 @@ -241741,6 +241742,7 @@ CVE-2023-7250,0,0,d2697716e6fb6d3106b6b6ee93de27e1a2aa1cee868a8468ee5a044250f131 CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000 CVE-2023-7252,0,0,8ef70acf856173de65ceb7ed47edeac099389585dbd7416236a9f38d3052e70c,2024-11-22T15:15:04.990000 CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 +CVE-2023-7255,1,1,ba841318b17f99e3bcf2d19d42ab9b2ed81cdd4957ab41c4052c7c67ad67adff,2024-12-03T18:15:12.743000 CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 @@ -241803,7 +241805,7 @@ CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000 CVE-2024-0035,0,0,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000 CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000 -CVE-2024-0037,0,1,394cfced2a2723a704c6cbe26977af45d337b3a1bb3716915c523e280e7c05c0,2024-12-03T16:15:20.440000 +CVE-2024-0037,0,0,394cfced2a2723a704c6cbe26977af45d337b3a1bb3716915c523e280e7c05c0,2024-12-03T16:15:20.440000 CVE-2024-0038,0,0,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000 CVE-2024-0039,0,0,bf163f6fc7f56cae12262037eeb80c9572f8668c8d542ca891d986c2ffbca152,2024-11-26T14:26:56.233000 CVE-2024-0040,0,0,cb768c0c56422d8be59b8ead41b2abde5abcab3c6641c5456375c74ed8738c47,2024-08-01T13:45:55.990000 @@ -243320,7 +243322,7 @@ CVE-2024-10886,0,0,dbb0fce1f84e13fbc68880e115c84f1055ea586a69373d4f7dec78acdd1fa CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000 CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000 CVE-2024-10891,0,0,75368c42ada2eff64310eb4f2bf04c277030b9ed62814601df628d2e55a629ad,2024-11-20T10:15:05.273000 -CVE-2024-10893,0,1,0aab818c2ee8dd269b128accce04abd1993d7d71f805e1fbf57f82290441bfd5,2024-12-03T15:15:09.780000 +CVE-2024-10893,0,0,0aab818c2ee8dd269b128accce04abd1993d7d71f805e1fbf57f82290441bfd5,2024-12-03T15:15:09.780000 CVE-2024-10895,0,0,595bc2f289687b30c5fe4f154f1211dd293d99cd45db772babe4d8ed8c825807,2024-11-27T07:15:08.347000 CVE-2024-10896,0,0,e962891bb7ff0bd290fd7c88332bde91f2f69d0bdc8b8df6012dc8f056efaa3b,2024-11-29T16:15:08.880000 CVE-2024-10897,0,0,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f534,2024-11-20T16:09:16.643000 @@ -243621,7 +243623,7 @@ CVE-2024-11385,0,0,b8c574c75cf2cea00a757d377dc474503f06328c73f6861f0cd8dff47b3ce CVE-2024-11387,0,0,570819d44f260948aed21f18e713c0988e86544acdb78701fe81de7ec470e4a6,2024-11-23T05:15:06.833000 CVE-2024-11388,0,0,cc4ce5951e6443c6719f0b47e25fd91148c8919ab17cf08bd038e67541d941d5,2024-11-26T17:23:56.647000 CVE-2024-1139,0,0,3dc684f5c9c2296003368c61d669c2f327953a7aefcd4f9a72abdc4b058cbe13,2024-05-16T23:15:47.323000 -CVE-2024-11391,1,1,160a5b9b04cae17fd15d97deaa177463c24d83d649e68aace24a88d332e19a63,2024-12-03T15:15:09.973000 +CVE-2024-11391,0,0,160a5b9b04cae17fd15d97deaa177463c24d83d649e68aace24a88d332e19a63,2024-12-03T15:15:09.973000 CVE-2024-11392,0,0,1e5f2ec38300a521839918df7c104887d1b6dd0c3952db0a36cb8a2513cfddaf,2024-11-27T21:55:00.983000 CVE-2024-11393,0,0,19dee016144f4c49671550a1a20a1c722bca8a9d767501dcdfc03cfe728a7c2b,2024-11-27T21:54:58.570000 CVE-2024-11394,0,0,ed715a5643cd62dc08ee2cf492057b775795efb9422c8c56a37f188481d1231f,2024-11-27T21:54:52.887000 @@ -243794,7 +243796,7 @@ CVE-2024-11662,0,0,8eddcedd4d81580627eb49a5c0b83d72ce9c466dae7dd645a8640b29c2f87 CVE-2024-11663,0,0,3626413ca3e66966b7d786a611d25e545ae4de59326fcb8c9442c9f727c440f4,2024-11-25T09:15:06.590000 CVE-2024-11664,0,0,f7e3e3893aefbf47475119b5cc15d35a6bf3fef30ce727b8b58d082d350666b1,2024-11-25T09:15:06.800000 CVE-2024-11665,0,0,432484acd0139af98341fd7fe90b0662197ea5956295af2989047d68fc0277cd,2024-11-25T00:15:03.957000 -CVE-2024-11666,0,1,a7e124e4e7b7bca398eeda63d114e258fa78223da80e0f950915de9498ee814c,2024-12-03T15:40:14.907000 +CVE-2024-11666,0,0,a7e124e4e7b7bca398eeda63d114e258fa78223da80e0f950915de9498ee814c,2024-12-03T15:40:14.907000 CVE-2024-11667,0,0,623b49dca2a1a534ffbd8f116339108bc3210c6b3403e4c93f0e00df5d59fcc7,2024-11-28T03:15:14.943000 CVE-2024-11668,0,0,76595504dbd2b64d21bcff47f11c8e8cc91ab680fc6cee5f2ffc1737d953cc2b,2024-11-26T19:15:22.027000 CVE-2024-11669,0,0,a5de8e98bfb8b633c540619e4d481ef856cf620fef729b0da27716832b9fbae5,2024-11-26T19:15:22.367000 @@ -243839,8 +243841,8 @@ CVE-2024-11732,0,0,9ac5f8faeb8d3d023aef30c0e1c16293895e21fbeef4db588eecb4bcce0a9 CVE-2024-1174,0,0,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000 CVE-2024-11742,0,0,67990b8c6d291afd926a35484e6c0e210504d9728dfca33a0ba1469d0b959cb7,2024-11-26T20:15:25.703000 CVE-2024-11743,0,0,4f6422c96bd4f753ba6c7b4e725945a7686018b3a7c5c8f40a5c1bd59c112f03,2024-11-26T20:15:25.930000 -CVE-2024-11744,0,1,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f3d3,2024-12-03T15:30:32.153000 -CVE-2024-11745,0,1,96069305de6ef8812783ef245e2f61d86d985db42c36cad22c8d389adbd7e8c1,2024-12-03T15:25:28.847000 +CVE-2024-11744,0,0,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f3d3,2024-12-03T15:30:32.153000 +CVE-2024-11745,0,0,96069305de6ef8812783ef245e2f61d86d985db42c36cad22c8d389adbd7e8c1,2024-12-03T15:25:28.847000 CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e1e,2024-07-24T20:32:01.573000 CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000 CVE-2024-11761,0,0,eb52b6beba84d5e3aa94afd1e69b06248988bf9736924036fa502f3813b0779d,2024-11-28T09:15:05.090000 @@ -243848,29 +243850,29 @@ CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb CVE-2024-1178,0,0,1ff4a71536018366c289bfb8a1aa1adef7208a3ae26719efcdb84bec870fcd3d,2024-03-05T13:41:01.900000 CVE-2024-11782,0,0,e3d9ca853e3de7c456298225b3bac758bc6cc14e92c8dd2b7f7b36c0bd838f02,2024-12-03T10:15:05.320000 CVE-2024-11786,0,0,6cf20be08bd72bdf18f1b37af5fd1777457199a33f3d53de54fd985237bb5f39,2024-11-28T09:15:05.243000 -CVE-2024-11787,0,1,0fc43ca7c27cfe9e876d4315d9f5ebd6d728a646aa64b73ef36d749ae3468d41,2024-12-03T16:09:14.300000 +CVE-2024-11787,0,0,0fc43ca7c27cfe9e876d4315d9f5ebd6d728a646aa64b73ef36d749ae3468d41,2024-12-03T16:09:14.300000 CVE-2024-11788,0,0,01a0a36704164a1ea673e9c9b149d51cdeaf30b14f663c5b5a2abc31455fcbdb,2024-11-28T09:15:05.393000 -CVE-2024-11789,0,1,d8f07d3d7ea009ac5d9fd72e1a0bd4d5ea8578472c7f0180e6d76006359b22f0,2024-12-03T16:08:48.497000 +CVE-2024-11789,0,0,d8f07d3d7ea009ac5d9fd72e1a0bd4d5ea8578472c7f0180e6d76006359b22f0,2024-12-03T16:08:48.497000 CVE-2024-1179,0,0,18b2d0d135c66f5f21d2d252edc06809b11030eef4b80a686f580bba7c87222c,2024-04-02T12:50:42.233000 -CVE-2024-11790,0,1,e988d74620c01d9561caceeb4755411d4d7ac5d5caa2e1ddf80e7d03798e0a57,2024-12-03T16:08:38.587000 -CVE-2024-11791,0,1,a282242f3195f1360ed8970247bb2873766bcf9e7b01704b3129def56fcd9706,2024-12-03T16:08:22.910000 -CVE-2024-11792,0,1,d8b72c34198e7d7761d23f59e5659e0bfaa920c7ac795c5ded45474ce118ca23,2024-12-03T16:07:42.940000 -CVE-2024-11793,0,1,857ee43deb04b42a918bb2c68574ce73788d0030aaff148e64da973ef0130973,2024-12-03T16:06:59.270000 -CVE-2024-11794,0,1,07030d740a13f7a50aac28994bcc57e57826ceadac688d24f3133d6ba0ad0a33,2024-12-03T16:06:32.677000 -CVE-2024-11795,0,1,a6a62594f243b757c227df5f64829f60dbbed7c17fa47f3d520e60b70ddfed5d,2024-12-03T16:06:03.237000 -CVE-2024-11796,0,1,8f85607a5d2afa6feefb48676fe94680b3b87b47d7a9ece4846a6c7d91db756a,2024-12-03T16:05:21.907000 -CVE-2024-11797,0,1,08e92f54ffdd019c809f0ce86e6d040f8755520503afbce9c33ef12e3ba0bd2c,2024-12-03T16:04:52.443000 -CVE-2024-11798,0,1,509f10e32654d66d39d1278b40784fa0e8d8b9f3d98d987964d9151aebf770d1,2024-12-03T16:04:32.760000 -CVE-2024-11799,0,1,7dc7493125c39bdd32ecaf0e17a665d15ced7a44b859e15db7979e25de19d8ec,2024-12-03T16:22:54.423000 +CVE-2024-11790,0,0,e988d74620c01d9561caceeb4755411d4d7ac5d5caa2e1ddf80e7d03798e0a57,2024-12-03T16:08:38.587000 +CVE-2024-11791,0,0,a282242f3195f1360ed8970247bb2873766bcf9e7b01704b3129def56fcd9706,2024-12-03T16:08:22.910000 +CVE-2024-11792,0,0,d8b72c34198e7d7761d23f59e5659e0bfaa920c7ac795c5ded45474ce118ca23,2024-12-03T16:07:42.940000 +CVE-2024-11793,0,0,857ee43deb04b42a918bb2c68574ce73788d0030aaff148e64da973ef0130973,2024-12-03T16:06:59.270000 +CVE-2024-11794,0,0,07030d740a13f7a50aac28994bcc57e57826ceadac688d24f3133d6ba0ad0a33,2024-12-03T16:06:32.677000 +CVE-2024-11795,0,0,a6a62594f243b757c227df5f64829f60dbbed7c17fa47f3d520e60b70ddfed5d,2024-12-03T16:06:03.237000 +CVE-2024-11796,0,0,8f85607a5d2afa6feefb48676fe94680b3b87b47d7a9ece4846a6c7d91db756a,2024-12-03T16:05:21.907000 +CVE-2024-11797,0,0,08e92f54ffdd019c809f0ce86e6d040f8755520503afbce9c33ef12e3ba0bd2c,2024-12-03T16:04:52.443000 +CVE-2024-11798,0,0,509f10e32654d66d39d1278b40784fa0e8d8b9f3d98d987964d9151aebf770d1,2024-12-03T16:04:32.760000 +CVE-2024-11799,0,0,7dc7493125c39bdd32ecaf0e17a665d15ced7a44b859e15db7979e25de19d8ec,2024-12-03T16:22:54.423000 CVE-2024-1180,0,0,bb83e3fdc0a8f87f14b71aa596dc16c65435770562b16333b2c46b0a903dc99c,2024-04-03T17:24:18.150000 -CVE-2024-11800,0,1,c3f241cce937ea88f12c3e3d8077658b1f1ea7139e48c3521ef8554461a2ec39,2024-12-03T16:22:41.957000 -CVE-2024-11801,0,1,0e2ce1178702da2471c60f99f2f75841a57e7cae82d7e8916897270d12fd97da,2024-12-03T16:22:22.837000 -CVE-2024-11802,0,1,1ee509be931681d4c5a8d73b57a93991c64ec42b7974530a22aeb2c892a2963a,2024-12-03T16:16:58.833000 -CVE-2024-11803,0,1,644472c8797730bc30cd63b92f05bcde358630be8a0ae341ba8c4c7843fb16ba,2024-12-03T16:16:42.027000 +CVE-2024-11800,0,0,c3f241cce937ea88f12c3e3d8077658b1f1ea7139e48c3521ef8554461a2ec39,2024-12-03T16:22:41.957000 +CVE-2024-11801,0,0,0e2ce1178702da2471c60f99f2f75841a57e7cae82d7e8916897270d12fd97da,2024-12-03T16:22:22.837000 +CVE-2024-11802,0,0,1ee509be931681d4c5a8d73b57a93991c64ec42b7974530a22aeb2c892a2963a,2024-12-03T16:16:58.833000 +CVE-2024-11803,0,0,644472c8797730bc30cd63b92f05bcde358630be8a0ae341ba8c4c7843fb16ba,2024-12-03T16:16:42.027000 CVE-2024-11805,0,0,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52b29,2024-12-03T08:15:06.553000 CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000 -CVE-2024-11817,0,1,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000 -CVE-2024-11818,0,1,03353c8ea92f63bcb93155865a1eb5dbe1fed70391bddfd4d8cf954b882838c4,2024-12-03T15:06:10.997000 +CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000 +CVE-2024-11818,0,0,03353c8ea92f63bcb93155865a1eb5dbe1fed70391bddfd4d8cf954b882838c4,2024-12-03T15:06:10.997000 CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000 CVE-2024-1182,0,0,fa905e4a8a46b36f13d15329274923ae221fc1fe7f91daf124410752f4903054,2024-07-05T12:55:51.367000 CVE-2024-11820,0,0,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000 @@ -243895,7 +243897,7 @@ CVE-2024-11918,0,0,3593929fa79fd2ff3075ff0960153853c146cae2b4c652e91826347f06e81 CVE-2024-1192,0,0,2496c5c2bd24b6b1e653d79a0dbb975771788d1c54262403d529d1a596a31073,2024-05-17T02:35:17.743000 CVE-2024-11925,0,0,8ba6e48179945e2c0807e717394a91dffc0cd6e22b1cec23e4da5d64788cadee,2024-11-28T07:15:05.267000 CVE-2024-1193,0,0,ffb9a4095d8f9913e32a4a9fb84e7d515c719215bffa9c1271257c84c947030d,2024-05-17T02:35:17.833000 -CVE-2024-11933,0,1,ff719b80c8b04b1955877df42e564ce90eac2c09e4f59c20e785f18a1e8804d6,2024-12-03T16:04:10.350000 +CVE-2024-11933,0,0,ff719b80c8b04b1955877df42e564ce90eac2c09e4f59c20e785f18a1e8804d6,2024-12-03T16:04:10.350000 CVE-2024-1194,0,0,2ada7ec0067a4a6c15e16c8b6d60d2605ff0ff50c80d53e3de0a5fe7493767f7,2024-05-17T02:35:17.933000 CVE-2024-1195,0,0,524480b99d81e527b71e9b6d2b12e0f3d16697f860efe8d11194cd8cf60ecd57,2024-05-17T02:35:18.037000 CVE-2024-11959,0,0,55f4f0848caef18230c7048f835a742ab3a0aaaf83b000723880212a9c969f3f,2024-11-28T15:15:18.003000 @@ -243945,7 +243947,7 @@ CVE-2024-1208,0,0,931317b38cffca1e6ab678e3f4e10db5d686e3bb7ffa9e092bfb0d5704f0fe CVE-2024-12082,0,0,3b55c847ee02ef0d7f4b58fecd9285e5b3b7a20be8f27582ab2fdc4ac93dfac6,2024-12-03T13:15:04.843000 CVE-2024-1209,0,0,b007174870c79d931de8bd87795b421ecc64b354efa55388cf8747cc0f9b9382,2024-02-14T16:51:40.300000 CVE-2024-1210,0,0,2bd6c4d9a535fadb91354d7280da4ed73754e214ed933073c198034626ca398d,2024-02-14T17:26:54.873000 -CVE-2024-12101,1,1,cf6330eb409e982923b4b0b78cc8d64ad396889b9513f5530cedf911c9fe2802,2024-12-03T16:15:20.910000 +CVE-2024-12101,0,0,cf6330eb409e982923b4b0b78cc8d64ad396889b9513f5530cedf911c9fe2802,2024-12-03T16:15:20.910000 CVE-2024-1212,0,0,da6373ae7bafa80bc186105339e693a9592b96e608bda44b9b7e9a26c6194323,2024-11-19T17:24:39.480000 CVE-2024-1213,0,0,73c928f5e166c2f8b5a80c38e18cb771f40a6d802d77253df887196bd9243584,2024-03-21T12:58:51.093000 CVE-2024-1214,0,0,3ce61bef6906de47cb6dca47166861f981b3b7a12f38cc6bc1c75e176d1b9b5e,2024-03-21T12:58:51.093000 @@ -245267,7 +245269,7 @@ CVE-2024-20757,0,0,d4876285f861d8804a5deb2dce4161b79aaf535159e519e23db4f581b4072 CVE-2024-20758,0,0,9a68474708dbba86344d778593d171591406a4b15d84e428ecc0142dd681df99,2024-04-10T13:23:38.787000 CVE-2024-20759,0,0,a686ba0e4b3836d989843a87504f9dac91dbfa6f45b488354f95fb65c9a28ce7,2024-04-10T13:23:38.787000 CVE-2024-2076,0,0,b498bfd91472e82b9d0da8877f7703c42c1b4325bed0ae394a281bb937b4cf85,2024-05-17T02:38:02.357000 -CVE-2024-20760,0,1,6d0cc8f06d6baf91d5ee9fe96291eb72040f4837c001560e934222ef69cfb990,2024-12-03T16:24:49.360000 +CVE-2024-20760,0,0,6d0cc8f06d6baf91d5ee9fe96291eb72040f4837c001560e934222ef69cfb990,2024-12-03T16:24:49.360000 CVE-2024-20761,0,0,effc1f74749cfb4de0a51bb869b82cb1b6120d03159af755229b4852d1eef78d,2024-03-18T19:40:00.173000 CVE-2024-20762,0,0,ea10f0e8d7fe9a7b94e73cdf8e279466b2cf3903cbb5861766fb1f64821f89f4,2024-03-18T19:40:00.173000 CVE-2024-20763,0,0,0d54e79e21cf32dfbe1bc44d0592f636e5ac1732654d64c3846be98120f1a1ba,2024-03-18T19:40:00.173000 @@ -245511,7 +245513,7 @@ CVE-2024-20991,0,0,94f0f80e95be2725620dad0c6e5443bdd60acc699a66c91ac7c7279a95dd6 CVE-2024-20992,0,0,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000 CVE-2024-20993,0,0,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000 CVE-2024-20994,0,0,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000 -CVE-2024-20995,0,0,01229a4133ced8daa32eab0323077d3b0640a9df62354c85893871947ef19493,2024-11-27T16:37:10.153000 +CVE-2024-20995,0,1,1f9174ba030143632481498c826781249624a95457bca2e98610d80b4844c6dc,2024-12-03T17:15:08.597000 CVE-2024-20996,0,0,fcd2292738608c647a4c519832797e84b76f4989a7b5a3e0a96bd0b4bdb3583b,2024-10-17T17:09:42.857000 CVE-2024-20997,0,0,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000 CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000 @@ -245563,7 +245565,7 @@ CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000 CVE-2024-21042,0,0,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000 CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000 -CVE-2024-21044,0,0,d6a124edde02ccad4eb1662b040fc85bdd4c8af9652fa58273abc93194a1774e,2024-11-27T16:29:16.483000 +CVE-2024-21044,0,1,3f45eec1e46b6a448e745da4861f2365c447de08b700b7dafe3a57ef6b615700,2024-12-03T17:15:08.787000 CVE-2024-21045,0,0,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000 CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000 CVE-2024-21047,0,0,2bc5d014697923ab8f9837dde11c202b28c9635338e1429d1d2707b2d34f9717,2024-04-26T09:15:10.500000 @@ -245571,7 +245573,7 @@ CVE-2024-21048,0,0,0740c7f75430ed630e47ca8538d7654b46da3ebd0ee4b5951500b7c74c4ef CVE-2024-21049,0,0,9616fde59f011de26fa6ba50e58cd40851be8c65128168cf773f9d94db5d91a8,2024-04-26T09:15:10.567000 CVE-2024-21050,0,0,d94cb733af7c54a4d84e619579d9bde9e102985653759b366a435d84928a9534,2024-04-26T09:15:10.637000 CVE-2024-21051,0,0,5b5b38f20f94692fbee206c4d08ceb1d0f4cd57a972ab2287f632f08a22a09ba,2024-04-26T09:15:10.703000 -CVE-2024-21052,0,0,c06373856a4278a0afdf4e6f23bdf96084c39d6b8bf5750bd29210bb7b6d062f,2024-04-26T09:15:10.767000 +CVE-2024-21052,0,1,e3949841d9fa67edbdcab968c6ac42d301424c98f18703ad9fe9bea56c30002d,2024-12-03T17:15:08.950000 CVE-2024-21053,0,0,7fef0dc012419ed4a2e2c8a891096cd3e5ba1da6901d2a12026f2e7f8894c29a,2024-07-03T01:46:26.233000 CVE-2024-21054,0,0,835b9f20e0e5a67456e3f5d7374f40411fa327258971531851fde9f6c745e99a,2024-07-03T01:46:26.957000 CVE-2024-21055,0,0,7b97a238a9f2f8011d73871f0eaf7f4e90106b5fbf1015a4a4e573715a21c1d0,2024-04-26T09:15:10.953000 @@ -245583,7 +245585,7 @@ CVE-2024-2106,0,0,213f924b1030e277957ab3251c0a5e0aaf21bb221bf06ebf6920975bdeafa5 CVE-2024-21060,0,0,5dad82251c69460b0dcc342dbc8fe5f30ffd6435784fefca48a78f953ddd6047,2024-10-31T16:35:05.517000 CVE-2024-21061,0,0,acce4a5f468dca01931c32e50c6611a1e683c3d9c025ec493bafb29e16c7fe5f,2024-04-26T09:15:11.143000 CVE-2024-21062,0,0,f52b903674b0da400a3e3849ca455d776135add7df0354d62dc29d89b7440bac,2024-04-26T09:15:11.213000 -CVE-2024-21063,0,0,73270d165bc0b9fbb9db2ba8819a13b23a6c11f25a3f1c5d26effd3bfb36135a,2024-04-17T12:48:31.863000 +CVE-2024-21063,0,1,e23f0197e67d00ef65622e3d434aaacac50777a28da39c1b420993e471f6a1a1,2024-12-03T17:15:09.103000 CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000 CVE-2024-21065,0,0,1c4717813b1a034170a9d85c7f01f49a9a6817cd44eb3976adb8d53a84de595b,2024-04-17T12:48:31.863000 CVE-2024-21066,0,0,7da8187d584810bae1a6bae2212c93de6863858adc6479117a4e458e0f55fedc,2024-11-01T15:35:08.567000 @@ -246191,7 +246193,7 @@ CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000 CVE-2024-21726,0,0,258e12429393fbdcadf90bc903b6c4eaa784036f8d4a014cbe225655bb0298a5,2024-11-04T21:35:03.690000 CVE-2024-21727,0,0,2cfa1a63a24a03456c625f31f74d2ce885912143f39c319c4ec56855c86f3f44,2024-10-29T19:35:15.020000 -CVE-2024-21728,0,1,2cbae60f817b8c7a7affecac1a8952c66a9f7eeec8d8bf74d3b215cd2045b4e6,2024-12-03T16:15:21.030000 +CVE-2024-21728,0,0,2cbae60f817b8c7a7affecac1a8952c66a9f7eeec8d8bf74d3b215cd2045b4e6,2024-12-03T16:15:21.030000 CVE-2024-21729,0,0,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000 CVE-2024-2173,0,0,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000 CVE-2024-21730,0,0,1b2a5305e4ab8d792a0cdaca2379657af358835cd0a20f361a179e55999cc955,2024-08-16T14:47:27.933000 @@ -246945,7 +246947,7 @@ CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0 CVE-2024-22723,0,0,5e0104614f79979231b68cb0938b4f8c78660f8d758e8dd4467e139288dfbdc1,2024-08-01T13:47:01.343000 CVE-2024-22724,0,0,933dc01fb2520f6f9ab9fa4754177aa8d3c42e94e77de3e74dc91468db49f71f,2024-08-06T15:35:08.610000 CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c113c5,2024-01-30T20:42:46.143000 -CVE-2024-22727,0,0,21f0a699093390ba1d8ee3a22a8e6961dde2045354957e98f8b2db244c882256,2024-02-20T19:50:53.960000 +CVE-2024-22727,0,1,bc17139817b54dbe557343f06cbe3841eb840d2294a7055da210550585fddca2,2024-12-03T17:15:09.237000 CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000 CVE-2024-2273,0,0,0a70a78279025f010830c200ec41c70db1b0b3c6a90f640b7fd5d17983a65e86,2024-05-02T18:00:37.360000 CVE-2024-22733,0,0,e9298877351c5016bba78c319c5e21268788f845a90e3f71cf40d2a02eaa557d,2024-11-05T21:35:05.440000 @@ -248056,9 +248058,9 @@ CVE-2024-24409,0,0,dd8ff08f29b98b9528fdb2ee83855d6758a702d939ff7172a903f50f60717 CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf668f,2024-05-14T16:13:02.773000 CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000 CVE-2024-24425,0,0,d53ddd215aa141fbc2d2ed66224530fe50b469290961d3787f25d193fdaa18f0,2024-11-19T17:35:09.450000 -CVE-2024-24426,0,0,6166038340ada8fcc560b6807a8903fc1dd95abcef765f5426db322c486b2805,2024-11-18T17:11:56.587000 +CVE-2024-24426,0,1,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000 -CVE-2024-24431,0,1,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000 +CVE-2024-24431,0,0,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000 CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000 CVE-2024-24446,0,0,4c6e15fdd35cea3b2028a0ca801486700d3d050a15d3ac5c7114877688fb3063,2024-11-19T17:35:10.263000 CVE-2024-24447,0,0,68577331a6f4e1af2736b20dbfd3e5dfc70e89a5bafd5ffca69920501cd70cdc,2024-11-18T17:11:56.587000 @@ -248478,7 +248480,9 @@ CVE-2024-25009,0,0,7a49371ecff66a731dba9be39b6c36a2872e7617aa621569c85562cb428fb CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000 CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000 CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 +CVE-2024-25019,1,1,ccd03615e77816bdafa146d2befae76372fb27170bd97657f13091bc7ad8349b,2024-12-03T17:15:09.560000 CVE-2024-2502,0,0,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000 +CVE-2024-25020,1,1,cf24905f4ad158f41a91eb05683b9c255c1d72ad13dcabc6630a58b681b00e7e,2024-12-03T18:15:12.997000 CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000 CVE-2024-25023,0,0,fc27f892e9b9f8b0dcc06c73130838c8d932f593668ebe29c73cf641f9d3b8b1,2024-09-21T10:15:04.760000 CVE-2024-25024,0,0,292b2d39946afd1b9ad5ee06a8815eeb2737c523e74309496dbedf42f7d2468d,2024-09-21T10:15:05 @@ -248488,6 +248492,8 @@ CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac199636 CVE-2024-2503,0,0,69feba8a1ecaa5b47df24cb8640784600105629ed62bcf04c628e0d80623e12e,2024-05-02T18:00:37.360000 CVE-2024-25030,0,0,2fcbb968633b471481b1659cf8f35332f6e433fc3f482d6491bf1056a0790e63,2024-06-10T18:15:27.247000 CVE-2024-25031,0,0,b457525752363b6c80f39091c8baffde9aeb611ca774bb95f18751b6242d3323,2024-08-01T18:17:26.177000 +CVE-2024-25035,1,1,208b5ea027dc4e15dc12c3f8dab42b7181ac958e7fdb4cc060ee878d55f9c2cb,2024-12-03T17:15:09.753000 +CVE-2024-25036,1,1,353076a13c2a382d383576df3337ff5c9ed04f3d3a33d67e1f273ffb0fbd66fd,2024-12-03T17:15:09.923000 CVE-2024-2504,0,0,bc1b0b8c3c44aa4ad945cfa7dc04f53a01ffea10c9d5aa9c1cc0cc69512decb1,2024-04-10T13:23:38.787000 CVE-2024-25041,0,0,b2ec9f09accd97793f15836559934b612a38386c531a9d4c48a381afddf5bf6c,2024-08-01T18:19:55.627000 CVE-2024-25046,0,0,eae354cb69572eceb000e17cf2bf7402f41e90996afef91ee4f08eb46291d6fe,2024-06-10T18:15:27.350000 @@ -249198,8 +249204,8 @@ CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000 CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000 CVE-2024-26050,0,0,e5e2c4f7b84f8f2f1d1ea8570d5ab87ff02bbfb4edf0f2eb8b892f6b238feba4,2024-12-03T14:32:40.333000 -CVE-2024-26051,0,1,1a347b90b758666ad259b5f50da24b75e2e08d3b4f7120bb88a4169d2df5c2e5,2024-12-03T16:25:37.877000 -CVE-2024-26052,0,1,f320dbd982698eaae20e6d38a40220d06c671d55fbb93cadee7502524b69c8c2,2024-12-03T16:25:48.917000 +CVE-2024-26051,0,0,1a347b90b758666ad259b5f50da24b75e2e08d3b4f7120bb88a4169d2df5c2e5,2024-12-03T16:25:37.877000 +CVE-2024-26052,0,0,f320dbd982698eaae20e6d38a40220d06c671d55fbb93cadee7502524b69c8c2,2024-12-03T16:25:48.917000 CVE-2024-26053,0,0,08b1c01624e7d71b7ff35b901082456bbba3fa5d18db4bad7ba7d58bb2e8e67e,2024-06-14T19:46:37.923000 CVE-2024-26054,0,0,eda3484671c40e51a92b63a901454f377d91e0d9bfcdc0a5fb15602bc8f94d81,2024-06-14T19:24:41.580000 CVE-2024-26055,0,0,baa99b29bd8823923f255a8118fccf649a7d41ab4a2f879c4c914a9fe0240d12,2024-06-14T19:46:17.973000 @@ -249215,14 +249221,14 @@ CVE-2024-26063,0,0,f5a13f3984cabb12f59616fa26efdbef4591cca6826bbc28da51b1600a9b3 CVE-2024-26064,0,0,3098c3e3de91199d1bd6d20eb89b7ee3464bdc44d99dc9cd1e4ea880cda75894,2024-12-03T14:42:01.657000 CVE-2024-26065,0,0,00462b106b4f303ce5343363705987a205782e4b4edc349db65b96bad65b09a1,2024-12-03T14:41:45.277000 CVE-2024-26066,0,0,c16f3c27056b3c70c3163298471f82d82d65c7e624bee5584c40df2a2851002f,2024-06-14T18:48:49.183000 -CVE-2024-26067,0,1,55ee056d8d24d915f9e7eae3819486a282aee907b0a6ef00f3e8fd7b1ed8f9ae,2024-12-03T16:26:08.383000 +CVE-2024-26067,0,0,55ee056d8d24d915f9e7eae3819486a282aee907b0a6ef00f3e8fd7b1ed8f9ae,2024-12-03T16:26:08.383000 CVE-2024-26068,0,0,8b1bf80f59bd4ba690a55f04b468280504b7e85a202f44401a8c49c1cbdddd95,2024-06-14T18:48:22.843000 -CVE-2024-26069,0,1,3220ecf329baa4e4f0114d1447ffd8d500befe9993cca1cd3cd3a1f7583e4467,2024-12-03T16:26:21.123000 +CVE-2024-26069,0,0,3220ecf329baa4e4f0114d1447ffd8d500befe9993cca1cd3cd3a1f7583e4467,2024-12-03T16:26:21.123000 CVE-2024-2607,0,0,dba392cc68d2c8c05396fcaad2e922f1d22124945f19c05914b24ceca7919748,2024-08-12T18:35:35.830000 CVE-2024-26070,0,0,75f7fe0de19444b2f7278954a826fb8e48c269d696e09896b4e65b0a036dcf80,2024-06-14T18:25:00.727000 CVE-2024-26071,0,0,b00573b04112bc3f9a4f12f32bec3604fa9595448750d9bdf978bd164cf11b27,2024-06-14T18:24:49.860000 CVE-2024-26072,0,0,795aa52dd62646e83ed807713ec96c12320151f66f145549208b2eae946acb55,2024-06-14T19:37:40.893000 -CVE-2024-26073,0,1,ea8b0395170bba4c212a67abb89e06fac33b2f03fd0bce7a8e02833ca1d25823,2024-12-03T16:26:34.260000 +CVE-2024-26073,0,0,ea8b0395170bba4c212a67abb89e06fac33b2f03fd0bce7a8e02833ca1d25823,2024-12-03T16:26:34.260000 CVE-2024-26074,0,0,343c9b4e475dacc17a86a9d8e947e779cc9c9f7a1f2d9d30ddfd0d0411a8d1d6,2024-06-14T19:24:23.860000 CVE-2024-26075,0,0,901da86ca412d659e8a18006b04f83d9794756660ad061f7d2773a1db6038c69,2024-06-14T19:20:39.827000 CVE-2024-26076,0,0,e3d4735c38e5c3c9eb10fc500b9c2e29c498e85efcaf17e85354d76841836419,2024-04-10T13:23:38.787000 @@ -249230,7 +249236,7 @@ CVE-2024-26077,0,0,11d79deeaf314f3815fc296aaf122c971232c2b7cee0a2ccfd4d162d209c3 CVE-2024-26078,0,0,15c623e5c49ad76f544f4e36e05701d53300618f3be12cff6120b35ce02daf08,2024-06-14T19:35:02.233000 CVE-2024-26079,0,0,7def00d245ca33c0ed073b8deb05bb08843edfe5563d53cff951ac5e526b90ee,2024-04-10T13:23:38.787000 CVE-2024-2608,0,0,034c3f0d69de46d9ba7a73a0532d7d80b727b4c71250c7f2c3749a641f69ef8b,2024-07-03T01:53:22.600000 -CVE-2024-26080,0,1,7604d52bd30e88605dff84d8eeb0e9952afe9b0f5abb04468110dd0739ff6514,2024-12-03T16:26:46.317000 +CVE-2024-26080,0,0,7604d52bd30e88605dff84d8eeb0e9952afe9b0f5abb04468110dd0739ff6514,2024-12-03T16:26:46.317000 CVE-2024-26081,0,0,1d29efd0c7c46f3f7680eb50611ca91569a2766002cfcbb2b36fea018596932d,2024-06-14T19:34:47.583000 CVE-2024-26082,0,0,603b5ee896e39670eda6156999639510b8626e2d981c7d45c9753ffcdefa3124,2024-06-14T19:34:37.370000 CVE-2024-26083,0,0,33df432e039989f8563bd2b33e594330302cc12f6f0d6608747f36d5fb9ed83e,2024-06-14T19:34:23.237000 @@ -249245,19 +249251,19 @@ CVE-2024-26090,0,0,ed98f35d571423c5ef53e825d7ea9212d7ca429e14c4d90b79333d7179f2c CVE-2024-26091,0,0,432c29cd1da1e6c9f8652a2bc2bfacfd01862e5bf100718ad43ba6760143b36d,2024-06-17T20:32:37.817000 CVE-2024-26092,0,0,67476159c2a94aa6c3caf2c7ea973d42f985c77e89e69f10705b74d3b72d9b65,2024-06-14T19:55:31.347000 CVE-2024-26093,0,0,c78f8313d7f9ae22e0b6d6b4b7b4f7ac5cc5c06dc88b21c00914a84215154be9,2024-06-14T19:50:01.977000 -CVE-2024-26094,0,1,9d2ed7254ec4f2ba31272bea4c933824296834da359032a69be2b9666b077acd,2024-12-03T16:26:56.900000 +CVE-2024-26094,0,0,9d2ed7254ec4f2ba31272bea4c933824296834da359032a69be2b9666b077acd,2024-12-03T16:26:56.900000 CVE-2024-26095,0,0,9f6c7bddb38cd6b8f363ea5c70ef041eaf1840874199b0d4f54fdf8f0f85f9ed,2024-06-14T19:55:53.020000 -CVE-2024-26096,0,1,a856d1c0d122ca77743cb2f984b701c53176cb71fb426f8e10c7bfcc9817e80e,2024-12-03T16:27:10.247000 +CVE-2024-26096,0,0,a856d1c0d122ca77743cb2f984b701c53176cb71fb426f8e10c7bfcc9817e80e,2024-12-03T16:27:10.247000 CVE-2024-26097,0,0,cf64c962cadb0fc8f1556505bc07c2350b9f9285ec03ff659cd6a815a0eb0c88,2024-04-10T13:23:38.787000 CVE-2024-26098,0,0,dbbd02b23dacb0109748d3b2fc272a4103fcd271020bb791bb34007edc8f300f,2024-04-10T13:23:38.787000 CVE-2024-2610,0,0,b027d224535ed46303e9cb28e3c541ff296bc0a756671ac358daf18839ba9117,2024-11-06T16:35:15.013000 -CVE-2024-26101,0,1,43f2d3fbbb4c4b8f51f15938710fd6d3cc2a2f7ffcb5f068956881a183094b6a,2024-12-03T16:27:19.990000 -CVE-2024-26102,0,1,26f73657f4749efd9627e01297796c03b1ed9f54e34743c90b72da281a5393e8,2024-12-03T16:27:31.687000 -CVE-2024-26103,0,1,f714c8eefd27e3fa0cacdf5e00ea44a31a1a65f24535b96be480888dbdc1b16b,2024-12-03T16:27:41.650000 -CVE-2024-26104,0,1,473a3743433dc999ddcf400330ab19f29fe48959e8ab52817ef075a45cbf682a,2024-12-03T16:27:52.680000 -CVE-2024-26105,0,1,27f7f278017171300618af97310d9c50740c8fc531a7d39404b83b07a9d8e6de,2024-12-03T16:28:02.483000 -CVE-2024-26106,0,1,01a6fc05ca7ef8f961bbec250ab6bca509ccbd24fb52a495c0f4da074337e1c2,2024-12-03T16:28:13.490000 -CVE-2024-26107,0,1,561b56160fca2d636095d7ed203b3a9b22965fa30573a9741175f19588d50ae7,2024-12-03T16:28:23.067000 +CVE-2024-26101,0,0,43f2d3fbbb4c4b8f51f15938710fd6d3cc2a2f7ffcb5f068956881a183094b6a,2024-12-03T16:27:19.990000 +CVE-2024-26102,0,0,26f73657f4749efd9627e01297796c03b1ed9f54e34743c90b72da281a5393e8,2024-12-03T16:27:31.687000 +CVE-2024-26103,0,0,f714c8eefd27e3fa0cacdf5e00ea44a31a1a65f24535b96be480888dbdc1b16b,2024-12-03T16:27:41.650000 +CVE-2024-26104,0,0,473a3743433dc999ddcf400330ab19f29fe48959e8ab52817ef075a45cbf682a,2024-12-03T16:27:52.680000 +CVE-2024-26105,0,0,27f7f278017171300618af97310d9c50740c8fc531a7d39404b83b07a9d8e6de,2024-12-03T16:28:02.483000 +CVE-2024-26106,0,0,01a6fc05ca7ef8f961bbec250ab6bca509ccbd24fb52a495c0f4da074337e1c2,2024-12-03T16:28:13.490000 +CVE-2024-26107,0,0,561b56160fca2d636095d7ed203b3a9b22965fa30573a9741175f19588d50ae7,2024-12-03T16:28:23.067000 CVE-2024-2611,0,0,6dd80cd3e53c7b3aadd4fa3dc85e5446582d7b7a4f7a605c2d1c45b629123e4f,2024-10-30T19:35:10.593000 CVE-2024-26110,0,0,06ea1ccf9ccc83b3b222343237107b52b6bb8ab16e3c47c48b2f2f7b78be64ad,2024-06-14T19:56:08.213000 CVE-2024-26111,0,0,f1175484e7c3c3f71bc36c49f0b92acce0068c9e0d1c3d1d637043db91ad89a5,2024-06-14T19:52:43.617000 @@ -249266,7 +249272,7 @@ CVE-2024-26114,0,0,dc5e7cb68806a360d656333090ce8bec0d5e4f02fca5f44407312b6d731b5 CVE-2024-26115,0,0,d74160aa381f4e1a51a3ec1cd1d03c99e220f3553ea9e0140484bf904ce91a95,2024-06-14T19:51:30.393000 CVE-2024-26116,0,0,abf59a73286b1cf58bc13403a83e9678e0351f50add52bd78b5eb74a78e51a0f,2024-06-14T19:51:03.750000 CVE-2024-26117,0,0,6c431170e13775aecc2297d81c07dfcb615de89aac569ded89309592114bcd11,2024-06-17T20:31:38.117000 -CVE-2024-26118,0,1,51eecbb3f408b7b654b7ea484ab79a4be1e6d997e00ed8c27833ae8c7b8b7702,2024-12-03T16:28:58.907000 +CVE-2024-26118,0,0,51eecbb3f408b7b654b7ea484ab79a4be1e6d997e00ed8c27833ae8c7b8b7702,2024-12-03T16:28:58.907000 CVE-2024-26119,0,0,c503d1dbd496f47cfcc05acb78d53a5a1697c7292b96b179a782ba7662c08032,2024-03-18T19:40:00.173000 CVE-2024-2612,0,0,4262bfdf186b50c97c0850391a589444d79ea8f33a25322b9905ef9642e35485,2024-08-12T18:35:36.893000 CVE-2024-26120,0,0,36e5d4f10867ad6f473ee2c131d347d7586e4f8a8ed54d61685777cb84ad6820,2024-03-18T19:40:00.173000 @@ -250338,7 +250344,7 @@ CVE-2024-2732,0,0,59c41b28a53d51de59243e9e076d0b70e0706e7684df1ed7a61104bd5a3689 CVE-2024-27320,0,0,322204c7c44b6b07c7c5ce2517955a5763bb970c7a635001dc6670202a7c4e27,2024-09-23T13:56:48.353000 CVE-2024-27321,0,0,21ec13da4bc7743b26ab8f16ae210d29125d1180d3f4bbbecb3541886b29f580,2024-09-20T17:06:58.440000 CVE-2024-27322,0,0,b770b9d962cb08865ef72f437565bd0d77dc69db533af805410b12f466305679,2024-06-10T18:15:28.103000 -CVE-2024-27323,0,1,38592ea93906fb228845a81866b0a5686932b7d61e75313c319e38db86407877,2024-12-03T16:50:34.657000 +CVE-2024-27323,0,0,38592ea93906fb228845a81866b0a5686932b7d61e75313c319e38db86407877,2024-12-03T16:50:34.657000 CVE-2024-27324,0,0,bd68fc610631d765b504e2eb0f9c966837d653f843cbd0dbbbd7151aba723966,2024-04-02T12:50:42.233000 CVE-2024-27325,0,0,91c89b4ca089464e099a6844730ad761f5ea57833c3f8473c9d662fd4df4035a,2024-04-02T12:50:42.233000 CVE-2024-27326,0,0,17ed7eadcf7ccf0f8f633fa32c1b3dd8ae0821c2df09af51de2b083a97bfbfd7,2024-04-02T12:50:42.233000 @@ -251339,7 +251345,7 @@ CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383 CVE-2024-28826,0,0,ccabc68ae1502fb496d2010a22f66c953a12ff1a849372d7235937980a01c570,2024-05-29T13:02:09.280000 CVE-2024-28827,0,0,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000 CVE-2024-28828,0,0,f569edfaae2cfaafb15d4f5e29614839e3689bfe76be347c8b67efdf6d0be50b,2024-08-07T17:57:38.413000 -CVE-2024-28829,0,0,e305f6efb7d898a0ff30783cf29e56094e75fa2dd6dffb8f303a59f53400f681,2024-08-20T15:44:20.567000 +CVE-2024-28829,0,1,7a55640720947d8ce349cb378455ecd484e6615d62727837b8c36597f79843f6,2024-12-03T17:55:48.257000 CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,49bb68528483eea32fe70c10feda0199ddfef50b4330a9b74a5779b200dbf298,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,8b0cc22b019b2f22717d4926d7f18f8c0f1245da30fda97cee3d4dd670ef131d,2024-06-25T12:24:17.873000 @@ -251789,6 +251795,7 @@ CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df3 CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000 CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000 CVE-2024-29402,0,0,7a60de01cd1e1ba7089d18beb6c6236bedaa49309f0015c7a9cb500a08c82ce3,2024-11-07T16:35:15.387000 +CVE-2024-29404,1,1,cb9da2d67dd4fa648ee43710d0ed869338276429f02da7377b7a3d981388cc36,2024-12-03T17:15:10.087000 CVE-2024-2941,0,0,1d46f1daca1d9b41abf5b871e57cb1a154c8989de86923637267a01c87a2e537,2024-06-26T19:15:13.107000 CVE-2024-29413,0,0,e53aa5e14ae181dd984ec17641b62210a6aaf3e99011fe016e5561f245d20a2f,2024-08-27T20:35:28.013000 CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000 @@ -251838,7 +251845,7 @@ CVE-2024-29500,0,0,2b9af0d3cdf9b55a92126bde2520cf6cbecb1bd416352c1f95dc67e322137 CVE-2024-29502,0,0,430553d99f150e3a768b506d8c7614a836291ddb0863f4cad999ccc23bd2277f,2024-04-11T12:47:44.137000 CVE-2024-29504,0,0,c8d4771bc57f6638d44adfb94d6bcdcf83c3f9df966567debd1ab6eedf3e1b31,2024-08-27T20:35:28.797000 CVE-2024-29506,0,0,c9a02eb460df4f11fbc78026855fba67bf2371f1d9fd03f640425d6e01ade41d,2024-08-02T20:06:16.967000 -CVE-2024-29507,0,1,93542c862056d4c35a631847c41896c490e01aa3d0b341ed0eed1882aed2d1c0,2024-12-03T16:15:21.343000 +CVE-2024-29507,0,0,93542c862056d4c35a631847c41896c490e01aa3d0b341ed0eed1882aed2d1c0,2024-12-03T16:15:21.343000 CVE-2024-29508,0,0,d9f02f88857c7ee25a0a60ec8f52d84a64b8fe034ccb745fb67dcf769cbbd248,2024-08-02T20:09:21.813000 CVE-2024-29509,0,0,7f9e33287211a4ce75194afd9a47efe59972b78feb98e78f742b830aacc87b77,2024-08-02T20:10:32.520000 CVE-2024-2951,0,0,f710e6d4245ad6c04fc32de495a410058cbe73872608e5a79d1a40f0d8a1be5d,2024-03-27T12:29:41.530000 @@ -252359,7 +252366,7 @@ CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735 CVE-2024-30202,0,0,ecd5c9b4bd0ebc202276e86a3d9a7e9f6b3bf262206739b2cbd70f27623f88ba,2024-11-14T20:35:23.057000 CVE-2024-30203,0,0,8b447cfaa3c0f29bed1fa430ec69e0ff721af51bf1f0d5669fc03f342b79df4c,2024-11-07T11:35:05.040000 CVE-2024-30204,0,0,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000 -CVE-2024-30205,0,0,59ff5e238770a16ac12a044b9f567826327ea645bd7ddc5284c92e9966a63ace,2024-05-01T17:15:32.820000 +CVE-2024-30205,0,1,67fef15cf456a2a8a49b7296d8a6faf968ebb587417f5262a0de46685c1fbb16,2024-12-03T17:15:10.187000 CVE-2024-30206,0,0,a7d0521ef088000b8f51cc15715463c9e26ba3441057ea1a5875859d791a61b9,2024-06-11T12:15:14.390000 CVE-2024-30207,0,0,93b801e8c0cb837d34644b282b92dd26d7a86790e6531becad283497647bbd2d,2024-06-11T12:15:14.520000 CVE-2024-30208,0,0,57146b9ec8ab54f1968d14f0d8832031fcfdc08d067fc5f7c7e4b7497c1c092e,2024-06-11T12:15:14.623000 @@ -252433,7 +252440,7 @@ CVE-2024-30270,0,0,efecb3f08ba92062dd267bd0c96f7f12cf461464043b62265b8f7d0e604df CVE-2024-30271,0,0,4f667ebf06641ee169a3ffa2348fd1053acc22044fe752e1f0db8c1957232f63,2024-04-12T12:44:04.930000 CVE-2024-30272,0,0,a408e080820ee91f9124f4e9a3caff1ca158aba4951c48fad2f31a3e9facd7d8,2024-04-12T12:44:04.930000 CVE-2024-30273,0,0,6b1d238c9e12ea2ba8fc60efb1a6f102260f96c472f5f331b760d3af4a0ceb07,2024-04-12T12:44:04.930000 -CVE-2024-30274,0,1,6d6a72c834ea38ccb2874ecc4feec72c8e33b47ed0e8a1829f5848ded1ff7c3a,2024-12-03T16:31:14.377000 +CVE-2024-30274,0,0,6d6a72c834ea38ccb2874ecc4feec72c8e33b47ed0e8a1829f5848ded1ff7c3a,2024-12-03T16:31:14.377000 CVE-2024-30275,0,0,5c7fd7a6cf84690d33049db8d301fa3c3763a08fb307abbb2a39ddc9f47ba093,2024-05-16T13:03:05.353000 CVE-2024-30276,0,0,0bd4be9c7f10ca7d4fd2dfa1716549a7092cbd7f9a2adabf7913546d4cdfeadd,2024-07-09T15:50:56.480000 CVE-2024-30278,0,0,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000 @@ -252458,7 +252465,7 @@ CVE-2024-30294,0,0,7c1c3ca5859403614ab177d8966fd465f2ca9acd2006f45c1e5ee913dc704 CVE-2024-30295,0,0,af52457c614b754de367b515ff58d8a2b362917a582134c64f2a73034397eb2f,2024-12-02T21:58:00.817000 CVE-2024-30296,0,0,debe059d0b0adab752e8eed367cea91d921632069a4779f8924abaecaafaf05b,2024-12-02T21:58:13.037000 CVE-2024-30297,0,0,e027b37ff8f5e82bbe1986c29e4c7b4c164a4ff6b5ee35f015fce4fc66acbbc0,2024-12-02T21:58:24.973000 -CVE-2024-30298,0,1,279ca5bcd5fcec6903f3036d422c280da087bd17682ad97831abb44712d4c965,2024-12-03T16:30:43.050000 +CVE-2024-30298,0,0,279ca5bcd5fcec6903f3036d422c280da087bd17682ad97831abb44712d4c965,2024-12-03T16:30:43.050000 CVE-2024-30299,0,0,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000 CVE-2024-3030,0,0,5eafba8e87a04804f0ee37eb44b2a0db0456e0dcfce765e75341d9edfec2815f,2024-04-04T12:48:41.700000 CVE-2024-30300,0,0,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000 @@ -253496,7 +253503,7 @@ CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdac CVE-2024-31652,0,0,d3a39df49d7c9a4ac8f46bb863860ab64051b06ba513b7c983446092a2722415,2024-10-30T17:35:05.700000 CVE-2024-3166,0,0,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000 CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000 -CVE-2024-31669,0,1,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000 +CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000 CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000 @@ -253505,7 +253512,7 @@ CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187 CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 CVE-2024-31684,0,0,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 -CVE-2024-31695,0,0,fc44d9cb1da1273e05dbd57bee60e9de07dbf071072ff6d9a88b80b1a406cc2b,2024-11-15T13:58:08.913000 +CVE-2024-31695,0,1,8fd4a26ea3223cef6079194978b50afaef81942a9f8f26a61510d854c06985ba,2024-12-03T17:15:10.377000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 @@ -253871,7 +253878,7 @@ CVE-2024-32238,0,0,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2 CVE-2024-3224,0,0,5cb76873d21890ad6afc0804dc7e9ce4b6d28fdd7bfda362c8cc03368f50e1a6,2024-05-17T02:39:47.717000 CVE-2024-3225,0,0,40aa66a8e68f888608b499541fb92a4691409488858b4efe5c0a0411aebb7f11,2024-05-17T02:39:47.810000 CVE-2024-32254,0,0,cd4f1a5551a5c9822f757a7d2238dda17ee8a1fa8cc0f96cbea15de331abf612,2024-11-06T15:35:15.373000 -CVE-2024-32256,0,1,e878fe31c26ddc2ef1ba0d5960e20d26b67e4ede83d59e4dfc5d31992bbd2f30,2024-12-03T16:15:21.697000 +CVE-2024-32256,0,0,e878fe31c26ddc2ef1ba0d5960e20d26b67e4ede83d59e4dfc5d31992bbd2f30,2024-12-03T16:15:21.697000 CVE-2024-32258,0,0,5dae54230a1765016eb565e9e25d82cfb7f4d23860857f1e9a3317d31d41442b,2024-07-03T01:55:56.647000 CVE-2024-3226,0,0,ec3ef7f04eda709a41c6882e051ba63d6f97210f0092ab0d07f256b6e32ea9c3,2024-05-17T02:39:47.900000 CVE-2024-32268,0,0,f1e176f354d2a721a3d03d34d04aff542fd4d5a3ceb8bd6d31f1fe050fbb883e,2024-04-30T13:11:16.690000 @@ -254147,7 +254154,7 @@ CVE-2024-32607,0,0,eaec99baa1b483eede1020ebb49f7f526b5972105f0e6dfde50c82a8071a8 CVE-2024-32608,0,0,5e38d1849a448723ba2f30344e01b97ee6dc59cf93689c7dd7b5b71778a65b36,2024-10-17T16:47:02.247000 CVE-2024-32609,0,0,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000 CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000 -CVE-2024-32610,0,1,620309f9534bdc629634bc6efa112881bb9602565781505fddb3ab1c0c8ddcf2,2024-12-03T16:15:21.880000 +CVE-2024-32610,0,0,620309f9534bdc629634bc6efa112881bb9602565781505fddb3ab1c0c8ddcf2,2024-12-03T16:15:21.880000 CVE-2024-32611,0,0,abc754efada8aafebf0fe0506c081c90cf76bdf375a890d26aade6a81a7fbaab,2024-08-19T18:35:09.720000 CVE-2024-32612,0,0,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 CVE-2024-32613,0,0,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 @@ -255940,7 +255947,7 @@ CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8 CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000 CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000 CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000 -CVE-2024-34931,0,0,6450b229b3dcc76dd273a176e1d510aa697ab04ac79bf201d0e27ca4c52bc840,2024-05-24T01:15:30.977000 +CVE-2024-34931,0,1,7b040e33b160496ad0105f0fa8d11d6c808bf5866885798865a15f0f6269baff,2024-12-03T17:15:10.530000 CVE-2024-34932,0,0,b3ae27f61253f7767fbdf3438e64ca1eae22c4d23e1e356e0c8ba8ab5232e6bc,2024-11-20T16:35:19.057000 CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000 CVE-2024-34934,0,0,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000 @@ -257215,9 +257222,9 @@ CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b7481 CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000 CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000 CVE-2024-36610,0,0,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000 -CVE-2024-36611,0,1,4c2b02528fdd4d9d491867b6131bd05320914a0ba163026a539685333ebc096b,2024-12-03T16:15:22.057000 +CVE-2024-36611,0,0,4c2b02528fdd4d9d491867b6131bd05320914a0ba163026a539685333ebc096b,2024-12-03T16:15:22.057000 CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000 -CVE-2024-36615,0,1,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000 +CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000 CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000 CVE-2024-36618,0,0,1b683ed0f9886fba3e4cae1a9790f48a732ffbacff8e54f88bc0a50590bee2ca,2024-12-02T18:15:10.520000 @@ -257225,7 +257232,7 @@ CVE-2024-36619,0,0,d30e29b19403999a360d49eb2b7510653e8a4eeae72cc3067a2b6e14731d7 CVE-2024-3662,0,0,bf35bc71372b512799f21214c4add2ef96949612530c04611b0774c90b1261c4,2024-04-15T13:15:31.997000 CVE-2024-36620,0,0,bd940859e3a70ba9f20daee48c18afd5e689ded5655791c03dcd144494e8ab28,2024-11-29T18:15:07.787000 CVE-2024-36621,0,0,395c2e8d706b3be77e22c8c62abd8cdfeac4ff3d292f427ab7129b4c0bf7529f,2024-11-29T18:15:07.993000 -CVE-2024-36622,0,1,07de4151f2340ac6d06674e425feabdd5df0677a18b73b685b4c7de1fe1f2642,2024-12-03T16:15:22.343000 +CVE-2024-36622,0,0,07de4151f2340ac6d06674e425feabdd5df0677a18b73b685b4c7de1fe1f2642,2024-12-03T16:15:22.343000 CVE-2024-36623,0,0,5b0927c621a8ce8b7dff6d101236e2659ea986ccf06dc2c525fa93aebc3aee45,2024-11-29T18:15:08.293000 CVE-2024-36624,0,0,0a7b2aae5839929f5368ebe0e8fb0a7dbe600d4804ac108be619ee97ae88a044,2024-11-29T19:15:07.923000 CVE-2024-36625,0,0,7c23d2425847fcff4ab6a41af1e0a7a10f21527b69c1199afaca70ff1a9c9744,2024-11-29T18:15:08.607000 @@ -257723,6 +257730,8 @@ CVE-2024-37299,0,0,205f0b40a758fdc1dced6d887b5ea436463fde8aa45c00a6907effc08c197 CVE-2024-3730,0,0,f3a19794b78dc38a637f07c4e7db0ac4195dbeda34c530b5cbd488b9ecb411f6,2024-04-25T13:18:02.660000 CVE-2024-37300,0,0,5590a189f2c80a2c0e69ad3b8771a19032b2ef2b4a268875ff14b77477677613,2024-06-13T18:36:09.010000 CVE-2024-37301,0,0,edc8a23be80a0adc425b4edf50a7dcbe1479a99dce59b837847fb08393ce0038,2024-06-13T18:36:09.013000 +CVE-2024-37302,1,1,7540ee377e8f914590c5ebfecfc94146b2a3f69fa425b1e7984809f9edde3caa,2024-12-03T17:15:10.733000 +CVE-2024-37303,1,1,90c24aadbd635ecc97ef584d134867e31666a91d2272348e915419f7b622df98,2024-12-03T17:15:10.890000 CVE-2024-37304,0,0,51ff2c81cd80d88058aa6d3b84ff7bd3ddd43c76d3fb15284419f7add985f2a7,2024-06-13T18:36:09.010000 CVE-2024-37305,0,0,a35a18378d9858479faa1c229d8034f7e9f595e8a830d5cd9cde2fec42c2e7b6,2024-06-20T12:44:22.977000 CVE-2024-37306,0,0,793d4fb76d193c9cde6559e6d4f42e65455e8eb4e61b0bc936eaa6f9b8fbb6c0,2024-06-13T18:35:19.777000 @@ -257804,7 +257813,7 @@ CVE-2024-37388,0,0,5e976aadc48a067bfe8b054b3afb65dfc2829bfe1215753abaf5d600b1243 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000 CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000 -CVE-2024-37392,0,0,aacf1862268af2cdf1c4491d7b5ae4c041bcfa60748ed52139bf258567ef92c9,2024-10-27T14:35:09.803000 +CVE-2024-37392,0,1,c57b6d8b0609fcac8ed55e1412ac991415047b97cf80e90c77ce6d1c31b26603,2024-12-03T18:15:13.410000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-37397,0,0,7fbcc51c6b175128d4a712387aaad70ff152c7c1c439f81c942699a1e4599add,2024-09-13T16:35:09.630000 CVE-2024-37398,0,0,d014b7eb9a15e5e3eb9081a631750734a91337406ca89540557d8e0fe4675904,2024-11-18T15:23:23.543000 @@ -258232,7 +258241,7 @@ CVE-2024-38031,0,0,39791687a86cb00a8c8a9bf6c29b8b333e2d9192614552a4ee24252586df5 CVE-2024-38032,0,0,41be2218ab416d77ec81c0853b207c29f9c64191f96c18dcd3b6e6f7560f90e5,2024-07-11T16:31:16.480000 CVE-2024-38033,0,0,1e81123daf9f99850b1ab7ee785cd263ed2b0b018942e514470897032a30503e,2024-07-11T16:27:21.303000 CVE-2024-38034,0,0,e720c7cb8e085ac1619fbec51b8ca1a9266a96c4740c9831ab3943b092aa8264,2024-07-11T16:26:19.257000 -CVE-2024-38036,0,0,1180e0f267261f1d404dd12322e8b9fffe4adc005ead3b15186e54bedc0a7283,2024-10-15T14:34:51.537000 +CVE-2024-38036,0,1,ac23c2be19b6c7cd7d2a88bd4672191171c9b11da0e8a168cb5259a112a9c463,2024-12-03T18:15:13.710000 CVE-2024-38037,0,0,6ee6641359a9997141535dc4bf184fc6adae3314eb2141cf63c27cb33bd18eb6,2024-10-15T14:34:22.820000 CVE-2024-38038,0,0,4aa049265d32d6590c37031d06b9ca2e8eb5e0e6a4aadbb4eb6ba3d0d1ecc8b1,2024-10-15T14:33:46.730000 CVE-2024-38039,0,0,e15a0723c4839431a45e7e12b3249cdf72b61c98dd323f1ba61d1cba1e519674,2024-10-15T14:34:00.893000 @@ -258989,12 +258998,12 @@ CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 CVE-2024-38858,0,0,c2e046d5d75320cc690e509cc93285ebeb3c1c26a8f79c6f003385d5db961fad,2024-09-04T14:39:10.203000 -CVE-2024-38859,0,0,de323bde3647e4f305c3b46157fa86379bf5b570b3bfbebf89dea8495917b5d3,2024-08-26T15:15:23.727000 +CVE-2024-38859,0,1,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000 CVE-2024-3886,0,0,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000 CVE-2024-38860,0,0,266a5ea7baf50ab92e42d7685db3a6cf2803dcca1365001a34024abb32b3b89e,2024-09-20T12:30:51.220000 CVE-2024-38861,0,0,c849569e1ce9ba1b5e191f651dac8e0341ee6fab90d6f85280ffa2b71faa4392,2024-09-30T12:46:20.237000 -CVE-2024-38862,0,1,9b3effa57af127d210fa99d38decd49715030f753336a9c99109dcc9d2bae0d1,2024-12-03T16:56:19.887000 -CVE-2024-38863,0,1,19f40d0a8efdafcf1661471e0d88ded3ea1f1a6ed7ed00a5524865119c45bf20,2024-12-03T16:47:15.693000 +CVE-2024-38862,0,0,9b3effa57af127d210fa99d38decd49715030f753336a9c99109dcc9d2bae0d1,2024-12-03T16:56:19.887000 +CVE-2024-38863,0,0,19f40d0a8efdafcf1661471e0d88ded3ea1f1a6ed7ed00a5524865119c45bf20,2024-12-03T16:47:15.693000 CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000 CVE-2024-38868,0,0,f5122b748e151420a9f3845d24af4920bd437f9bfb8619e2cdc643a0cfcffcd9,2024-09-04T19:13:29.983000 CVE-2024-38869,0,0,c0f887639cd5f8290b163362347e9df211e2de0bfae6dfee57ed54004469d16e,2024-08-30T18:15:07.150000 @@ -259700,7 +259709,7 @@ CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb83 CVE-2024-39887,0,0,bcab76b5e08590d7913c7572e3483924f579ce0c6c9a43158866e543d2bd0484,2024-07-16T14:15:04.380000 CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000 -CVE-2024-39890,0,1,ea58c24a6fb50554bebd1694b75a28def7d76cdc6d7e90f18b6202e1691d12da,2024-12-03T16:15:22.483000 +CVE-2024-39890,0,0,ea58c24a6fb50554bebd1694b75a28def7d76cdc6d7e90f18b6202e1691d12da,2024-12-03T16:15:22.483000 CVE-2024-39891,0,0,ce65af2cc2ab9f5337749d509721b17f14cb456e8c1b3062d4901ad84093db6b,2024-07-24T14:38:43.270000 CVE-2024-39894,0,0,1740bddb6fe58de0ef1c139ba5a05d5875d6244dcec43c669506110ca6b1a045,2024-09-11T16:15:06.003000 CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000 @@ -260013,6 +260022,7 @@ CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179ab CVE-2024-40689,0,0,d72047a797aad87fd24dc95664d6dde0e77455bde7da3b63cb978ce1844a86ec,2024-10-19T00:30:36.680000 CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000 CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000 +CVE-2024-40691,1,1,2e5ac0199faaeb30178fb9a2acdbf74096220c2a50c2d4d61fc7469fdb74dac8,2024-12-03T17:15:11.037000 CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 CVE-2024-40703,0,0,c7bdea52d2b22e205d62154ebbe00df525e8e01e7a4b70c25a797f803fb17c50,2024-09-27T16:49:46.177000 @@ -260759,6 +260769,9 @@ CVE-2024-41761,0,0,338c8968760535358ae69eee380114a3e788f32922b0b500d7124a0d4fa3b CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000 CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000 +CVE-2024-41775,1,1,07472990890f284d5d7d4d78df377c400ae7aa9ea4917f4088f45395000c109f,2024-12-03T18:15:13.920000 +CVE-2024-41776,1,1,3937221d1e0a64623563f6b85d8691bc0c1223344b4ac4f8b6097668bc311cf1,2024-12-03T18:15:14.107000 +CVE-2024-41777,1,1,306ab070d2fe50667d0329bff4f8f62654728064d71a9eb0d792571480a9dd59,2024-12-03T18:15:14.293000 CVE-2024-41779,0,0,17ec4f61cef6012531e67f2400115e9e222c01b8977f86a87aaadf93ef6e750f,2024-11-22T12:15:18.987000 CVE-2024-41781,0,0,ac78128c66afd97b943956e29afef1e45303dcc74aa8cf3bf627900637de3972,2024-11-22T12:15:19.193000 CVE-2024-41784,0,0,8c6624e71cb1eed477e47e819c637ab44c35481822d3a957ec1d5eebd3832ab4,2024-11-20T14:35:10.117000 @@ -262884,7 +262897,7 @@ CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c0 CVE-2024-44756,0,0,1681a92faf0c64d1815b4eb0c3be7b2fb90b774755ff6087ed8af6c8466588d9,2024-11-19T21:57:56.293000 CVE-2024-44757,0,0,afa0b64a73ad54cd2de86e32a9739915e3b6a820b2485a49a35c06cde9462d98,2024-11-19T21:57:56.293000 CVE-2024-44758,0,0,0f87f6fd64cd3ee32a39610ab34845e08d64c79e468acaf8dd1c0a562c908710,2024-11-27T18:15:13.007000 -CVE-2024-44759,0,1,6bb21d923750b4d8f9cd3e016df196f06ca7ebc082a2f4d744d2f6ce1660c830,2024-12-03T16:15:22.597000 +CVE-2024-44759,0,0,6bb21d923750b4d8f9cd3e016df196f06ca7ebc082a2f4d744d2f6ce1660c830,2024-12-03T16:15:22.597000 CVE-2024-44760,0,0,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000 CVE-2024-44761,0,0,7f624c83820070ebb06f16b5a059f7fe8de7d537067fdcab263416bb3a81ba98,2024-11-18T18:15:06.160000 CVE-2024-44762,0,0,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000 @@ -263120,7 +263133,7 @@ CVE-2024-45101,0,0,cad1255565408251227b424af7803fa7b621bb0a87132fd60fe56f4ddc963 CVE-2024-45103,0,0,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000 CVE-2024-45104,0,0,30db7dcba4a138780d42a329ad568630f0b423c3266582b9f2b058712e15f7a1,2024-09-19T01:49:50.870000 CVE-2024-45105,0,0,9aafd743798418b48e0189ab1d1328ef9ead562b2c45a261fda806c20503b868,2024-09-14T11:47:14.677000 -CVE-2024-45106,0,1,38434ab4c33ae35f1fc10e3802fa692146137471499cab7f43c7281e583b1cc0,2024-12-03T15:15:10.470000 +CVE-2024-45106,0,0,38434ab4c33ae35f1fc10e3802fa692146137471499cab7f43c7281e583b1cc0,2024-12-03T15:15:10.470000 CVE-2024-45107,0,0,d5e30880270706ae80f98d427d6a3501f7b9d607b88b780b72f90a000a13f3a6,2024-09-06T16:26:03.440000 CVE-2024-45108,0,0,03b1037fb5ccdb261a2f64bd06297f4c212c932af1d9e1d68068742a2f76d080,2024-09-13T17:00:03.120000 CVE-2024-45109,0,0,b69153e81faafb81e736e68d1b34969baaa1e930ab46f2d35f58ab7a52cf7801,2024-09-13T16:59:46 @@ -263499,6 +263512,7 @@ CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8 CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000 CVE-2024-45670,0,0,f344d38326cc1ee5115d87c2c3180ef72598459ab3198d147c85e5db126cc391,2024-11-16T00:24:57.203000 +CVE-2024-45676,1,1,ba22aedad1da063b2c55d949125827576f26bc6c6e068deba87367ee2d01f60a,2024-12-03T18:15:14.480000 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 @@ -265176,12 +265190,12 @@ CVE-2024-4851,0,0,444f4e959fbd50fab42bb9cd6f5b1019a6d50ea56a5371bcf4f4fa6566e3e3 CVE-2024-48510,0,0,c0bda71a75c56137f5ca1653aef745d4cc18cf4bfb1f9d0f6b08426e5356f89d,2024-11-14T15:04:49.847000 CVE-2024-48514,0,0,772c22a7c82f7a2ba09c35b523755c3d2e15343c5a23d7fb25f81b1d3b219920,2024-10-25T12:56:07.750000 CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000 -CVE-2024-48530,0,1,b5b83c3621089c062cd75d5999fd7edfe6d0c0349283534b9f9af54c99d88e42,2024-12-03T16:15:22.973000 +CVE-2024-48530,0,0,b5b83c3621089c062cd75d5999fd7edfe6d0c0349283534b9f9af54c99d88e42,2024-12-03T16:15:22.973000 CVE-2024-48531,0,0,b724f70e8e7f5c2abc833b12edca37a23ca68deaf01b1a2b568ec294ff26daf5,2024-11-20T21:15:07.400000 -CVE-2024-48533,0,1,0ce7e32cf7fbd6e5816d446bba240523ab45e200cada609e63cd6196a4f25645,2024-12-03T16:15:23.117000 +CVE-2024-48533,0,0,0ce7e32cf7fbd6e5816d446bba240523ab45e200cada609e63cd6196a4f25645,2024-12-03T16:15:23.117000 CVE-2024-48534,0,0,076d842795162a1260582c88e3c1c5362e5b5cd96403c6abe0bcd01fd1e9e63c,2024-11-20T21:15:07.567000 CVE-2024-48535,0,0,98833d3c25c49b706c4592fe8269d975a9b2a754117cbd4ae6e64590aafb002b,2024-11-20T21:15:07.660000 -CVE-2024-48536,0,1,ad1cabe4756bdd45e3d36c20554a63d5c7afc4d878e12201ede6e5b570703da5,2024-12-03T16:15:23.253000 +CVE-2024-48536,0,0,ad1cabe4756bdd45e3d36c20554a63d5c7afc4d878e12201ede6e5b570703da5,2024-12-03T16:15:23.253000 CVE-2024-48538,0,0,d00c6ae109958170edcc3a2c583c2ac0637abae567969e57f7b9a648e6c8cb40,2024-10-25T12:56:07.750000 CVE-2024-48539,0,0,1d5c8fdf188ef55366358121671809693c2ffcac98329c253bc948034dac981b,2024-10-25T12:56:07.750000 CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000 @@ -265475,7 +265489,7 @@ CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d8 CVE-2024-49193,0,0,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000 CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714d45,2024-10-17T18:35:13.253000 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 -CVE-2024-49203,0,1,2e3869ed85d4b49507eb3ad2a72ab3ad32e945a0849bd97e20225b0c256f2362,2024-12-03T16:15:23.393000 +CVE-2024-49203,0,0,2e3869ed85d4b49507eb3ad2a72ab3ad32e945a0849bd97e20225b0c256f2362,2024-12-03T16:15:23.393000 CVE-2024-49208,0,0,3a58d346a6ade89e8c0020a10a544403e4226ebcc2dc44aeebe9f12dc5b80439,2024-10-25T20:18:20.550000 CVE-2024-49209,0,0,7815188905707c2f76092b0250e46fa9658c3c02368a05bd7a2ebfc97747dcec,2024-10-25T20:17:36.353000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 @@ -266644,11 +266658,11 @@ CVE-2024-50634,0,0,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2 CVE-2024-50636,0,0,9259433c31993ebe40938d91787166813f575cf05ee55bee0909d57bb7de1829,2024-11-19T19:35:14.833000 CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 -CVE-2024-50647,0,0,2f1b25461563552e982e44a8122ac67b8e909c8006bcf9d6b08017cda35c871b,2024-11-18T17:11:56.587000 -CVE-2024-50648,0,0,8d88e1a56eec66687b18c12dd639177f29571163e2e04fe20c5aaa77060d8cf9,2024-11-18T17:11:56.587000 -CVE-2024-50649,0,0,30f98c934ecd40b39fb07714211655ed46ad00ddd9fab5b075877284c12cdf85,2024-11-18T17:11:56.587000 +CVE-2024-50647,0,1,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000 +CVE-2024-50648,0,1,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000 +CVE-2024-50649,0,1,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 -CVE-2024-50650,0,0,79073e45a142b2e7e0b1ffcbc4f3efa33ba6c864e47e5edadaac92d5aa2c4220,2024-11-18T17:11:56.587000 +CVE-2024-50650,0,1,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000 CVE-2024-50651,0,0,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000 CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000 CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000 @@ -266663,7 +266677,7 @@ CVE-2024-50672,0,0,85b0d6db9be373a6fa69359f08bb412793e42f226dea70f6b5078fe3734ab CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000 -CVE-2024-50724,0,0,ec9e73171eb7b496abcb9bb028dd6b1c4fa67552f12252509bd5040345a8bc1c,2024-11-18T17:11:56.587000 +CVE-2024-50724,0,1,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000 CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000 CVE-2024-5074,0,0,323ff3e4be9a1a01795a645c087210e0124e3c1100808fef1bff4cc986dff48b,2024-08-01T13:59:39.780000 CVE-2024-5075,0,0,3a68f5400be3fd65933ca2b54d2fe1b2cd42ebfc5586417b08ab71b3ebef46c2,2024-08-01T13:59:39.960000 @@ -266828,7 +266842,7 @@ CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d7 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-51162,0,0,659179ac55d508d31c34cd8742c699a4dc94023e77b3f77dfac64c460e25f9e9,2024-11-22T17:15:09.353000 CVE-2024-51163,0,0,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000 -CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000 +CVE-2024-51164,0,1,0c621a3e87a6b805f06b17b773059d9ce7e6f4ff79284caa4397b3c188a41c46,2024-12-03T17:15:11.970000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 @@ -267672,6 +267686,11 @@ CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004 CVE-2024-52532,0,0,82ab4898c82b79d45f58347a35d13014aa77e1fd942e3edcc771ee91b2c6c3ad,2024-11-12T19:35:16.970000 CVE-2024-52533,0,0,586390a868afdd1378ad560eae2002ee4f7e9b9edb1cd1a36b6cd6c49ba102a3,2024-11-23T21:15:15.090000 CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 +CVE-2024-52544,1,1,5a53565160e1063004f0c127eaf6ac40d72cf320f922da3bf32efa9d52ac2252,2024-12-03T18:15:15.327000 +CVE-2024-52545,1,1,256b559498f8d83c8aee5a385d829f73d16105296a9f31506feb36d04fbb3f13,2024-12-03T18:15:15.543000 +CVE-2024-52546,1,1,9dac37e30df5646bd612d864767ab0de309bc6d3f480e59fe22e9eb483142676,2024-12-03T18:15:15.710000 +CVE-2024-52547,1,1,65d15fe4046ff20946693d0c0c0f998b9be4860bbb57d9efc8d6356c8e05fae4,2024-12-03T18:15:15.860000 +CVE-2024-52548,1,1,12379df36a9342eca7a92528323b279eb4a40deddd1fc96bfe4d53c029091310,2024-12-03T18:15:16.023000 CVE-2024-52549,0,0,fd75f7ddf331713d4d68d280968ebe1a7937bdcd0767d23dbc768a0c6cf66c13,2024-11-15T14:00:09.720000 CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 CVE-2024-52550,0,0,d8f06959647c1a8a773b0bb8df4d1605e4b27f79e88378297551535794b69575,2024-11-26T15:15:34.650000 @@ -267727,11 +267746,11 @@ CVE-2024-52711,0,0,25e806d2babc20691476aabfcc4918f38a4f803e2dadea4a566e728ec69d7 CVE-2024-52714,0,0,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476af1a,2024-11-20T20:35:15.260000 CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000 CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0194,2024-11-22T16:15:33.983000 -CVE-2024-52724,0,1,1b9a842f88051cd2a156be0c29e93a887efef468c9086a38490e71ae06d82307,2024-12-03T15:15:10.943000 +CVE-2024-52724,0,0,1b9a842f88051cd2a156be0c29e93a887efef468c9086a38490e71ae06d82307,2024-12-03T15:15:10.943000 CVE-2024-52725,0,0,ca83ad92f53ba791b675728b41a882f6bce2ad034a322e498ad5b1a0459b09dd,2024-12-02T21:15:10.977000 CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000 CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000 -CVE-2024-52732,0,1,4ca154eb1f5fd81030336111a38008c8fe0f668bf712f5a43c85e6f662721089,2024-12-03T16:15:23.540000 +CVE-2024-52732,0,0,4ca154eb1f5fd81030336111a38008c8fe0f668bf712f5a43c85e6f662721089,2024-12-03T16:15:23.540000 CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000 CVE-2024-5274,0,0,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000 CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000 @@ -267765,12 +267784,14 @@ CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176 CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000 CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000 CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000 +CVE-2024-52805,1,1,2c180cb2569a25ba3c710e2429c5941010e859787110cb1a06546b4e6370c033,2024-12-03T17:15:12.120000 CVE-2024-52806,0,0,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000 CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000 CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000 CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000 CVE-2024-52811,0,0,d732a17bde6f16ede8be31f96ee410aad0e3e114ed23b65cb7e34c8157552b5c,2024-11-25T19:15:11.567000 CVE-2024-52814,0,0,05155b182462de438f0b1b6215658fb7f90ef7f2af8e5a0e3c447f1976037015,2024-11-22T16:15:34.553000 +CVE-2024-52815,1,1,f9e6346133e60160d82630df539be5043ab29ccdc85090b3f37dd4cb982def52,2024-12-03T17:15:12.267000 CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000 CVE-2024-5283,0,0,b38d3b6d84c245f47c02c6b1221c64126cc1590c1b6b303a3d39721ab1dfca67,2024-08-01T13:59:43.747000 CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7e5,2024-08-01T13:59:43.927000 @@ -267918,7 +267939,7 @@ CVE-2024-5325,0,0,3161b31796f943a80af27275e8f23d08c58d4d31d567c9aa76aee11dec3e80 CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b65eb,2024-11-22T20:15:09.210000 CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000 CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000 -CVE-2024-53257,1,1,eae1aa4a1d7df1cd5d0e2ab98e730ae55122d465b4457dbe2bf329490028ee7a,2024-12-03T16:15:23.693000 +CVE-2024-53257,0,0,eae1aa4a1d7df1cd5d0e2ab98e730ae55122d465b4457dbe2bf329490028ee7a,2024-12-03T16:15:23.693000 CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000 CVE-2024-53259,0,0,b56d791ed8a3934da53ca3b2bc8d09134e7671697306e7cd36424993380151b4,2024-12-02T17:15:12.767000 CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000 @@ -267951,7 +267972,7 @@ CVE-2024-5341,0,0,40f4ad179dcb36606de702fcfb61368c761e9a979db8ddd9beb5e39827e7a7 CVE-2024-5342,0,0,b9462ea77ffff29ff50fcb5529de81f4f86998607e3428d3f0d5025aaca0f233,2024-11-01T14:27:11.580000 CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000 CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000 -CVE-2024-53429,1,1,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000 +CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000 CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b44,2024-06-20T12:44:01.637000 CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000 CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000 @@ -267961,7 +267982,7 @@ CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3aff CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000 CVE-2024-53477,0,0,753aaf8c684bb995d983939a69c12192942ed2e573e55f2d4f5233aa6560b86c,2024-12-02T21:15:11.217000 CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000 -CVE-2024-53484,0,1,c9442618db175b392539d76a1a9674a888dcbfcc13582e8461a2dd3982136eb4,2024-12-03T16:15:23.980000 +CVE-2024-53484,0,0,c9442618db175b392539d76a1a9674a888dcbfcc13582e8461a2dd3982136eb4,2024-12-03T16:15:23.980000 CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000 CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000 CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000 @@ -267977,7 +267998,7 @@ CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8 CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000 CVE-2024-53556,0,0,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000 -CVE-2024-53564,0,1,7d70e5f55e37762a76b108e6a64b73672727dd5c5512814b5c83672ff9b30cce,2024-12-03T15:15:11.373000 +CVE-2024-53564,0,0,7d70e5f55e37762a76b108e6a64b73672727dd5c5512814b5c83672ff9b30cce,2024-12-03T15:15:11.373000 CVE-2024-53566,0,0,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000 CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000 CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000 @@ -268116,14 +268137,16 @@ CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a4 CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000 CVE-2024-53861,0,0,c906a7c9ad7960370bb443153ada29d340a316d0e26a761ec82eb161aaf6e2d4,2024-12-02T19:15:12.150000 CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000 +CVE-2024-53863,1,1,5a92bc2de00c8e9b6f5e801f02c7d9dfc0d6ec9d1318faae277b529e90d877bc,2024-12-03T17:15:12.633000 CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000 CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000 +CVE-2024-53867,1,1,c12e14351b69d77e6eb8154ca10a6dc95900030fcd5c52428ccf6df2971ed00a,2024-12-03T17:15:12.787000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000 CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000 CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada266a,2024-11-26T18:23:09.517000 CVE-2024-5390,0,0,577e03013c579fd5ea5c07b95a092cd4d32be3fa4130d25da9e61ffe468007ab,2024-06-04T19:21:08.020000 -CVE-2024-53900,0,1,c3a93f9dd28bd52f63bcce9aaf81fca10f963a4c7edccd38d582c67ac6799f5e,2024-12-03T16:15:24.113000 +CVE-2024-53900,0,0,c3a93f9dd28bd52f63bcce9aaf81fca10f963a4c7edccd38d582c67ac6799f5e,2024-12-03T16:15:24.113000 CVE-2024-53901,0,0,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000 CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000 CVE-2024-5391,0,0,a7c29f93c1b76aed47351138468a6c5b251b9f9a4ad39cf688118719a36ed1c7,2024-06-07T20:15:12.687000 @@ -268163,9 +268186,9 @@ CVE-2024-53989,0,0,0358cc647ddace41a4dfeb86c3aca5be8a1a57964a4ee04c89fd93a56be38 CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000 CVE-2024-53990,0,0,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000 CVE-2024-53992,0,0,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000 -CVE-2024-53999,1,1,80e3192c64b986a2c82f7cb85ff5081bb2235e4dec0ec9c5a1f5324ae09e812c,2024-12-03T16:15:24.250000 +CVE-2024-53999,0,0,80e3192c64b986a2c82f7cb85ff5081bb2235e4dec0ec9c5a1f5324ae09e812c,2024-12-03T16:15:24.250000 CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000 -CVE-2024-54000,1,1,79bf0fc3308433671fec9e277259b5b3b941c6e3097b99968c0a0fe0b45a16f5,2024-12-03T16:15:24.380000 +CVE-2024-54000,0,0,79bf0fc3308433671fec9e277259b5b3b941c6e3097b99968c0a0fe0b45a16f5,2024-12-03T16:15:24.380000 CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000 CVE-2024-54004,0,0,4b55764e78df7d1fab73ac81a29fd36001f40116e182b6aab547372d06b234b5,2024-11-27T19:15:33.723000 CVE-2024-5402,0,0,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000 @@ -268184,7 +268207,7 @@ CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb469 CVE-2024-5413,0,0,b448c8c4fee794a9903e33e6c17f07ddeb3dd7c0bc677024b75809ef047d2c8a,2024-05-28T14:59:09.827000 CVE-2024-5414,0,0,08acc305e6c9bea4a9589fa3dba157ea62649fb0f8c0ee74aad6ddc09386f1c2,2024-05-28T14:59:09.827000 CVE-2024-5415,0,0,d8ba178a70f3cfb2a3911a07d12ef045cc2ca261b5b8d85db5edc9c9636eef1e,2024-05-28T14:59:09.827000 -CVE-2024-54159,0,1,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 +CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-5416,0,0,e60ac21c549a64885b0e4526eea23fa8e926aaead7cfc8773dbbebbe7c033943,2024-09-26T14:37:59.290000 CVE-2024-5417,0,0,7aeebeb967db19ec82014e996b2aa573677c8d8d73e22110a17d0cf5ea677289,2024-10-07T15:44:01.830000 CVE-2024-5418,0,0,a687af8fa8fe7200b6255f9fba7bdce69460001467d8b2873093024e735e15d4,2024-05-31T13:01:46.727000 @@ -271051,7 +271074,7 @@ CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0 CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000 CVE-2024-8772,0,0,69fe2194f6f1a272b95a9dfa955e0defecb0d89f2fa80479731934d1afc5a40a,2024-11-26T08:15:08.033000 -CVE-2024-8775,0,0,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000 +CVE-2024-8775,0,1,7e08fdaca60bc5d319df0cb13012d16188e623f635de9956a7703298c9a96510,2024-12-03T17:15:14.090000 CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000 CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000 CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000 @@ -271734,7 +271757,7 @@ CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae0 CVE-2024-9680,0,0,b270ebb58405bce82b545a9823e949fa4790116b7a4834e574606834227d9216,2024-11-26T19:53:56.537000 CVE-2024-9681,0,0,8b924b450d4a6dbb27601fbb04f08d88c9285a0a1a67208f21518dfaaa0a72ba,2024-11-25T19:52:56.417000 CVE-2024-9682,0,0,2122d85927443e1998d90f1dfaf0e30f87a59df9f9140f4f34d3cb7460150d67,2024-11-19T15:47:07.517000 -CVE-2024-9683,0,1,e0cd26df0500a0cc9db7c9689d39531f945e069407d58ce00900c54b93d56ed1,2024-12-03T16:14:52.690000 +CVE-2024-9683,0,0,e0cd26df0500a0cc9db7c9689d39531f945e069407d58ce00900c54b93d56ed1,2024-12-03T16:14:52.690000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 @@ -271904,7 +271927,7 @@ CVE-2024-9896,0,0,1349378c85078664635cddd4e92f21938b789e5f2486c02fbf3dda2655343b CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000 CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000 -CVE-2024-9902,0,0,716e3717dcf9b01937caa12d1dbc8ab4ac14ab0e5c6cf818e315231bd96bdc15,2024-11-24T23:15:04.537000 +CVE-2024-9902,0,1,d3514a8252b29f452d3c2fe4a2caa5732203637cca78cbe2e8452f1b90440a5a,2024-12-03T17:15:14.390000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000 CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000