diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json index 6606b5d51d1..1ca64cc46ea 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20885.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20885", "sourceIdentifier": "security@vmware.com", "published": "2023-06-16T13:15:09.463", - "lastModified": "2024-11-21T07:41:45.173", + "lastModified": "2024-12-16T20:15:06.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25176.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25176.json index c9ac59db7b0..81ee4bf39a7 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25176.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25176.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25176", "sourceIdentifier": "scy@openharmony.io", "published": "2024-03-04T07:15:06.387", - "lastModified": "2024-11-21T07:49:15.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:50:09.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32435.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32435.json index 2d1b46c7a50..988bda772a9 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32435.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32435.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32435", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.767", - "lastModified": "2024-11-21T08:03:20.847", + "lastModified": "2024-12-16T20:15:06.797", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34800.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34800.json index 05c7ae979b2..deacb033deb 100644 --- a/CVE-2023/CVE-2023-348xx/CVE-2023-34800.json +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34800.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34800", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-15T21:15:09.677", - "lastModified": "2024-11-21T08:07:35.357", + "lastModified": "2024-12-16T20:15:07.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38367.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38367.json index 3db783c7b0e..4c138a8bdde 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38367.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38367.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38367", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-29T02:15:09.120", - "lastModified": "2024-11-21T08:13:25.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:28:58.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,426 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5D419EF8-4D41-4FBE-A41B-9F9EAF7F72EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C27956AA-CCEE-4073-A8D7-D1B9575EE25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "12A70646-ADD3-4CF7-A591-8BE96FBEF5A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DF6CB2C4-800F-487A-B0E5-8A0A9718549D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D52711AA-0F11-47E7-8EE8-6B8D65403F8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2C6F84-C83F-4AE1-B0A7-740568F52C04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8A641D-B7AB-41FA-AFDB-2C8EBDA6A1A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "250AC4D5-1D25-4EEE-B1CA-AA8E104BBF7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5B7FA4-A27C-40CA-AA53-183909D18C13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "AF7E2601-47E6-4111-9DE0-C3C01705884A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "AECC2FB4-0D29-45DB-AB55-B6C6C6A8BB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "B8F5E495-92A5-419D-884B-C82D6AA5B56B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "508939AF-58FC-4E12-B4E2-B11865B603F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "C5B419DE-4597-4A33-861D-5530BDA9E679" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "00EE653A-0EAD-489B-9610-6BEE3295AAEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "06B644E7-7EB2-4AB6-9D30-EA0602373FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "838846CB-8436-40D1-9C3B-FBA2426351E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "BA799229-3577-409F-BFCC-0ABA541EA710" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "5EB47B7D-C408-4ED1-9D98-8BF77FFEF8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_0012:*:*:*:*:*:*", + "matchCriteriaId": "02D22CC4-3541-4BAA-8B45-FEB41F2E1697" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "E8859A71-36FD-4E83-B8C6-BEEF772AB084" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "AAEF9352-EDCB-4D16-B3F9-11962D3E9F50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "F5C8892F-A803-4E3F-8992-5011B2E73C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "4890680E-8D82-46DB-9346-3C26D8C9F7A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "4F11DDE3-29C4-4CC4-AF73-DF7CCC73D5FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "358590C1-6CAF-4FA7-9975-C9DD41242B1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_008:*:*:*:*:*:*", + "matchCriteriaId": "9C2A88F1-55B3-43A9-8051-71C467A6712F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_009:*:*:*:*:*:*", + "matchCriteriaId": "E06C0789-2CC4-4D57-87D0-C0FAB9DB1B7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_010:*:*:*:*:*:*", + "matchCriteriaId": "3B207F2D-B5F2-4B0C-863A-AD1620633A23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_011:*:*:*:*:*:*", + "matchCriteriaId": "5E3468FC-CB4C-4EFE-A1ED-46F780ABB703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:interim_fix_012:*:*:*:*:*:*", + "matchCriteriaId": "D26A78C9-525C-43B3-88FF-9A6AC62A6C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*", + "matchCriteriaId": "A8D6EB68-3804-494D-B12A-2E96E31D1B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "21D8DE68-5651-4068-B978-79B28F2DC5D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "BBEA972A-A41E-44C9-8D35-1A991D3384B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "D3009F4E-7157-43D3-B6A0-2531CDE619BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "1DA97C23-9B80-4956-9873-317902A0D804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "1D0B6203-C775-4C5E-BAE9-C956E718F261" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "257A7A17-7EDF-4E23-88A6-216BC29EC467" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_007:*:*:*:*:*:*", + "matchCriteriaId": "26FF217B-1BD4-46E5-8023-2B2989FF7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_008:*:*:*:*:*:*", + "matchCriteriaId": "C60E58EA-C4D5-4D4D-8C9B-3EC33A7027E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_009:*:*:*:*:*:*", + "matchCriteriaId": "7817670E-5649-42A9-B5F9-7586D7AEB4CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_010:*:*:*:*:*:*", + "matchCriteriaId": "FC7F85E8-8185-418A-B25F-8E64A58177DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_011:*:*:*:*:*:*", + "matchCriteriaId": "37616DCD-C26C-44EA-AA7F-732DC128FFE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_012:*:*:*:*:*:*", + "matchCriteriaId": "26CAC076-6FED-49E2-BF33-230F1D1195F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_013:*:*:*:*:*:*", + "matchCriteriaId": "5A88C56C-22CC-4791-BB33-C1494E7F41EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_014:*:*:*:*:*:*", + "matchCriteriaId": "12652B2E-307E-4568-920B-A869914ED650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_015:*:*:*:*:*:*", + "matchCriteriaId": "8F4E242F-BDF4-4CFE-B808-4A4B7A6FAD0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_016:*:*:*:*:*:*", + "matchCriteriaId": "88E736CF-CA6E-400B-9AE3-2C58D2265752" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_017:*:*:*:*:*:*", + "matchCriteriaId": "02488B2F-8D6E-4BDC-8DA9-45F5EBC42049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_018:*:*:*:*:*:*", + "matchCriteriaId": "854F4AF8-B712-446E-9DE1-A2496D5E9C1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_019:*:*:*:*:*:*", + "matchCriteriaId": "CF3F1B62-089B-41ED-AD3E-F31F8E967F18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_020:*:*:*:*:*:*", + "matchCriteriaId": "ABB843C3-F26D-43A5-AD3E-9D30D00339D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_021:*:*:*:*:*:*", + "matchCriteriaId": "42A67A28-CBF1-4C37-A217-F4789ED1850E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_022:*:*:*:*:*:*", + "matchCriteriaId": "BFEF1033-B100-400A-9B2B-94AEE3A7B94A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "F22E2017-86A6-4CD1-8192-7A5DF0A1D818" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "31BC7CBD-C728-481C-AC5F-110FD7799B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "49793CE0-A419-4937-89B4-B6A8F0E22C0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "E7ABFE27-D890-4AF4-8686-296F4DB90F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "BE746B2B-EECA-4332-9A24-8EF23BDA1B52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "CEE539C9-6AF2-4B02-8916-2AC7D4A93C2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "72743164-5279-4FB6-86EE-EBE5B8CD6D1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "517C5EDE-5104-4E22-B9C6-64DFBA7650C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_001:*:*:*:*:*:*", + "matchCriteriaId": "7A81368D-744B-4886-96C7-1755A27C0AAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_002:*:*:*:*:*:*", + "matchCriteriaId": "5B823170-57D5-4329-B41A-6C347982E00B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_003:*:*:*:*:*:*", + "matchCriteriaId": "AAE375C3-E995-415F-A349-A45998764910" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_004:*:*:*:*:*:*", + "matchCriteriaId": "A402E881-759D-4B59-985D-4DDA49327147" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_005:*:*:*:*:*:*", + "matchCriteriaId": "939B5364-0CF8-480A-B15A-B1FD9D9560EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_006:*:*:*:*:*:*", + "matchCriteriaId": "9BD80442-5DB1-44AC-B4FC-6EDF4162586B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "684E6AB2-84C1-4700-B519-88D0C7D8D3CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261130", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7015271", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261130", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7015271", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40100.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40100.json index a1ae97202bc..595ed2d711d 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40100.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40100.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40100", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:07.743", - "lastModified": "2024-11-21T08:18:46.137", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:32:42.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/DnsResolver/+/8e1561fb603fdaec15798372f865fb1750537f4f", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/DnsResolver/+/8e1561fb603fdaec15798372f865fb1750537f4f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-11-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json index 01242accdc7..eb350ff0621 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40104.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40104", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.017", - "lastModified": "2024-11-21T08:18:46.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:33:26.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/system/ca-certificates/+/91204b9fdbd77b3f27f94b73868607b2dccbfdad", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/system/ca-certificates/+/91204b9fdbd77b3f27f94b73868607b2dccbfdad", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-11-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json index f264aa1ea19..31594872b19 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40109", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.260", - "lastModified": "2024-11-21T08:18:47.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:34:04.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/387d258cf10a30537fc48dc0e48d28071efa92e7", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/387d258cf10a30537fc48dc0e48d28071efa92e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2023-11-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json index 28e6a16d87a..0f4d331c542 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40476.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40476", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:20.303", - "lastModified": "2024-11-21T08:19:32.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-16T19:54:51.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.22.6", + "matchCriteriaId": "99462063-5988-4579-B0AA-4230CFF4680E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0008.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1458/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0008.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1458/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44429.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44429.json index c84443d6c08..0700ccfa5b3 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44429.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44429.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44429", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:57.630", - "lastModified": "2024-11-21T08:25:53.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-16T19:56:34.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,66 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.22.7", + "matchCriteriaId": "C924138A-8234-41CA-91AF-80B292722F23" + } + ] + } + ] } ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0009.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1648/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0009.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1648/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44446.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44446.json index 8594416458f..ea6b05f8902 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44446.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44446.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44446", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:00.713", - "lastModified": "2024-11-21T08:25:55.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-16T19:42:53.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,66 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.22.7", + "matchCriteriaId": "C924138A-8234-41CA-91AF-80B292722F23" + } + ] + } + ] } ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0010.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1647/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0010.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1647/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46646.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46646.json index c883323f146..4e71668489c 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46646.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46646.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46646", "sourceIdentifier": "product-cna@github.com", "published": "2023-12-21T21:15:08.620", - "lastModified": "2024-11-21T08:28:57.830", - "vulnStatus": "Modified", + "lastModified": "2024-12-16T19:07:42.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -92,8 +92,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.7.0", - "versionEndExcluding": "3.17.19", - "matchCriteriaId": "572EEE88-8375-4D67-8C20-811438C3A34A" + "versionEndExcluding": "3.7.19", + "matchCriteriaId": "9C219467-E463-4C59-AAD7-8BECDA8AA1AE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46708.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46708.json index a1d7aaecdec..05268bf4dad 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46708.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46708.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46708", "sourceIdentifier": "scy@openharmony.io", "published": "2024-03-04T07:15:08.100", - "lastModified": "2024-11-21T08:29:07.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:58:19.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48650.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48650.json index 4c52d1af656..8d1d466d85e 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48650.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48650.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48650", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:41:34.060", - "lastModified": "2024-11-21T08:32:11.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:12:48.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,95 @@ "value": "Concrete CMS anterior a 8.5.14 y 9 anterior a 9.2.3 es vulnerable a que un administrador agregue un payload XSS almacenado a trav\u00e9s del nombre del dise\u00f1o preestablecido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.14", + "matchCriteriaId": "B946D2CF-80FD-40A1-B7E8-954EF6A0188C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.3", + "matchCriteriaId": "E6C25BB2-F22B-45E2-A1A5-2D16713E2A69" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48651.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48651.json index 32a2ebc46c3..fde8ede26ed 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48651.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48651.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48651", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:41:34.107", - "lastModified": "2024-11-21T08:32:11.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:12:28.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,89 @@ "value": "Concrete CMS 9 anterior a 9.2.3 es vulnerable a la Cross-Site Request Forgery (CSRF) en /ccm/system/dialogs/file/delete/1/submit." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.3", + "matchCriteriaId": "E6C25BB2-F22B-45E2-A1A5-2D16713E2A69" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48653.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48653.json index 2641ddd171e..b9cade2a309 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48653.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48653.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48653", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:41:34.160", - "lastModified": "2024-11-21T08:32:11.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:11:44.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,95 @@ "value": "Concrete CMS anterior a 8.5.14 y 9 anterior a 9.2.3 permite la Cross-Site Request Forgery (CSRF) a trav\u00e9s de ccm/calendar/dialogs/event/delete/submit. Un atacante puede obligar a un administrador a eliminar eventos en el sitio porque el ID del evento es num\u00e9rico y secuencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.14", + "matchCriteriaId": "B946D2CF-80FD-40A1-B7E8-954EF6A0188C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.3", + "matchCriteriaId": "E6C25BB2-F22B-45E2-A1A5-2D16713E2A69" + } + ] + } + ] + } + ], "references": [ { "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49337.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49337.json index 6fb39cf151e..d708113c711 100644 --- a/CVE-2023/CVE-2023-493xx/CVE-2023-49337.json +++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49337.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49337", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:41:37.560", - "lastModified": "2024-11-21T08:33:15.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:11:00.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,102 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.3", + "matchCriteriaId": "E6C25BB2-F22B-45E2-A1A5-2D16713E2A69" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/concretecms/concretecms/commit/07b433799b888c4eb854e052ca58b032ebc6d36f", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://hackerone.com/reports/2232594", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/concretecms/concretecms/commit/07b433799b888c4eb854e052ca58b032ebc6d36f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://hackerone.com/reports/2232594", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49602.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49602.json index 11e2f26f83e..20f72ec348f 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49602.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49602.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49602", "sourceIdentifier": "scy@openharmony.io", "published": "2024-03-04T07:15:08.780", - "lastModified": "2024-11-21T08:33:37.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:59:21.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -53,16 +73,53 @@ "value": "CWE-843" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50186.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50186.json index 2d8ba595bb0..5610b274fc3 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50186.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50186.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50186", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:16:02.480", - "lastModified": "2024-11-21T08:36:37.123", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-16T20:26:46.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,64 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.22.8", + "matchCriteriaId": "47CE87C3-ACD4-4A8E-808F-0DB5EB85A3B5" + } + ] + } + ] } ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0011.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-368/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0011.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-368/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51379.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51379.json index 00f91cfe9de..c3461c9fff2 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51379.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51379.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51379", "sourceIdentifier": "product-cna@github.com", "published": "2023-12-21T21:15:13.480", - "lastModified": "2024-11-21T08:37:59.450", - "vulnStatus": "Modified", + "lastModified": "2024-12-16T19:07:10.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -92,8 +92,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.7.0", - "versionEndExcluding": "3.17.19", - "matchCriteriaId": "572EEE88-8375-4D67-8C20-811438C3A34A" + "versionEndExcluding": "3.7.19", + "matchCriteriaId": "9C219467-E463-4C59-AAD7-8BECDA8AA1AE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51380.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51380.json index 4b17a7a7da0..27c9fa1012d 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51380.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51380.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51380", "sourceIdentifier": "product-cna@github.com", "published": "2023-12-21T21:15:13.757", - "lastModified": "2024-11-21T08:37:59.610", - "vulnStatus": "Modified", + "lastModified": "2024-12-16T19:07:20.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -92,8 +92,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.7.0", - "versionEndExcluding": "3.17.19", - "matchCriteriaId": "572EEE88-8375-4D67-8C20-811438C3A34A" + "versionEndExcluding": "3.7.19", + "matchCriteriaId": "9C219467-E463-4C59-AAD7-8BECDA8AA1AE" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51800.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51800.json index cfdeac2b08e..a3b22db4566 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51800.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51800.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51800", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T02:15:09.280", - "lastModified": "2024-11-21T08:38:50.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:25:56.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:school_fees_management_system_project:school_fees_management_system1.0:*:*:*:*:*:*:*:*", + "matchCriteriaId": "16699410-5E96-432F-87D1-81F83380FA5F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-51800", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-51800", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json index ea67ba86bc4..b785ceed17e 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51801", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T02:15:09.323", - "lastModified": "2024-11-21T08:38:51.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:26:10.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0907D49A-D649-42A3-BE96-A1EB234C6859" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-51801", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-51801", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51802.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51802.json index 79af5700301..0a0f000ae8b 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51802.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51802.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51802", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T02:15:09.367", - "lastModified": "2024-11-21T08:38:51.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:24:55.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0907D49A-D649-42A3-BE96-A1EB234C6859" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-51802", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/geraldoalcantara/CVE-2023-51802", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6746.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6746.json index f2a7e47e705..79df70f9df7 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6746.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6746.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6746", "sourceIdentifier": "product-cna@github.com", "published": "2023-12-21T21:15:14.303", - "lastModified": "2024-11-21T08:44:28.377", - "vulnStatus": "Modified", + "lastModified": "2024-12-16T19:07:48.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -92,8 +92,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", "versionStartIncluding": "3.7.0", - "versionEndExcluding": "3.17.19", - "matchCriteriaId": "572EEE88-8375-4D67-8C20-811438C3A34A" + "versionEndExcluding": "3.7.19", + "matchCriteriaId": "9C219467-E463-4C59-AAD7-8BECDA8AA1AE" }, { "vulnerable": true, diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0018.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0018.json index d1a5ad0f9ef..c2a100f5ce2 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0018.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0018.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0018", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.560", - "lastModified": "2024-11-21T08:45:42.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:00:35.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/bf6406041919f67219fd1829438dda28845d4c23", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/av/+/bf6406041919f67219fd1829438dda28845d4c23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-01-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0030.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0030.json index f03eaa47560..526deab2a8f 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0030.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0030.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0030", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:50.710", - "lastModified": "2024-11-21T08:45:44.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:29:58.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/57b823f4f758e2ef530909da07552b5aa80c6a7d", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/57b823f4f758e2ef530909da07552b5aa80c6a7d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json index b9c038c01f2..92802c3581f 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0031.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0031", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:50.763", - "lastModified": "2024-11-21T08:45:44.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:30:26.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/de53890aaca2ae08b3ee2d6e3fd25f702fdfa661", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/de53890aaca2ae08b3ee2d6e3fd25f702fdfa661", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0033.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0033.json index 6fbc86d0efd..66a100cdfc0 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0033.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0033", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:50.877", - "lastModified": "2024-11-21T08:45:45.323", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:08:08.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/native/+/aa98edf0ce9dde4886979658a459900ca987f193", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/system/core/+/46d46dc46446f14f26fbe8fb102dd36c1dfc1229", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/native/+/aa98edf0ce9dde4886979658a459900ca987f193", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/system/core/+/46d46dc46446f14f26fbe8fb102dd36c1dfc1229", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json index 950bac3d340..c1ac4eab6c2 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0038", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:51.157", - "lastModified": "2024-11-21T08:45:46.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:02:43.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/3e88d987235f5a2acd50a9b6bad78dbbf39cb079", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/3e88d987235f5a2acd50a9b6bad78dbbf39cb079", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json index e6daa54e257..c7b31e8f706 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0040", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:51.203", - "lastModified": "2024-11-21T08:45:46.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:16:31.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/2ca6c27dc0336fd98f47cfb96dc514efa98e8864", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/av/+/2ca6c27dc0336fd98f47cfb96dc514efa98e8864", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-02-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0046.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0046.json index 30372d16818..3544465c3ec 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0046.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0046.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0046", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.563", - "lastModified": "2024-11-21T08:45:47.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:50:16.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/d68cab5ac1aa294ec4d0419bc0803a5577e4e43c", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/d68cab5ac1aa294ec4d0419bc0803a5577e4e43c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0048.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0048.json index 73c69af76bb..93b0a2ef274 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0048.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0048.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0048", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.673", - "lastModified": "2024-11-21T08:45:47.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:47:07.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/2c236cde5505ee0e88cf1e3d073e2f1a53f0eede", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/2c236cde5505ee0e88cf1e3d073e2f1a53f0eede", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json index b7d3759bd57..66bcb8c4b6c 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0049", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.727", - "lastModified": "2024-11-21T08:45:48.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:45:40.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0050.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0050.json index 2ba7ce6b968..2e18accd4e2 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0050.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0050", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.783", - "lastModified": "2024-11-21T08:45:48.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:38:57.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/8f3bc8be16480367bac36effa25706133a0dc22d", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/av/+/8f3bc8be16480367bac36effa25706133a0dc22d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0051.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0051.json index 3b3eef32ab9..a6b03e63f2f 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0051.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0051.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0051", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.840", - "lastModified": "2024-11-21T08:45:48.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:32:07.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10678.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10678.json index ddfd928f05b..33301bcbe67 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10678.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10678.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10678", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-13T06:15:24.850", - "lastModified": "2024-12-13T06:15:24.850", + "lastModified": "2024-12-16T19:15:05.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,38 @@ "value": "El complemento Ultimate Blocks para WordPress anterior a la versi\u00f3n 3.2.4 no valida ni escapa algunas de sus opciones de bloque antes de mostrarlas nuevamente en una p\u00e1gina o publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques Cross-Site Scripting almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/9342c6a1-4f9a-45f3-911d-0dfee4657243/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/9342c6a1-4f9a-45f3-911d-0dfee4657243/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10939.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10939.json index 9e4d384c960..17983344eaa 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10939.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10939.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10939", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-13T06:15:25.120", - "lastModified": "2024-12-13T06:15:25.120", + "lastModified": "2024-12-16T19:15:06.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,38 @@ "value": "El complemento Image Widget de WordPress anterior a la versi\u00f3n 4.4.11 no desinfecta ni escapa de algunas de las configuraciones de su Image Widget, lo que podr\u00eda permitir que usuarios con privilegios elevados como el administrador realicen ataques Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/fcf50077-b360-4b63-bece-9806b4bc8bea/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/fcf50077-b360-4b63-bece-9806b4bc8bea/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12661.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12661.json new file mode 100644 index 00000000000..244d4715cd2 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12661.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-12661", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T19:15:06.847", + "lastModified": "2024-12-16T20:15:08.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been rated as problematic. Affected by this issue is the function 0x8001E024 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E024-NPD-DOS-15260437bb1e80f28c03f548645c8ec9", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288530", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288530", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.456338", + "source": "cna@vuldb.com" + }, + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E024-NPD-DOS-15260437bb1e80f28c03f548645c8ec9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12662.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12662.json new file mode 100644 index 00000000000..e9320d05bcf --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12662.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12662", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T19:15:07.027", + "lastModified": "2024-12-16T19:15:07.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in IObit Advanced SystemCare Utimate up to 17.0.0. This affects the function 0x8001E040 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", + "baseScore": 4.6, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E040-NPD-DOS-15260437bb1e804e86b4e1de92ff0d09", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288531", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288531", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.457163", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12663.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12663.json new file mode 100644 index 00000000000..40037339b19 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12663.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-12663", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T19:15:07.200", + "lastModified": "2024-12-16T20:15:08.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in funnyzpc Mee-Admin up to 1.6. This vulnerability affects unknown code of the file /mee/login of the component Login. The manipulation of the argument username leads to observable response discrepancy. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + }, + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/funnyzpc/mee-admin/issues/9", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288532", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288532", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.458371", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/funnyzpc/mee-admin/issues/9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12664.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12664.json new file mode 100644 index 00000000000..da575baa2ac --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12664.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12664", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T20:15:09.090", + "lastModified": "2024-12-16T20:15:09.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in ruifang-tech Rebuild 3.8.5. This issue affects some unknown processing of the component Project Task Comment Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/rebuild/StoredXSS-TaskComments.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288533", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288533", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.458622", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12665.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12665.json new file mode 100644 index 00000000000..f1a618086e4 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12665.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12665", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T20:15:09.260", + "lastModified": "2024-12-16T20:15:09.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in ruifang-tech Rebuild 3.8.5. Affected is an unknown function of the component Task Comment Attachment Upload. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/rebuild/StoredXSS-TaskCommentAttachments.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288534", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288534", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.458623", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12666.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12666.json new file mode 100644 index 00000000000..9e700f58331 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12666.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12666", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T20:15:09.430", + "lastModified": "2024-12-16T20:15:09.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in ClassCMS up to 4.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin?do=admin:user:editPost of the component User Management Page. The manipulation leads to improper handling of insufficient privileges. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-274" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Jack-Black-13/blob/blob/main/ClassCMS%20V4.8%20Vertical%20Privilege%20Escalation.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288535", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288535", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.461120", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12667.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12667.json new file mode 100644 index 00000000000..81809bd0d1c --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12667.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-12667", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-16T20:15:09.600", + "lastModified": "2024-12-16T20:15:09.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in InvoicePlane up to 1.6.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /invoices/view. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288536", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288536", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.449923", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12687.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12687.json new file mode 100644 index 00000000000..df8f68570c1 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12687.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-12687", + "sourceIdentifier": "5fea7123-217b-4b2d-ada8-8892719b43cd", + "published": "2024-12-16T20:15:09.777", + "lastModified": "2024-12-16T20:15:09.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in PlexTrac (Runbooks modules) which allows Object Injection and arbitrary file writes.\n\nThis issue affects PlexTrac: from 1.61.3 before 2.8.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "5fea7123-217b-4b2d-ada8-8892719b43cd", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Red", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "RED" + } + } + ] + }, + "weaknesses": [ + { + "source": "5fea7123-217b-4b2d-ada8-8892719b43cd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0", + "source": "5fea7123-217b-4b2d-ada8-8892719b43cd" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json index 6ee27ae6969..53ac78d9efd 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21144.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21144", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.810", - "lastModified": "2024-11-21T08:53:52.247", - "vulnStatus": "Modified", + "lastModified": "2024-12-16T20:13:40.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,33 +80,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:1.8.0:update411:*:*:-:*:*:*", - "matchCriteriaId": "0CBFE7F8-2C34-4A8B-8943-5720C841155B" + "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update411:*:*:-:*:*:*", + "matchCriteriaId": "B43C161D-E6DE-402A-831E-4F8BB9B75826" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", - "matchCriteriaId": "F3441A33-4B6A-4519-B9BC-85B4FD3EA1A0" + "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", + "matchCriteriaId": "54DCB9FD-A3FB-4901-A13F-9064921C77C2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:11.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "60E1FB80-1E78-4B8B-B06A-241CE47A2FAB" + "criteria": "cpe:2.3:a:oracle:jdk:11.0.23:*:*:*:*:*:*:*", + "matchCriteriaId": "21F9B73E-696B-4F6B-A019-83A68179E422" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:1.8.0:update411:*:*:-:*:*:*", - "matchCriteriaId": "1F271E0A-1B19-4126-A34C-26FC2CA21D0D" + "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update411:*:*:-:*:*:*", + "matchCriteriaId": "9A51F12C-42D0-41BC-A9DB-F2934BA1384B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", - "matchCriteriaId": "A5426759-CA79-4B2D-8286-A9BA173EC998" + "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", + "matchCriteriaId": "F70BAD0D-1601-4C61-B6B2-1A1DBB48B067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:11.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "7E21DF85-DA91-484B-80C0-0DCFEDD57727" + "criteria": "cpe:2.3:a:oracle:jre:11.0.23:*:*:*:*:*:*:*", + "matchCriteriaId": "49A5200E-E144-4C02-BAAB-8EAF734EEC5F" } ] } diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json index 5af6bb71903..a91ada72548 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21145.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21145", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.993", - "lastModified": "2024-11-21T08:53:52.387", - "vulnStatus": "Modified", + "lastModified": "2024-12-16T20:13:37.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -120,63 +120,63 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:1.8.0:update411:*:*:-:*:*:*", - "matchCriteriaId": "0CBFE7F8-2C34-4A8B-8943-5720C841155B" + "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update411:*:*:-:*:*:*", + "matchCriteriaId": "B43C161D-E6DE-402A-831E-4F8BB9B75826" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", - "matchCriteriaId": "F3441A33-4B6A-4519-B9BC-85B4FD3EA1A0" + "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", + "matchCriteriaId": "54DCB9FD-A3FB-4901-A13F-9064921C77C2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:11.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "60E1FB80-1E78-4B8B-B06A-241CE47A2FAB" + "criteria": "cpe:2.3:a:oracle:jdk:11.0.23:*:*:*:*:*:*:*", + "matchCriteriaId": "21F9B73E-696B-4F6B-A019-83A68179E422" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:17.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "317C563B-D4F6-4C38-A3D0-2815291AD5F8" + "criteria": "cpe:2.3:a:oracle:jdk:17.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "C52598F8-1859-4007-ABEE-03A463482F4A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:21.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "BCE37231-1FAC-4BE4-BAC3-0937525B8F38" + "criteria": "cpe:2.3:a:oracle:jdk:21.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "62AE87F9-A4B3-4163-9A19-3E606CF72720" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jdk:22.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "08FC2228-C735-4F02-B630-C422A0F8D1F8" + "criteria": "cpe:2.3:a:oracle:jdk:22.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3AD2D0EA-694D-4629-A1F7-244C9B154248" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:1.8.0:update411:*:*:-:*:*:*", - "matchCriteriaId": "1F271E0A-1B19-4126-A34C-26FC2CA21D0D" + "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update411:*:*:-:*:*:*", + "matchCriteriaId": "9A51F12C-42D0-41BC-A9DB-F2934BA1384B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", - "matchCriteriaId": "A5426759-CA79-4B2D-8286-A9BA173EC998" + "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update411:*:*:enterprise_performance_pack:*:*:*", + "matchCriteriaId": "F70BAD0D-1601-4C61-B6B2-1A1DBB48B067" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:11.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "7E21DF85-DA91-484B-80C0-0DCFEDD57727" + "criteria": "cpe:2.3:a:oracle:jre:11.0.23:*:*:*:*:*:*:*", + "matchCriteriaId": "49A5200E-E144-4C02-BAAB-8EAF734EEC5F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:17.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "935396EC-976B-4709-A943-7199C1E31588" + "criteria": "cpe:2.3:a:oracle:jre:17.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "47E6B664-D2ED-425F-B27B-3E57278B1C7E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:21.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "0EFFE042-24EE-49DE-952F-B7F702430772" + "criteria": "cpe:2.3:a:oracle:jre:21.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "06104137-B672-4AB8-AEB4-5AEE95D978FE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:oracle:java_jre:22.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "D31B0898-19FD-4662-BCF5-87058EFBFEAE" + "criteria": "cpe:2.3:a:oracle:jre:22.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F92B7DB4-7E5C-4961-8BB3-D3DF4A833E79" } ] } diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21816.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21816.json index db09e481119..74644ee0974 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21816.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21816", "sourceIdentifier": "scy@openharmony.io", "published": "2024-03-04T07:15:09.743", - "lastModified": "2024-11-21T08:55:03.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T20:03:26.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-281" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BCD533F2-0FE4-466C-8928-693658838C2A" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21826.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21826.json index 057f4249418..1a781fcaa50 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21826.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21826.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21826", "sourceIdentifier": "scy@openharmony.io", "published": "2024-03-04T07:15:10.380", - "lastModified": "2024-11-21T08:55:04.573", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T20:00:03.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-922" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-03.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2179.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2179.json index ed45f386d36..bda6bcc8dcf 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2179.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2179.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2179", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-03-05T21:15:09.100", - "lastModified": "2024-11-21T09:09:11.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:01:03.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.7", + "matchCriteriaId": "AB4D8CBD-8F23-40F9-BBF2-E6DE880D4500" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/927-release-notes", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/927-release-notes", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23717.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23717.json index cab8354a197..67873c48b48 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23717.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23717.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23717", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:46.253", - "lastModified": "2024-11-21T08:58:14.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:28:06.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json index 5f60cd11322..f88c93a6358 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27348.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27348", "sourceIdentifier": "security@apache.org", "published": "2024-04-22T14:15:07.420", - "lastModified": "2024-11-21T09:04:23.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T20:12:08.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -87,7 +87,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -101,32 +100,6 @@ "matchCriteriaId": "5DDD7AA3-3439-48D7-B24B-1D9D31B284BD" } ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:a:oracle:jdk:8:*:*:*:*:*:*:*", - "matchCriteriaId": "BDA29D0B-F022-4711-ABE9-4221E57FAF17" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:oracle:jdk:11:*:*:*:*:*:*:*", - "matchCriteriaId": "3CD5164A-75F9-46AC-A7D4-0323A4A2D915" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:oracle:jre:8:*:*:*:*:*:*:*", - "matchCriteriaId": "B4A9D4C2-98A6-43F0-A925-8A84AB3040AA" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:a:oracle:jre:11:*:*:*:*:*:*:*", - "matchCriteriaId": "1A5E4F97-F7D9-42CE-8A7A-902B4768C60F" - } - ] } ] } @@ -180,7 +153,11 @@ }, { "url": "https://www.vicarius.io/vsociety/posts/remote-code-execution-vulnerability-in-apache-hugegraph-server-cve-2024-27348", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27517.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27517.json index bef48114ed8..ca129615065 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27517.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27517.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27517", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-29T01:44:20.180", - "lastModified": "2024-11-21T09:04:41.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:26:43.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webasyst:webasyst:2.9.9:*:*:*:*:*:*:*", + "matchCriteriaId": "89182418-CDDF-40D0-B2FD-683C1AD2CDE5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/webasyst/webasyst-framework/issues/377", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/webasyst/webasyst-framework/issues/377", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2753.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2753.json index 3198bd8bf00..bdbc1f3d7e7 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2753.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2753.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2753", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-04-03T19:15:43.993", - "lastModified": "2024-11-21T09:10:26.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:01:58.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,24 +69,71 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.16", + "matchCriteriaId": "05017ACE-D194-4FCC-BA25-BB44B0B0949E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.8", + "matchCriteriaId": "C74ED818-CCEF-437A-9127-5C479F56D39F" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3178.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3178.json index 88cc606de94..dc19525dfc0 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3178.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3178.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3178", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-04-03T19:15:44.210", - "lastModified": "2024-11-21T09:29:05.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:02:56.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,24 +69,71 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.16", + "matchCriteriaId": "05017ACE-D194-4FCC-BA25-BB44B0B0949E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.8", + "matchCriteriaId": "C74ED818-CCEF-437A-9127-5C479F56D39F" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3179.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3179.json index 5fc4a83b2b8..71ce4e253d6 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3179.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3179.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3179", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-04-03T19:15:44.387", - "lastModified": "2024-11-21T09:29:05.370", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:03:45.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,24 +69,71 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.16", + "matchCriteriaId": "05017ACE-D194-4FCC-BA25-BB44B0B0949E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.8", + "matchCriteriaId": "C74ED818-CCEF-437A-9127-5C479F56D39F" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3180.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3180.json index bd0bb9951d9..d218ba4b3ef 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3180.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3180", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-04-03T19:15:44.560", - "lastModified": "2024-11-21T09:29:05.503", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:04:13.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,24 +69,71 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.16", + "matchCriteriaId": "05017ACE-D194-4FCC-BA25-BB44B0B0949E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.8", + "matchCriteriaId": "C74ED818-CCEF-437A-9127-5C479F56D39F" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3181.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3181.json index 1b897408639..1efeb08944f 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3181.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3181.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3181", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-04-03T20:15:07.077", - "lastModified": "2024-11-21T09:29:05.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:07:04.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,24 +69,71 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.16", + "matchCriteriaId": "05017ACE-D194-4FCC-BA25-BB44B0B0949E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.2.8", + "matchCriteriaId": "C74ED818-CCEF-437A-9127-5C479F56D39F" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/928-release-notes?_gl=1*1bcxp5s*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY2ODEuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8516-release-notes?_gl=1*1oa3zn1*_ga*MTc1NDc0Njk2Mi4xNzA2ODI4MDU1*_ga_HFB3HPNNLS*MTcxMjE2NjYyNi4xMy4xLjE3MTIxNjY3MDcuMC4wLjA.", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json index 8bf6ce493d8..67799a67646 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4353", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-08-01T19:15:52.313", - "lastModified": "2024-08-07T19:15:48.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:08:05.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -71,16 +93,51 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.3.3", + "matchCriteriaId": "22477475-FE69-4804-B73E-B3F268F16FE7" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/933-release-notes", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/concretecms/concretecms/pull/12151", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44248.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44248.json index 0a2b3e9a7c7..468de5ae1cc 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44248.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44248", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:24.280", - "lastModified": "2024-12-13T18:49:00.907", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T19:15:07.777", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44291.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44291.json index b4764c16c39..99066f33f97 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44291.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44291.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44291", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:24.433", - "lastModified": "2024-12-13T18:47:31.063", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T19:15:08.180", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47892.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47892.json index 3a295c83058..91483fdf49e 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47892.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47892.json @@ -2,16 +2,43 @@ "id": "CVE-2024-47892", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2024-12-13T18:15:20.773", - "lastModified": "2024-12-13T18:15:20.773", + "lastModified": "2024-12-16T19:15:08.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Software installed and run as a non-privileged user may conduct GPU system calls to read and write freed physical memory from the GPU." + }, + { + "lang": "es", + "value": "El software instalado y ejecutado como un usuario sin privilegios puede realizar llamadas al sistema de GPU para leer y escribir la memoria f\u00edsica liberada de la GPU." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54494.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54494.json index 341b34c7e82..871ab0d7a72 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54494.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54494", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:30.513", - "lastModified": "2024-12-13T18:31:39.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T19:15:08.730", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54498.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54498.json index 81747db47d8..98faa846763 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54498.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54498.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54498", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:30.683", - "lastModified": "2024-12-13T18:32:52.320", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T19:15:08.943", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54508.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54508.json index 41860e09804..234127e4552 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54508.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54508.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54508", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:31.393", - "lastModified": "2024-12-13T18:12:13.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T19:15:09.160", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54527.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54527.json index a96165aa963..1dd69032f5d 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54527.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54527", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:31.973", - "lastModified": "2024-12-13T17:47:26.727", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T19:15:09.313", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54528.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54528.json index 17febb6a7e8..b68018b62e0 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54528.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54528", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:32.063", - "lastModified": "2024-12-13T17:45:11.457", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-16T19:15:09.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55949.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55949.json new file mode 100644 index 00000000000..7a19103332f --- /dev/null +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55949.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2024-55949", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-16T20:15:13.683", + "lastModified": "2024-12-16T20:15:13.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MinIO is a high-performance, S3 compatible object store, open sourced under GNU AGPLv3 license. Minio is subject to a privilege escalation in IAM import API, all users are impacted since MinIO commit `580d9db85e04f1b63cc2909af50f0ed08afa965f`. This issue has been addressed in commit `f246c9053f9603e610d98439799bdd2a6b293427` which is included in RELEASE.2024-12-13T22-19-12Z. There are no workarounds possible, all users are advised to upgrade immediately." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/minio/minio/commit/580d9db85e04f1b63cc2909af50f0ed08afa965f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/minio/minio/commit/f246c9053f9603e610d98439799bdd2a6b293427", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/minio/minio/pull/20756", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/minio/minio/security/advisories/GHSA-cwq8-g58r-32hg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55951.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55951.json new file mode 100644 index 00000000000..d1148343c6f --- /dev/null +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55951.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-55951", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-16T20:15:13.823", + "lastModified": "2024-12-16T20:15:13.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Metabase is an open-source data analytics platform. For new sandboxing configurations created in 1.52.0 till 1.52.2.4, sandboxed users are able to see field filter values from other sandboxed users. This is fixed in 1.52.2.5. Users on 1.52.0 or 1.52.1 or 1.5.2 should upgrade to 1.52.2.5. There are no workarounds for this issue aside from upgrading." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://downloads.metabase.com/v0.52.2.5/metabase.jar", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metabase/metabase/security/advisories/GHSA-rhjf-q2qw-rvx3", + "source": "security-advisories@github.com" + }, + { + "url": "https://hub.docker.com/r/metabase/metabase/tags", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json index 93dc2778d8b..9ba376a8275 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8661", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-09-16T18:15:54.583", - "lastModified": "2024-09-25T16:15:11.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-16T19:08:45.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -71,24 +93,71 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.19", + "matchCriteriaId": "769A8B9B-EB8B-436C-AF90-98527AEB0128" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.3.4", + "matchCriteriaId": "0539836E-CF70-4B8E-9BE5-B8F0240B8EDB" + } + ] + } + ] } ], "references": [ { "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/934-release-notes", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://documentation.concretecms.org/developers/introduction/version-history/8519-release-notes", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/concretecms/concretecms/commit/ce5ee2ab83fe8de6fa012dd51c5a1dde05cb0dc4", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/concretecms/concretecms/pull/12204", - "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 39e920d801b..b1c642ed766 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-16T19:01:01.791812+00:00 +2024-12-16T21:00:25.686680+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-16T18:59:20.550000+00:00 +2024-12-16T20:26:46.057000+00:00 ``` ### Last Data Feed Release @@ -33,56 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274064 +274074 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `10` -- [CVE-2024-10095](CVE-2024/CVE-2024-100xx/CVE-2024-10095.json) (`2024-12-16T17:15:06.757`) -- [CVE-2024-11144](CVE-2024/CVE-2024-111xx/CVE-2024-11144.json) (`2024-12-16T17:15:07.327`) -- [CVE-2024-11358](CVE-2024/CVE-2024-113xx/CVE-2024-11358.json) (`2024-12-16T17:15:07.543`) -- [CVE-2024-12655](CVE-2024/CVE-2024-126xx/CVE-2024-12655.json) (`2024-12-16T17:15:09.147`) -- [CVE-2024-12656](CVE-2024/CVE-2024-126xx/CVE-2024-12656.json) (`2024-12-16T17:15:09.340`) -- [CVE-2024-12657](CVE-2024/CVE-2024-126xx/CVE-2024-12657.json) (`2024-12-16T17:15:09.520`) -- [CVE-2024-12658](CVE-2024/CVE-2024-126xx/CVE-2024-12658.json) (`2024-12-16T18:15:10.120`) -- [CVE-2024-12659](CVE-2024/CVE-2024-126xx/CVE-2024-12659.json) (`2024-12-16T18:15:10.320`) -- [CVE-2024-12660](CVE-2024/CVE-2024-126xx/CVE-2024-12660.json) (`2024-12-16T18:15:10.533`) -- [CVE-2024-4762](CVE-2024/CVE-2024-47xx/CVE-2024-4762.json) (`2024-12-16T17:15:10.293`) -- [CVE-2024-6001](CVE-2024/CVE-2024-60xx/CVE-2024-6001.json) (`2024-12-16T17:15:14.197`) -- [CVE-2024-6002](CVE-2024/CVE-2024-60xx/CVE-2024-6002.json) (`2024-12-16T18:15:12.450`) -- [CVE-2024-8058](CVE-2024/CVE-2024-80xx/CVE-2024-8058.json) (`2024-12-16T17:15:14.377`) +- [CVE-2024-12661](CVE-2024/CVE-2024-126xx/CVE-2024-12661.json) (`2024-12-16T19:15:06.847`) +- [CVE-2024-12662](CVE-2024/CVE-2024-126xx/CVE-2024-12662.json) (`2024-12-16T19:15:07.027`) +- [CVE-2024-12663](CVE-2024/CVE-2024-126xx/CVE-2024-12663.json) (`2024-12-16T19:15:07.200`) +- [CVE-2024-12664](CVE-2024/CVE-2024-126xx/CVE-2024-12664.json) (`2024-12-16T20:15:09.090`) +- [CVE-2024-12665](CVE-2024/CVE-2024-126xx/CVE-2024-12665.json) (`2024-12-16T20:15:09.260`) +- [CVE-2024-12666](CVE-2024/CVE-2024-126xx/CVE-2024-12666.json) (`2024-12-16T20:15:09.430`) +- [CVE-2024-12667](CVE-2024/CVE-2024-126xx/CVE-2024-12667.json) (`2024-12-16T20:15:09.600`) +- [CVE-2024-12687](CVE-2024/CVE-2024-126xx/CVE-2024-12687.json) (`2024-12-16T20:15:09.777`) +- [CVE-2024-55949](CVE-2024/CVE-2024-559xx/CVE-2024-55949.json) (`2024-12-16T20:15:13.683`) +- [CVE-2024-55951](CVE-2024/CVE-2024-559xx/CVE-2024-55951.json) (`2024-12-16T20:15:13.823`) ### CVEs modified in the last Commit -Recently modified CVEs: `24` - -- [CVE-2023-29476](CVE-2023/CVE-2023-294xx/CVE-2023-29476.json) (`2024-12-16T18:15:05.407`) -- [CVE-2024-0020](CVE-2024/CVE-2024-00xx/CVE-2024-0020.json) (`2024-12-16T18:59:20.550`) -- [CVE-2024-0021](CVE-2024/CVE-2024-00xx/CVE-2024-0021.json) (`2024-12-16T18:55:59.723`) -- [CVE-2024-0023](CVE-2024/CVE-2024-00xx/CVE-2024-0023.json) (`2024-12-16T18:52:54.037`) -- [CVE-2024-0032](CVE-2024/CVE-2024-00xx/CVE-2024-0032.json) (`2024-12-16T18:45:35.897`) -- [CVE-2024-11834](CVE-2024/CVE-2024-118xx/CVE-2024-11834.json) (`2024-12-16T18:15:08.243`) -- [CVE-2024-11841](CVE-2024/CVE-2024-118xx/CVE-2024-11841.json) (`2024-12-16T17:15:07.830`) -- [CVE-2024-12668](CVE-2024/CVE-2024-126xx/CVE-2024-12668.json) (`2024-12-16T17:15:09.700`) -- [CVE-2024-46971](CVE-2024/CVE-2024-469xx/CVE-2024-46971.json) (`2024-12-16T17:15:09.957`) -- [CVE-2024-49513](CVE-2024/CVE-2024-495xx/CVE-2024-49513.json) (`2024-12-16T17:15:10.130`) -- [CVE-2024-52063](CVE-2024/CVE-2024-520xx/CVE-2024-52063.json) (`2024-12-16T17:15:10.447`) -- [CVE-2024-5333](CVE-2024/CVE-2024-53xx/CVE-2024-5333.json) (`2024-12-16T17:15:14.070`) -- [CVE-2024-54465](CVE-2024/CVE-2024-544xx/CVE-2024-54465.json) (`2024-12-16T18:15:11.023`) -- [CVE-2024-54504](CVE-2024/CVE-2024-545xx/CVE-2024-54504.json) (`2024-12-16T18:15:11.317`) -- [CVE-2024-55636](CVE-2024/CVE-2024-556xx/CVE-2024-55636.json) (`2024-12-16T18:15:11.463`) -- [CVE-2024-55637](CVE-2024/CVE-2024-556xx/CVE-2024-55637.json) (`2024-12-16T18:15:11.673`) -- [CVE-2024-55638](CVE-2024/CVE-2024-556xx/CVE-2024-55638.json) (`2024-12-16T18:15:11.840`) -- [CVE-2024-55663](CVE-2024/CVE-2024-556xx/CVE-2024-55663.json) (`2024-12-16T18:15:12.030`) -- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-16T18:15:12.170`) -- [CVE-2024-55969](CVE-2024/CVE-2024-559xx/CVE-2024-55969.json) (`2024-12-16T17:15:12.337`) -- [CVE-2024-55970](CVE-2024/CVE-2024-559xx/CVE-2024-55970.json) (`2024-12-16T17:15:12.517`) -- [CVE-2024-56072](CVE-2024/CVE-2024-560xx/CVE-2024-56072.json) (`2024-12-16T17:15:13.500`) -- [CVE-2024-56073](CVE-2024/CVE-2024-560xx/CVE-2024-56073.json) (`2024-12-16T17:15:13.700`) -- [CVE-2024-56083](CVE-2024/CVE-2024-560xx/CVE-2024-56083.json) (`2024-12-16T17:15:13.883`) +Recently modified CVEs: `61` + +- [CVE-2024-10678](CVE-2024/CVE-2024-106xx/CVE-2024-10678.json) (`2024-12-16T19:15:05.907`) +- [CVE-2024-10939](CVE-2024/CVE-2024-109xx/CVE-2024-10939.json) (`2024-12-16T19:15:06.400`) +- [CVE-2024-21144](CVE-2024/CVE-2024-211xx/CVE-2024-21144.json) (`2024-12-16T20:13:40.827`) +- [CVE-2024-21145](CVE-2024/CVE-2024-211xx/CVE-2024-21145.json) (`2024-12-16T20:13:37.007`) +- [CVE-2024-2179](CVE-2024/CVE-2024-21xx/CVE-2024-2179.json) (`2024-12-16T19:01:03.567`) +- [CVE-2024-21816](CVE-2024/CVE-2024-218xx/CVE-2024-21816.json) (`2024-12-16T20:03:26.960`) +- [CVE-2024-21826](CVE-2024/CVE-2024-218xx/CVE-2024-21826.json) (`2024-12-16T20:00:03.550`) +- [CVE-2024-23717](CVE-2024/CVE-2024-237xx/CVE-2024-23717.json) (`2024-12-16T19:28:06.027`) +- [CVE-2024-27348](CVE-2024/CVE-2024-273xx/CVE-2024-27348.json) (`2024-12-16T20:12:08.900`) +- [CVE-2024-27517](CVE-2024/CVE-2024-275xx/CVE-2024-27517.json) (`2024-12-16T19:26:43.387`) +- [CVE-2024-2753](CVE-2024/CVE-2024-27xx/CVE-2024-2753.json) (`2024-12-16T19:01:58.733`) +- [CVE-2024-3178](CVE-2024/CVE-2024-31xx/CVE-2024-3178.json) (`2024-12-16T19:02:56.037`) +- [CVE-2024-3179](CVE-2024/CVE-2024-31xx/CVE-2024-3179.json) (`2024-12-16T19:03:45.313`) +- [CVE-2024-3180](CVE-2024/CVE-2024-31xx/CVE-2024-3180.json) (`2024-12-16T19:04:13.787`) +- [CVE-2024-3181](CVE-2024/CVE-2024-31xx/CVE-2024-3181.json) (`2024-12-16T19:07:04.087`) +- [CVE-2024-4353](CVE-2024/CVE-2024-43xx/CVE-2024-4353.json) (`2024-12-16T19:08:05.467`) +- [CVE-2024-44248](CVE-2024/CVE-2024-442xx/CVE-2024-44248.json) (`2024-12-16T19:15:07.777`) +- [CVE-2024-44291](CVE-2024/CVE-2024-442xx/CVE-2024-44291.json) (`2024-12-16T19:15:08.180`) +- [CVE-2024-47892](CVE-2024/CVE-2024-478xx/CVE-2024-47892.json) (`2024-12-16T19:15:08.393`) +- [CVE-2024-54494](CVE-2024/CVE-2024-544xx/CVE-2024-54494.json) (`2024-12-16T19:15:08.730`) +- [CVE-2024-54498](CVE-2024/CVE-2024-544xx/CVE-2024-54498.json) (`2024-12-16T19:15:08.943`) +- [CVE-2024-54508](CVE-2024/CVE-2024-545xx/CVE-2024-54508.json) (`2024-12-16T19:15:09.160`) +- [CVE-2024-54527](CVE-2024/CVE-2024-545xx/CVE-2024-54527.json) (`2024-12-16T19:15:09.313`) +- [CVE-2024-54528](CVE-2024/CVE-2024-545xx/CVE-2024-54528.json) (`2024-12-16T19:15:09.480`) +- [CVE-2024-8661](CVE-2024/CVE-2024-86xx/CVE-2024-8661.json) (`2024-12-16T19:08:45.253`) ## Download and Usage diff --git a/_state.csv b/_state.csv index dfb5814fb97..daae6dda034 100644 --- a/_state.csv +++ b/_state.csv @@ -215603,7 +215603,7 @@ CVE-2023-20881,0,0,62def0607ccd11e547311a6d2ae53b368db8bddddb5dc7171452584ce103c CVE-2023-20882,0,0,6ddba494a8a160ce5e0711fb9d9592f96379b36ce19ada7f36363daeb6f021d7,2024-11-21T07:41:44.820000 CVE-2023-20883,0,0,85920202989b7ecdfdddde4324618643e477e4eccd5c3ed2dd13f3c9d39a497d,2024-11-21T07:41:44.933000 CVE-2023-20884,0,0,4423dfb254ef19cd65eb6cdc64b42d779ddefab65e5ccd6f3e9ec2229f3ac8c7,2024-11-21T07:41:45.050000 -CVE-2023-20885,0,0,7c51dc8a57ddff20a8258b3ee678b9c1b0f9a840ea655b3931c5bb89d5038659,2024-11-21T07:41:45.173000 +CVE-2023-20885,0,1,0dfdf492922f0b854de542b4e33abc881f21c058cd2a01cc3c31dff463cde87b,2024-12-16T20:15:06.557000 CVE-2023-20886,0,0,7a982823666f96ea57050e3be9fa8d457665501ecee354ebbfe73207a1794a5a,2024-11-21T07:41:45.290000 CVE-2023-20887,0,0,0e8d796e53d8e6ab64812dc8dfba418b271f61051a5e3599eedc475c1d9f65c6,2024-11-21T07:41:45.423000 CVE-2023-20888,0,0,e03cf06dd5012afdda78f681ac98a364559ac8fc4597fa2ee9018f51d61300f4,2024-11-21T07:41:45.533000 @@ -219334,7 +219334,7 @@ CVE-2023-25172,0,0,16eb8035eb7a049197550b4a5e2ecfc61fed9e8f54e6b5b457d430c9cbfb8 CVE-2023-25173,0,0,edc8e484655ace43d21b795a9a7b322378a7dc4bbde3e375322232d4b7665cad,2024-11-21T07:49:15.083000 CVE-2023-25174,0,0,d554bb6e990aad50afa79cdc9c57d93d0cd1da1dcf214e0fe23b2a11faf34653,2024-11-21T07:49:15.240000 CVE-2023-25175,0,0,14da3309e449a26f2db353e124e6628f013b4b5c892a809706d8afea473929fc,2024-11-21T07:49:15.347000 -CVE-2023-25176,0,0,e84963008358d457b35d9ac696474c85601739637f9cf524d6fef0f42ab90ec4,2024-11-21T07:49:15.480000 +CVE-2023-25176,0,1,811bd6f815bdd74f9f545f98c1b4e42191046e2d4b0c1c9a556dbfe2119917ed,2024-12-16T19:50:09.707000 CVE-2023-25177,0,0,f6878620bdd8eb602a1de3da15bb032f97d2cfaa52f6f2789905c937aa83b2f0,2024-11-21T07:49:15.593000 CVE-2023-25178,0,0,e289d6b72510292be894db50eeeb2ad3c1a714131d58fc3fd73ffcdeff26aee5,2024-11-21T07:49:15.703000 CVE-2023-25179,0,0,c928276533a823f7dd610e7b181bace53c2005a7a62a193ce05b57d93f87ec32,2024-11-21T07:49:15.817000 @@ -222938,7 +222938,7 @@ CVE-2023-29471,0,0,72b13cb96b5651ca7898f495eb65cda22ef4f5f9064813e6aa6721de200f1 CVE-2023-29473,0,0,962b25368971eecc0256cc5b0b5fd386654955c54f9062b5d68c4eba7d43005e,2024-11-21T07:57:08.040000 CVE-2023-29474,0,0,4d49bb7998baa32821ffa2bda0888222ce3e7ecfecd2a3e20e56cc265682b2cc,2024-11-21T07:57:08.170000 CVE-2023-29475,0,0,33c83edd70229d4c831ae9bdd415364683573ea08af12a4ddc98823fa2c19e92,2024-11-21T07:57:08.320000 -CVE-2023-29476,0,1,f4467f4a63c07a4c1a484e903608aee20437efb62449a239dc234f1002de3f1f,2024-12-16T18:15:05.407000 +CVE-2023-29476,0,0,f4467f4a63c07a4c1a484e903608aee20437efb62449a239dc234f1002de3f1f,2024-12-16T18:15:05.407000 CVE-2023-29478,0,0,26a52af1e5d65e98c54e4beb2236d3bd1d72cbaf6c697669c6c21aef239832ad,2024-11-21T07:57:08.477000 CVE-2023-29479,0,0,75350b83cbe774edaed33a6f0ed3e2780cfb5405492749d3c46a0119080823c2,2024-11-21T07:57:08.613000 CVE-2023-2948,0,0,55ff93f2536f57f582b4c866dbe6ee94baa3d857520bccfc83121a8e8d3e0770,2024-11-21T07:59:37.673000 @@ -225055,7 +225055,7 @@ CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0 CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000 CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000 CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000 -CVE-2023-32435,0,0,8ba5c35ba3d4096c020898ee1b826ad36545f20cab90f7a54bedc2fe478ba0be,2024-11-21T08:03:20.847000 +CVE-2023-32435,0,1,6bac78abc427ff33571521c6cab6b4bceb7bbc8cb3c895636a3a87721ccf6e68,2024-12-16T20:15:06.797000 CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000 CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000 CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000 @@ -226938,7 +226938,7 @@ CVE-2023-34795,0,0,6cb633e64d37fcc6b0c7e6a177b800a9d2c8b5f6bad93ccbbf0ce45ad5c41 CVE-2023-34796,0,0,5f6c4ae9c7f7d9a490e850017447eac902b344379a7512ecb98ef3b06118a215,2024-11-21T08:07:34.877000 CVE-2023-34797,0,0,8ee443441d94c6e87f7094e07dc56d0e8a60e75f6326507224f9a11a39c79f8f,2024-11-21T08:07:35.033000 CVE-2023-34798,0,0,6cb910bdabdb3563f84fc57831ebcda7ba4c5ee7c3dd75bac8c3c8a80deff83a,2024-11-21T08:07:35.190000 -CVE-2023-34800,0,0,d257124bb842b95ff31aa663e32fee02754e79c49ca0306d3dc631e3d5183e56,2024-11-21T08:07:35.357000 +CVE-2023-34800,0,1,84bba67803e1bbd4ca8cc01710d354e93f725db60979993fa12a34f73c09acc2,2024-12-16T20:15:07.120000 CVE-2023-3481,0,0,b2741aa0f42f156d4fee2c27ab01bac08a1a34d5e3aebc870718d36773e447a7,2024-11-21T08:17:21.767000 CVE-2023-3482,0,0,4f17c87c8ca4abd9150a3bc0ff1634cb2b99e8f7558db4292a90748d3f170833,2024-11-21T08:17:21.910000 CVE-2023-34823,0,0,40513740fed68e8e66396debac889f6fe387d9792eb250b68461072643b7caab,2024-11-21T08:07:35.497000 @@ -229581,7 +229581,7 @@ CVE-2023-38362,0,0,7c3ef25e99492fc49b4854f627740361430fb6b1d7a190aef69e4a14d60a5 CVE-2023-38363,0,0,a591869353ec495b6ced3419001a4bc71a1d976d71be89cc15611c55d2ef9dd8,2024-11-21T08:13:25.203000 CVE-2023-38364,0,0,8e811d572c6ae14997b41396824245065fc1674c69eae1daee3876448a447237,2024-11-21T08:13:25.330000 CVE-2023-38366,0,0,16bd6b400ddaa02bf5571d8eccd7a20051795581659f90f920a074946e4cde85,2024-11-21T08:13:25.467000 -CVE-2023-38367,0,0,158b6b3750c7466cf99b3d993c49d05e15bcee261137ed5b06f680b46abb6446,2024-11-21T08:13:25.587000 +CVE-2023-38367,0,1,6a03f461c0a3cbf13b518a99d4702e4a73ee2951a18886adc1aa7645c3e8f642,2024-12-16T19:28:58.587000 CVE-2023-38368,0,0,4e92073cc3cde9610fff149c73e145f08c12ba5fb261336c4db43e74a278b21d,2024-11-21T08:13:25.713000 CVE-2023-38369,0,0,20343162d9fbe7902fadaef9efe17c5051b8d190ce29e8425fee989b8cd2e50a,2024-11-21T08:13:25.863000 CVE-2023-3837,0,0,1c8c650f050e84921fdaead1c4c5a1a0df598520d6482451fefe73e36028db65,2024-11-21T08:18:11.033000 @@ -230957,14 +230957,14 @@ CVE-2023-40096,0,0,77e0473c96036c06bdf016853cdf8d09663a4e0f391c9406e6598954e480b CVE-2023-40097,0,0,3cde3d5484ff2d9583104f43a80f31655d343b5c07edc742f664f41d686168f1,2024-11-21T08:18:45.923000 CVE-2023-40098,0,0,5880268ff9c8bf0e1e18329a53fe42748819035e50615eba34f1c21b4429f9aa,2024-11-21T08:18:46.030000 CVE-2023-4010,0,0,7dd377e400203d1ea87e75a1e1049ff6799d5cee52d3d1f9fa22a3aae18a6279,2024-11-21T08:34:13.383000 -CVE-2023-40100,0,0,8aa610aa2e7ffe71ba37a9573f1f647ad000752ec8af2ce8a278ebf419b13822,2024-11-21T08:18:46.137000 +CVE-2023-40100,0,1,03ceb0fd97de35678626690e2c94b1070364ebf918ea96d0597a899539e972ed,2024-12-16T19:32:42.900000 CVE-2023-40101,0,0,62b417649524a78365a14e1f65ce82fdcf336232904324684da3d2e7b7c5762d,2024-11-21T08:18:46.320000 CVE-2023-40103,0,0,81089a864b71326c9cacfe4f0a85b39b2edadbcce0d80f92386658e6a6bf161c,2024-11-21T08:18:46.447000 -CVE-2023-40104,0,0,c2046e7bb8eba7ccc2ea02b8deeb104dbc16b0177243401fd837d7d364d08585,2024-11-21T08:18:46.570000 +CVE-2023-40104,0,1,b3b514fe5c5c90b3fd96bac202151426665bbebe93179878299d731c6e6b42b7,2024-12-16T19:33:26.077000 CVE-2023-40105,0,0,99fd48612470195f9c737f8096f56e0b77060289b39968dc0daaaa2383cd197e,2024-12-13T21:27:40.283000 CVE-2023-40106,0,0,dd94462a1cc0ecff68b893d4c352cb3561e324fb5a1af15f4a62c1d3f1ffd1ae,2024-12-13T21:20:34.837000 CVE-2023-40107,0,0,cbfd670fe9974a0bf3a935ebb0bae79e008c2a28e1b9f32ec59b9835bda81f23,2024-12-13T21:02:17.693000 -CVE-2023-40109,0,0,f255c29c836330ae6011954bad11538780dabd720d9f9d6bc9f777c716e8ba66,2024-11-21T08:18:47.327000 +CVE-2023-40109,0,1,e4c3773b4535f894e1bed277d66aa40ca3b1bf83f795fb073a350f209e5bc2e6,2024-12-16T19:34:04.793000 CVE-2023-4011,0,0,77e08656072a7907646eb543cf48d306dfce66e36e2f14dc48363fc6a8adc3bd,2024-11-21T08:34:13.530000 CVE-2023-40110,0,0,1796eb5c3e87a14dd825f784ac43182d16eca1e76a01978818fdb769a3e34ac4,2024-12-13T20:56:22.790000 CVE-2023-40111,0,0,8760c3c80544bce5acbcb8865d238293f63510a13d6ca97192a40a2949118363,2024-12-13T20:55:12.390000 @@ -231296,7 +231296,7 @@ CVE-2023-40472,0,0,0adbf1c477a1ef53edb98808bde86cf13ff8a99c1e3805e904e403660e189 CVE-2023-40473,0,0,a23211ba148c614bd8169e57c27de9ece0d97e6aa6265bbae1c38f20a73bf7c8,2024-11-21T08:19:32.490000 CVE-2023-40474,0,0,76d7c9f146af8628e8f0e93b9f8d80f5a69c103a9df4d0cb2ea4058285236728,2024-11-21T08:19:32.637000 CVE-2023-40475,0,0,e15e16a3ec7c5bf6bf32990edd0a1d2dabe93579447578a03b0166ff8b67a944,2024-11-21T08:19:32.783000 -CVE-2023-40476,0,0,2399c9e1540a5683b0a7dac909bb0d4543f60f7ebcc1a4ce15ae3b59744d8fc3,2024-11-21T08:19:32.937000 +CVE-2023-40476,0,1,11996ceeadcf3af41b049e3465605bce8a16f6312202891a8f139bbd867768f7,2024-12-16T19:54:51.870000 CVE-2023-40477,0,0,3eb17f110dd9fb587160e88cbd13f801056aec9679ec47603ce426a7e8166eb5,2024-11-21T08:19:33.483000 CVE-2023-40478,0,0,a3fb7798a48b05b31de5b2b5faa9c0ac4380209160291014ad3f81dcf8ebbb85,2024-11-21T08:19:33.637000 CVE-2023-40479,0,0,9449a8cd9cba1b475b9fcd0125f9e3c6bfe2290a23a474f03f0ce92e2999e00c,2024-11-21T08:19:33.773000 @@ -234242,7 +234242,7 @@ CVE-2023-44425,0,0,f01d12f9a74e9448b67331a9679fa5b5d4e266e2c85b4ddabe7b7a3c1524a CVE-2023-44426,0,0,e53ab73e8e5f0f3397f768402d427f3e81c0618f085af53ca0593619eb63d36d,2024-11-21T08:25:52.727000 CVE-2023-44427,0,0,029fdd369bab65de145c579522a277858ddb1f03aceabd97efd6b475c29a756c,2024-11-21T08:25:52.847000 CVE-2023-44428,0,0,7ba427ec8daac675cc901d3eb39537bbf9552fd703535d3e11b4b4a57e1df440,2024-11-21T08:25:52.983000 -CVE-2023-44429,0,0,3c1da4fd60912ab39d3dd9b2d7ba0454d4822d248fdfb50d45acbf01064cd01b,2024-11-21T08:25:53.110000 +CVE-2023-44429,0,1,dfa40702f61fcde32607b8e65339f160a7e154b77d1ebf2027f97be3d9d962aa,2024-12-16T19:56:34.733000 CVE-2023-4443,0,0,1e94555c2145e45ec29dca5b3d19301cb9ea5ec612c1194355d64511597f6e31,2024-11-21T08:35:09.963000 CVE-2023-44430,0,0,1615412409194da3555272bcc3f61fedef274b4618ffe74a561db26e0e4744f5,2024-11-21T08:25:53.243000 CVE-2023-44431,0,0,1733c4059baa65cce786b1f6646f7ced26681775769761f2e2445f788dc94cfa,2024-11-21T08:25:53.367000 @@ -234261,7 +234261,7 @@ CVE-2023-44442,0,0,038e9844457bb5ce73c9872db2c9862a471f65671aa4ec56dd50227a0c1d9 CVE-2023-44443,0,0,25ed555b3f4fbd4a72cb35af01b9dbadebb5898f75b847b331091256819e933d,2024-11-21T08:25:54.730000 CVE-2023-44444,0,0,7284e4ddbe3069ecaa488bf4b5c21f6330f84effe9f7a529f83f70627da9e10a,2024-11-21T08:25:54.847000 CVE-2023-44445,0,0,9b53ce66d23017a87da2d2f4aecb5454e5a06c05c407103e9e8fd3d46092ac35,2024-11-21T08:25:54.960000 -CVE-2023-44446,0,0,7c33af5805f3e2d20c6e2f3439b429028372ed0ad839a01f925266b6a8cb9e4a,2024-11-21T08:25:55.077000 +CVE-2023-44446,0,1,b895d9ab3f8397f0d613e1916ce734cc27436cd8d9dd5636fb0a19efb132ed97,2024-12-16T19:42:53.367000 CVE-2023-44447,0,0,5af59041af7e95bd28cb870abd2abb37e9272f55e7ef050663c84ee891727e87,2024-11-21T08:25:55.193000 CVE-2023-44448,0,0,f0baa3f59504661e908647f76df127645732b4036087f4b42b32f86107cc5bfc,2024-11-21T08:25:55.303000 CVE-2023-44449,0,0,04c2092561950ca08e7b5bae9812cfa4c984a507a9026c42dc43317038a5f2af,2024-11-21T08:25:55.417000 @@ -235638,7 +235638,7 @@ CVE-2023-46641,0,0,e458628b48b0a8d8075bb6190954e4ca9660ea03c03832431eb9b33e3abb2 CVE-2023-46642,0,0,333bcdde9199abc2b63f97cc5d28fed27186b8b52a610f2a66910719f007bfe8,2024-11-21T08:28:57.080000 CVE-2023-46643,0,0,609db5b2ea1bc56062cbe58ff09b91be86637ebd89f6c8bd21364a3b4c86f5d2,2024-11-21T08:28:57.273000 CVE-2023-46645,0,0,27976711a83671e987f70be273ef4d0424100275931fe14b9d803a3353aa79fd,2024-11-21T08:28:57.547000 -CVE-2023-46646,0,0,16a62a40a13cc1f798304d73b91c5d2077f21b45a73bfdeb3e22dfa92a381bce,2024-11-21T08:28:57.830000 +CVE-2023-46646,0,1,a2c7e44e259fb2b2ed8c3950cd1500651525384a43ae3fa31e0a4b32f390aa4a,2024-12-16T19:07:42.750000 CVE-2023-46647,0,0,a5a22a6966b2e14e7bfeb00e348b5a45f32ad41ada6839623fa875dceb01cb60,2024-11-21T08:28:58.003000 CVE-2023-46648,0,0,24450ce5a5dcbb5b6fe85cb32c5838e0b30205fd4061cc330dc6a804f067abb9,2024-11-21T08:28:58.177000 CVE-2023-46649,0,0,015f4b254152b3447cd319dec053fc7609f954de3481f5bf2550fba4fa8327ac,2024-11-21T08:28:58.367000 @@ -235694,7 +235694,7 @@ CVE-2023-46700,0,0,5412f1e1c756c649fd619ff4a913456850225bd1e74f29e47e7a6b3472556 CVE-2023-46701,0,0,c3245f2774d9f852ec6d7bc5f696d62136f8d84089c7151d427431763c65daa7,2024-11-21T08:29:06.583000 CVE-2023-46705,0,0,4e48920e9208b778a0561217bdc49483715ea204c51f67168c78cb3272fb259d,2024-11-21T08:29:07.240000 CVE-2023-46706,0,0,7e20bad68f5c3e1387996462b18f7f7cac83d797c331c6458c4625cfa9b56eca,2024-11-21T08:29:07.443000 -CVE-2023-46708,0,0,c82fbfb018edf560c364fa2046662b083a02c679dc079b06f00f6dfc37b48247,2024-11-21T08:29:07.663000 +CVE-2023-46708,0,1,27257d086a8638ef75dd4e2cfe0b280cd2f6081bd1f05a30300c7151213521ae,2024-12-16T19:58:19.333000 CVE-2023-4671,0,0,d862a7aded2552b23a1724602e9191e55f060ea5c7de692e971edb2e003a67d5,2024-11-25T14:15:05.850000 CVE-2023-46711,0,0,10461e3199ca74c0551a32116631ff9e2136d0c732f728f9ed6f949c7cf462ef,2024-11-21T08:29:07.870000 CVE-2023-46712,0,0,fdf304acb640d6c5c9b27fb14d1c1f950387e795ef7592ee75fefc3ca09147b0,2024-11-21T08:29:08.037000 @@ -237154,10 +237154,10 @@ CVE-2023-48646,0,0,d8d44a25061fe6648386811c26e32dfa15cbf4ade54b0e2f313e86e77e068 CVE-2023-48648,0,0,400529bac8d85308ebcf902245fbc1a5339515f7c784c020b227fde6296562f0,2024-11-21T08:32:10.960000 CVE-2023-48649,0,0,d1d86fedc0dd2c0f49f249f69bac57a864c3ba4488104cef2738133899417fec,2024-11-21T08:32:11.190000 CVE-2023-4865,0,0,f54dc37e88b64f2eaa263157022f4cb6273ef8de3556c9b7616fe96d791596f2,2024-11-21T08:36:08.593000 -CVE-2023-48650,0,0,fb163c722c3cacae2cfbc01d3b0a8298c5a57bdaa3de54a01c1992a7544040c9,2024-11-21T08:32:11.360000 -CVE-2023-48651,0,0,f71f5239d204c819a1a8c107aabdfc8875ba3e10ad5ab1c96f8ea378fecb3655,2024-11-21T08:32:11.500000 +CVE-2023-48650,0,1,156c85cb9a74c94e9584d1c0ab98c88de66f0ed8cbcc167f1535a978be3728e2,2024-12-16T19:12:48.123000 +CVE-2023-48651,0,1,a7d73298fb14a1ac71b7f3aa9e44365841691ea756ad2c7d9679e6223c0602ba,2024-12-16T19:12:28.110000 CVE-2023-48652,0,0,2bc575a2d5e9b01c0c90489b7e2a3c0cf52a1372c39c5faa95382870c2a8d9c0,2024-11-21T08:32:11.623000 -CVE-2023-48653,0,0,ab2735e8030d948f6d8587e3bb3c6f777b6461e2dffa0e4ddade09cad8cf0ead,2024-11-21T08:32:11.783000 +CVE-2023-48653,0,1,764c10917d0497f43e2ca13f2c2c54ac6b29d94d38360997f4bafa2190d7bf4a,2024-12-16T19:11:44.093000 CVE-2023-48654,0,0,2918433475a931d930abeffe82060592a48960d5b88638646d520553ca0d207e,2024-11-21T08:32:11.937000 CVE-2023-48655,0,0,328eb9ad4ad02b085d2d79a21853c39411b0e5a5a95b1548298ab148a2dbb382,2024-11-21T08:32:12.087000 CVE-2023-48656,0,0,22df79be8553c92190e6035e1d73a8d061b7cd6c1ae308218de6b3141ca56de8,2024-11-21T08:32:12.333000 @@ -237674,7 +237674,7 @@ CVE-2023-49332,0,0,cd95bcf7be66fee1aee8fc8305ed97e91bb932476ab4341211837511a36af CVE-2023-49333,0,0,59dc55c583d8ba68ec6481586aefafe6e875e1d67f259f313f9cd08a0793e4b4,2024-11-21T08:33:15.040000 CVE-2023-49334,0,0,a71cce4086b4b148dc373c1d7fba56d877f75c23b6d22b37d63332f1f03da814,2024-11-21T08:33:15.153000 CVE-2023-49335,0,0,73f91ebda61d9610ccbfbeb1d39fdf0940c778d533cc246d5cd441730f04b599,2024-11-21T08:33:15.270000 -CVE-2023-49337,0,0,ea92bdc40afeb8bdd278b3d13f457878ac47761673fb5abfb3f00d2b110ebd4c,2024-11-21T08:33:15.390000 +CVE-2023-49337,0,1,0d14234b5e3446d8500a2b7b546efe9ff1ac26a670174917f7b0665b6c05e1df,2024-12-16T19:11:00.917000 CVE-2023-49338,0,0,7370fa99206f22e1e8fee5411e07eede414093cd36b3dc840f8b0a49efe37cd0,2024-11-21T08:33:15.560000 CVE-2023-49339,0,0,622b994f0113f9d78de3566d21b87867eca0118e3e7b1e143495077127170d4d,2024-11-21T08:33:15.793000 CVE-2023-4934,0,0,b1ce0b7e7f0e5dbde2ee9807dfc5eb5663fb897e679494c57b0aeb71b54c09f4,2024-11-21T08:36:18.050000 @@ -237835,7 +237835,7 @@ CVE-2023-49598,0,0,e758410bd290a11a398e846d4228fea614a25c82ab963e99462e14bdaa9d6 CVE-2023-49599,0,0,d1843241f8db11fafc599c0daba9e074b74894e48b5aec8ec283f1589c2f8286,2024-11-21T08:33:37.373000 CVE-2023-4960,0,0,4efdb33cc3b8c9e490e625ca3e4a0d80c52b3418324639edab36acb9b27c0262,2024-11-21T08:36:20.780000 CVE-2023-49600,0,0,951712f25b1807fb7cbc715d2d52f9701c28ca721304e548114ef47bfdd81cda,2024-11-21T08:33:37.493000 -CVE-2023-49602,0,0,f5376c054c8346ebe37fdc46816b8fdfaed53bd7d160563ba24a04ad3a815fde,2024-11-21T08:33:37.623000 +CVE-2023-49602,0,1,a12c06e1c2027365532346b2edbb24aca3a0ac358acd9f611803ef679cef3d63,2024-12-16T19:59:21.097000 CVE-2023-49606,0,0,de58395e940a854debd455905f39ce7fb5cb86ec9f5107aaa70b928793a75cdb,2024-11-21T08:33:37.743000 CVE-2023-49607,0,0,c1d47d2485033d1538c7cfb6f323c8c3e048cbbcf85417d72c0ec588b46db7a8,2024-11-21T08:33:37.887000 CVE-2023-49609,0,0,b73f422c5984e5dd46d62810faadf6b16f12bf840c2578305d1ce83f9f9cc28b,2024-02-14T18:15:46.380000 @@ -238228,7 +238228,7 @@ CVE-2023-50179,0,0,0e6cc668a080b2d29e0272c7e4a48054864f7247f59eee577df239e6ba03c CVE-2023-5018,0,0,3b454bf57aacd9e031621a1394ba3fdd787e0e7fc338a20cc8367c2a1141614c,2024-11-21T08:40:54.073000 CVE-2023-50180,0,0,d6783ce6bda116cf179eb063fe562e4e5d811e5c743826ea5c313047c72737ed,2024-11-21T08:36:36.837000 CVE-2023-50181,0,0,3e2adc7b1752d71ffe875cdbeba43e35bb8c72826903c6afe68699815668e44a,2024-11-21T08:36:36.983000 -CVE-2023-50186,0,0,9748e47a4444f8b8087fab723456dd7a89763377d616cf89bdf32769969f5d8a,2024-11-21T08:36:37.123000 +CVE-2023-50186,0,1,047e2922b33df6f80409d7bff92b7afe0fa392a031f58749bfbea86569a72944,2024-12-16T20:26:46.057000 CVE-2023-50187,0,0,10886fe43c83895ef877d0280dadccb591f25051e8d9eec45b778bab67164756,2024-11-21T08:36:37.277000 CVE-2023-50188,0,0,b33cc4f9eb5a22ba4e2d78470bc6bc9f46d8fce16e7bd3480714c13fa2e0c17a,2024-11-21T08:36:37.400000 CVE-2023-50189,0,0,79168347d4ad698504f9bf27d76bca5947eea33a205cf224db066c66604e0248,2024-11-21T08:36:37.527000 @@ -238907,9 +238907,9 @@ CVE-2023-51375,0,0,8aa500e35768815eac3a4a2b8c7d151ecfd84c03d88e21aaeafc8435d03f0 CVE-2023-51376,0,0,f717775332ff144fc775c27c1eb3491e399a41fc14ce01d4e8662b6f4a9fc381,2024-11-21T08:37:59.003000 CVE-2023-51377,0,0,28b709d16cd515c5ba0c1e5851293e73ef48238b5cf18bf634730c835b62d1e7,2024-11-21T08:37:59.170000 CVE-2023-51378,0,0,310190928557c7b8a77bf7939156f5ecc2f2812a6f174ae1d2c725f05c1cfea6,2024-11-21T08:37:59.320000 -CVE-2023-51379,0,0,d213e4f535be9d7ed46b513a14098d10b428fe4dbc2850ce5cad5c3366b3637f,2024-11-21T08:37:59.450000 +CVE-2023-51379,0,1,fafc1ea54e8736b4bccbb20d793d681afa6940e97e6d2437ff43cd3c4116dba5,2024-12-16T19:07:10.117000 CVE-2023-5138,0,0,d4b625111b11a264dc00f7c9ef66bae0fdf0a667064f45a0abf3f2f06286dc4a,2024-11-21T08:41:08.360000 -CVE-2023-51380,0,0,94a36670a82b81bb79104892cdc2a2e52f1430e5b9d548e851d46b22ca68d733,2024-11-21T08:37:59.610000 +CVE-2023-51380,0,1,f3058dec281f5f7c954bb46b417dcbc7b927446559b5e25065d58f786d83ff6b,2024-12-16T19:07:20.613000 CVE-2023-51381,0,0,dae38e2969db35298f7bb53595e944e9233b54858e286dfa2789b9cc647273ba,2024-01-17T21:15:11.290000 CVE-2023-51384,0,0,6e58bfcfb6da1155236afb4714eaff5a0d73193b62b87388c071ed9812c6694b,2024-11-21T08:37:59.780000 CVE-2023-51385,0,0,4dd6adfe4e8a547ab40bfa763b57db46069409ffd40c7ea0c384ce7720703ef7,2024-11-21T08:37:59.990000 @@ -239338,9 +239338,9 @@ CVE-2023-51796,0,0,4b5a99831d6749064a86687dad48298bda83026e4b6687d9e35ff0e36bacc CVE-2023-51797,0,0,073a5be68ecb343ca653ec14071174918950bdcae3697ca109eead9fab2f0acb,2024-11-21T08:38:50.343000 CVE-2023-51798,0,0,dc47ad733b4194cde76c0ed2647db0919b28402d3370df67af26045d323da9e3,2024-11-21T08:38:50.570000 CVE-2023-5180,0,0,ff313775488da3270942ce52c90ffa8bbbb41120c651dd3281208514a8d55baf,2024-11-21T08:41:14.873000 -CVE-2023-51800,0,0,1e9bc6bfe9b46b1fd3d315374ad5ff70fe7798715679f3603652f67c0715815e,2024-11-21T08:38:50.787000 -CVE-2023-51801,0,0,b841103d34705c29252f18c1af16d6953b834ad5b00263ba6298dce025b37421,2024-11-21T08:38:51.007000 -CVE-2023-51802,0,0,0389d45c2a8027a67392b939fbf559fd69e25a76b9d891f8a6a4d07b54416a59,2024-11-21T08:38:51.220000 +CVE-2023-51800,0,1,54253e4b44d1940d6e734d57099afc70939b7b9b5a4325b2ab331e73f231a012,2024-12-16T19:25:56.377000 +CVE-2023-51801,0,1,ec42a439c27172fd48cca6f5ddb491f47e8681239aae5c5ebfc31cb931cf3bcf,2024-12-16T19:26:10.307000 +CVE-2023-51802,0,1,a5fc2560572437e6a66ad5ea884e670cf683a41199837b730484753648b3dc1c,2024-12-16T19:24:55.930000 CVE-2023-51803,0,0,00ea25ecef8fedf998024e910dfdd7c1b6b78679f0acecc7815160cc81872bcd,2024-11-21T08:38:51.430000 CVE-2023-51804,0,0,10b25a6fb4a3e368b6a0755087fc6272069c758669c1fa2370a72d6e0622e4c6,2024-11-21T08:38:51.647000 CVE-2023-51805,0,0,8eb6e27a51fa3d297acc67d84eee3cae33c74f3cad452c1edf45ad1db3d4349f,2024-11-21T08:38:51.793000 @@ -241605,7 +241605,7 @@ CVE-2023-6742,0,0,7843dc0b39cfb9e6165b9d63f0f6748701d6b72cede7b59e9b198274889b13 CVE-2023-6743,0,0,a06d6f675e29830cd8389ab90168304cad706dcbff6721ffcdf46ca0d0ad5622,2024-11-21T08:44:27.970000 CVE-2023-6744,0,0,a643f5007d899070921b19df2522416ac8401e0e05f88aab48ebc6ee58ed04b3,2024-11-21T08:44:28.100000 CVE-2023-6745,0,0,c2df4cdafbf74897e9eea24dcbefbab3bccb43b78e892bae5f48a918042a6fdc,2024-11-21T08:44:28.240000 -CVE-2023-6746,0,0,b978fd53bedab233684cbe2835e76462e7ebdd42726b02f345eb1b7cef795468,2024-11-21T08:44:28.377000 +CVE-2023-6746,0,1,d7ff11dddecae5300361052ebb0e500954674a7d62babed59f4ffc80fac1fb33,2024-12-16T19:07:48.603000 CVE-2023-6747,0,0,f1b669eb92efe8ef444d542bea6bd00978e396921b41145289be2c45bbd151e0,2024-11-21T08:44:28.527000 CVE-2023-6748,0,0,cf38ea04efb873027a42aa1c020e6885f6acfab0c6fff5502b7b09f2d51be788,2024-11-21T08:44:28.660000 CVE-2023-6749,0,0,f8c91a50224b14b87bcd28f8627a8d72ecb9793f12597331a87b6725548e32f0,2024-11-21T08:44:28.780000 @@ -242112,39 +242112,39 @@ CVE-2024-0014,0,0,265161d9949465d3602447cae25f01c0800ff61c134bf258208b213d42b830 CVE-2024-0015,0,0,ac153671c8f32bfd786c082dd9dcbf06514472c0792e3af9411b311c680fd9cc,2024-12-16T14:39:02.223000 CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b99,2024-12-16T14:33:13.613000 CVE-2024-0017,0,0,c3ae32d0f7f4b3aee825adaba904bd8ea33c38296423e6c492125686085b5834,2024-12-16T14:32:15.203000 -CVE-2024-0018,0,0,d830c3744ce7a1ea7f6c39445a382f844f81a27df6247e0448e915abade197f3,2024-11-21T08:45:42.823000 +CVE-2024-0018,0,1,dc97236025a554ca5d9fbcfefeab22ae1ca03e1bafa99ec450476dfed39ed381,2024-12-16T19:00:35.303000 CVE-2024-0019,0,0,32676e58ef99a34d73bcad3e1d9b1fffb8ca52e74728e2a4d9bd79fcb16e9aba,2024-11-26T15:17:07.267000 -CVE-2024-0020,0,1,84928478478ec6809853ed64e00fe038f952f115b30fa79973cc6031347ede5f,2024-12-16T18:59:20.550000 -CVE-2024-0021,0,1,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000 +CVE-2024-0020,0,0,84928478478ec6809853ed64e00fe038f952f115b30fa79973cc6031347ede5f,2024-12-16T18:59:20.550000 +CVE-2024-0021,0,0,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000 CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000 -CVE-2024-0023,0,1,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000 +CVE-2024-0023,0,0,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000 CVE-2024-0024,0,0,8b2a7fecb30ba159a81d4a685b53d71dcaa17cb8849060989b248099d4dec740,2024-11-21T08:45:43.840000 CVE-2024-0025,0,0,fcc23fa9a29c464037587349b9e70e9f44d7e9735554b5b727ef0a2ddc8f76ab,2024-11-21T08:45:44.037000 CVE-2024-0026,0,0,402f95a09c007a153e715c72fcc1825728454f11232829fa5e802f731eb2394a,2024-11-21T08:45:44.270000 CVE-2024-0027,0,0,b2a84f2d4b2f53d34ad30427c6bd8e738cf3e7ce005b8b01e2ee1d9785af8368,2024-11-21T08:45:44.467000 CVE-2024-0029,0,0,54ad939fb09b28b9a1b5b297173525d0cf8c95e5cd8fd33ef3e316cfd2aa0803,2024-11-26T16:30:39.007000 -CVE-2024-0030,0,0,392408319dcaec46385fe693f357c0df3e50b5e2fa5a22a71957a26c641ecb59,2024-11-21T08:45:44.747000 -CVE-2024-0031,0,0,5f5175781e0edb19e7130aa9448b97602753567266b28a532105d12cce9e7c14,2024-11-21T08:45:44.933000 -CVE-2024-0032,0,1,2869a92c4ec4dc0012478b0fee11fee5d3cd82b831431d094d1665ef7a26fc62,2024-12-16T18:45:35.897000 -CVE-2024-0033,0,0,78c45fcb534fdaa9e2d5a3aa73cdc05c9dd9a5f18840670fac4782be689257dd,2024-11-21T08:45:45.323000 +CVE-2024-0030,0,1,e4cb4beaf2582efdb0dae14bd9c06d5d49143432bc990a494f672666949d55f1,2024-12-16T19:29:58.747000 +CVE-2024-0031,0,1,99203c2b9ece9fd57e9b530310bcac8315f6fa59156a01e4dd338e067b434a3e,2024-12-16T19:30:26.253000 +CVE-2024-0032,0,0,2869a92c4ec4dc0012478b0fee11fee5d3cd82b831431d094d1665ef7a26fc62,2024-12-16T18:45:35.897000 +CVE-2024-0033,0,1,63855bcf80cd318cfaf639856e9abaf8ce5c28c9ad237fd2a4251ba4dc4f0806,2024-12-16T19:08:08.163000 CVE-2024-0034,0,0,471bb92a857d05af28fe1adbdefa9a500cdf4aefc38bc7d55963449cb47c1cf3,2024-12-16T16:07:35.377000 CVE-2024-0035,0,0,8f7e78db3211a3833a978a1f4a85563c71b64db0c3d044ea96edc4f8e2a75fad,2024-12-16T15:59:54.053000 CVE-2024-0036,0,0,f9a5e9ac00eb63f9c5368c4edb5f07dae83774a08385359f41cf881322018329,2024-12-16T15:58:38.657000 CVE-2024-0037,0,0,394cfced2a2723a704c6cbe26977af45d337b3a1bb3716915c523e280e7c05c0,2024-12-03T16:15:20.440000 -CVE-2024-0038,0,0,3d81078dd62d86232d623581052ff5d9f3751e2257f7c896e2d37fe459fcab8b,2024-11-21T08:45:46.180000 +CVE-2024-0038,0,1,baee8527daa9fa065a043ee87cb5ae43b4d4acd906f6069ea7197faff9b6110c,2024-12-16T19:02:43.323000 CVE-2024-0039,0,0,f51d4c38ebb3cc46492f31896efa747baab58b2bc83ee86fcd45588ba3e8a558,2024-11-26T14:26:56.233000 -CVE-2024-0040,0,0,6eb13817fba0c61ffe69d3937882c67d44ae349c324cad15cf073d2d8256ca22,2024-11-21T08:45:46.490000 +CVE-2024-0040,0,1,482e23ff76f3327407e40e3d508d01e97e22ee3b05630d7571f0b9bc84b62862,2024-12-16T19:16:31.127000 CVE-2024-0041,0,0,30f391e32967bb0baf25d8a5436bac2e10d105d6b34926d3751c53b398bda865,2024-12-16T14:47:50.477000 CVE-2024-0042,0,0,4690a9c902145d930d3daa4383acefd18a26426234bddfdc5cac030637ad11c5,2024-11-21T08:45:46.840000 CVE-2024-0043,0,0,fb4caf0f9a9ab06453b49c1c261bb22a7231afb3979ba569d0bfbdc3ba982550,2024-11-21T08:45:47.027000 CVE-2024-0044,0,0,beeefa26b2187b8ae88659f81f9da7c2eb86689d4af798d80a79718ec6590423,2024-11-21T08:45:47.203000 CVE-2024-0045,0,0,bc1d5222270546dca4de25f0085b53b588a8ac25a93f716cadd826cc31d50354,2024-11-21T08:45:47.400000 -CVE-2024-0046,0,0,59ad6dad744bda4c066888e3008186e8d995de09c1b7718beed7dc964c3e2111,2024-11-21T08:45:47.580000 +CVE-2024-0046,0,1,d4f36216fab9e1ec2581ea3be4963a14d313be96285938f258349eb3ea9d310f,2024-12-16T19:50:16.587000 CVE-2024-0047,0,0,7dc617adc08be9f641c1e332a4f76abbe58d0e1d5c3bf8c9b4fcfd4d9ad9ba53,2024-11-21T21:26:15.987000 -CVE-2024-0048,0,0,e9f64027e13331fb1a40d11f40bcefd41f43017d032b68c2e3184e5eba64c6b4,2024-11-21T08:45:47.880000 -CVE-2024-0049,0,0,ab078109c7eda9da723ee69a2a95d7d8d1e5e353a04eb6f495bf2b05fde10a19,2024-11-21T08:45:48.080000 -CVE-2024-0050,0,0,7fd02c00bf279386900c6d7f31843b17a84d2accbdaadd57238db30f37e6cccf,2024-11-21T08:45:48.270000 -CVE-2024-0051,0,0,d862cb482a6ba4234a12ac96f928cb8a921b2dbccb98dd8d51fffb690372b8ae,2024-11-21T08:45:48.473000 +CVE-2024-0048,0,1,d653fd48b3412e69f148ae87f0e9a6f4febc859deb0656725279524aa5d0b440,2024-12-16T19:47:07.450000 +CVE-2024-0049,0,1,440046727e6fe1b2b6d43e948b545690a329b9f106d8721dd454f7e95dca95e6,2024-12-16T19:45:40.083000 +CVE-2024-0050,0,1,e4c1d255af536e7f6e2812bc3429b05cf1314de83e312e0828e2c3a9c9dea5f6,2024-12-16T19:38:57.483000 +CVE-2024-0051,0,1,90125530b14107932233524d90146747f2876a5c8305adabdc9bacec81eddc63,2024-12-16T19:32:07.313000 CVE-2024-0052,0,0,37a1306db82963a370b4d67dc21816036a55196c881fd7a2af20e4e80a19eb72,2024-11-21T21:27:28.983000 CVE-2024-0053,0,0,097c363e4e3cad490b0548271dd924bd22f26f2c1e234632435461606d74e6d7,2024-11-26T15:15:56.830000 CVE-2024-0054,0,0,1216b82254f7f4da2636958205697d5d1fa5262b6371495983ed800633d62208,2024-11-21T08:45:48.897000 @@ -243075,7 +243075,7 @@ CVE-2024-10091,0,0,244835544befc14a0ba664699f50b681fca0c5387af75b0db99291b956c48 CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000 CVE-2024-10093,0,0,c59046555fb4e55c30f34ec91ac62910be408e9628c1cf31aaf113495f33e4fd,2024-11-01T18:07:07.003000 CVE-2024-10094,0,0,e63fac5d529dc5bceb010fd479146f46858cd90c1e360601f682aec7c32291c2,2024-11-21T13:57:24.187000 -CVE-2024-10095,1,1,f02d4c4afddaa224b97fe2844cf121a9dc5e62c057c943ae30314d6029474d8f,2024-12-16T17:15:06.757000 +CVE-2024-10095,0,0,f02d4c4afddaa224b97fe2844cf121a9dc5e62c057c943ae30314d6029474d8f,2024-12-16T17:15:06.757000 CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000 CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000 CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000 @@ -243553,7 +243553,7 @@ CVE-2024-10673,0,0,7f3730c2f092c3dd29d3ac6c30c2d960534151f96414decc18c8cd50ac98c CVE-2024-10674,0,0,a7313216037c380fb9dfc5e5cbb480327712c6b02180efb4c5d327cb4a9f0829,2024-11-12T13:56:24.513000 CVE-2024-10675,0,0,a1b72770f2f1c98f4646c50d1ca93c6027b9b9a70a1889383ddd8c1ffee1aaf0,2024-11-21T13:57:24.187000 CVE-2024-10676,0,0,6887bcf7e7ad4dff7b3acb5ccb4703ef99e151f3c3b6329edf86e56346e5bebb,2024-11-12T13:56:24.513000 -CVE-2024-10678,0,0,77bf025196fba978014cf09352fc81de06f6272d51603c5a3d9c25aa872ae5b2,2024-12-13T06:15:24.850000 +CVE-2024-10678,0,1,2d4c7c0dbf73a0febb64fcb95cf96aa0969f22be17ad5704c54158d8b7b8b392,2024-12-16T19:15:05.907000 CVE-2024-1068,0,0,19fff8aed0f63e6149ffcd4b412aacdd7ffcb6468d1d60a7391f61d942a540cd,2024-11-21T08:49:43.460000 CVE-2024-10681,0,0,b8f17934b6825994f779df09ece3578475b75ad6fb261f72f1afc8dc3363b0f0,2024-12-06T10:15:04.533000 CVE-2024-10682,0,0,a7e8df655c8e75ce2215a7ec3bf41218b640524758c0db7f945bc19c5ad286f0,2024-11-21T13:57:24.187000 @@ -243762,7 +243762,7 @@ CVE-2024-1093,0,0,a72c5ec761a2a6bbe9fbe0cd33f83ddedd36c1921567176890d3627671f513 CVE-2024-10933,0,0,04454997e745a68880991c602cc8325b99e3c53905740538bda66aba85b8cef1,2024-12-05T20:15:21.417000 CVE-2024-10934,0,0,6dae70f2d9b047711f71d589675cbcb98ce87c40154b32c6e0f536ad5d783b6a,2024-11-18T17:11:56.587000 CVE-2024-10937,0,0,f3549007a000819e9c2b92d84627c6a8f0950225e9fa8a067012e5b6f0eb9781,2024-12-05T09:15:04.377000 -CVE-2024-10939,0,0,8e916f594124dac98f96bd262819f853852d188cfef646b7c00e26a6eec8abd9,2024-12-13T06:15:25.120000 +CVE-2024-10939,0,1,51b8ed7e89cb6cce38a6a9e5f66ac395ad176f1b332ff5472d247565035a8f52,2024-12-16T19:15:06.400000 CVE-2024-1094,0,0,4f6b2c2580413352eb02acf345a730d51f35d7640cec3afbef03e4f7e048ad8b,2024-11-21T08:49:46.967000 CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4626,2024-11-08T19:01:25.633000 CVE-2024-10943,0,0,26f3128d989fcb7c084f6a2785233e142b456ba7fa2bbfa2225352075f798149,2024-11-13T17:01:58.603000 @@ -243928,7 +243928,7 @@ CVE-2024-11136,0,0,725bf56498e2623c27a356d77c56c56ec2fbb4238d9582d18b0c73a291d68 CVE-2024-11138,0,0,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000 CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000 CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7fdab,2024-11-18T15:03:56.927000 -CVE-2024-11144,1,1,f08526b432b1f1ab099a892695aa9093b7e404008207635206c0eaaf7eabe184,2024-12-16T17:15:07.327000 +CVE-2024-11144,0,0,f08526b432b1f1ab099a892695aa9093b7e404008207635206c0eaaf7eabe184,2024-12-16T17:15:07.327000 CVE-2024-11145,0,0,49d8db8e9affdc9bd928055d93b635f15e5703854689b5be5f582242400a9150,2024-11-26T20:15:25.270000 CVE-2024-11148,0,0,98721a67b15a1bf200a0df48032e3c1b10f0381f700111d548ae742962375902,2024-12-05T20:15:21.577000 CVE-2024-11149,0,0,bed9c80af9d2c073bb9f97513f448d6c4275a45d3277b166d6da853b66ab77cf,2024-12-06T02:15:18.127000 @@ -244076,7 +244076,7 @@ CVE-2024-11352,0,0,de3582e15d7397e011d69382c9fedc502b246facf9b57003a974bb327fc47 CVE-2024-11353,0,0,9cdabea534e964700c7cde9ffd2f1a82245a0291b01694ff89cf8e86136ee6b3,2024-12-07T02:15:17.850000 CVE-2024-11354,0,0,87986c107f2d598ec9b5e54e0419b4149d63b452699e5d17cc10ffbc61f46d56,2024-11-26T17:34:55.767000 CVE-2024-11355,0,0,bcd06b7aaf6858bb0e6c5d2b1c10c8ea5c66a082156d2df4f7c406b73d08ca66,2024-11-22T06:15:19.450000 -CVE-2024-11358,1,1,9c29acb19be432b0d1c8b4571c77fdd7aac25afd1a8c7b51109e23b01d05753a,2024-12-16T17:15:07.543000 +CVE-2024-11358,0,0,9c29acb19be432b0d1c8b4571c77fdd7aac25afd1a8c7b51109e23b01d05753a,2024-12-16T17:15:07.543000 CVE-2024-11359,0,0,df4c05f348228b2c2882e44a6e533849bb9a56f9c6073e32478ef7ab197c57b9,2024-12-12T06:15:21.157000 CVE-2024-1136,0,0,f1cac8b5fbb038c0eb6351f127c8e971963556b8c2146fbf8d7dfc6a2c8abb13,2024-11-21T08:49:52.597000 CVE-2024-11360,0,0,659b24fc81e4938ca0374fdfc531183f0da8359af24c60f66cd39ca705cc7b8c,2024-11-26T17:36:08.113000 @@ -244455,7 +244455,7 @@ CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000 CVE-2024-11832,0,0,8b0dd6cab9b72e2220ce0d13c7004e80ede6e8f2153990f5deeb098e304f1be6,2024-12-13T09:15:06.113000 CVE-2024-11833,0,0,2f00371e995b5b3574e742c8a1281cd097aa61871ee6812330dd6292e5403d49,2024-12-13T06:15:25.233000 -CVE-2024-11834,0,1,124fbdacb7bd4bad593c6266594bab85739315b08458d1106e21c16eada45fb6,2024-12-16T18:15:08.243000 +CVE-2024-11834,0,0,124fbdacb7bd4bad593c6266594bab85739315b08458d1106e21c16eada45fb6,2024-12-16T18:15:08.243000 CVE-2024-11835,0,0,5262f682f44a74d58169f278da5e25511d007423370483539a8b966372b21d48,2024-12-13T06:15:25.600000 CVE-2024-11836,0,0,003744d3f220361dcb4831ee31d575701f7d105a01b33cc3a4ff7944dfd2fe7a,2024-12-13T06:15:25.773000 CVE-2024-11837,0,0,8b7bd567beedbfd0c18387b1888c8edd3260895c266bf5814b72efe7fb0a74ee,2024-12-13T06:15:25.940000 @@ -244463,7 +244463,7 @@ CVE-2024-11838,0,0,8994bf4ba33c708774af24b47413b334fdb73ca6b30384c2ca962cc19efcb CVE-2024-11839,0,0,c6c976e0661e60ecd7ad88e86bf60ee8d9fd80cc1c530b3d2b4318b3ad131ec6,2024-12-13T06:15:26.273000 CVE-2024-1184,0,0,7b0789c4e91a5162e06df6289a54d1b7f2607f1e0a44e814477ad9c07a354474,2024-11-21T08:49:59.067000 CVE-2024-11840,0,0,4f72dc8e1aec5c10e4842e27b0438d261a566769857022259f6d9b1c51e882be,2024-12-11T11:15:06.453000 -CVE-2024-11841,0,1,5c0f2d8274526d4090561f62dace7be849ae77b1db667d3f21e08e09571358c4,2024-12-16T17:15:07.830000 +CVE-2024-11841,0,0,5c0f2d8274526d4090561f62dace7be849ae77b1db667d3f21e08e09571358c4,2024-12-16T17:15:07.830000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 @@ -244806,16 +244806,24 @@ CVE-2024-12646,0,0,edf55cca2f63c5514783a7adeb1b585499807b56f798173f78bff573d5a90 CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000 CVE-2024-12653,0,0,6f848225024de4c14a49213377e690a08093550ba762598c765246a77e1e7837,2024-12-16T16:15:06.593000 CVE-2024-12654,0,0,1a7da902bc86773b1718a5279a6b089664e285ca426600f81a29cdf8c07c3da6,2024-12-16T16:15:06.810000 -CVE-2024-12655,1,1,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000 -CVE-2024-12656,1,1,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000 -CVE-2024-12657,1,1,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000 -CVE-2024-12658,1,1,7138d2d849a9c48736414141f6e0f5483806b353b70b5f0986a2bb641f83c92f,2024-12-16T18:15:10.120000 -CVE-2024-12659,1,1,57b490eadd8ce7187dbe6a8f2a837f89476ea13c3f86aa8843b1da895a3678e6,2024-12-16T18:15:10.320000 +CVE-2024-12655,0,0,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000 +CVE-2024-12656,0,0,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000 +CVE-2024-12657,0,0,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000 +CVE-2024-12658,0,0,7138d2d849a9c48736414141f6e0f5483806b353b70b5f0986a2bb641f83c92f,2024-12-16T18:15:10.120000 +CVE-2024-12659,0,0,57b490eadd8ce7187dbe6a8f2a837f89476ea13c3f86aa8843b1da895a3678e6,2024-12-16T18:15:10.320000 CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000 -CVE-2024-12660,1,1,bb60da334f54db48dcd94342bf183fd2a72d6a12db86075b10598ae509d99f19,2024-12-16T18:15:10.533000 -CVE-2024-12668,0,1,2d75ced822d853be6c6d0f513771edc99398324227c8582be01ec3a2f5a7e3b4,2024-12-16T17:15:09.700000 +CVE-2024-12660,0,0,bb60da334f54db48dcd94342bf183fd2a72d6a12db86075b10598ae509d99f19,2024-12-16T18:15:10.533000 +CVE-2024-12661,1,1,b0a5ca69a8f43b38c9f7b899d0ebfd6b57a397e750bb735f317aa453d69aa5f4,2024-12-16T20:15:08.840000 +CVE-2024-12662,1,1,b07855f7b8c9ee6bdfd1cdccd03234059b510edc4b4a3a8c0a44fc18dfc722aa,2024-12-16T19:15:07.027000 +CVE-2024-12663,1,1,cb1a586129069ffa13466f4c6b4784e75a597b36a82749fcb1b049602849dc70,2024-12-16T20:15:08.963000 +CVE-2024-12664,1,1,8b14bcf6274b4b1006a264a51c743fbc803a9a92a0774d499c88554da6e35aaa,2024-12-16T20:15:09.090000 +CVE-2024-12665,1,1,20c012aa44cf6efbaec36428e27712f8278e734a812c7dd5afcce74ec2d8d152,2024-12-16T20:15:09.260000 +CVE-2024-12666,1,1,e6916594a0490686e8b3fa8e2eef1b08f1952d21ae56044d4a0b2592b3b950f1,2024-12-16T20:15:09.430000 +CVE-2024-12667,1,1,8326e32b687aca9c189f301c70ca8cd23c53ed4f34213ac25fd52d1fe1bec45d,2024-12-16T20:15:09.600000 +CVE-2024-12668,0,0,2d75ced822d853be6c6d0f513771edc99398324227c8582be01ec3a2f5a7e3b4,2024-12-16T17:15:09.700000 CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33c4,2024-11-21T08:50:11.937000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 +CVE-2024-12687,1,1,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 @@ -246487,8 +246495,8 @@ CVE-2024-21140,0,0,4fdaeb1891358aed188cb510ef7acbfb67415e1764463a9604f6defe2a5b3 CVE-2024-21141,0,0,2e1f4e3c12308092ab9f995d82e1ee32a9767df2d02e1ab56e654fbae48b6c02,2024-11-21T08:53:51.873000 CVE-2024-21142,0,0,3bfa393e4ae1c998028c737a54acd7a5ba332dbb81efd8b2ee0ceaa1c8bded31,2024-11-21T08:53:51.993000 CVE-2024-21143,0,0,725c01912602ef3e93ef2b8d6f82be6af75463c5b96d0c39609b7ca00ff701e4,2024-12-05T21:41:35.897000 -CVE-2024-21144,0,0,83426bb007f779454961fa44941316c48e1cb827c9c17860b460910fc8cddc87,2024-11-21T08:53:52.247000 -CVE-2024-21145,0,0,d91cabc3818af2731a64532b4282d739570b31f3693e44c5b167c2dd8049fd65,2024-11-21T08:53:52.387000 +CVE-2024-21144,0,1,80772246190c6786f238a3c4afbf41453e2add993bd948cb2907f0a5b4a17597,2024-12-16T20:13:40.827000 +CVE-2024-21145,0,1,f139bc0bcd0bc8a88cfa16cfea8dbd24855ba98ef42ad21dc2fbae1d7fcc0307,2024-12-16T20:13:37.007000 CVE-2024-21146,0,0,93917a4413ac27762a7ca33035df6b31830c2c1fab0bde46632af0332d2d880b,2024-11-21T08:53:52.517000 CVE-2024-21147,0,0,f9b3ce61bcfd0739b224ab3df778de64cc9f81c542249c3ff7985bfca81e013d,2024-11-21T08:53:52.630000 CVE-2024-21148,0,0,a961a19a001681356591f7a5aac5ec6c6ba03a137425a9a549d889b9b58016e0,2024-11-21T08:53:52.773000 @@ -247078,7 +247086,7 @@ CVE-2024-21786,0,0,3b7692c292cfe04f566e45997f686e7ebd9a0d37b8f88eed63f3df5837053 CVE-2024-21787,0,0,02b845fa11d30ef4d6b5248b543c263f9946579e27a5baee61af2daa73424f03,2024-08-14T17:49:14.177000 CVE-2024-21788,0,0,f9a4599f6e3684f11960e4f6592dc9aa65a582c5ca6406a9d40efd4597155390,2024-11-21T08:55:00.303000 CVE-2024-21789,0,0,c34cd9f442e6303402470c0476d59eb25b078e9a77c0361ee2b35106ce4e225f,2024-12-12T19:11:30.663000 -CVE-2024-2179,0,0,c9ad885281489cb60c0b6a759775e339c23395d772e0de136e7185db0456b286,2024-11-21T09:09:11.937000 +CVE-2024-2179,0,1,3eba545c3d930ee27773dc0d32eb488dec2a7ca0dd014e74fbfb4ff5d3f81718,2024-12-16T19:01:03.567000 CVE-2024-21791,0,0,a67e0ef6e9bf4db6b180890b71471f6e3402c545c927d2c4dcca2990c1bf052d,2024-11-21T08:55:00.587000 CVE-2024-21792,0,0,5ad1f8e7252af650f0c6b22887aee307cf74e0b20b378df6bc369e8295b3ff9f,2024-11-21T08:55:00.733000 CVE-2024-21793,0,0,55f3d8fa434cf99297046e24d2334dbe5f7d72bd3f8b0e81502e115289b9b09d,2024-12-12T19:06:50.877000 @@ -247102,7 +247110,7 @@ CVE-2024-21812,0,0,9bd251e219bdd80ec43de87b0d9c078ead05f7995c400e0007210d917d930 CVE-2024-21813,0,0,b1fc9b3e97ad72485455a9afd1ff849eaab839871473b3dbd01f9dd0eb9be42d,2024-11-21T08:55:02.970000 CVE-2024-21814,0,0,b1e2549efd9875b91491bd1661f5691fb0472ad8e7c2a32aa72970a9fb715fba,2024-11-21T08:55:03.127000 CVE-2024-21815,0,0,6eff960e1f541f7cf6bcb270c61969ce74c3ff8a38acc23b5eb922fcde8f2832,2024-11-21T08:55:03.257000 -CVE-2024-21816,0,0,cb754ec8b848b009fc74869465720b3b4aa2ddd90df39b605c0321078907fe28,2024-11-21T08:55:03.393000 +CVE-2024-21816,0,1,00e0d4daeacd1d3fd9f793d2784b325bb5c289ba9a07a2898d50d384b4599340,2024-12-16T20:03:26.960000 CVE-2024-21818,0,0,b1e856eb827784a1939e1134bc57b77b239e4d10e05f897aba399bcfdc19b54d,2024-11-21T08:55:03.570000 CVE-2024-2182,0,0,ab8b39312452fd1cdb1fda840240abec08f1062fa2fcff855e616b49d9e8e2ff,2024-11-21T09:09:12.320000 CVE-2024-21820,0,0,8569b92c96b1fa6630eb92e0d683a279af08c00c24a2c76325143fbdaaebac3d,2024-11-15T14:00:09.720000 @@ -247110,7 +247118,7 @@ CVE-2024-21821,0,0,e0fb40291da6cae1bea7b8e89e535a0731cdb68b15496d2df71004049278f CVE-2024-21823,0,0,97a87f9b84abedcad845f4b0617dd3954cceb132a3f8741956e077262ffad213,2024-11-21T08:55:04.043000 CVE-2024-21824,0,0,0b5a6444166cb8b51dc4196d734284a8f25007cfb799306fb045c9509746a0bb,2024-11-21T08:55:04.223000 CVE-2024-21825,0,0,53f3d60323b48742e07fadf549463823b309ba52745431504a2d29cdc81ce4f6,2024-11-21T08:55:04.440000 -CVE-2024-21826,0,0,8a2972e061c3854b1ced6e633d1f9e2a9047443d9d3080c889ab250289784c27,2024-11-21T08:55:04.573000 +CVE-2024-21826,0,1,b0efc7f5a4c22e53138a44b26d2cc499c807e8e037949a506587f328c4ccae52,2024-12-16T20:00:03.550000 CVE-2024-21827,0,0,c36386bd432c8750e8234f9244bc193acdc52668f3a181b754e89d9943e1c8e0,2024-11-21T08:55:04.703000 CVE-2024-21828,0,0,b164b76bc7cd799a77840173af04b2a57766f14977ac417f1dd4a3e0cffb84c1,2024-11-21T08:55:04.850000 CVE-2024-21829,0,0,a3890329332bbdcce67fee09f03e9c5301416e681ea55a6663f4bd36bb9063a7,2024-09-16T18:03:16.707000 @@ -248452,7 +248460,7 @@ CVE-2024-23712,0,0,dca7f7603f638f26cd2a9b49ac4a91d562ab61b2bb341246f4b24e9fdc216 CVE-2024-23713,0,0,e8b94189764e525ab5ed3b2460e14bd465f9ba6ffb04c1c7ebea5b7fb8e76a7c,2024-11-21T08:58:13.633000 CVE-2024-23715,0,0,84bb266f9fee5a7b9ffe0eeca021ee8aaad13e22bd239bf206504fa99f9907ef,2024-11-20T17:35:23.597000 CVE-2024-23716,0,0,cb9ac2564c6ed4b5331bb3ee327380edc07c62ae3af51b2e54b84664f26df076,2024-09-12T14:35:11.523000 -CVE-2024-23717,0,0,0e40dc2f279be4c8521072ae65150e50a434ee3487079c9944a045cc9a843e79,2024-11-21T08:58:14.233000 +CVE-2024-23717,0,1,16d4d2ccf3311acd18064abfe451f2a254249a752165433dae4cdcd2767bccbc,2024-12-16T19:28:06.027000 CVE-2024-23721,0,0,e82275a6ceb58624705c438d445f45731cece06180d4bf7b873927b743944aaf,2024-11-21T08:58:14.433000 CVE-2024-23722,0,0,7aed14ae00779f4bf85faf2d2e87a3bc34fd71ca9d34033f7b2b44fa67e9e65f,2024-11-21T08:58:14.660000 CVE-2024-23724,0,0,d7ffba0f9c2e24ddd224cadc3a17e151a98a1cd89efd31e2e3a24d7937b5d42e,2024-11-21T08:58:14.880000 @@ -251198,7 +251206,7 @@ CVE-2024-27344,0,0,2b2469f12515824f584f118a281d1a413dd821722b40f8da0255a4bbb6dfe CVE-2024-27345,0,0,a23b69ba340cfa7022c84427fc318cd5e45df434c20ceeaee926a2f95da2a56b,2024-11-21T09:04:22.933000 CVE-2024-27346,0,0,4ef1236f8b7db87812c0165f7f7fb6230e69020f019ead98bf2a8322c5b12458,2024-11-21T09:04:23.063000 CVE-2024-27347,0,0,82870f64ac0a2a14ab143ebd6e83380e883828e2697e94972ee09305c8810ede,2024-11-21T09:04:23.187000 -CVE-2024-27348,0,0,faf0deef0e2c67f8a3dc067952b8094abd47a5b2b35ee021b3449a2ac9411f88,2024-11-21T09:04:23.403000 +CVE-2024-27348,0,1,8907c77d1f87a0067012d7f1cb60ccb1c019a3817dd62d759186d11783415e97,2024-12-16T20:12:08.900000 CVE-2024-27349,0,0,64f0ce0987be250d4ba50f90637a07a25050f972f064a55adeb0ac9a5e260832,2024-11-22T15:15:05.917000 CVE-2024-2735,0,0,72025d72bc6a94e03d9788c0ab0a22e82f19141df3ac9c9e9576e8a22534e704,2024-11-21T09:10:24.170000 CVE-2024-27350,0,0,5d2af758328dbaf2f007a2d7df7e7c029e0e88326cef12f01f6df91c842f3c2e,2024-11-21T09:04:23.840000 @@ -251331,7 +251339,7 @@ CVE-2024-27508,0,0,01dd0be44ff9b2d2b7bffbdc4bf1608e07f98eb2f01050faeab4938cdacaa CVE-2024-2751,0,0,51cff601e8ea6cfee3fe3dfa9937ae3d8010aa7433ad9f2ec6648b77fc7092cf,2024-11-21T09:10:26.150000 CVE-2024-27515,0,0,7a60d945962f42e82b8cedde4e0f599a7ec8fa86b07c648e7efc6bdafb4fab08,2024-11-21T09:04:41.443000 CVE-2024-27516,0,0,6be3a269b6245193a6844f91cd544cf56f6cc248ac9c97a44a0b76c9d09a6f9d,2024-11-21T09:04:41.653000 -CVE-2024-27517,0,0,63e5acdcddb8e8958564d51958917dedb854196175b703b2126fa5d95186de0b,2024-11-21T09:04:41.880000 +CVE-2024-27517,0,1,61bba897ef6c7df8c717bde8dddefddaaf590b57ddb936696ecbce893483c7aa,2024-12-16T19:26:43.387000 CVE-2024-27518,0,0,ffa086f895acef0377a6ec9aa3cbe7a6b2b9559a416120e3c86afef2ec482fed,2024-11-21T09:04:42.103000 CVE-2024-2752,0,0,1f7714ada47fc7931ee6a67e875d2c4fdb54e92f9d913058237e77be6166a18a,2024-11-21T09:10:26.270000 CVE-2024-27521,0,0,7643ac9428a29714dac6f925726f91d5bc44f641ade2f27f28b2be597416913a,2024-11-21T09:04:42.333000 @@ -251340,7 +251348,7 @@ CVE-2024-27525,0,0,f898500b022d31ae07649a8b808297d7beed5978a53e21aebc33b7b9f0c7a CVE-2024-27527,0,0,2fe196d803bc448f27a0cf8897c275f58d14cbf34dcf92ff4d973650baebc171,2024-11-13T21:35:05.767000 CVE-2024-27528,0,0,56265d8df6978b935ccc6aa6e7c7d8374b3e9baafff96b1201043cc88881761a,2024-11-18T15:35:04.500000 CVE-2024-27529,0,0,01f0e2b271e140ae079626fc57ab990e9d27f4073d317aa613b3bcf1ccb0e585,2024-11-18T15:35:05.340000 -CVE-2024-2753,0,0,a13914d989d8ec4e8d8b389ddea9d5d6ae50badd51cce154eb5bbdaa623b1c8e,2024-11-21T09:10:26.400000 +CVE-2024-2753,0,1,4b30e856bceef1967f376f73cea1b1d8f1a6b558c33a80313fcaca6a7d5021cf,2024-12-16T19:01:58.733000 CVE-2024-27530,0,0,c97aacf77b892ac56a4dc1aa81533416df2a035271ce715380578673eab043c3,2024-11-18T15:35:06.170000 CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b794326183c6,2024-11-19T21:35:05.417000 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 @@ -254384,13 +254392,13 @@ CVE-2024-31760,0,0,846edb2553b07f2b445cf5a1e8b93556b5dd0398d01eaf96f4b7929dfecd0 CVE-2024-3177,0,0,5bf72b0bc06971896d316946ec2a45f35a4b8a5d69e19bb6025aca04738c4b7c,2024-11-21T09:29:05.083000 CVE-2024-31771,0,0,8e057a4c7ee5341cf741c545c5de0c42c8357074d8177829bdceb15ae04f34a8,2024-11-21T09:13:52.057000 CVE-2024-31777,0,0,7d39a926878da060c40fa51d8497d0b8588d217d8e3fe5862751b007c9080250,2024-11-21T09:13:52.283000 -CVE-2024-3178,0,0,f20bf5dcae395ce20454c56b988e9cf6f5673e9f64a8212280ac629af198dec3,2024-11-21T09:29:05.230000 +CVE-2024-3178,0,1,bd9ccb3de86d5f400ed0d1b42c5f29b2c8a2c83bff134722290e4e42bbb62188,2024-12-16T19:02:56.037000 CVE-2024-31783,0,0,1b40062a113fd89a606f01b62877c05c532f3a67b1a88ff0ba6802f0710c81ee,2024-11-21T09:13:52.500000 CVE-2024-31784,0,0,92dd28c3140eb7ec5e9d1baef667042c67f22a7098e4a18a2b1e0a2348e2a1bb,2024-11-21T09:13:52.640000 -CVE-2024-3179,0,0,01297fc71cf2dec6883ea0c2a08e775fc6325b1b8bb70521be47cc390066db88,2024-11-21T09:29:05.370000 +CVE-2024-3179,0,1,9a56868d90ea74197493de115b9ccc37e34e21c0dcd5e812b7cdcf499135cd56,2024-12-16T19:03:45.313000 CVE-2024-31798,0,0,6c775446367d3139431a8bed0f06dd67790f81a1b7aff5c3c1630353cd491833,2024-08-16T13:59:00.523000 CVE-2024-31799,0,0,f21a03b695d6a36e6ba51b291aa1aa934c4d6926891338e496632c5eaf8bf345,2024-08-16T18:35:10.927000 -CVE-2024-3180,0,0,19232cb97bb97e0a6af926579a9504d191ab2eead5fc5d368ed509c4ddfb8159,2024-11-21T09:29:05.503000 +CVE-2024-3180,0,1,e20ce1bea149b543e57984e2fad13a83449afd27b917bcbe8f47690a85fdceef,2024-12-16T19:04:13.787000 CVE-2024-31800,0,0,e8706bdec7a965c1c2347c921e28272d577c9f60751e918d9d435ea930049e5c,2024-10-30T20:35:18.287000 CVE-2024-31801,0,0,c3fef98db9b31b362c26c0f91b41bd1c22b4a42e9aa117bc72dd6a8ffc8ed772,2024-11-21T09:13:53.513000 CVE-2024-31802,0,0,cbc35d8603249f0466c7706c961e0d2b59cf40c1ebcb8860e13ab16020756e8f,2024-11-21T09:13:53.733000 @@ -254401,7 +254409,7 @@ CVE-2024-31806,0,0,cfa5114f838107aaffcfafa1c6fc3684be0be75fd4688f1f1054390fc6ea0 CVE-2024-31807,0,0,ccfa9f98bce4e15e80f573d64d69659f0ac76498224c191103aa278c376209ad,2024-11-21T09:13:54.877000 CVE-2024-31808,0,0,e55f0c5d555b172d95e5c592f270d2945fef58b1c6177c4ab849b888f0409f6a,2024-11-21T09:13:55.113000 CVE-2024-31809,0,0,69280cdf1c045d8ef4c16436e3bbcae1ff4bbfccf4e7cb0c463cd49aaf0abbfc,2024-11-21T09:13:55.333000 -CVE-2024-3181,0,0,74d646b8f8e3e6ec11adcdfe7dc1473cc4f592c11e3fc4e014db66649be1408a,2024-11-21T09:29:05.627000 +CVE-2024-3181,0,1,3adf9c861b0981337f35305092bf11e6714526a136621a8de97f63b17a5ae922,2024-12-16T19:07:04.087000 CVE-2024-31810,0,0,d6d6da5ef333809ab10a95322d4e5dcb46b837f55b6b6b3bdb735ab9d7d2335c,2024-11-21T09:13:55.557000 CVE-2024-31811,0,0,cd9d5de2c9395516c50a16bdfd5b09a2fcc6663abe564d13e2174d52551ecc64,2024-11-21T09:13:55.707000 CVE-2024-31812,0,0,73aee4834e391500d3c2896d20231fb0f66109fe83a1224890df798daff609e7,2024-11-21T09:13:55.930000 @@ -263036,7 +263044,7 @@ CVE-2024-43526,0,0,d54f8d3df06e63578ea31a5b5f5a0499f3e25359a79ddf071f80ea9020ddf CVE-2024-43527,0,0,cf43baa77e520ba66e08c4469fab788ecc2cd5afada491e82545c4ff70097831,2024-10-17T18:18:08.877000 CVE-2024-43528,0,0,3b7ddee05c3362a1c6c17e49a12b4a951ee30686e6e392e28452d63584be2ccd,2024-10-16T21:47:05.543000 CVE-2024-43529,0,0,31731c35d1f6f78789cb51bf5d48475173d7e19ca743804ee36963b47e9d807a,2024-10-16T21:48:07.683000 -CVE-2024-4353,0,0,b86ea2cb5afea6feddd6c834f9c1d2c0b49859b80b0d379e432882fa8b0087cd,2024-08-07T19:15:48.223000 +CVE-2024-4353,0,1,b5340d839919aa23c3d0c2526a7112ce3f0b7f2316cd4631ccb03ed28b08ea5b,2024-12-16T19:08:05.467000 CVE-2024-43530,0,0,35f67c50080a3f5ab2620813a784f901c8c482b8af17231e86829e6b0457ad79,2024-11-19T03:52:28.357000 CVE-2024-43532,0,0,140eee66da6b8d85edd0f2673901f2a7c7e0bdac0ab41cbb82dcfca2e573c283,2024-10-16T21:51:34.370000 CVE-2024-43533,0,0,14fdffec7e07d6529aba3d90037ad8500f7888787d7e8b9da221ae33348dc78d,2024-10-16T21:48:30.067000 @@ -263692,7 +263700,7 @@ CVE-2024-44244,0,0,573c6be3aefd70d7c10a9a2e90a39d7e9b0481351a0f285c1fb9ad7116e70 CVE-2024-44245,0,0,59f185bf9d8dee6db82c76eb6e5b9c036ce2de8df4aab6eb55f57d9d7b2bd4b2,2024-12-12T02:15:24.113000 CVE-2024-44246,0,0,321f82f9fc9bc2a4c75fa9b0b28845133c4fb17690a1bc637d37257c2eac7780,2024-12-12T16:15:16.200000 CVE-2024-44247,0,0,e5d19c840bb58be3d8febe871a15e2408881be2e884d262abcdad60ec348a828,2024-10-30T17:49:05.693000 -CVE-2024-44248,0,0,d76d669b566049b62025108822d5a73a9d3dc8b71b73fec042f2a1913e87b6c0,2024-12-13T18:49:00.907000 +CVE-2024-44248,0,1,125187bbc2924e801a26c62b8603e876f53840b8993cd3e771790c0ab61ddb4f,2024-12-16T19:15:07.777000 CVE-2024-4425,0,0,bc14fc928873bc1e17e20e27bd9ee5c3e6600325b48f8519be3a125c559d0402,2024-11-21T09:42:48.317000 CVE-2024-44251,0,0,efd4484ccf413da27c840a1b5bfcdb39f987aa1d7f3c00dd48ad7085440ccce1,2024-12-06T16:15:20.907000 CVE-2024-44252,0,0,19357bf1f3ceb43a76e701ab6fc651c3f02730dd61b425b2768181790d2c5e48,2024-12-09T15:15:15.750000 @@ -263731,7 +263739,7 @@ CVE-2024-44287,0,0,f9ab1474cc919e4b5efc0187cf8790f17d184d2909fbec86726d782e04489 CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9238,2024-10-30T16:35:28.097000 CVE-2024-4429,0,0,a4a8f97ae1846585dda39a340897585bd413fb1368db5055aa3e7c7ef6d4f3eb,2024-11-21T09:42:48.820000 CVE-2024-44290,0,0,a4dddf7d169f59d934e3f36c25bd68c3faeeefc9236f774590a595c178936f53,2024-12-13T18:48:09.450000 -CVE-2024-44291,0,0,53a56237ea1e7d6e5c858d1b6137fae2128c85bfef7716dac95de07b55abc9ab,2024-12-13T18:47:31.063000 +CVE-2024-44291,0,1,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000 CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000 CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000 CVE-2024-44296,0,0,5fa9d13f224f3a0a67aaaa3541de4a3651fe9910d7529312fb8483d35af02925,2024-11-14T14:58:09.900000 @@ -265235,7 +265243,7 @@ CVE-2024-46965,0,0,1066f06ee90db61e408bbe2d843509e64ad66e7a9a1562e4d7a7d1ae721e0 CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf77c4,2024-11-12T16:35:20.790000 CVE-2024-4697,0,0,6e9eec3fc18bbe27148fb3ae709181d18ecd5466c486132eee5af6541f60f69a,2024-11-21T09:43:23.923000 CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000 -CVE-2024-46971,0,1,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 +CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 CVE-2024-46976,0,0,4a868e4ee15a8784e07959c2ee26d78428d60c159c11da76b493608d7f56cb35,2024-09-23T18:27:05.920000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000 @@ -265745,7 +265753,7 @@ CVE-2024-47615,0,0,1e7e51bc45d5cf3054b50029ee0b74c6141b26d094987b2cc502887a8837f CVE-2024-47616,0,0,e468a01c0ad8c1681bd9bcca10b68d0dc49f1762ba4c73b0fcd42c94c3a03664,2024-10-04T13:50:43.727000 CVE-2024-47617,0,0,6808f4f1a39cfd172fc3fb97ceefa056192d82fd1335e0915ad2252e36090af2,2024-10-08T14:23:38.597000 CVE-2024-47618,0,0,78fd78bfc1ee9f9650f798677686d5a20d8d5637ae000c91b6ecc17157cb2c51,2024-10-08T14:31:08.180000 -CVE-2024-4762,1,1,a3163a743228cda70c3e716dec6fd5f6ada0ce0400946d6f1092a9a2ebfdaf62,2024-12-16T17:15:10.293000 +CVE-2024-4762,0,0,a3163a743228cda70c3e716dec6fd5f6ada0ce0400946d6f1092a9a2ebfdaf62,2024-12-16T17:15:10.293000 CVE-2024-47621,0,0,24c7d12632fae81dae57a37a5b9f4d27578d7bdf885d211dcd4b13e46e4d9403,2024-10-07T17:47:48.410000 CVE-2024-47622,0,0,a3dc84911791c77b917c749c1e01448deaa7e792ce6d73c8d1758a783dc6cc2e,2024-10-07T17:47:48.410000 CVE-2024-47623,0,0,2d2a09587308ade86dc798bcbea924f9fd883ad7f0d040d292d0dfffee2e7737,2024-10-07T17:47:48.410000 @@ -266006,7 +266014,7 @@ CVE-2024-47887,0,0,05e0a87333ebcefed57bd44f1f3c52d3dd803588d2239babfcd7a157a94de CVE-2024-47888,0,0,f29473c64160f0d588a7ca069a65eb155d847c3556eac13a0a5e08def2ade22e,2024-10-18T12:53:04.627000 CVE-2024-47889,0,0,fbc19ced86c6fe97c19cf36af507f82d2f6cb4f350a639ca6656c9db442c9b66,2024-10-18T12:53:04.627000 CVE-2024-4789,0,0,cb1fce1149cb253592c06cf88232fe30f43f7e24305ca3501b7b2ce5d58908d4,2024-11-21T09:43:36.877000 -CVE-2024-47892,0,0,b0647c20d23b76b9f72c7893d0f040447c8a78722840a83b3104691c675e657a,2024-12-13T18:15:20.773000 +CVE-2024-47892,0,1,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000 CVE-2024-4790,0,0,b9d76a36166d9f8d4bd7b87bb2c3b8f2d1cb59ae69b213b42a13db79aa975016,2024-11-21T09:43:36.990000 CVE-2024-47901,0,0,3165d7a5ba37411c22ef300e066496e43f11ee0c48270295fa8bb2b50803f6e5,2024-10-30T15:39:47.430000 CVE-2024-47902,0,0,fdda8971bba9d387ffd8bac2920cf21627a1eb6b178788f8572a5ebbd51c29b6,2024-10-30T15:48:39.207000 @@ -266880,7 +266888,7 @@ CVE-2024-49509,0,0,15e897a9631a64e5146680986f3191fcf788babf34f3f0ba79ae3fe2c381d CVE-2024-49510,0,0,5e39a02e4fdffae2c7a663bfd00500c029c1db2acc5c0e5406cd285743c01041,2024-11-16T00:35:01.073000 CVE-2024-49511,0,0,1ccfa6e8c66c4ee14d0fcfa1d4c2c0cb523a129998f43db64fa514a90d65cbbe,2024-11-16T00:34:33.607000 CVE-2024-49512,0,0,a84d30bdef56eee22b653ecf431eedca8d6beb3b76f7aeffe4966ed165543146,2024-11-16T00:34:20.890000 -CVE-2024-49513,0,1,b2fb61682fed6cde802ab0730fb1c05405d7c8608105274c8ac6621cfcde654b,2024-12-16T17:15:10.130000 +CVE-2024-49513,0,0,b2fb61682fed6cde802ab0730fb1c05405d7c8608105274c8ac6621cfcde654b,2024-12-16T17:15:10.130000 CVE-2024-49514,0,0,49167289c5b9d01fc885a7ca0339bf6627a9365daa3fab2d195910d5101cdbe8,2024-11-18T18:06:39.030000 CVE-2024-49515,0,0,79d1cd1b41e183c3a6d8383ca22dee59ebc2441ad64ca67571e15c6d3f39714a,2024-11-13T19:14:24.320000 CVE-2024-49516,0,0,44da5d94482e4b65792e0d29a7ef15205438256f74e207e521457b4cb0fb7589,2024-11-13T18:52:31.573000 @@ -268695,7 +268703,7 @@ CVE-2024-5206,0,0,8862c9be0fc374f53d6a02e5cb7505c5867d3e503357cffe44c63c1a9e66a5 CVE-2024-52060,0,0,18f1256ab3d6852f48f968f1902cb4107c271bb78216cc646a4bcef88942b790,2024-12-13T11:15:08.250000 CVE-2024-52061,0,0,ab981c6d91409a6ac5416291455be06ffe6402aac260743b410c3675ec9b7081,2024-12-13T11:15:08.457000 CVE-2024-52062,0,0,9cef536c00eb4351a80045adcdd7e506152ef4f270748c6e5bddc1880cd2bc7c,2024-12-13T11:15:08.650000 -CVE-2024-52063,0,1,7a6afd44d161800d9c8740fa49dea8feee1ef81467e8a3706ccf15445337afc7,2024-12-16T17:15:10.447000 +CVE-2024-52063,0,0,7a6afd44d161800d9c8740fa49dea8feee1ef81467e8a3706ccf15445337afc7,2024-12-16T17:15:10.447000 CVE-2024-52064,0,0,0d18e131fc7e89f10cf68b52ce32e2b2f1c76e1c25d8a9de9298ac2a236b87a3,2024-12-13T11:15:08.963000 CVE-2024-52065,0,0,20622e3b8298552e80849fb5202abcc08093790cf97372052dda001ec3b1b8e9,2024-12-13T11:15:09.153000 CVE-2024-52066,0,0,fde8b125981152661f1db0f33a3e6317391aee06310a64853575f1255982c717,2024-12-13T11:15:09.330000 @@ -269376,7 +269384,7 @@ CVE-2024-53292,0,0,67896e5cb823d0bbe120641ca2bcb7973e9580249f1b4ecda20948602273c CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000 CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000 CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000 -CVE-2024-5333,0,1,1d3705c6bc4744e8e3eb9c87a588924584572eaf82247ac0ac89df0229e84c6a,2024-12-16T17:15:14.070000 +CVE-2024-5333,0,0,1d3705c6bc4744e8e3eb9c87a588924584572eaf82247ac0ac89df0229e84c6a,2024-12-16T17:15:14.070000 CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04a94,2024-11-25T22:15:18.437000 CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000 CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e004,2024-11-26T18:15:19.850000 @@ -270052,7 +270060,7 @@ CVE-2024-54441,0,0,a08b486e295172eb894273ccaf7d82132ef8ac3f77926b6a73e4266679abb CVE-2024-54442,0,0,69dca484a65627a3db8bf4fb838f1eb265ef0927a339a4c7e14aeb30335cda17,2024-12-16T15:15:23.273000 CVE-2024-54443,0,0,a43da47516f57b915c394add4b1398be1ec579a2e3d328952334629aec11fe1e,2024-12-16T15:15:23.420000 CVE-2024-5445,0,0,868cf662746874f2c335da1d583d2882ec8b61a1e57de341d372842bb0244e3a,2024-08-12T13:41:36.517000 -CVE-2024-54465,0,1,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 +CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,007391ad25f3f19d155f1bab4a612386e47b938cdb46a1c1a05637652e9969fd,2024-12-12T22:15:08.213000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54471,0,0,3399111b76a7b53e131dff58753f99905e82fd008f1a9ed162ad52c89d594216,2024-12-12T16:15:55.950000 @@ -270070,18 +270078,18 @@ CVE-2024-54490,0,0,c9e4c1429e731bd179f20aab70aeee375f0d36f7057499db1067f78db87f4 CVE-2024-54491,0,0,afc05a90c1d51c0b62bf52d12f45769b8d505c87568084c8c093af75ff19393c,2024-12-12T02:15:30.270000 CVE-2024-54492,0,0,5e3a77ae659a4113d5b55016a3f4440c88587b0fc2445aec92e8b7442d659aba,2024-12-12T16:15:56.273000 CVE-2024-54493,0,0,fa153b7b9aa4539638e8a2a5a8a0f6bc0ba6e98aa0e9ed776ffdda5b5b98dbb4,2024-12-13T18:30:16.170000 -CVE-2024-54494,0,0,c0ff45495edd162001ebf0e08361ca31305b7bf0256f5abeaee2725cf2aded4d,2024-12-13T18:31:39.147000 +CVE-2024-54494,0,1,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d056236b8,2024-12-16T19:15:08.730000 CVE-2024-54495,0,0,825356483bede3c696f83519e0501adc4ff397d5ebea830f404158ec73582f7d,2024-12-12T16:15:56.437000 -CVE-2024-54498,0,0,495164397c8191b586fead6b508dfca41e3c768c6d12d0da619841796cbe07f4,2024-12-13T18:32:52.320000 +CVE-2024-54498,0,1,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000 CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000 CVE-2024-54500,0,0,657f282c345a307f53f35dde04bf557f78e33359ddf485d7b8b3507dfe14769f,2024-12-13T18:34:26.490000 CVE-2024-54501,0,0,53a4207c1a9b8c09d2aa36aac95634b59bf35106c5d727899990d0735b43a2db,2024-12-12T17:15:10.837000 CVE-2024-54502,0,0,4fcd6d230b9c5da2bf606cc321abba798a8639dec496d3faadfe85d3a2ced000,2024-12-12T16:15:56.587000 CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1dffb7,2024-12-13T19:15:09.727000 -CVE-2024-54504,0,1,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 +CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 CVE-2024-54506,0,0,f3c9936de04cf0352e94a0776d19df77b7b910899450a047ad1a7929caefdd5e,2024-12-13T18:05:06.697000 -CVE-2024-54508,0,0,d82aafd1ac83ca8b155b333126afeb5d4f991f9c386a8ce4d7c2372e8c125034,2024-12-13T18:12:13.617000 +CVE-2024-54508,0,1,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000 CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000 CVE-2024-54510,0,0,41760ed29ca005a3bcf19679bc5f9d3112d6162f99c7272e8e6073225291c2cc,2024-12-13T18:07:49.633000 CVE-2024-54513,0,0,59e90aab7af338ce166e9f6872df66dd31c7c6fbffec6972f97a29bde7559e69,2024-12-13T18:09:28.273000 @@ -270090,8 +270098,8 @@ CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 CVE-2024-54524,0,0,5b400e695af2f949d2ec71578d693bc64ad75aad1f72a1927a39d0da75803b87,2024-12-12T17:15:11.020000 CVE-2024-54526,0,0,5fe80ed567b42449b16cdfc3f7c9f75255e5408646acb0f69e438853f07ce57d,2024-12-13T17:55:52.693000 -CVE-2024-54527,0,0,fd8f5a38018b615bcc5d3dcc6da328016fd0b73db55eb59edce33c26ec0bc9d2,2024-12-13T17:47:26.727000 -CVE-2024-54528,0,0,d466ec3bff369c5fb04a0921cfbb92dee0a4d697dd839b36096b6a12f0a8ce27,2024-12-13T17:45:11.457000 +CVE-2024-54527,0,1,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000 +CVE-2024-54528,0,1,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000 CVE-2024-54529,0,0,4f4002a20fd537285918affdb270ea26020a04c1a9cd33ae156b57c42a237915,2024-12-12T16:15:56.893000 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 CVE-2024-54531,0,0,77a28364b39df5a511304a7cdd09940993fbe1e52e5cca830c8822d706f1a755,2024-12-13T17:38:22.317000 @@ -270255,9 +270263,9 @@ CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b0 CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000 CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000 CVE-2024-55635,0,0,392082c131c01336e2210c07f5a3e2fcbd7cb3b3f9054eec0bafd4ca472aaecc,2024-12-10T22:15:28.190000 -CVE-2024-55636,0,1,e49650b1673b5336fe0733d223e8fc2e472caad48f40b65ffc4ecff5eab92986,2024-12-16T18:15:11.463000 -CVE-2024-55637,0,1,418fc59eaddba6292c7ca9a157c9abc724d8230c1bf6179e0194990ea93fb105,2024-12-16T18:15:11.673000 -CVE-2024-55638,0,1,27d92259e0a78066bb2529c55e1965f2134ea587303667a5ef98e650405575d4,2024-12-16T18:15:11.840000 +CVE-2024-55636,0,0,e49650b1673b5336fe0733d223e8fc2e472caad48f40b65ffc4ecff5eab92986,2024-12-16T18:15:11.463000 +CVE-2024-55637,0,0,418fc59eaddba6292c7ca9a157c9abc724d8230c1bf6179e0194990ea93fb105,2024-12-16T18:15:11.673000 +CVE-2024-55638,0,0,27d92259e0a78066bb2529c55e1965f2134ea587303667a5ef98e650405575d4,2024-12-16T18:15:11.840000 CVE-2024-5564,0,0,3aa73f6c6404c243b9f6f394613afc94e063551efa8746acdefa8554437d3ac7,2024-11-21T09:47:56.340000 CVE-2024-5565,0,0,d611550f5bcf5e6c3db2413f5bd8aaf6eb30fde2563331d26a9ad58249b7304a,2024-11-25T13:15:07.310000 CVE-2024-55652,0,0,4e4448d6da8b16d3811a29eb55a690e8e4ef0fe299bd552eafd44d61141bd125,2024-12-12T17:15:11.360000 @@ -270270,7 +270278,7 @@ CVE-2024-5566,0,0,55157068cefe792f617f9d985299d525c0156c753cbd8d7bb670501225f08f CVE-2024-55660,0,0,bb75a16480348fa6d1893b3e4763c05ed3e1549b7a047b3a3d210779427c4866,2024-12-12T02:15:32.883000 CVE-2024-55661,0,0,4f0405ceece48b162a2157b55e3981ad45cff9a2e9b9b9367364f1a6b02720e8,2024-12-13T18:15:22.190000 CVE-2024-55662,0,0,5f3e0832ea8bbd347e885237023ed979e1c2fc577ad7a47ca0fcd7d157677ad6,2024-12-13T15:15:42.707000 -CVE-2024-55663,0,1,6066b47367f611fab692f0fb249f3441422f3b2dae28d65605194c6e1d397dab,2024-12-16T18:15:12.030000 +CVE-2024-55663,0,0,6066b47367f611fab692f0fb249f3441422f3b2dae28d65605194c6e1d397dab,2024-12-16T18:15:12.030000 CVE-2024-5567,0,0,58e82791c8fea00e3d24c3a38ca7e73d8284e730929acebb640917b4f39b60a1,2024-09-26T18:27:51.817000 CVE-2024-5569,0,0,af3784ad99fd1d8f40146e3cc0f791571d7dbaa8c15694f8f3c51428e2663498,2024-11-21T09:47:56.840000 CVE-2024-5570,0,0,af32f7b53ec97ba40a01429c66641e4f606201cbce98a2ca05767d4db7dc87d4,2024-11-21T09:47:56.960000 @@ -270307,12 +270315,14 @@ CVE-2024-55890,0,0,7f383a6beccba3f0b6e9f9555af9afd741b32aa9506d7cefb6965499101a9 CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000 CVE-2024-55918,0,0,764befe1a81d30c325050e2d2ea25c5ad49296c459456a79ce12e40a8529ce8f,2024-12-13T07:15:04.827000 CVE-2024-55946,0,0,fc4f0ce08741733d6f453b541d54aef404252708bb0bc4e901bbe32fa2942160,2024-12-13T21:15:13.603000 +CVE-2024-55949,1,1,fec4714a7969da92415b3b75b53f65d595fb44a2f90ba2d94f1f93dfae92a1f1,2024-12-16T20:15:13.683000 CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000 -CVE-2024-55956,0,1,f8dba9cc41cb9c12a5d90cb11c5a713786122e87fdd5f0d27b32d4206660fe63,2024-12-16T18:15:12.170000 +CVE-2024-55951,1,1,0f2ba68ba5d937d3f08ffc28ee064a50ef5129020d2db58a508d614718a5fb19,2024-12-16T20:15:13.823000 +CVE-2024-55956,0,0,f8dba9cc41cb9c12a5d90cb11c5a713786122e87fdd5f0d27b32d4206660fe63,2024-12-16T18:15:12.170000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 -CVE-2024-55969,0,1,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000 +CVE-2024-55969,0,0,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000 CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000 -CVE-2024-55970,0,1,758b82af3b693a427bceeb6ff3980817487e79e485f9519217bb4cb4cf8b571e,2024-12-16T17:15:12.517000 +CVE-2024-55970,0,0,758b82af3b693a427bceeb6ff3980817487e79e485f9519217bb4cb4cf8b571e,2024-12-16T17:15:12.517000 CVE-2024-55972,0,0,1c44851ff34933b5d9d20c1d43229f33a01d18ccacf7c33b8ab8ff687a3ae63c,2024-12-16T15:15:23.613000 CVE-2024-55973,0,0,88c683f476bee0b08a38ad5028fbfed3d3c5274f5b3a1ebfb1df181a1a2f2141,2024-12-16T15:15:23.767000 CVE-2024-55974,0,0,64a3805e2dde6492ed0dae16ddb2d242bbca0f63953aa16f3a50643bc6d911ba,2024-12-16T15:15:24.397000 @@ -270353,12 +270363,12 @@ CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40 CVE-2024-5605,0,0,a58f7d5ea1a1f097543f1fa828fe0f4d77e53004da146d280334895bad6f3fd1,2024-11-21T09:48:00.363000 CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000 CVE-2024-5607,0,0,2f2e883967a2421396c2c72ed671760bd1b0ce90e12a34d10be305825ec8d97f,2024-11-21T09:48:00.667000 -CVE-2024-56072,0,1,88ae4fab448aef17d7ce79e69ee4a7b01a08327e8323b97aaa0bf31e47edc0fa,2024-12-16T17:15:13.500000 -CVE-2024-56073,0,1,0848d69945fe346d4c559540376bcd3a06c98d1fb7ba30ac0206a01b1e587ab0,2024-12-16T17:15:13.700000 +CVE-2024-56072,0,0,88ae4fab448aef17d7ce79e69ee4a7b01a08327e8323b97aaa0bf31e47edc0fa,2024-12-16T17:15:13.500000 +CVE-2024-56073,0,0,0848d69945fe346d4c559540376bcd3a06c98d1fb7ba30ac0206a01b1e587ab0,2024-12-16T17:15:13.700000 CVE-2024-56074,0,0,4a0e54489986d9a8929c35bb21fa99462f381a7418844c952c8f6fe6d433d784,2024-12-16T16:15:09.250000 CVE-2024-5608,0,0,ced92374bfec9f9526a30572e667eb2d7d2eee08d2b8c010b292f0924bebbe2c,2024-11-26T01:42:21.587000 CVE-2024-56082,0,0,df77aa083621f3cbe4f477b0149a9cf1724aee6e10bd2b96a61219d972b348a1,2024-12-16T16:15:09.460000 -CVE-2024-56083,0,1,fd98be0687525a64c3d2adcf2c9aeb18be62f2da53efa9ebfffaaf9bc8f12f62,2024-12-16T17:15:13.883000 +CVE-2024-56083,0,0,fd98be0687525a64c3d2adcf2c9aeb18be62f2da53efa9ebfffaaf9bc8f12f62,2024-12-16T17:15:13.883000 CVE-2024-56084,0,0,6555848ae48b9f6dd50622badb3bd2ee416e5c7c85e8d4c41399c1928fe22792,2024-12-16T16:15:09.647000 CVE-2024-56085,0,0,84b6c02bec28fda12b581609dc9c482f299fc4f7b2fdd8ef29c683562f037bcf,2024-12-16T16:15:09.803000 CVE-2024-56086,0,0,55b2e18e9093ba91193d6a87cd1d557d79b0006f86d41a690637db3e2c4eeda7,2024-12-16T16:15:09.980000 @@ -270721,8 +270731,8 @@ CVE-2024-5996,0,0,ab938dbc15262bb65cf82c58e85d96d3d9a41bba3218e574f8e961fd3a4906 CVE-2024-5997,0,0,f6cf4585516235311dc7c2c69a92d03bff08a1630eacba144d0b12e98a2e8657,2024-11-21T09:48:43.213000 CVE-2024-5998,0,0,7ba9585e81929506742dd30133b73214729ccaf495e2aa027e4714602d643d3a,2024-09-20T12:31:20.110000 CVE-2024-6000,0,0,c0a8f2199fd2fc04da26fd71b681e578569b3771e08f3f8f75db1489fb51c7ac,2024-11-21T09:48:43.430000 -CVE-2024-6001,1,1,957fe6d4263378be18d134528e5428759b67132090ddb85901a9e793426494f5,2024-12-16T17:15:14.197000 -CVE-2024-6002,1,1,3350b4fcbe46a034a4e9ee31a02622ace816cc3f126f77f8e0afd03f3f95671f,2024-12-16T18:15:12.450000 +CVE-2024-6001,0,0,957fe6d4263378be18d134528e5428759b67132090ddb85901a9e793426494f5,2024-12-16T17:15:14.197000 +CVE-2024-6002,0,0,3350b4fcbe46a034a4e9ee31a02622ace816cc3f126f77f8e0afd03f3f95671f,2024-12-16T18:15:12.450000 CVE-2024-6003,0,0,adb3112b68aa60fc319f3564467d2c4f7d8c9831c68441a431a933e87ad435a6,2024-11-21T09:48:43.547000 CVE-2024-6004,0,0,258c39032f92beea0e983412df12cc6591803e84d5bdedbab39737c02a0d5b1e,2024-08-19T13:00:23.117000 CVE-2024-6005,0,0,1699306c262156bd4b14bac7e2ef337c50c9b17dd77b065bdf89f8998bd042d6,2024-11-21T09:48:43.753000 @@ -272512,7 +272522,7 @@ CVE-2024-8051,0,0,8e9fee878d5e7631408c4906ee6d422d2dad39846c3e9dba922a4347408bef CVE-2024-8052,0,0,01bfdadf93739fc2d4fcd8ca2ee549a442e377fc63e756e286ed6ad0eef90332,2024-09-27T16:55:57.383000 CVE-2024-8054,0,0,7587a87813e515f4d1b36dbcf3c7051a83e94df022103a0c59749ae8c66becaa,2024-09-27T21:29:57.607000 CVE-2024-8056,0,0,0063e3259bfec678c90e65014b514e3fc5b53335b06f114b8add8272bc670dcc,2024-09-27T21:29:42.600000 -CVE-2024-8058,1,1,5efe7e7e9014524245ca57089952638fc63f2431b68fe541d88c7d12ec883d0c,2024-12-16T18:15:12.540000 +CVE-2024-8058,0,0,5efe7e7e9014524245ca57089952638fc63f2431b68fe541d88c7d12ec883d0c,2024-12-16T18:15:12.540000 CVE-2024-8059,0,0,1cb4facf7c91a3d9a97ccb8a1f3191711112656d77de35de0353c495e40da8b5,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8066,0,0,23914c4c07a72976bf77323f8c8c88f9f1b5c360164b6197b2a6c72e85e345f6,2024-11-28T09:15:05.547000 @@ -273003,7 +273013,7 @@ CVE-2024-8656,0,0,403ed5b713c43d0e625c54134680d1118ac365ee33193bdde3ef22cd6a0adb CVE-2024-8657,0,0,35487f66388ace382ae60356590b1a9376e3018439381cf40929f6dd0dd0df9b,2024-09-27T12:56:20.197000 CVE-2024-8658,0,0,3055fc3c8c0944bb2ac3c860af1759c9ae3c571089e9631e6e88513236dd9041,2024-10-02T18:36:04.033000 CVE-2024-8660,0,0,6ac7e512da3fefb771292aa9a242b39094ddf315245abb92399e6992d0314a28,2024-09-23T23:00:00.437000 -CVE-2024-8661,0,0,9bfad7e60f4541a6e6317660dfad89b9e2e8bc2b02ca340efb20c636e433fd9a,2024-09-25T16:15:11.420000 +CVE-2024-8661,0,1,b3acbfd494809f815c0725df9f1b535f2239bd94875eebc104c0f350e8b49230,2024-12-16T19:08:45.253000 CVE-2024-8662,0,0,07aaa78a9172b47f546499f1ba4f57de3ca53b83853f3398d9eb610df51ab6b1,2024-09-27T12:54:36.160000 CVE-2024-8663,0,0,5adc6eeca6686214501cf1ad3f8033367967de21b8e09f239210e10680277c7f,2024-09-27T16:35:46.740000 CVE-2024-8664,0,0,b52cf42f833632750dc6e11d24502d518cea0ef5ad6973d4df90947fe619cf7f,2024-09-27T13:48:58.270000