From b18b1b8d01d5ce1ed1f69b8ea2e88f07c782078c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 17 Dec 2024 17:04:01 +0000 Subject: [PATCH] Auto-Update: 2024-12-17T17:00:37.496493+00:00 --- CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json | 32 +- CVE-2019/CVE-2019-135xx/CVE-2019-13510.json | 6 +- CVE-2019/CVE-2019-135xx/CVE-2019-13511.json | 6 +- CVE-2019/CVE-2019-135xx/CVE-2019-13519.json | 6 +- CVE-2019/CVE-2019-135xx/CVE-2019-13521.json | 6 +- CVE-2019/CVE-2019-135xx/CVE-2019-13527.json | 6 +- CVE-2019/CVE-2019-170xx/CVE-2019-17082.json | 6 +- CVE-2022/CVE-2022-343xx/CVE-2022-34357.json | 172 ++++++++++- CVE-2022/CVE-2022-484xx/CVE-2022-48486.json | 32 +- CVE-2022/CVE-2022-484xx/CVE-2022-48489.json | 12 +- CVE-2022/CVE-2022-484xx/CVE-2022-48490.json | 12 +- CVE-2022/CVE-2022-484xx/CVE-2022-48492.json | 12 +- CVE-2022/CVE-2022-484xx/CVE-2022-48493.json | 12 +- CVE-2022/CVE-2022-484xx/CVE-2022-48494.json | 12 +- CVE-2022/CVE-2022-484xx/CVE-2022-48496.json | 12 +- CVE-2022/CVE-2022-484xx/CVE-2022-48497.json | 12 +- CVE-2023/CVE-2023-211xx/CVE-2023-21113.json | 111 ++++++- CVE-2023/CVE-2023-211xx/CVE-2023-21114.json | 99 +++++- CVE-2023/CVE-2023-278xx/CVE-2023-27854.json | 8 +- CVE-2023/CVE-2023-278xx/CVE-2023-27858.json | 8 +- CVE-2023/CVE-2023-294xx/CVE-2023-29460.json | 10 +- CVE-2023/CVE-2023-294xx/CVE-2023-29461.json | 10 +- CVE-2023/CVE-2023-294xx/CVE-2023-29462.json | 10 +- CVE-2023/CVE-2023-341xx/CVE-2023-34156.json | 12 +- CVE-2023/CVE-2023-373xx/CVE-2023-37327.json | 83 ++++- CVE-2023/CVE-2023-373xx/CVE-2023-37328.json | 71 ++++- CVE-2023/CVE-2023-373xx/CVE-2023-37329.json | 81 ++++- CVE-2023/CVE-2023-381xx/CVE-2023-38103.json | 73 ++++- CVE-2023/CVE-2023-381xx/CVE-2023-38104.json | 73 ++++- CVE-2023/CVE-2023-404xx/CVE-2023-40474.json | 66 +++- CVE-2023/CVE-2023-404xx/CVE-2023-40475.json | 66 +++- CVE-2024/CVE-2024-00xx/CVE-2024-0024.json | 90 +++++- CVE-2024/CVE-2024-00xx/CVE-2024-0025.json | 90 +++++- CVE-2024/CVE-2024-00xx/CVE-2024-0026.json | 90 +++++- CVE-2024/CVE-2024-00xx/CVE-2024-0027.json | 92 +++++- CVE-2024/CVE-2024-00xx/CVE-2024-0042.json | 61 +++- CVE-2024/CVE-2024-00xx/CVE-2024-0043.json | 92 +++++- CVE-2024/CVE-2024-00xx/CVE-2024-0044.json | 110 ++++++- CVE-2024/CVE-2024-00xx/CVE-2024-0045.json | 90 +++++- CVE-2024/CVE-2024-104xx/CVE-2024-10476.json | 56 ++++ CVE-2024/CVE-2024-111xx/CVE-2024-11156.json | 6 +- CVE-2024/CVE-2024-114xx/CVE-2024-11422.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12130.json | 6 +- CVE-2024/CVE-2024-121xx/CVE-2024-12178.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12179.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12191.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12192.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12193.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12194.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12197.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12198.json | 56 ++++ CVE-2024/CVE-2024-121xx/CVE-2024-12199.json | 56 ++++ CVE-2024/CVE-2024-122xx/CVE-2024-12200.json | 56 ++++ CVE-2024/CVE-2024-126xx/CVE-2024-12669.json | 56 ++++ CVE-2024/CVE-2024-126xx/CVE-2024-12670.json | 56 ++++ CVE-2024/CVE-2024-126xx/CVE-2024-12671.json | 56 ++++ CVE-2024/CVE-2024-19xx/CVE-2024-1931.json | 139 ++++++++- CVE-2024/CVE-2024-219xx/CVE-2024-21912.json | 6 +- CVE-2024/CVE-2024-219xx/CVE-2024-21913.json | 6 +- CVE-2024/CVE-2024-219xx/CVE-2024-21918.json | 6 +- CVE-2024/CVE-2024-219xx/CVE-2024-21919.json | 6 +- CVE-2024/CVE-2024-219xx/CVE-2024-21920.json | 6 +- CVE-2024/CVE-2024-231xx/CVE-2024-23107.json | 82 ++++- CVE-2024/CVE-2024-236xx/CVE-2024-23665.json | 91 +++++- CVE-2024/CVE-2024-236xx/CVE-2024-23667.json | 85 +++++- CVE-2024/CVE-2024-236xx/CVE-2024-23668.json | 85 +++++- CVE-2024/CVE-2024-236xx/CVE-2024-23670.json | 85 +++++- CVE-2024/CVE-2024-236xx/CVE-2024-23695.json | 61 +++- CVE-2024/CVE-2024-236xx/CVE-2024-23696.json | 61 +++- CVE-2024/CVE-2024-236xx/CVE-2024-23697.json | 61 +++- CVE-2024/CVE-2024-236xx/CVE-2024-23698.json | 61 +++- CVE-2024/CVE-2024-237xx/CVE-2024-23704.json | 80 ++++- CVE-2024/CVE-2024-237xx/CVE-2024-23705.json | 90 +++++- CVE-2024/CVE-2024-237xx/CVE-2024-23706.json | 75 ++++- CVE-2024/CVE-2024-237xx/CVE-2024-23707.json | 75 ++++- CVE-2024/CVE-2024-237xx/CVE-2024-23708.json | 90 +++++- CVE-2024/CVE-2024-237xx/CVE-2024-23709.json | 90 +++++- CVE-2024/CVE-2024-237xx/CVE-2024-23710.json | 82 ++++- CVE-2024/CVE-2024-237xx/CVE-2024-23711.json | 61 +++- CVE-2024/CVE-2024-237xx/CVE-2024-23712.json | 92 +++++- CVE-2024/CVE-2024-237xx/CVE-2024-23713.json | 90 +++++- CVE-2024/CVE-2024-296xx/CVE-2024-29671.json | 45 ++- CVE-2024/CVE-2024-29xx/CVE-2024-2929.json | 6 +- CVE-2024/CVE-2024-313xx/CVE-2024-31310.json | 92 +++++- CVE-2024/CVE-2024-352xx/CVE-2024-35230.json | 10 +- CVE-2024/CVE-2024-368xx/CVE-2024-36831.json | 68 +++++ CVE-2024/CVE-2024-368xx/CVE-2024-36832.json | 33 ++ CVE-2024/CVE-2024-376xx/CVE-2024-37605.json | 33 ++ CVE-2024/CVE-2024-376xx/CVE-2024-37606.json | 33 ++ CVE-2024/CVE-2024-376xx/CVE-2024-37607.json | 33 ++ CVE-2024/CVE-2024-377xx/CVE-2024-37773.json | 45 ++- CVE-2024/CVE-2024-377xx/CVE-2024-37774.json | 45 ++- CVE-2024/CVE-2024-377xx/CVE-2024-37775.json | 45 ++- CVE-2024/CVE-2024-384xx/CVE-2024-38499.json | 36 ++- CVE-2024/CVE-2024-437xx/CVE-2024-43712.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43719.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43720.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43725.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43726.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43727.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43728.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43729.json | 67 +++- CVE-2024/CVE-2024-437xx/CVE-2024-43730.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43731.json | 67 +++- CVE-2024/CVE-2024-437xx/CVE-2024-43732.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43733.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43734.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43735.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43736.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43737.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43738.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43739.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43740.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43742.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43743.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43744.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43745.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43746.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43747.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43748.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43749.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43750.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43751.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43752.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43754.json | 33 +- CVE-2024/CVE-2024-437xx/CVE-2024-43755.json | 67 +++- CVE-2024/CVE-2024-44xx/CVE-2024-4453.json | 103 ++++++- CVE-2024/CVE-2024-528xx/CVE-2024-52816.json | 33 +- CVE-2024/CVE-2024-528xx/CVE-2024-52817.json | 33 +- CVE-2024/CVE-2024-528xx/CVE-2024-52818.json | 33 +- CVE-2024/CVE-2024-531xx/CVE-2024-53144.json | 37 +++ CVE-2024/CVE-2024-550xx/CVE-2024-55085.json | 41 ++- CVE-2024/CVE-2024-554xx/CVE-2024-55452.json | 41 ++- CVE-2024/CVE-2024-555xx/CVE-2024-55557.json | 45 ++- README.md | 79 +++-- _state.csv | 285 ++++++++++-------- 136 files changed, 6168 insertions(+), 614 deletions(-) create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10476.json create mode 100644 CVE-2024/CVE-2024-114xx/CVE-2024-11422.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12178.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12179.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12191.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12192.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12193.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12194.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12197.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12198.json create mode 100644 CVE-2024/CVE-2024-121xx/CVE-2024-12199.json create mode 100644 CVE-2024/CVE-2024-122xx/CVE-2024-12200.json create mode 100644 CVE-2024/CVE-2024-126xx/CVE-2024-12669.json create mode 100644 CVE-2024/CVE-2024-126xx/CVE-2024-12670.json create mode 100644 CVE-2024/CVE-2024-126xx/CVE-2024-12671.json create mode 100644 CVE-2024/CVE-2024-368xx/CVE-2024-36831.json create mode 100644 CVE-2024/CVE-2024-368xx/CVE-2024-36832.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37605.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37606.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37607.json create mode 100644 CVE-2024/CVE-2024-531xx/CVE-2024-53144.json diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json index bed52da13fb..84595afb8f7 100644 --- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json +++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125106.json @@ -2,7 +2,7 @@ "id": "CVE-2014-125106", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-17T22:15:09.267", - "lastModified": "2024-11-21T02:03:49.167", + "lastModified": "2024-12-17T16:15:19.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-135xx/CVE-2019-13510.json b/CVE-2019/CVE-2019-135xx/CVE-2019-13510.json index cedf9a77a57..3b3e2c9c39f 100644 --- a/CVE-2019/CVE-2019-135xx/CVE-2019-13510.json +++ b/CVE-2019/CVE-2019-135xx/CVE-2019-13510.json @@ -2,7 +2,7 @@ "id": "CVE-2019-13510", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2019-08-15T19:15:10.873", - "lastModified": "2024-11-21T04:25:02.420", + "lastModified": "2024-12-17T15:52:51.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,9 +95,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation_software:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.00.00", - "matchCriteriaId": "6575954E-D71C-4BBE-9C4F-F7422CDABCE1" + "matchCriteriaId": "9E10639E-C9C9-44BC-8184-041CE16114F9" } ] } diff --git a/CVE-2019/CVE-2019-135xx/CVE-2019-13511.json b/CVE-2019/CVE-2019-135xx/CVE-2019-13511.json index 9a3d39cec78..b8c3c0a84eb 100644 --- a/CVE-2019/CVE-2019-135xx/CVE-2019-13511.json +++ b/CVE-2019/CVE-2019-135xx/CVE-2019-13511.json @@ -2,7 +2,7 @@ "id": "CVE-2019-13511", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2019-08-15T19:15:10.950", - "lastModified": "2024-11-21T04:25:02.580", + "lastModified": "2024-12-17T15:52:51.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,9 +95,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation_software:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.00.00", - "matchCriteriaId": "6575954E-D71C-4BBE-9C4F-F7422CDABCE1" + "matchCriteriaId": "9E10639E-C9C9-44BC-8184-041CE16114F9" } ] } diff --git a/CVE-2019/CVE-2019-135xx/CVE-2019-13519.json b/CVE-2019/CVE-2019-135xx/CVE-2019-13519.json index c02db046202..72bf5dc695e 100644 --- a/CVE-2019/CVE-2019-135xx/CVE-2019-13519.json +++ b/CVE-2019/CVE-2019-135xx/CVE-2019-13519.json @@ -2,7 +2,7 @@ "id": "CVE-2019-13519", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2020-01-27T23:15:10.437", - "lastModified": "2024-11-21T04:25:03.680", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,9 +95,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.00.00", - "matchCriteriaId": "D908D4F6-51AE-4101-8814-393535F3BC6D" + "matchCriteriaId": "9E10639E-C9C9-44BC-8184-041CE16114F9" } ] } diff --git a/CVE-2019/CVE-2019-135xx/CVE-2019-13521.json b/CVE-2019/CVE-2019-135xx/CVE-2019-13521.json index 6c68886c9f6..d30e2293692 100644 --- a/CVE-2019/CVE-2019-135xx/CVE-2019-13521.json +++ b/CVE-2019/CVE-2019-135xx/CVE-2019-13521.json @@ -2,7 +2,7 @@ "id": "CVE-2019-13521", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2020-01-27T23:15:10.497", - "lastModified": "2024-11-21T04:25:03.963", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,9 +95,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.00.00", - "matchCriteriaId": "D908D4F6-51AE-4101-8814-393535F3BC6D" + "matchCriteriaId": "9E10639E-C9C9-44BC-8184-041CE16114F9" } ] } diff --git a/CVE-2019/CVE-2019-135xx/CVE-2019-13527.json b/CVE-2019/CVE-2019-135xx/CVE-2019-13527.json index 448b99bf972..54b7635fb3c 100644 --- a/CVE-2019/CVE-2019-135xx/CVE-2019-13527.json +++ b/CVE-2019/CVE-2019-135xx/CVE-2019-13527.json @@ -2,7 +2,7 @@ "id": "CVE-2019-13527", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2019-09-24T22:15:12.967", - "lastModified": "2024-11-21T04:25:04.833", + "lastModified": "2024-12-17T15:52:51.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -95,9 +95,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation_software:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.00.00", - "matchCriteriaId": "6575954E-D71C-4BBE-9C4F-F7422CDABCE1" + "matchCriteriaId": "9E10639E-C9C9-44BC-8184-041CE16114F9" } ] } diff --git a/CVE-2019/CVE-2019-170xx/CVE-2019-17082.json b/CVE-2019/CVE-2019-170xx/CVE-2019-17082.json index cde79c792d2..4465b01e62b 100644 --- a/CVE-2019/CVE-2019-170xx/CVE-2019-17082.json +++ b/CVE-2019/CVE-2019-170xx/CVE-2019-17082.json @@ -2,13 +2,13 @@ "id": "CVE-2019-17082", "sourceIdentifier": "security@opentext.com", "published": "2024-11-26T20:15:19.957", - "lastModified": "2024-11-26T20:15:19.957", + "lastModified": "2024-12-17T16:15:21.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Authentication for Critical Function vulnerability in OpenText\u2122 AccuRev for LDAP Integration allows Authentication Bypass. The vulnerability could allow\u00a0\n\na valid AccuRev username to gain access to AccuRev source control without knowing the user\u2019s password.\n\nThis issue affects AccuRev for LDAP Integration: 2017.1." + "value": "Insufficiently Protected Credentials vulnerability in OpenText\u2122 AccuRev allows Authentication Bypass. When installed on a Linux or Solaris system\n\nthe vulnerability could allow\u00a0anyone who knows a valid AccuRev username can use the AccuRev client to login and gain access to AccuRev source control without knowing the user\u2019s password.\n\nThis issue affects AccuRev: 2017.1." }, { "lang": "es", @@ -68,7 +68,7 @@ "description": [ { "lang": "en", - "value": "CWE-306" + "value": "CWE-522" } ] } diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json index 06381cbb1a6..7f142f15b8e 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34357.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34357", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-26T16:27:45.427", - "lastModified": "2024-11-21T07:09:21.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:49:34.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,38 +71,170 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.1.1", + "versionEndExcluding": "11.1.7", + "matchCriteriaId": "A20C428C-F583-4E8B-A9E0-F8E04F9692D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2.0", + "versionEndExcluding": "11.2.4", + "matchCriteriaId": "FA7F561D-2D45-4BDB-AE84-1BD057DC9930" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*", + "matchCriteriaId": "6680448A-C3B3-4FEE-A500-974681D3E731" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack1:*:*:*:*:*:*", + "matchCriteriaId": "A2E66D31-A2CC-4F06-89D3-9A881EADE0FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack2:*:*:*:*:*:*", + "matchCriteriaId": "A76630E7-2DEB-4992-A671-85729B80E46B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack3:*:*:*:*:*:*", + "matchCriteriaId": "38BDC609-EA7D-4C15-868A-EC8D8FFD3AF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack4:*:*:*:*:*:*", + "matchCriteriaId": "BCF5213D-4BB1-4109-8B1B-5CA129819692" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack5:*:*:*:*:*:*", + "matchCriteriaId": "C3F972B5-E6C3-4D95-8C61-B9F90C1BAC36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack6:*:*:*:*:*:*", + "matchCriteriaId": "0AA6713E-8BB8-476E-AE6F-E42645B1556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack7:*:*:*:*:*:*", + "matchCriteriaId": "D934D062-F4AE-4AFF-88FA-599A1E68E8BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.2.4:-:*:*:*:*:*:*", + "matchCriteriaId": "A1D81212-AFFE-4A73-AAC1-E558973FC452" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack1:*:*:*:*:*:*", + "matchCriteriaId": "07DC144D-62FC-4808-A77A-642871C1F8FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack2:*:*:*:*:*:*", + "matchCriteriaId": "2A61B920-B490-48A8-BF00-13B8854683FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:12.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "210893AF-E67A-49C1-80FC-59A1F1C1B32F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cognos_analytics:12.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "CFDD4A63-2F81-48C8-8400-E1BE15C8EA3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230510", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240405-0001/", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7123154", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230510", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240405-0001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7123154", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json index f361800f31d..90b68839c8c 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48486.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48486", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.333", - "lastModified": "2024-11-21T07:33:25.450", + "lastModified": "2024-12-17T16:15:22.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json index 8034cdbf810..a6cc67ca103 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48489.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48489", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.467", - "lastModified": "2024-11-21T07:33:25.750", + "lastModified": "2024-12-17T16:15:22.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json index 1d057574b22..67df1e774da 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48490.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48490", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.507", - "lastModified": "2024-11-21T07:33:25.847", + "lastModified": "2024-12-17T16:15:22.357", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json index ccf25b154cb..9aa3a335dc3 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48492.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48492", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.590", - "lastModified": "2024-11-21T07:33:26.050", + "lastModified": "2024-12-17T16:15:22.517", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json index 9b924530c28..775d9dc4289 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48493.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48493", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.633", - "lastModified": "2024-11-21T07:33:26.150", + "lastModified": "2024-12-17T16:15:22.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json index 99bdf4cfb79..24a8919f0f2 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48494.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48494", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.673", - "lastModified": "2024-11-21T07:33:26.240", + "lastModified": "2024-12-17T16:15:22.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json index 705045566b1..45e8ced25bc 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48496.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48496", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.753", - "lastModified": "2024-11-21T07:33:26.463", + "lastModified": "2024-12-17T16:15:22.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json index 1e3a8d8df58..9ea72a13483 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48497.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48497", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:11.793", - "lastModified": "2024-11-21T07:33:26.563", + "lastModified": "2024-12-17T16:15:23.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json index 9561577407d..0e7c5702b5f 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21113.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21113", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:10.717", - "lastModified": "2024-11-21T07:42:11.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:58:29.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,38 +59,109 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/build/soong/+/e7b7f0833dc47ade981eddfbf462dcc143dddd10", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/17dd11248a66b2722aa3ef07701b7f09a64160e5", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/prebuilts/module_sdk/Wifi/+/c705bae1a4d50bd7b4f8cc919097d1aae568dd22", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/build/soong/+/e7b7f0833dc47ade981eddfbf462dcc143dddd10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/17dd11248a66b2722aa3ef07701b7f09a64160e5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/prebuilts/module_sdk/Wifi/+/c705bae1a4d50bd7b4f8cc919097d1aae568dd22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json index 65e67e7708c..268d96b2d25 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21114.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21114", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:10.803", - "lastModified": "2024-11-21T07:42:11.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:55:34.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/e6ca0c031758d8b1511f6a359bec316b6d2e22fe", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/f39ed052916716ef974102b3bad7ae102d0164a5", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/f88a2294f53cf382908cc48f992273742f817dd5", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/e6ca0c031758d8b1511f6a359bec316b6d2e22fe", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/f39ed052916716ef974102b3bad7ae102d0164a5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/f88a2294f53cf382908cc48f992273742f817dd5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27854.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27854.json index be5c1b33627..49ed4fbf672 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27854.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27854.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27854", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-10-27T19:15:41.157", - "lastModified": "2024-11-21T07:53:34.923", - "vulnStatus": "Modified", + "lastModified": "2024-12-17T16:14:05.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.20.02", - "matchCriteriaId": "0AE2589A-AD92-4199-B117-B84E54C4F810" + "matchCriteriaId": "3DBAECB8-1538-4190-806F-0326B910B18C" } ] } diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27858.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27858.json index 0f4f8799a7e..9a4553c65a4 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27858.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27858.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27858", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-10-27T19:15:41.230", - "lastModified": "2024-11-21T07:53:35.400", - "vulnStatus": "Modified", + "lastModified": "2024-12-17T16:13:20.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.20.02", - "matchCriteriaId": "0AE2589A-AD92-4199-B117-B84E54C4F810" + "matchCriteriaId": "3DBAECB8-1538-4190-806F-0326B910B18C" } ] } diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29460.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29460.json index 29be7a99aa1..2748a13d6fd 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29460.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29460.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29460", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-09T14:15:13.217", - "lastModified": "2024-11-21T07:57:06.090", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,13 +86,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.00.00:*:*:*:*:*:*:*", - "matchCriteriaId": "B42EE5A3-B6F0-4D21-B3F8-7EBBC5B8A53B" + "criteria": "cpe:2.3:a:rockwellautomation:arena:16.00.00:*:*:*:*:*:*:*", + "matchCriteriaId": "C6723E99-02D0-4A2C-BAFA-8D05069A2CB7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.20.00:*:*:*:*:*:*:*", - "matchCriteriaId": "4FAF4B54-35C6-4D7F-B940-FC5C70B56BB8" + "criteria": "cpe:2.3:a:rockwellautomation:arena:16.20.00:*:*:*:*:*:*:*", + "matchCriteriaId": "4D2E0344-ABC2-4C88-9DE4-F158FDC7AF1B" } ] } diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29461.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29461.json index 9b6baa5c8a6..d9fbcbad338 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29461.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29461.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29461", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-09T14:15:13.283", - "lastModified": "2024-11-21T07:57:06.197", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,13 +86,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.00.00:*:*:*:*:*:*:*", - "matchCriteriaId": "B42EE5A3-B6F0-4D21-B3F8-7EBBC5B8A53B" + "criteria": "cpe:2.3:a:rockwellautomation:arena:16.00.00:*:*:*:*:*:*:*", + "matchCriteriaId": "C6723E99-02D0-4A2C-BAFA-8D05069A2CB7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.20.00:*:*:*:*:*:*:*", - "matchCriteriaId": "4FAF4B54-35C6-4D7F-B940-FC5C70B56BB8" + "criteria": "cpe:2.3:a:rockwellautomation:arena:16.20.00:*:*:*:*:*:*:*", + "matchCriteriaId": "4D2E0344-ABC2-4C88-9DE4-F158FDC7AF1B" } ] } diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json index 4dbdcd5e22d..28ceacf72a6 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29462", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-09T14:15:13.343", - "lastModified": "2024-11-21T07:57:06.303", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,13 +86,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.00.00:*:*:*:*:*:*:*", - "matchCriteriaId": "B42EE5A3-B6F0-4D21-B3F8-7EBBC5B8A53B" + "criteria": "cpe:2.3:a:rockwellautomation:arena:16.00.00:*:*:*:*:*:*:*", + "matchCriteriaId": "C6723E99-02D0-4A2C-BAFA-8D05069A2CB7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:16.20.01:*:*:*:*:*:*:*", - "matchCriteriaId": "4936FF5A-4C83-43B8-A1EC-43D9ED255EAD" + "criteria": "cpe:2.3:a:rockwellautomation:arena:16.20.01:*:*:*:*:*:*:*", + "matchCriteriaId": "93702BD6-43E8-4EC0-9FC2-D277C757D2BE" } ] } diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json index 8922dd8c4c1..997244ee887 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34156.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34156", "sourceIdentifier": "psirt@huawei.com", "published": "2023-06-19T17:15:12.050", - "lastModified": "2024-11-21T08:06:40.190", + "lastModified": "2024-12-17T16:15:23.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37327.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37327.json index e250e636be0..76bb61a65d7 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37327.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37327.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37327", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:43.270", - "lastModified": "2024-11-21T08:11:30.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:42:36.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,73 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.7", + "matchCriteriaId": "16D9672F-9F1F-4065-8184-B00C15FEE3F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.22.0", + "versionEndExcluding": "1.22.4", + "matchCriteriaId": "8E9EAE6D-1F4C-4E14-A01D-7CB8B9D1ED42" + } + ] + } + ] } ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0001.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-903/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0001.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-903/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json index df438a4299d..92ee0dd021d 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37328.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37328", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:43.450", - "lastModified": "2024-11-21T08:11:30.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:42:51.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.7", + "matchCriteriaId": "16D9672F-9F1F-4065-8184-B00C15FEE3F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.22.0", + "versionEndExcluding": "1.22.4", + "matchCriteriaId": "8E9EAE6D-1F4C-4E14-A01D-7CB8B9D1ED42" + } + ] + } + ] + } + ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0003.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-901/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0003.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-901/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37329.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37329.json index aebb6420a97..4783cec274c 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37329.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37329.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37329", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:43.613", - "lastModified": "2024-11-21T08:11:30.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:40:41.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,71 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.20.7", + "matchCriteriaId": "16D9672F-9F1F-4065-8184-B00C15FEE3F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.22.0", + "versionEndExcluding": "1.22.4", + "matchCriteriaId": "8E9EAE6D-1F4C-4E14-A01D-7CB8B9D1ED42" + } + ] + } + ] } ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0002.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-902/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0002.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-902/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38103.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38103.json index 3fc8752c66e..068d66705f0 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38103.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38103", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:53.323", - "lastModified": "2024-11-21T08:12:51.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:42:00.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,63 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:1.22.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60424A7B-4CB7-4EF3-A16A-98CE5B24AF47" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/uploads/d4a0aa4ec2165f6c418703b9e1459d8b/0002-rmdemux-Check-for-integer-overflow-when-calculation-.patch", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1007/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/uploads/d4a0aa4ec2165f6c418703b9e1459d8b/0002-rmdemux-Check-for-integer-overflow-when-calculation-.patch", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1007/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38104.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38104.json index a8e53634fd9..17282f2ca4e 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38104.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38104.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38104", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:53.510", - "lastModified": "2024-11-21T08:12:52.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:42:12.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,63 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:1.22.3:*:*:*:*:*:*:*", + "matchCriteriaId": "60424A7B-4CB7-4EF3-A16A-98CE5B24AF47" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/uploads/d4a0aa4ec2165f6c418703b9e1459d8b/0002-rmdemux-Check-for-integer-overflow-when-calculation-.patch", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1008/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/uploads/d4a0aa4ec2165f6c418703b9e1459d8b/0002-rmdemux-Check-for-integer-overflow-when-calculation-.patch", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1008/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json index 689f6e8c5f5..f7428d94610 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40474.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40474", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:19.967", - "lastModified": "2024-11-21T08:19:32.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:36:32.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.22.6", + "matchCriteriaId": "99462063-5988-4579-B0AA-4230CFF4680E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0006.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1456/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0006.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1456/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json index 236f80403b9..fd5fe8046e0 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40475.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40475", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:20.137", - "lastModified": "2024-11-21T08:19:32.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:36:49.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.22.6", + "matchCriteriaId": "99462063-5988-4579-B0AA-4230CFF4680E" + } + ] + } + ] + } + ], "references": [ { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0007.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1457/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gstreamer.freedesktop.org/security/sa-2023-0007.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1457/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json index 16f6d5cd8e0..57a8670fb3b 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0024", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.367", - "lastModified": "2024-11-21T08:45:43.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:48:14.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/6a9250ec7fc9801a883cedd7860076f42fb518ac", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/6a9250ec7fc9801a883cedd7860076f42fb518ac", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0025.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0025.json index 9e2a5955528..719723633d7 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0025.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0025.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0025", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.410", - "lastModified": "2024-11-21T08:45:44.037", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:48:34.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/d49662560e366dbf69bf7d59d00e73905d03e6d5", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/d49662560e366dbf69bf7d59d00e73905d03e6d5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json index e00826e2f72..2237a108ed8 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0026.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0026", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.460", - "lastModified": "2024-11-21T08:45:44.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:48:55.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/a8fb9fe93efdebc4145e00934f42c91742f328de", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/a8fb9fe93efdebc4145e00934f42c91742f328de", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0027.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0027.json index c5dfdec21fa..7597b6bcf64 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0027.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0027.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0027", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.500", - "lastModified": "2024-11-21T08:45:44.467", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:46:34.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/a8fb9fe93efdebc4145e00934f42c91742f328de", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/a8fb9fe93efdebc4145e00934f42c91742f328de", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json index 826e8e07b27..41562d54853 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0042", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.540", - "lastModified": "2024-11-21T08:45:46.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:47:02.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json index 222d960f751..b444bd1e274 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0043.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0043", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.583", - "lastModified": "2024-11-21T08:45:47.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:47:21.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Permission/+/8141e8f4dd77b9f8fb485e23ddf028c57fcd4fca", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Permission/+/8141e8f4dd77b9f8fb485e23ddf028c57fcd4fca", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json index 8fa3708e493..436dbccba32 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0044", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.450", - "lastModified": "2024-11-21T08:45:47.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T15:50:36.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,98 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json index a1d408cf418..0cf6e7a636c 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0045.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0045", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.507", - "lastModified": "2024-11-21T08:45:47.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T15:41:13.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7d0f696f450241d8ba7a168ba14fa7b75032f0c9", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/7d0f696f450241d8ba7a168ba14fa7b75032f0c9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10476.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10476.json new file mode 100644 index 00000000000..9d05b76fc8d --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10476.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-10476", + "sourceIdentifier": "cybersecurity@bd.com", + "published": "2024-12-17T16:15:23.390", + "lastModified": "2024-12-17T16:15:23.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Default credentials are used in the above listed BD Diagnostic Solutions products. If exploited, threat actors may be able to access, modify or delete data, including sensitive information such as protected health information (PHI) and personally identifiable information (PII). Exploitation of this vulnerability may allow an attacker to shut down or otherwise impact the availability of the system. Note: BD Synapsys\u2122 Informatics\nSolution is only in scope of\nthis vulnerability when\ninstalled on a NUC server. BD Synapsys\u2122\nInformatics Solution installed\non a customer-provided virtual machine or on the BD Kiestra\u2122 SCU hardware is\nnot in scope." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@bd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@bd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], + "references": [ + { + "url": "https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-cybersecurity-vulnerability-bulletin-diagnostic-solutions-products", + "source": "cybersecurity@bd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11156.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11156.json index a46da156206..695c6741bbb 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11156.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11156.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11156", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-12-05T18:15:21.103", - "lastModified": "2024-12-09T23:00:25.357", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -114,9 +114,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.20.03", - "matchCriteriaId": "923A86D7-30EF-45D9-B6CC-D20E308ACE53" + "matchCriteriaId": "BDAE8F85-64AE-4D05-A68D-F594836762E8" } ] } diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11422.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11422.json new file mode 100644 index 00000000000..23d18ee956e --- /dev/null +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11422.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11422", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:23.557", + "lastModified": "2024-12-17T16:15:23.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12130.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12130.json index 055a443f13b..2b322d253a8 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12130.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12130.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12130", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-12-05T18:15:21.507", - "lastModified": "2024-12-09T23:00:48.743", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -114,9 +114,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.20.03", - "matchCriteriaId": "923A86D7-30EF-45D9-B6CC-D20E308ACE53" + "matchCriteriaId": "BDAE8F85-64AE-4D05-A68D-F594836762E8" } ] } diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12178.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12178.json new file mode 100644 index 00000000000..1d7dc8af972 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12178.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12178", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:23.687", + "lastModified": "2024-12-17T16:15:23.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12179.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12179.json new file mode 100644 index 00000000000..44633875a4d --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12179.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12179", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:23.870", + "lastModified": "2024-12-17T16:15:23.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage\u00a0this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12191.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12191.json new file mode 100644 index 00000000000..792192d84fa --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12191.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12191", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.007", + "lastModified": "2024-12-17T16:15:24.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12192.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12192.json new file mode 100644 index 00000000000..9cf64c6637c --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12192.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12192", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.130", + "lastModified": "2024-12-17T16:15:24.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWF file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12193.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12193.json new file mode 100644 index 00000000000..f3aed6f8171 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12193.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12193", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.247", + "lastModified": "2024-12-17T16:15:24.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12194.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12194.json new file mode 100644 index 00000000000..a6198b88ee8 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12194.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12194", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.370", + "lastModified": "2024-12-17T16:15:24.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12197.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12197.json new file mode 100644 index 00000000000..1e97fd8235c --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12197.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12197", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.493", + "lastModified": "2024-12-17T16:15:24.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12198.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12198.json new file mode 100644 index 00000000000..b30fd2ee1ec --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12198.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12198", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.617", + "lastModified": "2024-12-17T16:15:24.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12199.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12199.json new file mode 100644 index 00000000000..6e210d96f77 --- /dev/null +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12199.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12199", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.750", + "lastModified": "2024-12-17T16:15:24.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12200.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12200.json new file mode 100644 index 00000000000..6335e65568d --- /dev/null +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12200.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12200", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:24.897", + "lastModified": "2024-12-17T16:15:24.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12669.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12669.json new file mode 100644 index 00000000000..861931a72e8 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12669.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12669", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:25.020", + "lastModified": "2024-12-17T16:15:25.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12670.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12670.json new file mode 100644 index 00000000000..540b5477b39 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12670", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:25.140", + "lastModified": "2024-12-17T16:15:25.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWF file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12671.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12671.json new file mode 100644 index 00000000000..6d2ee2839d0 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12671.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12671", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-12-17T16:15:25.260", + "lastModified": "2024-12-17T16:15:25.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://autodesk.com/trust/security-advisories/adsk-sa-2024-0027", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json index 3fa3861e651..320fc179f09 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1931.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1931", "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2024-03-07T10:15:07.037", - "lastModified": "2024-11-21T08:51:37.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:56:50.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,56 +69,147 @@ "value": "CWE-835" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.18.0", + "versionEndExcluding": "1.19.2", + "matchCriteriaId": "11B7D8E3-96EB-4EF0-8F07-08EAF2639FC0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCBRQ7KMSIGBQ6A4SBL5PF326DIJIIV/", - "source": "sep@nlnetlabs.nl" + "source": "sep@nlnetlabs.nl", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2JUIFPA7H75Q2W3VXW2TUNHK6NVGOX4/", - "source": "sep@nlnetlabs.nl" + "source": "sep@nlnetlabs.nl", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/", - "source": "sep@nlnetlabs.nl" + "source": "sep@nlnetlabs.nl", + "tags": [ + "Product" + ] }, { "url": "https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html", - "source": "sep@nlnetlabs.nl" + "source": "sep@nlnetlabs.nl", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240705-0006/", - "source": "sep@nlnetlabs.nl" + "source": "sep@nlnetlabs.nl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt", - "source": "sep@nlnetlabs.nl" + "source": "sep@nlnetlabs.nl", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCBRQ7KMSIGBQ6A4SBL5PF326DIJIIV/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2JUIFPA7H75Q2W3VXW2TUNHK6NVGOX4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240705-0006/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21912.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21912.json index b866330c6a8..c2ac688a512 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21912.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21912.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21912", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-03-26T16:15:10.440", - "lastModified": "2024-12-09T15:13:40.437", + "lastModified": "2024-12-17T16:16:07.373", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.00.00", "versionEndExcluding": "16.20.03", - "matchCriteriaId": "E2757075-A646-4F1C-B769-E8867D758D6B" + "matchCriteriaId": "7433512B-62BB-4412-BFBA-6EA4679B3778" } ] } diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21913.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21913.json index cf8576dac00..88ba04df0d6 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21913.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21913.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21913", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-03-26T16:15:10.670", - "lastModified": "2024-12-09T15:18:28.870", + "lastModified": "2024-12-17T16:16:24.157", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.00.00", "versionEndExcluding": "16.20.03", - "matchCriteriaId": "E2757075-A646-4F1C-B769-E8867D758D6B" + "matchCriteriaId": "7433512B-62BB-4412-BFBA-6EA4679B3778" } ] } diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21918.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21918.json index 760020ad1b9..cc32d417ee0 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21918.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21918.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21918", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-03-26T16:15:10.877", - "lastModified": "2024-12-09T15:18:49.257", + "lastModified": "2024-12-17T16:15:50.300", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.00.00", "versionEndExcluding": "16.20.03", - "matchCriteriaId": "E2757075-A646-4F1C-B769-E8867D758D6B" + "matchCriteriaId": "7433512B-62BB-4412-BFBA-6EA4679B3778" } ] } diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21919.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21919.json index fd0dee5e3ee..bba012224c0 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21919.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21919.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21919", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-03-26T16:15:11.073", - "lastModified": "2024-12-09T15:19:18.887", + "lastModified": "2024-12-17T16:16:16.773", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.00.00", "versionEndExcluding": "16.20.03", - "matchCriteriaId": "E2757075-A646-4F1C-B769-E8867D758D6B" + "matchCriteriaId": "7433512B-62BB-4412-BFBA-6EA4679B3778" } ] } diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21920.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21920.json index 43b9efec6be..cb4e988e347 100644 --- a/CVE-2024/CVE-2024-219xx/CVE-2024-21920.json +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21920.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21920", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-03-26T16:15:11.277", - "lastModified": "2024-12-09T15:25:59.723", + "lastModified": "2024-12-17T15:52:01.670", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.00.00", - "matchCriteriaId": "FDA1456A-04F5-4CD9-B1BC-2877F6F8F50F" + "matchCriteriaId": "C8A71AA4-C01D-47F2-B87F-96EF9B461BD1" } ] } diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json index bf2aa817c00..bcc97343f43 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23107", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T08:15:08.837", - "lastModified": "2024-11-21T08:56:56.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:51:35.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,70 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.23", + "matchCriteriaId": "29BAA789-62A7-4040-B6F7-8E70FFBA0399" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.9", + "matchCriteriaId": "35984797-44FF-47BD-88EA-5D10EC20B036" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.5", + "matchCriteriaId": "1C7674CB-CC74-4486-A6FB-CB95CA909C24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5E0DF8E-3272-4302-A1A0-F7981E383E47" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-191", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-191", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json index 8081d9a134a..acf74d6b991 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23665", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:12.870", - "lastModified": "2024-11-21T08:58:07.463", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:43:37.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,79 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.23", + "matchCriteriaId": "29BAA789-62A7-4040-B6F7-8E70FFBA0399" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.3", + "matchCriteriaId": "AF5ED7B3-39F3-49FD-82D9-72CAB2D68636" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndIncluding": "7.0.10", + "matchCriteriaId": "744A540A-BC0F-4F64-8F26-F309D895359B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.8", + "matchCriteriaId": "AA10A5FC-77B4-4FEE-AB50-EF76450268A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.3", + "matchCriteriaId": "B35B6E72-8578-4C35-80CF-66D0B74DAFC4" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-474", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-474", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json index 2c4242ef7d4..4fbf996d9e3 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23667", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:13.100", - "lastModified": "2024-11-21T08:58:07.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:38:56.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,73 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.3", + "versionEndExcluding": "6.2.5", + "matchCriteriaId": "C00F44FF-9533-4354-9060-A74E8F43E747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.5", + "matchCriteriaId": "403F07C3-8D48-4403-B9EE-0076F8639CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB742D6-5B08-4FF7-A366-F4CE1E91C9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A921BEEB-D912-471E-8176-8804F5CD5118" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C7475A8-52EB-413E-A196-6F43137B545F" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json index f5e2c7687b4..1137abc19a3 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23668", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:13.320", - "lastModified": "2024-11-21T08:58:07.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:38:42.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,73 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.3", + "versionEndExcluding": "6.2.5", + "matchCriteriaId": "C00F44FF-9533-4354-9060-A74E8F43E747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.5", + "matchCriteriaId": "403F07C3-8D48-4403-B9EE-0076F8639CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB742D6-5B08-4FF7-A366-F4CE1E91C9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A921BEEB-D912-471E-8176-8804F5CD5118" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C7475A8-52EB-413E-A196-6F43137B545F" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json index 2dcead7136f..5a9c480689d 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23670", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-03T10:15:13.523", - "lastModified": "2024-11-21T08:58:08.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:35:25.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,73 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.3", + "versionEndExcluding": "6.2.5", + "matchCriteriaId": "C00F44FF-9533-4354-9060-A74E8F43E747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.5", + "matchCriteriaId": "403F07C3-8D48-4403-B9EE-0076F8639CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB742D6-5B08-4FF7-A366-F4CE1E91C9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A921BEEB-D912-471E-8176-8804F5CD5118" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C7475A8-52EB-413E-A196-6F43137B545F" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json index de7cc56b71e..cba4b023a13 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23695.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23695", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:11.857", - "lastModified": "2024-11-21T08:58:11.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:52:47.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json index 1d1fba9d31b..bbcfe23e737 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23696.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23696", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:11.973", - "lastModified": "2024-11-21T08:58:11.327", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:52:14.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json index 61a2712064a..b6043711eda 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23697", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.047", - "lastModified": "2024-11-21T08:58:11.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:45:51.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json index 4e4cf5f2541..40ed7865d83 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23698", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.113", - "lastModified": "2024-11-21T08:58:11.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:36:40.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json index c0e3babe1a9..804a488104f 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23704.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23704", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.630", - "lastModified": "2024-11-21T08:58:11.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:42:42.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2e90322bab7de1deaf3c82e207bf4404b92743d7", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2e90322bab7de1deaf3c82e207bf4404b92743d7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json index 6b0d378ae56..f2f02d64591 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23705", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.680", - "lastModified": "2024-11-21T08:58:12.060", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:43:17.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/032bee6dc118ce1cc3fde92463b2954c1450f2e8", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/032bee6dc118ce1cc3fde92463b2954c1450f2e8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json index 771bfea8c19..5bb864b5975 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23706.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23706", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.737", - "lastModified": "2024-11-21T08:58:12.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:12:26.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/HealthFitness/+/6e6896c3fd8139779ff8d51a99ee06667e849d87", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/modules/HealthFitness/+/6e6896c3fd8139779ff8d51a99ee06667e849d87", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json index c9f109e407b..e3d9480a8b1 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23707.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23707", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.787", - "lastModified": "2024-11-21T08:58:12.457", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:21:58.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/f1d0079c91734168c150f839168544f407b17b06", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/f1d0079c91734168c150f839168544f407b17b06", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json index 2d5a2d1ad56..dba714c733e 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23708", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.830", - "lastModified": "2024-11-21T08:58:12.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:43:36.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/0c095c365ede36257e829769194f9596a598e560", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/0c095c365ede36257e829769194f9596a598e560", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json index 27af6517435..bfd3f5d2c85 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23709", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.877", - "lastModified": "2024-11-21T08:58:12.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:25:07.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-05-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json index 7e1033511bc..60504b0a356 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23710.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23710", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.930", - "lastModified": "2024-11-21T08:58:13.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:22:25.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/c7c1193ca7554fc3182ca9ab0f711bd118bdeef2", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/c7c1193ca7554fc3182ca9ab0f711bd118bdeef2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json index acf1aef7988..c11ca69b577 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23711.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23711", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.227", - "lastModified": "2024-11-21T08:58:13.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:33:38.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json index c4788c0eb28..e09ef37fcff 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23712.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23712", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.977", - "lastModified": "2024-11-21T08:58:13.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:10:52.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/6beb68ca17d1220f3f09a53cf0a0c541db4ead62", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/6beb68ca17d1220f3f09a53cf0a0c541db4ead62", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json index b88a1bbd922..5db8c71b435 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23713.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23713", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:09.017", - "lastModified": "2024-11-21T08:58:13.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:08:06.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/ffd616dc3b919fe7705dbc7a25868483ae45466b", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/ffd616dc3b919fe7705dbc7a25868483ae45466b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-04-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29671.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29671.json index bc2ec0946ac..69e8c426ad7 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29671.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29671.json @@ -2,16 +2,55 @@ "id": "CVE-2024-29671", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T22:15:05.623", - "lastModified": "2024-12-16T22:15:05.623", - "vulnStatus": "Received", + "lastModified": "2024-12-17T15:15:11.857", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in NEXTU FLATA AX1500 Router v.1.0.2 allows a remote attacker to execute arbitrary code via the POST request handler component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en el enrutador NEXTU FLATA AX1500 v.1.0.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente controlador de solicitud POST." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://ez-net.co.kr/new_2012/customer/download_view.php?cid=&sid=&goods=&cate=&q=Ax1500&seq=228", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2929.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2929.json index 89cc3d024c1..56fcce260e6 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2929.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2929.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2929", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-03-26T16:15:14.230", - "lastModified": "2024-12-09T15:19:43.377", + "lastModified": "2024-12-17T16:14:25.233", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rockwellautomation:arena_simulation:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:rockwellautomation:arena:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.00.00", "versionEndExcluding": "16.20.03", - "matchCriteriaId": "E2757075-A646-4F1C-B769-E8867D758D6B" + "matchCriteriaId": "7433512B-62BB-4412-BFBA-6EA4679B3778" } ] } diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json index 53326cd4bf0..c8fd77210ed 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31310.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31310", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:12.773", - "lastModified": "2024-11-21T09:13:15.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:31:31.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/74afbb05ca08738f66d82df867bbee66de4884bc", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/74afbb05ca08738f66d82df867bbee66de4884bc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-06-01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35230.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35230.json index d0fffc75c6c..2d373f21fa3 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35230.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35230.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35230", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-16T23:15:06.467", - "lastModified": "2024-12-16T23:15:06.467", - "vulnStatus": "Received", + "lastModified": "2024-12-17T15:15:12.403", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -59,6 +59,10 @@ { "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6pfc-w86r-54q6", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6pfc-w86r-54q6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36831.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36831.json new file mode 100644 index 00000000000..932e950dc7d --- /dev/null +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36831.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-36831", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-17T15:15:12.720", + "lastModified": "2024-12-17T16:15:25.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A NULL pointer dereference in the plugins_call_handle_uri_clean function of D-Link DAP-1520 REVA_FIRMWARE_1.10B04_BETA02_HOTFIX allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request without authentication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://docs.google.com/document/d/15CVb7XHIgtfeW1W1pLZJWvlBMYN1rtr75vqZqf1v3Eo/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10395", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36832.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36832.json new file mode 100644 index 00000000000..aca3b620de5 --- /dev/null +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36832.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-36832", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-17T15:15:13.097", + "lastModified": "2024-12-17T15:15:13.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.google.com/document/d/1qTpwAg7B5E4mqkBzijjuoOWWnf3OE1HXIKBv7OcS8Mc/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10396", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37605.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37605.json new file mode 100644 index 00000000000..6aff47a4b7c --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37605.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-37605", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-17T15:15:13.357", + "lastModified": "2024-12-17T15:15:13.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A NULL pointer dereference in D-Link DIR-860L REVB_FIRMWARE_2.04.B04_ic5b allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.google.com/document/d/1cWlVLaVvr_xzkqbKIXY7EW89hNHE89SSlNtesv6lzl8/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10397", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37606.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37606.json new file mode 100644 index 00000000000..d50329f59cd --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37606.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-37606", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-17T15:15:13.643", + "lastModified": "2024-12-17T15:15:13.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stack overflow vulnerability in D-Link DCS-932L REVB_FIRMWARE_2.18.01 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.google.com/document/d/1qWJh2jgEhmyeW3OefMQNsrlKdATMSU6Twjkk1p3qfAs/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10247", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37607.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37607.json new file mode 100644 index 00000000000..ae8608e1d35 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37607.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-37607", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-17T15:15:13.950", + "lastModified": "2024-12-17T15:15:13.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Buffer overflow vulnerability in D-Link DAP-2555 REVA_FIRMWARE_1.20 allows remote attackers to cause a Denial of Service (DoS) via a crafted HTTP request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.google.com/document/d/1haRDAIN8SbAF8qKNHAm1awnI_LCAPauR8T_pbFREnMM/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10232", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37773.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37773.json index f5c9bc73cce..00507126a38 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37773.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37773.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37773", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T22:15:05.947", - "lastModified": "2024-12-16T22:15:05.947", - "vulnStatus": "Received", + "lastModified": "2024-12-17T16:15:25.580", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An HTML injection vulnerability in Sunbird DCIM dcTrack 9.1.2 allows attackers authenticated as administrators to inject arbitrary HTML code in an admin screen." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n HTML en Sunbird DCIM dcTrack 9.1.2 permite a atacantes autenticados como administradores inyectar c\u00f3digo HTML arbitrario en una pantalla de administraci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://dctrack.com", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37774.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37774.json index 4f142416d46..64cc2ab4c33 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37774.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37774.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37774", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T22:15:06.127", - "lastModified": "2024-12-16T22:15:06.127", - "vulnStatus": "Received", + "lastModified": "2024-12-17T15:15:14.210", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) in Sunbird DCIM dcTrack v9.1.2 allows authenticated attackers to escalate their privileges by forcing an Administrator user to perform sensitive requests in some admin screens." + }, + { + "lang": "es", + "value": "Cross-Site Request Forgery (CSRF) en Sunbird DCIM dcTrack v9.1.2 permite a atacantes autenticados aumentar sus privilegios al obligar a un usuario administrador a realizar solicitudes confidenciales en algunas pantallas de administraci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://dctrack.com", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37775.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37775.json index 439f1890830..437dfdb9491 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37775.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37775.json @@ -2,16 +2,55 @@ "id": "CVE-2024-37775", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T22:15:06.310", - "lastModified": "2024-12-16T22:15:06.310", - "vulnStatus": "Received", + "lastModified": "2024-12-17T15:15:14.637", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in Sunbird DCIM dcTrack v9.1.2 allows attackers to create or update a ticket with a location which bypasses an RBAC check." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en Sunbird DCIM dcTrack v9.1.2 permite a los atacantes crear o actualizar un ticket con una ubicaci\u00f3n que evita una verificaci\u00f3n RBAC." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://dctrack.com", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38499.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38499.json index 6a8f6d64d6e..896b5da51e5 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38499.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38499.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38499", "sourceIdentifier": "secure@symantec.com", "published": "2024-12-17T06:15:20.760", - "lastModified": "2024-12-17T06:15:20.760", - "vulnStatus": "Received", + "lastModified": "2024-12-17T15:15:15.087", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -55,6 +55,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -67,6 +89,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43712.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43712.json index 4575ba548f9..eaac9135939 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43712.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43712.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43712", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:05.830", - "lastModified": "2024-12-10T22:15:05.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:23:11.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43719.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43719.json index 767fb02ddd6..e282c66b93f 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43719.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43719", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:07.010", - "lastModified": "2024-12-10T22:15:07.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:23:21.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43720.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43720.json index 04530301fab..7770d9f27ac 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43720.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43720.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43720", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:07.160", - "lastModified": "2024-12-10T22:15:07.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:23:30.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43725.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43725.json index 71a3045b25a..4f434e23075 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43725.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43725.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43725", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:07.987", - "lastModified": "2024-12-10T22:15:07.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:23:42.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43726.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43726.json index 2d361674cf0..7d6f44947e4 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43726.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43726.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43726", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.170", - "lastModified": "2024-12-10T22:15:08.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:23:50.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43727.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43727.json index 1b781a11bc7..a117903c50d 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43727.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43727.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43727", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.330", - "lastModified": "2024-12-10T22:15:08.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:08:59.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43728.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43728.json index be97c02cf53..b0e95a95812 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43728.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43728", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.500", - "lastModified": "2024-12-10T22:15:08.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:08:52.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json index e7e770b92c0..4d4bfeb99fa 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43729", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.653", - "lastModified": "2024-12-10T22:15:08.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:10:37.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", @@ -36,25 +36,82 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43730.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43730.json index d6336a80f60..836420d3bd6 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43730.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43730", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.800", - "lastModified": "2024-12-10T22:15:08.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:09:14.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json index c4e3607b5a1..65654aa54a0 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43731", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:08.953", - "lastModified": "2024-12-10T22:15:08.953", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:10:11.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", @@ -36,25 +36,82 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43732.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43732.json index 913910c292b..9ca4d976043 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43732.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43732", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:09.130", - "lastModified": "2024-12-10T22:15:09.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:08:29.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43733.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43733.json index 1f1845424ab..7cabc928029 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43733.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43733", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:09.330", - "lastModified": "2024-12-10T22:15:09.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:08:40.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43734.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43734.json index f72da642efe..ff7a5d5c17a 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43734.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43734", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:09.507", - "lastModified": "2024-12-10T22:15:09.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:10:05.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43735.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43735.json index 55e902a8532..2ec28999f47 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43735.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43735", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:09.670", - "lastModified": "2024-12-10T22:15:09.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:10:36.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43736.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43736.json index df76413d2a8..c83c65c1962 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43736.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43736", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:09.840", - "lastModified": "2024-12-10T22:15:09.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:10:47.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43737.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43737.json index 83a3732cd2a..c348c72bfe7 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43737.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43737", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:09.990", - "lastModified": "2024-12-10T22:15:09.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:10:57.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43738.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43738.json index f344349c455..7f8bfad3cd1 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43738.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43738", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:10.153", - "lastModified": "2024-12-10T22:15:10.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:11:07.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43739.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43739.json index 8ffb33b679b..f0d8ff09694 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43739.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43739", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:10.320", - "lastModified": "2024-12-10T22:15:10.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:19:59.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43740.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43740.json index 69c46a479c1..07310ab9519 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43740.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43740", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:10.480", - "lastModified": "2024-12-10T22:15:10.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:20:11.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43742.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43742.json index a7fad425cc2..a6fbeaf30a7 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43742.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43742", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:10.633", - "lastModified": "2024-12-10T22:15:10.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T15:20:22.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43743.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43743.json index 9d2d2d44a5b..60e5aad6157 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43743.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43743", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:10.787", - "lastModified": "2024-12-10T22:15:10.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:16:59.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43744.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43744.json index d1f2f869f2c..28579e195e1 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43744.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43744", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:10.950", - "lastModified": "2024-12-10T22:15:10.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:16:51.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43745.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43745.json index f154b6d62fa..d245b595c98 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43745.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43745", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:11.110", - "lastModified": "2024-12-10T22:15:11.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:16:42.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43746.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43746.json index 7fa1f9203a5..41755dc7552 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43746.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43746", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:11.277", - "lastModified": "2024-12-10T22:15:11.277", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:16:33.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43747.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43747.json index ac5fd703e79..10719a219fc 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43747.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43747", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:11.440", - "lastModified": "2024-12-10T22:15:11.440", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:16:24.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43748.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43748.json index 9ffa9f1ac24..a2030ed6f61 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43748.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43748.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43748", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:11.597", - "lastModified": "2024-12-10T22:15:11.597", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:16:15.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43749.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43749.json index 1fde1c877b8..1ad35767a22 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43749.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43749.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43749", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:11.763", - "lastModified": "2024-12-10T22:15:11.763", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:16:06.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43750.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43750.json index 4aa765400fb..3905fa010a2 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43750.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43750", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:11.913", - "lastModified": "2024-12-10T22:15:11.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:15:59.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43751.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43751.json index 2a668881186..96218c362ca 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43751.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43751.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43751", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:12.057", - "lastModified": "2024-12-10T22:15:12.057", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:15:49.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43752.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43752.json index 3e4f689b278..3ca21533b9a 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43752.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43752.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43752", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:12.203", - "lastModified": "2024-12-10T22:15:12.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:15:41.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43754.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43754.json index 99a4439a049..c690f6dc4e9 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43754.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43754.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43754", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:12.343", - "lastModified": "2024-12-10T22:15:12.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:15:30.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json index f1a1a289985..56f34b026b1 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43755.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43755", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:12.507", - "lastModified": "2024-12-10T22:15:12.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:17:28.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -36,25 +36,82 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4453.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4453.json index 9f8d8ec4a9f..477e017a79b 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4453.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4453", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-22T20:15:09.923", - "lastModified": "2024-11-21T09:42:51.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-17T16:05:41.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,32 +71,97 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:1.24.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FD1A19ED-2B05-4F3B-8822-5ABA92563A9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gstreamer_project:gstreamer:1.24.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D74948F1-BC87-4764-8B87-08DAD29B98C8" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00019.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-467/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00019.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-467/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52816.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52816.json index 757abc28596..cd69f2e6d41 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52816.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52816", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:13.527", - "lastModified": "2024-12-10T22:15:13.527", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:15:18.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52817.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52817.json index be6e321a337..d0ed418e3bc 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52817.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52817.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52817", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:13.703", - "lastModified": "2024-12-10T22:15:13.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:15:10.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52818.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52818.json index 6c90738f6ab..0c69e2f82e6 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52818.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52818.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52818", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T22:15:13.870", - "lastModified": "2024-12-10T22:15:13.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-17T16:15:02.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.22.0", + "matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.11.0", + "matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53144.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53144.json new file mode 100644 index 00000000000..84734087be7 --- /dev/null +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53144.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-53144", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-12-17T16:15:25.797", + "lastModified": "2024-12-17T16:15:25.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE\n\nThis aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4\n(\"Bluetooth: Always request for user confirmation for Just Works\")\nalways request user confirmation with confirm_hint set since the\nlikes of bluetoothd have dedicated policy around JUST_WORKS method\n(e.g. main.conf:JustWorksRepairing).\n\nCVE: CVE-2024-8805" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/5291ff856d2c5177b4fe9c18828312be30213193", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/830c03e58beb70b99349760f822e505ecb4eeb7e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ad7adfb95f64a761e4784381e47bee1a362eb30d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b25e11f978b63cb7857890edb3a698599cddb10e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/d17c631ba04e960eb6f8728b10d585de20ac4f71", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json index 511a08436a8..5b0aa29d234 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55085", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T23:15:06.607", - "lastModified": "2024-12-16T23:15:06.607", - "vulnStatus": "Received", + "lastModified": "2024-12-17T15:15:15.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "GetSimple CMS CE 3.3.19 suffers from arbitrary code execution in the template editing function in the background management system, which can be used by an attacker to implement RCE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://getsimple-ce.ovh/", diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55452.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55452.json index 140ca58b731..27b80a5e8e9 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55452.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55452.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55452", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T23:15:06.817", - "lastModified": "2024-12-16T23:15:06.817", - "vulnStatus": "Received", + "lastModified": "2024-12-17T15:15:16.287", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "A URL redirection vulnerability exists in UJCMS 9.6.3 due to improper validation of URLs in the upload and rendering of new block / carousel items. This vulnerability allows authenticated attackers to redirect unprivileged users to an arbitrary, attacker-controlled webpage. When an authenticated user clicks on the malicious block item, they are redirected to the arbitrary untrusted domains, where sensitive tokens, such as JSON Web Tokens, can be stolen via a crafted webpage." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/ujcms/OpenRedirect-BlockItemUpload.md", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55557.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55557.json index c9d4c8191e7..c596a214a5e 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55557.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55557.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55557", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-16T21:15:08.783", - "lastModified": "2024-12-16T21:15:08.783", - "vulnStatus": "Received", + "lastModified": "2024-12-17T16:15:25.900", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials." + }, + { + "lang": "es", + "value": "ui/pref/ProxyPrefView.java en weasis-core en Weasis 4.5.1 tiene una clave codificada para el cifrado sim\u00e9trico de las credenciales del proxy." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://apps.microsoft.com/detail/9nhtv46lg4nh?hl=en-us&gl=US", diff --git a/README.md b/README.md index a51fdda593c..e89dfa01960 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-17T15:00:52.615812+00:00 +2024-12-17T17:00:37.496493+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-17T14:59:24.850000+00:00 +2024-12-17T16:58:29.983000+00:00 ``` ### Last Data Feed Release @@ -33,38 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274129 +274150 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` - -- [CVE-2024-10356](CVE-2024/CVE-2024-103xx/CVE-2024-10356.json) (`2024-12-17T13:15:17.520`) -- [CVE-2024-50379](CVE-2024/CVE-2024-503xx/CVE-2024-50379.json) (`2024-12-17T13:15:18.810`) -- [CVE-2024-54677](CVE-2024/CVE-2024-546xx/CVE-2024-54677.json) (`2024-12-17T13:15:18.957`) -- [CVE-2024-8972](CVE-2024/CVE-2024-89xx/CVE-2024-8972.json) (`2024-12-17T14:15:20.110`) -- [CVE-2024-9819](CVE-2024/CVE-2024-98xx/CVE-2024-9819.json) (`2024-12-17T13:15:19.100`) +Recently added CVEs: `21` + +- [CVE-2024-10476](CVE-2024/CVE-2024-104xx/CVE-2024-10476.json) (`2024-12-17T16:15:23.390`) +- [CVE-2024-11422](CVE-2024/CVE-2024-114xx/CVE-2024-11422.json) (`2024-12-17T16:15:23.557`) +- [CVE-2024-12178](CVE-2024/CVE-2024-121xx/CVE-2024-12178.json) (`2024-12-17T16:15:23.687`) +- [CVE-2024-12179](CVE-2024/CVE-2024-121xx/CVE-2024-12179.json) (`2024-12-17T16:15:23.870`) +- [CVE-2024-12191](CVE-2024/CVE-2024-121xx/CVE-2024-12191.json) (`2024-12-17T16:15:24.007`) +- [CVE-2024-12192](CVE-2024/CVE-2024-121xx/CVE-2024-12192.json) (`2024-12-17T16:15:24.130`) +- [CVE-2024-12193](CVE-2024/CVE-2024-121xx/CVE-2024-12193.json) (`2024-12-17T16:15:24.247`) +- [CVE-2024-12194](CVE-2024/CVE-2024-121xx/CVE-2024-12194.json) (`2024-12-17T16:15:24.370`) +- [CVE-2024-12197](CVE-2024/CVE-2024-121xx/CVE-2024-12197.json) (`2024-12-17T16:15:24.493`) +- [CVE-2024-12198](CVE-2024/CVE-2024-121xx/CVE-2024-12198.json) (`2024-12-17T16:15:24.617`) +- [CVE-2024-12199](CVE-2024/CVE-2024-121xx/CVE-2024-12199.json) (`2024-12-17T16:15:24.750`) +- [CVE-2024-12200](CVE-2024/CVE-2024-122xx/CVE-2024-12200.json) (`2024-12-17T16:15:24.897`) +- [CVE-2024-12669](CVE-2024/CVE-2024-126xx/CVE-2024-12669.json) (`2024-12-17T16:15:25.020`) +- [CVE-2024-12670](CVE-2024/CVE-2024-126xx/CVE-2024-12670.json) (`2024-12-17T16:15:25.140`) +- [CVE-2024-12671](CVE-2024/CVE-2024-126xx/CVE-2024-12671.json) (`2024-12-17T16:15:25.260`) +- [CVE-2024-36831](CVE-2024/CVE-2024-368xx/CVE-2024-36831.json) (`2024-12-17T15:15:12.720`) +- [CVE-2024-36832](CVE-2024/CVE-2024-368xx/CVE-2024-36832.json) (`2024-12-17T15:15:13.097`) +- [CVE-2024-37605](CVE-2024/CVE-2024-376xx/CVE-2024-37605.json) (`2024-12-17T15:15:13.357`) +- [CVE-2024-37606](CVE-2024/CVE-2024-376xx/CVE-2024-37606.json) (`2024-12-17T15:15:13.643`) +- [CVE-2024-37607](CVE-2024/CVE-2024-376xx/CVE-2024-37607.json) (`2024-12-17T15:15:13.950`) +- [CVE-2024-53144](CVE-2024/CVE-2024-531xx/CVE-2024-53144.json) (`2024-12-17T16:15:25.797`) ### CVEs modified in the last Commit -Recently modified CVEs: `14` - -- [CVE-2021-47142](CVE-2021/CVE-2021-471xx/CVE-2021-47142.json) (`2024-12-17T14:56:12.967`) -- [CVE-2021-47144](CVE-2021/CVE-2021-471xx/CVE-2021-47144.json) (`2024-12-17T14:49:22.333`) -- [CVE-2023-1298](CVE-2023/CVE-2023-12xx/CVE-2023-1298.json) (`2024-12-17T13:58:11.560`) -- [CVE-2024-43713](CVE-2024/CVE-2024-437xx/CVE-2024-43713.json) (`2024-12-17T14:55:13.953`) -- [CVE-2024-43714](CVE-2024/CVE-2024-437xx/CVE-2024-43714.json) (`2024-12-17T14:55:24.553`) -- [CVE-2024-43715](CVE-2024/CVE-2024-437xx/CVE-2024-43715.json) (`2024-12-17T14:56:06.787`) -- [CVE-2024-43716](CVE-2024/CVE-2024-437xx/CVE-2024-43716.json) (`2024-12-17T14:58:24.220`) -- [CVE-2024-43717](CVE-2024/CVE-2024-437xx/CVE-2024-43717.json) (`2024-12-17T14:59:13.620`) -- [CVE-2024-43718](CVE-2024/CVE-2024-437xx/CVE-2024-43718.json) (`2024-12-17T14:59:24.850`) -- [CVE-2024-43721](CVE-2024/CVE-2024-437xx/CVE-2024-43721.json) (`2024-12-17T14:49:18.897`) -- [CVE-2024-43722](CVE-2024/CVE-2024-437xx/CVE-2024-43722.json) (`2024-12-17T14:49:31.107`) -- [CVE-2024-43723](CVE-2024/CVE-2024-437xx/CVE-2024-43723.json) (`2024-12-17T14:54:52.780`) -- [CVE-2024-43724](CVE-2024/CVE-2024-437xx/CVE-2024-43724.json) (`2024-12-17T14:54:45.177`) -- [CVE-2024-8434](CVE-2024/CVE-2024-84xx/CVE-2024-8434.json) (`2024-12-17T14:36:19.633`) +Recently modified CVEs: `113` + +- [CVE-2024-43736](CVE-2024/CVE-2024-437xx/CVE-2024-43736.json) (`2024-12-17T15:10:47.857`) +- [CVE-2024-43737](CVE-2024/CVE-2024-437xx/CVE-2024-43737.json) (`2024-12-17T15:10:57.970`) +- [CVE-2024-43738](CVE-2024/CVE-2024-437xx/CVE-2024-43738.json) (`2024-12-17T15:11:07.987`) +- [CVE-2024-43739](CVE-2024/CVE-2024-437xx/CVE-2024-43739.json) (`2024-12-17T15:19:59.487`) +- [CVE-2024-43740](CVE-2024/CVE-2024-437xx/CVE-2024-43740.json) (`2024-12-17T15:20:11.820`) +- [CVE-2024-43742](CVE-2024/CVE-2024-437xx/CVE-2024-43742.json) (`2024-12-17T15:20:22.327`) +- [CVE-2024-43743](CVE-2024/CVE-2024-437xx/CVE-2024-43743.json) (`2024-12-17T16:16:59.607`) +- [CVE-2024-43744](CVE-2024/CVE-2024-437xx/CVE-2024-43744.json) (`2024-12-17T16:16:51.287`) +- [CVE-2024-43745](CVE-2024/CVE-2024-437xx/CVE-2024-43745.json) (`2024-12-17T16:16:42.720`) +- [CVE-2024-43746](CVE-2024/CVE-2024-437xx/CVE-2024-43746.json) (`2024-12-17T16:16:33.503`) +- [CVE-2024-43747](CVE-2024/CVE-2024-437xx/CVE-2024-43747.json) (`2024-12-17T16:16:24.517`) +- [CVE-2024-43748](CVE-2024/CVE-2024-437xx/CVE-2024-43748.json) (`2024-12-17T16:16:15.663`) +- [CVE-2024-43749](CVE-2024/CVE-2024-437xx/CVE-2024-43749.json) (`2024-12-17T16:16:06.303`) +- [CVE-2024-43750](CVE-2024/CVE-2024-437xx/CVE-2024-43750.json) (`2024-12-17T16:15:59.023`) +- [CVE-2024-43751](CVE-2024/CVE-2024-437xx/CVE-2024-43751.json) (`2024-12-17T16:15:49.793`) +- [CVE-2024-43752](CVE-2024/CVE-2024-437xx/CVE-2024-43752.json) (`2024-12-17T16:15:41.260`) +- [CVE-2024-43754](CVE-2024/CVE-2024-437xx/CVE-2024-43754.json) (`2024-12-17T16:15:30.050`) +- [CVE-2024-43755](CVE-2024/CVE-2024-437xx/CVE-2024-43755.json) (`2024-12-17T16:17:28.580`) +- [CVE-2024-4453](CVE-2024/CVE-2024-44xx/CVE-2024-4453.json) (`2024-12-17T16:05:41.267`) +- [CVE-2024-52816](CVE-2024/CVE-2024-528xx/CVE-2024-52816.json) (`2024-12-17T16:15:18.873`) +- [CVE-2024-52817](CVE-2024/CVE-2024-528xx/CVE-2024-52817.json) (`2024-12-17T16:15:10.480`) +- [CVE-2024-52818](CVE-2024/CVE-2024-528xx/CVE-2024-52818.json) (`2024-12-17T16:15:02.203`) +- [CVE-2024-55085](CVE-2024/CVE-2024-550xx/CVE-2024-55085.json) (`2024-12-17T15:15:15.840`) +- [CVE-2024-55452](CVE-2024/CVE-2024-554xx/CVE-2024-55452.json) (`2024-12-17T15:15:16.287`) +- [CVE-2024-55557](CVE-2024/CVE-2024-555xx/CVE-2024-55557.json) (`2024-12-17T16:15:25.900`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4b937f283ef..33a0c1132d6 100644 --- a/_state.csv +++ b/_state.csv @@ -65720,7 +65720,7 @@ CVE-2014-125102,0,0,3ec69164b5d69942e523b50d614c4b5e38873af31762abaaffd18838c6a1 CVE-2014-125103,0,0,26255b9db5da8d1b690531ed17e284db9f4d5516cdc890e9214729bdcc3d1eee,2024-11-21T02:03:48.680000 CVE-2014-125104,0,0,d4c1c6df45fc1b46114c7ea34bf13e9cf2394ec136344f2a40b2617337c45cd6,2024-11-21T02:03:48.863000 CVE-2014-125105,0,0,3d42a0a401cba5ad728cbf175d4ff85c2cb7167eac3d7fcdc33760402081b247,2024-11-21T02:03:49.017000 -CVE-2014-125106,0,0,87bbc1c63407117630821b10a79cfb1c4f9c90bc01acc2b55571769732142406,2024-11-21T02:03:49.167000 +CVE-2014-125106,0,1,54697d6031fbec7cca6b0370665480a5d8c7b27bce685494a9c245a4fb683771,2024-12-17T16:15:19.763000 CVE-2014-125107,0,0,55dc1f7f13d1965d19faf3d26a7bfed5166ff90ffaa4bffcb87e2771e5963704,2024-11-21T02:03:49.343000 CVE-2014-125108,0,0,b335617637140592db98fd087fc31012e3ae6c1026441a5d8bad6a7f1ef91dd8,2024-11-21T02:03:49.510000 CVE-2014-125109,0,0,b7bb004362b68948dd424c9d3fa46d6e236aa18962c7a339c09ca6f9aadf4349,2024-11-21T02:03:49.713000 @@ -131648,8 +131648,8 @@ CVE-2019-13507,0,0,f9395fcd43fe6a645148c3cd37063a3e97c3a33fa4b2b388e05ab246c00ee CVE-2019-13508,0,0,eba29c93d8dcaf1e63367d74faed9bb930179e8ce85e05a914d15fbfebb62794,2024-11-21T04:25:02.033000 CVE-2019-13509,0,0,45162aca7fffb8eb3cc00233efc6eb0433778ab1b1c06394a97bfd52326ad360,2024-11-21T04:25:02.213000 CVE-2019-1351,0,0,d0a62be23e7fb4be55c56c2edad6f35623432bbb37dd704f3411e5e9b39e30b1,2024-11-21T04:36:32.397000 -CVE-2019-13510,0,0,a1542d2af5cd34777a78dbf43a7c9b76fe4bc350032297cdf57d4fe3533d602b,2024-11-21T04:25:02.420000 -CVE-2019-13511,0,0,0014fb5fd681ff22dfd8dd31359d4930bafe5b5d592b2f79980e6120364f6ab0,2024-11-21T04:25:02.580000 +CVE-2019-13510,0,1,9e7920b30ec853cc5feb93af972d641f54c353a8e7a84b73260b398cdcb69116,2024-12-17T15:52:51.450000 +CVE-2019-13511,0,1,060782d6de687a2daa4117ddcda2e1fbbccc8c7bc860c818296a949870ccdbbe,2024-12-17T15:52:51.450000 CVE-2019-13512,0,0,7bf7aedcc94a99e5e0749bc88142f94551c5d7ebbd85e1b8a2f28c53c9eb1f51,2024-11-21T04:25:02.727000 CVE-2019-13513,0,0,3191aa5946b32194511d7cf989d9b10a36bc3f04b417573071439bdcb15ec76a,2024-11-21T04:25:02.860000 CVE-2019-13514,0,0,6727808755caedd9c9a19d15f32d89bdc2701ced44d7fe0a602f8b22228fa1b3,2024-11-21T04:25:03.007000 @@ -131657,16 +131657,16 @@ CVE-2019-13515,0,0,35335d5293f4c064c458393728fc476c0d28dade36346f1d110e9e3f0a7ef CVE-2019-13516,0,0,9ae960d2318f3e79c61c1ec2bcf703528c1da7379aee6bfbc07f1a1e3cbe0985,2024-11-21T04:25:03.283000 CVE-2019-13517,0,0,786bce932205c38bfd5b3941f8fcd6d0c18ac878f6c935b4249b7dd2e0e60567,2024-11-21T04:25:03.410000 CVE-2019-13518,0,0,d4dc55788741e8c037669adbfae0d372e2497a99434bf02b956c9568185ff990,2024-11-21T04:25:03.540000 -CVE-2019-13519,0,0,04fdbab13af83ff169e8b1531ec9efa764cd30a46d9ae6c8d026042ac4a5cf35,2024-11-21T04:25:03.680000 +CVE-2019-13519,0,1,223c07756215eb0a76214bf34d09326fdd1daa9142a4103f714a099f67bdc2a7,2024-12-17T15:52:01.670000 CVE-2019-1352,0,0,398d5ca525d6aff137c15d10da8042561240bb3dda7ef020f2678e44be437995,2024-11-21T04:36:32.537000 CVE-2019-13520,0,0,196152d65198dfdd4ad7b386b77037bfa68d6a0c16efdde0c54e7d0d66738277,2024-11-21T04:25:03.823000 -CVE-2019-13521,0,0,14bf194b429dee536a63d5ad393e64d63171fe40db6b62935bc51ce0d7937c4c,2024-11-21T04:25:03.963000 +CVE-2019-13521,0,1,39b1a5c011936bab68e255ccf0782e666ca398cc648c0afcb1a2aec45874e686,2024-12-17T15:52:01.670000 CVE-2019-13522,0,0,75b5194302f51c8869710ceffa8c4412e27eca4280c0ec021a35000a5d4d5796,2024-11-21T04:25:04.093000 CVE-2019-13523,0,0,b3a217e321bf5e446bed1a1a047dfcc9eb9e76373300daad26a17bd7fab73795,2024-11-21T04:25:04.220000 CVE-2019-13524,0,0,fb9fd9f95c1ba191e54819c6f5cef33377a744f55c45c3615f36a5d2d444a97f,2024-11-21T04:25:04.417000 CVE-2019-13525,0,0,2bd643e90ec7d8af1f68a9f423fbaccd0b5ca90b551b1709eede475b2d9260c5,2024-11-21T04:25:04.557000 CVE-2019-13526,0,0,3ccee1283875550d1048327086ffaa44f81556c637a492d37ab96f4554119b01,2024-11-21T04:25:04.687000 -CVE-2019-13527,0,0,ba85681d0179f79ed031f0bca08f3e8a9a8e47b5b0ae07e23d609d686f1eb22f,2024-11-21T04:25:04.833000 +CVE-2019-13527,0,1,041f87db371a81a7e7da51460b06f41e324c8aad5f577294464637db925f586a,2024-12-17T15:52:51.450000 CVE-2019-13528,0,0,07fcf18663d413513720912d809a28f6ba5a900225c728d9bbd6b2ccf4bf5520,2024-11-21T04:25:04.960000 CVE-2019-13529,0,0,751d1540d651a563768e99b41a35a27fb814d304fadc1290b72900e72d409224,2024-11-21T04:25:05.087000 CVE-2019-1353,0,0,d475397f8fa253e52434fd1368a3f573e9705d442445b703b693fb48fc374026,2024-11-21T04:36:32.663000 @@ -134856,7 +134856,7 @@ CVE-2019-17075,0,0,b13c049d46bf5bd185306eebac1156652bc31547d4a8b0ff9f58e84fc6a47 CVE-2019-17076,0,0,29e1c24703e3c5abf389b911b93d3f4f2393dee770f72dc33079e11f40db8dab,2024-11-21T04:31:39.677000 CVE-2019-1708,0,0,66b342b900363f0652622139ddd622fbfd0b7a06142ce8d542b0bbe298a50e3d,2024-11-21T04:37:08.910000 CVE-2019-17080,0,0,16ea6e1ae0a7d05a66496896956c03655d58d835b5e5b5bd933c7cd70c843f13,2024-11-21T04:31:39.823000 -CVE-2019-17082,0,0,0d0da25d6c56d4b498419c5043a3a58d1e45571f204efe6f98a05268aa6dfc78,2024-11-26T20:15:19.957000 +CVE-2019-17082,0,1,c439f94ba02d84cf12dd2123f2ba672455510324767b08a5254c3499c53ac953,2024-12-17T16:15:21.400000 CVE-2019-17085,0,0,051a5575ac6f80434dc9fa80e3b180c65bfb9ab2c637c6f9f13530a13cd0b230,2024-11-21T04:31:39.973000 CVE-2019-17087,0,0,2cb2a611e9c76d56ba85e2a7bc0cc3a718beea9e57e489a93677876bc3c49c07,2024-11-21T04:31:40.080000 CVE-2019-1709,0,0,94d87eb6901cb24d81302303539415f94bc1773a364b2f3a252e4305a631b046,2024-11-26T16:09:02.407000 @@ -187291,9 +187291,9 @@ CVE-2021-47138,0,0,6c8c0f5b22ac8d3f7fe50b996f063af62c0fa9ca4ccfd871f306e97dfefb9 CVE-2021-47139,0,0,8151d11e41d234e3fea0f6402fb7f8363013282a5b5430ac83a28afdb4d80397,2024-11-21T06:35:28.607000 CVE-2021-47140,0,0,94f2f57f0a6639487b4034158249e543c52bf9de60178bdcf9913a0f4ecf57a8,2024-11-21T06:35:28.713000 CVE-2021-47141,0,0,3fe12ffe1e35800eb3c9c890b65e5835a8f47ca96f20757b98e83b5d63b56dba,2024-11-21T06:35:28.880000 -CVE-2021-47142,0,1,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000 +CVE-2021-47142,0,0,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000 CVE-2021-47143,0,0,c2a5c3dec1ae09dafacf9db55e558de20b9cffc7e28e40cda9f938eecc51f74e,2024-11-21T06:35:29.097000 -CVE-2021-47144,0,1,7ae5f718c8b8ace4f33fb239cb219fe990a890405bf96e6eb5781eebe4403842,2024-12-17T14:49:22.333000 +CVE-2021-47144,0,0,7ae5f718c8b8ace4f33fb239cb219fe990a890405bf96e6eb5781eebe4403842,2024-12-17T14:49:22.333000 CVE-2021-47145,0,0,9662b9acd69919df2b6c6523f20e36e5e12471e8983fe7ba75453e11f65886d1,2024-11-21T06:35:29.310000 CVE-2021-47146,0,0,766576e3afc6f1a61aa6a76ec9ea79593634c7e928cfab3230cf4009861e61dc,2024-11-21T06:35:29.427000 CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000 @@ -201841,7 +201841,7 @@ CVE-2022-34352,0,0,014f8d336c1a0c9d3bcc8cfff40cdb278b804a1e0cd082e0e111140d7e9a6 CVE-2022-34354,0,0,4cbcb478ef062a56f902ba0b9236308dd74c2d99933a4b1428f0623d49d4f788,2024-11-21T07:09:20.750000 CVE-2022-34355,0,0,deac03771ea8eedafafeea932f34828a6874f0836ebda800d3d2539b915cb2d3,2024-11-21T07:09:20.873000 CVE-2022-34356,0,0,f0941b4c5952b20da0acf7861a0e0afae44611ef3d3e8a59ee0498f3994c39ce,2024-11-21T07:09:21.013000 -CVE-2022-34357,0,0,5d64f142e646241e2e3b2cbab5175258f92395c5cb4104291cd50d29644c2696,2024-11-21T07:09:21.140000 +CVE-2022-34357,0,1,c790441e5f5da43885a88f7919952569348cfe765cef9d236b89a3ae94dcdbf6,2024-12-17T16:49:34.733000 CVE-2022-34358,0,0,5681d2199dcf55684aec20e6304d0a8e9597be22fe9f0be186d4415114a80e1c,2024-11-21T07:09:21.267000 CVE-2022-3436,0,0,5cc2f322cae31533f59998e05315d75d74bfc1c2153b4140326e9917b458b171,2024-11-21T07:19:30.800000 CVE-2022-34361,0,0,49d90f51d7bbc17bfae465f45aff440f0f12f2a65dd148a5db2e6cb61dd53a97,2024-11-21T07:09:21.383000 @@ -212418,19 +212418,19 @@ CVE-2022-48480,0,0,6cbcbed9012c785da3f86b47a6453d41ee3b0672042363e3ee6d218ed1f3f CVE-2022-48481,0,0,c38e69565bc722dab603c8923a925c3999184b33cceae3626e62510d5d97227d,2024-11-21T07:33:25.060000 CVE-2022-48482,0,0,7ac41b1951b801fb664e658d13833df47cbab31ad3169e90b364ff040e0a3677,2024-11-21T07:33:25.177000 CVE-2022-48483,0,0,d2bec26748db8a5da63d916cd77a26e7f5ec965ac0c82535ec23b0719f24bb2f,2024-11-21T07:33:25.313000 -CVE-2022-48486,0,0,a0cdd75943e6739f50af03c52fa560b5a26119dc3004c5c928a0c2c562859314,2024-11-21T07:33:25.450000 +CVE-2022-48486,0,1,f03df4247b68cbed001a4cda633e9152715ecb8aa9328c3e3da84b7b43510f8c,2024-12-17T16:15:22.073000 CVE-2022-48487,0,0,847663737d83c8f2831f21b93d19406978bac505b0e2d927ba6bb1a8c413da60,2024-11-21T07:33:25.550000 CVE-2022-48488,0,0,f6e746ab7ffc0663eb0cfbc141164bc4b37be6f3f64dc1163c2b7e837e9087c9,2024-12-16T21:15:06.287000 -CVE-2022-48489,0,0,4f9214f2ba4c67dff3671bbc97115cde1d0641a5c0cd58e658fa153dc15eb881,2024-11-21T07:33:25.750000 +CVE-2022-48489,0,1,94fb2bca8ea43f8a23189fc713cd3d7659f3530fbb5155d9ef0a8b1272951df0,2024-12-17T16:15:22.253000 CVE-2022-4849,0,0,95ea82af9403d8ae880c366bafe13c73151114e74b8e6fcc59d974eacfc7b97d,2024-11-21T07:36:04.140000 -CVE-2022-48490,0,0,5bdaed2389bcbfe9ba6f9ec51eb7b350e50cdcf1602f1e6f8708d3a066e3e2c8,2024-11-21T07:33:25.847000 +CVE-2022-48490,0,1,03e41db521bf18bcb3c1cf82ee55d30c8beb756a53449e2a1edb8d73004895f4,2024-12-17T16:15:22.357000 CVE-2022-48491,0,0,b05f7c1729f1c7f1205d71ad50ce69ed583088461eba85fb7d73c782b1f7c983,2024-11-21T07:33:25.947000 -CVE-2022-48492,0,0,0869ab12f4e10bfd7f2ef7f38bbaf991793401e843ed0d9532a4f3377f607fd7,2024-11-21T07:33:26.050000 -CVE-2022-48493,0,0,f9f00d890ac1af580fc63caa915fe780f06510326dfb76bde00b94ccd8213e1d,2024-11-21T07:33:26.150000 -CVE-2022-48494,0,0,ec3a4883e413f6254d90c1915d9bec41ec37b6afb2a73b31cdcb395e6119c012,2024-11-21T07:33:26.240000 +CVE-2022-48492,0,1,890b603f0c8acee902cd770c6c1bd593d7eadfaa61da8e93dbedec6b411d4ae3,2024-12-17T16:15:22.517000 +CVE-2022-48493,0,1,c3cdb8e14a914d7d7a255f987ab074729b76b825de1908a338fd82a1f538aa5e,2024-12-17T16:15:22.627000 +CVE-2022-48494,0,1,3eb5c2b9c88dbcfe8b3c69efb66feecc55e76505f237fc80220719e8b6650add,2024-12-17T16:15:22.740000 CVE-2022-48495,0,0,8c02e6938962f781bda5e157e870aa1c33ae3a3b51d8a9b5d00ab6334b977d5c,2024-11-21T07:33:26.350000 -CVE-2022-48496,0,0,fafcbcfa31c997451b642dec95eacbd49a348dbde1297875df64cbc0fb65715e,2024-11-21T07:33:26.463000 -CVE-2022-48497,0,0,fb385ce10a977e7aa9944951800c783fa1df255ed56b7224d7261931ecec4922,2024-11-21T07:33:26.563000 +CVE-2022-48496,0,1,71deb3d51fcae767a1e15c2a8115b90068fa4bb4765ab39a9a6865365110a045,2024-12-17T16:15:22.910000 +CVE-2022-48497,0,1,b9a80e8af28fdcd00a228cc11efc4c9593a8b4c5dd367af14a9c712cd657ece8,2024-12-17T16:15:23.027000 CVE-2022-48498,0,0,15d9d8110061493fd5fdb3094dbf089f7e21083b5812e5ce94744c0dd02cf21c,2024-12-12T21:15:05.437000 CVE-2022-48499,0,0,0ad3a641e35e343758ed868b667a84aa0a1fa0125214a118c7fc5218df924c4b,2024-11-21T07:33:26.760000 CVE-2022-4850,0,0,c9b22dfbe69ddcd775fe8bf5e46305e8356db636b4274a9d88aae562f5f3cb3f,2024-11-21T07:36:04.260000 @@ -214283,7 +214283,7 @@ CVE-2023-1294,0,0,5be21b679db8fbd6e50c8166e958b90336b85301bba575e2dea421588754db CVE-2023-1295,0,0,0b2fa8e04010bb98a116638f947318099e07fc1c2df75799e1a83165a0c77312,2024-11-21T07:38:51.727000 CVE-2023-1296,0,0,cd5052b21b7f39357ff50de27df684a18e5a579e8c4add5582dd35505e15fc1d,2024-11-21T07:38:51.880000 CVE-2023-1297,0,0,01d6c781b80781162574189a91b457a9b75cd298810a4392459a16b8f4eb910f,2024-11-21T07:38:52.020000 -CVE-2023-1298,0,1,11c3712c31bef2e08193b2fb77e5ad999b2e8700101ec1bc70baee0f9efffe5b,2024-12-17T13:58:11.560000 +CVE-2023-1298,0,0,11c3712c31bef2e08193b2fb77e5ad999b2e8700101ec1bc70baee0f9efffe5b,2024-12-17T13:58:11.560000 CVE-2023-1299,0,0,59fad68cd54d996e455437c597bf5aaf941ea506968ce8059728febaf173de36,2024-11-21T07:38:52.323000 CVE-2023-1300,0,0,df34bf5d1ba95b4d966521b8a545c32f09d65f2b15e906d25ca57f2355fa540c,2024-11-21T07:38:52.453000 CVE-2023-1301,0,0,7028900776d23e7f2caa69e19470efbd07c876a36537c6b5f3247ff082115b04,2024-11-21T07:38:52.597000 @@ -215853,8 +215853,8 @@ CVE-2023-2111,0,0,16fe087b544472608d0df9280ba0f5a076375b18f3df5f1ad66022a81cbe42 CVE-2023-21110,0,0,ad60dfc70278c6b0bd34da20159da1fc88b332271fdeb070037af19f55a5c868,2024-11-21T07:42:10.897000 CVE-2023-21111,0,0,a9228ee60075f73227629f6cd77e27f676d0edb5135fe71db50c6e10f3d1393f,2024-11-21T07:42:11 CVE-2023-21112,0,0,2f75ed082b153f8339631ada631436883348d00b331ae56e385d0ec55419bd1b,2024-11-21T07:42:11.103000 -CVE-2023-21113,0,0,b22e73ae2d98ca837126a614f0e32ee021df54e2e298726900e60633cfa4bc1a,2024-11-21T07:42:11.210000 -CVE-2023-21114,0,0,607f1385388b5cc338dec45c3ccadc8261b3f058fa421287386461bb3d88046b,2024-11-21T07:42:11.427000 +CVE-2023-21113,0,1,31e1212d8efecb910800eecacc301137f8379e91cd70784a0252f8c3d5ee2583,2024-12-17T16:58:29.983000 +CVE-2023-21114,0,1,fa32db5c147ae6a7a528a1bc56976da826ae48513e9e13398dd1022162fdf60f,2024-12-17T16:55:34.213000 CVE-2023-21115,0,0,d7e4c2025519fe78f076fc7aa3fd4a605d2590b8acba5d765081b08ac5bbd196,2024-11-21T07:42:11.600000 CVE-2023-21116,0,0,36b148da9f9f12d9a702b28222cb2a1e2e18dcc65b527486718d44da0f823eab,2024-11-21T07:42:11.710000 CVE-2023-21117,0,0,f0124ef076dc79a4e01262a8b1df4548fa0485e051c0d1617c6886216a48de33,2024-11-21T07:42:11.813000 @@ -221404,11 +221404,11 @@ CVE-2023-27850,0,0,71b21b65fcd76eb680e8b031380805418217be8fa9ef4d61f11e0e59009a4 CVE-2023-27851,0,0,56797c98646b929caaf98a149e0a7de93971e8b76ec6425ecaba869e020428c7,2024-11-21T07:53:34.610000 CVE-2023-27852,0,0,970b16119bbccf7d9840710c18036e80d7e6dd07b2f1a2a21b612291befd49e9,2024-11-21T07:53:34.720000 CVE-2023-27853,0,0,8cc3d1eb0ba637db51dd3659e4e857231785ab9dfb396f141929683e99f5404c,2024-11-21T07:53:34.827000 -CVE-2023-27854,0,0,411c27a293f725b1626a2cbfb2a9a2cc14d3cb9f7e94d0ff55f65f1059cb0f8c,2024-11-21T07:53:34.923000 +CVE-2023-27854,0,1,399464ebfa0e6fb5d8bbdd1fb1995ce1bb12b189b697bcb0cfc21a0bb0098895,2024-12-17T16:14:05.870000 CVE-2023-27855,0,0,5fcc344eb6a0bcbac7379fc8ed0d25e22bf46be9ca0612dfd473a7d756d05ff3,2024-11-21T07:53:35.047000 CVE-2023-27856,0,0,bdc660d362c547954a4a485d55855f4ccd91251e1b1d960494b1dd24a2e93b4c,2024-11-21T07:53:35.160000 CVE-2023-27857,0,0,bb48517a187986d35e53309d8627a9f4fb5e13e8e23f2cbdf45415d0d9b845ac,2024-11-21T07:53:35.273000 -CVE-2023-27858,0,0,8291047591a0eb0012216ee6bbf1cfc2bdc9ace67f50d358e3d5eb85a0f4c462,2024-11-21T07:53:35.400000 +CVE-2023-27858,0,1,7dcca3cb4abc03f72a6745a40128d9c488827dfd0d560bfc6ce8bb25af1354f4,2024-12-17T16:13:20.770000 CVE-2023-27859,0,0,2563c399432a1c7878fa74469fe60138142a4cc962b1dbc4a1f6c33b7738fc13,2024-11-21T07:53:35.533000 CVE-2023-2786,0,0,5890da95b89760a8befc6c7e6cab8ec66bea4daaaa4537f053226389137cb34a,2024-11-21T07:59:17.270000 CVE-2023-27860,0,0,592b1959dc242928c6269b42fc59c17822ff4eb0d485040bb59ff59a49af09a3,2024-11-21T07:53:35.667000 @@ -222931,9 +222931,9 @@ CVE-2023-29457,0,0,582feaac00e1ba969c2b40a9e7bada6ee76c6f703785a7383799e67c4bdcd CVE-2023-29458,0,0,943bf4f9d63443118a96de1c6dc28a33396eb6102fb9d66bef8ea805e1972cb4,2024-11-21T07:57:05.837000 CVE-2023-29459,0,0,c3c84c578a50a80ad57452c533eadefc3c467bf53829a4b5e05369bfd6a27d10,2024-12-03T20:15:14.167000 CVE-2023-2946,0,0,453ec349606f8db9cf75fa44b70377046e440ea0135da2b42bae69c4367d97da,2024-11-21T07:59:37.437000 -CVE-2023-29460,0,0,6071f5ab8c278523dac8e1c7e9091c0611603a12fe5f8c05b73eef4e0e2c60aa,2024-11-21T07:57:06.090000 -CVE-2023-29461,0,0,7d5afa3a30f6add3ec45d76df588242e4ecedc170b491fe3691bf897fdef97f7,2024-11-21T07:57:06.197000 -CVE-2023-29462,0,0,fa6ef7ece1bf65c5f57aa5e080d83c728ba98d149d534688255bbce8bb29ca77,2024-11-21T07:57:06.303000 +CVE-2023-29460,0,1,387ef1d5309d90703f2502d60c2220843901d92793000a929ec8bb574d14d305,2024-12-17T15:52:01.670000 +CVE-2023-29461,0,1,0276a741f35a6cdc9394b3dd2136f9ea0be4ec8a977d212f0f44b07e0d4a3eec,2024-12-17T15:52:01.670000 +CVE-2023-29462,0,1,e44d2364542d4399fc13de6321bb50a7d6d5a8564118cfd0dd6de48207f8049f,2024-12-17T15:52:01.670000 CVE-2023-29463,0,0,85e59c542137bb86594ed48026b483b87dcf323ac320ee81b9a6b2f64ae482c3,2024-11-21T07:57:06.420000 CVE-2023-29464,0,0,146742e622025a0bb49b516993febb531dee7cabec7113609322bce5b7f7dbb6,2024-11-21T07:57:07.377000 CVE-2023-29465,0,0,4ee89e1db94972a20a672169f1186cd17c0d35cc37ba52d5c98094d2418681e9,2024-11-21T07:57:07.537000 @@ -226495,7 +226495,7 @@ CVE-2023-34152,0,0,334da3b68a0c4bcbcd97713b755f74eb3f582cefd06ffbd3f5072dbe60ebb CVE-2023-34153,0,0,ed14304b1e6ccf8b58695c524d173bf8dc75bbd828fca06ae43e772c59aef8ea,2024-12-02T14:34:41.337000 CVE-2023-34154,0,0,eafc3fe079370e37ff7df7a88839f07e4ee2c129fb8876ca3732c82414e7476a,2024-11-21T08:06:39.950000 CVE-2023-34155,0,0,18a874ed9abba05c434db529ec7798f406b89d3d8e8e89da1e2b9234231fa020,2024-11-21T08:06:40.070000 -CVE-2023-34156,0,0,4c845fbd22b69141a935a522b35d529a55435ffb60a88eb49c84b4b571143225,2024-11-21T08:06:40.190000 +CVE-2023-34156,0,1,b05ffdf712ad72345a0126283e310cb09391e67e748e53f7249a72210c140809,2024-12-17T16:15:23.260000 CVE-2023-34157,0,0,de3af443fb8981ce3e7b6cb3d0ef43a69013ee706865d66bc7dda2cff6f49fcb,2024-11-21T08:06:40.310000 CVE-2023-34158,0,0,465d4f6bcb385d1ecb951edb986565a3191e83a136de19f8adf0473d8fe0f9c8,2024-12-12T01:23:28.070000 CVE-2023-34159,0,0,6f67b15aab8da28d8b6be0656e1bc2292d18166a3e8bfa37b8e7f98c4a48fafd,2024-12-12T01:23:28.263000 @@ -228704,9 +228704,9 @@ CVE-2023-37323,0,0,f101af2ef7f7ee117d78946aba1516671cfdc849a16009740f69335b09927 CVE-2023-37324,0,0,fb54bbbb055d2bbab8e4b46713645a88427aeedfe5e03e65eb1c4516c0dd2e33,2024-11-21T08:11:29.280000 CVE-2023-37325,0,0,99aab0a6acc9cdc822435bab48cf8cd7d035a94418d98eb4dffc0e07b78a1383,2024-11-21T08:11:29.450000 CVE-2023-37326,0,0,de525f2fdb16627a55dff22c96a6e33e09849710cfa12ebeb6fe43f4059ef77e,2024-11-21T08:11:29.963000 -CVE-2023-37327,0,0,050c9b4f6eaaab1ccf7132a47983e8dada197068253a919b63d99684a28e3680,2024-11-21T08:11:30.147000 -CVE-2023-37328,0,0,9a00a8fe0d5c4706ad2ff863a56b53a44582d95b0cba69f4281cb0f7608f1408,2024-11-21T08:11:30.310000 -CVE-2023-37329,0,0,42e91f22c1406b15314f606886ea19c06a8c5de8acd61918965dbb47f4784947,2024-11-21T08:11:30.490000 +CVE-2023-37327,0,1,fc1f7785ab6d270d7fbba1a6a44dd7aabf50a849305fbbf76a70408192b943e8,2024-12-17T15:42:36.890000 +CVE-2023-37328,0,1,6e5692df53743d7f8ef9a99e13a571263e9ff484cc552f0552cff27f03c6abe0,2024-12-17T15:42:51.507000 +CVE-2023-37329,0,1,8f983c9a0c9b5f5c500d003d1deb956b8113be5c578fc29f1d4f75957aba97e7,2024-12-17T15:40:41.947000 CVE-2023-3733,0,0,c8d368f9c0d4b99819dcf67ac2846be39784210bffb745ab8d538f2a3c7f5a3a,2024-11-21T08:17:56.433000 CVE-2023-37330,0,0,c32520b7f639bee2acb4b67749d5d368d3f9f3db710d825a8c66fbff5dafc9f2,2024-11-21T08:11:30.650000 CVE-2023-37331,0,0,8188b356b9391d173d968fb5f10cfb2712c0e2a84bb8cf48e21150cd43bfa2ab,2024-11-21T08:11:30.833000 @@ -229335,8 +229335,8 @@ CVE-2023-3810,0,0,e2f5a70a9f5a08c44ce434ae49a185c38246e73f8c3412f8643bf0b4516a06 CVE-2023-38100,0,0,1b0d123bd214e95bf831ace392a4e736b98caaa644b8e3c9777c6d8eeece3326,2024-11-21T08:12:51.570000 CVE-2023-38101,0,0,15b9e6b206e26eaa263a12751b77d23eeaf5ed82c4b5974e35434977bff238d9,2024-11-21T08:12:51.690000 CVE-2023-38102,0,0,56bd638f0711e6a3682f6d2e63e3fa05d4ccb77c8449975b5c8df9c2cbe66400,2024-11-21T08:12:51.820000 -CVE-2023-38103,0,0,ff0c39e17c6d29f54f0a2b6b3360dd2f8e71da8ce4cf4cde955f8900ce0f1a13,2024-11-21T08:12:51.947000 -CVE-2023-38104,0,0,e3990357e19573190b4a854c3f4cb7a9c83bb50e596a85fbb15094111e14baab,2024-11-21T08:12:52.073000 +CVE-2023-38103,0,1,3cdce54e162150da464da399c9b9e1c4388b7ac2145c716d720abb464f083fed,2024-12-17T15:42:00.237000 +CVE-2023-38104,0,1,5528faae49391c960e915d48b6773e68e3e1a04370f96c6152370adf1281351b,2024-12-17T15:42:12.487000 CVE-2023-38105,0,0,0f928ec871a53c3c8baa75735f9a5f1c2658b9f931e1560b3d891d20c65e5b10,2024-11-21T08:12:52.193000 CVE-2023-38106,0,0,fda292a517e3bfa101bdf97db70a807d139d622e24205652b6bc22ea202e2da5,2024-11-21T08:12:52.323000 CVE-2023-38107,0,0,3792bfaef03c1a06db01b9a57427b36dc6bd9edc7b16a2d05eb36d6a14f5c819,2024-11-21T08:12:52.443000 @@ -231300,8 +231300,8 @@ CVE-2023-40470,0,0,8b1f239bf46a6e8f2362a4e6511f8659de39b41590b74dee9a88ac9c6e40d CVE-2023-40471,0,0,88efadc595745ddee1aea5adadf0833258c6cba146371900073ebafefbfca08e,2024-11-21T08:19:32.210000 CVE-2023-40472,0,0,0adbf1c477a1ef53edb98808bde86cf13ff8a99c1e3805e904e403660e189560,2024-11-21T08:19:32.353000 CVE-2023-40473,0,0,a23211ba148c614bd8169e57c27de9ece0d97e6aa6265bbae1c38f20a73bf7c8,2024-11-21T08:19:32.490000 -CVE-2023-40474,0,0,76d7c9f146af8628e8f0e93b9f8d80f5a69c103a9df4d0cb2ea4058285236728,2024-11-21T08:19:32.637000 -CVE-2023-40475,0,0,e15e16a3ec7c5bf6bf32990edd0a1d2dabe93579447578a03b0166ff8b67a944,2024-11-21T08:19:32.783000 +CVE-2023-40474,0,1,8bcf31ee98703f6fc473b5b6ae72ea5932cd0d7a0edeb156d4f8a182ea3c78ac,2024-12-17T15:36:32.940000 +CVE-2023-40475,0,1,e7d21de9d238e03b562bffb12dea4211af06c007f197e91c21580975c3001720,2024-12-17T15:36:49.790000 CVE-2023-40476,0,0,11996ceeadcf3af41b049e3465605bce8a16f6312202891a8f139bbd867768f7,2024-12-16T19:54:51.870000 CVE-2023-40477,0,0,3eb17f110dd9fb587160e88cbd13f801056aec9679ec47603ce426a7e8166eb5,2024-11-21T08:19:33.483000 CVE-2023-40478,0,0,a3fb7798a48b05b31de5b2b5faa9c0ac4380209160291014ad3f81dcf8ebbb85,2024-11-21T08:19:33.637000 @@ -242124,10 +242124,10 @@ CVE-2024-0020,0,0,84928478478ec6809853ed64e00fe038f952f115b30fa79973cc6031347ede CVE-2024-0021,0,0,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000 CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000 CVE-2024-0023,0,0,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000 -CVE-2024-0024,0,0,8b2a7fecb30ba159a81d4a685b53d71dcaa17cb8849060989b248099d4dec740,2024-11-21T08:45:43.840000 -CVE-2024-0025,0,0,fcc23fa9a29c464037587349b9e70e9f44d7e9735554b5b727ef0a2ddc8f76ab,2024-11-21T08:45:44.037000 -CVE-2024-0026,0,0,402f95a09c007a153e715c72fcc1825728454f11232829fa5e802f731eb2394a,2024-11-21T08:45:44.270000 -CVE-2024-0027,0,0,b2a84f2d4b2f53d34ad30427c6bd8e738cf3e7ce005b8b01e2ee1d9785af8368,2024-11-21T08:45:44.467000 +CVE-2024-0024,0,1,a2d109221364312c807d7475e5eb704274bae4708e2b0502b6787d8f406a89fa,2024-12-17T16:48:14.057000 +CVE-2024-0025,0,1,773977a25e23767e6123822557779cc3fb2142579915e770376287955fd10cca,2024-12-17T16:48:34.537000 +CVE-2024-0026,0,1,8fea683389479afd28e9fca76c61af6d1dfdb44fa09dc03491613431fa7490d9,2024-12-17T16:48:55.027000 +CVE-2024-0027,0,1,f7307a8c12ee8410be07abf89f58b21bcf1fc5b180e3c7fb2bc468a33172dbab,2024-12-17T16:46:34.113000 CVE-2024-0029,0,0,54ad939fb09b28b9a1b5b297173525d0cf8c95e5cd8fd33ef3e316cfd2aa0803,2024-11-26T16:30:39.007000 CVE-2024-0030,0,0,e4cb4beaf2582efdb0dae14bd9c06d5d49143432bc990a494f672666949d55f1,2024-12-16T19:29:58.747000 CVE-2024-0031,0,0,99203c2b9ece9fd57e9b530310bcac8315f6fa59156a01e4dd338e067b434a3e,2024-12-16T19:30:26.253000 @@ -242141,10 +242141,10 @@ CVE-2024-0038,0,0,baee8527daa9fa065a043ee87cb5ae43b4d4acd906f6069ea7197faff9b611 CVE-2024-0039,0,0,f51d4c38ebb3cc46492f31896efa747baab58b2bc83ee86fcd45588ba3e8a558,2024-11-26T14:26:56.233000 CVE-2024-0040,0,0,482e23ff76f3327407e40e3d508d01e97e22ee3b05630d7571f0b9bc84b62862,2024-12-16T19:16:31.127000 CVE-2024-0041,0,0,30f391e32967bb0baf25d8a5436bac2e10d105d6b34926d3751c53b398bda865,2024-12-16T14:47:50.477000 -CVE-2024-0042,0,0,4690a9c902145d930d3daa4383acefd18a26426234bddfdc5cac030637ad11c5,2024-11-21T08:45:46.840000 -CVE-2024-0043,0,0,fb4caf0f9a9ab06453b49c1c261bb22a7231afb3979ba569d0bfbdc3ba982550,2024-11-21T08:45:47.027000 -CVE-2024-0044,0,0,beeefa26b2187b8ae88659f81f9da7c2eb86689d4af798d80a79718ec6590423,2024-11-21T08:45:47.203000 -CVE-2024-0045,0,0,bc1d5222270546dca4de25f0085b53b588a8ac25a93f716cadd826cc31d50354,2024-11-21T08:45:47.400000 +CVE-2024-0042,0,1,7265bcce4e87025566b81559e9a2a904d94427e17ed2d8159b49b70351e50b78,2024-12-17T16:47:02.183000 +CVE-2024-0043,0,1,9c5415d367b2b00fbb658ba49909a69019febd5394910268036d8c799fd4ab53,2024-12-17T16:47:21.967000 +CVE-2024-0044,0,1,7c8a4839c2df19abeeef8e0c01f0e50a286efe78d2cfd1756a2fe162cd4e15cd,2024-12-17T15:50:36.227000 +CVE-2024-0045,0,1,79d340372a8bb81ede9a0a5d782b03df861935527e1c69e6ad93b624934fbb31,2024-12-17T15:41:13.637000 CVE-2024-0046,0,0,d4f36216fab9e1ec2581ea3be4963a14d313be96285938f258349eb3ea9d310f,2024-12-16T19:50:16.587000 CVE-2024-0047,0,0,7dc617adc08be9f641c1e332a4f76abbe58d0e1d5c3bf8c9b4fcfd4d9ad9ba53,2024-11-21T21:26:15.987000 CVE-2024-0048,0,0,d653fd48b3412e69f148ae87f0e9a6f4febc859deb0656725279524aa5d0b440,2024-12-16T19:47:07.450000 @@ -243293,7 +243293,7 @@ CVE-2024-10352,0,0,9f442342a9d7a5d646e145e32e9e4a092e972a0587ef0751f4ee0e2e0d901 CVE-2024-10353,0,0,a585a417ee4101a8a96932d3d7b1883f168d83679786880e61d32893305af8e7,2024-10-30T16:21:35.113000 CVE-2024-10354,0,0,533c75da0eda1e32f34af28874b401835cbfefd05865e3baec6bec1215a8ff9e,2024-10-30T16:32:48.453000 CVE-2024-10355,0,0,edd144d42239514a5040e45977c91b9661e0e5e1ef732ff2d1a515e8bda77acf,2024-10-30T17:13:02.417000 -CVE-2024-10356,1,1,8ea0dcfb94413f23a1deaf5bffd76da13078dcdcac48547b9b6c9d356425d892,2024-12-17T13:15:17.520000 +CVE-2024-10356,0,0,8ea0dcfb94413f23a1deaf5bffd76da13078dcdcac48547b9b6c9d356425d892,2024-12-17T13:15:17.520000 CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 CVE-2024-10360,0,0,fdf4c91801296b2986624cb9668818820fc8f9a592678464010c300dd47a90aa,2024-10-29T14:34:04.427000 @@ -243398,6 +243398,7 @@ CVE-2024-10470,0,0,1cb06287bf2d1e2eeabd6c4094bfda5d1a441fd4d9979abeb89d96fdc8185 CVE-2024-10471,0,0,e30bc9ee6fab4d44ac847b6f34a993b4eaa2e99ce0bdaeb0978e8ea3567a10bd,2024-11-26T15:15:31.083000 CVE-2024-10473,0,0,bf3c1f751720194f350ca93367122168de420fe2ef48da8c20175d99c985532f,2024-11-29T16:15:08.390000 CVE-2024-10474,0,0,38e6e4298f608fb21b96bd883c78028167134ddb38a35976ce1cbc6d3b3b509a,2024-11-04T13:34:48.513000 +CVE-2024-10476,1,1,783833b0540880b863e6d903369667871a006d7e446c33d4d348d1e927a02b79,2024-12-17T16:15:23.390000 CVE-2024-10477,0,0,042382d86b0ba290d79c362982db38f0a6fc3b809d3e050d5405d629f9440996,2024-10-29T14:34:04.427000 CVE-2024-10478,0,0,5a8dbd24046d4bb3d7fcf6c3dfa97e4feab86f30f54a58503ebf33007e06bd79,2024-10-29T14:34:04.427000 CVE-2024-10479,0,0,bb6056ed6045f25ab06ecb5035985b3a7787a7a52ca2a55b79580b99bc238976,2024-10-29T14:34:04.427000 @@ -243944,7 +243945,7 @@ CVE-2024-1115,0,0,dd875c679e12a582e34ee954cd3620e780335d232c345f8362745b6ecc6a1b CVE-2024-11150,0,0,ee08facb687c71e0758a3f80ca5be44dd7cddce83b66eb6f473227f03ba9086e,2024-11-19T16:57:05.407000 CVE-2024-11154,0,0,1d007c9319ffd27da392e9be5bae93f9e0fe9120d11601f0387b6b03bc9f2945,2024-11-21T13:57:24.187000 CVE-2024-11155,0,0,530e524be04c0b7fe606872e87c893c102c89b7b134235dd71b8ab6980309d75,2024-12-06T19:15:10.730000 -CVE-2024-11156,0,0,f39b09fa190596c38ebf51b13449342b6acb734f0b09b72281a8d591332fba2f,2024-12-09T23:00:25.357000 +CVE-2024-11156,0,1,ad330dfa68e720fee623103f418eaa62314e3a272ded75cde56e9603a3ffe667,2024-12-17T15:52:01.670000 CVE-2024-11158,0,0,f4277fb3bb3323487bacb0f214f68a39e123c47bf4125591e2d6d331c6396761,2024-12-06T17:15:07.970000 CVE-2024-11159,0,0,8afad29dc7b40793fcd69369c055be5c54db43acf2a2aa9e2c3ac35746277cd8,2024-12-06T20:15:23.937000 CVE-2024-1116,0,0,7d8d96f7c323e069e605409b474b2bd18744f4c3487afdd2599b3edaac1467cd,2024-11-21T08:49:50.050000 @@ -244137,6 +244138,7 @@ CVE-2024-11418,0,0,535b692f50d805c4818cee62531f6352bfed10bac65a921339df0cdb31e46 CVE-2024-11419,0,0,e5014d0a20f8da57d3c2f2e9aca265f8c88437545b7df01014bb52b3f903da56,2024-12-12T04:15:05.467000 CVE-2024-1142,0,0,e15d337f366ba06849b1f848d8db9c587e5c183aee7e98313d369c15ae012a6d,2024-11-21T08:49:53.680000 CVE-2024-11420,0,0,1711c7ba1ba8c097f09567c5d53d049cbf7bb1bf6f7b471b4caaac9c33673bbc,2024-12-05T10:31:39.750000 +CVE-2024-11422,1,1,702bbdce9fb7e78434fdcf5ca925333ef9ba7cf8ea661aeb7208d278c517116d,2024-12-17T16:15:23.557000 CVE-2024-11424,0,0,d50ad6baffad28053a50f50d0d95ca3de9adf87a3fb1a59a3e023fabb9b6d399,2024-11-21T13:57:24.187000 CVE-2024-11426,0,0,b92664b1e686c3f02127b23b083fb58b958de57166c1605ab7455364a1793bde,2024-11-23T05:15:07.153000 CVE-2024-11427,0,0,c3fcf7998beeb6a903337e5ecaceaa89f8054cbdaaa765548243de887ca3fc67,2024-12-12T04:15:05.637000 @@ -244623,7 +244625,7 @@ CVE-2024-12123,0,0,3314f70340307f7968d2c224d2753ec462f128bd5dd04a8f7d840d35f281e CVE-2024-12127,0,0,2f75cfc1ef9826b6524289717f08c448185c9e1ac906a2393b8e7f15baff93de,2024-12-17T10:15:05.830000 CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000 CVE-2024-1213,0,0,71ef51029e532fbd05d5ffce04ca88ce9c1183a8c328c139d7f9dd3d163c9edb,2024-11-21T08:50:03.180000 -CVE-2024-12130,0,0,7cfba8bfed047a35f2157b6593a70767911cb47817273a684a588e01474943c3,2024-12-09T23:00:48.743000 +CVE-2024-12130,0,1,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000 CVE-2024-12138,0,0,8d975d6d21268c978bf38e4ecd10070b486d972f9cb2bde16883c51e239ae6fa,2024-12-04T14:15:19.413000 CVE-2024-1214,0,0,006edfeb44add0513d6df0049d407da5a783feee7b6e41af090a449d9f26b334,2024-11-21T08:50:03.383000 CVE-2024-12147,0,0,0ebd2d9e73219a39fb6777c8b0dc3255058db7114ec6ee0c20c337fec7f9520f,2024-12-04T18:15:11.803000 @@ -244642,6 +244644,8 @@ CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f CVE-2024-1217,0,0,3de4593a5f9b417a5fbd6236f528d532a8a6dfb588724578487cd5ad8c5d1072,2024-11-21T08:50:03.817000 CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000 CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000 +CVE-2024-12178,1,1,cccd0344add7c6e5aa14bc709383e610a75683b90d410236c121fb89e5e7c90f,2024-12-17T16:15:23.687000 +CVE-2024-12179,1,1,2f5a01f13d9d2bcaae7c4c339f7a592e8a8b278a53f31abc52dc78198faa8f5d,2024-12-17T16:15:23.870000 CVE-2024-1218,0,0,ae65e02be37dbc9babfa45210656ff360cc199b16c8680945f92dd585fedfbc3,2024-11-21T08:50:04 CVE-2024-12180,0,0,25613c8b94aac2cf24513985a7e8ce52f62a7fb91248d4df9e059f62149972d6,2024-12-10T16:34:52.763000 CVE-2024-12181,0,0,2f8ddb76759020891581c20b50823d1952e3d03370eabe8b27bca8702bd25159,2024-12-10T16:29:18.917000 @@ -244652,8 +244656,16 @@ CVE-2024-12186,0,0,44e0fbeb8593926913663c90a8d76c7d9e63d8cea11901a6acafe7cca925b CVE-2024-12187,0,0,d5219bf8165d3b6d69ade284ac66cc01774c2830861f108855db8360e680b621,2024-12-10T15:25:53.537000 CVE-2024-12188,0,0,7ed239e8baff77cd72f7797865913dce6f434fc87b23f5e6feb697e0a02c98fb,2024-12-10T23:18:39.680000 CVE-2024-1219,0,0,629287fb6c9fdb1db5a6b18292530d26bc4ea3297efdbbab51f719885479af95,2024-11-21T08:50:04.430000 +CVE-2024-12191,1,1,1dda7946d3504ab21de6e2b99be837db15b44a022b82e8df557dd7d38833b104,2024-12-17T16:15:24.007000 +CVE-2024-12192,1,1,5bf94db60490c8803a3fa4d8214814b026a82a1d77fe7dd7a1e1e3980359c558,2024-12-17T16:15:24.130000 +CVE-2024-12193,1,1,a6d2e7e697464c52080d777dafe24b693bad3fa372e847e29f865a8d0d1d9deb,2024-12-17T16:15:24.247000 +CVE-2024-12194,1,1,f6d7c9abea6f1f2f3e04a781ccb4d76997fbb07ce4ae6eb8cd255314b284a21e,2024-12-17T16:15:24.370000 CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000 +CVE-2024-12197,1,1,4e09328ccbf46d2641558e1555b4ee8e0bb85a3c5305f90d3f8cc5bad5afefe7,2024-12-17T16:15:24.493000 +CVE-2024-12198,1,1,f2957a6fcf61451cf37b722fee29e3f1de6132298987c75f9fea3c16c56dd397,2024-12-17T16:15:24.617000 +CVE-2024-12199,1,1,b2e03c50b923f94d4f9147d7c53b0a4cbc872c054bb48ce46bc78ddb043d9135,2024-12-17T16:15:24.750000 CVE-2024-1220,0,0,9554836c8027e0b7a98d02c469b0640f37340ff8518df5c7c53c1851829f880c,2024-11-21T08:50:04.733000 +CVE-2024-12200,1,1,6805cace723eb85be014f307482a27e027853f4c771f58d993fcd067b38cfcef,2024-12-17T16:15:24.897000 CVE-2024-12201,0,0,24aea21415169e4ceff164eedb7fa32646ef24d523e6e014144846720c08c29c,2024-12-12T07:15:09.607000 CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000 CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000 @@ -244847,7 +244859,10 @@ CVE-2024-12665,0,0,20c012aa44cf6efbaec36428e27712f8278e734a812c7dd5afcce74ec2d8d CVE-2024-12666,0,0,e6916594a0490686e8b3fa8e2eef1b08f1952d21ae56044d4a0b2592b3b950f1,2024-12-16T20:15:09.430000 CVE-2024-12667,0,0,8326e32b687aca9c189f301c70ca8cd23c53ed4f34213ac25fd52d1fe1bec45d,2024-12-16T20:15:09.600000 CVE-2024-12668,0,0,2d75ced822d853be6c6d0f513771edc99398324227c8582be01ec3a2f5a7e3b4,2024-12-16T17:15:09.700000 +CVE-2024-12669,1,1,cff9f2a304270add667ff179e86a9f065113db2e7e50955c8f0fd086a0592670,2024-12-17T16:15:25.020000 CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33c4,2024-11-21T08:50:11.937000 +CVE-2024-12670,1,1,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000 +CVE-2024-12671,1,1,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 @@ -245472,7 +245487,7 @@ CVE-2024-1927,0,0,c754cf7000b74a3d7c61b91f0ca4b282b216c625eb00b47280512443ba5b90 CVE-2024-1928,0,0,e38b57712ffe44adebf778e4c97ebd535c657c7ef35cde442917a9981e04b55b,2024-11-21T08:51:37.150000 CVE-2024-1929,0,0,66be880166e4ec1807686bf782b92499d984f95d0cb3506835484b1d8d6dd831,2024-11-21T08:51:37.297000 CVE-2024-1930,0,0,4e0ea797e3bcfbe6df93f1e664d676ae5be49ce3d01faca149c7e20b46d8fb7c,2024-11-21T08:51:37.427000 -CVE-2024-1931,0,0,14b2228992b7d6b8aeaf231b94371c38ceae5b39b5e243d53f5efea70d709194,2024-11-21T08:51:37.563000 +CVE-2024-1931,0,1,db484bcf3fe471ed684baac919e3006a76f44b1624ec62ec54d0a30f78125057,2024-12-17T16:56:50.630000 CVE-2024-1932,0,0,2b9bb2c3d59cae8cdf156ee190b480990d3e06371bf069fff8950dc8f1e71b91,2024-11-21T08:51:37.727000 CVE-2024-1933,0,0,ec2acdb0cb128d6d2e4e087e8a75f4db01db65f33280945e832ec822f7e9b472,2024-11-21T08:51:37.853000 CVE-2024-1934,0,0,67d0b46c0c7d874343f5536356cb6ea32a08b1ee91ce9868fb168e6a1ff7f380,2024-11-21T08:51:37.983000 @@ -247221,15 +247236,15 @@ CVE-2024-21909,0,0,5935a0bac56f64a585bf3a5d3a58749af3bd9b1b55e7d4698137044246734 CVE-2024-2191,0,0,2ea7af8dfa3f2d954261631f5f16de3015020c3ac677923869e661d02374a882,2024-11-21T09:09:13.543000 CVE-2024-21910,0,0,cbc277b52828b6f42ba8f990f48e48761bee9669b10721072e9f971531fa5b89,2024-11-21T08:55:15.320000 CVE-2024-21911,0,0,ecf2241468adf940e2c0a2f0db8992eda0c6792ed4a6f3737c2295eb4920e7ae,2024-11-21T08:55:15.477000 -CVE-2024-21912,0,0,582ec5203997d71ac0d1056ed47fe2417de67c4c6aa7cffe8ec76cfed2576539,2024-12-09T15:13:40.437000 -CVE-2024-21913,0,0,479b5dd08769265b5661e21b75669cce61442e59290ecf0b015bb7ab2058f5f3,2024-12-09T15:18:28.870000 +CVE-2024-21912,0,1,d4ca47b54021d9a647f9a806c60548cce35dade02dc178bcaba5a1dc171a93ba,2024-12-17T16:16:07.373000 +CVE-2024-21913,0,1,fd9c78c65c69fb45d6a19e6182b8751846bb429a958b6354deb02bd37ab77bb0,2024-12-17T16:16:24.157000 CVE-2024-21914,0,0,9be91234e3a87100bb31a25430bfb3372edd3b42a557333c44d4254d13220f1f,2024-11-21T08:55:15.933000 CVE-2024-21915,0,0,a165f2d25eb37fb2f87120fddd3fade5ec5c366c0d09d9e6ea27b966a24766a0,2024-12-11T19:31:28.200000 CVE-2024-21916,0,0,281122525b18b4c37d709679826f35f553f234e6aca4e9b21e208465570118c1,2024-11-21T08:55:16.243000 CVE-2024-21917,0,0,4596cf747d33ef750330f71a8f984548ddf844a5b7fe1daf92e4333c822c4a23,2024-11-21T08:55:16.427000 -CVE-2024-21918,0,0,a67329e256c4a4c8d9d647b0d42114dbaccc94d666d01581e4b8a2c6d540f918,2024-12-09T15:18:49.257000 -CVE-2024-21919,0,0,6a2ea2d36bfd9815f995257ec3866a9a00d218f95f358b27ed201742ac4bb1d8,2024-12-09T15:19:18.887000 -CVE-2024-21920,0,0,bf2deb075eb15a4c0530be1906a9a5c994a655add6c3a2fee78ba64b2ac87c84,2024-12-09T15:25:59.723000 +CVE-2024-21918,0,1,dc11a3a57567440eae7517d3e5698262bbb92a09771b9dc937c33b65f9af3ee3,2024-12-17T16:15:50.300000 +CVE-2024-21919,0,1,e32085602e3d28ef958a012fb2a33eb2af98476272747f23edd8cebf66a80352,2024-12-17T16:16:16.773000 +CVE-2024-21920,0,1,272e163c2f3b6945c5a2836dd0a4057171bebc3edb08dc255719f5183cd499f0,2024-12-17T15:52:01.670000 CVE-2024-2193,0,0,d1b5d58eb23650603dde2193fa058a7052b07b528230b86e43f08c6748cd11c1,2024-11-21T09:09:13.693000 CVE-2024-21937,0,0,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000 CVE-2024-21938,0,0,e6f1d051234de7989356f79ac1506a864dad401661a64b1d6a053bafbf88e120,2024-11-13T17:01:58.603000 @@ -247952,7 +247967,7 @@ CVE-2024-23091,0,0,ac809bd19f7e627635a79d83b5695bf1c2fb09ece061006c0f1815b6022ec CVE-2024-23094,0,0,39856c4da401f038553ce13c83297dd603ae7bf5ca4cf6ae32992dbd89dce5ce,2024-11-21T08:56:56.250000 CVE-2024-2310,0,0,b6f8a00e8715d4b3b60be0214b575fc22e21dc1cce049eb25d1bfde853925611,2024-11-21T09:09:28.823000 CVE-2024-23105,0,0,cc92d5b7f0e64822efb2303bf788a510716bf4a22d1dd8fe4f1ced2ca7c2db73,2024-11-21T08:56:56.483000 -CVE-2024-23107,0,0,25e49bbd82121ac834b4013ab8dc2f3409ed2ffd6c46c817346dfd8e7323ab16,2024-11-21T08:56:56.640000 +CVE-2024-23107,0,1,fb9f269ff9a1721dc70633ce33277322f1dbc0036fc8172640447e4431712b1e,2024-12-17T16:51:35.250000 CVE-2024-23108,0,0,9d659a0c56266d107dd050234c8418f99361db23121c8ca000992c1044ae9639,2024-11-21T08:56:56.783000 CVE-2024-23109,0,0,c8b681856326059919d7eca87f263b10c76f30a97cdf3c7093cdd3ba11934f09,2024-11-21T08:56:56.940000 CVE-2024-2311,0,0,9c4e7deb9e8a0b4684c4997e881c634e5cc11c5e94431c2e57d2c4e11002a2b3,2024-11-21T09:09:29.013000 @@ -248440,12 +248455,12 @@ CVE-2024-23660,0,0,a0693769ca2af12f268fbf5cf4c178feba914b1a9e06080d95be4eda9e1f6 CVE-2024-23662,0,0,fcb6a3236ea3e39380df6e19287e42e2832677f3aa97bcd1d15ed0addfd552f6,2024-12-11T19:11:44.790000 CVE-2024-23663,0,0,4115801077b89b088b225d11dd742f9500976c4f6b3e6ad1ae4e5eab6cc084e4,2024-11-21T08:58:07.203000 CVE-2024-23664,0,0,665ff2ffa7ebe6329b6096a4739ce61633371294cf2579873454d1efb96b574b,2024-11-21T08:58:07.350000 -CVE-2024-23665,0,0,c8eca8ed5083a6d0fa08238fe8d304598d21bb2eb465c1d1eedb994b2280c9b5,2024-11-21T08:58:07.463000 +CVE-2024-23665,0,1,73cd0c9417cef1431f5ca94fe0c36816dbd45052d13d6eb832491df45fd31d3e,2024-12-17T16:43:37.527000 CVE-2024-23666,0,0,ba3de7b8db0a2805c97b89eedb7e9791d49d8ddcbed317d5cfa8eec087545428,2024-11-13T17:01:16.850000 -CVE-2024-23667,0,0,22daf8d580ceb4f854970090ec4368b30448fd5deaa38f079577ed1845cb942b,2024-11-21T08:58:07.653000 -CVE-2024-23668,0,0,d39698a4656cc49728e6fa60b5a6a86d4e060dcf594b05fed0474720b95de8cb,2024-11-21T08:58:07.777000 +CVE-2024-23667,0,1,68282659dadf8421bf999f7e5b6411f97973ed884f7fb45d2dd6b12f64ffbbb2,2024-12-17T16:38:56.453000 +CVE-2024-23668,0,1,99bbe4b94140b9d101bb1590de5b0cc79587c2f19d27a805e40ca7dbd516eb82,2024-12-17T16:38:42.387000 CVE-2024-23669,0,0,b88515905b95c6021928badd7e75375eff2a9c40d8137d95c199c0ac0de087e8,2024-11-21T08:58:07.910000 -CVE-2024-23670,0,0,ed068e09aa2c5747fdc5754dbd3a5a40c76b2d0850ca28bf7b8e83ea14b5c009,2024-11-21T08:58:08.060000 +CVE-2024-23670,0,1,7ea838294d59355957913c30bbefb71fd4094d7e119f5cfa4518f51e05a3f33f,2024-12-17T16:35:25.233000 CVE-2024-23671,0,0,396785c967bc3ff65faf3f8d8766b25f101bf2a9bc74a5a418acaf4f93f30858,2024-11-21T08:58:08.203000 CVE-2024-23672,0,0,d3712bfc14f4b9b6ce9894f5bdb5d3a1e4e089b0453cb6f78f1161e243ea834c,2024-11-21T08:58:08.340000 CVE-2024-23673,0,0,5d461731855b43c0d221afdce212ef5524691ccf548305743a6bb2f8273e06b7,2024-11-21T08:58:08.560000 @@ -248468,22 +248483,22 @@ CVE-2024-23688,0,0,c659042598645c0c0fe5f9aca9a8b934e5ec750f56491cd83f91b6f1b5a4f CVE-2024-23689,0,0,e6b0f4cd27f0b28e80b35d8eec6ff10d357cb4712a691dea5fdf4ee6cf0168d1,2024-11-21T08:58:10.850000 CVE-2024-2369,0,0,eab708bdb3030a9091cd2f82435a394416d6e76814dcc673d1fb843dae51dc2d,2024-11-21T09:09:36.597000 CVE-2024-23692,0,0,7d07c6d1bfbd08f95e5aaf65278eb34ddda4e83f859da08c679a824409690f2a,2024-11-21T08:58:10.980000 -CVE-2024-23695,0,0,8160dfde6ea1319e1122d92d8284e8402e274939dc3d3a673051b5b3294da4f9,2024-11-21T08:58:11.137000 -CVE-2024-23696,0,0,4f459a623b60aff50b9d30bbc7aa90ec52c438799ec90477dbfccf481861cb9b,2024-11-21T08:58:11.327000 -CVE-2024-23697,0,0,ea64928461dc0a55935ff211eacabe1b98be774093bc4628541d591dc55556c8,2024-11-21T08:58:11.503000 -CVE-2024-23698,0,0,4403ca6fa9e2b52b446e9409fc65c97328df4579885fcb01f8222201cb78501b,2024-11-21T08:58:11.687000 +CVE-2024-23695,0,1,a416c243a4115ab74e222722bc0324c0d332df39bfb3ccb986ed5ec6237a05a7,2024-12-17T16:52:47.107000 +CVE-2024-23696,0,1,678f8b53e63e26ed90afc5803fa458e4881112fb33c3e850d458b8dc68e8772f,2024-12-17T16:52:14.557000 +CVE-2024-23697,0,1,14b85d09f7c85af608359a821d23f0c3476d155ead1e9e1397c3827e42da3f2b,2024-12-17T16:45:51.077000 +CVE-2024-23698,0,1,907087d17ddf42eb545b41d713eb2ee18ebd1e6c56796ba2d235785cd2d277a8,2024-12-17T16:36:40.333000 CVE-2024-2370,0,0,b4d60e1047325278ac8b0d4698ddbabcf9cce9ef3d3d19d6f7eb18094f826686,2024-03-20T16:15:08.270000 -CVE-2024-23704,0,0,e93b55c716b29190b6bb36621287f17deb4ab24edf573863d06a044ab0c6b7ce,2024-11-21T08:58:11.870000 -CVE-2024-23705,0,0,bd1bf6b9ce7ec4fdbfa84885dd6a62fbc344e9820aea64e8b1a12579918792d8,2024-11-21T08:58:12.060000 -CVE-2024-23706,0,0,fc7a533839453f58ade173ec5be505291f67db65321a980da91e6c3fafc7fc4b,2024-11-21T08:58:12.260000 -CVE-2024-23707,0,0,d5797aa057c714ad9beaefc45a8ad7d7762375f872316fb92167125d796adfd5,2024-11-21T08:58:12.457000 -CVE-2024-23708,0,0,2084291ca153fb5ab968809e21a5e86ecbc8dc878fe92a8997ad9f6419aba3f2,2024-11-21T08:58:12.650000 -CVE-2024-23709,0,0,cd5b0294aead9c4fec8eae4bbd5fd4afc5e4990fc0cfbd1cfdd9e72ac6ae345e,2024-11-21T08:58:12.853000 +CVE-2024-23704,0,1,3236dead0434bacfaf43232928325e0c9114b73029c3cf586ac1719ad12c5883,2024-12-17T16:42:42.060000 +CVE-2024-23705,0,1,7da00f9ded44fdbd3340ad5b361d7429b4f902b7ec31aa14ce296792f35aa87d,2024-12-17T16:43:17.997000 +CVE-2024-23706,0,1,457b78bc64b68082116cebe39c5e62b42fda2864a51890328cd29d59be39e817,2024-12-17T16:12:26.823000 +CVE-2024-23707,0,1,73205b3a1368fd8acf2cd16aad486a325047b5a5db27b1c2be43b43ce625324f,2024-12-17T16:21:58.717000 +CVE-2024-23708,0,1,711799ff0f6bab0d25fa88ec6193aa8a248ad5e0e98dc5696f62a79eb66aa6a5,2024-12-17T16:43:36.227000 +CVE-2024-23709,0,1,051bcbf072760efe47f131b95b0617ef9743bfe6bf10cbb4eba1594d4bd93bbe,2024-12-17T16:25:07.723000 CVE-2024-2371,0,0,209838eff81d4f9d93299adfd2ef5e953eb5f044cd185d36bbbe157000499dc7,2024-11-21T09:09:36.803000 -CVE-2024-23710,0,0,343b1a85d3c5070526545224cbaf98d440ba0358490fb295c247f07e12d82bc5,2024-11-21T08:58:13.050000 -CVE-2024-23711,0,0,d4b698de8186a1376557dad7d75856de205658c381f703188e83287404c431fa,2024-11-21T08:58:13.250000 -CVE-2024-23712,0,0,dca7f7603f638f26cd2a9b49ac4a91d562ab61b2bb341246f4b24e9fdc2167d7,2024-11-21T08:58:13.437000 -CVE-2024-23713,0,0,e8b94189764e525ab5ed3b2460e14bd465f9ba6ffb04c1c7ebea5b7fb8e76a7c,2024-11-21T08:58:13.633000 +CVE-2024-23710,0,1,1f3550b1b927f46363cae2ad0949288572c2ca025dc8ef12ccb45e74d5f280f6,2024-12-17T16:22:25.460000 +CVE-2024-23711,0,1,6706791a88e7a60c4143d4f036911a62f9970aeb6bd822b195d3e7b624b0e5d0,2024-12-17T16:33:38.557000 +CVE-2024-23712,0,1,6880544286bde5ba80c9e3c4b0b986db758dacdbaafd6d1aa9dfada555637396,2024-12-17T16:10:52.030000 +CVE-2024-23713,0,1,bbcd40870553dc4e5db3b62b39c9391b9fc6947cd0ea14236f769c4386a54968,2024-12-17T16:08:06.810000 CVE-2024-23715,0,0,84bb266f9fee5a7b9ffe0eeca021ee8aaad13e22bd239bf206504fa99f9907ef,2024-11-20T17:35:23.597000 CVE-2024-23716,0,0,cb9ac2564c6ed4b5331bb3ee327380edc07c62ae3af51b2e54b84664f26df076,2024-09-12T14:35:11.523000 CVE-2024-23717,0,0,16d4d2ccf3311acd18064abfe451f2a254249a752165433dae4cdcd2767bccbc,2024-12-16T19:28:06.027000 @@ -252632,7 +252647,7 @@ CVE-2024-29275,0,0,04d24ec0b09e8992b316d39205c49d05d0ba002c7de004a46972837ba649a CVE-2024-29276,0,0,e492e2b9f2cab402ec63c3351f8ac901d3688e777b31189c69f2d34536b203c2,2024-11-21T09:07:54.710000 CVE-2024-29278,0,0,810e815ceeacd459126cd2f0be1468e4723065d75f15ecab73f4c892d8b4bcaf,2024-11-21T09:07:54.933000 CVE-2024-2928,0,0,4f9d141452f84e180c0e1f09f7c8fd6e6fdfae447a1da31584938ee63d171ea3,2024-11-21T09:10:51.707000 -CVE-2024-2929,0,0,35ed38ef35fc586445744602fbd90e8c5ed2a7792d6373bebc9abdc196f2f9cf,2024-12-09T15:19:43.377000 +CVE-2024-2929,0,1,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524f7,2024-12-17T16:14:25.233000 CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000 CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000 CVE-2024-29296,0,0,831ce2ec626a36a66b1383a816d653550dc19f16f98ff950995d327391a02479,2024-11-21T09:07:55.420000 @@ -252755,7 +252770,7 @@ CVE-2024-29661,0,0,33eeb097530dd938963a006813b514ee2f217b4805f64bf726e22f92b9d6f CVE-2024-29666,0,0,4816994d3696247c03b8328a9343bd38453cca8e45ebbf1e319026a45443ab8c,2024-11-21T09:08:09.110000 CVE-2024-29667,0,0,34b7576b4d736dd47cfaa8af367e24a2a8c6269ec16e4c867b990e680ca7d10e,2024-11-21T09:08:09.327000 CVE-2024-2967,0,0,d2ac382f00d4575193077f03ec53a42d2b3a92c77fb89b30f0dc868e4936acc2,2024-11-21T09:10:57.113000 -CVE-2024-29671,0,0,f78ef3d23b5c136143332597260fa0b86803b52801c6b77bb59392b05f2af3a7,2024-12-16T22:15:05.623000 +CVE-2024-29671,0,1,24902eac2503343ad4d2422c6d3c6b16dadc88fc6d5eca7edc21b3468c9a67e6,2024-12-17T15:15:11.857000 CVE-2024-29672,0,0,fed6aba6c72c648701c1be281c4b9f1cd2e136095e68e86097f193f0a03d9cf4,2024-11-21T09:08:09.547000 CVE-2024-2968,0,0,8581bb73f79fa107c2dede83ff67ae98d1d7fb9830fdfb49f54e97d6c8c6ffcf,2024-11-21T09:10:57.223000 CVE-2024-29684,0,0,e8dbdce83a941c64ac6edc30c8842538d41a99e6916fd5c622b5fa9cb194cb43,2024-11-21T09:08:09.727000 @@ -254125,7 +254140,7 @@ CVE-2024-31307,0,0,fe5c146bc2e01b31d10c8798aabeced41a593f46147cc701844fecf521def CVE-2024-31308,0,0,e26bc58410205067bb8d8db3d33abfda2da6af578804048a337db59e83ec9878,2024-11-21T09:13:14.700000 CVE-2024-31309,0,0,4d74e223b139d85cacb1e8588eca9fc311ad79bf20795c25cd105fa0c27c32c5,2024-11-21T09:13:14.817000 CVE-2024-3131,0,0,672bee77a4b9f56fc61c76e6dbf2a03a233210a4581feacc3c8db1074a180202,2024-11-21T09:28:58.147000 -CVE-2024-31310,0,0,bdea24a999c757d2fac2221e406e9c5520c7192dddd10ed52e7740352c1ad770,2024-11-21T09:13:15.017000 +CVE-2024-31310,0,1,098c3633a4927790e31a6001c9d03c9b41631dbc55201432e5beb837f265765f,2024-12-17T16:31:31.697000 CVE-2024-31311,0,0,d2ae8e4810723ce55077d803197ae125f0645fad7496b27a6f957265739f2b05,2024-11-21T09:13:15.200000 CVE-2024-31312,0,0,584b321d4f3c297f01c469393900aa398a59384f39186634cad0c7bb16c0cb52,2024-11-21T09:13:15.380000 CVE-2024-31313,0,0,91cfee6bbfecd3a7f731652aaed74a359cbb71089bd946b77204a920a35ded9b,2024-11-21T09:13:15.560000 @@ -257004,7 +257019,7 @@ CVE-2024-35227,0,0,f603064d312bdc0236cec2fadb9b100a9b378e884da8c1127fcb9b1191967 CVE-2024-35228,0,0,71272b772368179098bc4880da40d61506624e75d28f6489fd71d5eca6523168,2024-11-21T09:19:58.907000 CVE-2024-35229,0,0,ada2646518271eaef8855ecc7c3fc8ba90d5b71f7cb323412a25a97d186b4612,2024-11-21T09:19:59.010000 CVE-2024-3523,0,0,fc36607b1b975bc950ca25209a56f960461c6b097ca9c650e695dddb8c488a1e,2024-11-21T09:29:46.660000 -CVE-2024-35230,0,0,92ae45e983006a8b445e602cdf1231b319e8ba440ceb767b00841e4d44e8ca79,2024-12-16T23:15:06.467000 +CVE-2024-35230,0,1,507a7caa4230c7ec53e960137872259ee66c6badcc71ffa16ee80b6c85ac1404,2024-12-17T15:15:12.403000 CVE-2024-35231,0,0,a1826f3cff4a6dc3aa78243c02b10a4ba54c00dc4dcc3d2a95804f3143227620,2024-11-21T09:19:59.130000 CVE-2024-35232,0,0,ae66f9a641dd0b3190010f0319689bc1a6b70ec2a4eec811f6d529159f146823,2024-11-21T09:19:59.250000 CVE-2024-35234,0,0,7a4620a92a838ed11dd238a47e2ec5aa7137e8cced27e60b471a70c16df96b28,2024-11-21T09:19:59.373000 @@ -258208,6 +258223,8 @@ CVE-2024-36821,0,0,60cb795fbe9a2a2c4467b14534d7f52c86dd48fb5403218bbc6cdeec30e43 CVE-2024-36823,0,0,9e1ebca08d55ca17f27f6559bcd3066677490d7303fd69076d678e47c81636dc,2024-11-21T09:22:40.653000 CVE-2024-36827,0,0,d6040fc84b0312f50760b33080c7291df1a61d1f0582caa5a1321b7b68ef1b8e,2024-11-21T09:22:40.813000 CVE-2024-36829,0,0,889a5257373f42050d89550c917e5c7c089246da5ef78ae00e520eca300421c0,2024-11-21T09:22:40.973000 +CVE-2024-36831,1,1,14d8357356abae76f450511380294794e91ddf7c7a292763489476a4045a1f50,2024-12-17T16:15:25.390000 +CVE-2024-36832,1,1,0addef0edc7218ffab2aa2824b05bf558adb31a35b973ae088421c3ab383fdbf,2024-12-17T15:15:13.097000 CVE-2024-36837,0,0,d83fc28981d319ecf854be01b7dc28f82c71da56080e984abdcd526f25d1bab7,2024-11-21T09:22:41.213000 CVE-2024-3684,0,0,bc358363415738df391830c2c3e66cdd750f4480781ea5b14341855b580ed24b,2024-11-21T09:30:10.410000 CVE-2024-36840,0,0,df76986cf4b78b412b0f52e824699180a22287010c032e08a5b788b4993c826f,2024-11-21T09:22:41.443000 @@ -258872,6 +258889,9 @@ CVE-2024-37575,0,0,fb41a93cda92e423debc2a813128d4d353bf25b2fe44666c8d6cd43b5e9b3 CVE-2024-3758,0,0,ebf5799491c4d50327d301387a24bc8824b9b66932f3c9df6e38a156e61e4f83,2024-11-21T09:30:20.143000 CVE-2024-3759,0,0,3d6dc0f4725aed5b6af7da3389ad5200afc9d6c0e264cf08ee0e0679922e0506,2024-11-21T09:30:20.260000 CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000 +CVE-2024-37605,1,1,73be9321dbcebc4ec5e143e484571c65b4b62d83a25a108cadefddcd084b0c4d,2024-12-17T15:15:13.357000 +CVE-2024-37606,1,1,d83eee52dc73f87f32ad0d572ceab7defdccf67e21bce0e6e65f0d0873cd2d9a,2024-12-17T15:15:13.643000 +CVE-2024-37607,1,1,2ce547bea5f4e8b55544aff87b88fc92518528c2e159ea6abec53995beb9c68e,2024-12-17T15:15:13.950000 CVE-2024-3761,0,0,004ed23d80a1d621dade3d6d5ba49a1687dc6a6f7fb5df38e275f74669de5edb,2024-11-21T09:30:20.563000 CVE-2024-37619,0,0,b796fecf90674fedbf0dfe40b1af68e953925893a23f847b6b6ad0964ef79609,2024-11-21T09:24:06.573000 CVE-2024-3762,0,0,f84784cde49ad68443bd52d39ce140212ad4caaf950a282855e24c7ecf25b082,2024-11-21T09:30:20.680000 @@ -258945,9 +258965,9 @@ CVE-2024-37768,0,0,2793d768190db7539c96d73238c8df462702d3812318427858b72a73db2bd CVE-2024-37769,0,0,ebb9ba49fb51ffaaf91f9ff8b56894aba69c0664bde10d7ebfe9dd5080822c95,2024-11-21T09:24:18.103000 CVE-2024-3777,0,0,6d6468a79705e917b5409dc4c8295a80d29b4efb80ab5212b3e5097b80656f73,2024-11-21T09:30:22.660000 CVE-2024-37770,0,0,3ae1b26b08d620f39fd2fc9b0f3e94aeedfe3c4571e06714b0c443b19a9d4c82,2024-11-21T09:24:18.330000 -CVE-2024-37773,0,0,93d9ddc1d9f09d51843a8aaeb77f6802f5055b280bcfad25197353f14e6cb724,2024-12-16T22:15:05.947000 -CVE-2024-37774,0,0,0f9205692d47d96c1f194965853ef62a648c1c35c924aa3032410012602a886c,2024-12-16T22:15:06.127000 -CVE-2024-37775,0,0,6fca9c78ef78fee4e7965b345eb1401a7cd0185244555ec5f57036f65d870f7a,2024-12-16T22:15:06.310000 +CVE-2024-37773,0,1,2e017074765151e5ff695c0297fa00e3f03e86b1bfb2dff271743421377148ee,2024-12-17T16:15:25.580000 +CVE-2024-37774,0,1,2ab42b0c0633061036f05297b975d97fe83d08d18d378d73ce77bd2cc921027b,2024-12-17T15:15:14.210000 +CVE-2024-37775,0,1,d5fbd8966422b87b56ffba076c5e4680a0b14972527b1e66a09cef04e7bc291f,2024-12-17T15:15:14.637000 CVE-2024-37776,0,0,2329494dd388ac6fd3c103113eeffe6506d2f069b83bc9c3e1702765b8c7acc5,2024-12-16T22:15:06.490000 CVE-2024-37779,0,0,0aba20750978da4733349dadb1ca63b8044cf1d1605f2dd296fab6c62fcf39fd,2024-09-27T14:35:03.517000 CVE-2024-3778,0,0,c5841f5de458f7e0e081b666f7a24d50a31cf8db2d38b0a5550274be6f0978b4,2024-11-21T09:30:22.783000 @@ -259573,7 +259593,7 @@ CVE-2024-38493,0,0,4bc3bb4a09abc963fa51784326718bced0354c37a2459c0b47f92207de44f CVE-2024-38494,0,0,1f129c527a043d054672829334da9694bcc0abb503164120f45d12b60f760728,2024-11-21T09:26:05.737000 CVE-2024-38495,0,0,c57460246bd2654a442a7e089db309669537766d2f426be8aec4def73902de48,2024-11-21T09:26:05.863000 CVE-2024-38496,0,0,01a1900349f3d0adbd135ec854533895da77cbe9c60e719fe6990ff9f4db5d3a,2024-12-03T19:15:09.550000 -CVE-2024-38499,0,0,6b2f10893c04df6d0866e222210a53410cc810b539a17fdaf10eeb5e483af6d6,2024-12-17T06:15:20.760000 +CVE-2024-38499,0,1,d48ba7b861247e2e7335421154dd92eb8fc0547f1ac04edea94b3dc629c24888,2024-12-17T15:15:15.087000 CVE-2024-3850,0,0,73a9519b4dc6d88b65702fd8409fd31ed5a6966b8b99f91a593546b7c4071d4a,2024-11-21T09:30:32.383000 CVE-2024-38501,0,0,21a80373aa9d7e24644fdfb4a65ec744cf578aba5d6e990dcbd2df904d0b193f,2024-08-22T13:34:42.653000 CVE-2024-38502,0,0,17ce9bdc7ff577bc96c645bc41b79b45ca6b234955d8ce844b268b214cdd59cb,2024-08-22T13:35:47.970000 @@ -263220,52 +263240,52 @@ CVE-2024-43702,0,0,026195b67973267c5f7e1b66b43eadfe3de1f0eaa8dad79a11b9df4d6c345 CVE-2024-43703,0,0,e564d47a3ea8e2e59e7c0c62fe5b37de767d270b87bc716325b902fc07b61a86,2024-12-01T23:15:06.383000 CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5dc8,2024-11-18T17:11:17.393000 CVE-2024-4371,0,0,e83d972dfd798c0045589442b000f085f252e3d21fb48583dd2590000a3618ae,2024-11-21T09:42:43.087000 -CVE-2024-43712,0,0,95d6c6a30a048a036e8f159699d0ba49c9b6d9ac67cefddb6d5078e5dc3bfe0d,2024-12-10T22:15:05.830000 -CVE-2024-43713,0,1,2351d2ccf5a9bdfa299b6fe1f3d7c7e3a4bbc01a6f8443c4348a36cf5880bc04,2024-12-17T14:55:13.953000 -CVE-2024-43714,0,1,73ad98cab774040abdc9b8e9830549831c35b419b45dea5dc85f0b3962eb2d25,2024-12-17T14:55:24.553000 -CVE-2024-43715,0,1,4cf84ce10fab9827937044c82277f713ec455de0838fd3078877d96d6d43fbdc,2024-12-17T14:56:06.787000 -CVE-2024-43716,0,1,f90c2b7c357bddfe8d5a74436152e07d34c10373ddacb26f30e6dda4e203b918,2024-12-17T14:58:24.220000 -CVE-2024-43717,0,1,6a66b67dbafdf186ec2cff04181d7c35b20a480e8dd5fa7b5c7ac4986486df38,2024-12-17T14:59:13.620000 -CVE-2024-43718,0,1,394dea2bb63e682641a18a050280c4d9fb559e75c8d8f769c6d9d796d651463e,2024-12-17T14:59:24.850000 -CVE-2024-43719,0,0,178a9efccbccdab2f796f362c72edbe2331c1c3d71a8068b3b101dffd05f4177,2024-12-10T22:15:07.010000 +CVE-2024-43712,0,1,9ab3fe760e8f19464e8d37dd73b7335ae43d5382e27e4d6ab5795a2dd3e62314,2024-12-17T15:23:11.173000 +CVE-2024-43713,0,0,2351d2ccf5a9bdfa299b6fe1f3d7c7e3a4bbc01a6f8443c4348a36cf5880bc04,2024-12-17T14:55:13.953000 +CVE-2024-43714,0,0,73ad98cab774040abdc9b8e9830549831c35b419b45dea5dc85f0b3962eb2d25,2024-12-17T14:55:24.553000 +CVE-2024-43715,0,0,4cf84ce10fab9827937044c82277f713ec455de0838fd3078877d96d6d43fbdc,2024-12-17T14:56:06.787000 +CVE-2024-43716,0,0,f90c2b7c357bddfe8d5a74436152e07d34c10373ddacb26f30e6dda4e203b918,2024-12-17T14:58:24.220000 +CVE-2024-43717,0,0,6a66b67dbafdf186ec2cff04181d7c35b20a480e8dd5fa7b5c7ac4986486df38,2024-12-17T14:59:13.620000 +CVE-2024-43718,0,0,394dea2bb63e682641a18a050280c4d9fb559e75c8d8f769c6d9d796d651463e,2024-12-17T14:59:24.850000 +CVE-2024-43719,0,1,9e152e2bc11f3e899db10ed56cf0d743ff8e1ac51d28f9bba7748782b337b4ae,2024-12-17T15:23:21.027000 CVE-2024-4372,0,0,80047d29f24899dba9fb9823b96bdeb83dfdd1716f145c555f0448a73bb4cc01,2024-11-21T09:42:43.207000 -CVE-2024-43720,0,0,2da03cc33ec8e17e48b1590d303d23bc1812477815dec0051acf1558aae9b230,2024-12-10T22:15:07.160000 -CVE-2024-43721,0,1,75c88b03a556609853a499c7a5323350ad23aaaec8dd9d2e1678a26617c51f1d,2024-12-17T14:49:18.897000 -CVE-2024-43722,0,1,cc8b74ada6c7c79c0264c0f5e04a7bc6c4f737d01440296d2a8557fac6025140,2024-12-17T14:49:31.107000 -CVE-2024-43723,0,1,231be03bef60a4e3122ec2aab227799d333096856154345ddf3c9ae6fb81ac9a,2024-12-17T14:54:52.780000 -CVE-2024-43724,0,1,3a9480844092ca94639fb464767ab4b92b22af6742a5752486a26253c54de03c,2024-12-17T14:54:45.177000 -CVE-2024-43725,0,0,42aa540cd7514f5706e1f2f5a8f4d8c7c4abd979a075300dbd173e0b0da11ae3,2024-12-10T22:15:07.987000 -CVE-2024-43726,0,0,e4029b09c83bc1ed43b9eb01f26e65b2539cc0bf1a2c02ccfc50fa7298066386,2024-12-10T22:15:08.170000 -CVE-2024-43727,0,0,fac3e63a2d867205589bebc8d7e3f00e8135ff7ecd2adc32b816d000185d2327,2024-12-10T22:15:08.330000 -CVE-2024-43728,0,0,7b29fd2233df32e26414d8224d706d8c6f9401a096cceb4197c05a0da3938d1e,2024-12-10T22:15:08.500000 -CVE-2024-43729,0,0,28128c8ecae1bb9bfe26b566620b30a2c414734187931c4a085a888424442602,2024-12-10T22:15:08.653000 +CVE-2024-43720,0,1,d638c021d2c4519944c77cc82d48804bad9a1d4d299b1831914f9401b5a56417,2024-12-17T15:23:30.417000 +CVE-2024-43721,0,0,75c88b03a556609853a499c7a5323350ad23aaaec8dd9d2e1678a26617c51f1d,2024-12-17T14:49:18.897000 +CVE-2024-43722,0,0,cc8b74ada6c7c79c0264c0f5e04a7bc6c4f737d01440296d2a8557fac6025140,2024-12-17T14:49:31.107000 +CVE-2024-43723,0,0,231be03bef60a4e3122ec2aab227799d333096856154345ddf3c9ae6fb81ac9a,2024-12-17T14:54:52.780000 +CVE-2024-43724,0,0,3a9480844092ca94639fb464767ab4b92b22af6742a5752486a26253c54de03c,2024-12-17T14:54:45.177000 +CVE-2024-43725,0,1,30380d7f2f90fe9234fad10753826883e156b71a37c48fedae6b77ba41a09c29,2024-12-17T15:23:42.390000 +CVE-2024-43726,0,1,25e5303aa3d2752d4973cd451cf4740ebcd9f1f02789fc820a4b05c4601e1fbe,2024-12-17T15:23:50.963000 +CVE-2024-43727,0,1,6e56c5fd624e3d379d7a3f747e5e59a0ffcf502486e1f94044c9e261f88907bd,2024-12-17T16:08:59.233000 +CVE-2024-43728,0,1,c3233a8c789e7819d2c5f63e98573c68412f95bb218cc659cfa54ba5cd1b9f27,2024-12-17T16:08:52.357000 +CVE-2024-43729,0,1,fd16aca5266f26268892610b59b3ce22649a0cc6dd52c18fd369fe8e8746be8f,2024-12-17T16:10:37.357000 CVE-2024-4373,0,0,90a0bc6a003143c6727c6fb96559f1f531614f51612ca46e3d9865e65abf33ed,2024-11-21T09:42:43.307000 -CVE-2024-43730,0,0,a77d4a38198ab9dedd4720d88c1997b7e1cb601f1782b87ee4f5ebe80dd615e8,2024-12-10T22:15:08.800000 -CVE-2024-43731,0,0,7c8ff8140628477b599b7dcecf1a866bd5fd47bff4ca5c5fa962553eae5eb7c5,2024-12-10T22:15:08.953000 -CVE-2024-43732,0,0,e8d7800231da717a6acc56c669dfe256a5218bed6febdbd670db77ee671cafc5,2024-12-10T22:15:09.130000 -CVE-2024-43733,0,0,3ed4e9d366b58bb92bc85ec8114c8b7317aa6d152e51acafaa54f46b093979e0,2024-12-10T22:15:09.330000 -CVE-2024-43734,0,0,a8d22f1bfd6ced688260a6a4193727ad8a15b72af810551fe73a67e0e11193fc,2024-12-10T22:15:09.507000 -CVE-2024-43735,0,0,04d7454486f14d1c0b80a05b2436f1badf326e2f497745cf1b4332fb832853e2,2024-12-10T22:15:09.670000 -CVE-2024-43736,0,0,347d3919bd3e089d4aded7e2e3bdfe09ec96cf109801ef0f5c49b8aa7a8092d3,2024-12-10T22:15:09.840000 -CVE-2024-43737,0,0,4ebb6c40d5da488de058b9683f184b83edcb5258e1d3fc0fcde482636bfa5182,2024-12-10T22:15:09.990000 -CVE-2024-43738,0,0,81f4a8f3b1d6a739e45b9cd1151bb70d801501224538d14efb193cae86b0ea68,2024-12-10T22:15:10.153000 -CVE-2024-43739,0,0,7a91271a6f4e00e20b399aa4446110af27f1fb1404626af8b9f34e6a4b52b581,2024-12-10T22:15:10.320000 +CVE-2024-43730,0,1,511fc38ab1b131240f519e4f5725c0c19c0dc6686d2f45ccf117f360ef4d0ec4,2024-12-17T16:09:14.430000 +CVE-2024-43731,0,1,5c3b5fe66c97a5a6d36076b9f043d86ca4c61e21608b97d83f5065dbede7f9d1,2024-12-17T16:10:11.630000 +CVE-2024-43732,0,1,d6320d07d27825fe26289d95b0ef0809cf1168dcd72804211be7b630d7eb9634,2024-12-17T15:08:29.537000 +CVE-2024-43733,0,1,9ad070ad4729a1fff8df43b928e321304ffaa479d4de2f84055ee8022b03111a,2024-12-17T15:08:40.910000 +CVE-2024-43734,0,1,ebfd9ee98601f9656f925992a8e0e853e89fded4ec860b392177b953b100cd0a,2024-12-17T15:10:05.660000 +CVE-2024-43735,0,1,a6830c280c96ec12ce5217f0df55421b20f69da84fb60d81b37dec4f1448081c,2024-12-17T15:10:36.427000 +CVE-2024-43736,0,1,0e006a98fd04c147cbe0991a6f8719fce65e7b17d0a9c38b8c70334f2081ae1b,2024-12-17T15:10:47.857000 +CVE-2024-43737,0,1,9b8da265f8a503750904ab1cd27231c137e4181c5801e3ebf77cbab31cf3471e,2024-12-17T15:10:57.970000 +CVE-2024-43738,0,1,6ecef13592fb45ea967619ab222a12fdca26c6ff3a201b7329cebecd83e46d3a,2024-12-17T15:11:07.987000 +CVE-2024-43739,0,1,56fdbe8f4b7920a2c3c8a1fd613e6ceedc184c355da54f79d9e2c68f3e1ca410,2024-12-17T15:19:59.487000 CVE-2024-4374,0,0,0fc50b1de94238d83b826da2552010ff2a72cfbd8cd99e9aecee9f37433a6dbd,2024-11-21T09:42:43.410000 -CVE-2024-43740,0,0,9078f47742cfee91b5106364c7bac9841acb7b8f0f412c684e35358b7c036347,2024-12-10T22:15:10.480000 -CVE-2024-43742,0,0,3256d725101b3bc3fc2af8271a9c2327242c3ad33235103c7ea5e5663fb4c3ac,2024-12-10T22:15:10.633000 -CVE-2024-43743,0,0,cd35e179ec183e5fb0aa80edb82c296ba370546ef21a0c3f5773bfbf76adf1c2,2024-12-10T22:15:10.787000 -CVE-2024-43744,0,0,10c141c0ead5c797c43f61b62061488ecfc39798bd4ce74a792b5ffbd9e85a32,2024-12-10T22:15:10.950000 -CVE-2024-43745,0,0,5fb04950e95f9ae6e21297a9abcb8d538c6c8958cdf178a4a05f3bc52635753a,2024-12-10T22:15:11.110000 -CVE-2024-43746,0,0,c21f082aa603559ac50cc8ee3e3e28b776e7f6129c106112750381472564e5a8,2024-12-10T22:15:11.277000 -CVE-2024-43747,0,0,6f8da120127bfdea1c5efdd75af8610d9efa5667586fdfa8b7abb826d94f48f7,2024-12-10T22:15:11.440000 -CVE-2024-43748,0,0,54bd0853cd7c468296f61e0b5e7eb1d9919e5062062524b60a105784042d08b3,2024-12-10T22:15:11.597000 -CVE-2024-43749,0,0,6b24302743958ab600ec8348e5af5dc30a638842c3c7811691f876a4c2c7a172,2024-12-10T22:15:11.763000 +CVE-2024-43740,0,1,a7f254a2ae8911c469c61985d33b196be8f0dea4d061c028b99af8e3565a798c,2024-12-17T15:20:11.820000 +CVE-2024-43742,0,1,11d9aaa1718bdacbb5248a521920ac1adfcb68e388cf6121acbfbf885ed9003b,2024-12-17T15:20:22.327000 +CVE-2024-43743,0,1,3b3fb21069c6bb78ec864dcb47040300ed9932f7f7efbc4787639e17fc9d76bd,2024-12-17T16:16:59.607000 +CVE-2024-43744,0,1,7ac5e622d4e39d0fbb5c98650eb2e13a5c200bce57d11398832a407f2fd6d300,2024-12-17T16:16:51.287000 +CVE-2024-43745,0,1,88459a6d209c589e34c902228442b9671a7ac87e4dc84d986836affb1075f66b,2024-12-17T16:16:42.720000 +CVE-2024-43746,0,1,05eab94794178d5978a8dd6259566fbbbe064ff04cbdfa68fb09a548f91e131d,2024-12-17T16:16:33.503000 +CVE-2024-43747,0,1,89a8e674cf97649ea33ba6ed3caf7a6cb53adcf35261ba81a20bc497b0ff308f,2024-12-17T16:16:24.517000 +CVE-2024-43748,0,1,f870e1704460d14aa516b365592aef5935d9bce63065eb7899d7c92bb1c3a1ea,2024-12-17T16:16:15.663000 +CVE-2024-43749,0,1,193f0cffd0abffce144c3be7c6c29237c649c91cb456092be02e116dc893e5db,2024-12-17T16:16:06.303000 CVE-2024-4375,0,0,226fb639a4436df6c70ad0c0a2a37d985a688254ed5b66b084e0fcdf89f3a83f,2024-11-21T09:42:43.523000 -CVE-2024-43750,0,0,8a35c05c9993838292fd67514e59386a415eed6e597ac0e2a841dd9bff2a657b,2024-12-10T22:15:11.913000 -CVE-2024-43751,0,0,de3bd17700b937d613a940cac0f55d3c03c25db93668ef0767c8105262c3b0d2,2024-12-10T22:15:12.057000 -CVE-2024-43752,0,0,b7d32c72245c657409b754d36351f2796eb139024c7fa439c2aef89d6b69b110,2024-12-10T22:15:12.203000 -CVE-2024-43754,0,0,c2a9aeddeb3f3aa332d345f12c3fc5316de8266ad79a961e6508bf62c3bf5ffd,2024-12-10T22:15:12.343000 -CVE-2024-43755,0,0,6eb63bd4bb432f787ff926db28aab426777577f6d1df2578993b5d1796902a0f,2024-12-10T22:15:12.507000 +CVE-2024-43750,0,1,84861a013c07a536eba3f06c1b09c36a5af56d8913259dd5be0d6c3bb4ce0e8a,2024-12-17T16:15:59.023000 +CVE-2024-43751,0,1,a350488993c65a864fda41c0cdcd589c92469ad8ac5061ed73a77cc5124a866c,2024-12-17T16:15:49.793000 +CVE-2024-43752,0,1,78725707fce29b89535aaa051fd9d1bf7a58d22739ed1f840f25cc25538887c1,2024-12-17T16:15:41.260000 +CVE-2024-43754,0,1,04f09243dbb41276e17aaf9f91bbba9c55bd97a5caeca10068df60bba8e0741f,2024-12-17T16:15:30.050000 +CVE-2024-43755,0,1,41c60138af18b7c36fdb420e74f060641494c92de226f501c5d32f4b44381f09,2024-12-17T16:17:28.580000 CVE-2024-43756,0,0,574012d52ba61623896d593dde944e97d1e4486f17b00226542a0b61b33f8b0d,2024-09-13T17:00:59.890000 CVE-2024-43758,0,0,0f26a442661cf8c474cf15fed83c27096c39a987496f8728b4b680b80eec825a,2024-09-13T17:27:33.230000 CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000 @@ -263839,7 +263859,7 @@ CVE-2024-4449,0,0,e0f013aaee4b2f3a95f1ce013908a251c37d824202f60baaf056feb992729f CVE-2024-4450,0,0,02e484232dba5ed729e6871e0f75add019f9f5e1494153f0f3ce664a865195ee,2024-11-21T09:42:51.320000 CVE-2024-4451,0,0,faf07e9f83c53ae5ef942ca91b86c49b80b994759e8a08c8a30c23242182311a,2024-11-21T09:42:51.450000 CVE-2024-4452,0,0,7ac79a1b071d6231e0bdf29c8f5e66e503d378dc5f4dbb0050814e5fd0879653,2024-11-21T09:42:51.580000 -CVE-2024-4453,0,0,fa1443387682565d65903a40e94e1e5607d4cbcdeb65581bf6df4bdd6c26b964,2024-11-21T09:42:51.690000 +CVE-2024-4453,0,1,4b6d5e2b75a7f55cb1a08aaeb38fe98756bad9bb2af40909de7772f9630d03c8,2024-12-17T16:05:41.267000 CVE-2024-4454,0,0,1e6371293057edf678c7077995a2115f685fb23dd798633163e8fe89ef2481d3,2024-11-21T09:42:51.820000 CVE-2024-44540,0,0,a3ed3256f272f75cb9da6472ccef92e78443ceab0d9d284cfb0ef32a1d8d4528,2024-09-26T13:32:55.343000 CVE-2024-44541,0,0,360d36038a09153826fdb7f75c9d2e58a990ae541d7e417f9aef6615b41fd219,2024-09-12T12:35:54.013000 @@ -267684,7 +267704,7 @@ CVE-2024-50375,0,0,56fac947e422fb64269f533486d0dc1ba9144509c581ce0bcf7e3c3e84436 CVE-2024-50376,0,0,1c676d8cee989c82ac8ed765a7b894a6388eed787e438d8c71eaa753adab0d7f,2024-11-26T11:22:08.323000 CVE-2024-50377,0,0,f6840753b5713fbe96faae600e2c62c2c1e93f11e2b524402c997c7946e91ee2,2024-11-26T11:22:08.767000 CVE-2024-50378,0,0,900ee50327f5385f2403e248242013736ebb85dd213456a5c5c919b232de1cfd,2024-11-21T09:44:35.040000 -CVE-2024-50379,1,1,887c64a0cf5475bbf017b1206d4e2afd4aacf9bbae36e9efa2e7c9d6e75e7544,2024-12-17T13:15:18.810000 +CVE-2024-50379,0,0,887c64a0cf5475bbf017b1206d4e2afd4aacf9bbae36e9efa2e7c9d6e75e7544,2024-12-17T13:15:18.810000 CVE-2024-5038,0,0,58120a5c504a9a5dd9c3a22b44d30b89afa2b5f02020ba28c9cce702a8c38af9,2024-11-21T09:46:49.963000 CVE-2024-50380,0,0,f10ef598ecccc7ed544ab2722f10c84c2a5e78255563c7513653ff94676d3b30,2024-12-02T17:15:11.980000 CVE-2024-50381,0,0,2c2c5a4847c05b7db6d3d96ff87c82f854de4222974bc5963df25dc7516f2d78,2024-12-02T17:15:12.160000 @@ -269139,9 +269159,9 @@ CVE-2024-52810,0,0,bc519c3395fca90f2847180bace5d2bd61f10ead143c379d0438b1982cdf8 CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000 CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000 CVE-2024-52815,0,0,c1e8fde97970f9249cef290754120e31a2a9f9b91031232cee085d5724ae3d3e,2024-12-03T17:15:12.267000 -CVE-2024-52816,0,0,b6dfdf7c94663af154765b0b938c10ab7a0016e6be7dac1a4ba62fa34d0d6231,2024-12-10T22:15:13.527000 -CVE-2024-52817,0,0,4e4a350676a789bc9071afa99b7c5fa1fcf4aba2f2338f691069a73d0b8ae2dd,2024-12-10T22:15:13.703000 -CVE-2024-52818,0,0,f021439ecb83703f2e4019676b3f17d7faec7e68f3082f779cad306426ccfa4d,2024-12-10T22:15:13.870000 +CVE-2024-52816,0,1,65718f19cb2a012b57ef8da79137eacc99e273905d4b5a57cf388720343e4d20,2024-12-17T16:15:18.873000 +CVE-2024-52817,0,1,efe63aa74be98b62fb8efa77a61c6f381ccaef4b4fb5791a86cabb88197bdeaa,2024-12-17T16:15:10.480000 +CVE-2024-52818,0,1,dcc413435dcf9a0af7b50af7ae991dda0838f2f16eef7b8a7c245b50433a355c,2024-12-17T16:15:02.203000 CVE-2024-5282,0,0,4f51eeaed389eb920a9aeb3a8c1e7ea5a9931768c3b7eb6744dae1b0adac061c,2024-11-21T09:47:20.920000 CVE-2024-52822,0,0,de168dae8d5e9b619f818fea9698f17a1675c4571323f9435a38243ee158a0af,2024-12-10T22:15:14.070000 CVE-2024-52823,0,0,c698bd3e1d4c228c0b799985c54a2563f1186410fdde64b0a02dd35b551284ac,2024-12-10T22:15:14.223000 @@ -269374,6 +269394,7 @@ CVE-2024-53140,0,0,278cbdb637af028f369abd9e56d14ef405930db6ac1e94694d5107009c64d CVE-2024-53141,0,0,c4eea5c2fe51a3898acccfa414620e41964aab3e73f12af77b5d7bb35ff9fbc7,2024-12-14T21:15:38.550000 CVE-2024-53142,0,0,fc23c3e378fb46ab5615da6a919ab3136de551312d5d21e741724005200e92a7,2024-12-14T21:15:38.707000 CVE-2024-53143,0,0,7d8fba7c24860a89d1b840b90918c133ee3933019e46b80ab5b9ae6d981cb066,2024-12-13T14:15:22.443000 +CVE-2024-53144,1,1,f3ee86a6e2fed60bab99086cf91c72e87a093b29af7d4b712b1bd08a99dc275e,2024-12-17T16:15:25.797000 CVE-2024-5315,0,0,cfc4383f1c53119936ccfb248038372daec91d7a497e742b345000be072ec700,2024-11-21T09:47:24.927000 CVE-2024-5317,0,0,c2af981f2442def6d43cf11dee826712fdb79df4e8b131d1c0815426b050d563,2024-11-21T09:47:25.040000 CVE-2024-5318,0,0,87e97b53a33051fc1fa3c078212ad6afb68bf37151bd321e62e233d7b2989703,2024-12-13T17:04:31.133000 @@ -270156,7 +270177,7 @@ CVE-2024-54664,0,0,d20f70ea69f653338f16a7f1cc2d57f70600da4ca2ed7cb633c4eef985633 CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000 CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000 CVE-2024-54675,0,0,14b4e742326580d47a2a009f3e3f65a46d84415cc785ea77b3a28630132c9018,2024-12-05T19:15:09.100000 -CVE-2024-54677,1,1,dd78d5a278a6f999c5830172836de8432bcfdcfae83c9232f8411eac628211d9,2024-12-17T13:15:18.957000 +CVE-2024-54677,0,0,dd78d5a278a6f999c5830172836de8432bcfdcfae83c9232f8411eac628211d9,2024-12-17T13:15:18.957000 CVE-2024-54679,0,0,381ad7e6890c67d9b6c47b47a43cd175dd5b1319ea7d6b78a90445a532dafd14,2024-12-06T15:15:09.693000 CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb4279,2024-11-21T09:47:44.527000 CVE-2024-54682,0,0,47c1e4bea5a44559550e8b3ac687261daadaa3d8113a6cea9c496aa4796df1ff,2024-12-16T08:15:05.513000 @@ -270227,7 +270248,7 @@ CVE-2024-5505,0,0,ef8367efb8e62f4d28c1b33787b307fdb06367b98441e7dd6605a6aed68ed8 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 -CVE-2024-55085,0,0,dfb0ad4a638155de193b6915984b27bb48398890d42d46adbc5f163f416532a2,2024-12-16T23:15:06.607000 +CVE-2024-55085,0,1,d6bcc24c3e520865e1ee191305765a610a91bdf0e859d65fb14733170ec8b40f,2024-12-17T15:15:15.840000 CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000 CVE-2024-55099,0,0,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000 CVE-2024-5510,0,0,75afe647f1d2c625afdbb2c36005f62cfbbe97b6f78e4011e89b81919ed96856,2024-11-22T20:15:09.343000 @@ -270267,7 +270288,7 @@ CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4 CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000 CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4f5,2024-11-21T09:47:53.940000 CVE-2024-55451,0,0,33d13ace4f05ddc223ccbf83de668e0d3737ecf73982be80adcb7bcf1bffbe89,2024-12-16T23:15:06.710000 -CVE-2024-55452,0,0,cdbaf3d6dba9fdc1b4cf83a0de9ee6c72b6b4a505720de4e35a2614fd30fca23,2024-12-16T23:15:06.817000 +CVE-2024-55452,0,1,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40453,2024-12-17T15:15:16.287000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000 @@ -270286,7 +270307,7 @@ CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000 CVE-2024-55550,0,0,083b12aa55fd376f21b90ec42869839cac3f2d3ae5f0c3d1ccf8b929f82d5435,2024-12-11T15:15:19.653000 CVE-2024-55554,0,0,24198bbf39b86e96bbc821836c0d923e43c75a2991fb21dc284e91e42ed5d155,2024-12-16T22:15:07.477000 -CVE-2024-55557,0,0,5d9f360423c6569f6da4bdefa27bfe0561b88244f9a5fc46fba37875e3828b4c,2024-12-16T21:15:08.783000 +CVE-2024-55557,0,1,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000 CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000 CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000 CVE-2024-55563,0,0,18204ee9bcd7a443817ede90b4af782476bfed51d18ddfae7057258f3016b43a,2024-12-09T01:15:06.313000 @@ -272875,7 +272896,7 @@ CVE-2024-8430,0,0,641bd91854296613ca357534b0f9d1be45bbed60220fc9e60563be11e11873 CVE-2024-8431,0,0,c57d1819aff02d7cef3d4f58b7fb7798fe1e0ad5c7dc00a6c26fb8aba099957a,2024-10-10T12:56:30.817000 CVE-2024-8432,0,0,fe1677a12edb0ed37c4bfb900e47d1aca0c63158bb3a82d245d901f88a3a1e05,2024-09-27T12:58:58.433000 CVE-2024-8433,0,0,64becb357e0272a653ad69b5163439c556b02ace2d502da92fcfc6deb7caa4c4,2024-10-10T12:56:30.817000 -CVE-2024-8434,0,1,0e5c3c041d44fe6867811e83187aa5478d596e83a995d06c6c786cdbe826e9e9,2024-12-17T14:36:19.633000 +CVE-2024-8434,0,0,0e5c3c041d44fe6867811e83187aa5478d596e83a995d06c6c786cdbe826e9e9,2024-12-17T14:36:19.633000 CVE-2024-8436,0,0,3901a53f2b69cf2fa9da70154fc69e5fb4af692c880115c4415c499eedc18c1c,2024-09-26T13:32:02.803000 CVE-2024-8437,0,0,e4efc23a5bf0d18afaa377517546a9b174c328585ec4f4a98a164a6336829fcb,2024-09-26T13:32:02.803000 CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 @@ -273324,7 +273345,7 @@ CVE-2024-8965,0,0,f8e90b5b67b70a8381e6e9eacdc79df30f60298bdd1400482e72c97cbc06ef CVE-2024-8967,0,0,7898714718fda7e623053515c819c9ef828b8e1f849f0008b801f032918cd46a,2024-10-08T18:47:12.110000 CVE-2024-8969,0,0,e0103db8ff55ccbf745d9bad3dc6e3e89e30b3ef3eab823189cb0a38ab304109,2024-09-20T12:30:51.220000 CVE-2024-8970,0,0,32d2ab1ad1bb8df91d143f8ca284d1a616bc1563b70e0f2f9520d488fbae118b,2024-12-13T01:20:14.813000 -CVE-2024-8972,1,1,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000 +CVE-2024-8972,0,0,8803923f1a932fca7afceec67344751a4aa4dcbfcccd96d5452861e7faadd73d,2024-12-17T14:15:20.110000 CVE-2024-8974,0,0,9dfe7c1e1fc096d25206dd031b2e4236d5ec5630433070bbc83f3c7af62bcf85,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,2e1af783568cf7ad44e3b33e6ac71980410920ee6be566fa4a01ec060d747af4,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,cb8e4225cbeae27a4d5cd5a6caff3e78c74f90a4a117f3ebee8859bf0cf66b60,2024-10-16T17:10:13.220000 @@ -273972,7 +273993,7 @@ CVE-2024-9815,0,0,888a21261db26e5e3abcb23eef5b5554231068cd5e2c09b2853a7d6a14e6b1 CVE-2024-9816,0,0,0c9e91c9c76ee23d16ff6c1da9e6512722ed7b3f956a306b3f3091de7b2176e7,2024-10-17T14:53:05.630000 CVE-2024-9817,0,0,f4ce773fca9e42014a1f6c1f24b7b847a90c6cfc337d02bfc8f72f1902c7d7fa,2024-10-17T18:12:58.953000 CVE-2024-9818,0,0,7fb572b98937aa55829f4476928bad8b1fb5601f9555683143fad81392780e70,2024-10-17T18:13:37.347000 -CVE-2024-9819,1,1,5664413e6c1068e0f57cec1134b206efd3af2ddd762d6ec8a2b686b615dcf27c,2024-12-17T13:15:19.100000 +CVE-2024-9819,0,0,5664413e6c1068e0f57cec1134b206efd3af2ddd762d6ec8a2b686b615dcf27c,2024-12-17T13:15:19.100000 CVE-2024-9820,0,0,fd87ed6a28af139962800259a754dbde67b7483a77ceed7f1e754d00989c64ca,2024-10-19T00:44:10.420000 CVE-2024-9821,0,0,998cb484708b6d639b88d328380d97e10182c41ce084a3bdd91de81a020e2e5e,2024-10-15T12:57:46.880000 CVE-2024-9822,0,0,f1bf0282ddb6c40708926a0c5359bb5d5e793e9f09b41cd8b96a11f1b887969d,2024-11-15T16:41:41.507000