From e6364e3d6533c6833272085b3ff6f0858827c4a7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 17 Dec 2024 00:59:02 +0000 Subject: [PATCH] Auto-Update: 2024-12-17T00:55:40.113371+00:00 --- CVE-2024/CVE-2024-109xx/CVE-2024-10966.json | 86 +++++++++++++++++++-- CVE-2024/CVE-2024-119xx/CVE-2024-11900.json | 60 ++++++++++++++ CVE-2024/CVE-2024-119xx/CVE-2024-11902.json | 64 +++++++++++++++ CVE-2024/CVE-2024-119xx/CVE-2024-11905.json | 64 +++++++++++++++ CVE-2024/CVE-2024-119xx/CVE-2024-11906.json | 64 +++++++++++++++ CVE-2024/CVE-2024-124xx/CVE-2024-12443.json | 68 ++++++++++++++++ CVE-2024/CVE-2024-254xx/CVE-2024-25468.json | 82 ++++++++++++++++++-- CVE-2024/CVE-2024-283xx/CVE-2024-28326.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35230.json | 64 +++++++++++++++ CVE-2024/CVE-2024-550xx/CVE-2024-55085.json | 25 ++++++ CVE-2024/CVE-2024-554xx/CVE-2024-55451.json | 25 ++++++ CVE-2024/CVE-2024-554xx/CVE-2024-55452.json | 25 ++++++ CVE-2024/CVE-2024-560xx/CVE-2024-56017.json | 56 ++++++++++++++ README.md | 55 +++++-------- _state.csv | 76 ++++++++++-------- 15 files changed, 734 insertions(+), 84 deletions(-) create mode 100644 CVE-2024/CVE-2024-119xx/CVE-2024-11900.json create mode 100644 CVE-2024/CVE-2024-119xx/CVE-2024-11902.json create mode 100644 CVE-2024/CVE-2024-119xx/CVE-2024-11905.json create mode 100644 CVE-2024/CVE-2024-119xx/CVE-2024-11906.json create mode 100644 CVE-2024/CVE-2024-124xx/CVE-2024-12443.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35230.json create mode 100644 CVE-2024/CVE-2024-550xx/CVE-2024-55085.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55451.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55452.json create mode 100644 CVE-2024/CVE-2024-560xx/CVE-2024-56017.json diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json index 6a169fd41ef..058eb5c9bd3 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10966.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10966", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-07T18:15:16.033", - "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-16T23:05:44.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,80 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x18_firmware:9.1.0cu.2024_b20220329:*:*:*:*:*:*:*", + "matchCriteriaId": "147FED55-DD5F-4AC0-B261-9FABC0498F67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4D9B188-E15C-4915-848A-4F6C2E6EB067" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Dreamy-elfland/240914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.283412", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.283412", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.437310", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://www.youtube.com/watch?v=zRNv1OvT55c", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11900.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11900.json new file mode 100644 index 00000000000..006c832d346 --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11900.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11900", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-17T00:15:04.917", + "lastModified": "2024-12-17T00:15:04.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Portfolio \u2013 Filterable Masonry Portfolio Gallery for Professionals plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'portfolio-pro' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/portfolio-pro/trunk/public/class-portfolio-pro-public.php#L358", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1989fe85-5c32-4671-bd20-f9d05cb5034c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11902.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11902.json new file mode 100644 index 00000000000..2542b0a5261 --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11902.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11902", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-17T00:15:05.927", + "lastModified": "2024-12-17T00:15:05.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Slope Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slope-reservations' shortcode in all versions up to, and including, 4.2.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/slope-widgets/trunk/slope-reservations.php#L298", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/slope-widgets/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7700f1f3-90e2-450d-9cfe-c922d0cc6a1e?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11905.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11905.json new file mode 100644 index 00000000000..aef67853e20 --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11905.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11905", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-17T00:15:06.073", + "lastModified": "2024-12-17T00:15:06.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Animated Counters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'animatedcounte' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/animated-counters/trunk/animated-counters.php#L32", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/animated-counters/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/afd2f09c-4bd5-47a5-8d4f-7345aa8925f8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11906.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11906.json new file mode 100644 index 00000000000..48471dc037b --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11906.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11906", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-17T00:15:06.217", + "lastModified": "2024-12-17T00:15:06.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TPG Get Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpg_get_posts' shortcode in all versions up to, and including, 3.6.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/tpg-get-posts/trunk/inc/class-tpg-gp-process.php#L478", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/tpg-get-posts/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c22288e6-76f3-4c5a-bd7b-30681334bab7?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12443.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12443.json new file mode 100644 index 00000000000..84b1b2c5b7b --- /dev/null +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12443.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-12443", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-16T23:15:06.097", + "lastModified": "2024-12-16T23:15:06.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The CRM Perks \u2013 WordPress HelpDesk Integration \u2013 Zendesk, Freshdesk, HelpScout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'crm-perks-tickets' shortcode in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/support-x/trunk/support-x.php#L210", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3207849/support-x/trunk/support-x.php", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/support-x", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a19e11e7-faa1-4e4d-87de-2454c4ad70f8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-254xx/CVE-2024-25468.json b/CVE-2024/CVE-2024-254xx/CVE-2024-25468.json index bba8e6ae371..f3cce9cf70b 100644 --- a/CVE-2024/CVE-2024-254xx/CVE-2024-25468.json +++ b/CVE-2024/CVE-2024-254xx/CVE-2024-25468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25468", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-17T06:15:54.487", - "lastModified": "2024-11-21T09:00:51.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-16T23:04:51.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,87 @@ "value": "Un problema en TOTOLINK X5000R V.9.1.0u.6369_B20230113 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s del par\u00e1metro host_time del componente NTPSyncWithHost." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", + "matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/thKim0/totolink", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/thKim0/totolink", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json index 8d9cb7f4c22..337f08e4d89 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28326.json @@ -2,13 +2,13 @@ "id": "CVE-2024-28326", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T20:15:07.480", - "lastModified": "2024-11-21T09:06:11.630", + "lastModified": "2024-12-16T23:15:06.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Incorrect Access Control in Asus RT-N12+ B1 routers allows local attackers to obtain root terminal access via the the UART interface." + "value": "Incorrect Access Control in ASUS RT-N12+ B1 and RT-N12 D1 routers allows local attackers to obtain root terminal access via the the UART interface." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35230.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35230.json new file mode 100644 index 00000000000..d0fffc75c6c --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35230.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-35230", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-16T23:15:06.467", + "lastModified": "2024-12-16T23:15:06.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. In affected versions the welcome and about page includes version and revision information about the software in use (including library and components used). This information is sensitive from a security point of view because it allows software used by the server to be easily identified. This issue has been patched in version 2.26.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/geoserver/geoserver/commit/74fdab745a5deff20ac99abca24d8695fe1a52f8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/commit/8cd1590a604a10875de67b04995f1952f631f920", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6pfc-w86r-54q6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json new file mode 100644 index 00000000000..511a08436a8 --- /dev/null +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55085.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55085", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-16T23:15:06.607", + "lastModified": "2024-12-16T23:15:06.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GetSimple CMS CE 3.3.19 suffers from arbitrary code execution in the template editing function in the background management system, which can be used by an attacker to implement RCE." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://getsimple-ce.ovh/", + "source": "cve@mitre.org" + }, + { + "url": "https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55451.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55451.json new file mode 100644 index 00000000000..732e570a54f --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55451.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55451", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-16T23:15:06.710", + "lastModified": "2024-12-16T23:15:06.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in authenticated SVG file upload and viewing functionality in UJCMS 9.6.3. The vulnerability arises from insufficient sanitization of embedded attributes in uploaded SVG files. When a maliciously crafted SVG file is viewed by other backend users, it allows authenticated attackers to execute arbitrary JavaScript in the context of other backend users' browsers, potentially leading to the theft of sensitive tokens." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/ujcms/StoredXSS-SVGUpload.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/dromara/ujcms", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55452.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55452.json new file mode 100644 index 00000000000..140ca58b731 --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55452.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55452", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-16T23:15:06.817", + "lastModified": "2024-12-16T23:15:06.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A URL redirection vulnerability exists in UJCMS 9.6.3 due to improper validation of URLs in the upload and rendering of new block / carousel items. This vulnerability allows authenticated attackers to redirect unprivileged users to an arbitrary, attacker-controlled webpage. When an authenticated user clicks on the malicious block item, they are redirected to the arbitrary untrusted domains, where sensitive tokens, such as JSON Web Tokens, can be stolen via a crafted webpage." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/ujcms/OpenRedirect-BlockItemUpload.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/dromara/ujcms", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-560xx/CVE-2024-56017.json b/CVE-2024/CVE-2024-560xx/CVE-2024-56017.json new file mode 100644 index 00000000000..38af2845dae --- /dev/null +++ b/CVE-2024/CVE-2024-560xx/CVE-2024-56017.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56017", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-12-16T23:15:06.923", + "lastModified": "2024-12-16T23:15:06.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Tom Royal Stop Registration Spam allows Stored XSS.This issue affects Stop Registration Spam: from n/a through 1.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stop-registration-spam/vulnerability/wordpress-stop-registration-spam-plugin-1-23-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d84de965493..e9fd407f5d6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-16T23:00:30.349317+00:00 +2024-12-17T00:55:40.113371+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-16T22:57:06.437000+00:00 +2024-12-17T00:15:06.217000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274085 +274095 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `10` -- [CVE-2024-29671](CVE-2024/CVE-2024-296xx/CVE-2024-29671.json) (`2024-12-16T22:15:05.623`) -- [CVE-2024-37773](CVE-2024/CVE-2024-377xx/CVE-2024-37773.json) (`2024-12-16T22:15:05.947`) -- [CVE-2024-37774](CVE-2024/CVE-2024-377xx/CVE-2024-37774.json) (`2024-12-16T22:15:06.127`) -- [CVE-2024-37775](CVE-2024/CVE-2024-377xx/CVE-2024-37775.json) (`2024-12-16T22:15:06.310`) -- [CVE-2024-37776](CVE-2024/CVE-2024-377xx/CVE-2024-37776.json) (`2024-12-16T22:15:06.490`) -- [CVE-2024-52949](CVE-2024/CVE-2024-529xx/CVE-2024-52949.json) (`2024-12-16T22:15:06.863`) -- [CVE-2024-55100](CVE-2024/CVE-2024-551xx/CVE-2024-55100.json) (`2024-12-16T21:15:08.427`) -- [CVE-2024-55103](CVE-2024/CVE-2024-551xx/CVE-2024-55103.json) (`2024-12-16T21:15:08.553`) -- [CVE-2024-55104](CVE-2024/CVE-2024-551xx/CVE-2024-55104.json) (`2024-12-16T21:15:08.670`) -- [CVE-2024-55554](CVE-2024/CVE-2024-555xx/CVE-2024-55554.json) (`2024-12-16T22:15:07.477`) -- [CVE-2024-55557](CVE-2024/CVE-2024-555xx/CVE-2024-55557.json) (`2024-12-16T21:15:08.783`) +- [CVE-2024-11900](CVE-2024/CVE-2024-119xx/CVE-2024-11900.json) (`2024-12-17T00:15:04.917`) +- [CVE-2024-11902](CVE-2024/CVE-2024-119xx/CVE-2024-11902.json) (`2024-12-17T00:15:05.927`) +- [CVE-2024-11905](CVE-2024/CVE-2024-119xx/CVE-2024-11905.json) (`2024-12-17T00:15:06.073`) +- [CVE-2024-11906](CVE-2024/CVE-2024-119xx/CVE-2024-11906.json) (`2024-12-17T00:15:06.217`) +- [CVE-2024-12443](CVE-2024/CVE-2024-124xx/CVE-2024-12443.json) (`2024-12-16T23:15:06.097`) +- [CVE-2024-35230](CVE-2024/CVE-2024-352xx/CVE-2024-35230.json) (`2024-12-16T23:15:06.467`) +- [CVE-2024-55085](CVE-2024/CVE-2024-550xx/CVE-2024-55085.json) (`2024-12-16T23:15:06.607`) +- [CVE-2024-55451](CVE-2024/CVE-2024-554xx/CVE-2024-55451.json) (`2024-12-16T23:15:06.710`) +- [CVE-2024-55452](CVE-2024/CVE-2024-554xx/CVE-2024-55452.json) (`2024-12-16T23:15:06.817`) +- [CVE-2024-56017](CVE-2024/CVE-2024-560xx/CVE-2024-56017.json) (`2024-12-16T23:15:06.923`) ### CVEs modified in the last Commit -Recently modified CVEs: `19` - -- [CVE-2022-48488](CVE-2022/CVE-2022-484xx/CVE-2022-48488.json) (`2024-12-16T21:15:06.287`) -- [CVE-2023-42791](CVE-2023/CVE-2023-427xx/CVE-2023-42791.json) (`2024-12-16T22:23:14.027`) -- [CVE-2023-47635](CVE-2023/CVE-2023-476xx/CVE-2023-47635.json) (`2024-12-16T21:28:47.970`) -- [CVE-2023-48220](CVE-2023/CVE-2023-482xx/CVE-2023-48220.json) (`2024-12-16T21:46:47.680`) -- [CVE-2023-51447](CVE-2023/CVE-2023-514xx/CVE-2023-51447.json) (`2024-12-16T22:43:27.217`) -- [CVE-2024-1632](CVE-2024/CVE-2024-16xx/CVE-2024-1632.json) (`2024-12-16T21:04:13.760`) -- [CVE-2024-1636](CVE-2024/CVE-2024-16xx/CVE-2024-1636.json) (`2024-12-16T21:05:49.493`) -- [CVE-2024-21987](CVE-2024/CVE-2024-219xx/CVE-2024-21987.json) (`2024-12-16T22:26:25.610`) -- [CVE-2024-22075](CVE-2024/CVE-2024-220xx/CVE-2024-22075.json) (`2024-12-16T22:15:05.397`) -- [CVE-2024-2353](CVE-2024/CVE-2024-23xx/CVE-2024-2353.json) (`2024-12-16T22:57:06.437`) -- [CVE-2024-28639](CVE-2024/CVE-2024-286xx/CVE-2024-28639.json) (`2024-12-16T22:56:31.737`) -- [CVE-2024-37018](CVE-2024/CVE-2024-370xx/CVE-2024-37018.json) (`2024-12-16T21:15:07.897`) -- [CVE-2024-37222](CVE-2024/CVE-2024-372xx/CVE-2024-37222.json) (`2024-12-16T22:15:05.827`) -- [CVE-2024-44290](CVE-2024/CVE-2024-442xx/CVE-2024-44290.json) (`2024-12-16T22:15:06.690`) -- [CVE-2024-52723](CVE-2024/CVE-2024-527xx/CVE-2024-52723.json) (`2024-12-16T22:56:02.690`) -- [CVE-2024-54474](CVE-2024/CVE-2024-544xx/CVE-2024-54474.json) (`2024-12-16T22:15:07.160`) -- [CVE-2024-54526](CVE-2024/CVE-2024-545xx/CVE-2024-54526.json) (`2024-12-16T22:15:07.320`) -- [CVE-2024-54531](CVE-2024/CVE-2024-545xx/CVE-2024-54531.json) (`2024-12-16T21:15:08.113`) -- [CVE-2024-55099](CVE-2024/CVE-2024-550xx/CVE-2024-55099.json) (`2024-12-16T21:15:08.253`) +Recently modified CVEs: `3` + +- [CVE-2024-10966](CVE-2024/CVE-2024-109xx/CVE-2024-10966.json) (`2024-12-16T23:05:44.547`) +- [CVE-2024-25468](CVE-2024/CVE-2024-254xx/CVE-2024-25468.json) (`2024-12-16T23:04:51.047`) +- [CVE-2024-28326](CVE-2024/CVE-2024-283xx/CVE-2024-28326.json) (`2024-12-16T23:15:06.253`) ## Download and Usage diff --git a/_state.csv b/_state.csv index dfd6c7e49e9..609bf15e027 100644 --- a/_state.csv +++ b/_state.csv @@ -212414,7 +212414,7 @@ CVE-2022-48482,0,0,7ac41b1951b801fb664e658d13833df47cbab31ad3169e90b364ff040e0a3 CVE-2022-48483,0,0,d2bec26748db8a5da63d916cd77a26e7f5ec965ac0c82535ec23b0719f24bb2f,2024-11-21T07:33:25.313000 CVE-2022-48486,0,0,a0cdd75943e6739f50af03c52fa560b5a26119dc3004c5c928a0c2c562859314,2024-11-21T07:33:25.450000 CVE-2022-48487,0,0,847663737d83c8f2831f21b93d19406978bac505b0e2d927ba6bb1a8c413da60,2024-11-21T07:33:25.550000 -CVE-2022-48488,0,1,f6e746ab7ffc0663eb0cfbc141164bc4b37be6f3f64dc1163c2b7e837e9087c9,2024-12-16T21:15:06.287000 +CVE-2022-48488,0,0,f6e746ab7ffc0663eb0cfbc141164bc4b37be6f3f64dc1163c2b7e837e9087c9,2024-12-16T21:15:06.287000 CVE-2022-48489,0,0,4f9214f2ba4c67dff3671bbc97115cde1d0641a5c0cd58e658fa153dc15eb881,2024-11-21T07:33:25.750000 CVE-2022-4849,0,0,95ea82af9403d8ae880c366bafe13c73151114e74b8e6fcc59d974eacfc7b97d,2024-11-21T07:36:04.140000 CVE-2022-48490,0,0,5bdaed2389bcbfe9ba6f9ec51eb7b350e50cdcf1602f1e6f8708d3a066e3e2c8,2024-11-21T07:33:25.847000 @@ -233053,7 +233053,7 @@ CVE-2023-42788,0,0,0c30b35d8520306a2f83f71d70c6e59375e6c5852cdeb5813f843ade4b3ab CVE-2023-42789,0,0,eebbac5c484c3f93b2be647e7bb4c1bcdda0e75aa8868e3a113ae482b9f36f7e,2024-11-21T08:23:09.387000 CVE-2023-4279,0,0,1caed5149541c10d4336248a1287cbb2fb27f3524c93ad81d6b75ca3202c1738,2024-11-21T08:34:46.740000 CVE-2023-42790,0,0,d4a58d7345844e2500d9a95d1338ce209447c20c8a9a245fefec6b908b6fd44c,2024-11-21T08:23:09.530000 -CVE-2023-42791,0,1,9a469e96ceb7289a27f57bada36599a8e7eea3d372acceee964980bff57f3d16,2024-12-16T22:23:14.027000 +CVE-2023-42791,0,0,9a469e96ceb7289a27f57bada36599a8e7eea3d372acceee964980bff57f3d16,2024-12-16T22:23:14.027000 CVE-2023-42792,0,0,b039ad93eb114bba0187448e5be8dc712aa808e9094212e2681cc2587cb17547,2024-11-21T08:23:09.800000 CVE-2023-42793,0,0,2cb19f7cac072dbde3861f81c268665fa5adbb63dafa84c63f9b398ce5dc164e,2024-12-16T12:15:04.797000 CVE-2023-42794,0,0,48048c4e2d6d564bbcc96727bb6871dccd15ed86260523047edc87d3e3cde6a1,2024-11-21T08:23:10.077000 @@ -236352,7 +236352,7 @@ CVE-2023-47630,0,0,8b928875fae0998d97a8e6c96cacf3a596a8814e10723e995789b00897c40 CVE-2023-47631,0,0,98389b62eadbaa1a996e61411aed8f515a4c88af2b505aba3f094376debecb6f,2024-11-21T08:30:34.130000 CVE-2023-47633,0,0,cd7b8e8e5f43218d34bc9d543ce1bc7d60ecb2f05e4a7141da55877dae048d63,2024-11-21T08:30:34.263000 CVE-2023-47634,0,0,fc3a17ed2a20ca50780c27f93eac8e846b5bff0cdb5a32d51e1859a0d9d0410a,2024-11-21T08:30:34.400000 -CVE-2023-47635,0,1,7333de09ab3fd2ca44d686d58adc57c6480b6d3c7d020a8750b0277bb0b40f62,2024-12-16T21:28:47.970000 +CVE-2023-47635,0,0,7333de09ab3fd2ca44d686d58adc57c6480b6d3c7d020a8750b0277bb0b40f62,2024-12-16T21:28:47.970000 CVE-2023-47636,0,0,6aa2ccab8ffea2a137282b65340b7d7ea26cc0f05896154692a2d77b8c507b01,2024-11-21T08:30:34.697000 CVE-2023-47637,0,0,4a42b6de46072da446f9342bdebb85449fee6bbee8169614de57996c73f91863,2024-11-21T08:30:34.847000 CVE-2023-47638,0,0,bb18d90017c00c210fecafc6bdaf626dc4a655efc767edcd6d3af39f2421a75a,2023-11-15T21:15:08.050000 @@ -236702,7 +236702,7 @@ CVE-2023-48217,0,0,a379ed7cd6ff7980a3776e118f4ad28c1ebfb07ece7e4a6198cc8757eecd1 CVE-2023-48218,0,0,2034341569f3e7fc520ed1397b72f8be8f4af2392e37816f9c592dd9399978c9,2024-11-21T08:31:13.880000 CVE-2023-48219,0,0,57a3d54903a729b2c013006b6b643a6eb0af1c715000eb70b98e642317029789,2024-11-21T08:31:14.003000 CVE-2023-4822,0,0,04710647a45da8906126ddbd8df4db9c83a00dfddfe760a03b60a12aa4b9a9fa,2024-11-21T08:36:02.730000 -CVE-2023-48220,0,1,6cb6aec9d8943bf10148e6ca0680a526136e118e13b3d40f50a597978a3ce22a,2024-12-16T21:46:47.680000 +CVE-2023-48220,0,0,6cb6aec9d8943bf10148e6ca0680a526136e118e13b3d40f50a597978a3ce22a,2024-12-16T21:46:47.680000 CVE-2023-48221,0,0,595a3acb95e41db2de6dfc9dd18c5cec89911b5e256fe26f26c2a280b15ea59a,2024-11-21T08:31:14.263000 CVE-2023-48222,0,0,853711c2a817e133552508f64e9de9cd5dab4ab07b5c4551a247b4782225a7fc,2024-11-21T08:31:14.430000 CVE-2023-48223,0,0,79aa6f1b2bab903b687a34c6032c8ae2d1c422c12757e0f431ac3caabb4cc037,2024-11-21T08:31:14.567000 @@ -238979,7 +238979,7 @@ CVE-2023-51443,0,0,bc5dfbcf2d47b2402929c15b90b4be90f3f7485f94767446ff8ec5a8bbd43 CVE-2023-51444,0,0,116a056edb92acbf6dd904c29a6347e30e07398936b1f8804f303070683a16c9,2024-11-21T08:38:07.880000 CVE-2023-51445,0,0,686f25a3deff21aaa9aa53d39e6acc0223b41221377f12f5a26dee16370e04aa,2024-11-21T08:38:07.997000 CVE-2023-51446,0,0,477f5d27d22a3cba1e4a3cc51b0aade0149e549a265a572147ead5a7c2014b5d,2024-11-21T08:38:08.127000 -CVE-2023-51447,0,1,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000 +CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000 CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000 CVE-2023-51449,0,0,4cf349ceea2f1c423c4cf23f27571e002121659b0a97a8b63d12c9a4d5f368c4,2024-11-21T08:38:08.513000 CVE-2023-5145,0,0,ed136c77a3cb85689d85277aba9853012ad53753c0f759e065c484d72945da3d,2024-11-21T08:41:09.277000 @@ -243781,7 +243781,7 @@ CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d CVE-2024-10963,0,0,3e61141d5828693cdce9d001c960b53c15a790c4b479fe9fdee66649acdf3afb,2024-11-11T18:15:14.487000 CVE-2024-10964,0,0,57b272f10f583f57ad350a67bc460132637ea8e73b01849caa65e88235230d16,2024-11-26T01:36:31.033000 CVE-2024-10965,0,0,7a48e746780c9b936f9156485d79a795eb32972691169d69dc596fa55046e4dd,2024-11-23T01:45:14.267000 -CVE-2024-10966,0,0,b7a50c5d6f825b28e507a19c3844f5a82d0b4c6a45687a7c351c49bc0dd409eb,2024-11-08T19:01:03.880000 +CVE-2024-10966,0,1,96d20283615ddcd72f8fb0ce7c3259f27d2b882522f620aa1673124372d6f3b3,2024-12-16T23:05:44.547000 CVE-2024-10967,0,0,7c3473c2b77a8d05803cf7f270943b5290b5d24c3b903af32185338840b213c3,2024-11-26T01:30:41.650000 CVE-2024-10968,0,0,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000 CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000 @@ -244500,9 +244500,13 @@ CVE-2024-11894,0,0,0c2059044c45af848fff3dd9292eb7e51685f6c7fbb508ad9b4173a086520 CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000 CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000 CVE-2024-1190,0,0,234a49a5e7705658abf0b6e88d111180ae34b962c9b1fcba39bd09bd939fee39,2024-11-21T08:49:59.993000 +CVE-2024-11900,1,1,c48cd00006725e1dae63f3b2c1712aaa44928503feb92b4835c398554c3a2262,2024-12-17T00:15:04.917000 CVE-2024-11901,0,0,b4f47b708bd6950d29700a0fa25685f0a500c1152f87b15c0f3253f7e0b084c7,2024-12-12T04:15:06.817000 +CVE-2024-11902,1,1,3e7e6d5025f95dcc691a71a72ec300283eb2ee94a68ba14c4873d0f65e104ce0,2024-12-17T00:15:05.927000 CVE-2024-11903,0,0,1fb664847ae87ab093a142384297236893b764bd45b68ea230b1dd002c36e183,2024-12-04T08:15:06.830000 CVE-2024-11904,0,0,cfe02e1e018fdb745163b14d85560843145fb371b7c3a3b355230dde5ae64d47,2024-12-07T02:15:18.263000 +CVE-2024-11905,1,1,471cfe08f5b353813071a3b89270a596998ed6f7ed2ff849b918b1bf97eb833f,2024-12-17T00:15:06.073000 +CVE-2024-11906,1,1,bd06f91b81ce065886b8d405edb88e6a7d8f769e622325bb6fd5cdbba074ce6f,2024-12-17T00:15:06.217000 CVE-2024-1191,0,0,6f7a8128ca74425a818c30dd0345aad863d38fbb6a993214ffab466088e49214,2024-11-21T08:50:00.150000 CVE-2024-11910,0,0,7cdc56d220bb226d66f2e09af7dfa09212676d67ef40d93704c67462fa98d7df,2024-12-13T09:15:06.543000 CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db68000f,2024-12-13T09:15:07.083000 @@ -244734,6 +244738,7 @@ CVE-2024-12420,0,0,ae8d110f5efef295dc5d542d71461638a083f9c010e00a24758178ab1b247 CVE-2024-12421,0,0,d0800edd844bf37ccee00fc76da3ec64bb2b51e717430e725122892ee39e78eb,2024-12-13T09:15:08.870000 CVE-2024-12422,0,0,05369736cfa99e7a93f623e0bf231830f42417dd4b9e28a7ca0096ebfd842f0b,2024-12-14T06:15:19.357000 CVE-2024-12441,0,0,60177bfa0d9dcd79729d5ab6a51352067dd3b55deb7861fd956eb7f2cdfb3058,2024-12-12T05:15:12.703000 +CVE-2024-12443,1,1,b39fd2946c2fbefa55158bd864172df98a06d98976b732fc4c22eac806259995,2024-12-16T23:15:06.097000 CVE-2024-12446,0,0,bc4dc12729ac5f85e4be698a629e224d6f337e87d1b81d5042c0eddb71088b1a,2024-12-14T07:15:07.040000 CVE-2024-12447,0,0,c7d237797e5045bf7231fd7a8dd02f5534e2ad794fcb81ab9e39a8e990833ac6,2024-12-14T05:15:10.670000 CVE-2024-12448,0,0,11e50dbe77a1a32d7920e9e6082c85f472336b04f5fe27094dc25dc5df597595,2024-12-14T05:15:10.873000 @@ -245158,11 +245163,11 @@ CVE-2024-1628,0,0,462aaf7a2aba24826516994be48daf03675e0663819d4ebb8cdd24916637fb CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4d9,2024-11-21T08:50:57.473000 CVE-2024-1630,0,0,9b1d75e935e3c43047021c7db741b2a5e1070d9e69f1d2a3037779c882a9deac,2024-11-21T08:50:57.613000 CVE-2024-1631,0,0,e9e6578f8c2841fcf55accc66d2d8ed4ff49074482673094d89548de7e2bc4e7,2024-11-21T08:50:57.763000 -CVE-2024-1632,0,1,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000 +CVE-2024-1632,0,0,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000 CVE-2024-1633,0,0,5ccb225bfb0a399abe7a70f1c6fd18da8846101e09ec9f5e0957953da34a4559,2024-11-21T08:50:58.023000 CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13ab0,2024-11-21T08:50:58.150000 CVE-2024-1635,0,0,880b45e2da4c6518c1b04e3791a09fd8632b660a2ba4a05adcb1a72ef7f1c218,2024-11-21T08:50:58.290000 -CVE-2024-1636,0,1,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000 +CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000 CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000 CVE-2024-1638,0,0,b370dab677aaa82f245c1884c116b7512ca8dfe0263cc60b1de857513f9922dc,2024-11-21T08:50:58.727000 CVE-2024-1639,0,0,de447f38a3507556188a654289532a72df4270ff11bdecd8ce53d967434870bc,2024-11-21T08:50:58.857000 @@ -247230,7 +247235,7 @@ CVE-2024-21982,0,0,ff17b56a256c739f5063a3e2704f03bf15248a52f1ffefbb58b1e5faacb33 CVE-2024-21983,0,0,4e2ed0f646abb96dbe85666b2c96a290c2f47be8ddb8c9b6f7ca141e2c151ce2,2024-12-13T17:55:06.957000 CVE-2024-21984,0,0,ea7e8be87e57ddf1cb43cffb966825295076274918810d2103c7089d7850ac38,2024-12-13T17:55:08.837000 CVE-2024-21985,0,0,63520fa4ce7e029aa7afb7a06539a8fcc598f88e49929e619949a1f3683b48e5,2024-11-21T08:55:19.830000 -CVE-2024-21987,0,1,d85b3fb5542f16b18141f4b484fe4fe5ba713fa828d101cd5609224cc2267582,2024-12-16T22:26:25.610000 +CVE-2024-21987,0,0,d85b3fb5542f16b18141f4b484fe4fe5ba713fa828d101cd5609224cc2267582,2024-12-16T22:26:25.610000 CVE-2024-21988,0,0,55386eaddbe790c0c8f4791da8d917ba72db26c9496e2de58c929fb47d6a62a1,2024-12-13T17:26:35.453000 CVE-2024-21989,0,0,0ad73d03e9628af845e6ee6949146e3dd5c4c8525c64a128b8111f64569064d5,2024-11-21T08:55:20.330000 CVE-2024-2199,0,0,48b5d93e19b921381bbebd37d38ada79c5d016f1c0b1a24d51cb7868b725b7ab,2024-11-21T09:09:14.570000 @@ -247303,7 +247308,7 @@ CVE-2024-22068,0,0,3a2f9b2220ab6a2285bc85464bed279bdafd82fa06bcc024def5e82a1defa CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676c84,2024-08-20T17:22:39.500000 CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000 CVE-2024-22074,0,0,b3ae6a34f5cbd61f1ba3e8dcc86a120a08f8721281bdaf819b018b5694a237af,2024-11-21T08:55:30.200000 -CVE-2024-22075,0,1,0093ccb83ae0d7a5d912fce4dbf6fb27f3b91db656d6260efd5798729c4df123,2024-12-16T22:15:05.397000 +CVE-2024-22075,0,0,0093ccb83ae0d7a5d912fce4dbf6fb27f3b91db656d6260efd5798729c4df123,2024-12-16T22:15:05.397000 CVE-2024-22076,0,0,21a4530da33e3bbfe45eac97ca96bfa62b7e645e33a45111dc73f1c2deead9cb,2024-11-21T08:55:30.577000 CVE-2024-22077,0,0,9535482984f45d0a95cb58a7ab43b83ebc083de0c29c42f5d160c5ba6c2fa722,2024-11-21T08:55:30.760000 CVE-2024-22078,0,0,a0f778a1893b4b1b7bee543bd328d375c770eb977c31a950a319401fc4dea6df,2024-11-21T08:55:31.020000 @@ -248305,7 +248310,7 @@ CVE-2024-23526,0,0,4305395dc5826f07bea7b7378fb8ce0efb6a5d427a42a91a1b6ee30ebf9a8 CVE-2024-23527,0,0,284206a5d33f28b5a87cb46fb1a9bacb429433d17c2f54e297d7ee3c11560e71,2024-11-21T08:57:53.717000 CVE-2024-23528,0,0,4ba28d53fc3284f3436ec7bd7c325913ceaf1b21e8308fe5042fc86dcc7b3689,2024-11-21T08:57:53.837000 CVE-2024-23529,0,0,9c2cccfd923383e8c7a964ee79fac999b351989d3178014a815d0f98420026c3,2024-11-21T08:57:53.967000 -CVE-2024-2353,0,1,95bdce6fcd6db1a061b315b6ce55d64774b6240a4374b84886120dd80ffdb11e,2024-12-16T22:57:06.437000 +CVE-2024-2353,0,0,95bdce6fcd6db1a061b315b6ce55d64774b6240a4374b84886120dd80ffdb11e,2024-12-16T22:57:06.437000 CVE-2024-23530,0,0,aa6df258570429dac99ad02d39eb8fe694453eee48bfd29b8fb0c420e2090544,2024-11-21T08:57:54.100000 CVE-2024-23531,0,0,b002899f8147c0c8ad75afcad582132d16f4a3775c01f972bad16d552806e3a5,2024-11-21T08:57:54.233000 CVE-2024-23532,0,0,7c8e275e0ba36c77ebba1d3abe33906a058bad73311f0066c91339433928a141,2024-11-21T08:57:54.370000 @@ -249604,7 +249609,7 @@ CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259e CVE-2024-2546,0,0,d8dbc24cbd7978c86546ddde71cebd01d25565528f565e6fd58763686c3d1a3e,2024-11-21T09:09:59.040000 CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000 CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000 -CVE-2024-25468,0,0,928d169d4e3dc75d045b40852a2506d43755498fc6de0035856df39fedecaf84,2024-11-21T09:00:51.550000 +CVE-2024-25468,0,1,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000 CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000 CVE-2024-2547,0,0,d51d6810aa146e933146766a166169fe2343ecf22475f64c42ecbdb23ae82c57,2024-11-21T09:09:59.170000 CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000 @@ -251952,7 +251957,7 @@ CVE-2024-28320,0,0,156b627473e5ac6bcd288f42ccc346804a8651dfc17bef3f6969a7ebea1ce CVE-2024-28322,0,0,4d8f57dcf95c839919bd19e58d706ebb428b316858edbbc8a9f943ea2521b9e8,2024-11-21T09:06:10.940000 CVE-2024-28323,0,0,9e5e2a70f2e5e23491acdbf55cb239ce131de5927f67f0ce1e28bc2023e2002d,2024-11-21T09:06:11.183000 CVE-2024-28325,0,0,d1249e48fae34e16a671fbfa77e65f35cecb442da7d1f3e92632a41ef5549acc,2024-11-21T09:06:11.407000 -CVE-2024-28326,0,0,e24dfe67a26487f8176a99407d927d0e593755c240f19f509edd384fdee0783e,2024-11-21T09:06:11.630000 +CVE-2024-28326,0,1,50700555c90e4995a2db0290d92539dbadb4550abe62f00e140f1b1674d98ffd,2024-12-16T23:15:06.253000 CVE-2024-28327,0,0,1360bb692019a7ed2321e173175aa263e8cbe1c8a295b26b0cc70a6baaa74d06,2024-11-21T09:06:11.867000 CVE-2024-28328,0,0,3d9a6b8d42a538362e64f311f5c93eb07142a313db6510d418a4b48150139e7c,2024-11-21T09:06:12.097000 CVE-2024-2833,0,0,a59311d12fb4173260131d2df415a4e491307922af927e96d97d65e65d51cf4e,2024-11-21T09:10:38.167000 @@ -252077,7 +252082,7 @@ CVE-2024-28623,0,0,6b592373ccc058b15c8f7db49b78bfd3e2635e462da34d22a443dc2b48722 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 CVE-2024-2863,0,0,a5b592af60b81b1b665877763bf56c5ec2758267e95bafeacc6ae0c7642054e8,2024-11-21T09:10:42.503000 CVE-2024-28635,0,0,61242df335a44a1ffcc8a35eed585f9c6d6e29d973b2b56cd4e07379c5b17c10,2024-11-21T09:06:42.367000 -CVE-2024-28639,0,1,c3d818d5c7f5eb0feffae38930cd9ee930ce1e830fa6140cd69a998011b8b07b,2024-12-16T22:56:31.737000 +CVE-2024-28639,0,0,c3d818d5c7f5eb0feffae38930cd9ee930ce1e830fa6140cd69a998011b8b07b,2024-12-16T22:56:31.737000 CVE-2024-2864,0,0,3c502f13e25ec0d6338270f38aa63b5e89435a030dae1785f088aeae83e8039f,2024-11-21T09:10:42.620000 CVE-2024-28640,0,0,990c29eb8c733a819b0a31dbb2e2b0510b47e9a808edbc4e02611ff94875e45d,2024-11-21T09:06:42.733000 CVE-2024-2865,0,0,5829b9f895a4ba79b3592f650e6f3b7b48b361c5424fd86986d5cdb1471edc67,2024-11-21T09:10:42.747000 @@ -252729,7 +252734,7 @@ CVE-2024-29661,0,0,33eeb097530dd938963a006813b514ee2f217b4805f64bf726e22f92b9d6f CVE-2024-29666,0,0,4816994d3696247c03b8328a9343bd38453cca8e45ebbf1e319026a45443ab8c,2024-11-21T09:08:09.110000 CVE-2024-29667,0,0,34b7576b4d736dd47cfaa8af367e24a2a8c6269ec16e4c867b990e680ca7d10e,2024-11-21T09:08:09.327000 CVE-2024-2967,0,0,d2ac382f00d4575193077f03ec53a42d2b3a92c77fb89b30f0dc868e4936acc2,2024-11-21T09:10:57.113000 -CVE-2024-29671,1,1,f78ef3d23b5c136143332597260fa0b86803b52801c6b77bb59392b05f2af3a7,2024-12-16T22:15:05.623000 +CVE-2024-29671,0,0,f78ef3d23b5c136143332597260fa0b86803b52801c6b77bb59392b05f2af3a7,2024-12-16T22:15:05.623000 CVE-2024-29672,0,0,fed6aba6c72c648701c1be281c4b9f1cd2e136095e68e86097f193f0a03d9cf4,2024-11-21T09:08:09.547000 CVE-2024-2968,0,0,8581bb73f79fa107c2dede83ff67ae98d1d7fb9830fdfb49f54e97d6c8c6ffcf,2024-11-21T09:10:57.223000 CVE-2024-29684,0,0,e8dbdce83a941c64ac6edc30c8842538d41a99e6916fd5c622b5fa9cb194cb43,2024-11-21T09:08:09.727000 @@ -256978,6 +256983,7 @@ CVE-2024-35227,0,0,f603064d312bdc0236cec2fadb9b100a9b378e884da8c1127fcb9b1191967 CVE-2024-35228,0,0,71272b772368179098bc4880da40d61506624e75d28f6489fd71d5eca6523168,2024-11-21T09:19:58.907000 CVE-2024-35229,0,0,ada2646518271eaef8855ecc7c3fc8ba90d5b71f7cb323412a25a97d186b4612,2024-11-21T09:19:59.010000 CVE-2024-3523,0,0,fc36607b1b975bc950ca25209a56f960461c6b097ca9c650e695dddb8c488a1e,2024-11-21T09:29:46.660000 +CVE-2024-35230,1,1,92ae45e983006a8b445e602cdf1231b319e8ba440ceb767b00841e4d44e8ca79,2024-12-16T23:15:06.467000 CVE-2024-35231,0,0,a1826f3cff4a6dc3aa78243c02b10a4ba54c00dc4dcc3d2a95804f3143227620,2024-11-21T09:19:59.130000 CVE-2024-35232,0,0,ae66f9a641dd0b3190010f0319689bc1a6b70ec2a4eec811f6d529159f146823,2024-11-21T09:19:59.250000 CVE-2024-35234,0,0,7a4620a92a838ed11dd238a47e2ec5aa7137e8cced27e60b471a70c16df96b28,2024-11-21T09:19:59.373000 @@ -258337,7 +258343,7 @@ CVE-2024-37014,0,0,257b596aa12a66b3b59835d0a8b2a6126ed475c4cf9b68495d6b50a60cb76 CVE-2024-37015,0,0,17bce9aed0f7ee30858a58f944cc52f66e293b9c5c98086bff089bdfbba147d6,2024-08-14T02:07:05.410000 CVE-2024-37016,0,0,c006bcb1533ca25fbf8d572424a361ab92f35ad6ae26a93d7478436ff7ecabb8,2024-11-21T09:23:02.640000 CVE-2024-37017,0,0,9e9e7d245ae7636635d8fb9b7646e69ff4740b4aee32b577e749a761315fc0d5,2024-11-21T09:23:02.880000 -CVE-2024-37018,0,1,dcf2b63abe61db319847b5d7e942c36af68b31f1cafe8b47e5200c9fd8419d58,2024-12-16T21:15:07.897000 +CVE-2024-37018,0,0,dcf2b63abe61db319847b5d7e942c36af68b31f1cafe8b47e5200c9fd8419d58,2024-12-16T21:15:07.897000 CVE-2024-37019,0,0,019f9cadac30cdb47b60ef4c54cc291462b2bdbecfeff69d16099a4eb4863742,2024-11-21T09:23:03.357000 CVE-2024-37021,0,0,aed1982ac5de94bdbba8a7c49a4c522e3a714c206212126f326e10e002ec5c2c,2024-12-14T21:15:18.940000 CVE-2024-37022,0,0,58e15183af3d32942869fe6953f465d4e55099ab2b6c8139c4c8d08e686f90ce,2024-11-21T09:23:03.690000 @@ -258524,7 +258530,7 @@ CVE-2024-37219,0,0,fbfce4ee9d32dccb1adfe41d3da7347260b18aa3120562b4afeb8741bafe1 CVE-2024-3722,0,0,ca72fa86ee5f0692b7634b6034f69bad7dcda24d2e864ef167dcf141b91c8041,2024-11-21T09:30:14.767000 CVE-2024-37220,0,0,98d9557c0b2373c397e391012330889d93a206debfe4bd63da11842d272eb9c9,2024-11-01T20:24:53.730000 CVE-2024-37221,0,0,f70f8b30d6de7a3f96201731122d40658150f4e153b628cc732f86246b03217b,2024-11-21T09:23:25.603000 -CVE-2024-37222,0,1,de8aff0b0bffb385b0cfb0c7d08561d0ba9c733f17df16e27a2ec78b473c92f9,2024-12-16T22:15:05.827000 +CVE-2024-37222,0,0,de8aff0b0bffb385b0cfb0c7d08561d0ba9c733f17df16e27a2ec78b473c92f9,2024-12-16T22:15:05.827000 CVE-2024-37223,0,0,0749ccb6a47c50f6954d5cd047e4747c55d1f3709342aa462f514f8195d3b1b1,2024-11-21T09:23:25.977000 CVE-2024-37224,0,0,16af1d8f7084895f19150b776b7ea9ba3e194d1de5b36a77065680997f98e2a7,2024-11-21T09:23:26.107000 CVE-2024-37225,0,0,2632f3ce1fac81f432fab34e6e841b74462f734ca24cfa3af34d37538e8219de,2024-11-21T09:23:26.237000 @@ -258918,10 +258924,10 @@ CVE-2024-37768,0,0,2793d768190db7539c96d73238c8df462702d3812318427858b72a73db2bd CVE-2024-37769,0,0,ebb9ba49fb51ffaaf91f9ff8b56894aba69c0664bde10d7ebfe9dd5080822c95,2024-11-21T09:24:18.103000 CVE-2024-3777,0,0,6d6468a79705e917b5409dc4c8295a80d29b4efb80ab5212b3e5097b80656f73,2024-11-21T09:30:22.660000 CVE-2024-37770,0,0,3ae1b26b08d620f39fd2fc9b0f3e94aeedfe3c4571e06714b0c443b19a9d4c82,2024-11-21T09:24:18.330000 -CVE-2024-37773,1,1,93d9ddc1d9f09d51843a8aaeb77f6802f5055b280bcfad25197353f14e6cb724,2024-12-16T22:15:05.947000 -CVE-2024-37774,1,1,0f9205692d47d96c1f194965853ef62a648c1c35c924aa3032410012602a886c,2024-12-16T22:15:06.127000 -CVE-2024-37775,1,1,6fca9c78ef78fee4e7965b345eb1401a7cd0185244555ec5f57036f65d870f7a,2024-12-16T22:15:06.310000 -CVE-2024-37776,1,1,2329494dd388ac6fd3c103113eeffe6506d2f069b83bc9c3e1702765b8c7acc5,2024-12-16T22:15:06.490000 +CVE-2024-37773,0,0,93d9ddc1d9f09d51843a8aaeb77f6802f5055b280bcfad25197353f14e6cb724,2024-12-16T22:15:05.947000 +CVE-2024-37774,0,0,0f9205692d47d96c1f194965853ef62a648c1c35c924aa3032410012602a886c,2024-12-16T22:15:06.127000 +CVE-2024-37775,0,0,6fca9c78ef78fee4e7965b345eb1401a7cd0185244555ec5f57036f65d870f7a,2024-12-16T22:15:06.310000 +CVE-2024-37776,0,0,2329494dd388ac6fd3c103113eeffe6506d2f069b83bc9c3e1702765b8c7acc5,2024-12-16T22:15:06.490000 CVE-2024-37779,0,0,0aba20750978da4733349dadb1ca63b8044cf1d1605f2dd296fab6c62fcf39fd,2024-09-27T14:35:03.517000 CVE-2024-3778,0,0,c5841f5de458f7e0e081b666f7a24d50a31cf8db2d38b0a5550274be6f0978b4,2024-11-21T09:30:22.783000 CVE-2024-37782,0,0,e9f210e7f42c046d75d0b9f25adae39b4e1c61a1f888965bb1e0dfce89ee0e10,2024-11-27T17:15:11.320000 @@ -263743,7 +263749,7 @@ CVE-2024-44285,0,0,f52551cd151272e75e2e9c1e860d275100cc0677baa4f8ad08a471b6223e7 CVE-2024-44287,0,0,f9ab1474cc919e4b5efc0187cf8790f17d184d2909fbec86726d782e04489fe8,2024-10-30T19:35:21.620000 CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9238,2024-10-30T16:35:28.097000 CVE-2024-4429,0,0,a4a8f97ae1846585dda39a340897585bd413fb1368db5055aa3e7c7ef6d4f3eb,2024-11-21T09:42:48.820000 -CVE-2024-44290,0,1,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000 +CVE-2024-44290,0,0,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000 CVE-2024-44291,0,0,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000 CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000 CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000 @@ -269058,7 +269064,7 @@ CVE-2024-5271,0,0,476c650ea868780269a16562f21ebd1f82fa6ae8de0222fc09d18e39c04683 CVE-2024-52711,0,0,82705d4537efc544b27f97ea7020a29c63df676da0b3887989e8d0472e895393,2024-11-22T18:15:17.860000 CVE-2024-52714,0,0,d68bd2e6ba70a01a513d32cac86943fd8254d4c3004a24bfd1d27a6a8a9329d8,2024-11-20T20:35:15.260000 CVE-2024-5272,0,0,fdbec5333cf64f4ba2599bc33574360d57e60dfadb483e1b524d6c59f71a8f55,2024-11-21T09:47:19.460000 -CVE-2024-52723,0,1,cf167c520fb0aa50ebf4b153534b6ac9fbe624dd8f2d42728ec1b6f457e27a0a,2024-12-16T22:56:02.690000 +CVE-2024-52723,0,0,cf167c520fb0aa50ebf4b153534b6ac9fbe624dd8f2d42728ec1b6f457e27a0a,2024-12-16T22:56:02.690000 CVE-2024-52724,0,0,30b8a3d6a9741c46bc5b8b7f06f527180966ee6ba100cd8150e213f1d6a21cd5,2024-12-03T15:15:10.943000 CVE-2024-52725,0,0,ca83ad92f53ba791b675728b41a882f6bce2ad034a322e498ad5b1a0459b09dd,2024-12-02T21:15:10.977000 CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000 @@ -269193,7 +269199,7 @@ CVE-2024-52944,0,0,13f4728598a9169659ecc5ab8bdcbf29b2aee05592382aeebb2b7ebc79d90 CVE-2024-52945,0,0,2be5483c630004e32670c1bf2df159c2fc165530e70f2dd74d5a6bc11ca631e4,2024-11-19T16:35:20.020000 CVE-2024-52946,0,0,4f1dfe8b6d1ba4959015bfa97e83493e2bb850117484cc15efcaa811c3e03c50,2024-11-21T18:15:13.120000 CVE-2024-52947,0,0,2aee58f94b954efaf5164df4a8e601015dc1edc796a589e4848762e3088ebedd,2024-11-18T18:35:09.517000 -CVE-2024-52949,1,1,e399963e973ceb09f4ad169d9f8a9d211a08869e0805a687628b565bec3e58f1,2024-12-16T22:15:06.863000 +CVE-2024-52949,0,0,e399963e973ceb09f4ad169d9f8a9d211a08869e0805a687628b565bec3e58f1,2024-12-16T22:15:06.863000 CVE-2024-5295,0,0,2396dadecb35968608e7faeb909b9c67144b6a2007cc474b7ce69341811bcf77,2024-11-21T09:47:22.707000 CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be506ce,2024-11-27T21:15:07.997000 CVE-2024-52958,0,0,965d541bdaa048d08984be57ec6ff291abae1c702954dddd32ec7b0108549df9,2024-11-27T06:15:18.590000 @@ -270070,7 +270076,7 @@ CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61 CVE-2024-54466,0,0,007391ad25f3f19d155f1bab4a612386e47b938cdb46a1c1a05637652e9969fd,2024-12-12T22:15:08.213000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54471,0,0,3399111b76a7b53e131dff58753f99905e82fd008f1a9ed162ad52c89d594216,2024-12-12T16:15:55.950000 -CVE-2024-54474,0,1,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 +CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54476,0,0,68c89cbda1080d94857c8a6c6e5c4dec737447f9cf0eadf8018f4f30bdd8add6,2024-12-12T16:15:56.120000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 CVE-2024-54479,0,0,8bf37387c4dde8f9cdb0a9e834e8462f66fa3d4a2f05b2799b2fc0f12fb282aa,2024-12-13T18:24:34.090000 @@ -270103,12 +270109,12 @@ CVE-2024-54514,0,0,380ef09666130bacefa842b3b0a77661fb0c21e237fde90a103631522071a CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 CVE-2024-54524,0,0,5b400e695af2f949d2ec71578d693bc64ad75aad1f72a1927a39d0da75803b87,2024-12-12T17:15:11.020000 -CVE-2024-54526,0,1,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 +CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000 CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000 CVE-2024-54529,0,0,4f4002a20fd537285918affdb270ea26020a04c1a9cd33ae156b57c42a237915,2024-12-12T16:15:56.893000 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 -CVE-2024-54531,0,1,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 +CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 @@ -270195,12 +270201,13 @@ CVE-2024-5505,0,0,ef8367efb8e62f4d28c1b33787b307fdb06367b98441e7dd6605a6aed68ed8 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 +CVE-2024-55085,1,1,dfb0ad4a638155de193b6915984b27bb48398890d42d46adbc5f163f416532a2,2024-12-16T23:15:06.607000 CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000 -CVE-2024-55099,0,1,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000 +CVE-2024-55099,0,0,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000 CVE-2024-5510,0,0,75afe647f1d2c625afdbb2c36005f62cfbbe97b6f78e4011e89b81919ed96856,2024-11-22T20:15:09.343000 -CVE-2024-55100,1,1,f08ace675d18e46eda17b649c65a035d03a4e169b495a06779f1333383217dc1,2024-12-16T21:15:08.427000 -CVE-2024-55103,1,1,5853bfed60c8178932a3f09933fb05b9ed87e8cb68668f65d0135c39defe5c16,2024-12-16T21:15:08.553000 -CVE-2024-55104,1,1,b54a78b5f3926e62c545af204c3ce45999442b8dd52ae145d41a8c3ee89ae96b,2024-12-16T21:15:08.670000 +CVE-2024-55100,0,0,f08ace675d18e46eda17b649c65a035d03a4e169b495a06779f1333383217dc1,2024-12-16T21:15:08.427000 +CVE-2024-55103,0,0,5853bfed60c8178932a3f09933fb05b9ed87e8cb68668f65d0135c39defe5c16,2024-12-16T21:15:08.553000 +CVE-2024-55104,0,0,b54a78b5f3926e62c545af204c3ce45999442b8dd52ae145d41a8c3ee89ae96b,2024-12-16T21:15:08.670000 CVE-2024-5511,0,0,56fb77e68915452d67789c3a74a2cde0633cd6fde099063447a457a2d0c56373,2024-11-22T20:15:09.453000 CVE-2024-5512,0,0,e291a0f62c622b98719d0669427609426642277e7e0c79f3db83875786e582a2,2024-11-22T20:15:09.563000 CVE-2024-5513,0,0,6fc05209f2de569aa2d53ff875b7b70727a658dcae4b0d69e9a3aacc36b9dc55,2024-11-22T20:15:09.673000 @@ -270233,6 +270240,8 @@ CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5 CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000 CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000 CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4f5,2024-11-21T09:47:53.940000 +CVE-2024-55451,1,1,33d13ace4f05ddc223ccbf83de668e0d3737ecf73982be80adcb7bcf1bffbe89,2024-12-16T23:15:06.710000 +CVE-2024-55452,1,1,cdbaf3d6dba9fdc1b4cf83a0de9ee6c72b6b4a505720de4e35a2614fd30fca23,2024-12-16T23:15:06.817000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000 @@ -270250,8 +270259,8 @@ CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85af CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000 CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000 CVE-2024-55550,0,0,083b12aa55fd376f21b90ec42869839cac3f2d3ae5f0c3d1ccf8b929f82d5435,2024-12-11T15:15:19.653000 -CVE-2024-55554,1,1,24198bbf39b86e96bbc821836c0d923e43c75a2991fb21dc284e91e42ed5d155,2024-12-16T22:15:07.477000 -CVE-2024-55557,1,1,5d9f360423c6569f6da4bdefa27bfe0561b88244f9a5fc46fba37875e3828b4c,2024-12-16T21:15:08.783000 +CVE-2024-55554,0,0,24198bbf39b86e96bbc821836c0d923e43c75a2991fb21dc284e91e42ed5d155,2024-12-16T22:15:07.477000 +CVE-2024-55557,0,0,5d9f360423c6569f6da4bdefa27bfe0561b88244f9a5fc46fba37875e3828b4c,2024-12-16T21:15:08.783000 CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000 CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000 CVE-2024-55563,0,0,18204ee9bcd7a443817ede90b4af782476bfed51d18ddfae7057258f3016b43a,2024-12-09T01:15:06.313000 @@ -270369,6 +270378,7 @@ CVE-2024-56011,0,0,0a424cb818da7335bf1f0c462b0a349e91b8f3641cc66bb68166f781c159c CVE-2024-56012,0,0,1294e1b9cfda889d2897343dbdd5a8f0d69df1b88d00748e64c163cc5857799d,2024-12-16T15:15:27.943000 CVE-2024-56013,0,0,98d5f16619c75bf7700fe13a8918184b7016cc1b87371ca36dfb3fcf7e341f9c,2024-12-16T15:15:28.090000 CVE-2024-56015,0,0,a40d49c757aa948f90c29b7c6bdf9b80dad98326d3e52005d5d7b1f0a780c74b,2024-12-16T15:15:28.230000 +CVE-2024-56017,1,1,7eef9fb5124dee0b581e34fbc52a1cfe55d67df71e2e8706e4badc71fbd3ebc8,2024-12-16T23:15:06.923000 CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000 CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000 CVE-2024-5605,0,0,a58f7d5ea1a1f097543f1fa828fe0f4d77e53004da146d280334895bad6f3fd1,2024-11-21T09:48:00.363000