mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-11-11T15:00:19.382180+00:00
This commit is contained in:
parent
d0262c5e97
commit
0d7ce1bece
78
CVE-2024/CVE-2024-103xx/CVE-2024-10314.json
Normal file
78
CVE-2024/CVE-2024-103xx/CVE-2024-10314.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10314",
|
||||||
|
"sourceIdentifier": "security@puppet.com",
|
||||||
|
"published": "2024-11-11T14:15:14.190",
|
||||||
|
"lastModified": "2024-11-11T14:15:14.190",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the auto-generation function was identified. Reported by Karol Wi\u0119sek."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security@puppet.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "NONE",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 8.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@puppet.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://portal.perforce.com/s/detail/a91PA000001SZNFYA4",
|
||||||
|
"source": "security@puppet.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2024/CVE-2024-103xx/CVE-2024-10344.json
Normal file
78
CVE-2024/CVE-2024-103xx/CVE-2024-10344.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10344",
|
||||||
|
"sourceIdentifier": "security@puppet.com",
|
||||||
|
"published": "2024-11-11T14:15:14.453",
|
||||||
|
"lastModified": "2024-11-11T14:15:14.453",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the refuse function was identified. Reported by Karol Wi\u0119sek."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security@puppet.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "NONE",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 8.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@puppet.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://portal.perforce.com/s/detail/a91PA000001SZOrYAO",
|
||||||
|
"source": "security@puppet.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2024/CVE-2024-103xx/CVE-2024-10345.json
Normal file
78
CVE-2024/CVE-2024-103xx/CVE-2024-10345.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-10345",
|
||||||
|
"sourceIdentifier": "security@puppet.com",
|
||||||
|
"published": "2024-11-11T14:15:14.563",
|
||||||
|
"lastModified": "2024-11-11T14:15:14.563",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. Reported by Karol Wi\u0119sek."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security@puppet.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "NONE",
|
||||||
|
"vulnerableSystemAvailability": "HIGH",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 8.7,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@puppet.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://portal.perforce.com/s/detail/a91PA000001SZQTYA4",
|
||||||
|
"source": "security@puppet.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-340xx/CVE-2024-34014.json
Normal file
56
CVE-2024/CVE-2024-340xx/CVE-2024-34014.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-34014",
|
||||||
|
"sourceIdentifier": "security@acronis.com",
|
||||||
|
"published": "2024-11-11T14:15:14.693",
|
||||||
|
"lastModified": "2024-11-11T14:15:14.693",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Arbitrary file overwrite during recovery due to improper soft link handling. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 818, Acronis Backup extension for Plesk (Linux) before build 599, Acronis Backup plugin for DirectAdmin (Linux) before build 181."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@acronis.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@acronis.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-61"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://security-advisory.acronis.com/advisories/SEC-7592",
|
||||||
|
"source": "security@acronis.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-340xx/CVE-2024-34015.json
Normal file
56
CVE-2024/CVE-2024-340xx/CVE-2024-34015.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-34015",
|
||||||
|
"sourceIdentifier": "security@acronis.com",
|
||||||
|
"published": "2024-11-11T14:15:14.993",
|
||||||
|
"lastModified": "2024-11-11T14:15:14.993",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Sensitive information disclosure during file browsing due to improper soft link handling. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 818."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@acronis.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.3,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@acronis.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-61"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://security-advisory.acronis.com/advisories/SEC-7601",
|
||||||
|
"source": "security@acronis.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2024/CVE-2024-434xx/CVE-2024-43427.json
Normal file
48
CVE-2024/CVE-2024-434xx/CVE-2024-43427.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43427",
|
||||||
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
|
"published": "2024-11-11T13:15:03.530",
|
||||||
|
"lastModified": "2024-11-11T13:15:03.530",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in moodle. When creating an export of site administration presets, some sensitive secrets and keys are not being excluded from the export, which could result in them unintentionally being leaked if the presets are shared with a third party."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "patrick@puiterwijk.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 3.7,
|
||||||
|
"baseSeverity": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304255",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=461195",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2024/CVE-2024-434xx/CVE-2024-43429.json
Normal file
48
CVE-2024/CVE-2024-434xx/CVE-2024-43429.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43429",
|
||||||
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
|
"published": "2024-11-11T13:15:03.880",
|
||||||
|
"lastModified": "2024-11-11T13:15:03.880",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in moodle. Some hidden user profile fields are visible in gradebook reports, which could result in users without the \"view hidden user fields\" capability having access to the information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "patrick@puiterwijk.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304257",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=461197",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2024/CVE-2024-434xx/CVE-2024-43430.json
Normal file
48
CVE-2024/CVE-2024-434xx/CVE-2024-43430.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43430",
|
||||||
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
|
"published": "2024-11-11T13:15:04.053",
|
||||||
|
"lastModified": "2024-11-11T13:15:04.053",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in moodle. External API access to Quiz can override contained insufficient access control."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "patrick@puiterwijk.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304258",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=461198",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2024/CVE-2024-434xx/CVE-2024-43432.json
Normal file
48
CVE-2024/CVE-2024-434xx/CVE-2024-43432.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43432",
|
||||||
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
|
"published": "2024-11-11T13:15:04.233",
|
||||||
|
"lastModified": "2024-11-11T13:15:04.233",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "patrick@puiterwijk.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304260",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=461200",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2024/CVE-2024-434xx/CVE-2024-43433.json
Normal file
48
CVE-2024/CVE-2024-434xx/CVE-2024-43433.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43433",
|
||||||
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
|
"published": "2024-11-11T13:15:04.410",
|
||||||
|
"lastModified": "2024-11-11T13:15:04.410",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in moodle. Matrix room membership and power levels are incorrectly applied and revoked for suspended Moodle users."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "patrick@puiterwijk.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304261",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=461202",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2024/CVE-2024-434xx/CVE-2024-43435.json
Normal file
48
CVE-2024/CVE-2024-434xx/CVE-2024-43435.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43435",
|
||||||
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
|
"published": "2024-11-11T13:15:04.580",
|
||||||
|
"lastModified": "2024-11-11T13:15:04.580",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in moodle. Insufficient capability checks make it possible for users with access to restore glossaries in courses to restore them into the global site glossary."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "patrick@puiterwijk.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304263",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=461205",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
48
CVE-2024/CVE-2024-434xx/CVE-2024-43437.json
Normal file
48
CVE-2024/CVE-2024-434xx/CVE-2024-43437.json
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43437",
|
||||||
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||||
|
"published": "2024-11-11T13:15:04.757",
|
||||||
|
"lastModified": "2024-11-11T13:15:04.757",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in moodle. Insufficient sanitizing of data when performing a restore could result in a cross-site scripting (XSS) risk from malicious backup files."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "patrick@puiterwijk.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304266",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://moodle.org/mod/forum/discuss.php?d=461207",
|
||||||
|
"source": "patrick@puiterwijk.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,36 +2,15 @@
|
|||||||
"id": "CVE-2024-50219",
|
"id": "CVE-2024-50219",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-09T11:15:07.373",
|
"published": "2024-11-09T11:15:07.373",
|
||||||
"lastModified": "2024-11-09T11:15:07.373",
|
"lastModified": "2024-11-11T14:15:15.210",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/page_alloc: let GFP_ATOMIC order-0 allocs access highatomic reserves\n\nUnder memory pressure it's possible for GFP_ATOMIC order-0 allocations to\nfail even though free pages are available in the highatomic reserves. \nGFP_ATOMIC allocations cannot trigger unreserve_highatomic_pageblock()\nsince it's only run from reclaim.\n\nGiven that such allocations will pass the watermarks in\n__zone_watermark_unusable_free(), it makes sense to fallback to highatomic\nreserves the same way that ALLOC_OOM can.\n\nThis fixes order-0 page allocation failures observed on Cloudflare's fleet\nwhen handling network packets:\n\n kswapd1: page allocation failure: order:0, mode:0x820(GFP_ATOMIC),\n nodemask=(null),cpuset=/,mems_allowed=0-7\n CPU: 10 PID: 696 Comm: kswapd1 Kdump: loaded Tainted: G O 6.6.43-CUSTOM #1\n Hardware name: MACHINE\n Call Trace:\n <IRQ>\n dump_stack_lvl+0x3c/0x50\n warn_alloc+0x13a/0x1c0\n __alloc_pages_slowpath.constprop.0+0xc9d/0xd10\n __alloc_pages+0x327/0x340\n __napi_alloc_skb+0x16d/0x1f0\n bnxt_rx_page_skb+0x96/0x1b0 [bnxt_en]\n bnxt_rx_pkt+0x201/0x15e0 [bnxt_en]\n __bnxt_poll_work+0x156/0x2b0 [bnxt_en]\n bnxt_poll+0xd9/0x1c0 [bnxt_en]\n __napi_poll+0x2b/0x1b0\n bpf_trampoline_6442524138+0x7d/0x1000\n __napi_poll+0x5/0x1b0\n net_rx_action+0x342/0x740\n handle_softirqs+0xcf/0x2b0\n irq_exit_rcu+0x6c/0x90\n sysvec_apic_timer_interrupt+0x72/0x90\n </IRQ>\n\n[mfleming@cloudflare.com: update comment]\n Link: https://lkml.kernel.org/r/20241015125158.3597702-1-matt@readmodwrite.com"
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": []
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/189b954469cf82f8b8cf496f8de94b006d2d4746",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/281dd25c1a018261a04d1b8bf41a0674000bfe38",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/4c4e238d3adad3c94bb255d0f117d3685bbfdd33",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/b958948ae1cb3e39c48e9f805436fd652103c71e",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/d0fdacfb85a3e1223b894cc6e60091ec91049e9e",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
25
CVE-2024/CVE-2024-502xx/CVE-2024-50263.json
Normal file
25
CVE-2024/CVE-2024-502xx/CVE-2024-50263.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-50263",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2024-11-11T14:15:15.473",
|
||||||
|
"lastModified": "2024-11-11T14:15:15.473",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfork: only invoke khugepaged, ksm hooks if no error\n\nThere is no reason to invoke these hooks early against an mm that is in an\nincomplete state.\n\nThe change in commit d24062914837 (\"fork: use __mt_dup() to duplicate\nmaple tree in dup_mmap()\") makes this more pertinent as we may be in a\nstate where entries in the maple tree are not yet consistent.\n\nTheir placement early in dup_mmap() only appears to have been meaningful\nfor early error checking, and since functionally it'd require a very small\nallocation to fail (in practice 'too small to fail') that'd only occur in\nthe most dire circumstances, meaning the fork would fail or be OOM'd in\nany case.\n\nSince both khugepaged and KSM tracking are there to provide optimisations\nto memory performance rather than critical functionality, it doesn't\nreally matter all that much if, under such dire memory pressure, we fail\nto register an mm with these.\n\nAs a result, we follow the example of commit d2081b2bf819 (\"mm:\nkhugepaged: make khugepaged_enter() void function\") and make ksm_fork() a\nvoid function also.\n\nWe only expose the mm to these functions once we are done with them and\nonly if no error occurred in the fork operation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3b85aa0da8cd01173b9afd1f70080fbb9576c4b0",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/985da552a98e27096444508ce5d853244019111f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
42
README.md
42
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-11T09:00:21.339790+00:00
|
2024-11-11T15:00:19.382180+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-11-11T08:15:09.423000+00:00
|
2024-11-11T14:15:15.473000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,39 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
269004
|
269017
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `19`
|
Recently added CVEs: `13`
|
||||||
|
|
||||||
- [CVE-2024-11016](CVE-2024/CVE-2024-110xx/CVE-2024-11016.json) (`2024-11-11T07:15:04.400`)
|
- [CVE-2024-10314](CVE-2024/CVE-2024-103xx/CVE-2024-10314.json) (`2024-11-11T14:15:14.190`)
|
||||||
- [CVE-2024-11017](CVE-2024/CVE-2024-110xx/CVE-2024-11017.json) (`2024-11-11T07:15:04.910`)
|
- [CVE-2024-10344](CVE-2024/CVE-2024-103xx/CVE-2024-10344.json) (`2024-11-11T14:15:14.453`)
|
||||||
- [CVE-2024-11018](CVE-2024/CVE-2024-110xx/CVE-2024-11018.json) (`2024-11-11T07:15:05.210`)
|
- [CVE-2024-10345](CVE-2024/CVE-2024-103xx/CVE-2024-10345.json) (`2024-11-11T14:15:14.563`)
|
||||||
- [CVE-2024-11019](CVE-2024/CVE-2024-110xx/CVE-2024-11019.json) (`2024-11-11T07:15:05.517`)
|
- [CVE-2024-34014](CVE-2024/CVE-2024-340xx/CVE-2024-34014.json) (`2024-11-11T14:15:14.693`)
|
||||||
- [CVE-2024-11020](CVE-2024/CVE-2024-110xx/CVE-2024-11020.json) (`2024-11-11T08:15:03.610`)
|
- [CVE-2024-34015](CVE-2024/CVE-2024-340xx/CVE-2024-34015.json) (`2024-11-11T14:15:14.993`)
|
||||||
- [CVE-2024-11021](CVE-2024/CVE-2024-110xx/CVE-2024-11021.json) (`2024-11-11T08:15:04.987`)
|
- [CVE-2024-43427](CVE-2024/CVE-2024-434xx/CVE-2024-43427.json) (`2024-11-11T13:15:03.530`)
|
||||||
- [CVE-2024-11062](CVE-2024/CVE-2024-110xx/CVE-2024-11062.json) (`2024-11-11T08:15:05.530`)
|
- [CVE-2024-43429](CVE-2024/CVE-2024-434xx/CVE-2024-43429.json) (`2024-11-11T13:15:03.880`)
|
||||||
- [CVE-2024-11063](CVE-2024/CVE-2024-110xx/CVE-2024-11063.json) (`2024-11-11T08:15:06.120`)
|
- [CVE-2024-43430](CVE-2024/CVE-2024-434xx/CVE-2024-43430.json) (`2024-11-11T13:15:04.053`)
|
||||||
- [CVE-2024-11064](CVE-2024/CVE-2024-110xx/CVE-2024-11064.json) (`2024-11-11T08:15:06.653`)
|
- [CVE-2024-43432](CVE-2024/CVE-2024-434xx/CVE-2024-43432.json) (`2024-11-11T13:15:04.233`)
|
||||||
- [CVE-2024-11065](CVE-2024/CVE-2024-110xx/CVE-2024-11065.json) (`2024-11-11T08:15:07.180`)
|
- [CVE-2024-43433](CVE-2024/CVE-2024-434xx/CVE-2024-43433.json) (`2024-11-11T13:15:04.410`)
|
||||||
- [CVE-2024-11066](CVE-2024/CVE-2024-110xx/CVE-2024-11066.json) (`2024-11-11T08:15:07.730`)
|
- [CVE-2024-43435](CVE-2024/CVE-2024-434xx/CVE-2024-43435.json) (`2024-11-11T13:15:04.580`)
|
||||||
- [CVE-2024-11067](CVE-2024/CVE-2024-110xx/CVE-2024-11067.json) (`2024-11-11T08:15:08.263`)
|
- [CVE-2024-43437](CVE-2024/CVE-2024-434xx/CVE-2024-43437.json) (`2024-11-11T13:15:04.757`)
|
||||||
- [CVE-2024-11068](CVE-2024/CVE-2024-110xx/CVE-2024-11068.json) (`2024-11-11T08:15:08.850`)
|
- [CVE-2024-50263](CVE-2024/CVE-2024-502xx/CVE-2024-50263.json) (`2024-11-11T14:15:15.473`)
|
||||||
- [CVE-2024-52350](CVE-2024/CVE-2024-523xx/CVE-2024-52350.json) (`2024-11-11T07:15:06.293`)
|
|
||||||
- [CVE-2024-52351](CVE-2024/CVE-2024-523xx/CVE-2024-52351.json) (`2024-11-11T07:15:06.583`)
|
|
||||||
- [CVE-2024-52352](CVE-2024/CVE-2024-523xx/CVE-2024-52352.json) (`2024-11-11T07:15:06.907`)
|
|
||||||
- [CVE-2024-52353](CVE-2024/CVE-2024-523xx/CVE-2024-52353.json) (`2024-11-11T07:15:07.223`)
|
|
||||||
- [CVE-2024-52354](CVE-2024/CVE-2024-523xx/CVE-2024-52354.json) (`2024-11-11T07:15:07.500`)
|
|
||||||
- [CVE-2024-52355](CVE-2024/CVE-2024-523xx/CVE-2024-52355.json) (`2024-11-11T07:15:07.790`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `1`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2024-47295](CVE-2024/CVE-2024-472xx/CVE-2024-47295.json) (`2024-11-11T08:15:09.423`)
|
- [CVE-2024-50219](CVE-2024/CVE-2024-502xx/CVE-2024-50219.json) (`2024-11-11T14:15:15.210`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
55
_state.csv
55
_state.csv
@ -242591,6 +242591,7 @@ CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700
|
|||||||
CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c653,2024-11-04T13:06:20.190000
|
CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c653,2024-11-04T13:06:20.190000
|
||||||
CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000
|
CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000
|
||||||
CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000
|
CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000
|
||||||
|
CVE-2024-10314,1,1,20b0cb09bc8cc2bf5f9ce62e7caccc420ade2ce546f6fd908a532c2d4632d7d4,2024-11-11T14:15:14.190000
|
||||||
CVE-2024-10318,0,0,c9c0b32165e110789e705dc55263c8f26a928f9dce25281896f08d394c1b97f7,2024-11-08T19:51:49.380000
|
CVE-2024-10318,0,0,c9c0b32165e110789e705dc55263c8f26a928f9dce25281896f08d394c1b97f7,2024-11-08T19:51:49.380000
|
||||||
CVE-2024-10319,0,0,521a2584bb331a8cf29df932b8069e068af4d281b03c20cc06073eb127cb6582,2024-11-08T15:25:16.317000
|
CVE-2024-10319,0,0,521a2584bb331a8cf29df932b8069e068af4d281b03c20cc06073eb127cb6582,2024-11-08T15:25:16.317000
|
||||||
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
|
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
|
||||||
@ -242609,6 +242610,8 @@ CVE-2024-10340,0,0,86c71b5cd9d3256a3a96f0206fa643848ca73015f559230bc3985df65e9e3
|
|||||||
CVE-2024-10341,0,0,cee111fac6415e06ee00d7cd99c9382c566a15f39228a22e729de830098b01dd,2024-11-05T17:51:44.597000
|
CVE-2024-10341,0,0,cee111fac6415e06ee00d7cd99c9382c566a15f39228a22e729de830098b01dd,2024-11-05T17:51:44.597000
|
||||||
CVE-2024-10342,0,0,a674c6499a8c6205c44b5186f38cedfb618a6a3a28286164189d9d013947c529,2024-11-05T17:52:00.610000
|
CVE-2024-10342,0,0,a674c6499a8c6205c44b5186f38cedfb618a6a3a28286164189d9d013947c529,2024-11-05T17:52:00.610000
|
||||||
CVE-2024-10343,0,0,4101b5a530cab96c4e2ed3f7591bd8e9e62c4ce861db441511cf50880ecd2465,2024-10-25T12:56:07.750000
|
CVE-2024-10343,0,0,4101b5a530cab96c4e2ed3f7591bd8e9e62c4ce861db441511cf50880ecd2465,2024-10-25T12:56:07.750000
|
||||||
|
CVE-2024-10344,1,1,6b367377738905d2b651cdfc4a15df75962fa7d5b2cd7e74e65faee55643165f,2024-11-11T14:15:14.453000
|
||||||
|
CVE-2024-10345,1,1,2ad6c65a7bd3adee3eaccfec951044ecea4e01fbaafc475d9365658bbd35944b,2024-11-11T14:15:14.563000
|
||||||
CVE-2024-10348,0,0,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000
|
CVE-2024-10348,0,0,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000
|
||||||
CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000
|
CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000
|
||||||
CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000
|
CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000
|
||||||
@ -242945,13 +242948,13 @@ CVE-2024-10998,0,0,41f387fbf1645aa90b35c52ac0db0cc1b6181351deba62e7b43db2377129b
|
|||||||
CVE-2024-10999,0,0,25c169fccdcc9e88a3876005f32d4643213fc0492b1ed51816b7a93f6109fc6e,2024-11-08T19:01:03.880000
|
CVE-2024-10999,0,0,25c169fccdcc9e88a3876005f32d4643213fc0492b1ed51816b7a93f6109fc6e,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
|
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
|
||||||
CVE-2024-11000,0,0,4fb6c84b88e18aeb98d1b738e518210fb6a3e1010153945ab3cfa9fceb300001,2024-11-08T19:01:03.880000
|
CVE-2024-11000,0,0,4fb6c84b88e18aeb98d1b738e518210fb6a3e1010153945ab3cfa9fceb300001,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-11016,1,1,7465894c7af1d565ba268d39a530680d544c45a4359be3062d88a668f248bcab,2024-11-11T07:15:04.400000
|
CVE-2024-11016,0,0,7465894c7af1d565ba268d39a530680d544c45a4359be3062d88a668f248bcab,2024-11-11T07:15:04.400000
|
||||||
CVE-2024-11017,1,1,f72b8ad7548754f9615c91bcc8484923ef204ce648a38ba7dd6aae8d9fe23056,2024-11-11T07:15:04.910000
|
CVE-2024-11017,0,0,f72b8ad7548754f9615c91bcc8484923ef204ce648a38ba7dd6aae8d9fe23056,2024-11-11T07:15:04.910000
|
||||||
CVE-2024-11018,1,1,84bc06d70da2a8d3d4381a8197c78a4f42f8e160be38709587a0a67216e3d45b,2024-11-11T07:15:05.210000
|
CVE-2024-11018,0,0,84bc06d70da2a8d3d4381a8197c78a4f42f8e160be38709587a0a67216e3d45b,2024-11-11T07:15:05.210000
|
||||||
CVE-2024-11019,1,1,c8352ec68076cde3a9971175007a10a5c740bcc0ac7d448dd20b91cb82e11677,2024-11-11T07:15:05.517000
|
CVE-2024-11019,0,0,c8352ec68076cde3a9971175007a10a5c740bcc0ac7d448dd20b91cb82e11677,2024-11-11T07:15:05.517000
|
||||||
CVE-2024-1102,0,0,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685dd,2024-10-16T15:15:15.150000
|
CVE-2024-1102,0,0,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685dd,2024-10-16T15:15:15.150000
|
||||||
CVE-2024-11020,1,1,2aac63b0be46a7cb6153ef907562bfe3c4fb09e49ebef49020f205ed3740ecad,2024-11-11T08:15:03.610000
|
CVE-2024-11020,0,0,2aac63b0be46a7cb6153ef907562bfe3c4fb09e49ebef49020f205ed3740ecad,2024-11-11T08:15:03.610000
|
||||||
CVE-2024-11021,1,1,4c49697a18afd986b1675870cfbd40b7e00131792b262a9794ecb2d492713f6d,2024-11-11T08:15:04.987000
|
CVE-2024-11021,0,0,4c49697a18afd986b1675870cfbd40b7e00131792b262a9794ecb2d492713f6d,2024-11-11T08:15:04.987000
|
||||||
CVE-2024-11026,0,0,dcff611dc02692ea0927ae09a065a279384099427d4514b9fc6a9bc987d8eec0,2024-11-08T22:15:14.610000
|
CVE-2024-11026,0,0,dcff611dc02692ea0927ae09a065a279384099427d4514b9fc6a9bc987d8eec0,2024-11-08T22:15:14.610000
|
||||||
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
|
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
|
||||||
CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000
|
CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000
|
||||||
@ -242970,13 +242973,13 @@ CVE-2024-11059,0,0,4701f67edbe381eeaf9aee2ff329a7f7c3dee9bcc39cff6c54d2e0d0b473d
|
|||||||
CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000
|
CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000
|
||||||
CVE-2024-11060,0,0,ae6231a406a1fd5610f9cf7c5ceeb4bdd25f4c48ad30275dd841c0c6b22ad009,2024-11-11T01:15:04.233000
|
CVE-2024-11060,0,0,ae6231a406a1fd5610f9cf7c5ceeb4bdd25f4c48ad30275dd841c0c6b22ad009,2024-11-11T01:15:04.233000
|
||||||
CVE-2024-11061,0,0,6fa245e1ab0816939be164d71268563d1e94aa2fe2c1a714e0c865f2942b8e9d,2024-11-11T01:15:04.523000
|
CVE-2024-11061,0,0,6fa245e1ab0816939be164d71268563d1e94aa2fe2c1a714e0c865f2942b8e9d,2024-11-11T01:15:04.523000
|
||||||
CVE-2024-11062,1,1,ee4bf6a7e3cf254580c3b6f836f55381060121e386a8c1751e03d7192d5725e8,2024-11-11T08:15:05.530000
|
CVE-2024-11062,0,0,ee4bf6a7e3cf254580c3b6f836f55381060121e386a8c1751e03d7192d5725e8,2024-11-11T08:15:05.530000
|
||||||
CVE-2024-11063,1,1,f85461dd32a663d5852309f964eae66bfb880b75a5900b88dcdb09d2bf7cc216,2024-11-11T08:15:06.120000
|
CVE-2024-11063,0,0,f85461dd32a663d5852309f964eae66bfb880b75a5900b88dcdb09d2bf7cc216,2024-11-11T08:15:06.120000
|
||||||
CVE-2024-11064,1,1,173044f1af0392f52bfc676843c2ca0597de61039f4d49845c47657bd0ebdc51,2024-11-11T08:15:06.653000
|
CVE-2024-11064,0,0,173044f1af0392f52bfc676843c2ca0597de61039f4d49845c47657bd0ebdc51,2024-11-11T08:15:06.653000
|
||||||
CVE-2024-11065,1,1,6cc19f2e7837a3778332a2818999229deb69d452d2631d06d1542a01b5f14569,2024-11-11T08:15:07.180000
|
CVE-2024-11065,0,0,6cc19f2e7837a3778332a2818999229deb69d452d2631d06d1542a01b5f14569,2024-11-11T08:15:07.180000
|
||||||
CVE-2024-11066,1,1,4401024f2ee49fc7054bda4de38149a419c2e21669ad66d6d4c7a1a13fbb7b78,2024-11-11T08:15:07.730000
|
CVE-2024-11066,0,0,4401024f2ee49fc7054bda4de38149a419c2e21669ad66d6d4c7a1a13fbb7b78,2024-11-11T08:15:07.730000
|
||||||
CVE-2024-11067,1,1,9083bf332bd380cf8afdf0b36996857eb44d20d84bddd464e7741201bbf169c5,2024-11-11T08:15:08.263000
|
CVE-2024-11067,0,0,9083bf332bd380cf8afdf0b36996857eb44d20d84bddd464e7741201bbf169c5,2024-11-11T08:15:08.263000
|
||||||
CVE-2024-11068,1,1,2870daa3b3e2ca018fa6082f45bf760fc57f2be6e37445170731581a3ce222a4,2024-11-11T08:15:08.850000
|
CVE-2024-11068,0,0,2870daa3b3e2ca018fa6082f45bf760fc57f2be6e37445170731581a3ce222a4,2024-11-11T08:15:08.850000
|
||||||
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
|
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
|
||||||
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
|
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
|
||||||
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
||||||
@ -254171,6 +254174,8 @@ CVE-2024-34010,0,0,7772431fddbfa4456518c6f3c79bfb5e61dd9e04f9a0c45164641cb3c48c8
|
|||||||
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
|
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
|
||||||
CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000
|
CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000
|
||||||
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
|
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
|
||||||
|
CVE-2024-34014,1,1,228b12bf0954afaf81d91cbcc152d2076318e9206db7ad072c74687c12910396,2024-11-11T14:15:14.693000
|
||||||
|
CVE-2024-34015,1,1,9b27ecbd02b158c25cd9ca305f135fcb92845106dbe4761fb9c01e59e8e283fa,2024-11-11T14:15:14.993000
|
||||||
CVE-2024-34016,0,0,0c2a3147a84e04c06db0d6af075b8e16276b7cf9e5f22acd81f74dbeca1a1c49,2024-09-20T12:31:20.110000
|
CVE-2024-34016,0,0,0c2a3147a84e04c06db0d6af075b8e16276b7cf9e5f22acd81f74dbeca1a1c49,2024-09-20T12:31:20.110000
|
||||||
CVE-2024-34017,0,0,379da20aff6514952cc55653119ad0cbc16efa57414348c26e21b9e45ed9a8a1,2024-09-12T17:16:09.890000
|
CVE-2024-34017,0,0,379da20aff6514952cc55653119ad0cbc16efa57414348c26e21b9e45ed9a8a1,2024-09-12T17:16:09.890000
|
||||||
CVE-2024-34018,0,0,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a22992906144958936b,2024-09-12T17:17:20.873000
|
CVE-2024-34018,0,0,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a22992906144958936b,2024-09-12T17:17:20.873000
|
||||||
@ -260734,10 +260739,17 @@ CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34
|
|||||||
CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000
|
CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000
|
||||||
CVE-2024-43425,0,0,938233c36f296352d9985e1fd2ce4b16f2764e2564dfb74da585a571295076c0,2024-11-08T19:01:03.880000
|
CVE-2024-43425,0,0,938233c36f296352d9985e1fd2ce4b16f2764e2564dfb74da585a571295076c0,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300921,2024-11-08T19:01:03.880000
|
CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300921,2024-11-08T19:01:03.880000
|
||||||
|
CVE-2024-43427,1,1,581bee939c9e34fe119a8c608c0d866cf5e94ff0a94c54cceddda25eceda6b73,2024-11-11T13:15:03.530000
|
||||||
CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000
|
CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000
|
||||||
|
CVE-2024-43429,1,1,d3c44340c3bd6ae311e6f014dd25b6ccb57223b7de2b908763ecbeaacac4942f,2024-11-11T13:15:03.880000
|
||||||
|
CVE-2024-43430,1,1,cb9411ba76a50e8ba09950d9b570a9c5198d9d39254a440a1515f1ef49079492,2024-11-11T13:15:04.053000
|
||||||
CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000
|
CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000
|
||||||
|
CVE-2024-43432,1,1,e70dfa1ead67b49c5774974a49a0d388fe5aae9064243fff3ff9679c2dc80e67,2024-11-11T13:15:04.233000
|
||||||
|
CVE-2024-43433,1,1,074b7b449f98213f5e417d5bdf6e5c01493abde20d62136d3d64c93894d45cef,2024-11-11T13:15:04.410000
|
||||||
CVE-2024-43434,0,0,8ffb2c6afb4ed4c9c792f8915838fc9f8b7d930620a4823c5b60db456a6beae1,2024-11-08T19:01:03.880000
|
CVE-2024-43434,0,0,8ffb2c6afb4ed4c9c792f8915838fc9f8b7d930620a4823c5b60db456a6beae1,2024-11-08T19:01:03.880000
|
||||||
|
CVE-2024-43435,1,1,3d7507433dbdaf669ffe2bd3e815b4ba28fd1460314f079d452f0d8ad41c3607,2024-11-11T13:15:04.580000
|
||||||
CVE-2024-43436,0,0,d5a3a1ab85fb023046251b174592264fb917cdc48f222f2755feafd455c0e61d,2024-11-08T19:01:03.880000
|
CVE-2024-43436,0,0,d5a3a1ab85fb023046251b174592264fb917cdc48f222f2755feafd455c0e61d,2024-11-08T19:01:03.880000
|
||||||
|
CVE-2024-43437,1,1,b7778e9263c7714a5b663e3d51f77430d9db4e33c3b07a19b5fd3b6dcc35bcd2,2024-11-11T13:15:04.757000
|
||||||
CVE-2024-43438,0,0,875baee488d8f8241783e175bd68620af647e40659767e34acd9ef245d347a44,2024-11-08T19:01:03.880000
|
CVE-2024-43438,0,0,875baee488d8f8241783e175bd68620af647e40659767e34acd9ef245d347a44,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000
|
CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000
|
||||||
CVE-2024-43440,0,0,3deee55ee11303962828a1a1b49c99d7d9284f6df5f48904a5eb9b6fe3a55147,2024-11-08T19:01:03.880000
|
CVE-2024-43440,0,0,3deee55ee11303962828a1a1b49c99d7d9284f6df5f48904a5eb9b6fe3a55147,2024-11-08T19:01:03.880000
|
||||||
@ -262993,7 +263005,7 @@ CVE-2024-47291,0,0,b405a6fecb729547c889865c82ddc892ef58104fc3d0eeff1326133541441
|
|||||||
CVE-2024-47292,0,0,50a5f55d1cd7f04a27961f6de324de9237d82ece0981e52bba9e38c14afb7e8b,2024-10-01T14:23:58.267000
|
CVE-2024-47292,0,0,50a5f55d1cd7f04a27961f6de324de9237d82ece0981e52bba9e38c14afb7e8b,2024-10-01T14:23:58.267000
|
||||||
CVE-2024-47293,0,0,8066415ca7197eb9a32d1acacaf53d321554e5f9cb22e4a1be994c73edda7213,2024-10-01T14:25:31.430000
|
CVE-2024-47293,0,0,8066415ca7197eb9a32d1acacaf53d321554e5f9cb22e4a1be994c73edda7213,2024-10-01T14:25:31.430000
|
||||||
CVE-2024-47294,0,0,616aaa0c0c25f743060360eec6e57e8d54e0c598ed571a7197a1a165758173ad,2024-10-01T14:27:54.577000
|
CVE-2024-47294,0,0,616aaa0c0c25f743060360eec6e57e8d54e0c598ed571a7197a1a165758173ad,2024-10-01T14:27:54.577000
|
||||||
CVE-2024-47295,0,1,bcb8f9b2d38f79d43b5ba2ae907ffeb5190dfdfa52d0686289d9d07df91da0a8,2024-11-11T08:15:09.423000
|
CVE-2024-47295,0,0,bcb8f9b2d38f79d43b5ba2ae907ffeb5190dfdfa52d0686289d9d07df91da0a8,2024-11-11T08:15:09.423000
|
||||||
CVE-2024-47297,0,0,15d553d29468050e1f2a6334078655d58f66ba424ad7f6feb79e743b75124a29,2024-10-07T17:47:48.410000
|
CVE-2024-47297,0,0,15d553d29468050e1f2a6334078655d58f66ba424ad7f6feb79e743b75124a29,2024-10-07T17:47:48.410000
|
||||||
CVE-2024-47298,0,0,5e0bf18d2c868a02c3648bb82b90ba712a7f3ace13e60223733e9f9b2a10b740,2024-10-07T17:47:48.410000
|
CVE-2024-47298,0,0,5e0bf18d2c868a02c3648bb82b90ba712a7f3ace13e60223733e9f9b2a10b740,2024-10-07T17:47:48.410000
|
||||||
CVE-2024-47299,0,0,69ddc217eb16e2f207164d9621a98f8efcecc43a8fd19b4abba37eee03e8ebfa,2024-10-07T17:47:48.410000
|
CVE-2024-47299,0,0,69ddc217eb16e2f207164d9621a98f8efcecc43a8fd19b4abba37eee03e8ebfa,2024-10-07T17:47:48.410000
|
||||||
@ -264605,7 +264617,7 @@ CVE-2024-50215,0,0,51deedf9e51b9010196feb8434c74c41c571fa0dfa190b3bcc95c654d401a
|
|||||||
CVE-2024-50216,0,0,dd18627c652b541fcc71e8055f8b9b54a97ee1c452f87671395ddb6c7c0effe5,2024-11-09T11:15:06.987000
|
CVE-2024-50216,0,0,dd18627c652b541fcc71e8055f8b9b54a97ee1c452f87671395ddb6c7c0effe5,2024-11-09T11:15:06.987000
|
||||||
CVE-2024-50217,0,0,f1f9a2585721ca44599dff7237e3c4e7abb72e154ac4bfb5a6e8176e15581aa4,2024-11-09T11:15:07.103000
|
CVE-2024-50217,0,0,f1f9a2585721ca44599dff7237e3c4e7abb72e154ac4bfb5a6e8176e15581aa4,2024-11-09T11:15:07.103000
|
||||||
CVE-2024-50218,0,0,a1e0ddbb039c77513f3d3ef127e35268d6a74599810a96ae07cfefd1c53ddc78,2024-11-09T11:15:07.213000
|
CVE-2024-50218,0,0,a1e0ddbb039c77513f3d3ef127e35268d6a74599810a96ae07cfefd1c53ddc78,2024-11-09T11:15:07.213000
|
||||||
CVE-2024-50219,0,0,06813312321501feccb3f75265b5fab72869e03153e4e88d16e6d98c0d01b70a,2024-11-09T11:15:07.373000
|
CVE-2024-50219,0,1,57ca6b6c0667d0c6ff47560f6866cfa36318c7798583ecd36bd30e6bd0856676,2024-11-11T14:15:15.210000
|
||||||
CVE-2024-5022,0,0,b83f09821687b900e7e3c962c3fdf76320d3bf46277a4004f5c59e7ba07e152d,2024-10-28T21:35:22.210000
|
CVE-2024-5022,0,0,b83f09821687b900e7e3c962c3fdf76320d3bf46277a4004f5c59e7ba07e152d,2024-10-28T21:35:22.210000
|
||||||
CVE-2024-50220,0,0,3378fdb1fc18a5a841a545e889b5ac91573032b494633fa4e5ccfb9c04f87e68,2024-11-09T11:15:07.487000
|
CVE-2024-50220,0,0,3378fdb1fc18a5a841a545e889b5ac91573032b494633fa4e5ccfb9c04f87e68,2024-11-09T11:15:07.487000
|
||||||
CVE-2024-50221,0,0,6b968bc1e5c76dac654c3003b7e391fdfa86fc18c244cdd09f5cb172c0577127,2024-11-09T11:15:07.600000
|
CVE-2024-50221,0,0,6b968bc1e5c76dac654c3003b7e391fdfa86fc18c244cdd09f5cb172c0577127,2024-11-09T11:15:07.600000
|
||||||
@ -264653,6 +264665,7 @@ CVE-2024-50259,0,0,9505f119d634507830457a8481da367105cd2d69e5a787778823d77383895
|
|||||||
CVE-2024-50260,0,0,fc4cef5cf9d349d410ca1c97d5743d6a1870d568c5b285bfc5df24088371adb6,2024-11-09T11:15:11.550000
|
CVE-2024-50260,0,0,fc4cef5cf9d349d410ca1c97d5743d6a1870d568c5b285bfc5df24088371adb6,2024-11-09T11:15:11.550000
|
||||||
CVE-2024-50261,0,0,c7b0c5cb53afcfabb0ce1805397f6b93d637df35741bb2601e07e11bb4679803,2024-11-09T11:15:11.610000
|
CVE-2024-50261,0,0,c7b0c5cb53afcfabb0ce1805397f6b93d637df35741bb2601e07e11bb4679803,2024-11-09T11:15:11.610000
|
||||||
CVE-2024-50262,0,0,3571cc23e83cb0fd0612ed425e1b46385cde83393258e2fe4bbbc81ff1ef3dba,2024-11-09T11:15:11.687000
|
CVE-2024-50262,0,0,3571cc23e83cb0fd0612ed425e1b46385cde83393258e2fe4bbbc81ff1ef3dba,2024-11-09T11:15:11.687000
|
||||||
|
CVE-2024-50263,1,1,748014e2b774d64f4e051bec86180e6c3664073e1b19a8534d7635fa9f3b703c,2024-11-11T14:15:15.473000
|
||||||
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
|
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
|
||||||
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
|
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
|
||||||
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
|
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
|
||||||
@ -265350,12 +265363,12 @@ CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3b
|
|||||||
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
|
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
|
||||||
CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000
|
CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000
|
||||||
CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000
|
CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000
|
||||||
CVE-2024-52350,1,1,b1a9847e39d8b6bad9956bc978664b7f1d9f26efb721ee2fd1d29ca9f456224a,2024-11-11T07:15:06.293000
|
CVE-2024-52350,0,0,b1a9847e39d8b6bad9956bc978664b7f1d9f26efb721ee2fd1d29ca9f456224a,2024-11-11T07:15:06.293000
|
||||||
CVE-2024-52351,1,1,8b7440e51d76b6a6e3db8edd41d646f56472df2df316cfa7f263581553106079,2024-11-11T07:15:06.583000
|
CVE-2024-52351,0,0,8b7440e51d76b6a6e3db8edd41d646f56472df2df316cfa7f263581553106079,2024-11-11T07:15:06.583000
|
||||||
CVE-2024-52352,1,1,ae11f439ee59fd361beed6fb8c37d042ed2bb07923f0c7f9a97ed227d2d09410,2024-11-11T07:15:06.907000
|
CVE-2024-52352,0,0,ae11f439ee59fd361beed6fb8c37d042ed2bb07923f0c7f9a97ed227d2d09410,2024-11-11T07:15:06.907000
|
||||||
CVE-2024-52353,1,1,35c8faefb66ea97c9758ead937372e7b7fda8bc858c187127c3214512e995223,2024-11-11T07:15:07.223000
|
CVE-2024-52353,0,0,35c8faefb66ea97c9758ead937372e7b7fda8bc858c187127c3214512e995223,2024-11-11T07:15:07.223000
|
||||||
CVE-2024-52354,1,1,f36017b491bdb9f444c8cb8c774543c454bc279243e6ecbf6d57f052d88d708c,2024-11-11T07:15:07.500000
|
CVE-2024-52354,0,0,f36017b491bdb9f444c8cb8c774543c454bc279243e6ecbf6d57f052d88d708c,2024-11-11T07:15:07.500000
|
||||||
CVE-2024-52355,1,1,1ead65e1d79b86e687339a1717ce8829747806135620cfe7850e9da57c237f01,2024-11-11T07:15:07.790000
|
CVE-2024-52355,0,0,1ead65e1d79b86e687339a1717ce8829747806135620cfe7850e9da57c237f01,2024-11-11T07:15:07.790000
|
||||||
CVE-2024-52356,0,0,0553acbf2e8e39a312cff7320beec0b9bcbfe62f41a3f3b85802b78b1abedebd,2024-11-11T06:15:10.153000
|
CVE-2024-52356,0,0,0553acbf2e8e39a312cff7320beec0b9bcbfe62f41a3f3b85802b78b1abedebd,2024-11-11T06:15:10.153000
|
||||||
CVE-2024-52357,0,0,e8fdb161598d26c1fc31a1b648593dd8160fca2dcc96e2a7336c53a573f39fc4,2024-11-11T06:15:10.440000
|
CVE-2024-52357,0,0,e8fdb161598d26c1fc31a1b648593dd8160fca2dcc96e2a7336c53a573f39fc4,2024-11-11T06:15:10.440000
|
||||||
CVE-2024-52358,0,0,4e891ee49c0a084a921d2e6a3c04a1bbfa51eca5c1025b9c9f9183cd5dd21da2,2024-11-11T06:15:10.737000
|
CVE-2024-52358,0,0,4e891ee49c0a084a921d2e6a3c04a1bbfa51eca5c1025b9c9f9183cd5dd21da2,2024-11-11T06:15:10.737000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user