mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-11-26T15:06:00.045011+00:00
This commit is contained in:
parent
d38e05e3e4
commit
18a86641f0
55
CVE-2016/CVE-2016-104xx/CVE-2016-10408.json
Normal file
55
CVE-2016/CVE-2016-104xx/CVE-2016-10408.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2016-10408",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-26T14:15:17.053",
|
||||
"lastModified": "2024-11-26T14:15:17.053",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "QSEE will randomly experience a fatal error during execution due to speculative instruction fetches from device memory. Device memory is not valid executable memory."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2017/CVE-2017-183xx/CVE-2017-18306.json
Normal file
55
CVE-2017/CVE-2017-183xx/CVE-2017-18306.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2017-18306",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-26T14:15:17.430",
|
||||
"lastModified": "2024-11-26T14:15:17.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Information disclosure due to uninitialized variable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2017/CVE-2017-183xx/CVE-2017-18307.json
Normal file
55
CVE-2017/CVE-2017-183xx/CVE-2017-18307.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2017-18307",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-26T14:15:17.573",
|
||||
"lastModified": "2024-11-26T14:15:17.573",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Information disclosure possible while audio playback."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2018/CVE-2018-118xx/CVE-2018-11816.json
Normal file
55
CVE-2018/CVE-2018-118xx/CVE-2018-11816.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2018-11816",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-26T14:15:17.723",
|
||||
"lastModified": "2024-11-26T14:15:17.723",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Crafted Binder Request Causes Heap UAF in MediaServer"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2018/CVE-2018-58xx/CVE-2018-5852.json
Normal file
55
CVE-2018/CVE-2018-58xx/CVE-2018-5852.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2018-5852",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2024-11-26T14:15:17.970",
|
||||
"lastModified": "2024-11-26T14:15:17.970",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unsigned integer underflow vulnerability in IPA driver result into a buffer over-read while reading NAT entry using debugfs command 'cat /sys/kernel/debug/ipa/ip4_nat'"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@qualcomm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2024-0039",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-03-11T17:15:45.350",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"lastModified": "2024-11-26T14:26:56.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,23 +14,132 @@
|
||||
"value": "En attp_build_value_cmd de att_protocol.cc, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/015c618a0461def93138173a53daaf27ca0630c9",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/17044ccf3a2858633cad8f87926e752edfe0d8d8",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/f0f35273101518d1f3a660b151804e90d0249af3",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-03-01",
|
||||
"source": "security@android.com"
|
||||
"source": "security@android.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/015c618a0461def93138173a53daaf27ca0630c9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/17044ccf3a2858633cad8f87926e752edfe0d8d8",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/f0f35273101518d1f3a660b151804e90d0249af3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-03-01",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-116xx/CVE-2024-11691.json
Normal file
44
CVE-2024/CVE-2024-116xx/CVE-2024-11691.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-11691",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:18.633",
|
||||
"lastModified": "2024-11-26T14:15:18.633",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker could have caused memory corruption due to a flaw in Apple's GPU driver; this can be avoided by working around the flaw. \n*Note: This issue only affected macOS operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914707",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924184",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-65/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-116xx/CVE-2024-11692.json
Normal file
36
CVE-2024/CVE-2024-116xx/CVE-2024-11692.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-11692",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:18.743",
|
||||
"lastModified": "2024-11-26T14:15:18.743",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909535",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-116xx/CVE-2024-11693.json
Normal file
36
CVE-2024/CVE-2024-116xx/CVE-2024-11693.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-11693",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:18.847",
|
||||
"lastModified": "2024-11-26T14:15:18.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The executable file warning was not presented when downloading .library-ms files. \n*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921458",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2024/CVE-2024-116xx/CVE-2024-11694.json
Normal file
40
CVE-2024/CVE-2024-116xx/CVE-2024-11694.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2024-11694",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:18.943",
|
||||
"lastModified": "2024-11-26T14:15:18.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-65/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-116xx/CVE-2024-11695.json
Normal file
36
CVE-2024/CVE-2024-116xx/CVE-2024-11695.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-11695",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.040",
|
||||
"lastModified": "2024-11-26T14:15:19.040",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-116xx/CVE-2024-11696.json
Normal file
36
CVE-2024/CVE-2024-116xx/CVE-2024-11696.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-11696",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.143",
|
||||
"lastModified": "2024-11-26T14:15:19.143",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929600",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-116xx/CVE-2024-11697.json
Normal file
36
CVE-2024/CVE-2024-116xx/CVE-2024-11697.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-11697",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.243",
|
||||
"lastModified": "2024-11-26T14:15:19.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When handling keypress events, an attacker may have been able to trick a user into bypassing the \"Open Executable File?\" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842187",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-116xx/CVE-2024-11698.json
Normal file
36
CVE-2024/CVE-2024-116xx/CVE-2024-11698.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-11698",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.330",
|
||||
"lastModified": "2024-11-26T14:15:19.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing \"Esc\" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted. \n*This bug only affects the application when running on macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1916152",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-116xx/CVE-2024-11699.json
Normal file
36
CVE-2024/CVE-2024-116xx/CVE-2024-11699.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-11699",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.427",
|
||||
"lastModified": "2024-11-26T14:15:19.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-117xx/CVE-2024-11700.json
Normal file
28
CVE-2024/CVE-2024-117xx/CVE-2024-11700.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-11700",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.523",
|
||||
"lastModified": "2024-11-26T14:15:19.523",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Malicious websites may have been able to user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836921",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-117xx/CVE-2024-11701.json
Normal file
28
CVE-2024/CVE-2024-117xx/CVE-2024-11701.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-11701",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.617",
|
||||
"lastModified": "2024-11-26T14:15:19.617",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The incorrect domain may have been displayed in the address bar during an interrupted navigation attempt. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914797",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-117xx/CVE-2024-11702.json
Normal file
28
CVE-2024/CVE-2024-117xx/CVE-2024-11702.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-11702",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.710",
|
||||
"lastModified": "2024-11-26T14:15:19.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Copying sensitive information from Private Browsing tabs on Android, such as passwords, may have inadvertently stored data in the cloud-based clipboard history if enabled. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918884",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-117xx/CVE-2024-11703.json
Normal file
24
CVE-2024/CVE-2024-117xx/CVE-2024-11703.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-11703",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.810",
|
||||
"lastModified": "2024-11-26T14:15:19.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "On Android, Firefox may have inadvertently allowed viewing saved passwords without the required device PIN authentication. This vulnerability affects Firefox < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1928779",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-117xx/CVE-2024-11704.json
Normal file
28
CVE-2024/CVE-2024-117xx/CVE-2024-11704.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-11704",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.910",
|
||||
"lastModified": "2024-11-26T14:15:19.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A double-free issue could have occurred in `sec_pkcs7_decoder_start_decrypt()` when handling an error path. Under specific conditions, the same symmetric key could have been freed twice, potentially leading to memory corruption. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1899402",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-117xx/CVE-2024-11705.json
Normal file
28
CVE-2024/CVE-2024-117xx/CVE-2024-11705.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-11705",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.997",
|
||||
"lastModified": "2024-11-26T14:15:19.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "`NSC_DeriveKey` inadvertently assumed that the `phKey` parameter is always non-NULL. When it was passed as NULL, a segmentation fault (SEGV) occurred, leading to crashes. This behavior conflicted with the PKCS#11 v3.0 specification, which allows `phKey` to be NULL for certain mechanisms. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921768",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-117xx/CVE-2024-11706.json
Normal file
28
CVE-2024/CVE-2024-117xx/CVE-2024-11706.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-11706",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:20.080",
|
||||
"lastModified": "2024-11-26T14:15:20.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A null pointer dereference may have inadvertently occurred in `pk12util`, and specifically in the `SEC_ASN1DecodeItem_Util` function, when handling malformed or improperly formatted input files. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1923767",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-117xx/CVE-2024-11708.json
Normal file
28
CVE-2024/CVE-2024-117xx/CVE-2024-11708.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-11708",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:20.173",
|
||||
"lastModified": "2024-11-26T14:15:20.173",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing thread synchronization primitives could have led to a data race on members of the PlaybackParams structure. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1922912",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,12 @@
|
||||
"id": "CVE-2024-1936",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-04T22:15:46.733",
|
||||
"lastModified": "2024-08-08T21:35:03.480",
|
||||
"lastModified": "2024-11-26T14:15:20.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird < 115.8.1."
|
||||
"value": "The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third-party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird < 115.8.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +31,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
@ -63,6 +62,18 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-11/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860977",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-11/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,9 +2,8 @@
|
||||
"id": "CVE-2024-39576",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-08-22T03:15:03.717",
|
||||
"lastModified": "2024-08-22T12:48:02.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"lastModified": "2024-11-26T14:19:07.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -30,9 +31,27 @@
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
@ -42,19 +61,50 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:power_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.16.0",
|
||||
"matchCriteriaId": "92563529-35F8-43C4-ABB4-49AF6C40A63A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000227010/dsa-2024-323",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47248",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-11-26T12:15:19.007",
|
||||
"lastModified": "2024-11-26T12:15:19.007",
|
||||
"lastModified": "2024-11-26T14:15:20.810",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -14,7 +14,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/11/26/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47249",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-11-26T12:15:19.123",
|
||||
"lastModified": "2024-11-26T12:15:19.123",
|
||||
"lastModified": "2024-11-26T14:15:20.900",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -14,7 +14,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/7ckxw6481dp68ons627pjcb27c75n0mq",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/11/26/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47250",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-11-26T12:15:19.230",
|
||||
"lastModified": "2024-11-26T12:15:19.230",
|
||||
"lastModified": "2024-11-26T14:15:21.010",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -14,7 +14,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/zdb50spojlqbn0yxd866mbzqjt2vpt85",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/11/26/4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,12 @@
|
||||
"id": "CVE-2024-4766",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-05-14T18:15:13.393",
|
||||
"lastModified": "2024-11-04T15:35:35.123",
|
||||
"lastModified": "2024-11-26T14:15:21.113",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Different techniques existed to obscure the fullscreen notification in Firefox for Android. These could have lead to potential user confusion and spoofing attacks.\n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 126."
|
||||
"value": "Different techniques existed to obscure the fullscreen notification in Firefox for Android. These could have led to potential user confusion and spoofing attacks.\n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 126."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +31,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
@ -51,6 +50,18 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-21/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871214",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871217",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-21/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51569",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-11-26T12:15:21.113",
|
||||
"lastModified": "2024-11-26T12:15:21.113",
|
||||
"lastModified": "2024-11-26T14:15:21.343",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -14,7 +14,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/q0vs5rddx1lho30xnpsrvpzgxqmywnhs",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/11/26/5",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-539xx/CVE-2024-53975.json
Normal file
24
CVE-2024/CVE-2024-539xx/CVE-2024-53975.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-53975",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:21.497",
|
||||
"lastModified": "2024-11-26T14:15:21.497",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Accessing a non-secure HTTP site that uses a non-existent port may cause the SSL padlock icon in the location URL bar to, misleadingly, appear secure. This vulnerability affects Firefox for iOS < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843467",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-66/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2024/CVE-2024-539xx/CVE-2024-53976.json
Normal file
24
CVE-2024/CVE-2024-539xx/CVE-2024-53976.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2024-53976",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:21.587",
|
||||
"lastModified": "2024-11-26T14:15:21.587",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Under certain circumstances, navigating to a webpage would result in the address missing from the location URL bar, making it unclear what the URL was for the loaded webpage. This vulnerability affects Firefox for iOS < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1905749",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-66/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,12 @@
|
||||
"id": "CVE-2024-6602",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-07-09T15:15:12.473",
|
||||
"lastModified": "2024-07-16T18:15:08.900",
|
||||
"lastModified": "2024-11-26T14:15:21.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A mismatch between allocator and deallocator could have lead to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128."
|
||||
"value": "A mismatch between allocator and deallocator could have led to memory corruption. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +31,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
@ -59,6 +58,26 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-30/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-31/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,12 @@
|
||||
"id": "CVE-2024-6606",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-07-09T15:15:12.727",
|
||||
"lastModified": "2024-07-16T18:15:09.247",
|
||||
"lastModified": "2024-11-26T14:15:21.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Clipboard code failed to check the index on an array access. This could have lead to an out-of-bounds read. This vulnerability affects Firefox < 128 and Thunderbird < 128."
|
||||
"value": "Clipboard code failed to check the index on an array access. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 128 and Thunderbird < 128."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -23,6 +22,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +31,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
@ -51,6 +50,18 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902305",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,15 +2,41 @@
|
||||
"id": "CVE-2024-7242",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T22:15:17.140",
|
||||
"lastModified": "2024-11-22T22:15:17.140",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-26T14:59:29.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the PSANHost executable. By creating a junction, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23402."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de escalada de privilegios locales en Panda Security Dome Link Following. Esta vulnerabilidad permite a los atacantes locales escalar privilegios en las instalaciones afectadas de Panda Security Dome. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del ejecutable PSANHost. Al crear una uni\u00f3n, un atacante puede abusar del servicio para eliminar archivos arbitrarios. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Era ZDI-CAN-23402."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -46,10 +72,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pandasecurity:panda_dome:22.02.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08FAC1EC-83E9-4937-B5C5-9F3C2A5F9E2E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1017/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,15 +2,41 @@
|
||||
"id": "CVE-2024-7245",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-11-22T22:15:17.547",
|
||||
"lastModified": "2024-11-22T22:15:17.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-26T14:24:46.250",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Panda Security Dome VPN Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Hydra Sdk Windows Service. The issue lies in the lack of proper permissions set on a folder created by the service. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23429."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de escalamiento de privilegios locales por asignaci\u00f3n incorrecta de permisos en Panda Security Dome VPN. Esta vulnerabilidad permite a los atacantes locales escalar privilegios en las instalaciones afectadas de Panda Security Dome. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con pocos privilegios en el sistema de destino para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro del servicio de Windows Hydra Sdk. El problema radica en la falta de permisos adecuados establecidos en una carpeta creada por el servicio. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Era ZDI-CAN-23429."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -46,10 +72,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pandasecurity:panda_dome:22.02.01:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08FAC1EC-83E9-4937-B5C5-9F3C2A5F9E2E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1015/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-78xx/CVE-2024-7882.json
Normal file
59
CVE-2024/CVE-2024-78xx/CVE-2024-7882.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-7882",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-11-22T09:15:13.090",
|
||||
"lastModified": "2024-11-26T13:15:16.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Special Minds Design and Software e-Commerce allows SQL Injection.This issue affects e-Commerce: before 22.11.2024."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL (\"inyecci\u00f3n SQL\") en Special Minds Design and Software e-Commerce que permite la inyecci\u00f3n SQL. Este problema afecta a e-Commerce: hasta el 22 de noviembre de 2024. NOTA: Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1869",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-82xx/CVE-2024-8236.json
Normal file
63
CVE-2024/CVE-2024-82xx/CVE-2024-8236.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-8236",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T14:15:22.217",
|
||||
"lastModified": "2024-11-26T14:15:22.217",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Elementor Website Builder \u2013 More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter of the Icon widget in all versions up to, and including, 3.25.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/elementor/tags/3.23.4/includes/widgets/icon.php#L489",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3192020/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1305be5-8267-475f-b962-62e3930116e1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-94xx/CVE-2024-9461.json
Normal file
59
CVE-2024/CVE-2024-94xx/CVE-2024-9461.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-9461",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-26T14:15:22.533",
|
||||
"lastModified": "2024-11-26T14:15:22.533",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Total Upkeep \u2013 WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.6 via the cron_interval parameter. This is due to missing input validation and sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/boldgrid-backup/tags/1.16.5/admin/class-boldgrid-backup-admin-settings.php#L748",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/804b42a0-1cea-4f68-bd4a-d292a9f23fbe?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-99xx/CVE-2024-9928.json
Normal file
55
CVE-2024/CVE-2024-99xx/CVE-2024-9928.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-9928",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-11-26T14:15:22.777",
|
||||
"lastModified": "2024-11-26T14:15:22.777",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in NSD570 login panel that does not restrict excessive authentication attempts. If exploited, this could\ncause account takeover and unauthorized access to the system\nwhen an attacker conducts brute-force attacks against the\nequipment login. Note that the system supports only one concurrent session and implements a delay of more than a second\nbetween failed login attempts making it difficult to automate the\nattacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000173&LanguageCode=en&DocumentPartId=&Action=launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2024/CVE-2024-99xx/CVE-2024-9929.json
Normal file
43
CVE-2024/CVE-2024-99xx/CVE-2024-9929.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2024-9929",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-11-26T14:15:22.940",
|
||||
"lastModified": "2024-11-26T14:15:22.940",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in NSD570 that allows any authenticated\nuser to access all device logs disclosing login information with\ntimestamps."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000173&LanguageCode=en&DocumentPartId=&Action=launch",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
}
|
||||
]
|
||||
}
|
99
README.md
99
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-26T13:06:32.046090+00:00
|
||||
2024-11-26T15:06:00.045011+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-26T12:15:21.113000+00:00
|
||||
2024-11-26T14:59:29.483000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271380
|
||||
271409
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `49`
|
||||
Recently added CVEs: `29`
|
||||
|
||||
- [CVE-2024-47249](CVE-2024/CVE-2024-472xx/CVE-2024-47249.json) (`2024-11-26T12:15:19.123`)
|
||||
- [CVE-2024-47250](CVE-2024/CVE-2024-472xx/CVE-2024-47250.json) (`2024-11-26T12:15:19.230`)
|
||||
- [CVE-2024-50358](CVE-2024/CVE-2024-503xx/CVE-2024-50358.json) (`2024-11-26T11:21:59.970`)
|
||||
- [CVE-2024-50359](CVE-2024/CVE-2024-503xx/CVE-2024-50359.json) (`2024-11-26T11:22:00.460`)
|
||||
- [CVE-2024-50360](CVE-2024/CVE-2024-503xx/CVE-2024-50360.json) (`2024-11-26T11:22:01.187`)
|
||||
- [CVE-2024-50361](CVE-2024/CVE-2024-503xx/CVE-2024-50361.json) (`2024-11-26T11:22:01.630`)
|
||||
- [CVE-2024-50362](CVE-2024/CVE-2024-503xx/CVE-2024-50362.json) (`2024-11-26T11:22:02.067`)
|
||||
- [CVE-2024-50363](CVE-2024/CVE-2024-503xx/CVE-2024-50363.json) (`2024-11-26T11:22:02.530`)
|
||||
- [CVE-2024-50364](CVE-2024/CVE-2024-503xx/CVE-2024-50364.json) (`2024-11-26T11:22:02.973`)
|
||||
- [CVE-2024-50365](CVE-2024/CVE-2024-503xx/CVE-2024-50365.json) (`2024-11-26T11:22:03.430`)
|
||||
- [CVE-2024-50366](CVE-2024/CVE-2024-503xx/CVE-2024-50366.json) (`2024-11-26T11:22:03.853`)
|
||||
- [CVE-2024-50367](CVE-2024/CVE-2024-503xx/CVE-2024-50367.json) (`2024-11-26T11:22:04.287`)
|
||||
- [CVE-2024-50368](CVE-2024/CVE-2024-503xx/CVE-2024-50368.json) (`2024-11-26T11:22:04.710`)
|
||||
- [CVE-2024-50369](CVE-2024/CVE-2024-503xx/CVE-2024-50369.json) (`2024-11-26T11:22:05.147`)
|
||||
- [CVE-2024-50370](CVE-2024/CVE-2024-503xx/CVE-2024-50370.json) (`2024-11-26T11:22:05.563`)
|
||||
- [CVE-2024-50371](CVE-2024/CVE-2024-503xx/CVE-2024-50371.json) (`2024-11-26T11:22:06.050`)
|
||||
- [CVE-2024-50372](CVE-2024/CVE-2024-503xx/CVE-2024-50372.json) (`2024-11-26T11:22:06.457`)
|
||||
- [CVE-2024-50373](CVE-2024/CVE-2024-503xx/CVE-2024-50373.json) (`2024-11-26T11:22:06.930`)
|
||||
- [CVE-2024-50374](CVE-2024/CVE-2024-503xx/CVE-2024-50374.json) (`2024-11-26T11:22:07.403`)
|
||||
- [CVE-2024-50375](CVE-2024/CVE-2024-503xx/CVE-2024-50375.json) (`2024-11-26T11:22:07.867`)
|
||||
- [CVE-2024-50376](CVE-2024/CVE-2024-503xx/CVE-2024-50376.json) (`2024-11-26T11:22:08.323`)
|
||||
- [CVE-2024-50377](CVE-2024/CVE-2024-503xx/CVE-2024-50377.json) (`2024-11-26T11:22:08.767`)
|
||||
- [CVE-2024-51569](CVE-2024/CVE-2024-515xx/CVE-2024-51569.json) (`2024-11-26T12:15:21.113`)
|
||||
- [CVE-2024-8899](CVE-2024/CVE-2024-88xx/CVE-2024-8899.json) (`2024-11-26T11:22:09.257`)
|
||||
- [CVE-2024-9170](CVE-2024/CVE-2024-91xx/CVE-2024-9170.json) (`2024-11-26T09:15:06.640`)
|
||||
- [CVE-2018-5852](CVE-2018/CVE-2018-58xx/CVE-2018-5852.json) (`2024-11-26T14:15:17.970`)
|
||||
- [CVE-2024-11691](CVE-2024/CVE-2024-116xx/CVE-2024-11691.json) (`2024-11-26T14:15:18.633`)
|
||||
- [CVE-2024-11692](CVE-2024/CVE-2024-116xx/CVE-2024-11692.json) (`2024-11-26T14:15:18.743`)
|
||||
- [CVE-2024-11693](CVE-2024/CVE-2024-116xx/CVE-2024-11693.json) (`2024-11-26T14:15:18.847`)
|
||||
- [CVE-2024-11694](CVE-2024/CVE-2024-116xx/CVE-2024-11694.json) (`2024-11-26T14:15:18.943`)
|
||||
- [CVE-2024-11695](CVE-2024/CVE-2024-116xx/CVE-2024-11695.json) (`2024-11-26T14:15:19.040`)
|
||||
- [CVE-2024-11696](CVE-2024/CVE-2024-116xx/CVE-2024-11696.json) (`2024-11-26T14:15:19.143`)
|
||||
- [CVE-2024-11697](CVE-2024/CVE-2024-116xx/CVE-2024-11697.json) (`2024-11-26T14:15:19.243`)
|
||||
- [CVE-2024-11698](CVE-2024/CVE-2024-116xx/CVE-2024-11698.json) (`2024-11-26T14:15:19.330`)
|
||||
- [CVE-2024-11699](CVE-2024/CVE-2024-116xx/CVE-2024-11699.json) (`2024-11-26T14:15:19.427`)
|
||||
- [CVE-2024-11700](CVE-2024/CVE-2024-117xx/CVE-2024-11700.json) (`2024-11-26T14:15:19.523`)
|
||||
- [CVE-2024-11701](CVE-2024/CVE-2024-117xx/CVE-2024-11701.json) (`2024-11-26T14:15:19.617`)
|
||||
- [CVE-2024-11702](CVE-2024/CVE-2024-117xx/CVE-2024-11702.json) (`2024-11-26T14:15:19.710`)
|
||||
- [CVE-2024-11703](CVE-2024/CVE-2024-117xx/CVE-2024-11703.json) (`2024-11-26T14:15:19.810`)
|
||||
- [CVE-2024-11704](CVE-2024/CVE-2024-117xx/CVE-2024-11704.json) (`2024-11-26T14:15:19.910`)
|
||||
- [CVE-2024-11705](CVE-2024/CVE-2024-117xx/CVE-2024-11705.json) (`2024-11-26T14:15:19.997`)
|
||||
- [CVE-2024-11706](CVE-2024/CVE-2024-117xx/CVE-2024-11706.json) (`2024-11-26T14:15:20.080`)
|
||||
- [CVE-2024-11708](CVE-2024/CVE-2024-117xx/CVE-2024-11708.json) (`2024-11-26T14:15:20.173`)
|
||||
- [CVE-2024-53975](CVE-2024/CVE-2024-539xx/CVE-2024-53975.json) (`2024-11-26T14:15:21.497`)
|
||||
- [CVE-2024-53976](CVE-2024/CVE-2024-539xx/CVE-2024-53976.json) (`2024-11-26T14:15:21.587`)
|
||||
- [CVE-2024-7882](CVE-2024/CVE-2024-78xx/CVE-2024-7882.json) (`2024-11-22T09:15:13.090`)
|
||||
- [CVE-2024-8236](CVE-2024/CVE-2024-82xx/CVE-2024-8236.json) (`2024-11-26T14:15:22.217`)
|
||||
- [CVE-2024-9461](CVE-2024/CVE-2024-94xx/CVE-2024-9461.json) (`2024-11-26T14:15:22.533`)
|
||||
- [CVE-2024-9928](CVE-2024/CVE-2024-99xx/CVE-2024-9928.json) (`2024-11-26T14:15:22.777`)
|
||||
- [CVE-2024-9929](CVE-2024/CVE-2024-99xx/CVE-2024-9929.json) (`2024-11-26T14:15:22.940`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `25`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
- [CVE-2024-10382](CVE-2024/CVE-2024-103xx/CVE-2024-10382.json) (`2024-11-26T11:21:57.823`)
|
||||
- [CVE-2024-11513](CVE-2024/CVE-2024-115xx/CVE-2024-11513.json) (`2024-11-26T11:26:57.597`)
|
||||
- [CVE-2024-11519](CVE-2024/CVE-2024-115xx/CVE-2024-11519.json) (`2024-11-26T11:26:48.073`)
|
||||
- [CVE-2024-11528](CVE-2024/CVE-2024-115xx/CVE-2024-11528.json) (`2024-11-26T11:26:39.120`)
|
||||
- [CVE-2024-11559](CVE-2024/CVE-2024-115xx/CVE-2024-11559.json) (`2024-11-26T11:26:29.503`)
|
||||
- [CVE-2024-11560](CVE-2024/CVE-2024-115xx/CVE-2024-11560.json) (`2024-11-26T11:26:20.087`)
|
||||
- [CVE-2024-11561](CVE-2024/CVE-2024-115xx/CVE-2024-11561.json) (`2024-11-26T11:26:06.753`)
|
||||
- [CVE-2024-11562](CVE-2024/CVE-2024-115xx/CVE-2024-11562.json) (`2024-11-26T11:25:58.440`)
|
||||
- [CVE-2024-11563](CVE-2024/CVE-2024-115xx/CVE-2024-11563.json) (`2024-11-26T11:25:48.340`)
|
||||
- [CVE-2024-11564](CVE-2024/CVE-2024-115xx/CVE-2024-11564.json) (`2024-11-26T11:25:40.583`)
|
||||
- [CVE-2024-11566](CVE-2024/CVE-2024-115xx/CVE-2024-11566.json) (`2024-11-26T11:25:31.403`)
|
||||
- [CVE-2024-11567](CVE-2024/CVE-2024-115xx/CVE-2024-11567.json) (`2024-11-26T11:25:24.020`)
|
||||
- [CVE-2024-11568](CVE-2024/CVE-2024-115xx/CVE-2024-11568.json) (`2024-11-26T11:25:17.360`)
|
||||
- [CVE-2024-11569](CVE-2024/CVE-2024-115xx/CVE-2024-11569.json) (`2024-11-26T11:25:09.950`)
|
||||
- [CVE-2024-11570](CVE-2024/CVE-2024-115xx/CVE-2024-11570.json) (`2024-11-26T11:24:59.183`)
|
||||
- [CVE-2024-21798](CVE-2024/CVE-2024-217xx/CVE-2024-21798.json) (`2024-11-26T09:15:05.723`)
|
||||
- [CVE-2024-23910](CVE-2024/CVE-2024-239xx/CVE-2024-23910.json) (`2024-11-26T09:15:05.877`)
|
||||
- [CVE-2024-32151](CVE-2024/CVE-2024-321xx/CVE-2024-32151.json) (`2024-11-26T11:21:59.167`)
|
||||
- [CVE-2024-33605](CVE-2024/CVE-2024-336xx/CVE-2024-33605.json) (`2024-11-26T11:21:59.607`)
|
||||
- [CVE-2024-34021](CVE-2024/CVE-2024-340xx/CVE-2024-34021.json) (`2024-11-26T09:15:06.077`)
|
||||
- [CVE-2024-39607](CVE-2024/CVE-2024-396xx/CVE-2024-39607.json) (`2024-11-26T09:15:06.277`)
|
||||
- [CVE-2024-40883](CVE-2024/CVE-2024-408xx/CVE-2024-40883.json) (`2024-11-26T09:15:06.443`)
|
||||
- [CVE-2024-9504](CVE-2024/CVE-2024-95xx/CVE-2024-9504.json) (`2024-11-26T08:15:08.180`)
|
||||
- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-26T09:15:06.820`)
|
||||
- [CVE-2024-9750](CVE-2024/CVE-2024-97xx/CVE-2024-9750.json) (`2024-11-26T11:29:45.227`)
|
||||
- [CVE-2024-0039](CVE-2024/CVE-2024-00xx/CVE-2024-0039.json) (`2024-11-26T14:26:56.233`)
|
||||
- [CVE-2024-1936](CVE-2024/CVE-2024-19xx/CVE-2024-1936.json) (`2024-11-26T14:15:20.260`)
|
||||
- [CVE-2024-21459](CVE-2024/CVE-2024-214xx/CVE-2024-21459.json) (`2024-11-26T14:23:08.273`)
|
||||
- [CVE-2024-21481](CVE-2024/CVE-2024-214xx/CVE-2024-21481.json) (`2024-11-26T14:48:00.253`)
|
||||
- [CVE-2024-39576](CVE-2024/CVE-2024-395xx/CVE-2024-39576.json) (`2024-11-26T14:19:07.273`)
|
||||
- [CVE-2024-47248](CVE-2024/CVE-2024-472xx/CVE-2024-47248.json) (`2024-11-26T14:15:20.810`)
|
||||
- [CVE-2024-47249](CVE-2024/CVE-2024-472xx/CVE-2024-47249.json) (`2024-11-26T14:15:20.900`)
|
||||
- [CVE-2024-47250](CVE-2024/CVE-2024-472xx/CVE-2024-47250.json) (`2024-11-26T14:15:21.010`)
|
||||
- [CVE-2024-4766](CVE-2024/CVE-2024-47xx/CVE-2024-4766.json) (`2024-11-26T14:15:21.113`)
|
||||
- [CVE-2024-51569](CVE-2024/CVE-2024-515xx/CVE-2024-51569.json) (`2024-11-26T14:15:21.343`)
|
||||
- [CVE-2024-6602](CVE-2024/CVE-2024-66xx/CVE-2024-6602.json) (`2024-11-26T14:15:21.740`)
|
||||
- [CVE-2024-6606](CVE-2024/CVE-2024-66xx/CVE-2024-6606.json) (`2024-11-26T14:15:21.930`)
|
||||
- [CVE-2024-7242](CVE-2024/CVE-2024-72xx/CVE-2024-7242.json) (`2024-11-26T14:59:29.483`)
|
||||
- [CVE-2024-7245](CVE-2024/CVE-2024-72xx/CVE-2024-7245.json) (`2024-11-26T14:24:46.250`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
197
_state.csv
197
_state.csv
@ -83726,7 +83726,7 @@ CVE-2016-10390,0,0,6f3b0c0b31f612dae1874fecca2b294427d7a0edd51af9585cdc15f285af8
|
||||
CVE-2016-10391,0,0,cf0db0441520589d9830ec66d1f8602b3fdb8b5795189b45a9d1222e8038d1e8,2017-08-23T14:07:49.790000
|
||||
CVE-2016-10392,0,0,1eb3f7fd1f05192360b722d5071a479d0fc6fdd3591f82858c444904f5c83e81,2018-04-19T01:29:02.313000
|
||||
CVE-2016-10393,0,0,bb96af466053050b7d1b813b4e6d9e5de6880c014569480df9781f985927e388,2018-04-06T13:59:25.983000
|
||||
CVE-2016-10394,1,1,3821ddca775fa1c1c09c489f0efe826f3096d52478d8dc859421094b322fe91f,2024-11-26T09:15:04.180000
|
||||
CVE-2016-10394,0,0,3821ddca775fa1c1c09c489f0efe826f3096d52478d8dc859421094b322fe91f,2024-11-26T09:15:04.180000
|
||||
CVE-2016-10395,0,0,a8c44c8fe6fda80b26183403d95f07bac367e40dd5cb971ccd624cccc05ee0fd,2018-05-30T01:29:00.453000
|
||||
CVE-2016-10396,0,0,25c20b51f5459aec69bdf427777e265b6413e68f15eab2f528d440e5c3844fa3,2017-07-27T17:52:37.247000
|
||||
CVE-2016-10397,0,0,689f8a41c1bd3cd75879e1f213a7519dbfaa4a6a673d30c4b36f2e0fff915d19,2023-11-07T02:29:37.233000
|
||||
@ -83741,6 +83741,7 @@ CVE-2016-10404,0,0,97bdc7b4f33dff9a4642c30d3b4f56fd36946480fe8f7f09e8173b46c5c6f
|
||||
CVE-2016-10405,0,0,1ee3a43624c6af0b4f0ad1aeb441dd99a494dec242c1c7edcfa530b2dc15fe5a,2023-04-26T18:55:30.893000
|
||||
CVE-2016-10406,0,0,c3d63a08378a380e9b264c66c6d9399f0a8ee59b9542ad7bc870b0e87451dd99,2018-05-01T20:47:02.670000
|
||||
CVE-2016-10407,0,0,4fe7ac0b4b74be0dcffbdcefcfe91bd805cee9c13458c2bebc214508f80d0c51,2018-05-01T20:54:31.990000
|
||||
CVE-2016-10408,1,1,d77a55dd38179b2d32bdfd9bf38a92cbd94d0a8eac763e5262e71034d23b8e13,2024-11-26T14:15:17.053000
|
||||
CVE-2016-10409,0,0,50933c54e9a3ad80585066e235571d6c43e1492388a39bc979e45770b1d7d1fe,2018-05-01T17:08:28.183000
|
||||
CVE-2016-1041,0,0,b83438a5988748217c261845f3a2221eea2377f025e2b209f26f873f839ea402,2024-11-21T02:45:39.333000
|
||||
CVE-2016-10410,0,0,454a5aa0143dd377a4db77b38c74bc063f1fb438dfb49a87e11db5a53829badc,2018-05-02T12:58:34.490000
|
||||
@ -95042,7 +95043,7 @@ CVE-2017-11072,0,0,d576797e3380d95abed0e471214d955436610140b87c458cc6d20f5742c77
|
||||
CVE-2017-11073,0,0,8d8e546105b2a43715d9502ee81053ce4fe08cefc964ef7062ca398f1be488c6,2019-10-03T00:03:26.223000
|
||||
CVE-2017-11074,0,0,60aa50fe3554c9910ec37a80214c3ee0eb37a140ce7aa9306a86a8d84434b6df,2019-10-03T00:03:26.223000
|
||||
CVE-2017-11075,0,0,0a8cf8dfc290d471211a6b99cdf81a58236fc46e81967dc599960f8809fdef4a,2018-05-14T13:48:31.413000
|
||||
CVE-2017-11076,1,1,c996cc2b86fad4081d694b08468db9940048a87f5b871769dfb747c16d0af8af,2024-11-26T09:15:04.347000
|
||||
CVE-2017-11076,0,0,c996cc2b86fad4081d694b08468db9940048a87f5b871769dfb747c16d0af8af,2024-11-26T09:15:04.347000
|
||||
CVE-2017-11078,0,0,caec4d467de914ef3c8956300c7b8bc919041a161091033c26ebe9cc81adcc78,2018-12-21T14:25:00.503000
|
||||
CVE-2017-11079,0,0,38b8a25867b2d90af56fb0db9407739b78ff297998ecf3cc03421937ca9c1ea6,2018-01-26T12:43:39.030000
|
||||
CVE-2017-11080,0,0,b43574a690ec163b18148f5559642ff1228eb8f6e7a5370d95b14ba7f8076493,2018-01-26T12:35:19.050000
|
||||
@ -99235,7 +99236,7 @@ CVE-2017-15829,0,0,151e8df7b40df03412bc607712fa99d033228a0ebd544d2f87c7ec896bcbd
|
||||
CVE-2017-1583,0,0,a771c35e16c17984e674e1f9ab6bc350c287657e159cc16fd4fe56e09e36b6c3,2017-11-13T17:41:40.827000
|
||||
CVE-2017-15830,0,0,2d4d3a06cabc2dda3de1fa7be162c0dc4e2ee4956614fd57ff52ecf780017aef,2018-04-05T14:36:16.770000
|
||||
CVE-2017-15831,0,0,551bb4c07198e588af063fb065cd099808708b98fdd4fc83d48c20f0d63d2754,2018-04-04T17:47:22.837000
|
||||
CVE-2017-15832,1,1,531ef8434daecb5e454b6ce35b67de4797786047df94742339f0abc9fc976834,2024-11-26T09:15:04.493000
|
||||
CVE-2017-15832,0,0,531ef8434daecb5e454b6ce35b67de4797786047df94742339f0abc9fc976834,2024-11-26T09:15:04.493000
|
||||
CVE-2017-15833,0,0,490b1b43e935f6459b80cc367e1e64a27e5734732db016770a7e3e6aa394435f,2018-04-04T17:47:52.790000
|
||||
CVE-2017-15834,0,0,2e2ac6343c90d7bed2fe7b5b048b2f49da876dc0332d3dc22e1fd073c08d17c3,2018-04-04T17:39:10.500000
|
||||
CVE-2017-15835,0,0,486ff735e891da548aff5ca8c2cb43ff8b74d38ebe25d5c364b8252cc4eddea0,2019-10-03T00:03:26.223000
|
||||
@ -101052,7 +101053,7 @@ CVE-2017-17767,0,0,fe747a88fb278e53600d7f7b6c1061d3dbbb5c0c82e3db131348e8089046f
|
||||
CVE-2017-17769,0,0,c713a7243061c7b9c5235a500aead6d53a542327491ab6b0a7b98151bbf264b8,2018-04-23T13:05:41.043000
|
||||
CVE-2017-17770,0,0,1c826cf96b81d01ddd7553666cd05579c70dc9b46946e6169749d10413822b5d,2018-05-08T15:19:48.607000
|
||||
CVE-2017-17771,0,0,b7c299f6087bb36228e469503cd8592ee48f2ab4ffe01cc1a6c599164bac25f6,2019-10-03T00:03:26.223000
|
||||
CVE-2017-17772,1,1,0a1f08b6b38268d55850fe0858a54af77bf11c0502c9b74315e515a4225a412f,2024-11-26T09:15:04.640000
|
||||
CVE-2017-17772,0,0,0a1f08b6b38268d55850fe0858a54af77bf11c0502c9b74315e515a4225a412f,2024-11-26T09:15:04.640000
|
||||
CVE-2017-17773,0,0,09cf6f22fec8c2c2b7ce6f226aa0fe4ed1f80319739dc45bd036e25f88edac76,2019-10-03T00:03:26.223000
|
||||
CVE-2017-17774,0,0,d0d6cd2df81365b8d6889177efe94af1ae81151ef3a88f34c8c2b966406c604c,2018-01-04T20:50:42.550000
|
||||
CVE-2017-17775,0,0,c0e4e7401e4d9f91a788ae42fb7bb5432d56090bf65ef6d82e4a5711f084496a,2018-01-05T20:23:40.367000
|
||||
@ -101412,7 +101413,7 @@ CVE-2017-18145,0,0,9f443d89b5723ab2503f35463d5fb232e2c913d93c9b80c46b974c24eda35
|
||||
CVE-2017-18146,0,0,7703600328360be910fc85dcc5aa5fdd2b3f01dbdb959537e3bbb8f11573b470,2018-05-14T13:04:48.620000
|
||||
CVE-2017-18147,0,0,b53da078c0d8dff21476e02ce4fae72eee206bc79ce8eb0bfe3e180e6f9ef4c3,2018-04-25T18:25:04.507000
|
||||
CVE-2017-1815,0,0,50063e8159f88527c3b48879d4ee9cadd5c4698e088f3b5893a58402c9338f15,2023-11-07T02:42:25.620000
|
||||
CVE-2017-18153,1,1,3323945a40bb5ad0981012f021d9e907a1b2f49ed9eec9d8be53dbd361dc8e72,2024-11-26T09:15:04.783000
|
||||
CVE-2017-18153,0,0,3323945a40bb5ad0981012f021d9e907a1b2f49ed9eec9d8be53dbd361dc8e72,2024-11-26T09:15:04.783000
|
||||
CVE-2017-18154,0,0,62a84ffe0a92fc617e190e43c37e8d149901427bb9ad8d45e3cbc51af4c341ea,2019-10-03T00:03:26.223000
|
||||
CVE-2017-18155,0,0,3d640350b0f59924a7ba3e8f51ebe11e91da9ed0ebc3730e1f2b646d36c02257,2018-09-10T16:06:04.277000
|
||||
CVE-2017-18156,0,0,aab0202a49436d8e2d1f7f68cb72441280657d137bb819a313890a7b66d99542,2019-05-07T17:57:53.903000
|
||||
@ -101569,6 +101570,8 @@ CVE-2017-18302,0,0,4afd78bae2eb1a4bb36f2cd282fc9117a2e0c938942968c31fc8ba1db8082
|
||||
CVE-2017-18303,0,0,a32f3b0805ff25c1a616a15c1310ba28d12f6a9a6c65f262a57fd91b9d3532df,2018-12-10T14:53:03.760000
|
||||
CVE-2017-18304,0,0,b697bb3af2a383cea0e6cd9f0457b493d896c9f906b3ee71e7432f32dfe82e50,2018-12-10T14:52:02.377000
|
||||
CVE-2017-18305,0,0,b96241fde916ea0708d8933c54768d60fe5e694f295ef07b7f956a42111099c5,2019-10-03T00:03:26.223000
|
||||
CVE-2017-18306,1,1,458c4c460cf559b8e5d215a836e7d55bb512bc38e1dc4008905a3151df8313a3,2024-11-26T14:15:17.430000
|
||||
CVE-2017-18307,1,1,45f768cee46cc329d3b14296bcc85c1e940ea8cdb9c732d212f0f81134f1228f,2024-11-26T14:15:17.573000
|
||||
CVE-2017-18308,0,0,066ada5f33acd6ef50e84fb81d0fdc7fd66ddea1f220b3095384953f9748c839,2019-10-03T00:03:26.223000
|
||||
CVE-2017-18309,0,0,8933e507342701dfcbebb1d6c25b5d3eebb675f3a5530ad0b08ea3c5536fbb86,2018-12-11T21:09:13.697000
|
||||
CVE-2017-1831,0,0,b23d481a92715747e56d3a2b4521c53c46925504d529872ce48f780473a083d6,2023-11-07T02:42:29.293000
|
||||
@ -112826,6 +112829,7 @@ CVE-2018-11806,0,0,c55a1be94f108fc4e8d862b5e4e55cb794148321989cb6e33dfdabc6c526b
|
||||
CVE-2018-11808,0,0,85ed78c36e96acda41073e2e351b00dfe98ea3b96455e6203bb161e9ef5ff181,2024-11-21T03:44:04.587000
|
||||
CVE-2018-1181,0,0,3e98bd65bca0888ca0d91ce1a2a6e808c0266ef9d976889b9d4a13cedd1849bd,2023-11-07T02:55:51.020000
|
||||
CVE-2018-11813,0,0,aebbd28f765bc30550e57c3acd9a41b677fe97d99c2e71841be10f6aa0810158,2024-11-21T03:44:04.737000
|
||||
CVE-2018-11816,1,1,b22ec5bc21246804e56f080b6ca31f585f4680474f759ff0671e7ea61e15417e,2024-11-26T14:15:17.723000
|
||||
CVE-2018-11818,0,0,2f8c2afd8229da794180c3a701f262974850bac19d6edce530b4a180e20d7626,2018-11-09T16:24:12.043000
|
||||
CVE-2018-11819,0,0,b1662fb757901054da2774ce7e9253f7f840137e3a26d8af311dedcd9125dc87,2019-06-17T13:53:09.477000
|
||||
CVE-2018-1182,0,0,5ed792ed93bff046e03cb1af3ea2bdddbde3411b2c8e90e3794f71f9cd6d932e,2024-11-21T03:59:21.017000
|
||||
@ -112938,7 +112942,7 @@ CVE-2018-11918,0,0,f3c717238382735c8cd955c71b010c0c5d826bb1bf62976866e95bd9e4b9c
|
||||
CVE-2018-11919,0,0,5e8ca1b292f4611236597329e3807d4210a2f37bd3bbf3ea3ab924eb015e1fa8,2020-08-24T17:37:01.140000
|
||||
CVE-2018-1192,0,0,bc4c8f9a64eb7b7fa6750d871334de7a3b728e1e50ff590f82ac738859c653b5,2024-11-21T03:59:22.137000
|
||||
CVE-2018-11921,0,0,754681a5d57b02096bb607d7ecdeb288dfbf2ad48dc1b89d8faec71434da3a43,2020-08-24T17:37:01.140000
|
||||
CVE-2018-11922,1,1,31df8ccf36fef0d293917228c2f826bac5b97c0a112a2e453489dc007c347abe,2024-11-26T09:15:04.927000
|
||||
CVE-2018-11922,0,0,31df8ccf36fef0d293917228c2f826bac5b97c0a112a2e453489dc007c347abe,2024-11-26T09:15:04.927000
|
||||
CVE-2018-11923,0,0,67b265125c2c560f515c3893e61a9875e88910e1a56d1d40ef237743c0c4a6a8,2019-05-28T13:34:44.127000
|
||||
CVE-2018-11924,0,0,1fb2d0b2820f12563d2dd74a93be902a77b3e9a511434a82a88e1bbdd0de16e1,2019-05-28T13:19:46.107000
|
||||
CVE-2018-11925,0,0,9ca981a4457a981f275b8c35f13f1656bf227575a02727d0a0596fbaa318a203,2019-05-28T19:02:24.120000
|
||||
@ -112971,7 +112975,7 @@ CVE-2018-11949,0,0,aee24fc2e21cac0f2f71e2e7357d384c3280d5b61f3cac7bc483bfcd9f529
|
||||
CVE-2018-1195,0,0,4ba9bcae351b4d91cc297c61f4f54f90f80aa8a4b299544235260b506a43a141,2024-11-21T03:59:22.380000
|
||||
CVE-2018-11950,0,0,4ef3debe1ee55d7e237d1f1c67e1674945c0e11f6f439c4f56e7af4e89577632,2018-12-07T20:43:36.947000
|
||||
CVE-2018-11951,0,0,b389e927990e41be80e78ddf35d7cd0a8a87638f543d2f57ae8460e965cd7738,2019-10-03T00:03:26.223000
|
||||
CVE-2018-11952,1,1,1d4e0b6b8c379e686f187d72430286895203a10fd655e31451bcc50532951a7a,2024-11-26T09:15:05.073000
|
||||
CVE-2018-11952,0,0,1d4e0b6b8c379e686f187d72430286895203a10fd655e31451bcc50532951a7a,2024-11-26T09:15:05.073000
|
||||
CVE-2018-11953,0,0,ce83b2542761a9503d113447d65380c03a4a9c91f102b7453f72099404ca73f4,2019-05-29T19:20:29.133000
|
||||
CVE-2018-11954,0,0,d6b8a9241ea3bf8ed4a1977ddef6caf806ceee4b7abd93c014ccec4a47b96791,2023-11-07T02:51:55.057000
|
||||
CVE-2018-11955,0,0,5fa610cec97288e25584418b324062c1f0d2077cdcedec594c8aabc203d4975c,2019-06-18T14:54:10.687000
|
||||
@ -124229,6 +124233,7 @@ CVE-2018-5848,0,0,0b050c70e73724e87625d04d8af928476a493d4be5fac42f8f7767321cb9bb
|
||||
CVE-2018-5849,0,0,f636994c7a41228b73ece5a09e9dbe5e9d5da63642679aa2b1233a8b05091ff4,2024-11-21T04:09:32.550000
|
||||
CVE-2018-5850,0,0,61f5fac040e1e1b52f2b7070402a4558fbafce2d4db60f7f2449381164e967c6,2024-11-21T04:09:32.670000
|
||||
CVE-2018-5851,0,0,1aadf8e290fe017c8db89516afa6a9ebbf592062cb4b9a9db32de4eb5bc1584b,2024-11-21T04:09:32.787000
|
||||
CVE-2018-5852,1,1,1f2756622f8623dd1fd22a13783e1829c57001d8be70d8cd091a407b9320686f,2024-11-26T14:15:17.970000
|
||||
CVE-2018-5853,0,0,37c6bd6758eb704a758bdad40f592bf5ec895dc21b371100727df91d2dd3ccdb,2024-11-21T04:09:32.917000
|
||||
CVE-2018-5854,0,0,816cb2ab0018f9139406eb6efdb5d0187234b52e3dc758cbc9ed8abb883c4b26,2024-11-21T04:09:33.047000
|
||||
CVE-2018-5855,0,0,18bb89dec939f28daee2fe1bbc59b14918ff76dd1a4b51d99960918ea21d908f,2024-11-21T04:09:33.167000
|
||||
@ -213104,7 +213109,7 @@ CVE-2023-0159,0,0,0f6fd55c120318dcef07ff789a61b56634708ba05cdc2c5c90bc468904524a
|
||||
CVE-2023-0160,0,0,09a7027c859003cd69a1385cc1382972c3bab997f733f848d51a31fefb6fb5af,2023-11-07T03:59:46.343000
|
||||
CVE-2023-0161,0,0,2d565afc2a392d75d863e5fdf784db6696b2ebade8f447f4c56c766437755f79,2023-11-07T03:59:46.593000
|
||||
CVE-2023-0162,0,0,433d2d12790885c810d4fa03f75cc93897d0ad22856762b3207cc99a781813da,2023-11-07T03:59:47.037000
|
||||
CVE-2023-0163,1,1,b688a39253b21415cf10bcd0ace1238621c71167e861b5bd8f2af5b9b0a92f33,2024-11-26T12:15:17.390000
|
||||
CVE-2023-0163,0,0,b688a39253b21415cf10bcd0ace1238621c71167e861b5bd8f2af5b9b0a92f33,2024-11-26T12:15:17.390000
|
||||
CVE-2023-0164,0,0,56b714ab48298f96034c3fd165df9da114ff92034fa2e1a03fdc9d853978e2ec,2023-01-28T03:37:57.693000
|
||||
CVE-2023-0165,0,0,441c64ff3d96cd77f0a64b6021d8520baa90e0a13398043debff7990bd94d140,2023-11-07T03:59:47.380000
|
||||
CVE-2023-0166,0,0,a627a63e43014228e0118c8847152cec6a6ad0f5f2d9646ccac489fb22695346,2023-11-07T03:59:47.623000
|
||||
@ -214398,7 +214403,7 @@ CVE-2023-1515,0,0,a3e2778cac4d2dfc37f0f537a9169b2077aac94d94eaac95fafc3d93a2755a
|
||||
CVE-2023-1516,0,0,b2ab000015c6f7b122df774c50027a5e44cc1e7add30403d2f12052fae3f0b2c,2023-11-07T04:04:01.627000
|
||||
CVE-2023-1517,0,0,3ab00ddb7ff4e0314ecce4142c2d5a1baff3f3da000ef6e3a6d8b5ba4e309821,2023-03-23T18:37:42.770000
|
||||
CVE-2023-1518,0,0,1eb2c86860bee0ad0f9d4fa488db9d2692f6dc9f81f91a48eca9442de38c9413,2023-11-07T04:04:01.880000
|
||||
CVE-2023-1521,1,1,5ef406ee0ead3d762685c3047a264b7aa2187e63482fb5e8d8f9b5e41ae6f374,2024-11-26T12:15:18.203000
|
||||
CVE-2023-1521,0,0,5ef406ee0ead3d762685c3047a264b7aa2187e63482fb5e8d8f9b5e41ae6f374,2024-11-26T12:15:18.203000
|
||||
CVE-2023-1522,0,0,d61a31b789772fcb1a2b790ef6bab8476e3c0bb2da2994fd477146bb42423e1f,2023-11-07T04:04:02.113000
|
||||
CVE-2023-1523,0,0,2953a5172ee5c60a8f92fd0fe9fe018483e0a876d0d679f04fff96dc00b7329a,2023-09-08T17:17:40.033000
|
||||
CVE-2023-1524,0,0,6eb9362bbf420237a5ad649bfd30799147a8972e5581c31e83bffa4b851bf44b,2023-11-07T04:04:02.450000
|
||||
@ -216080,7 +216085,7 @@ CVE-2023-21416,0,0,6dffe28851c91ee18ceb35579fd29bf8f9a56312fe83491e09cbc3b40f8af
|
||||
CVE-2023-21417,0,0,7d15ce5e3918d9a1b0fa653399fe5450bd6690398fe838839d69e00df17bc67a,2024-11-08T09:15:06.277000
|
||||
CVE-2023-21418,0,0,cc5acdfd8b96726f57b1246a5c5711431cf7fe80fee9f7109425e08575cd3d20,2024-11-08T09:15:06.453000
|
||||
CVE-2023-21419,0,0,45ff905fd2374d2820c27347193893ca16be1c6d6d9cda5e8f57ac5821898928,2023-11-07T04:06:35.657000
|
||||
CVE-2023-2142,1,1,1d48eaf915395dbd32516659db7c49e6d178aaca35f613a3e888c90805a8cb99,2024-11-26T12:15:18.307000
|
||||
CVE-2023-2142,0,0,1d48eaf915395dbd32516659db7c49e6d178aaca35f613a3e888c90805a8cb99,2024-11-26T12:15:18.307000
|
||||
CVE-2023-21420,0,0,d82fcd1e46c8dac8582cb3dd087d4ad4d83f57df0f5c8e21a51e9da90cd5441d,2023-02-17T20:21:02.333000
|
||||
CVE-2023-21421,0,0,733d09550bbe5bab0dce2921db71c5a7f0b9d54c2679b9cb2f268974bca05ad5,2023-02-21T16:04:38.190000
|
||||
CVE-2023-21422,0,0,2a2fed08bbd0ca52dd22841f89b331fa629b94088c7bced8d629c703c6c7e766,2023-02-21T16:13:30.213000
|
||||
@ -241770,7 +241775,7 @@ CVE-2024-0035,0,0,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8
|
||||
CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000
|
||||
CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000
|
||||
CVE-2024-0038,0,0,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000
|
||||
CVE-2024-0039,0,0,68d4a281bb1d84f85cd5be142d8735596562f1396cf3f56249110327634e46fe,2024-03-12T12:40:13.500000
|
||||
CVE-2024-0039,0,1,bf163f6fc7f56cae12262037eeb80c9572f8668c8d542ca891d986c2ffbca152,2024-11-26T14:26:56.233000
|
||||
CVE-2024-0040,0,0,cb768c0c56422d8be59b8ead41b2abde5abcab3c6641c5456375c74ed8738c47,2024-08-01T13:45:55.990000
|
||||
CVE-2024-0041,0,0,f01015c1847295eb8ef5594ac607bfd052422fd5f2a025c578fd946cd87d4057,2024-08-26T17:35:02.990000
|
||||
CVE-2024-0042,0,0,34dd3c01d1963f1fea072b87cd9587b8d1a38074bff497ca57638675955e85e5,2024-07-08T14:16:55.973000
|
||||
@ -242863,7 +242868,7 @@ CVE-2024-10299,0,0,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9c
|
||||
CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884fe0,2024-05-17T02:35:11.737000
|
||||
CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000
|
||||
CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000
|
||||
CVE-2024-10308,1,1,1c7ba9623e559dbc6bacccc3d3a65f8f896b7376d8d3f0e87945d9a2046fce95,2024-11-26T11:15:16.920000
|
||||
CVE-2024-10308,0,0,1c7ba9623e559dbc6bacccc3d3a65f8f896b7376d8d3f0e87945d9a2046fce95,2024-11-26T11:15:16.920000
|
||||
CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000
|
||||
CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c653,2024-11-04T13:06:20.190000
|
||||
CVE-2024-10311,0,0,24dfc7a1b32a617d7196478f8525b6de312e560d7cc7f75f0de80b3df4be5a3d,2024-11-19T17:03:19.177000
|
||||
@ -242920,7 +242925,7 @@ CVE-2024-10379,0,0,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c25
|
||||
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000
|
||||
CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000
|
||||
CVE-2024-10382,0,1,8fbf312ba5f2053ee66d5556349e9a7f273fe46bc38a97bdb7bd108069092c75,2024-11-26T11:21:57.823000
|
||||
CVE-2024-10382,0,0,8fbf312ba5f2053ee66d5556349e9a7f273fe46bc38a97bdb7bd108069092c75,2024-11-26T11:21:57.823000
|
||||
CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000
|
||||
CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000
|
||||
CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000
|
||||
@ -243058,7 +243063,7 @@ CVE-2024-10571,0,0,764d0722def38a147b3ba290b54cc9e9aebe855b12c99828d9c801c2e02fe
|
||||
CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10575,0,0,924d12914fd797ca7b437680e7624f960ff1fb4e9a84f0339e46e831bcf19838,2024-11-19T17:28:06.750000
|
||||
CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10579,1,1,33dc3315e2727505fbb01f5c18514afec0197a3f447e5606ebb8c22a898a16da,2024-11-26T11:21:58.330000
|
||||
CVE-2024-10579,0,0,33dc3315e2727505fbb01f5c18514afec0197a3f447e5606ebb8c22a898a16da,2024-11-26T11:21:58.330000
|
||||
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10582,0,0,a90871a091364721b4ef068e0b15eb200c0c34a34aad3c7e192b4659b6353b65,2024-11-19T21:17:53.003000
|
||||
CVE-2024-10586,0,0,f1f769b86eb6d000daef591c5f367193d87a3d50622221457cbf9ad14bf94bab,2024-11-12T13:56:54.483000
|
||||
@ -243349,11 +243354,11 @@ CVE-2024-1102,0,0,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685
|
||||
CVE-2024-11020,0,0,d8da56d08b04c1b6283579c38861d54ff29b7503469ff5458753549fabf50559,2024-11-18T18:59:39.293000
|
||||
CVE-2024-11021,0,0,5330750d11b3fde718ec5c3eb7f0a1e1a342a8ecd281acc88c611cccbde0d765,2024-11-18T19:00:03.487000
|
||||
CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc056df,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11024,1,1,fdd235bc026a01ae98bcf6f4aacaacc2569951a9e4c3435d41b8fce72f321275,2024-11-26T11:21:58.660000
|
||||
CVE-2024-11024,0,0,fdd235bc026a01ae98bcf6f4aacaacc2569951a9e4c3435d41b8fce72f321275,2024-11-26T11:21:58.660000
|
||||
CVE-2024-11026,0,0,3376b35079ed775d06158f58b13b5386f7c428e65da575e6798ec45cd45989af,2024-11-23T01:44:05.947000
|
||||
CVE-2024-11028,0,0,048d97dceb7a67eae16e2a68b764bd9aa80522dc4afab479a09ba11fca5d2735,2024-11-19T15:38:19.023000
|
||||
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
|
||||
CVE-2024-11032,1,1,f0f5c6f89e4712062f039dde74a8756fbcbbd0be2fb036de6401a13f0cbc4ead,2024-11-26T10:15:04.343000
|
||||
CVE-2024-11032,0,0,f0f5c6f89e4712062f039dde74a8756fbcbbd0be2fb036de6401a13f0cbc4ead,2024-11-26T10:15:04.343000
|
||||
CVE-2024-11034,0,0,bf856e233dbfcbd1ff53b9b96d02c90bec97a3c82fc82e11b2801165c9f4d5ec,2024-11-23T12:15:16.090000
|
||||
CVE-2024-11036,0,0,1f324e5f86753b321318055a417e62bc9dbab837eb5c2b95e07e45dd83cbed40,2024-11-19T21:57:32.967000
|
||||
CVE-2024-11038,0,0,d945b854a01b116e5f2f3c8f07123b615dcd9afcf5e76e2549c83505dba3cd2b,2024-11-19T21:57:32.967000
|
||||
@ -243395,7 +243400,7 @@ CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00
|
||||
CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
||||
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
||||
CVE-2024-11091,1,1,14ea06395ddfe9565a0580b2185bbca5b56a2e2b4e21078d4d4ad1537aae3b0f,2024-11-26T09:15:05.263000
|
||||
CVE-2024-11091,0,0,14ea06395ddfe9565a0580b2185bbca5b56a2e2b4e21078d4d4ad1537aae3b0f,2024-11-26T09:15:05.263000
|
||||
CVE-2024-11092,0,0,e9f7e804f043cae81931fc37547f9a5b6c886cc0c38e1290ab1e0b94e6cf7e70,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11094,0,0,96d31b5c75c99258f7a77fadd259d6f2363d98a6ce11e212a75b9e3f71f6de55,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11096,0,0,3bbbaf6b3eada39b8e29f43ae73a3d505ec85d5f63373aa4b93022fb04882edd,2024-11-23T01:21:10.177000
|
||||
@ -243416,7 +243421,7 @@ CVE-2024-11115,0,0,6752a3f15fe7742272035ac5069774108f37f03dae8259d5e310243c06e07
|
||||
CVE-2024-11116,0,0,50b6a7b0baae7d93d967770820ad4acb1265e0c8d7e355f7414e720fb7141658,2024-11-13T17:01:16.850000
|
||||
CVE-2024-11117,0,0,44ab0c5f984ce9aed4e52f00adac2e7b146a348c1dbadd3cdaa1ba5594ee10da,2024-11-13T17:01:16.850000
|
||||
CVE-2024-11118,0,0,3cb9dc4e6bf92f2b2e528e62858236fed3c3ca228a01d299464afefceafe42e1,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11119,1,1,1258694a897799a95e4b0f41beafa605b721c49bcdb5e7db3c60c482ab25b1c0,2024-11-26T09:15:05.413000
|
||||
CVE-2024-11119,0,0,1258694a897799a95e4b0f41beafa605b721c49bcdb5e7db3c60c482ab25b1c0,2024-11-26T09:15:05.413000
|
||||
CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000
|
||||
CVE-2024-11120,0,0,368b83ae5902e34b0c550f99a9e3cbb6abf3210b2f6a699d61899ee63a5aa2ff,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11121,0,0,f1b88a6c44030f80112660a393b156d9c1cd2da4af92bd0d72b008c5bbe51631,2024-11-12T16:15:20.770000
|
||||
@ -243447,7 +243452,7 @@ CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62f
|
||||
CVE-2024-11182,0,0,550276b9543adbab2608aeeaeb156b493c7ea7fcd794d8e2722b73a2104ac612,2024-11-19T19:08:15.657000
|
||||
CVE-2024-11188,0,0,3d2e4d2dec7cd3cc94060cc2808eb6bec0162c5aa4b5fe4b6246065e84f2f8e8,2024-11-23T06:15:17.570000
|
||||
CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000
|
||||
CVE-2024-11192,1,1,6459d53f4b13b67cafe19770c37c9f2208043c5b0b1fa605bd9e7fc206926de6,2024-11-26T09:15:05.563000
|
||||
CVE-2024-11192,0,0,6459d53f4b13b67cafe19770c37c9f2208043c5b0b1fa605bd9e7fc206926de6,2024-11-26T09:15:05.563000
|
||||
CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000
|
||||
CVE-2024-11194,0,0,d625404280ea42887edd360bc55535d261c8f56f28a5468a5e1bf538505a39ae,2024-11-19T21:57:32.967000
|
||||
CVE-2024-11195,0,0,59a97c370771f27b33e51ae1039dc49a821a1858990404541e8309b975c38fde,2024-11-19T21:57:32.967000
|
||||
@ -243586,13 +243591,13 @@ CVE-2024-1151,0,0,7121c04433e319cadf01da487c5bbfa2040f1a20de12a9b96c3c123bdd1e59
|
||||
CVE-2024-11510,0,0,ffe33a1c531077f4fae7c4b7c7c7d55f315a1583911fdad78c236d3caa10f7c3,2024-11-22T21:15:09.183000
|
||||
CVE-2024-11511,0,0,b16a1b757781bfacc24a799d35e8cae90f6541006f0982074557f3f4a6bef1fe,2024-11-22T21:15:09.363000
|
||||
CVE-2024-11512,0,0,1e98f48385ff14fb1bd53853b7f8286dcb742a90b7274d179b99b48a4b3343a3,2024-11-22T21:15:09.477000
|
||||
CVE-2024-11513,0,1,7df6af85f448291704d0103673a4b30ad0c962e24565f3af77a24ba73dc287ac,2024-11-26T11:26:57.597000
|
||||
CVE-2024-11513,0,0,7df6af85f448291704d0103673a4b30ad0c962e24565f3af77a24ba73dc287ac,2024-11-26T11:26:57.597000
|
||||
CVE-2024-11514,0,0,40e43052b3444c860eef3e3b558fa76c07292f5deab8bca3b61b112665b889c2,2024-11-25T18:57:28.103000
|
||||
CVE-2024-11515,0,0,9f620e91147a51ac8d0e9648505744c40db486a9d2b3ba2b9bfaa8ff1b3b9008,2024-11-25T18:57:23.373000
|
||||
CVE-2024-11516,0,0,2d45e772cd143aa841e0911c6324f232dd5316d927191938a3093a22684d4be9,2024-11-25T18:57:19.670000
|
||||
CVE-2024-11517,0,0,735a961be52a6bea8052661fc20cfe55e152eebc7eaea944afa707d4bb584ef4,2024-11-25T18:57:16.330000
|
||||
CVE-2024-11518,0,0,ce3c2fd500536f595e5a69ed3981df1ad2b903322ac7cb638c260323c1dabdd3,2024-11-25T18:57:12.937000
|
||||
CVE-2024-11519,0,1,123705d60e285bad0cde58932be3954d1ee8e9694b140e072bdf1678a7f66904,2024-11-26T11:26:48.073000
|
||||
CVE-2024-11519,0,0,123705d60e285bad0cde58932be3954d1ee8e9694b140e072bdf1678a7f66904,2024-11-26T11:26:48.073000
|
||||
CVE-2024-11520,0,0,6d11a52c3d48b510631895d705fcd9ee72fad54df07608e0937611ba46065f07,2024-11-25T18:57:06.950000
|
||||
CVE-2024-11521,0,0,6c664e429868c249646ae9d3731c6ea172b3102a76d78ecfa41bcdbe4fce5da4,2024-11-25T18:57:04.637000
|
||||
CVE-2024-11522,0,0,edcd0c12a353633564f417eece27cdc54a32166837025ac7b77207ce9f47ab3a,2024-11-25T18:57:02.447000
|
||||
@ -243601,7 +243606,7 @@ CVE-2024-11524,0,0,3ec8cd85143a979fd87471e142d51dcead7e9667445926dce6fbd9a1c1a02
|
||||
CVE-2024-11525,0,0,8a20d7861b20e92c72d3eca44e792f6d0eecbcdde3254c01f82cb6ffb8efc528,2024-11-25T18:56:51.587000
|
||||
CVE-2024-11526,0,0,d1e3f1b5346a87281bbb859058320f1f045d2812f873212734eb58c59430f297,2024-11-25T18:56:47.030000
|
||||
CVE-2024-11527,0,0,9e1f6adf96843fbe52b8df2904446d5d05bb5a1831908975bff609731e03d906,2024-11-25T18:56:40.680000
|
||||
CVE-2024-11528,0,1,cb9fdc09c7cf29c47cee5df393d583d4c800eb2237b75415a1c92b2e4ea84d79,2024-11-26T11:26:39.120000
|
||||
CVE-2024-11528,0,0,cb9fdc09c7cf29c47cee5df393d583d4c800eb2237b75415a1c92b2e4ea84d79,2024-11-26T11:26:39.120000
|
||||
CVE-2024-11529,0,0,a738a75fb061e2285caff81029ff864f37dfb87ffcabbb87d2331f5908c6404f,2024-11-25T18:56:38.437000
|
||||
CVE-2024-1153,0,0,ef044a07a9d08d9e4b985a54be5b7192d28514cd606cdbcd1ece01d4ab3f4a43,2024-09-16T17:39:45.023000
|
||||
CVE-2024-11530,0,0,a9bbadbb9905eee2c30c3d912b1bfa6a78d76a36143757bc18ff2aa9c811097b,2024-11-25T18:56:27.503000
|
||||
@ -243634,20 +243639,20 @@ CVE-2024-11555,0,0,3cf2c7177d53f6b2ab1e7f3fbab64983d135fc5614d8005be772569f43b88
|
||||
CVE-2024-11556,0,0,fde18f12404fc5a51e49bd804749a276e1e26e019cb0c2a05b0ffed0ec803c76,2024-11-25T18:16:55.420000
|
||||
CVE-2024-11557,0,0,b7bfad0bc64d77fd58f867e0333ee0e631511f684fb4096ba69ab953fe9c4137,2024-11-25T18:51:46.153000
|
||||
CVE-2024-11558,0,0,58bd811cda6b3caaf42f933c2a1ae42cb5d2c1031ecf91a43b8341c0fb620445,2024-11-25T18:52:29.450000
|
||||
CVE-2024-11559,0,1,e529dcccb0ae0799496474d0acdaa98916597aa0107650763e673b22ee6a2c79,2024-11-26T11:26:29.503000
|
||||
CVE-2024-11559,0,0,e529dcccb0ae0799496474d0acdaa98916597aa0107650763e673b22ee6a2c79,2024-11-26T11:26:29.503000
|
||||
CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000
|
||||
CVE-2024-11560,0,1,a49b2a936c9c310c80ede34c6c04fa46903e62d2d73b2402a9483b8af3c25845,2024-11-26T11:26:20.087000
|
||||
CVE-2024-11561,0,1,c236bd3390f482bdff007563af3a716e7ff3345cb49d36ad69d8a092a9c61425,2024-11-26T11:26:06.753000
|
||||
CVE-2024-11562,0,1,ca9386d73bcc12b00621cc76658eaeddb57134c5b61bc337b7d441352a05da46,2024-11-26T11:25:58.440000
|
||||
CVE-2024-11563,0,1,6422c5245c5646913587c55cdceedc2d82f0f325b94084a48fd21a46e95d703d,2024-11-26T11:25:48.340000
|
||||
CVE-2024-11564,0,1,1dd59480c88675954e5b5437c43e4808ea96b711fa90a1d9a8c496f89413f849,2024-11-26T11:25:40.583000
|
||||
CVE-2024-11560,0,0,a49b2a936c9c310c80ede34c6c04fa46903e62d2d73b2402a9483b8af3c25845,2024-11-26T11:26:20.087000
|
||||
CVE-2024-11561,0,0,c236bd3390f482bdff007563af3a716e7ff3345cb49d36ad69d8a092a9c61425,2024-11-26T11:26:06.753000
|
||||
CVE-2024-11562,0,0,ca9386d73bcc12b00621cc76658eaeddb57134c5b61bc337b7d441352a05da46,2024-11-26T11:25:58.440000
|
||||
CVE-2024-11563,0,0,6422c5245c5646913587c55cdceedc2d82f0f325b94084a48fd21a46e95d703d,2024-11-26T11:25:48.340000
|
||||
CVE-2024-11564,0,0,1dd59480c88675954e5b5437c43e4808ea96b711fa90a1d9a8c496f89413f849,2024-11-26T11:25:40.583000
|
||||
CVE-2024-11565,0,0,3fc206fd3a94927ea63b05e034284ac0e7d80b5c9f97fd16a6e175f5fb4a1a8c,2024-11-25T18:50:52.400000
|
||||
CVE-2024-11566,0,1,6855a5b38934af647ad1b95ae30cce85bb1a8b5241dd922e7673f94873742702,2024-11-26T11:25:31.403000
|
||||
CVE-2024-11567,0,1,94f7535c969fe66e40b2ff0b48f7cdae6e32ab604506acec8fa3a89ae31b2317,2024-11-26T11:25:24.020000
|
||||
CVE-2024-11568,0,1,c34bf6d481f0b7933b87f296c067d5fc3875166429faacb8cda7c6ed25115ea7,2024-11-26T11:25:17.360000
|
||||
CVE-2024-11569,0,1,b77dd18aef7d393f6f1b4514103e693e22037ccddd96937d06875884da8c76ea,2024-11-26T11:25:09.950000
|
||||
CVE-2024-11566,0,0,6855a5b38934af647ad1b95ae30cce85bb1a8b5241dd922e7673f94873742702,2024-11-26T11:25:31.403000
|
||||
CVE-2024-11567,0,0,94f7535c969fe66e40b2ff0b48f7cdae6e32ab604506acec8fa3a89ae31b2317,2024-11-26T11:25:24.020000
|
||||
CVE-2024-11568,0,0,c34bf6d481f0b7933b87f296c067d5fc3875166429faacb8cda7c6ed25115ea7,2024-11-26T11:25:17.360000
|
||||
CVE-2024-11569,0,0,b77dd18aef7d393f6f1b4514103e693e22037ccddd96937d06875884da8c76ea,2024-11-26T11:25:09.950000
|
||||
CVE-2024-1157,0,0,b2a4c38395c259edc9de63be3363f457cdfc3ed23febeb4ceb3c18d34f71a1ae,2024-10-09T15:20:50.540000
|
||||
CVE-2024-11570,0,1,6ac10f01e39e6045d30dbda5b1136f3f16aba8a7b7ffda23e4616f787d07e383,2024-11-26T11:24:59.183000
|
||||
CVE-2024-11570,0,0,6ac10f01e39e6045d30dbda5b1136f3f16aba8a7b7ffda23e4616f787d07e383,2024-11-26T11:24:59.183000
|
||||
CVE-2024-11571,0,0,abe038812fba5459969813e524450e614fe0dbfd84990479b5a90d64aa6ab80d,2024-11-25T18:53:28.710000
|
||||
CVE-2024-11572,0,0,fc11235ab3b14fd619f1a0b00897d854eedb62bdcac8fe59842ec11dbd195d32,2024-11-25T18:53:24.493000
|
||||
CVE-2024-11573,0,0,f2af87e723c612dde047a5fb1fdf0094bdc07d8a61129046507fcf330341f051,2024-11-25T18:53:19.637000
|
||||
@ -243711,9 +243716,26 @@ CVE-2024-11676,0,0,f392dfd9826e93a448876b58c11dd57692e60ef66dea1497a579c04b0a862
|
||||
CVE-2024-11677,0,0,bec0246a25d1d0f879cebd6a36394d0ed570224b28f9e2943efe30510e8f593e,2024-11-26T02:15:17.437000
|
||||
CVE-2024-11678,0,0,e780942a86d65f83e2cb7cc5d04e0a3676e4919574029bbf616d3d9c8bbb8b98,2024-11-26T02:15:18.090000
|
||||
CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000
|
||||
CVE-2024-11680,1,1,e59e07fcd0f2caeb9f7525587364f8cd5a94ad91992448a2d5730a3a3fe6f61e,2024-11-26T10:15:04.540000
|
||||
CVE-2024-11680,0,0,e59e07fcd0f2caeb9f7525587364f8cd5a94ad91992448a2d5730a3a3fe6f61e,2024-11-26T10:15:04.540000
|
||||
CVE-2024-1169,0,0,a43d6b50f47e310e039f1575550f9d1fe159a31a77f5a57027ebd3dc489ff540,2024-03-07T13:52:27.110000
|
||||
CVE-2024-11691,1,1,492109a35e913024b8507b12b0b615bac5f5e95184f0f080cb7d29c2e2045a7c,2024-11-26T14:15:18.633000
|
||||
CVE-2024-11692,1,1,55049561fa0f71cffa0c7b6a627b36584acc14eb5f275a9c38067a068ae91926,2024-11-26T14:15:18.743000
|
||||
CVE-2024-11693,1,1,2373f8efea5deb80fd8960ce5bc1e616f0b62c5febf07239d836708229799dac,2024-11-26T14:15:18.847000
|
||||
CVE-2024-11694,1,1,a6a2c4a535474da2ca567947004ffbecb7b16bb81183cc508d3c10dd53c61627,2024-11-26T14:15:18.943000
|
||||
CVE-2024-11695,1,1,53a60a574530fe77be7f2d369026b93d8b41334f9e92c8be10e90eb5d3f867f3,2024-11-26T14:15:19.040000
|
||||
CVE-2024-11696,1,1,7ab5e962b1864924c9e631a223b7224b844fe8e800da1f91cb3d221520b39912,2024-11-26T14:15:19.143000
|
||||
CVE-2024-11697,1,1,51fa1f116c7828b8e8f1ff62dba435c5091e1f5a9af7d5d8c7fe5dc9f49fedcc,2024-11-26T14:15:19.243000
|
||||
CVE-2024-11698,1,1,68ef663d7bad58842e97db98c3dae5c1ca343ceff0340caef0c29993c7fa76b1,2024-11-26T14:15:19.330000
|
||||
CVE-2024-11699,1,1,a9563b42aba80a9928aaa619cddee19e020d85ac9c6d6cd4a9461d000db05f58,2024-11-26T14:15:19.427000
|
||||
CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000
|
||||
CVE-2024-11700,1,1,2c78fdf1ee715b56388c78f2c6dc226ae66783f46ce0c5ccf4d62263366be779,2024-11-26T14:15:19.523000
|
||||
CVE-2024-11701,1,1,bc8288924cd38f4cdd99590ba617245688a8b4adcf48d0d7c8e975eacb26f1a0,2024-11-26T14:15:19.617000
|
||||
CVE-2024-11702,1,1,b01603d2ce69843c44a56d07cc8d9691e75d38cac0d11f19b2dc16678383b3d0,2024-11-26T14:15:19.710000
|
||||
CVE-2024-11703,1,1,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000
|
||||
CVE-2024-11704,1,1,aa205c9b0e7a7f1c67c48d1ebedf7aab6c28a1207da227fdbab72e6a68b676fd,2024-11-26T14:15:19.910000
|
||||
CVE-2024-11705,1,1,90c2611303a710de2c3ac242cfdf5583c5ee0a6c79366f67f099565c736ae3d2,2024-11-26T14:15:19.997000
|
||||
CVE-2024-11706,1,1,0930945d057b4333a3f8e3fea3ad304feb52b5f4f3e2b46ca504556e03722576,2024-11-26T14:15:20.080000
|
||||
CVE-2024-11708,1,1,5df8567336f2f5c4bcf48dbbb1c13334cab7eaa8fac218501e9ea26d72b94ac4,2024-11-26T14:15:20.173000
|
||||
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
|
||||
@ -244435,7 +244457,7 @@ CVE-2024-1932,0,0,2d36cde105fc296303955f0190d0c15735ef44ac96e1b6b85b1708703d6ff7
|
||||
CVE-2024-1933,0,0,7fbc0f24622f50a410caa37f8d4d0022d31f3ba694aaa208855480ee88f0fabb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1934,0,0,df6bc0820efaa227ff0593f2f377a2941dbe3870867c525b59689743a10c0b3a,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1935,0,0,ca5903a177c0640c0e970926382a56ffbeaa4621c2c3291cf867a2ac2d3da56b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1936,0,0,3c4877f8a7a72f4b22538c5fabddaf31798256327c12415bddcc418bc5a6e33c,2024-08-08T21:35:03.480000
|
||||
CVE-2024-1936,0,1,4ae9db8b468cef69ab430d1b278181ad452cb868b5583bc17d9cdc39eeb96809,2024-11-26T14:15:20.260000
|
||||
CVE-2024-1937,0,0,7a30bc166390d821e1f1e23579a9b82c6e7a58933428574c00dfd39409fe3c39,2024-07-16T13:43:58.773000
|
||||
CVE-2024-1938,0,0,c00952c8fb5bee70009fa8cb4edae0ee23e0cf49f38d1396820ee571c21d4610,2024-03-07T23:15:07.177000
|
||||
CVE-2024-1939,0,0,7635ee63b7a711f60a96b5ac9be806a92dc586d1be5007d27a4ea5f2f8739d3c,2024-08-27T21:35:07.627000
|
||||
@ -245776,7 +245798,7 @@ CVE-2024-21455,0,0,0ff43e0945329ec2597945b2273f89d937ddf5722e0c57f6cbbfe010a8f68
|
||||
CVE-2024-21456,0,0,febed50af5286757c8cac18d43d41c241de675306b4f7eab1cf3e42fd902eaa8,2024-08-21T14:25:32.873000
|
||||
CVE-2024-21457,0,0,0397b493f3a90fa8856b8c3877d0f328b647dc8423fd236ad4c3272a6eecd90f,2024-07-02T17:49:35.410000
|
||||
CVE-2024-21458,0,0,f9498022a3fab8a9690b0ccfe79640e4fd1995291accc416b68050d29e4c1e40,2024-07-02T17:57:05.057000
|
||||
CVE-2024-21459,0,0,ecee39c896d44f36960ac0d1b86aec74c9702a6ae0226b76c4a972441854dba6,2024-08-06T16:31:05.780000
|
||||
CVE-2024-21459,0,1,b0c144488f084f51753ee9d2638c8556c0b7b694083c5457dda1f23e69c30b72,2024-11-26T14:23:08.273000
|
||||
CVE-2024-2146,0,0,07222f2c00876c864a76cc1aba64244679b8aa67131e6bb4ba2ce421b16cedae,2024-05-17T02:38:04.200000
|
||||
CVE-2024-21460,0,0,0c869051a7bf5c102fc39f7d38dcbd0fc846e7c052df96073a2167a652c0c0f9,2024-07-02T17:56:38.783000
|
||||
CVE-2024-21461,0,0,ac25505af13a35361ceb7f16605f0cfca259ef68ed10829c0d3e31293d323092,2024-07-02T17:55:28.060000
|
||||
@ -245800,7 +245822,7 @@ CVE-2024-21478,0,0,43ebbbf07014b64b01d8da0e514f55d4ae3e1a8e999d22589e5353b6b2fee
|
||||
CVE-2024-21479,0,0,96fbc793618e52c9151b32af4b044beb151e65927e8cd2300eaefc1d77b6900b,2024-08-06T16:31:05.780000
|
||||
CVE-2024-2148,0,0,bc86f9f844f478ac76d45c3a67c4caddad88592d7d22e93df6505352bf9f129d,2024-05-17T02:38:04.387000
|
||||
CVE-2024-21480,0,0,19c0e295b8ed14a7e374e89037665afa7ec9fbf156e97e3ce4bcce5f12a8ad4e,2024-05-06T16:00:59.253000
|
||||
CVE-2024-21481,0,0,968847949c8fa2e94c498cfe8af11075bb292eae36dafee0fb1ffcb1d3a84e87,2024-08-06T16:30:24.547000
|
||||
CVE-2024-21481,0,1,ad530755ac9aa3b7908f1e749494a729681f834d292c027da7268fb498999ce3,2024-11-26T14:48:00.253000
|
||||
CVE-2024-21482,0,0,a1338b6f330d2eb5d0f4ebfab8716243966b7865599de7ef86fae57578a2170f,2024-07-02T17:51:45.687000
|
||||
CVE-2024-21483,0,0,ddfb5ce914fa1ff56560fa86379b92a602e5ea04b740e3571ddfa8961d66603e,2024-09-10T10:15:09.173000
|
||||
CVE-2024-21484,0,0,170e730118f02f10a6e5229db7c5eef4d192db3745e0e44dbc53ab2277157f67,2024-03-06T14:15:47.533000
|
||||
@ -246051,7 +246073,7 @@ CVE-2024-21793,0,0,23b486ed764565c6797aae64d308121b23408c3a6def90d3fcaf91d784677
|
||||
CVE-2024-21794,0,0,3da4616cfee04bc74bfc95974dd9f83bbdb78452787277f6c7fc15778ae28557,2024-02-07T17:15:44.653000
|
||||
CVE-2024-21795,0,0,4c526521468e78a581fac1a65dee6fe30626865dc4bc6584b348e80d2f7486e1,2024-04-02T15:15:52.517000
|
||||
CVE-2024-21796,0,0,4c30b7e370457352f3ad9c0b491bb5443c36dbd10c44444c805c65b2a198074d,2024-09-10T18:35:02.553000
|
||||
CVE-2024-21798,0,1,1e4b214d638cfc1183a9551536cf5652ca4868c5ccfd9ce06cc998e65cad9781,2024-11-26T09:15:05.723000
|
||||
CVE-2024-21798,0,0,1e4b214d638cfc1183a9551536cf5652ca4868c5ccfd9ce06cc998e65cad9781,2024-11-26T09:15:05.723000
|
||||
CVE-2024-21799,0,0,39d302e42368216e3c7296614d2ecb3dc3ef52a57f1f26a08e1325cbd5f02ae9,2024-11-15T14:00:09.720000
|
||||
CVE-2024-2180,0,0,ea5a425caba6ac1cd3af8063470a5a58882d59cccfb29a7ae46ceaab23a1dfb3,2024-09-05T23:15:11.970000
|
||||
CVE-2024-21801,0,0,87368b81aaeb71fd9558ab521f94a4ce96a7438d03623fd572720282a3acb74f,2024-08-14T17:49:14.177000
|
||||
@ -247599,7 +247621,7 @@ CVE-2024-23907,0,0,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e8009
|
||||
CVE-2024-23908,0,0,6e501a975fab3953d375d5e4557320de59d7d22abaaecc5b543cd7031c34029a,2024-09-12T18:43:53.363000
|
||||
CVE-2024-23909,0,0,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000
|
||||
CVE-2024-2391,0,0,60da3844b5911777951235a640805c94e8dc2cfa119cea41ed5149fa8aa45d94,2024-05-17T02:38:12.397000
|
||||
CVE-2024-23910,0,1,9030e808dd7e3e2de8550e4560cb99b73121482efe1e5cb67b11512412dc28fc,2024-11-26T09:15:05.877000
|
||||
CVE-2024-23910,0,0,9030e808dd7e3e2de8550e4560cb99b73121482efe1e5cb67b11512412dc28fc,2024-11-26T09:15:05.877000
|
||||
CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10
|
||||
CVE-2024-23912,0,0,210cf35daf58146f5a2ec254acd74292d26b1663729ba2d0483f8b346b0042f9,2024-05-03T12:48:41.067000
|
||||
CVE-2024-23913,0,0,32316a55a8e1da81d9abb95b33e0db8e8724ab28f77e16dfed40dc690a6cb334,2024-05-03T12:48:41.067000
|
||||
@ -253627,7 +253649,7 @@ CVE-2024-32147,0,0,ed14700cccfb0cda87a633109f0f7bc757ba5c2081f42bfda22f3a7feb6f7
|
||||
CVE-2024-32148,0,0,22eaa682ca57be740d99255c2e5fbd248f14af606d84d6d3c9100973529ff0b8,2024-06-13T18:36:45.417000
|
||||
CVE-2024-32149,0,0,b2b226678f5b6fc3063af16db3df1b1f5beae60c5b5de2cd72494f3a01514fcc,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3215,0,0,e5fb2a5f0603876a47fbaf0581a5b0a27f3e787377440e3d933b055fa124676e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-32151,0,1,fc2a0c74c49a92ac7bfaec19a41511e1b239cdb8c7b2d468b56301fe2928145b,2024-11-26T11:21:59.167000
|
||||
CVE-2024-32151,0,0,fc2a0c74c49a92ac7bfaec19a41511e1b239cdb8c7b2d468b56301fe2928145b,2024-11-26T11:21:59.167000
|
||||
CVE-2024-32152,0,0,df67a1c7620164eaaccbec2e8f2fd9292dea378bf2d693bf6152652954ec5ae3,2024-09-06T17:22:12.383000
|
||||
CVE-2024-3216,0,0,36d9056f12425336af262dd787bf04647621823ca6d005690ab6601a9ec48458,2024-04-08T18:49:25.863000
|
||||
CVE-2024-32161,0,0,aa486a10e1c1e1d4ce96087862c0685a8206cb453d4b368274ea4d3fc4398d92,2024-07-03T01:55:49.600000
|
||||
@ -254678,7 +254700,7 @@ CVE-2024-33601,0,0,1e872276284c72121f6aaeefc175b69e15bd1ff785d0661b2fa91a7a25fea
|
||||
CVE-2024-33602,0,0,86deb6f1e6a3eb7f53cef6d50563acba68abbbbc8944080d8d45f1adacf78d24,2024-07-22T18:15:03.583000
|
||||
CVE-2024-33603,0,0,dd2c640710464d77e12c3cf25cda315c5368032fba1e17806066e822f0955991,2024-11-13T18:39:49
|
||||
CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877fcf5,2024-05-08T17:05:24.083000
|
||||
CVE-2024-33605,0,1,eea19d186817b0424cb7ef50ae2e53bdf7155dc6bc4e0259b084cc4febfe8b82,2024-11-26T11:21:59.607000
|
||||
CVE-2024-33605,0,0,eea19d186817b0424cb7ef50ae2e53bdf7155dc6bc4e0259b084cc4febfe8b82,2024-11-26T11:21:59.607000
|
||||
CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000
|
||||
CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000
|
||||
CVE-2024-3361,0,0,3987591b20407a1c515606479571376257c715748e7334237cf48ed958e6de1a,2024-05-17T02:39:52.620000
|
||||
@ -254999,7 +255021,7 @@ CVE-2024-34018,0,0,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a229929061449589
|
||||
CVE-2024-34019,0,0,ff720c73d7b799cb466f79ed87b9acbf36d22c868dd2f8e93b3f0bc554584400,2024-09-12T17:18:07.163000
|
||||
CVE-2024-3402,0,0,9338564bd22c4003db146afde9bd8c1a92a594a6c110944ff805be3cba8ce58e,2024-09-24T14:04:44.507000
|
||||
CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000
|
||||
CVE-2024-34021,0,1,fc61fd7bf66eaeeb3d477d4a501fab390823e4cbd5f527487d7b41d5efc8a7f2,2024-11-26T09:15:06.077000
|
||||
CVE-2024-34021,0,0,fc61fd7bf66eaeeb3d477d4a501fab390823e4cbd5f527487d7b41d5efc8a7f2,2024-11-26T09:15:06.077000
|
||||
CVE-2024-34022,0,0,7b23e7a4942e184fec33b1bffa07086984aca57ed7d3dd370cec1e2a245271cf,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34023,0,0,4dad96a4b3405ff5975c0f7d1a940e81b4b229c6fe69b1b44167ee14d10f47a5,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34024,0,0,436ff185980fb4887f6e90c4484ac03d00d9d240594d2b927342762d05845604,2024-11-15T21:35:13.637000
|
||||
@ -258724,11 +258746,11 @@ CVE-2024-38821,0,0,bb251b2231aa5ec8776de9aee89d7b4c729d7a41bc68ac186fa12d01aa093
|
||||
CVE-2024-38826,0,0,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000
|
||||
CVE-2024-38828,0,0,0c8d1b5128144a8d7d124f30bfb82a89e19f39cd304dc10431ed647af64ddcb3,2024-11-18T17:11:17.393000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-38830,1,1,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000
|
||||
CVE-2024-38831,1,1,b7f532420985d87086b1a832cdf5df039cc78b045de45580082122277736f599,2024-11-26T12:15:18.590000
|
||||
CVE-2024-38832,1,1,20b1258fe878a5b3f5eaebc1c1c986ff73c4112b6f53f0ee6157f579fa8af73b,2024-11-26T12:15:18.697000
|
||||
CVE-2024-38833,1,1,835bd940af739843a067d4677be9dfaaf3f1b1e91231a8f8b581ac7dca343dfe,2024-11-26T12:15:18.800000
|
||||
CVE-2024-38834,1,1,fd2bab78ac4213a2e7e8847a5e2d0557c682fa7f71f78cfdc81702dc9f99d3b0,2024-11-26T12:15:18.900000
|
||||
CVE-2024-38830,0,0,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000
|
||||
CVE-2024-38831,0,0,b7f532420985d87086b1a832cdf5df039cc78b045de45580082122277736f599,2024-11-26T12:15:18.590000
|
||||
CVE-2024-38832,0,0,20b1258fe878a5b3f5eaebc1c1c986ff73c4112b6f53f0ee6157f579fa8af73b,2024-11-26T12:15:18.697000
|
||||
CVE-2024-38833,0,0,835bd940af739843a067d4677be9dfaaf3f1b1e91231a8f8b581ac7dca343dfe,2024-11-26T12:15:18.800000
|
||||
CVE-2024-38834,0,0,fd2bab78ac4213a2e7e8847a5e2d0557c682fa7f71f78cfdc81702dc9f99d3b0,2024-11-26T12:15:18.900000
|
||||
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
|
||||
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
|
||||
@ -259192,7 +259214,7 @@ CVE-2024-39570,0,0,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2c
|
||||
CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000
|
||||
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-39574,0,0,19f7903aaa2fe3131935c172a6b15d77efbdb8c9899ed2e523d65e46645a7e43,2024-09-16T15:59:10.653000
|
||||
CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000
|
||||
CVE-2024-39576,0,1,22b1b65db86917b4325c3dc0d92d4569062d6a3cb0be25168fc8000701289612,2024-11-26T14:19:07.273000
|
||||
CVE-2024-39577,0,0,d04d10a10e5d8b8491ab50484278d3d71eaa9b5c56f3ce3e15aea13d8aa84a66,2024-11-25T18:20:36.807000
|
||||
CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000
|
||||
CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000
|
||||
@ -259219,7 +259241,7 @@ CVE-2024-39599,0,0,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802
|
||||
CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39601,0,0,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000
|
||||
CVE-2024-39605,0,0,a5d8e60b596ac98c4205247c388074418dc90b00520b572619e13063948297f8,2024-11-12T13:55:21.227000
|
||||
CVE-2024-39607,0,1,37656757db71c1b428484833fdfaf4368b381441bf56a1cc35734fa69b37265a,2024-11-26T09:15:06.277000
|
||||
CVE-2024-39607,0,0,37656757db71c1b428484833fdfaf4368b381441bf56a1cc35734fa69b37265a,2024-11-26T09:15:06.277000
|
||||
CVE-2024-39609,0,0,6fd0567e66080bb3875a46402bc6085cc120cf2d6c3a58856814b6539ff05daa,2024-11-19T19:58:29.653000
|
||||
CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000
|
||||
CVE-2024-39610,0,0,78a906525eb532418ee6d458c51f035bb8b9505c7b1742d384bf9dfd00e6f9b8,2024-11-20T15:02:14.297000
|
||||
@ -259906,7 +259928,7 @@ CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f7
|
||||
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
|
||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40883,0,1,528336352cc82e0b8372ab05378a2db9075c240510088b0ff9ca8ca4bc3a518f,2024-11-26T09:15:06.443000
|
||||
CVE-2024-40883,0,0,528336352cc82e0b8372ab05378a2db9075c240510088b0ff9ca8ca4bc3a518f,2024-11-26T09:15:06.443000
|
||||
CVE-2024-40884,0,0,ff232cdbc88b9d59bd801683d73c76bda50973c98d329e426c37e00c00612f9e,2024-10-17T14:05:16.247000
|
||||
CVE-2024-40885,0,0,e98274fce0ae6642c4bef8a0796da12bd974b4bf43010735bc4ff5db64ebfb9b,2024-11-15T14:00:09.720000
|
||||
CVE-2024-40886,0,0,366f3546e42ed526b269e117ba5fde90b643767db321194ac7a300a3dda42364,2024-08-23T16:09:31.887000
|
||||
@ -264098,10 +264120,10 @@ CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15b
|
||||
CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb63,2024-06-04T19:20:47.830000
|
||||
CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
|
||||
CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000
|
||||
CVE-2024-47248,1,1,0f5e12c7fe8312f1c6b71f5653673fe71452b9ffa22a70ae04beca93210e31b6,2024-11-26T12:15:19.007000
|
||||
CVE-2024-47249,1,1,9c744d7a7fa88fe8d08178b598cde9ec73f647c32157a82650f4e91918818153,2024-11-26T12:15:19.123000
|
||||
CVE-2024-47248,0,1,ccce57632d5f23dd5b75c188281f9087214a94a97e45c28136e0ae2c1a1e026f,2024-11-26T14:15:20.810000
|
||||
CVE-2024-47249,0,1,e37fdf687d6af3084752cc0d638956611bee30257760f397b51246d6decd055e,2024-11-26T14:15:20.900000
|
||||
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
|
||||
CVE-2024-47250,1,1,ae354f5eae35f00a5c50decf1bd479c9280936e470def07f8f2470502771abe1,2024-11-26T12:15:19.230000
|
||||
CVE-2024-47250,0,1,2abe1ca167dfec2ecf31b72e36112f443c2449676f4e6427a7dbcf22b2ec8780,2024-11-26T14:15:21.010000
|
||||
CVE-2024-47253,0,0,0c81facaa1aa1f7ae0b0e27b1673e803ebaeec77aef71a1827f37f9dbd7dbd49,2024-11-07T12:15:24.630000
|
||||
CVE-2024-47254,0,0,81bb7fbcf9de24b32604c709597f53a5bfd5dadb66fc238800b57d25b4c1a55f,2024-11-07T12:15:24.747000
|
||||
CVE-2024-47255,0,0,4e4181b499a17b720343878ad776ef93b384b10f1546c28d389a3c7b495a0310,2024-11-07T12:15:24.857000
|
||||
@ -264420,7 +264442,7 @@ CVE-2024-47656,0,0,4a7b40727fe0bc16fd3cab3d10ee814920e8818b1c83af2c468f34cc9e39f
|
||||
CVE-2024-47657,0,0,708576a218ada67737fc2a655868a1f777fbac283ee172e5336c76140e63933f,2024-10-16T15:44:16.807000
|
||||
CVE-2024-47658,0,0,947a688b2a86da9457477de88fb5bff9df9a2e5d87371477ab4988d2ebf34f8c,2024-10-23T16:14:46.213000
|
||||
CVE-2024-47659,0,0,731051564fdd9abc181845d3e50137cbdca7b1a84c7236a873f8e213b5f1af37,2024-10-23T16:29:14.800000
|
||||
CVE-2024-4766,0,0,ff609e4dde87340f1890030d226207d6e980e4e397af75c4c1c3e16359554990,2024-11-04T15:35:35.123000
|
||||
CVE-2024-4766,0,1,200d8f60d9b83631469c384770d5f2fe14e0f99c60a02fed597314649ea5a9cc,2024-11-26T14:15:21.113000
|
||||
CVE-2024-47660,0,0,e2ac446e9523902ead466409c8feba83110dd39b410ed7aaabcc96633073d26b,2024-10-23T17:00:47.747000
|
||||
CVE-2024-47661,0,0,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000
|
||||
CVE-2024-47662,0,0,920f325626eb85508758136f5394582e182e91aad17f6b7b72068d65db6d25e8,2024-10-23T16:53:12.973000
|
||||
@ -266077,28 +266099,28 @@ CVE-2024-50353,0,0,ccbaa89f0150ad038f7930bf7da95bdebd48b8dd8438583bd87ed80c0a277
|
||||
CVE-2024-50354,0,0,5fe2cfed42eb75a8865a8b156fa958f7af02063c60312ccd6714684eb18cee96,2024-11-01T12:57:03.417000
|
||||
CVE-2024-50355,0,0,34115e6fc2dfb50aaa39c5215f32063396760871c9e910082b3fe697717e7871,2024-11-20T14:39:36.550000
|
||||
CVE-2024-50356,0,0,1007ed397ecbfac0c7e4779187113696b4d36207eb77ee96ff22c8fde6a29757,2024-11-01T14:35:08.330000
|
||||
CVE-2024-50358,1,1,ab04391db16fc47fccf13172d54fcae28664954f6e715329ff48935120277295,2024-11-26T11:21:59.970000
|
||||
CVE-2024-50359,1,1,ea532980423c47e8f513f8e894ed7d87a6e75958a376933d19d7256224b1dd06,2024-11-26T11:22:00.460000
|
||||
CVE-2024-50358,0,0,ab04391db16fc47fccf13172d54fcae28664954f6e715329ff48935120277295,2024-11-26T11:21:59.970000
|
||||
CVE-2024-50359,0,0,ea532980423c47e8f513f8e894ed7d87a6e75958a376933d19d7256224b1dd06,2024-11-26T11:22:00.460000
|
||||
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
|
||||
CVE-2024-50360,1,1,d0bd6b0963072f6f4ae7815c2d8a64f4446c0050c5459a5e83a74503f28eb19d,2024-11-26T11:22:01.187000
|
||||
CVE-2024-50361,1,1,2fa689965811c29205ebee76bd320cb3a0c0e7b8908f7c314022834d5344026e,2024-11-26T11:22:01.630000
|
||||
CVE-2024-50362,1,1,05cffd71865919e7a5ba7abe55fe56006ff0502971c3224d5b22ebce920b18a7,2024-11-26T11:22:02.067000
|
||||
CVE-2024-50363,1,1,fe82b99cc3556ae1bc73d0c76122647f7a9c714fd7a59b6bed39c17e0bba5a00,2024-11-26T11:22:02.530000
|
||||
CVE-2024-50364,1,1,e9074d3cf4825d459f7c6eaf91a5da438adb257d51af184c0f5053306d3c6907,2024-11-26T11:22:02.973000
|
||||
CVE-2024-50365,1,1,c24516d0136ad03b7e185a467025eeea2aaee481afca10fd8dde502d26e8d16d,2024-11-26T11:22:03.430000
|
||||
CVE-2024-50366,1,1,af056e6baa08e5eb0943ca4435461a223f474bc7de1a9d870e662d58901e0fbd,2024-11-26T11:22:03.853000
|
||||
CVE-2024-50367,1,1,dc6b430a94158aa3afcd1bee5853580c539221961bfa71b38b6b52617cb726f1,2024-11-26T11:22:04.287000
|
||||
CVE-2024-50368,1,1,0648e632e8cf583b81ab143822321934d8449b23056daec389f5eb3689e703fa,2024-11-26T11:22:04.710000
|
||||
CVE-2024-50369,1,1,9e4f46b9e71815b802e92d941e32161e9ffea48ee6f39d92624142af6e780cad,2024-11-26T11:22:05.147000
|
||||
CVE-2024-50360,0,0,d0bd6b0963072f6f4ae7815c2d8a64f4446c0050c5459a5e83a74503f28eb19d,2024-11-26T11:22:01.187000
|
||||
CVE-2024-50361,0,0,2fa689965811c29205ebee76bd320cb3a0c0e7b8908f7c314022834d5344026e,2024-11-26T11:22:01.630000
|
||||
CVE-2024-50362,0,0,05cffd71865919e7a5ba7abe55fe56006ff0502971c3224d5b22ebce920b18a7,2024-11-26T11:22:02.067000
|
||||
CVE-2024-50363,0,0,fe82b99cc3556ae1bc73d0c76122647f7a9c714fd7a59b6bed39c17e0bba5a00,2024-11-26T11:22:02.530000
|
||||
CVE-2024-50364,0,0,e9074d3cf4825d459f7c6eaf91a5da438adb257d51af184c0f5053306d3c6907,2024-11-26T11:22:02.973000
|
||||
CVE-2024-50365,0,0,c24516d0136ad03b7e185a467025eeea2aaee481afca10fd8dde502d26e8d16d,2024-11-26T11:22:03.430000
|
||||
CVE-2024-50366,0,0,af056e6baa08e5eb0943ca4435461a223f474bc7de1a9d870e662d58901e0fbd,2024-11-26T11:22:03.853000
|
||||
CVE-2024-50367,0,0,dc6b430a94158aa3afcd1bee5853580c539221961bfa71b38b6b52617cb726f1,2024-11-26T11:22:04.287000
|
||||
CVE-2024-50368,0,0,0648e632e8cf583b81ab143822321934d8449b23056daec389f5eb3689e703fa,2024-11-26T11:22:04.710000
|
||||
CVE-2024-50369,0,0,9e4f46b9e71815b802e92d941e32161e9ffea48ee6f39d92624142af6e780cad,2024-11-26T11:22:05.147000
|
||||
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
|
||||
CVE-2024-50370,1,1,04971779212777ef1001cef67fb26c1e54eb300ebf566dd239f3a4c438fee50d,2024-11-26T11:22:05.563000
|
||||
CVE-2024-50371,1,1,ec53f5142fc2fe615cdb6053319a37c30f64c18cb4ece88028136bf1e3d7fddd,2024-11-26T11:22:06.050000
|
||||
CVE-2024-50372,1,1,09a5ba0b7660808199e079ab992aae91075eaa5934404a6364400b84425803dc,2024-11-26T11:22:06.457000
|
||||
CVE-2024-50373,1,1,07d1a2778e2b9b4f5c70861627db44604e689527204abaa344ef5a7b71eed4fd,2024-11-26T11:22:06.930000
|
||||
CVE-2024-50374,1,1,8271a8d5a687fa06bc1840174502ceadbc42de0dc9f5e75f0a9837df28ee2407,2024-11-26T11:22:07.403000
|
||||
CVE-2024-50375,1,1,1a250bae21ebd1fd9b9268c7c49c6e091e282c377034d6c58a2793619f66546b,2024-11-26T11:22:07.867000
|
||||
CVE-2024-50376,1,1,c17efa3dc650d5a0b44b765200512faffc52101b81c2385c1a9f8e742ee86c6f,2024-11-26T11:22:08.323000
|
||||
CVE-2024-50377,1,1,a88baec8ddbf85dae69a29e2d805cf9a334ef1555a19dac3559d55b727cb3e80,2024-11-26T11:22:08.767000
|
||||
CVE-2024-50370,0,0,04971779212777ef1001cef67fb26c1e54eb300ebf566dd239f3a4c438fee50d,2024-11-26T11:22:05.563000
|
||||
CVE-2024-50371,0,0,ec53f5142fc2fe615cdb6053319a37c30f64c18cb4ece88028136bf1e3d7fddd,2024-11-26T11:22:06.050000
|
||||
CVE-2024-50372,0,0,09a5ba0b7660808199e079ab992aae91075eaa5934404a6364400b84425803dc,2024-11-26T11:22:06.457000
|
||||
CVE-2024-50373,0,0,07d1a2778e2b9b4f5c70861627db44604e689527204abaa344ef5a7b71eed4fd,2024-11-26T11:22:06.930000
|
||||
CVE-2024-50374,0,0,8271a8d5a687fa06bc1840174502ceadbc42de0dc9f5e75f0a9837df28ee2407,2024-11-26T11:22:07.403000
|
||||
CVE-2024-50375,0,0,1a250bae21ebd1fd9b9268c7c49c6e091e282c377034d6c58a2793619f66546b,2024-11-26T11:22:07.867000
|
||||
CVE-2024-50376,0,0,c17efa3dc650d5a0b44b765200512faffc52101b81c2385c1a9f8e742ee86c6f,2024-11-26T11:22:08.323000
|
||||
CVE-2024-50377,0,0,a88baec8ddbf85dae69a29e2d805cf9a334ef1555a19dac3559d55b727cb3e80,2024-11-26T11:22:08.767000
|
||||
CVE-2024-50378,0,0,d1e7f6cc1c38465f15ead8b558f025ff2fd8c3e8d0c0fab80553e16623c34e06,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
|
||||
CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000
|
||||
@ -266664,7 +266686,7 @@ CVE-2024-51565,0,0,8328dccc66875095c16fdc6e805e5ce0383a91c04e800f1484dfae6d2bbb9
|
||||
CVE-2024-51566,0,0,097d7503de9262fa6c32cea6fce0dd60f1cc86a10c695ba52753bd5f0d9774a4,2024-11-12T15:48:59.103000
|
||||
CVE-2024-51567,0,0,9629c1871377d5b3a8fc7e24f37cf5fff8c7d9ecc5af9890fa03e865aa78aead,2024-11-08T21:14:28.807000
|
||||
CVE-2024-51568,0,0,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000
|
||||
CVE-2024-51569,1,1,552e83cf62905743edfb8c34922f842ce9d976099a12873394bea5944e468bf3,2024-11-26T12:15:21.113000
|
||||
CVE-2024-51569,0,1,4c8ce07b01ee28412a8903650a5d0031e532864cceb5198621a8b55bc127a646,2024-11-26T14:15:21.343000
|
||||
CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000
|
||||
CVE-2024-51570,0,0,c32b58de950118e1e049594e92f53929812b854ff223f3930e4209ac944b600a,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51571,0,0,3fd77a33a50e24f063546fc706f0cc6af0599e1b1745ad0ad52f8eaeb4035ce4,2024-11-12T13:55:21.227000
|
||||
@ -267585,6 +267607,8 @@ CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f
|
||||
CVE-2024-5395,0,0,e532c0fafbcef9b666c7ef0302f25a35b4dc4d0c2a33d2079af161ebd3ce2b3c,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc099d,2024-06-04T19:21:08.627000
|
||||
CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000
|
||||
CVE-2024-53975,1,1,bd167fcc06cb6fa0be6704791c0234b39fa1de964d5c3da3ed17e79014ac72b1,2024-11-26T14:15:21.497000
|
||||
CVE-2024-53976,1,1,62fac5cdc9ac3cd91015efbc077b1a1d15b426900accce68483357e67a84d93f,2024-11-26T14:15:21.587000
|
||||
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
|
||||
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
|
||||
@ -268668,11 +268692,11 @@ CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec8192662919
|
||||
CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6600,0,0,d38b8e15b440ec379e5d4dcf9d0495a2b72fd02b3eb8c13111cb9109e149894f,2024-10-29T20:35:38.603000
|
||||
CVE-2024-6601,0,0,1b3b880d323fbc5730a980592d9133d50798789725a5a19bb934e3d6e9a6650b,2024-10-30T20:35:39.587000
|
||||
CVE-2024-6602,0,0,f6a87652a2fe583b38a38e64b24a5e6d6d6790eb720538440a254ce49a22d782,2024-07-16T18:15:08.900000
|
||||
CVE-2024-6602,0,1,c299be732b5faae250c40cde3291efaa02e222cbecd5822e3c0ccdb13fb63ebe,2024-11-26T14:15:21.740000
|
||||
CVE-2024-6603,0,0,69cec991ec6c96faca0e6549878f06a74d4f5b721edfdd20399a8cd286528c4f,2024-07-16T18:15:08.990000
|
||||
CVE-2024-6604,0,0,9069e1e4303827c6bac2a3f980520353e2df4612754e7a70e6afd1b8541d78f4,2024-11-12T16:35:25.143000
|
||||
CVE-2024-6605,0,0,c63bd0135437fcc4d79120f4a6d6fc9c887b669225a222a69b4002ddda65549b,2024-08-01T14:00:29.013000
|
||||
CVE-2024-6606,0,0,1a43f6b156f00ca0284491ac0129496772fc5a0993a21ff17fb319d7882c2e97,2024-07-16T18:15:09.247000
|
||||
CVE-2024-6606,0,1,85d950124fc40831dcf9a4596a0a3ce3b3a5fea284519a87d079c14b44615863,2024-11-26T14:15:21.930000
|
||||
CVE-2024-6607,0,0,e0f051eabf509802774447af80a0c738a4502496130b70b32bcf3185bbfd563c,2024-08-01T14:00:30.023000
|
||||
CVE-2024-6608,0,0,246c9ba89ed8e01f5cf842e2ef0777e6ce9e95831d341293bd5aa49bcd990f4d,2024-08-29T18:34:20.043000
|
||||
CVE-2024-6609,0,0,e0015ee4b4061bd74c9f14d02e039fc61e2646b8b8a922c9f2cb851cbba76ddf,2024-08-29T18:32:56.240000
|
||||
@ -269203,10 +269227,10 @@ CVE-2024-7238,0,0,c0d76744e00ebaecab52f6cedec4e956bcb1da191ba0739cb52b2b0ffa4ce8
|
||||
CVE-2024-7239,0,0,19fd481a19507f59e6d5833e1de142fa10381902af323cbe36a06ee2da94d45c,2024-11-22T22:15:16.780000
|
||||
CVE-2024-7240,0,0,3bb08cac45c9da2bdad37230e903c68d21afbfbdaba40d23745422fe7f12ea7b,2024-11-22T22:15:16.890000
|
||||
CVE-2024-7241,0,0,7d2c192649714954aef563b17ea7be8841042593a11f1fef58c82edd1efcd431,2024-11-22T22:15:17.010000
|
||||
CVE-2024-7242,0,0,eb32eac50fef1c7a3272898418016f832f72684b5f404a1217ed68e46ab797b8,2024-11-22T22:15:17.140000
|
||||
CVE-2024-7242,0,1,de9fefe545bde7d5cb01b4fb203fe19d3c0dfc20629300a4c450895662d74174,2024-11-26T14:59:29.483000
|
||||
CVE-2024-7243,0,0,67570c0c3b6246ba6455918a8a7a98f4815b6a0d33322fe82a63dacb1d846082,2024-11-22T22:15:17.313000
|
||||
CVE-2024-7244,0,0,3a5909fc55b3e05174ba3c2506ad5896937a3f6df1dedb03277740e4c4320319,2024-11-22T22:15:17.427000
|
||||
CVE-2024-7245,0,0,c8f117f31c2638a4321bc4bde6ead2240d419fd776dd41ee34c96deff1877803,2024-11-22T22:15:17.547000
|
||||
CVE-2024-7245,0,1,439ee81fc7fab17402a881363bb36c8d166a0e1427d473efd05313a7b48a2f48,2024-11-26T14:24:46.250000
|
||||
CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7247,0,0,0bfab6752d98ec5fb14ca6f2f4efb9293c75276b6f23c9f8a9f95883c0953a42,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7248,0,0,47aeecc04fc2532426e2856ff208a4764b664ce690502e70306fd9b68cb718e8,2024-08-20T14:56:01.897000
|
||||
@ -269760,6 +269784,7 @@ CVE-2024-7876,0,0,418e778940cf36c6f7e6078b70d86315614007666b7ea0a8bc25c85e567b15
|
||||
CVE-2024-7877,0,0,dce2620877837bcc0dca592338bde1c9c5eec5ebfb08768a28ba3c2724236802,2024-11-06T15:42:19.343000
|
||||
CVE-2024-7878,0,0,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000
|
||||
CVE-2024-7879,0,0,5601310bab32c84a1e3bb5570938b6febfd0ace49dd9b8bc2f0b84fa27f77423,2024-11-06T18:17:17.287000
|
||||
CVE-2024-7882,1,1,0c0f1e7df354a97befb95b11c1b993795bdee7518cafb943314321f5c5fe7c55,2024-11-26T13:15:16.430000
|
||||
CVE-2024-7883,0,0,9dbe10ad609d397b45dbe44d386409ca6d82cced9db5143da41ce7467f4bc6da,2024-11-01T12:57:03.417000
|
||||
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
|
||||
CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70e9,2024-10-07T21:15:19.217000
|
||||
@ -270038,6 +270063,7 @@ CVE-2024-8231,0,0,446131483e8b45e43bdf8638b1d57bddc78ae79290a43024fb0cbf42d668bb
|
||||
CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff5273,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8235,0,0,5e9780352477158854c36359d48e25d3513888b0f7edea2fdcc69371ba803fc8,2024-11-12T17:15:11.197000
|
||||
CVE-2024-8236,1,1,d83e37a4387f403c8ae4ac666687d5e283b479c871e524201e239ed19c71c686,2024-11-26T14:15:22.217000
|
||||
CVE-2024-8239,0,0,9ef6151772b4426305cdb3a97d7dc90da8f7e43d6a503c000880c7bb8166db9a,2024-10-07T15:48:35.887000
|
||||
CVE-2024-8241,0,0,a45702ddf12409bcabe5a92099c2b574d3c26b3fd7159f1bd1748fa16b9a5652,2024-09-26T22:03:42.123000
|
||||
CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
|
||||
@ -270561,7 +270587,7 @@ CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775b
|
||||
CVE-2024-8892,0,0,b5404a9c6df12d8f66b57eddda13f138d35d7b48bdd71ae1e8b3a805c49716e0,2024-10-07T17:10:26.673000
|
||||
CVE-2024-8896,0,0,f29d7c5921a0cda09067067e0d65f52d378611c678ffcbaf48892ddddf600821,2024-11-01T16:27:16.693000
|
||||
CVE-2024-8897,0,0,73bf9affb964d11dd95d3adbb34f86a16b9ae0fd786e64b4bbd48b1e4387bb49,2024-09-25T19:49:02.493000
|
||||
CVE-2024-8899,1,1,bed741a7f503cc73fb62578907c43fb9a7c886e42f6f545b4478cde11cdc45f7,2024-11-26T11:22:09.257000
|
||||
CVE-2024-8899,0,0,bed741a7f503cc73fb62578907c43fb9a7c886e42f6f545b4478cde11cdc45f7,2024-11-26T11:22:09.257000
|
||||
CVE-2024-8900,0,0,d930082a3862c99b4e58aa6993c3377fe493c46938169528591b4cc486e72a25,2024-10-30T15:35:26.207000
|
||||
CVE-2024-8901,0,0,c42abead2f721e44cbad55763c07a3fd24e0a842c194ee61580274699db985ca,2024-10-23T21:15:14.950000
|
||||
CVE-2024-8902,0,0,e5dace8ff5577040ad4e028bf354543120981f772810138844b5cb4413778526,2024-10-15T12:57:46.880000
|
||||
@ -270755,7 +270781,7 @@ CVE-2024-9165,0,0,ea3f0f55660903ccb5b8258083c04d454fbc2904c6c551c0c30cae6774f4ac
|
||||
CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9167,0,0,a63bad47c245df04f6e571315a9e75816f82c8546280f04bf8a5adc032aef6d8,2024-11-04T15:15:24.557000
|
||||
CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9170,1,1,93cc5ccdc153471c9808f7a09f1427a0bc57d3ab9c055e1035cff84d6daf6d64,2024-11-26T09:15:06.640000
|
||||
CVE-2024-9170,0,0,93cc5ccdc153471c9808f7a09f1427a0bc57d3ab9c055e1035cff84d6daf6d64,2024-11-26T09:15:06.640000
|
||||
CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000
|
||||
CVE-2024-9172,0,0,061cdfe5504cd57ff23c615d7882c5ec428decc2bc25b474b7bdd44e1c6c93b4,2024-10-08T18:05:10.863000
|
||||
CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb506,2024-10-01T14:12:41.293000
|
||||
@ -270972,6 +270998,7 @@ CVE-2024-9456,0,0,32e971f93ac67b7dc136ac73dad60b7dab2a314c3fc73b1f49c543da51c186
|
||||
CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8eeb,2024-10-15T14:23:57.307000
|
||||
CVE-2024-9459,0,0,f79fcf5e24399662f2c8fe8a61d79ad22521a784ff705bf6fa7dcce2b4df0ff8,2024-11-06T15:29:04.917000
|
||||
CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
|
||||
CVE-2024-9461,1,1,cabc169d6b0e1f2a31a00579a6b35a0e2aeefb3ad9d2d9ddafa74e12e5263f07,2024-11-26T14:15:22.533000
|
||||
CVE-2024-9462,0,0,da874134bd4c6d4628ad3a17d1671b7f5c2018935fed477a57fc0d0990ff5d0e,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9463,0,0,4113bfcc0359b86f4600f4bd332ad0fb25180b65c5beb0ba03a5a18a0d79965c,2024-11-15T02:00:01.687000
|
||||
CVE-2024-9464,0,0,2a950a39fbd8d03d9c46c09cf06c881d311182236743fa872a3d09d866901a80,2024-10-17T06:15:04.190000
|
||||
@ -271000,7 +271027,7 @@ CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8
|
||||
CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000
|
||||
CVE-2024-9500,0,0,a3c03f4a2da5e76f37827cc5472849fd1bec52b508254b9d9e4dd8dde68494f7,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9504,0,1,096394139b110372e466f701b116deae54ca9878b5798a40b8f5c7d336014439,2024-11-26T08:15:08.180000
|
||||
CVE-2024-9504,0,0,096394139b110372e466f701b116deae54ca9878b5798a40b8f5c7d336014439,2024-11-26T08:15:08.180000
|
||||
CVE-2024-9505,0,0,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000
|
||||
CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000
|
||||
CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000
|
||||
@ -271122,7 +271149,7 @@ CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b763
|
||||
CVE-2024-9671,0,0,dcd055e44b7247318281ffcf463a48411c85db46fb1b3636a2e13ae3cf953bfe,2024-11-25T18:17:11.960000
|
||||
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
||||
CVE-2024-9675,0,0,eca475b135003e7e06db8f69f6d2f142dd27c257379e7a0b16967a90dcf42a39,2024-11-13T08:15:03.170000
|
||||
CVE-2024-9676,0,1,f87bebf8f4fe552507220e4e3a39d7cfe81d27fa23e0e0624f2c2714aabd7dd0,2024-11-26T09:15:06.820000
|
||||
CVE-2024-9676,0,0,f87bebf8f4fe552507220e4e3a39d7cfe81d27fa23e0e0624f2c2714aabd7dd0,2024-11-26T09:15:06.820000
|
||||
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
|
||||
CVE-2024-9680,0,0,aade85a65f2f99cc47c2fb834c470dcfc4a6380ab6735d9434c311360504724b,2024-11-19T17:29:12.207000
|
||||
CVE-2024-9681,0,0,8b924b450d4a6dbb27601fbb04f08d88c9285a0a1a67208f21518dfaaa0a72ba,2024-11-25T19:52:56.417000
|
||||
@ -271179,7 +271206,7 @@ CVE-2024-9746,0,0,b4f1fa0cc11bdcb820b366461cebc840d4a807a8dfce7fb5abe5ea8a4b560b
|
||||
CVE-2024-9747,0,0,fc3d51dc8394edfbc7d16d5783941a46020e3f284171391bbe3e210537b65d27,2024-11-25T16:17:27.573000
|
||||
CVE-2024-9748,0,0,f1e93b3eb60a7a8af523dfc1a78d2562ae57bb30b46f9d7831074773fc675812,2024-11-25T16:16:04.847000
|
||||
CVE-2024-9749,0,0,b4a4cb7a7e2ed29494903739f7dedc0d0b628bc8a0612acc9ffa95655d50faa7,2024-11-25T18:58:36.077000
|
||||
CVE-2024-9750,0,1,b9834307df005e23383f64807f9952be6f1581f4da2b061556c1b01793c8d0bc,2024-11-26T11:29:45.227000
|
||||
CVE-2024-9750,0,0,b9834307df005e23383f64807f9952be6f1581f4da2b061556c1b01793c8d0bc,2024-11-26T11:29:45.227000
|
||||
CVE-2024-9751,0,0,502422101dd37211c529eb60e9460f0029c22d0c958018c6e16b247d2c36a300,2024-11-22T21:15:29.093000
|
||||
CVE-2024-9752,0,0,cc80b0f6feb087fe11edb9c73f258a4bb12e3d2bf1ebca1be79f3bf3171f8cdb,2024-11-22T21:15:29.213000
|
||||
CVE-2024-9753,0,0,52d4f3acff895bd7a6ffd6b4d458fdaf3c9580168bf75876b6b1ddb52b7c9e34,2024-11-22T21:15:29.333000
|
||||
@ -271318,6 +271345,8 @@ CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd590528
|
||||
CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000
|
||||
CVE-2024-9926,0,0,eb8b84e69e1a6fd8b36727d97f2365e173de81846e61516b72bd6afc09cbffc1,2024-11-08T19:01:03.880000
|
||||
CVE-2024-9927,0,0,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000
|
||||
CVE-2024-9928,1,1,812d34301d0d8eb80059c51c3771004d718a18332b8903ade3dc607d3db4a2c5,2024-11-26T14:15:22.777000
|
||||
CVE-2024-9929,1,1,28777077686988f9ed09801822449c0f0b177ee9d6e2e610c1fe8e4ed50c9c3d,2024-11-26T14:15:22.940000
|
||||
CVE-2024-9930,0,0,2e94c1b1c2d8f47dab5a0085f731b617edc3eb172311f1bc2011ba2b1f6ff871,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9931,0,0,4f99602a22e228cc69b801ddff8bd876efec1042ee86fb7a5c3c9f1dd271a722,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9932,0,0,8a190221d1ff5cf55bd50d44ac85bae930613a4d1f53087f12b10cdd4dba5757,2024-10-28T13:58:09.230000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user