Auto-Update: 2024-12-02T05:00:35.699636+00:00

This commit is contained in:
cad-safe-bot 2024-12-02 05:03:47 +00:00
parent 2f2a67d180
commit 22586aec91
18 changed files with 588 additions and 6 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11856",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-12-02T03:15:13.713",
"lastModified": "2024-12-02T03:15:13.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability in HPE IceWall products could be exploited remotely to cause Unauthorized Data Modification."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbmu04762en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20116",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:03.833",
"lastModified": "2024-12-02T04:15:03.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In cmdq, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09057438; Issue ID: MSV-1696."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20125",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:04.663",
"lastModified": "2024-12-02T04:15:04.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MSV-1728."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20127",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:04.777",
"lastModified": "2024-12-02T04:15:04.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2023."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20128",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:04.967",
"lastModified": "2024-12-02T04:15:04.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20129",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.073",
"lastModified": "2024-12-02T04:15:05.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2025."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20130",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.190",
"lastModified": "2024-12-02T04:15:05.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: MSV-1982."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20131",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.337",
"lastModified": "2024-12-02T04:15:05.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20132",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.460",
"lastModified": "2024-12-02T04:15:05.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20133",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.567",
"lastModified": "2024-12-02T04:15:05.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1871."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20134",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.693",
"lastModified": "2024-12-02T04:15:05.693",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09154589; Issue ID: MSV-1866."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20135",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.797",
"lastModified": "2024-12-02T04:15:05.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In soundtrigger, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09142526; Issue ID: MSV-1841."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20136",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:05.920",
"lastModified": "2024-12-02T04:15:05.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20137",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:06.030",
"lastModified": "2024-12-02T04:15:06.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-248"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20138",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:06.133",
"lastModified": "2024-12-02T04:15:06.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan driver, there is a possible out of bound read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998291; Issue ID: MSV-1604."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20139",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:06.247",
"lastModified": "2024-12-02T04:15:06.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Bluetooth firmware, there is a possible firmware asssert due to improper handling of exceptional conditions. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09001270; Issue ID: MSV-1600."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/December-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-02T03:01:22.883343+00:00
2024-12-02T05:00:35.699636+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-02T01:15:04.030000+00:00
2024-12-02T04:15:06.247000+00:00
```
### Last Data Feed Release
@ -33,14 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271751
271767
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `16`
- [CVE-2024-53605](CVE-2024/CVE-2024-536xx/CVE-2024-53605.json) (`2024-12-02T01:15:04.030`)
- [CVE-2024-11856](CVE-2024/CVE-2024-118xx/CVE-2024-11856.json) (`2024-12-02T03:15:13.713`)
- [CVE-2024-20116](CVE-2024/CVE-2024-201xx/CVE-2024-20116.json) (`2024-12-02T04:15:03.833`)
- [CVE-2024-20125](CVE-2024/CVE-2024-201xx/CVE-2024-20125.json) (`2024-12-02T04:15:04.663`)
- [CVE-2024-20127](CVE-2024/CVE-2024-201xx/CVE-2024-20127.json) (`2024-12-02T04:15:04.777`)
- [CVE-2024-20128](CVE-2024/CVE-2024-201xx/CVE-2024-20128.json) (`2024-12-02T04:15:04.967`)
- [CVE-2024-20129](CVE-2024/CVE-2024-201xx/CVE-2024-20129.json) (`2024-12-02T04:15:05.073`)
- [CVE-2024-20130](CVE-2024/CVE-2024-201xx/CVE-2024-20130.json) (`2024-12-02T04:15:05.190`)
- [CVE-2024-20131](CVE-2024/CVE-2024-201xx/CVE-2024-20131.json) (`2024-12-02T04:15:05.337`)
- [CVE-2024-20132](CVE-2024/CVE-2024-201xx/CVE-2024-20132.json) (`2024-12-02T04:15:05.460`)
- [CVE-2024-20133](CVE-2024/CVE-2024-201xx/CVE-2024-20133.json) (`2024-12-02T04:15:05.567`)
- [CVE-2024-20134](CVE-2024/CVE-2024-201xx/CVE-2024-20134.json) (`2024-12-02T04:15:05.693`)
- [CVE-2024-20135](CVE-2024/CVE-2024-201xx/CVE-2024-20135.json) (`2024-12-02T04:15:05.797`)
- [CVE-2024-20136](CVE-2024/CVE-2024-201xx/CVE-2024-20136.json) (`2024-12-02T04:15:05.920`)
- [CVE-2024-20137](CVE-2024/CVE-2024-201xx/CVE-2024-20137.json) (`2024-12-02T04:15:06.030`)
- [CVE-2024-20138](CVE-2024/CVE-2024-201xx/CVE-2024-20138.json) (`2024-12-02T04:15:06.133`)
- [CVE-2024-20139](CVE-2024/CVE-2024-201xx/CVE-2024-20139.json) (`2024-12-02T04:15:06.247`)
### CVEs modified in the last Commit

View File

@ -243849,6 +243849,7 @@ CVE-2024-11828,0,0,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae6
CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c09a,2024-04-16T13:24:07.103000
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
CVE-2024-1185,0,0,a60268243ee8d3dcf82e9c185863da8146ac8c49246dc744f2663ef723b40081,2024-06-26T15:15:19.220000
CVE-2024-11856,1,1,20144f62e7f4edae2d8f1729fbe98f20a8d619a96145aa244e22c04511e4c37d,2024-12-02T03:15:13.713000
CVE-2024-1186,0,0,b01b3a0462d1f7a1a803ca8f493a6219bd71eed48ddf8d36021e6ca2af3e1767,2024-05-17T02:35:17.110000
CVE-2024-11860,0,0,8f2a0fbf19059c6c3c8a5836cc661c7d3bd0f5aaad2633071ac71b0a6a9605c7,2024-11-27T17:15:10.010000
CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000
@ -244769,6 +244770,7 @@ CVE-2024-20112,0,0,f1fecda0bbefb7976a2e5c2d965f45756c3c554b6bb2aece34ce5311395c4
CVE-2024-20113,0,0,1e9f0bb5dd8b46cb9c193f293f4e7e65c1c4f4218a8b5da37a81aedf61132d39,2024-11-04T18:50:05.607000
CVE-2024-20114,0,0,972dbefe1dd7e2ec5c449b6a55d8a48edf191f12736d3b5ac984afdda696c6ff,2024-11-05T19:58:15.577000
CVE-2024-20115,0,0,e0fbbff01a0fa518c41d64f625797efefd6cdce39d74e0c13995ea3dfe394456,2024-11-04T18:50:05.607000
CVE-2024-20116,1,1,bf601840a74c417151f81f80d77e62b52662f90568182fa10079ae9d50691ec6,2024-12-02T04:15:03.833000
CVE-2024-20117,0,0,6baac420d96eb73610546cd262e04d3589f97187f02f3401eb7616db3fa8d745,2024-11-04T18:50:05.607000
CVE-2024-20118,0,0,f196c02d943f7181a2b543f340de54479a6ac9433fa46d02a1108eafa392e84d,2024-11-04T18:50:05.607000
CVE-2024-20119,0,0,b9d1b34a5ac7be8b5a9ce604f28b7c94e37c0f79b74ec7f206945e209ae81009,2024-11-04T18:50:05.607000
@ -244778,7 +244780,21 @@ CVE-2024-20121,0,0,4938115c914642adef5ea2985a500e819409d2c7aa3a5388330765c060ef6
CVE-2024-20122,0,0,744b016dd77bf1d3925336cb7504cc81d1bda83c1655bf764225b09f6b0227e4,2024-11-05T08:35:19.593000
CVE-2024-20123,0,0,bdf62a4af5c1c1ed58a1e235ea3a69d58e2afa0181d5f68baf40f699c0511aac,2024-11-04T18:50:05.607000
CVE-2024-20124,0,0,1799547edf556e9de06685a9fcdc4c8ef9057ff40c9829ccf5d3b3aa46605f16,2024-11-04T18:50:05.607000
CVE-2024-20125,1,1,79236626570c08d9b2883b399396bb272e80f9ff7a2001cda01b00130776c00b,2024-12-02T04:15:04.663000
CVE-2024-20127,1,1,191445c8421ac764bafa609e191240e08a49a9b03cf7c2f97161e0ac39e8fac0,2024-12-02T04:15:04.777000
CVE-2024-20128,1,1,fd4f49b631373e0791fe4bb327ef73d8f0d2affdeeb231166beab6965fc15222,2024-12-02T04:15:04.967000
CVE-2024-20129,1,1,671726aba2b1095472532326d37fd302eed94fd6211ea01542506d4087187d34,2024-12-02T04:15:05.073000
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
CVE-2024-20130,1,1,c5c61b42999586eb6524adf7fc57c7a4dc342ecee029309ce1d74b441655b6a6,2024-12-02T04:15:05.190000
CVE-2024-20131,1,1,e8bf468034b877700f2f815db730ea01b9fb33b2f2b0fd1889826015a8b961cf,2024-12-02T04:15:05.337000
CVE-2024-20132,1,1,9373b009841b6e7e2bc7798ff8b4105dc55369c566645250d6e8c88a510d00d2,2024-12-02T04:15:05.460000
CVE-2024-20133,1,1,c9b8fcaac5b72964bffdd7bdbd43f33dd0d5445990becc6ef33b45a084beb516,2024-12-02T04:15:05.567000
CVE-2024-20134,1,1,10e8a3a9fd2b91d09bd084ecc2c34261009ca68c983807b8ba80b90d62432e28,2024-12-02T04:15:05.693000
CVE-2024-20135,1,1,d899dd8e63efcc84e4786ff33cc1dfe5ce8a481f68881279ba65dc626a2f9818,2024-12-02T04:15:05.797000
CVE-2024-20136,1,1,a6b9cf231f91cccb8fba39afa78239f0aaf973583a4f0691ff23291adfe70f63,2024-12-02T04:15:05.920000
CVE-2024-20137,1,1,e357ea18b28bddcd6237829f6d2454e40f9e38cb85e81244650de6b005c419f8,2024-12-02T04:15:06.030000
CVE-2024-20138,1,1,ae6e031e4fd01ba7830025a65e56a373917971371e3f604b52e691eba9d87548,2024-12-02T04:15:06.133000
CVE-2024-20139,1,1,58e35926fd10f61748cf5c6dd1def0172c7194c5c66e70664d0177296fe29614,2024-12-02T04:15:06.247000
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
@ -267819,7 +267835,7 @@ CVE-2024-53599,0,0,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387
CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000
CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000
CVE-2024-53604,0,0,f62d305bb98148833da87db5a11321e6ca6d6dd658f1c5fbfba2d66d119aa0aa,2024-11-29T14:15:05.893000
CVE-2024-53605,1,1,ca300feecc4d15af3b8cbc938be55c089599ebfcca8298d8fee9c4660ffccb57,2024-12-02T01:15:04.030000
CVE-2024-53605,0,0,ca300feecc4d15af3b8cbc938be55c089599ebfcca8298d8fee9c4660ffccb57,2024-12-02T01:15:04.030000
CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000
CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000
CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000

Can't render this file because it is too large.