mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-02T17:01:43.272285+00:00
This commit is contained in:
parent
ed47dcc8bb
commit
2e670e7e08
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34188",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-23T20:15:09.053",
|
||||
"lastModified": "2023-09-06T17:15:50.190",
|
||||
"lastModified": "2024-12-02T15:15:08.200",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -90,6 +100,31 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://blog.narfindustries.com/blog/narf-discovers-critical-vulnerabilities-in-cesanta-mongoose-http-server",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cesanta/mongoose/commit/4663090a8fb036146dfe77718cff612b0101cb0f",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cesanta/mongoose/compare/7.9...7.10",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cesanta/mongoose/pull/2197",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-109xx/CVE-2024-10905.json
Normal file
56
CVE-2024/CVE-2024-109xx/CVE-2024-10905.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-10905",
|
||||
"sourceIdentifier": "psirt@sailpoint.com",
|
||||
"published": "2024-12-02T15:15:10.240",
|
||||
"lastModified": "2024-12-02T15:15:10.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IdentityIQ 8.4 and all 8.4 patch levels prior to 8.4p2, IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p5, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p8, and all prior versions\u00a0allows HTTP access to\u00a0static content in the IdentityIQ application directory that should be protected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sailpoint.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sailpoint.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-66"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.sailpoint.com/security-advisories/",
|
||||
"source": "psirt@sailpoint.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11051",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-10T08:15:03.380",
|
||||
"lastModified": "2024-11-12T13:56:24.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-02T15:14:56.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
@ -54,9 +56,7 @@
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
@ -67,6 +67,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -74,12 +76,30 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -89,13 +109,13 @@
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
@ -111,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,24 +142,65 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:amttgroup:hotel_broadband_operating_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "3.0.3.151204",
|
||||
"matchCriteriaId": "E11A62D3-13B4-4C96-A6D1-18FD37B50BF6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.283794",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.283794",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.432691",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.shikangsi.com/post/share/ab8e6804-5c8e-442b-8a37-c6b376bcc86f",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-11700",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.523",
|
||||
"lastModified": "2024-11-27T16:15:13.300",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T15:15:10.557",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Malicious websites may have been able to user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
"value": "Malicious websites may have been able to perform user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities. This vulnerability affects Firefox < 133 and Thunderbird < 133."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20130",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:05.190",
|
||||
"lastModified": "2024-12-02T04:15:05.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:07.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: MSV-1982."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el estado de encendido, es posible que se produzca una escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09193374; ID de problema: MSV-1982."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20131",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:05.337",
|
||||
"lastModified": "2024-12-02T04:15:05.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:07.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el m\u00f3dem, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01395886; ID de problema: MSV-1873."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20132",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:05.460",
|
||||
"lastModified": "2024-12-02T04:15:05.460",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:07.557",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Modem, existe la posibilidad de una escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites de misi\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY00957388; ID de problema: MSV-1872."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20133",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:05.567",
|
||||
"lastModified": "2024-12-02T04:15:05.567",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:07.737",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1871."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el m\u00f3dem, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01395886; ID de problema: MSV-1871."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20134",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:05.693",
|
||||
"lastModified": "2024-12-02T04:15:05.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:07.907",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09154589; Issue ID: MSV-1866."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En RIL, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09154589; ID de problema: MSV-1866."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20135",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:05.797",
|
||||
"lastModified": "2024-12-02T04:15:05.797",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:08.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In soundtrigger, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09142526; Issue ID: MSV-1841."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Soundtrigger, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09142526; ID de problema: MSV-1841."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20136",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:05.920",
|
||||
"lastModified": "2024-12-02T04:15:05.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:08.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09121847; ID de problema: MSV-1821."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20137",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:06.030",
|
||||
"lastModified": "2024-12-02T04:15:06.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:08.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el controlador WLAN, existe una posible desconexi\u00f3n del cliente debido al manejo inadecuado de condiciones excepcionales. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00384543; ID de problema: MSV-1727."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20138",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:06.133",
|
||||
"lastModified": "2024-12-02T04:15:06.133",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:08.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan driver, there is a possible out of bound read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998291; Issue ID: MSV-1604."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el controlador WLAN, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998291; ID de problema: MSV-1604."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20139",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:06.247",
|
||||
"lastModified": "2024-12-02T04:15:06.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:08.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Bluetooth firmware, there is a possible firmware asssert due to improper handling of exceptional conditions. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09001270; Issue ID: MSV-1600."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el firmware de Bluetooth, existe una posible confirmaci\u00f3n de firmware debido al manejo inadecuado de condiciones excepcionales. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09001270; ID de problema: MSV-1600."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21723",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2024-02-29T01:44:03.707",
|
||||
"lastModified": "2024-02-29T13:49:29.390",
|
||||
"lastModified": "2024-12-02T16:15:08.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Un an\u00e1lisis inadecuado de las URL podr\u00eda dar lugar a una redirecci\u00f3n abierta."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
@ -32,6 +55,10 @@
|
||||
{
|
||||
"url": "https://developer.joomla.org/security-centre/926-20240202-core-open-redirect-in-installation-application.html",
|
||||
"source": "security@joomla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://developer.joomla.org/security-centre/926-20240202-core-open-redirect-in-installation-application.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-296xx/CVE-2024-29645.json
Normal file
29
CVE-2024/CVE-2024-296xx/CVE-2024-29645.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-29645",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T15:15:10.960",
|
||||
"lastModified": "2024-12-02T15:15:10.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Crispy-fried-chicken/83f0f5e8a475284d64bf99fb342e9027",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/commit/72bf3a486fa851797aa21887a40ba0e3d3a6d620",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/pull/22561",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-316xx/CVE-2024-31669.json
Normal file
25
CVE-2024/CVE-2024-316xx/CVE-2024-31669.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-31669",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T15:15:11.113",
|
||||
"lastModified": "2024-12-02T15:15:11.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "rizin before Release v0.6.3 is vulnerable to Uncontrolled Resource Consumption via bin_pe_parse_imports, Pe_r_bin_pe_parse_var, and estimate_slide."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Crispy-fried-chicken/fb9f7000f0517a085483f7f2a60f0f08",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rizinorg/rizin/commit/e42999dda0be7737fafaf5e63c1c5833a72fd9c9",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-388xx/CVE-2024-38827.json
Normal file
56
CVE-2024/CVE-2024-388xx/CVE-2024-38827.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38827",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-12-02T15:15:11.270",
|
||||
"lastModified": "2024-12-02T15:15:11.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The usage of String.toLowerCase()\u00a0and String.toUpperCase()\u00a0has some Locale\u00a0dependent exceptions that could potentially result in authorization rules not working properly."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://spring.io/security/cve-2024-38827",
|
||||
"source": "security@vmware.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-45520",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-01T21:15:04.190",
|
||||
"lastModified": "2024-12-01T21:15:04.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T16:15:11.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1 allows a remote Denial of Service because of memory corruption during scanning of a PE32 file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "WithSecure Atlant (anteriormente F-Secure Atlant) 1.0.35-1 permite una denegaci\u00f3n de servicio remota debido a la corrupci\u00f3n de memoria durante el escaneo de un archivo PE32."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://withsecure.com",
|
||||
|
64
CVE-2024/CVE-2024-469xx/CVE-2024-46905.json
Normal file
64
CVE-2024/CVE-2024-469xx/CVE-2024-46905.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-46905",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-12-02T15:15:11.443",
|
||||
"lastModified": "2024-12-02T15:15:11.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated lower-privileged user (at least Network Manager permissions required) to achieve privilege escalation to the admin account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-469xx/CVE-2024-46906.json
Normal file
64
CVE-2024/CVE-2024-469xx/CVE-2024-46906.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-46906",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-12-02T15:15:11.633",
|
||||
"lastModified": "2024-12-02T15:15:11.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-469xx/CVE-2024-46907.json
Normal file
64
CVE-2024/CVE-2024-469xx/CVE-2024-46907.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-46907",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-12-02T15:15:11.793",
|
||||
"lastModified": "2024-12-02T15:15:11.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-469xx/CVE-2024-46908.json
Normal file
64
CVE-2024/CVE-2024-469xx/CVE-2024-46908.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-46908",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-12-02T15:15:11.967",
|
||||
"lastModified": "2024-12-02T15:15:11.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required)\n\n to achieve privilege escalation to the admin account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-469xx/CVE-2024-46909.json
Normal file
72
CVE-2024/CVE-2024-469xx/CVE-2024-46909.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-46909",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-12-02T15:15:12.120",
|
||||
"lastModified": "2024-12-02T15:15:12.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2024.0.1, a\u00a0remote unauthenticated attacker could leverage this vulnerability to execute code in the context of the service account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-16"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-527xx/CVE-2024-52732.json
Normal file
29
CVE-2024/CVE-2024-527xx/CVE-2024-52732.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-52732",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T15:15:12.270",
|
||||
"lastModified": "2024-12-02T15:15:12.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in wms-Warehouse management system-zeqp v2.20.9.1 due to the token value of the zeqp system being reused."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/LINF2009/fe2f0681389d4521d236a34ec2109a24",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dotNetTreasury/WMS/blob/master/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dotNetTreasury/WMS/tree/master/src",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-534xx/CVE-2024-53459.json
Normal file
21
CVE-2024/CVE-2024-534xx/CVE-2024-53459.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T16:15:12.637",
|
||||
"lastModified": "2024-12-02T16:15:12.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sysax Multi Server 6.99 is vulnerable to Cross Site Scripting (XSS) via the /scgi?sid parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/182467/Sysax-Multi-Server-6.99-Cross-Site-Scripting.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-538xx/CVE-2024-53862.json
Normal file
86
CVE-2024/CVE-2024-538xx/CVE-2024-53862.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-53862",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T16:15:14.277",
|
||||
"lastModified": "2024-12-02T16:15:14.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. When using `--auth-mode=client`, Archived Workflows can be retrieved with a fake or spoofed token via the GET Workflow endpoint: `/api/v1/workflows/{namespace}/{name}` or when using `--auth-mode=sso`, all Archived Workflows can be retrieved with a valid token via the GET Workflow endpoint: `/api/v1/workflows/{namespace}/{name}`. No authentication is performed by the Server itself on `client` tokens. Authentication & authorization is instead delegated to the k8s API server. However, the Workflow Archive does not interact with k8s, and so any token that looks valid will be considered authenticated, even if it is not a k8s token or even if the token has no RBAC for Argo. To handle the lack of pass-through k8s authN/authZ, the Workflow Archive specifically does the equivalent of a `kubectl auth can-i` check for respective methods. In 3.5.7 and 3.5.8, the auth check was accidentally removed on the GET Workflow endpoint's fallback to archived workflows on these lines, allowing archived workflows to be retrieved with a fake token. This vulnerability is fixed in 3.6.2 and 3.5.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-workflows/pull/13021/files#diff-a5b255abaceddc9cc20bf6da6ae92c3a5d3605d94366af503ed754c079a1171aL668-R715",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h36c-m3rf-34h9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-539xx/CVE-2024-53981.json
Normal file
60
CVE-2024/CVE-2024-539xx/CVE-2024-53981.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-53981",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T16:15:14.457",
|
||||
"lastModified": "2024-12-02T16:15:14.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \\r or LF \\n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Kludex/python-multipart/commit/c4fe4d3cebc08c660e57dd709af1ffa7059b3177",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Kludex/python-multipart/security/advisories/GHSA-59g5-xgcq-4qw3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-539xx/CVE-2024-53984.json
Normal file
64
CVE-2024/CVE-2024-539xx/CVE-2024-53984.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-53984",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T16:15:14.603",
|
||||
"lastModified": "2024-12-02T16:15:14.603",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nanopb is a small code-size Protocol Buffers implementation. When the compile time option PB_ENABLE_MALLOC is enabled, the message contains at least one field with FT_POINTER field type, custom stream callback is used with unknown stream length. and the pb_decode_ex() function is used with flag PB_DECODE_DELIMITED, then the pb_decode_ex() function does not automatically call pb_release(), like is done for other failure cases. This could lead to memory leak and potential denial-of-service. This vulnerability is fixed in 0.4.9.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nanopb/nanopb/commit/2b86c255aa52250438d5aba124d0e86db495b378",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nanopb/nanopb/security/advisories/GHSA-xwqq-qxmw-hj5r",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-87xx/CVE-2024-8785.json
Normal file
64
CVE-2024/CVE-2024-87xx/CVE-2024-8785.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-8785",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-12-02T15:15:12.380",
|
||||
"lastModified": "2024-12-02T15:15:12.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In WhatsUp Gold versions released before 2024.0.1, a\u00a0remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\\SOFTWARE\\WOW6432Node\\Ipswitch\\."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-648"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html",
|
||||
"source": "security@progress.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.progress.com/network-monitoring",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
81
README.md
81
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-02T15:01:02.406975+00:00
|
||||
2024-12-02T17:01:43.272285+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-02T15:00:03.333000+00:00
|
||||
2024-12-02T16:15:14.603000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,60 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271886
|
||||
271901
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `103`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2024-53729](CVE-2024/CVE-2024-537xx/CVE-2024-53729.json) (`2024-12-02T14:15:16.290`)
|
||||
- [CVE-2024-53730](CVE-2024/CVE-2024-537xx/CVE-2024-53730.json) (`2024-12-02T14:15:16.423`)
|
||||
- [CVE-2024-53740](CVE-2024/CVE-2024-537xx/CVE-2024-53740.json) (`2024-12-02T14:15:16.560`)
|
||||
- [CVE-2024-53741](CVE-2024/CVE-2024-537xx/CVE-2024-53741.json) (`2024-12-02T14:15:16.700`)
|
||||
- [CVE-2024-53751](CVE-2024/CVE-2024-537xx/CVE-2024-53751.json) (`2024-12-02T14:15:16.863`)
|
||||
- [CVE-2024-53753](CVE-2024/CVE-2024-537xx/CVE-2024-53753.json) (`2024-12-02T14:15:17.007`)
|
||||
- [CVE-2024-53754](CVE-2024/CVE-2024-537xx/CVE-2024-53754.json) (`2024-12-02T14:15:17.143`)
|
||||
- [CVE-2024-53755](CVE-2024/CVE-2024-537xx/CVE-2024-53755.json) (`2024-12-02T14:15:17.290`)
|
||||
- [CVE-2024-53759](CVE-2024/CVE-2024-537xx/CVE-2024-53759.json) (`2024-12-02T14:15:17.430`)
|
||||
- [CVE-2024-53761](CVE-2024/CVE-2024-537xx/CVE-2024-53761.json) (`2024-12-02T14:15:17.563`)
|
||||
- [CVE-2024-53762](CVE-2024/CVE-2024-537xx/CVE-2024-53762.json) (`2024-12-02T14:15:17.697`)
|
||||
- [CVE-2024-53765](CVE-2024/CVE-2024-537xx/CVE-2024-53765.json) (`2024-12-02T14:15:17.827`)
|
||||
- [CVE-2024-53769](CVE-2024/CVE-2024-537xx/CVE-2024-53769.json) (`2024-12-02T14:15:17.953`)
|
||||
- [CVE-2024-53770](CVE-2024/CVE-2024-537xx/CVE-2024-53770.json) (`2024-12-02T14:15:18.093`)
|
||||
- [CVE-2024-53775](CVE-2024/CVE-2024-537xx/CVE-2024-53775.json) (`2024-12-02T14:15:18.237`)
|
||||
- [CVE-2024-53776](CVE-2024/CVE-2024-537xx/CVE-2024-53776.json) (`2024-12-02T14:15:18.370`)
|
||||
- [CVE-2024-53777](CVE-2024/CVE-2024-537xx/CVE-2024-53777.json) (`2024-12-02T14:15:18.503`)
|
||||
- [CVE-2024-53779](CVE-2024/CVE-2024-537xx/CVE-2024-53779.json) (`2024-12-02T14:15:18.640`)
|
||||
- [CVE-2024-53780](CVE-2024/CVE-2024-537xx/CVE-2024-53780.json) (`2024-12-02T14:15:18.777`)
|
||||
- [CVE-2024-53781](CVE-2024/CVE-2024-537xx/CVE-2024-53781.json) (`2024-12-02T14:15:18.913`)
|
||||
- [CVE-2024-53782](CVE-2024/CVE-2024-537xx/CVE-2024-53782.json) (`2024-12-02T14:15:19.050`)
|
||||
- [CVE-2024-53784](CVE-2024/CVE-2024-537xx/CVE-2024-53784.json) (`2024-12-02T14:15:19.190`)
|
||||
- [CVE-2024-53789](CVE-2024/CVE-2024-537xx/CVE-2024-53789.json) (`2024-12-02T14:15:19.327`)
|
||||
- [CVE-2024-53792](CVE-2024/CVE-2024-537xx/CVE-2024-53792.json) (`2024-12-02T14:15:19.460`)
|
||||
- [CVE-2024-53793](CVE-2024/CVE-2024-537xx/CVE-2024-53793.json) (`2024-12-02T14:15:19.587`)
|
||||
- [CVE-2024-10905](CVE-2024/CVE-2024-109xx/CVE-2024-10905.json) (`2024-12-02T15:15:10.240`)
|
||||
- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T15:15:10.960`)
|
||||
- [CVE-2024-31669](CVE-2024/CVE-2024-316xx/CVE-2024-31669.json) (`2024-12-02T15:15:11.113`)
|
||||
- [CVE-2024-38827](CVE-2024/CVE-2024-388xx/CVE-2024-38827.json) (`2024-12-02T15:15:11.270`)
|
||||
- [CVE-2024-46905](CVE-2024/CVE-2024-469xx/CVE-2024-46905.json) (`2024-12-02T15:15:11.443`)
|
||||
- [CVE-2024-46906](CVE-2024/CVE-2024-469xx/CVE-2024-46906.json) (`2024-12-02T15:15:11.633`)
|
||||
- [CVE-2024-46907](CVE-2024/CVE-2024-469xx/CVE-2024-46907.json) (`2024-12-02T15:15:11.793`)
|
||||
- [CVE-2024-46908](CVE-2024/CVE-2024-469xx/CVE-2024-46908.json) (`2024-12-02T15:15:11.967`)
|
||||
- [CVE-2024-46909](CVE-2024/CVE-2024-469xx/CVE-2024-46909.json) (`2024-12-02T15:15:12.120`)
|
||||
- [CVE-2024-52732](CVE-2024/CVE-2024-527xx/CVE-2024-52732.json) (`2024-12-02T15:15:12.270`)
|
||||
- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T16:15:12.637`)
|
||||
- [CVE-2024-53862](CVE-2024/CVE-2024-538xx/CVE-2024-53862.json) (`2024-12-02T16:15:14.277`)
|
||||
- [CVE-2024-53981](CVE-2024/CVE-2024-539xx/CVE-2024-53981.json) (`2024-12-02T16:15:14.457`)
|
||||
- [CVE-2024-53984](CVE-2024/CVE-2024-539xx/CVE-2024-53984.json) (`2024-12-02T16:15:14.603`)
|
||||
- [CVE-2024-8785](CVE-2024/CVE-2024-87xx/CVE-2024-8785.json) (`2024-12-02T15:15:12.380`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `16`
|
||||
Recently modified CVEs: `15`
|
||||
|
||||
- [CVE-2023-34151](CVE-2023/CVE-2023-341xx/CVE-2023-34151.json) (`2024-12-02T14:34:36.813`)
|
||||
- [CVE-2023-34152](CVE-2023/CVE-2023-341xx/CVE-2023-34152.json) (`2024-12-02T14:34:31.887`)
|
||||
- [CVE-2023-34153](CVE-2023/CVE-2023-341xx/CVE-2023-34153.json) (`2024-12-02T14:34:41.337`)
|
||||
- [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2024-12-02T14:54:27.177`)
|
||||
- [CVE-2024-11970](CVE-2024/CVE-2024-119xx/CVE-2024-11970.json) (`2024-12-02T14:48:39.960`)
|
||||
- [CVE-2024-31248](CVE-2024/CVE-2024-312xx/CVE-2024-31248.json) (`2024-12-02T14:03:36.677`)
|
||||
- [CVE-2024-35696](CVE-2024/CVE-2024-356xx/CVE-2024-35696.json) (`2024-12-02T14:28:17.550`)
|
||||
- [CVE-2024-37094](CVE-2024/CVE-2024-370xx/CVE-2024-37094.json) (`2024-12-02T14:15:05.967`)
|
||||
- [CVE-2024-40859](CVE-2024/CVE-2024-408xx/CVE-2024-40859.json) (`2024-12-02T14:59:47.877`)
|
||||
- [CVE-2024-44191](CVE-2024/CVE-2024-441xx/CVE-2024-44191.json) (`2024-12-02T15:00:03.333`)
|
||||
- [CVE-2024-45766](CVE-2024/CVE-2024-457xx/CVE-2024-45766.json) (`2024-12-02T14:37:32.017`)
|
||||
- [CVE-2024-45767](CVE-2024/CVE-2024-457xx/CVE-2024-45767.json) (`2024-12-02T14:32:37.183`)
|
||||
- [CVE-2024-48957](CVE-2024/CVE-2024-489xx/CVE-2024-48957.json) (`2024-12-02T14:58:55.063`)
|
||||
- [CVE-2024-48958](CVE-2024/CVE-2024-489xx/CVE-2024-48958.json) (`2024-12-02T14:58:37.067`)
|
||||
- [CVE-2024-51636](CVE-2024/CVE-2024-516xx/CVE-2024-51636.json) (`2024-12-02T14:15:06.113`)
|
||||
- [CVE-2024-52336](CVE-2024/CVE-2024-523xx/CVE-2024-52336.json) (`2024-12-02T14:15:06.410`)
|
||||
- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2024-12-02T15:15:08.200`)
|
||||
- [CVE-2024-11051](CVE-2024/CVE-2024-110xx/CVE-2024-11051.json) (`2024-12-02T15:14:56.087`)
|
||||
- [CVE-2024-11700](CVE-2024/CVE-2024-117xx/CVE-2024-11700.json) (`2024-12-02T15:15:10.557`)
|
||||
- [CVE-2024-20130](CVE-2024/CVE-2024-201xx/CVE-2024-20130.json) (`2024-12-02T16:15:07.200`)
|
||||
- [CVE-2024-20131](CVE-2024/CVE-2024-201xx/CVE-2024-20131.json) (`2024-12-02T16:15:07.387`)
|
||||
- [CVE-2024-20132](CVE-2024/CVE-2024-201xx/CVE-2024-20132.json) (`2024-12-02T16:15:07.557`)
|
||||
- [CVE-2024-20133](CVE-2024/CVE-2024-201xx/CVE-2024-20133.json) (`2024-12-02T16:15:07.737`)
|
||||
- [CVE-2024-20134](CVE-2024/CVE-2024-201xx/CVE-2024-20134.json) (`2024-12-02T16:15:07.907`)
|
||||
- [CVE-2024-20135](CVE-2024/CVE-2024-201xx/CVE-2024-20135.json) (`2024-12-02T16:15:08.097`)
|
||||
- [CVE-2024-20136](CVE-2024/CVE-2024-201xx/CVE-2024-20136.json) (`2024-12-02T16:15:08.260`)
|
||||
- [CVE-2024-20137](CVE-2024/CVE-2024-201xx/CVE-2024-20137.json) (`2024-12-02T16:15:08.433`)
|
||||
- [CVE-2024-20138](CVE-2024/CVE-2024-201xx/CVE-2024-20138.json) (`2024-12-02T16:15:08.603`)
|
||||
- [CVE-2024-20139](CVE-2024/CVE-2024-201xx/CVE-2024-20139.json) (`2024-12-02T16:15:08.770`)
|
||||
- [CVE-2024-21723](CVE-2024/CVE-2024-217xx/CVE-2024-21723.json) (`2024-12-02T16:15:08.967`)
|
||||
- [CVE-2024-45520](CVE-2024/CVE-2024-455xx/CVE-2024-45520.json) (`2024-12-02T16:15:11.293`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
283
_state.csv
283
_state.csv
@ -226312,9 +226312,9 @@ CVE-2023-34147,0,0,198e3225716af6193eb26e6bcbe7b5cdd685374207244a1df7861331267bf
|
||||
CVE-2023-34148,0,0,7d024bac19d717f8a780356fe18f6aa568718b5868fa92fcd0ef8516d21ca840,2023-06-30T17:53:51.130000
|
||||
CVE-2023-34149,0,0,5f8464856c1cae67e8901b2028d326e2003933ed78350ebbe96bedb97b9b2722,2023-07-06T19:15:10.460000
|
||||
CVE-2023-34150,0,0,7be44c69cc4685a15ba704c5ec25bf1fa1aa7d4868d59dfe1ea8808a130bcf19,2024-08-02T16:16:07.070000
|
||||
CVE-2023-34151,0,1,99655761750ec80cccabb2190e2dff1e94a4afa7357d176a172dac871102bb71,2024-12-02T14:34:36.813000
|
||||
CVE-2023-34152,0,1,334da3b68a0c4bcbcd97713b755f74eb3f582cefd06ffbd3f5072dbe60ebbbcf,2024-12-02T14:34:31.887000
|
||||
CVE-2023-34153,0,1,ed14304b1e6ccf8b58695c524d173bf8dc75bbd828fca06ae43e772c59aef8ea,2024-12-02T14:34:41.337000
|
||||
CVE-2023-34151,0,0,99655761750ec80cccabb2190e2dff1e94a4afa7357d176a172dac871102bb71,2024-12-02T14:34:36.813000
|
||||
CVE-2023-34152,0,0,334da3b68a0c4bcbcd97713b755f74eb3f582cefd06ffbd3f5072dbe60ebbbcf,2024-12-02T14:34:31.887000
|
||||
CVE-2023-34153,0,0,ed14304b1e6ccf8b58695c524d173bf8dc75bbd828fca06ae43e772c59aef8ea,2024-12-02T14:34:41.337000
|
||||
CVE-2023-34154,0,0,05d6e2f49001330ff46c54f071f6db28c5ab796e45bdc3dc0f1ed8fc05d6ff97,2023-06-26T17:51:03.840000
|
||||
CVE-2023-34155,0,0,e43d6eb4b537096863e39658c71b8a6e787fa3706e81ef2d985affa41b828ac8,2023-06-27T09:24:48.237000
|
||||
CVE-2023-34156,0,0,361646aa2d04d92372e5aa6931a49ce3d3814ed937de7aaff12f079256ecf3f7,2023-06-27T09:24:17.830000
|
||||
@ -226352,7 +226352,7 @@ CVE-2023-34184,0,0,6b37f9feddce7aba2ca90f92dc8f3c51f7944b89051b1ad282cbb6150f423
|
||||
CVE-2023-34185,0,0,563c7630349ce4fda4e82697db7e4483c6146d83421789afbaa13e7c27db6e75,2023-07-18T18:21:37.307000
|
||||
CVE-2023-34186,0,0,c601dee59d899685f4dac19bfea3727b06f03a27cdd0c5191a1823bf6439e20d,2024-05-17T18:36:05.263000
|
||||
CVE-2023-34187,0,0,b30d3a29f02d088f2a343a02dc8816c3ac4f2ba6ee34c5e343a68b83e34759b6,2023-08-31T21:02:52.107000
|
||||
CVE-2023-34188,0,0,01175c77514202c3e82378761747d0f87086971fab1640482ef765cb32978b91,2023-09-06T17:15:50.190000
|
||||
CVE-2023-34188,0,1,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000
|
||||
CVE-2023-34189,0,0,852069858a43c3b830dd45f0d9f89b339d989703c15bd2112166348e71f45a18,2023-08-02T18:51:03.527000
|
||||
CVE-2023-3419,0,0,dc2398e0d232c730deb43c680eb3a3837a602d0fa3030139e39cb20d21ad8852,2024-08-19T12:59:59.177000
|
||||
CVE-2023-34192,0,0,85d981e01ef8ef1e0680768bc42005fded3d3ef3dece16cd8a3b1675004ee8a0,2023-07-12T23:08:32.340000
|
||||
@ -237007,7 +237007,7 @@ CVE-2023-4879,0,0,245c5838bc8e554dd27a373a6083696d5edb3e8ea87398d1d9ca7c6e5aa0ff
|
||||
CVE-2023-48791,0,0,64aa589d33601cfd147e8571ed4a080a7c45a8b01329dc5837136a4402406668,2023-12-15T20:09:24.010000
|
||||
CVE-2023-48792,0,0,5c2aee35948bf52c45856f04423cf3034c4db1705c4352d4c0ffe18b53f16d95,2024-07-03T01:42:23.563000
|
||||
CVE-2023-48793,0,0,e12fc34ba64c9d158dedcc17eac798e8672651aef8eadf95d2da8c11d5f8f26b,2024-07-03T01:42:24.367000
|
||||
CVE-2023-48795,0,1,9f573930b8ec65c3868966cd2ddd54cbe66cadece3f6303e1885a670127a5d9a,2024-12-02T14:54:27.177000
|
||||
CVE-2023-48795,0,0,9f573930b8ec65c3868966cd2ddd54cbe66cadece3f6303e1885a670127a5d9a,2024-12-02T14:54:27.177000
|
||||
CVE-2023-48796,0,0,9eda200b3ff52f25078cb00716f1db333a7072a5aaba6a17d3fab0872160a5b8,2023-12-01T20:14:35.870000
|
||||
CVE-2023-48799,0,0,1d1065023c755b0ef111bb9821d69d31e2c58684086396f923386090db5b3cfa,2023-12-07T20:14:48.190000
|
||||
CVE-2023-48800,0,0,65e1497c037bd1bf664b19905b3cbfe79f0e133572d0fb6812917add4f2fd9b5,2023-12-07T20:43:31.520000
|
||||
@ -243311,6 +243311,7 @@ CVE-2024-10898,0,0,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372
|
||||
CVE-2024-10899,0,0,3af5ea7b90e5da0230215c5076c9eff9b3749f9f5f947443d89625612842d08a,2024-11-26T21:01:21.643000
|
||||
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000
|
||||
CVE-2024-10905,1,1,e98ffff37b5956a2ad6c437472b8f53d76d0603bed01c95ada00a17c9ce7eb4b,2024-12-02T15:15:10.240000
|
||||
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10913,0,0,4e9b29333972ed20a30c4eccde2c9645761370bd1f3d0211dcdd27a3f9c3d9cf,2024-11-20T14:15:17.253000
|
||||
CVE-2024-10914,0,0,0e11c1731905763ffc173784369687971adc0677422c26a81c4aa2918d85e560,2024-11-24T15:15:06.090000
|
||||
@ -243405,7 +243406,7 @@ CVE-2024-11047,0,0,64dbad14a794669b828bb44eebca3fde6ac51457cfee02dad21b39b098487
|
||||
CVE-2024-11048,0,0,21786d98bafe82af70b0d13927da0cfc2a5e251397b591082c79052adc605aee,2024-11-13T20:53:55.113000
|
||||
CVE-2024-11049,0,0,efe77d054e00096c249033caeded95aa45069f1f11b699edbd4a58681a130c8a,2024-11-23T01:41:19.207000
|
||||
CVE-2024-11050,0,0,4a557ebc68e4a21833dd3972056655a89812d1110bd037fcaf7747ecf814996b,2024-11-23T01:38:15.047000
|
||||
CVE-2024-11051,0,0,eb9e15965e4cd0c6f388b6eb1187188afb18b6da215e4b4c9a8311016e9cd0cc,2024-11-12T13:56:24.513000
|
||||
CVE-2024-11051,0,1,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000
|
||||
CVE-2024-11054,0,0,2b10f7eb7e0ea54cbdf2f44e8ccd2401488923bf3e8bbeb3c99a947af182af3e,2024-11-14T02:43:36.197000
|
||||
CVE-2024-11055,0,0,063f616f81ec8b41ac610800e9641fd71662778ce9165238c4e4d73be7647e35,2024-11-14T15:18:45.933000
|
||||
CVE-2024-11056,0,0,6e0160117ff4187f70de2c20437329aad36979ea68e9d50c9569d1405a688157,2024-11-14T15:21:09.907000
|
||||
@ -243799,7 +243800,7 @@ CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2
|
||||
CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
|
||||
CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
|
||||
CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000
|
||||
CVE-2024-11700,0,0,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000
|
||||
CVE-2024-11700,0,1,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000
|
||||
CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11703,0,0,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000
|
||||
@ -243879,7 +243880,7 @@ CVE-2024-11967,0,0,12f18dfc45eb819820254e66461b73c23a82321abe05a31382bf89c4ef0ee
|
||||
CVE-2024-11968,0,0,da1eb41fd3caaae1d6edfd3659687335ef8ca5c9c6a02406ba4c7be157fe3497,2024-11-28T18:15:07.980000
|
||||
CVE-2024-11969,0,0,328ae06406886fb66d7ac1b2c34b1818381f0d888a340c497ddc215ced06af80,2024-11-28T16:15:07.190000
|
||||
CVE-2024-1197,0,0,eee502956c194e641ee01f282e886cb95c42c3ca82a247ebe6baa4a7059b14c0,2024-05-17T02:35:18.363000
|
||||
CVE-2024-11970,0,1,1a849bf68450bf6823e4c6c28effecbfa7f1d9d228ab32bedb6122aff4f177bb,2024-12-02T14:48:39.960000
|
||||
CVE-2024-11970,0,0,1a849bf68450bf6823e4c6c28effecbfa7f1d9d228ab32bedb6122aff4f177bb,2024-12-02T14:48:39.960000
|
||||
CVE-2024-11971,0,0,38215aae1affbb1fe3b0b911c5ff0552bf6ce1619ab76a58fad7d4415b59c88a,2024-11-28T22:15:15.090000
|
||||
CVE-2024-11978,0,0,82a503c1ccc829c5aa4edddd9a1368db8d8d07e5bd911457d7693a4c582d1965,2024-11-29T03:15:14.700000
|
||||
CVE-2024-11979,0,0,a7d9158b13addb102e25d626e75f83d1385a44201d3dac6e49beea06afd7775f,2024-11-29T03:15:15.653000
|
||||
@ -243901,7 +243902,7 @@ CVE-2024-12001,0,0,d124c0f10f30b54eb4f74d57e35bd484e6cb76bb299b65c3d619c3385b273
|
||||
CVE-2024-12002,0,0,2d664898f022b9ee65d7e21df2d171082c6696d82f0f74082488bdac27e9a6cc,2024-11-30T13:15:04.610000
|
||||
CVE-2024-12007,0,0,d09eb162fd0802cb9d12367e01f06496d503cbf35d3d8593ef98baeac09d1ac1,2024-12-01T23:15:05.310000
|
||||
CVE-2024-1201,0,0,f9834193bbb62b403f23d3357a53cc3ad9bb6173e269e5c9bf81a47c0a1a0786,2024-02-09T19:27:29.517000
|
||||
CVE-2024-12015,1,1,76bde5ba443e4cef655d444ed6b12009e494b1530b8cc5faad4f131977067c23,2024-12-02T14:15:05.383000
|
||||
CVE-2024-12015,0,0,76bde5ba443e4cef655d444ed6b12009e494b1530b8cc5faad4f131977067c23,2024-12-02T14:15:05.383000
|
||||
CVE-2024-1202,0,0,6132da5e9762048f130f38f4ec670738f94221153725a0b95c9666bf5c59cb16,2024-08-01T19:15:32.277000
|
||||
CVE-2024-1203,0,0,b776394b4b874eaeeae3e5b604198862b49ad905e4e26e755c608f17ba381dab,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1204,0,0,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000
|
||||
@ -244787,16 +244788,16 @@ CVE-2024-20127,0,0,191445c8421ac764bafa609e191240e08a49a9b03cf7c2f97161e0ac39e8f
|
||||
CVE-2024-20128,0,0,fd4f49b631373e0791fe4bb327ef73d8f0d2affdeeb231166beab6965fc15222,2024-12-02T04:15:04.967000
|
||||
CVE-2024-20129,0,0,671726aba2b1095472532326d37fd302eed94fd6211ea01542506d4087187d34,2024-12-02T04:15:05.073000
|
||||
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
|
||||
CVE-2024-20130,0,0,c5c61b42999586eb6524adf7fc57c7a4dc342ecee029309ce1d74b441655b6a6,2024-12-02T04:15:05.190000
|
||||
CVE-2024-20131,0,0,e8bf468034b877700f2f815db730ea01b9fb33b2f2b0fd1889826015a8b961cf,2024-12-02T04:15:05.337000
|
||||
CVE-2024-20132,0,0,9373b009841b6e7e2bc7798ff8b4105dc55369c566645250d6e8c88a510d00d2,2024-12-02T04:15:05.460000
|
||||
CVE-2024-20133,0,0,c9b8fcaac5b72964bffdd7bdbd43f33dd0d5445990becc6ef33b45a084beb516,2024-12-02T04:15:05.567000
|
||||
CVE-2024-20134,0,0,10e8a3a9fd2b91d09bd084ecc2c34261009ca68c983807b8ba80b90d62432e28,2024-12-02T04:15:05.693000
|
||||
CVE-2024-20135,0,0,d899dd8e63efcc84e4786ff33cc1dfe5ce8a481f68881279ba65dc626a2f9818,2024-12-02T04:15:05.797000
|
||||
CVE-2024-20136,0,0,a6b9cf231f91cccb8fba39afa78239f0aaf973583a4f0691ff23291adfe70f63,2024-12-02T04:15:05.920000
|
||||
CVE-2024-20137,0,0,e357ea18b28bddcd6237829f6d2454e40f9e38cb85e81244650de6b005c419f8,2024-12-02T04:15:06.030000
|
||||
CVE-2024-20138,0,0,ae6e031e4fd01ba7830025a65e56a373917971371e3f604b52e691eba9d87548,2024-12-02T04:15:06.133000
|
||||
CVE-2024-20139,0,0,58e35926fd10f61748cf5c6dd1def0172c7194c5c66e70664d0177296fe29614,2024-12-02T04:15:06.247000
|
||||
CVE-2024-20130,0,1,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000
|
||||
CVE-2024-20131,0,1,1e64bc7a3127731196d2fa87109d2384b3e91b26839694666fe149e4e5b53554,2024-12-02T16:15:07.387000
|
||||
CVE-2024-20132,0,1,f4cc91744b8a6b3af86e4e8d184a868c2fc84388570327f87327ebff157bcaa8,2024-12-02T16:15:07.557000
|
||||
CVE-2024-20133,0,1,fd2d9fef2f12a32cb33536969e0da117c7ff6a7c081a67ea7cd40b5a5f6d630d,2024-12-02T16:15:07.737000
|
||||
CVE-2024-20134,0,1,1d4bc63f9eb4412de5ebc6bed4a6fab51dfdc46af786282811b440ef7d69407c,2024-12-02T16:15:07.907000
|
||||
CVE-2024-20135,0,1,57119bf972026e38996ca755a3f316af2b3402cc04a9db9eba30e1da211f5a53,2024-12-02T16:15:08.097000
|
||||
CVE-2024-20136,0,1,974b7b8826843336352c8b21d2c949dee3a935c2a7f163750d3cfbd49e510cb7,2024-12-02T16:15:08.260000
|
||||
CVE-2024-20137,0,1,fe4bf8bc17a27800d12c2afc646a8a72b841cdaf312d08e530acc587ecfcadc2,2024-12-02T16:15:08.433000
|
||||
CVE-2024-20138,0,1,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000
|
||||
CVE-2024-20139,0,1,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000
|
||||
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
|
||||
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
|
||||
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
|
||||
@ -246151,7 +246152,7 @@ CVE-2024-21703,0,0,08d952643f27d625e1a34daf2a14cf006a2e6417e07616e354cd3cfc64f9f
|
||||
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
|
||||
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
|
||||
CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000
|
||||
CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bce7b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-21723,0,1,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
|
||||
CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000
|
||||
CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000
|
||||
CVE-2024-21726,0,0,258e12429393fbdcadf90bc903b6c4eaa784036f8d4a014cbe225655bb0298a5,2024-11-04T21:35:03.690000
|
||||
@ -251827,6 +251828,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7
|
||||
CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000
|
||||
CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000
|
||||
CVE-2024-29645,1,1,998bedeba8b13cb24165783aaa6044be39300d70fde69663c8a7c6d0c6cecfa8,2024-12-02T15:15:10.960000
|
||||
CVE-2024-2965,0,0,31194867e3c8375be8a7a72353070c45d11fab5833d7a91937e736bd4749a53d,2024-11-03T17:15:13.107000
|
||||
CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000
|
||||
CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000
|
||||
@ -253131,7 +253133,7 @@ CVE-2024-31244,0,0,d6bd1922a515e9e257631e6ccae0b71daa087818a03a04b5e238d9a4d6348
|
||||
CVE-2024-31245,0,0,9494828f7ed62996db86d58f22c317374ab4a0f02ae2927fe6308bd197a09e99,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31246,0,0,f90c299bc88290b1a3ba848f1c038167145513c9b72a33c76006f09f98c7dffc,2024-10-05T01:59:34.870000
|
||||
CVE-2024-31247,0,0,ccecdcd4d60867cc44b0f68ee01066e569d6ebe211a4fbbc8c94f5280ede9aa6,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31248,0,1,6f2a80ff5a8ee75c0625c495eeae2bb150e9004a8f4e9a6f58616e8ef671ab84,2024-12-02T14:03:36.677000
|
||||
CVE-2024-31248,0,0,6f2a80ff5a8ee75c0625c495eeae2bb150e9004a8f4e9a6f58616e8ef671ab84,2024-12-02T14:03:36.677000
|
||||
CVE-2024-31249,0,0,c303e93c7d1feb8f0499ce4b625c2c8fc9dc44bc2e75c2bd338f7ab1fdea1fd4,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3125,0,0,78ae7b76247fdcfaa00f4d4fa57053e68edc10f0c2d0c800767afda822154b12,2024-05-17T02:39:43.820000
|
||||
CVE-2024-31250,0,0,1e8c8f3e227e8fdf738c50120ff46f1a018556e80e43dea48ad17c321cb951db,2024-04-15T13:15:51.577000
|
||||
@ -253460,6 +253462,7 @@ CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdac
|
||||
CVE-2024-31652,0,0,d3a39df49d7c9a4ac8f46bb863860ab64051b06ba513b7c983446092a2722415,2024-10-30T17:35:05.700000
|
||||
CVE-2024-3166,0,0,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000
|
||||
CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000
|
||||
CVE-2024-31669,1,1,31ec3184aae1ad222bbbb1a4594b8bb1b152b5cce59b11c364f48ace0bb1fce5,2024-12-02T15:15:11.113000
|
||||
CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000
|
||||
CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000
|
||||
CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000
|
||||
@ -256367,7 +256370,7 @@ CVE-2024-35692,0,0,c23d33c37503a8e8f25e1564013ecb45490977176b56ba09aed4252ab52c3
|
||||
CVE-2024-35693,0,0,472b85635f751bbb73374106d257ae5cae23d72b0e5b2e1e0e0ebb17ffd7f85e,2024-08-29T21:17:56.007000
|
||||
CVE-2024-35694,0,0,c34dfc60695ab5f6cf2c79d36f43d21428a300388d41d67f360c32c074abcba5,2024-08-29T21:23:01.367000
|
||||
CVE-2024-35695,0,0,ab44d026f8bf756f1fe3ab06413a866da24ddfd1c83d36e6b1b31e22da685f2e,2024-08-29T21:36:20.590000
|
||||
CVE-2024-35696,0,1,8c5d5314b48da0ca00a285810d61dc8f8c306f8d7e365147e6b1966e410d2c71,2024-12-02T14:28:17.550000
|
||||
CVE-2024-35696,0,0,8c5d5314b48da0ca00a285810d61dc8f8c306f8d7e365147e6b1966e410d2c71,2024-12-02T14:28:17.550000
|
||||
CVE-2024-35697,0,0,ed26483e03d41cbda2679aca1662298d32b2cfe43e2a2b534c7112e53fc75b2f,2024-08-29T17:13:49.557000
|
||||
CVE-2024-35698,0,0,ce5805ea174c7d79028851b201d10370f7d8980a44f785817681e8858e08f43b,2024-08-29T17:11:36.290000
|
||||
CVE-2024-35699,0,0,bb29147c315960e5ea1d6cdd4347723d85b9a10f4d38a78e1ce06e8ac950d004,2024-08-29T17:09:55.017000
|
||||
@ -257497,7 +257500,7 @@ CVE-2024-37089,0,0,4079e469a0b9c8eff7513f19c004b5889c685b5a744b48949620385f99d2c
|
||||
CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000
|
||||
CVE-2024-37091,0,0,b626c72d25f84f9219d28a104cd2d18472b59c6cd0ed8347ffeee08b9e2b4719,2024-10-20T12:15:02.977000
|
||||
CVE-2024-37092,0,0,5d6ec5440d10a9301dd3905013853ef3f8ec0563d3da8d9c4e2e50eb50e7d655,2024-08-20T20:15:40.147000
|
||||
CVE-2024-37094,0,1,461a573e0402bc0e49439ada6f1ee204f3ab4cdbf605a4d834cb0d003291654a,2024-12-02T14:15:05.967000
|
||||
CVE-2024-37094,0,0,461a573e0402bc0e49439ada6f1ee204f3ab4cdbf605a4d834cb0d003291654a,2024-12-02T14:15:05.967000
|
||||
CVE-2024-37095,0,0,3408bf6ac4dd919459f933e8f521bf6c518da1c069e237e80314c34a9f6761a1,2024-11-01T20:24:53.730000
|
||||
CVE-2024-37096,0,0,23220101781d6f82b516c48f773cc5677aa7466abd0e4fbb5bfa71b95dd859f9,2024-11-01T20:24:53.730000
|
||||
CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000
|
||||
@ -258940,6 +258943,7 @@ CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d
|
||||
CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000
|
||||
CVE-2024-38821,0,0,bb251b2231aa5ec8776de9aee89d7b4c729d7a41bc68ac186fa12d01aa093b81,2024-10-28T13:58:09.230000
|
||||
CVE-2024-38826,0,0,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000
|
||||
CVE-2024-38827,1,1,3874c464e716661a48f3e22603ab20b7e36bf129e4ab27a217f4348c4a349acc,2024-12-02T15:15:11.270000
|
||||
CVE-2024-38828,0,0,0c8d1b5128144a8d7d124f30bfb82a89e19f39cd304dc10431ed647af64ddcb3,2024-11-18T17:11:17.393000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-38830,0,0,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000
|
||||
@ -260112,7 +260116,7 @@ CVE-2024-40853,0,0,406098e9dedf197de0514938c4993bfbf477e600f2b7ec8507b9e9ccf473b
|
||||
CVE-2024-40855,0,0,c4009c31deae8d3429e902b0eee1277607cb2dfde34abfa3e4e0ee995107e214,2024-10-30T19:35:15.737000
|
||||
CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000
|
||||
CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000
|
||||
CVE-2024-40859,0,1,46749f00540a137f4fa073cd49e6c82184e33775d43533189720fd97419e33a7,2024-12-02T14:59:47.877000
|
||||
CVE-2024-40859,0,0,46749f00540a137f4fa073cd49e6c82184e33775d43533189720fd97419e33a7,2024-12-02T14:59:47.877000
|
||||
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
|
||||
CVE-2024-40860,0,0,e5ead227110aa19c4042e26e364c8228b4489bfdf6f0431771df4e3ccb8a59ef,2024-09-25T13:41:05.177000
|
||||
CVE-2024-40861,0,0,7204d4c395d904aba2687d268d077938e2cf1cd101497574171fb4f0b590be98,2024-09-20T12:31:20.110000
|
||||
@ -262632,7 +262636,7 @@ CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136f
|
||||
CVE-2024-44189,0,0,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6842,2024-09-24T18:33:02.477000
|
||||
CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000
|
||||
CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000
|
||||
CVE-2024-44191,0,1,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
|
||||
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
|
||||
CVE-2024-44193,0,0,f17ea6ad74232cbfafb0dc23bcf4b401977d8786ab1d3a877fc57ebc775c3168,2024-10-04T13:50:43.727000
|
||||
CVE-2024-44194,0,0,a72a729395908679d65238c4629e953464a1555a31cfb5252936c5c793c0aaa9,2024-10-30T17:16:24.380000
|
||||
CVE-2024-44196,0,0,37fcda4793ee95ace3154d44d1f0e6b9e5246a54065c19ee694bcd44652d1ff0,2024-11-14T02:15:57.873000
|
||||
@ -263395,7 +263399,7 @@ CVE-2024-45511,0,0,a33b00ed5286e02a99a5d7d32b95a722e842936b42cb3272cb3598da23178
|
||||
CVE-2024-45518,0,0,9735413fa02ac827dc734eb603d392ab15d93caac171e362b785c2b23afa3a6f,2024-10-30T21:23:59.893000
|
||||
CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45520,0,0,17c8a5ee333942b254f1fb713e55b8c00193a6e6a8baa3e94cf38a9a53a48bbc,2024-12-01T21:15:04.190000
|
||||
CVE-2024-45520,0,1,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
|
||||
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
|
||||
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
|
||||
CVE-2024-45526,0,0,f14e1fcc5198e28bcb9f7b3a43daa36e99814812ca109c1c007380ac29ec0aa1,2024-10-23T19:35:10.713000
|
||||
@ -263510,8 +263514,8 @@ CVE-2024-4576,0,0,d47b5037987d3332638a14c0dba5a2bae073fe818289e35d14fa9c3b2b6479
|
||||
CVE-2024-45763,0,0,5f7d7ac3b08fad38dc089defb7985eaf73e97a507d7a6c2cb5624891053958df,2024-11-13T16:52:22.340000
|
||||
CVE-2024-45764,0,0,29e13cb6a03fff5cdc6c3ef68de77f19b0779a31e97cc9e0051ab172b8bd0716,2024-11-13T19:08:29.580000
|
||||
CVE-2024-45765,0,0,c6c653a57910c9e5fa2a5cae23f65417dd9558dca2f1055224c4f87c49aae5ed,2024-11-13T19:06:45.377000
|
||||
CVE-2024-45766,0,1,cb4c3c84c88cb7602021384e9baedee491595bbaa7b7b0edb58660f7b54e9a70,2024-12-02T14:37:32.017000
|
||||
CVE-2024-45767,0,1,e26b6101fb9c066a1fced0975b23e5489dc0e2cf80a407cde21f162badb51be3,2024-12-02T14:32:37.183000
|
||||
CVE-2024-45766,0,0,cb4c3c84c88cb7602021384e9baedee491595bbaa7b7b0edb58660f7b54e9a70,2024-12-02T14:37:32.017000
|
||||
CVE-2024-45767,0,0,e26b6101fb9c066a1fced0975b23e5489dc0e2cf80a407cde21f162badb51be3,2024-12-02T14:32:37.183000
|
||||
CVE-2024-45769,0,0,68a2a61eadf42c80605ce04117a3301a4bc932c0f0fb7e1da09aa7ee31344d24,2024-11-12T18:15:35.427000
|
||||
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
|
||||
CVE-2024-45770,0,0,9c8c7fc9fdf0b72fbb9d716faed9837ec24c65464a5ce38c4a50fad0b84880d1,2024-11-12T18:15:35.643000
|
||||
@ -264119,6 +264123,11 @@ CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4
|
||||
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
|
||||
CVE-2024-46902,0,0,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000
|
||||
CVE-2024-46903,0,0,c5646f2eca42dcdf58f6c7cfced2b89da0d0fd3b53651fe38e295ee3b07935b5,2024-11-01T19:35:27.957000
|
||||
CVE-2024-46905,1,1,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000
|
||||
CVE-2024-46906,1,1,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000
|
||||
CVE-2024-46907,1,1,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000
|
||||
CVE-2024-46908,1,1,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000
|
||||
CVE-2024-46909,1,1,b47bd7ac65aae0a6ebdfdafd0dc3e7316ffb6c2826608679aaa969584ac03798,2024-12-02T15:15:12.120000
|
||||
CVE-2024-46911,0,0,b22e051b0f3c36b9606e67ab41355b75022485dd9540e72995287ed3b5f31c90,2024-11-01T17:35:07.877000
|
||||
CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000
|
||||
CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000
|
||||
@ -265322,8 +265331,8 @@ CVE-2024-48952,0,0,7de8f0ffdb763541ab8ce6157f5917743308ff40ebc9162f0a4d60fe92d34
|
||||
CVE-2024-48953,0,0,79c92dfcc1eac07994739d9fdc765ebb791baa2ff43aa6b181a30c7df184694e,2024-11-08T19:01:03.880000
|
||||
CVE-2024-48954,0,0,63b3f4d2836dcc48091174845b5c1b8643f6a2efd9748a0593b560920e78e084,2024-11-08T19:01:03.880000
|
||||
CVE-2024-48955,0,0,84de7be29efb285e46fc24626f552063b1e23de7f9dbbe9943b534f430e239e9,2024-11-01T12:57:35.843000
|
||||
CVE-2024-48957,0,1,5fcdfcbeaa463107575a01d5356d8785a9ae755870410379189773fce30e9e71,2024-12-02T14:58:55.063000
|
||||
CVE-2024-48958,0,1,4bd7d702f5c7b44ad567fb715dd16e3f71bc515beb7581dcafc207e9d8028dfc,2024-12-02T14:58:37.067000
|
||||
CVE-2024-48957,0,0,5fcdfcbeaa463107575a01d5356d8785a9ae755870410379189773fce30e9e71,2024-12-02T14:58:55.063000
|
||||
CVE-2024-48958,0,0,4bd7d702f5c7b44ad567fb715dd16e3f71bc515beb7581dcafc207e9d8028dfc,2024-12-02T14:58:37.067000
|
||||
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
|
||||
CVE-2024-48962,0,0,14108fb7b73c0b556a184000052b7efc5bcd8ed17ac4fdb955d4d3bd57456592,2024-11-19T16:35:14.930000
|
||||
CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000
|
||||
@ -267001,7 +267010,7 @@ CVE-2024-51632,0,0,87fad758525004f92b88b536b8c27aff671fa8f7e477425d950b8ceda3786
|
||||
CVE-2024-51633,0,0,ab393eedb0e80d07a49a4487d5453aa1e835119ca29b1bb333524a32d355d429,2024-11-19T21:57:32.967000
|
||||
CVE-2024-51634,0,0,5551df4111063f79c80f45a9fb3ddb129d80648222538b01bef381c28a31b983,2024-11-19T21:57:32.967000
|
||||
CVE-2024-51635,0,0,d5516ce0cdac3298ee81b3844e919736718b17175023ec6bb1c2bb190d6edfc9,2024-11-19T21:57:32.967000
|
||||
CVE-2024-51636,0,1,3aaa551b36e73792d7567532256f3bf6656ad181fee958a5f72303a1ecc243aa,2024-12-02T14:15:06.113000
|
||||
CVE-2024-51636,0,0,3aaa551b36e73792d7567532256f3bf6656ad181fee958a5f72303a1ecc243aa,2024-12-02T14:15:06.113000
|
||||
CVE-2024-51637,0,0,2cb3f79f6b2ca81a1706ba6f61023d68321f37eaa82fecbe7301abd27dfed33a,2024-11-19T21:57:32.967000
|
||||
CVE-2024-51638,0,0,305fcbfa70d32882ab369962766db28a91a50ef3f65dd5e460149e1ffc8e609e,2024-11-19T21:57:32.967000
|
||||
CVE-2024-51639,0,0,2651e0f528caf9d7ddb4394ab6753df06682b03424a2ec033106c12d483149ca,2024-11-19T21:57:32.967000
|
||||
@ -267254,7 +267263,7 @@ CVE-2024-51897,0,0,7af160c26a8eab6d1292ed66c346916bc23dc809fb55b05ad17b230c4e66e
|
||||
CVE-2024-51898,0,0,7d6b408e02cf476177e2ee8596272af601038bf9941353af8f1d4acd09aa6c8b,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51899,0,0,902a276081bf2d9ed5344710e0e77e28a363d244033c8781dac2e21740c3dfc9,2024-11-19T21:56:45.533000
|
||||
CVE-2024-5190,0,0,d58b9fdaecdb1abec20ccf7764e52a460a4959870ee8917a6c4a9f4c686657e6,2024-05-22T03:15:08.273000
|
||||
CVE-2024-51900,1,1,badacb405c92269b37e2a451290dd43a4c8cbc001dde771fd2b2a812f963398e,2024-12-02T14:15:06.237000
|
||||
CVE-2024-51900,0,0,badacb405c92269b37e2a451290dd43a4c8cbc001dde771fd2b2a812f963398e,2024-12-02T14:15:06.237000
|
||||
CVE-2024-51901,0,0,fe9569935e40c0112f410f7d6478fcefec0cdb856293fc5c3a3dc5c73b43b02f,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51902,0,0,9d10b45ca3b42a2dbd37bef0ae6acb43fd724502f4505049fa1ca9dac36b59cc,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51903,0,0,280cea4973a8e0b67d936c40c3b0e7998c13aa3732970dc92abf9a6554add514,2024-11-19T21:56:45.533000
|
||||
@ -267404,7 +267413,7 @@ CVE-2024-52318,0,0,2bba437e59239c6e36ab9227be3e173d0f3c7cc38d614e024ac840e507a6b
|
||||
CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000
|
||||
CVE-2024-52323,0,0,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000
|
||||
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
|
||||
CVE-2024-52336,0,1,9862ee2f08b867c4aec9679fde3c34020806d6ea0e1bbe82d4d6575bb6602628,2024-12-02T14:15:06.410000
|
||||
CVE-2024-52336,0,0,9862ee2f08b867c4aec9679fde3c34020806d6ea0e1bbe82d4d6575bb6602628,2024-12-02T14:15:06.410000
|
||||
CVE-2024-52337,0,0,9656de207aa30a2d131aa04cba5e006cf8cd5efaccbbfa03406364f930f0e487,2024-12-02T08:15:07.793000
|
||||
CVE-2024-52338,0,0,9bcca0f5584def2789a1613da17d1dfa11f003cf9877e634fced8f070cd4a571,2024-11-29T15:15:17.550000
|
||||
CVE-2024-52339,0,0,a92fd5f858dc2ec0979f9ef9252c34f43da704c1fe29995d6e8479e981a2460e,2024-11-19T21:57:32.967000
|
||||
@ -267521,25 +267530,25 @@ CVE-2024-52449,0,0,ce90d5d55e8436b94a304efc19163b49c2f5473c38f99b1a35c1d69e33313
|
||||
CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa31702,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52450,0,0,002d848f8b202503bc5f349083e6360328b5ca35b8e488d4cb20477667418239,2024-11-20T12:15:22.203000
|
||||
CVE-2024-52451,0,0,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000
|
||||
CVE-2024-52452,1,1,bc13343fcbf76bb3829e38d8db3147826917da6cdd8876ae77531d9ebf19b86f,2024-12-02T14:15:06.550000
|
||||
CVE-2024-52453,1,1,58aba024649b67cdf665eb01918a80f1494450c78d3a4411a274ae5f3514bd8a,2024-12-02T14:15:06.697000
|
||||
CVE-2024-52454,1,1,2fd6a219eed38a4bc0ee579c8c751552c3f30c7f817d3a87601b6eb6bcc1b94a,2024-12-02T14:15:06.840000
|
||||
CVE-2024-52455,1,1,33dd3225e538e286028e3cbc3e276350d854ab06fa8b045ed5c8c191a8f87e44,2024-12-02T14:15:06.983000
|
||||
CVE-2024-52456,1,1,2f3133879862d0fe3e638d35022569034a9af171e0c8ed120e511dbf1776bfb8,2024-12-02T14:15:07.117000
|
||||
CVE-2024-52457,1,1,a709c2052b7ddba821142d57c4c7896d7a20113b3dc0192caa04e7cf0bb6f66f,2024-12-02T14:15:07.250000
|
||||
CVE-2024-52458,1,1,6502153a77f8617481cad7902ce81f668fc42b58dacb8485aecbddfe94bf492b,2024-12-02T14:15:07.380000
|
||||
CVE-2024-52459,1,1,55afeec3eeccc511235207b3771d1c6af16d6aa7896c8305d0fdbdcb38ef1b12,2024-12-02T14:15:07.513000
|
||||
CVE-2024-52452,0,0,bc13343fcbf76bb3829e38d8db3147826917da6cdd8876ae77531d9ebf19b86f,2024-12-02T14:15:06.550000
|
||||
CVE-2024-52453,0,0,58aba024649b67cdf665eb01918a80f1494450c78d3a4411a274ae5f3514bd8a,2024-12-02T14:15:06.697000
|
||||
CVE-2024-52454,0,0,2fd6a219eed38a4bc0ee579c8c751552c3f30c7f817d3a87601b6eb6bcc1b94a,2024-12-02T14:15:06.840000
|
||||
CVE-2024-52455,0,0,33dd3225e538e286028e3cbc3e276350d854ab06fa8b045ed5c8c191a8f87e44,2024-12-02T14:15:06.983000
|
||||
CVE-2024-52456,0,0,2f3133879862d0fe3e638d35022569034a9af171e0c8ed120e511dbf1776bfb8,2024-12-02T14:15:07.117000
|
||||
CVE-2024-52457,0,0,a709c2052b7ddba821142d57c4c7896d7a20113b3dc0192caa04e7cf0bb6f66f,2024-12-02T14:15:07.250000
|
||||
CVE-2024-52458,0,0,6502153a77f8617481cad7902ce81f668fc42b58dacb8485aecbddfe94bf492b,2024-12-02T14:15:07.380000
|
||||
CVE-2024-52459,0,0,55afeec3eeccc511235207b3771d1c6af16d6aa7896c8305d0fdbdcb38ef1b12,2024-12-02T14:15:07.513000
|
||||
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
|
||||
CVE-2024-52460,1,1,87f8de4fb3fab1fcc0df5618b7221ec6995e7325e8503015d6ba0eb1192cdc69,2024-12-02T14:15:07.653000
|
||||
CVE-2024-52461,1,1,bde36cecbc200ffe75ac528c9df661646e035db31a30bdbea7facb96b6eec1f4,2024-12-02T14:15:07.790000
|
||||
CVE-2024-52462,1,1,1e90660cc68a029bf2e5a099e092ea72c38a8f81deb2bc1e20234a6a34cf9162,2024-12-02T14:15:07.920000
|
||||
CVE-2024-52463,1,1,9ec2fe67aaaad39208b3421e4770afee11c942b11b07cff42ddb11baaf570225,2024-12-02T14:15:08.060000
|
||||
CVE-2024-52464,1,1,031bfdf41e345937a9ce7756b575ac3713282840fa3ca4cf756c521b99bb4a5c,2024-12-02T14:15:08.203000
|
||||
CVE-2024-52465,1,1,c9036b37facbb7454a9ddf2e86a6632906e042aa66e5a04c075cddc4674e7247,2024-12-02T14:15:08.340000
|
||||
CVE-2024-52466,1,1,878900695074605262b24c8c5022ef92d0aa56180ded5d79a557e300e606830c,2024-12-02T14:15:08.483000
|
||||
CVE-2024-52467,1,1,432b831d67d68137794f273f683f80722dfe00b9dd75984abc6c3b2e88ddbc0f,2024-12-02T14:15:08.623000
|
||||
CVE-2024-52468,1,1,49677279abc9e9bfe590e078b06da078900d69091d80136c560ec44d37561772,2024-12-02T14:15:08.770000
|
||||
CVE-2024-52469,1,1,29dfc335d1fa6e30d786d9c43bf1c443d1b2ec28197000ac250b34a50eda9466,2024-12-02T14:15:08.913000
|
||||
CVE-2024-52460,0,0,87f8de4fb3fab1fcc0df5618b7221ec6995e7325e8503015d6ba0eb1192cdc69,2024-12-02T14:15:07.653000
|
||||
CVE-2024-52461,0,0,bde36cecbc200ffe75ac528c9df661646e035db31a30bdbea7facb96b6eec1f4,2024-12-02T14:15:07.790000
|
||||
CVE-2024-52462,0,0,1e90660cc68a029bf2e5a099e092ea72c38a8f81deb2bc1e20234a6a34cf9162,2024-12-02T14:15:07.920000
|
||||
CVE-2024-52463,0,0,9ec2fe67aaaad39208b3421e4770afee11c942b11b07cff42ddb11baaf570225,2024-12-02T14:15:08.060000
|
||||
CVE-2024-52464,0,0,031bfdf41e345937a9ce7756b575ac3713282840fa3ca4cf756c521b99bb4a5c,2024-12-02T14:15:08.203000
|
||||
CVE-2024-52465,0,0,c9036b37facbb7454a9ddf2e86a6632906e042aa66e5a04c075cddc4674e7247,2024-12-02T14:15:08.340000
|
||||
CVE-2024-52466,0,0,878900695074605262b24c8c5022ef92d0aa56180ded5d79a557e300e606830c,2024-12-02T14:15:08.483000
|
||||
CVE-2024-52467,0,0,432b831d67d68137794f273f683f80722dfe00b9dd75984abc6c3b2e88ddbc0f,2024-12-02T14:15:08.623000
|
||||
CVE-2024-52468,0,0,49677279abc9e9bfe590e078b06da078900d69091d80136c560ec44d37561772,2024-12-02T14:15:08.770000
|
||||
CVE-2024-52469,0,0,29dfc335d1fa6e30d786d9c43bf1c443d1b2ec28197000ac250b34a50eda9466,2024-12-02T14:15:08.913000
|
||||
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52470,0,0,1056a8e921e929245f25b46d1b7e1a435f2ea3ebf136056d5c86cf3721d0fcd8,2024-11-20T15:15:10.810000
|
||||
CVE-2024-52471,0,0,d8b300ef69bfcbcb29a9b3cfe811f085cc9237972a5d7ecbe7073758ecdf12a9,2024-11-20T15:15:11.010000
|
||||
@ -267547,24 +267556,24 @@ CVE-2024-52472,0,0,ce2cab3222d8b621b2ba91024fe7494b0185a8ad2ea776f56b82d385cdb5d
|
||||
CVE-2024-52473,0,0,5130e33c6a3f3d98a0fc58c19aa3c06c52bf935b44f029d120d52d53c95d1f26,2024-11-20T15:15:11.443000
|
||||
CVE-2024-52474,0,0,f35fcf6a40f916b46540ce59f11d6616c6973d4c68f74d2e36288e6d9b91ae09,2024-11-28T11:15:48.860000
|
||||
CVE-2024-52475,0,0,048f430e71cfa65b9b5c0a7120c7de2380a4c37fa4de1243200864d13928e676,2024-11-28T11:15:49.230000
|
||||
CVE-2024-52476,1,1,24ce0352084a1dc0a16a98d084aee0b62026042152486af1e8ab7dae94c8d355,2024-12-02T14:15:09.050000
|
||||
CVE-2024-52477,1,1,f9b570c926f4427f2c4e7acb1de83616be97918287125ef3322b663c639dae1b,2024-12-02T14:15:09.193000
|
||||
CVE-2024-52478,1,1,979f89fe1bb5f90913cccfda292a213d9b495c6eca1a7fb83b205601eb767c82,2024-12-02T14:15:09.327000
|
||||
CVE-2024-52479,1,1,89aa81ba08f605f73250cbd52feffc34bbc76e14c68c0a4506229004da0a9e99,2024-12-02T14:15:09.467000
|
||||
CVE-2024-52476,0,0,24ce0352084a1dc0a16a98d084aee0b62026042152486af1e8ab7dae94c8d355,2024-12-02T14:15:09.050000
|
||||
CVE-2024-52477,0,0,f9b570c926f4427f2c4e7acb1de83616be97918287125ef3322b663c639dae1b,2024-12-02T14:15:09.193000
|
||||
CVE-2024-52478,0,0,979f89fe1bb5f90913cccfda292a213d9b495c6eca1a7fb83b205601eb767c82,2024-12-02T14:15:09.327000
|
||||
CVE-2024-52479,0,0,89aa81ba08f605f73250cbd52feffc34bbc76e14c68c0a4506229004da0a9e99,2024-12-02T14:15:09.467000
|
||||
CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000
|
||||
CVE-2024-52481,0,0,f36c3b5551b68230f3193251192fab779548872795820d8881203867d93fb076,2024-11-28T11:15:49.610000
|
||||
CVE-2024-52482,1,1,66920610aeb0672798a92bda44313435992ca28aa2ab7d80c6084695c5a3abd3,2024-12-02T14:15:09.603000
|
||||
CVE-2024-52483,1,1,421c897462ffa23d75cbdd42f2c4e63b8e0ddabed480eae9f0247c22337c0f3b,2024-12-02T14:15:09.740000
|
||||
CVE-2024-52484,1,1,869607d023f3bda61d41d3bfcafcce06b33151761bbfbb970f457a99612ecd1b,2024-12-02T14:15:09.883000
|
||||
CVE-2024-52486,1,1,8a0a52f7402b56decea279ee59c65abbc9180153b2a53d82bf2a98b901125841,2024-12-02T14:15:10.017000
|
||||
CVE-2024-52487,1,1,a975e2630c024ce5a1fd1828822b3b86d8c2b6f2a63e9b66d8ac8a9f129df561,2024-12-02T14:15:10.147000
|
||||
CVE-2024-52489,1,1,f3795b6d56a86a6d171db095c8c53aebf9469102a89b47da6cd1c56e1f0bce1b,2024-12-02T14:15:10.320000
|
||||
CVE-2024-52482,0,0,66920610aeb0672798a92bda44313435992ca28aa2ab7d80c6084695c5a3abd3,2024-12-02T14:15:09.603000
|
||||
CVE-2024-52483,0,0,421c897462ffa23d75cbdd42f2c4e63b8e0ddabed480eae9f0247c22337c0f3b,2024-12-02T14:15:09.740000
|
||||
CVE-2024-52484,0,0,869607d023f3bda61d41d3bfcafcce06b33151761bbfbb970f457a99612ecd1b,2024-12-02T14:15:09.883000
|
||||
CVE-2024-52486,0,0,8a0a52f7402b56decea279ee59c65abbc9180153b2a53d82bf2a98b901125841,2024-12-02T14:15:10.017000
|
||||
CVE-2024-52487,0,0,a975e2630c024ce5a1fd1828822b3b86d8c2b6f2a63e9b66d8ac8a9f129df561,2024-12-02T14:15:10.147000
|
||||
CVE-2024-52489,0,0,f3795b6d56a86a6d171db095c8c53aebf9469102a89b47da6cd1c56e1f0bce1b,2024-12-02T14:15:10.320000
|
||||
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
|
||||
CVE-2024-52490,0,0,2f72bf6f16e7c1ef88a5ad166ff8106f5613b7783eca5a9de13741c356393c41,2024-11-28T11:15:49.980000
|
||||
CVE-2024-52491,1,1,613ae9d1031fdb253bb0bb1cd51ed7581b825754c52cbd0063442090fc1b7131,2024-12-02T14:15:10.483000
|
||||
CVE-2024-52492,1,1,18e87e530f0418953a743771c45592e2b024ec189c852fa405f0e68051862e41,2024-12-02T14:15:10.617000
|
||||
CVE-2024-52493,1,1,8a4e3c973874adabd430340b8254b92f19df65bc9cd9b66492a3b48d711f1770,2024-12-02T14:15:10.760000
|
||||
CVE-2024-52494,1,1,bf5dd1b631179b8d9daa1278ac8f984ff6df107e65e931981f5b743066661f07,2024-12-02T14:15:10.897000
|
||||
CVE-2024-52491,0,0,613ae9d1031fdb253bb0bb1cd51ed7581b825754c52cbd0063442090fc1b7131,2024-12-02T14:15:10.483000
|
||||
CVE-2024-52492,0,0,18e87e530f0418953a743771c45592e2b024ec189c852fa405f0e68051862e41,2024-12-02T14:15:10.617000
|
||||
CVE-2024-52493,0,0,8a4e3c973874adabd430340b8254b92f19df65bc9cd9b66492a3b48d711f1770,2024-12-02T14:15:10.760000
|
||||
CVE-2024-52494,0,0,bf5dd1b631179b8d9daa1278ac8f984ff6df107e65e931981f5b743066661f07,2024-12-02T14:15:10.897000
|
||||
CVE-2024-52495,0,0,90a5d94a83491ba0aa9e1a9e4a4f5fe0ca98459576244f5c8b05a77af4905f58,2024-11-28T11:15:50.340000
|
||||
CVE-2024-52496,0,0,3f7e072f25a3e2e86befaba43547621d2bd70978a190ba0cbf1154b522b2b4fc,2024-11-28T11:15:50.703000
|
||||
CVE-2024-52497,0,0,2dfb67ac6989206e43becb4cadecdbbe12f14d96dff6ad787aa10ac60639df51,2024-11-28T11:15:51.137000
|
||||
@ -267572,8 +267581,8 @@ CVE-2024-52498,0,0,7dc88433e35e501a5376d838b1b69e48bc75ad19918b9c65d7419f1705de8
|
||||
CVE-2024-52499,0,0,ab893b1d1da52473926df770d37b1bfb72a33c2a9668548c2bac1caa129bcb8a,2024-11-28T11:15:51.957000
|
||||
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
|
||||
CVE-2024-52501,0,0,820788b8853098079143f7490c7b02533ae4f012d58a67dd13e49f2a3e89b88a,2024-11-28T11:15:52.363000
|
||||
CVE-2024-52502,1,1,817678ccc832c380487555bf34da66a26c99b2c375aaddd8612ad01746353d13,2024-12-02T14:15:11.037000
|
||||
CVE-2024-52503,1,1,1aabb91bd5ca11fde2744394e4b7d174b6ee8c54b337bdf2c119b033f8364cb0,2024-12-02T14:15:11.177000
|
||||
CVE-2024-52502,0,0,817678ccc832c380487555bf34da66a26c99b2c375aaddd8612ad01746353d13,2024-12-02T14:15:11.037000
|
||||
CVE-2024-52503,0,0,1aabb91bd5ca11fde2744394e4b7d174b6ee8c54b337bdf2c119b033f8364cb0,2024-12-02T14:15:11.177000
|
||||
CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000
|
||||
CVE-2024-52506,0,0,9420310376fa2dd9c3501acaf4dd8ad5c343b22844be701c8938f04ee189a7d8,2024-11-19T21:57:32.967000
|
||||
CVE-2024-52507,0,0,18377407544f5a86346c3ba14b439e11d26f6fdcec177783785d2e2abbc40b48,2024-11-18T17:11:56.587000
|
||||
@ -267663,6 +267672,7 @@ CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0
|
||||
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
|
||||
CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
|
||||
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
||||
CVE-2024-52732,1,1,d6a80ccb8de450005a7cb1743d48fc0ea7e9c3041c776b4edbabfa2f08461cb5,2024-12-02T15:15:12.270000
|
||||
CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000
|
||||
CVE-2024-5274,0,0,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000
|
||||
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
|
||||
@ -267814,28 +267824,28 @@ CVE-2024-53101,0,0,be92e9e8d17dfd621b3b25a601d91583efd6dd3a3dcb841c50fadbb794469
|
||||
CVE-2024-53102,0,0,066d999453d30a546d39a31866cdbaeffc79fa681b911ec129d6f4d4ed9a482b,2024-11-25T22:15:17.553000
|
||||
CVE-2024-53103,0,0,114b1bd1d86e3038b5fca99e3f30f1382e9859e6ca578fca04e8084d60836cbd,2024-12-02T08:15:08.537000
|
||||
CVE-2024-53104,0,0,96fbf37e91f40bafe9df3c78316e1cf66865f2d1a8b59bc0e99acfbf7bd2520e,2024-12-02T08:15:08.687000
|
||||
CVE-2024-53105,1,1,34fb59c99973b0ac20157c5f762b90fa1db6c744c0c3a4f77e1dd477075d668c,2024-12-02T14:15:11.313000
|
||||
CVE-2024-53106,1,1,4840ef2d3246a88b8027eadb2cd2135b951add8b3c7bb0be210467bca7751137,2024-12-02T14:15:11.420000
|
||||
CVE-2024-53107,1,1,4b84755f171f25522003c482aa7c9bbc1693aeb50d66bdc27785a0eb26087dc7,2024-12-02T14:15:11.523000
|
||||
CVE-2024-53108,1,1,844e3ba3acba4692054e1e31baea66c1ccdb5b3cf6374037fd9f5faa749e94f0,2024-12-02T14:15:11.617000
|
||||
CVE-2024-53109,1,1,7f26b5fbd302d9428fb778898098f50613f01301f474333bf4c2e409087dd77d,2024-12-02T14:15:11.713000
|
||||
CVE-2024-53105,0,0,34fb59c99973b0ac20157c5f762b90fa1db6c744c0c3a4f77e1dd477075d668c,2024-12-02T14:15:11.313000
|
||||
CVE-2024-53106,0,0,4840ef2d3246a88b8027eadb2cd2135b951add8b3c7bb0be210467bca7751137,2024-12-02T14:15:11.420000
|
||||
CVE-2024-53107,0,0,4b84755f171f25522003c482aa7c9bbc1693aeb50d66bdc27785a0eb26087dc7,2024-12-02T14:15:11.523000
|
||||
CVE-2024-53108,0,0,844e3ba3acba4692054e1e31baea66c1ccdb5b3cf6374037fd9f5faa749e94f0,2024-12-02T14:15:11.617000
|
||||
CVE-2024-53109,0,0,7f26b5fbd302d9428fb778898098f50613f01301f474333bf4c2e409087dd77d,2024-12-02T14:15:11.713000
|
||||
CVE-2024-5311,0,0,4e4e9b4edb642fa4d04760ded51b93254fd12f5bde190a96e2c1818c58cf4797,2024-06-03T14:46:24.250000
|
||||
CVE-2024-53110,1,1,4fb57ef18c905c99d2ef421edab043e7e478bc8dbb022435b6245e56d9a936cd,2024-12-02T14:15:11.803000
|
||||
CVE-2024-53111,1,1,ff35a79dfa18e9a3c4b3d829b0c454b489b08308fddaa4f3b24236629109a596,2024-12-02T14:15:11.903000
|
||||
CVE-2024-53112,1,1,493e428622d78ea7d1db31e2e4c853a634f05b801abdf51906d6cfb64c66e04d,2024-12-02T14:15:11.997000
|
||||
CVE-2024-53113,1,1,23898fdc6e9baeb57bc1e1a8ad0c7b5eeec55fa8aa89c67420cf40f70626cbbf,2024-12-02T14:15:12.097000
|
||||
CVE-2024-53114,1,1,ddbfe6b02798114c2beb1a23a1afd80c6c7ee628dfd08f03d1e8a97ebd3e0615,2024-12-02T14:15:12.197000
|
||||
CVE-2024-53115,1,1,0d48a8162cdf298c9e7d3f2ab0b4a676a02670bb4fddc2176cb34be1974bc124,2024-12-02T14:15:12.287000
|
||||
CVE-2024-53116,1,1,6e4334a37e5ca8e626d3791eaa06fe3fb0c570ea98c44807298b3f1a50c04120,2024-12-02T14:15:12.373000
|
||||
CVE-2024-53117,1,1,e6a5e215dac200b4de300b17050399c9627434ea4a40734723b977ef04223257,2024-12-02T14:15:12.470000
|
||||
CVE-2024-53118,1,1,983c7d703cc35f8f5107da873eff3b2d2baf701213c52ff3a3bff415e0b25e85,2024-12-02T14:15:12.567000
|
||||
CVE-2024-53119,1,1,4d7ccd81b9b7ab1264f542f39181ad9d6bc9a645bb5abc598e2f18106a8f74bf,2024-12-02T14:15:12.667000
|
||||
CVE-2024-53110,0,0,4fb57ef18c905c99d2ef421edab043e7e478bc8dbb022435b6245e56d9a936cd,2024-12-02T14:15:11.803000
|
||||
CVE-2024-53111,0,0,ff35a79dfa18e9a3c4b3d829b0c454b489b08308fddaa4f3b24236629109a596,2024-12-02T14:15:11.903000
|
||||
CVE-2024-53112,0,0,493e428622d78ea7d1db31e2e4c853a634f05b801abdf51906d6cfb64c66e04d,2024-12-02T14:15:11.997000
|
||||
CVE-2024-53113,0,0,23898fdc6e9baeb57bc1e1a8ad0c7b5eeec55fa8aa89c67420cf40f70626cbbf,2024-12-02T14:15:12.097000
|
||||
CVE-2024-53114,0,0,ddbfe6b02798114c2beb1a23a1afd80c6c7ee628dfd08f03d1e8a97ebd3e0615,2024-12-02T14:15:12.197000
|
||||
CVE-2024-53115,0,0,0d48a8162cdf298c9e7d3f2ab0b4a676a02670bb4fddc2176cb34be1974bc124,2024-12-02T14:15:12.287000
|
||||
CVE-2024-53116,0,0,6e4334a37e5ca8e626d3791eaa06fe3fb0c570ea98c44807298b3f1a50c04120,2024-12-02T14:15:12.373000
|
||||
CVE-2024-53117,0,0,e6a5e215dac200b4de300b17050399c9627434ea4a40734723b977ef04223257,2024-12-02T14:15:12.470000
|
||||
CVE-2024-53118,0,0,983c7d703cc35f8f5107da873eff3b2d2baf701213c52ff3a3bff415e0b25e85,2024-12-02T14:15:12.567000
|
||||
CVE-2024-53119,0,0,4d7ccd81b9b7ab1264f542f39181ad9d6bc9a645bb5abc598e2f18106a8f74bf,2024-12-02T14:15:12.667000
|
||||
CVE-2024-5312,0,0,18bbe6bd336686ff14003841f43dce1a45b7d1ab8cfffd6fca5539a180b7243f,2024-05-24T13:03:05.093000
|
||||
CVE-2024-53120,1,1,919be945ca98aed53fcad18380cf849dcdc8741181a721036f5386ccba7f0308,2024-12-02T14:15:12.773000
|
||||
CVE-2024-53121,1,1,0df4084097284edf0dd35ebbe17aab3a3d685c9d3fdc3da9364efeff401621a2,2024-12-02T14:15:12.877000
|
||||
CVE-2024-53122,1,1,1c299a2688f6ab9dded70cf6b0cfd3aeafa91db46a3f4d275e9dee3fcde2a23a,2024-12-02T14:15:13.010000
|
||||
CVE-2024-53123,1,1,dcef2903ddd7f9038bf183b6ef6585245f13744aad480c16672e1f79f35f6cd8,2024-12-02T14:15:13.120000
|
||||
CVE-2024-53124,1,1,ce00db9f52d4602938a9498c77e180ac9ff339a933c4e30878280323c81f97d8,2024-12-02T14:15:13.220000
|
||||
CVE-2024-53120,0,0,919be945ca98aed53fcad18380cf849dcdc8741181a721036f5386ccba7f0308,2024-12-02T14:15:12.773000
|
||||
CVE-2024-53121,0,0,0df4084097284edf0dd35ebbe17aab3a3d685c9d3fdc3da9364efeff401621a2,2024-12-02T14:15:12.877000
|
||||
CVE-2024-53122,0,0,1c299a2688f6ab9dded70cf6b0cfd3aeafa91db46a3f4d275e9dee3fcde2a23a,2024-12-02T14:15:13.010000
|
||||
CVE-2024-53123,0,0,dcef2903ddd7f9038bf183b6ef6585245f13744aad480c16672e1f79f35f6cd8,2024-12-02T14:15:13.120000
|
||||
CVE-2024-53124,0,0,ce00db9f52d4602938a9498c77e180ac9ff339a933c4e30878280323c81f97d8,2024-12-02T14:15:13.220000
|
||||
CVE-2024-5313,0,0,f1cdfb8a50e98ae6ac3af0ea1d50716e060963965a73a7d8f531b777ae15b8ad,2024-08-14T13:40:02.907000
|
||||
CVE-2024-5314,0,0,a7cdac28c15b59d972bbd1ad7f63aae58232f4c63fcf8544d4cfc91c709ee3db,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5315,0,0,8579169b825e98cf3238daa1adb0a4d2ea9e4baf40a7a9906b16d52fd8bd309a,2024-05-24T13:03:05.093000
|
||||
@ -267881,6 +267891,7 @@ CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b
|
||||
CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
|
||||
CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000
|
||||
CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000
|
||||
CVE-2024-53459,1,1,245c76a8b1f2e6c0f50dde2742a33bf75027788f3843da5272c1752af8a62ac6,2024-12-02T16:15:12.637000
|
||||
CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000
|
||||
CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000
|
||||
@ -267927,33 +267938,33 @@ CVE-2024-5368,0,0,769eef522c880c8dc2093ffee3167938a54b59c296f29ac57c1d46dc08bc9b
|
||||
CVE-2024-5369,0,0,29d3079c2fa6a7da6972686f223f9055b777de966536d115ae3b502886660c79,2024-06-07T20:15:12.487000
|
||||
CVE-2024-5370,0,0,8d5901c25d38686248547e2a8832556411ad40480084c4770850db2b44d5a57a,2024-06-04T19:21:06.980000
|
||||
CVE-2024-53701,0,0,f4abe9649c710b202319e22139a56475c551199e0e3e57f7ccc2eaf6ea401cc5,2024-11-29T06:15:07.327000
|
||||
CVE-2024-53707,1,1,a9246f735bee9bc7750700a9c6002bb8b6dde861692868616037fa1dcb717775,2024-12-02T14:15:13.323000
|
||||
CVE-2024-53708,1,1,efaeb83838813199845e63e7481a204f70f52ca3d8667f17b131ad7d329a0921,2024-12-02T14:15:13.457000
|
||||
CVE-2024-53709,1,1,b365e38c63651e90ce91d3f404bbdba8b1cb0d65ff4d68d2e2fbafcce3c07dbd,2024-12-02T14:15:13.600000
|
||||
CVE-2024-53707,0,0,a9246f735bee9bc7750700a9c6002bb8b6dde861692868616037fa1dcb717775,2024-12-02T14:15:13.323000
|
||||
CVE-2024-53708,0,0,efaeb83838813199845e63e7481a204f70f52ca3d8667f17b131ad7d329a0921,2024-12-02T14:15:13.457000
|
||||
CVE-2024-53709,0,0,b365e38c63651e90ce91d3f404bbdba8b1cb0d65ff4d68d2e2fbafcce3c07dbd,2024-12-02T14:15:13.600000
|
||||
CVE-2024-5371,0,0,56fb3bd7c83fca20345b3582754dbd2980927fa93a960aec189b84900cda47f4,2024-06-04T19:21:07.077000
|
||||
CVE-2024-53710,1,1,2388ff8ef4cd70b631a86988ad13ac01fba3196ca7c9ac387e78a637e7ef3fe8,2024-12-02T14:15:13.737000
|
||||
CVE-2024-53711,1,1,20fb68ceecb54ff9b2b1116de6fd531c547a2a52d35dacb9be1a576a92bd42ab,2024-12-02T14:15:13.870000
|
||||
CVE-2024-53712,1,1,09f6eb78a2cb9e7568462e532276050a640ce974616ee2a3855dee11b37fabff,2024-12-02T14:15:14.013000
|
||||
CVE-2024-53713,1,1,9f246873795e1272a31fbb32b7c02579edffea0825b53cfebaf45746d6bce0e5,2024-12-02T14:15:14.147000
|
||||
CVE-2024-53714,1,1,2bffec3a91f0924d93372fd1fbd1c04445c95e3ab0b62b38976176b823d13c83,2024-12-02T14:15:14.277000
|
||||
CVE-2024-53715,1,1,c6c2355dbe197083e5715b0994e93053d2ddc78fd188e1a6cb9186758f325f46,2024-12-02T14:15:14.413000
|
||||
CVE-2024-53716,1,1,e51d9dfe781b278f0ae731aae086c033ec86bd3d0a64dbdf44932fea1a5c7961,2024-12-02T14:15:14.540000
|
||||
CVE-2024-53717,1,1,2f6855af9b2f8b0110f0b4ee721080608f0a3473c68f029f03260ba243eab2a9,2024-12-02T14:15:14.680000
|
||||
CVE-2024-53718,1,1,101d023e9c16d770e2deb7a7d5c5ad40762520189266fbe72600a352e4961217,2024-12-02T14:15:14.820000
|
||||
CVE-2024-53719,1,1,4bf5fadb47435621b60ae954c454e8fed1ea38ebaf266ec20ce78d94cb0f71ed,2024-12-02T14:15:14.953000
|
||||
CVE-2024-53710,0,0,2388ff8ef4cd70b631a86988ad13ac01fba3196ca7c9ac387e78a637e7ef3fe8,2024-12-02T14:15:13.737000
|
||||
CVE-2024-53711,0,0,20fb68ceecb54ff9b2b1116de6fd531c547a2a52d35dacb9be1a576a92bd42ab,2024-12-02T14:15:13.870000
|
||||
CVE-2024-53712,0,0,09f6eb78a2cb9e7568462e532276050a640ce974616ee2a3855dee11b37fabff,2024-12-02T14:15:14.013000
|
||||
CVE-2024-53713,0,0,9f246873795e1272a31fbb32b7c02579edffea0825b53cfebaf45746d6bce0e5,2024-12-02T14:15:14.147000
|
||||
CVE-2024-53714,0,0,2bffec3a91f0924d93372fd1fbd1c04445c95e3ab0b62b38976176b823d13c83,2024-12-02T14:15:14.277000
|
||||
CVE-2024-53715,0,0,c6c2355dbe197083e5715b0994e93053d2ddc78fd188e1a6cb9186758f325f46,2024-12-02T14:15:14.413000
|
||||
CVE-2024-53716,0,0,e51d9dfe781b278f0ae731aae086c033ec86bd3d0a64dbdf44932fea1a5c7961,2024-12-02T14:15:14.540000
|
||||
CVE-2024-53717,0,0,2f6855af9b2f8b0110f0b4ee721080608f0a3473c68f029f03260ba243eab2a9,2024-12-02T14:15:14.680000
|
||||
CVE-2024-53718,0,0,101d023e9c16d770e2deb7a7d5c5ad40762520189266fbe72600a352e4961217,2024-12-02T14:15:14.820000
|
||||
CVE-2024-53719,0,0,4bf5fadb47435621b60ae954c454e8fed1ea38ebaf266ec20ce78d94cb0f71ed,2024-12-02T14:15:14.953000
|
||||
CVE-2024-5372,0,0,d8d2417bd06fb1324e3d48551a2db8f1959a8f0e0eac596d597fb3248c5962f3,2024-05-28T12:39:28.377000
|
||||
CVE-2024-53720,1,1,f688959dbf12eb2ea0f499fdf8c28f44211499cd2e44c3ed89fcdda3081e4f61,2024-12-02T14:15:15.090000
|
||||
CVE-2024-53721,1,1,a8b61c0607329498372dc3cf899c2686093cf393eefd10c46d503918c84d49af,2024-12-02T14:15:15.227000
|
||||
CVE-2024-53722,1,1,16c45f596c47028eb98a2efd1f04f92e7d57cf15385e54a781dd1357b565a756,2024-12-02T14:15:15.360000
|
||||
CVE-2024-53723,1,1,5360b055861e6bd29aa0e0434d7359762f6f736ebded018edfafc435f5114bff,2024-12-02T14:15:15.490000
|
||||
CVE-2024-53724,1,1,a0507f008de48d18fc1495d6ae68165bbfaa7958a7ba0d4aad616c65fad04e25,2024-12-02T14:15:15.620000
|
||||
CVE-2024-53725,1,1,16299bf4b24fdfa226bd84824401d1868e0cc306f8d5eb276303509b8474d2ee,2024-12-02T14:15:15.757000
|
||||
CVE-2024-53726,1,1,fb25a4ad6bed966414f536e218e21acf50d65b64359b7ef1aae856f4906755b7,2024-12-02T14:15:15.890000
|
||||
CVE-2024-53727,1,1,6e601eec96005bc895f65268cbbea6951cdf766f10f09295a2d849f6356d7839,2024-12-02T14:15:16.027000
|
||||
CVE-2024-53728,1,1,fdf25874b3492642fed355a1c691d9725e20e96d980b5e031996d5c7b1dbed73,2024-12-02T14:15:16.153000
|
||||
CVE-2024-53729,1,1,4c5d4e088d7bdda49a89f91dcacf8df919a095df32fe8edd0c9465212954fb8e,2024-12-02T14:15:16.290000
|
||||
CVE-2024-53720,0,0,f688959dbf12eb2ea0f499fdf8c28f44211499cd2e44c3ed89fcdda3081e4f61,2024-12-02T14:15:15.090000
|
||||
CVE-2024-53721,0,0,a8b61c0607329498372dc3cf899c2686093cf393eefd10c46d503918c84d49af,2024-12-02T14:15:15.227000
|
||||
CVE-2024-53722,0,0,16c45f596c47028eb98a2efd1f04f92e7d57cf15385e54a781dd1357b565a756,2024-12-02T14:15:15.360000
|
||||
CVE-2024-53723,0,0,5360b055861e6bd29aa0e0434d7359762f6f736ebded018edfafc435f5114bff,2024-12-02T14:15:15.490000
|
||||
CVE-2024-53724,0,0,a0507f008de48d18fc1495d6ae68165bbfaa7958a7ba0d4aad616c65fad04e25,2024-12-02T14:15:15.620000
|
||||
CVE-2024-53725,0,0,16299bf4b24fdfa226bd84824401d1868e0cc306f8d5eb276303509b8474d2ee,2024-12-02T14:15:15.757000
|
||||
CVE-2024-53726,0,0,fb25a4ad6bed966414f536e218e21acf50d65b64359b7ef1aae856f4906755b7,2024-12-02T14:15:15.890000
|
||||
CVE-2024-53727,0,0,6e601eec96005bc895f65268cbbea6951cdf766f10f09295a2d849f6356d7839,2024-12-02T14:15:16.027000
|
||||
CVE-2024-53728,0,0,fdf25874b3492642fed355a1c691d9725e20e96d980b5e031996d5c7b1dbed73,2024-12-02T14:15:16.153000
|
||||
CVE-2024-53729,0,0,4c5d4e088d7bdda49a89f91dcacf8df919a095df32fe8edd0c9465212954fb8e,2024-12-02T14:15:16.290000
|
||||
CVE-2024-5373,0,0,723592340da8ccd8f25024820eebbe02ad7dbee30d73ac71e1bda91f01d7cbec,2024-06-04T19:21:07.183000
|
||||
CVE-2024-53730,1,1,abc8247aae9fad9a557cec0fbaa9609ab8980cb18de5d1a0ad2cbc23f0782ab1,2024-12-02T14:15:16.423000
|
||||
CVE-2024-53730,0,0,abc8247aae9fad9a557cec0fbaa9609ab8980cb18de5d1a0ad2cbc23f0782ab1,2024-12-02T14:15:16.423000
|
||||
CVE-2024-53731,0,0,99dd051791dffd2f845724af34a8772840a5c71c1582521ff72e80a4c7bf7aab,2024-11-28T12:15:17.107000
|
||||
CVE-2024-53732,0,0,abbc43ec9fa63a7364cd4412c8e7d50f2486ba52096e0e19343b21f95591685e,2024-11-28T11:15:52.773000
|
||||
CVE-2024-53733,0,0,a15424cb01b44014303701bb7a936a48f052e7c0ef953db6088888d4df1dbe37,2024-11-28T11:15:53.203000
|
||||
@ -267963,8 +267974,8 @@ CVE-2024-53737,0,0,f3a335bb195dd0244d4039f558efb2c4498714f2b0074383fd7bed5cc5fa8
|
||||
CVE-2024-53738,0,0,ab5f509d61384a8d5bb28b6ed9517e0641b5e54dd9466510814bf9b361067912,2024-11-30T21:15:15.350000
|
||||
CVE-2024-53739,0,0,0576cfe7f72b11873c2d85ed4107584c336a3c0ba57c0c01247976652b6807f8,2024-11-30T21:15:15.653000
|
||||
CVE-2024-5374,0,0,9590dde507302753225c45768250d14c5989d70c121d20e0bb9a4a301eeaee55,2024-05-28T12:39:28.377000
|
||||
CVE-2024-53740,1,1,c85ebbc44ec3d633689bb8d1c53d64d1e8f02ed54c77431010d57460ab492da7,2024-12-02T14:15:16.560000
|
||||
CVE-2024-53741,1,1,f968d0794c07f67160ae6fe6dbe029f7f983aae05a7f14618a59651448676b8e,2024-12-02T14:15:16.700000
|
||||
CVE-2024-53740,0,0,c85ebbc44ec3d633689bb8d1c53d64d1e8f02ed54c77431010d57460ab492da7,2024-12-02T14:15:16.560000
|
||||
CVE-2024-53741,0,0,f968d0794c07f67160ae6fe6dbe029f7f983aae05a7f14618a59651448676b8e,2024-12-02T14:15:16.700000
|
||||
CVE-2024-53742,0,0,97a10dbf8528ba8ea615d10490be23e98c0e662868a40aa466de286b0b7e3433,2024-12-01T22:15:05.007000
|
||||
CVE-2024-53743,0,0,feb004f324a1261364f2a4d452e2172f54b890a3ffd00baa1714195ee5d48f0c,2024-12-01T22:15:05.247000
|
||||
CVE-2024-53744,0,0,e60b9ac53c5025b801bf3932b561a8621c4ce8ca9fefa21ab185fd27f8e00b7b,2024-12-01T22:15:05.393000
|
||||
@ -267975,50 +267986,50 @@ CVE-2024-53748,0,0,b88a9b1ce9c55ac9da22becdcc2d8a4d80472347150e9b04a63606bcb9d3a
|
||||
CVE-2024-53749,0,0,9053e051fa5385b6ef36255ca5a18e2c1299eaa441080631f0693dfba2467042,2024-12-01T22:15:06.080000
|
||||
CVE-2024-5375,0,0,ee384884521ae20b595e19cb0f157171143b462efc516d82edefadc2db8af61c,2024-06-04T19:21:07.297000
|
||||
CVE-2024-53750,0,0,4850438ad2df488d504e24a4b23943996fec6575e28da6125c54fcb9dc7f153b,2024-12-01T22:15:06.217000
|
||||
CVE-2024-53751,1,1,5f6bea25e0d522695302050f333d0950f5715eec8bfc9074e7118050933cee36,2024-12-02T14:15:16.863000
|
||||
CVE-2024-53751,0,0,5f6bea25e0d522695302050f333d0950f5715eec8bfc9074e7118050933cee36,2024-12-02T14:15:16.863000
|
||||
CVE-2024-53752,0,0,ee9ea6d0a0bfb4fdc244e64871d614994ca2a53ef8c67604ea7a0a1c631195c5,2024-12-01T22:15:06.360000
|
||||
CVE-2024-53753,1,1,e03081e72bbb11b20bd612b7339dffb05fa69a73bb38165e18453809a12008a9,2024-12-02T14:15:17.007000
|
||||
CVE-2024-53754,1,1,0ccae7db8577df5c6e88256f3f04b4e3a7a223eecfdf67699d7e5b858ce33c42,2024-12-02T14:15:17.143000
|
||||
CVE-2024-53755,1,1,e602c4778f16020c85d4569dd78d8621d6daaf6604e1ad5bbdc3ced172c6d39f,2024-12-02T14:15:17.290000
|
||||
CVE-2024-53753,0,0,e03081e72bbb11b20bd612b7339dffb05fa69a73bb38165e18453809a12008a9,2024-12-02T14:15:17.007000
|
||||
CVE-2024-53754,0,0,0ccae7db8577df5c6e88256f3f04b4e3a7a223eecfdf67699d7e5b858ce33c42,2024-12-02T14:15:17.143000
|
||||
CVE-2024-53755,0,0,e602c4778f16020c85d4569dd78d8621d6daaf6604e1ad5bbdc3ced172c6d39f,2024-12-02T14:15:17.290000
|
||||
CVE-2024-53756,0,0,1534bc9cafd8b9e85e4aa0cb8ed3455c9e21cd00440e21d978b660417fca453e,2024-11-30T22:15:17.433000
|
||||
CVE-2024-53757,0,0,3ab806c7443ca7454908ccef564c0146328a2f5fb0d433be52be21d67cb958d4,2024-11-30T22:15:17.740000
|
||||
CVE-2024-53758,0,0,bde4fa2013676ceaff0c568b31de62731a43cdadd754347c99deeb769a812bc3,2024-11-30T22:15:17.883000
|
||||
CVE-2024-53759,1,1,07d97e3f709364fefa2a6d201d3e568d0a07c23a055f9b7913da1bd962bfe72b,2024-12-02T14:15:17.430000
|
||||
CVE-2024-53759,0,0,07d97e3f709364fefa2a6d201d3e568d0a07c23a055f9b7913da1bd962bfe72b,2024-12-02T14:15:17.430000
|
||||
CVE-2024-5376,0,0,1916e3797ba72d918b0d6b4e68154ad489313814ec55b1e1e9e1869dabc13c93,2024-06-04T19:21:07.390000
|
||||
CVE-2024-53760,0,0,f5fb8981571d96d4e62dd086d79e85e73a26f8de6b964e51025d2810dd92ed28,2024-11-30T22:15:18.020000
|
||||
CVE-2024-53761,1,1,198e8a29524c6bb20f4cb46cb861319bc688ef2b4cfd30c6324b9fae9ae26c37,2024-12-02T14:15:17.563000
|
||||
CVE-2024-53762,1,1,677bbd70c0cce4237c6c6bcda055dc2bb1278b93eaeb1b00f2395228a8765361,2024-12-02T14:15:17.697000
|
||||
CVE-2024-53761,0,0,198e8a29524c6bb20f4cb46cb861319bc688ef2b4cfd30c6324b9fae9ae26c37,2024-12-02T14:15:17.563000
|
||||
CVE-2024-53762,0,0,677bbd70c0cce4237c6c6bcda055dc2bb1278b93eaeb1b00f2395228a8765361,2024-12-02T14:15:17.697000
|
||||
CVE-2024-53763,0,0,5c179c36c9ff76e09f5709dbcee1e87f826bb388920c5cac94d040e4d8f0856f,2024-11-30T22:15:18.153000
|
||||
CVE-2024-53764,0,0,ed39039cd1972d38d47a6508e5962774507d4e742d266d6a1fe70e6844779d4f,2024-11-30T22:15:18.310000
|
||||
CVE-2024-53765,1,1,a5efd496d7d51bd500eed53d880c0cd19971eda88e9dfb9402a13efcec3202d9,2024-12-02T14:15:17.827000
|
||||
CVE-2024-53765,0,0,a5efd496d7d51bd500eed53d880c0cd19971eda88e9dfb9402a13efcec3202d9,2024-12-02T14:15:17.827000
|
||||
CVE-2024-53766,0,0,bfe7f698933500d02433c5bc01396652a569ab6326cb32ded581eddbdc2ab523,2024-11-30T22:15:18.457000
|
||||
CVE-2024-53767,0,0,1a6c78cdb2213d488fa53998e0269020aecd068260f85114403ee4333ea5eb1d,2024-11-30T22:15:18.600000
|
||||
CVE-2024-53768,0,0,b397ba15345aa532d051534bd1f7e64b150e1bf5e65474f96d4677f92f2f7dc2,2024-11-30T21:15:15.783000
|
||||
CVE-2024-53769,1,1,5035c1727c17326a09a9feba85cf459f91d0e286c7525c7acdd32966103dff8a,2024-12-02T14:15:17.953000
|
||||
CVE-2024-53769,0,0,5035c1727c17326a09a9feba85cf459f91d0e286c7525c7acdd32966103dff8a,2024-12-02T14:15:17.953000
|
||||
CVE-2024-5377,0,0,34aa01cd1159e89b37e209d2d3e4b966c0dd1c9883823eac1f1ebdfcdeab8bca,2024-06-04T19:21:07.497000
|
||||
CVE-2024-53770,1,1,f0662a9a1c4231b311a1fbae34d640652e78f85ae3a23cc9518648bcc0b6551e,2024-12-02T14:15:18.093000
|
||||
CVE-2024-53770,0,0,f0662a9a1c4231b311a1fbae34d640652e78f85ae3a23cc9518648bcc0b6551e,2024-12-02T14:15:18.093000
|
||||
CVE-2024-53771,0,0,e5bcfe8d9c7e973c95176a03ba2916c7810a6c0640db5b858f2ad3033ab2a7dc,2024-11-30T22:15:18.743000
|
||||
CVE-2024-53772,0,0,797dc04fc147cee7e636edb368c4a74e4e6bbab8e49055e5875fea59cb8c92c9,2024-11-30T22:15:18.883000
|
||||
CVE-2024-53773,0,0,d316388f590a42b451c3001cefdd46102d814619163542617fd7a8b15090b5ef,2024-11-30T22:15:19.027000
|
||||
CVE-2024-53774,0,0,1d76761b2a9ab2700b5097d7c35f24f1527f6b928d3e9422eb1cdc9e899de232,2024-11-30T22:15:19.157000
|
||||
CVE-2024-53775,1,1,3bb466c9f9ac4b1f9b93ccb92918495c1da7da1586f54c95dea46171dfd7bb9e,2024-12-02T14:15:18.237000
|
||||
CVE-2024-53776,1,1,fc42c5c819c001038fbea2b1598f0c6c559d698372f072380710870758f9f2df,2024-12-02T14:15:18.370000
|
||||
CVE-2024-53777,1,1,20347e387bd9c76c3dffd23567214147fbd01d323c79be5d8a5822378fc27db6,2024-12-02T14:15:18.503000
|
||||
CVE-2024-53775,0,0,3bb466c9f9ac4b1f9b93ccb92918495c1da7da1586f54c95dea46171dfd7bb9e,2024-12-02T14:15:18.237000
|
||||
CVE-2024-53776,0,0,fc42c5c819c001038fbea2b1598f0c6c559d698372f072380710870758f9f2df,2024-12-02T14:15:18.370000
|
||||
CVE-2024-53777,0,0,20347e387bd9c76c3dffd23567214147fbd01d323c79be5d8a5822378fc27db6,2024-12-02T14:15:18.503000
|
||||
CVE-2024-53778,0,0,4edda202777df03cc3ffd840c5974a0345cc17cbeb6a02c703c85b4041c42bdd,2024-11-30T22:15:19.283000
|
||||
CVE-2024-53779,1,1,3ebe6f674f6d3e324c6f56f39b3f3bcd6f7c7c93cc981c0a336acb9b9c724a45,2024-12-02T14:15:18.640000
|
||||
CVE-2024-53779,0,0,3ebe6f674f6d3e324c6f56f39b3f3bcd6f7c7c93cc981c0a336acb9b9c724a45,2024-12-02T14:15:18.640000
|
||||
CVE-2024-5378,0,0,53584bd839279bfc76a6f2fdc29ac4c797511bdc7e769650cb61527d6bb9adcb,2024-06-07T20:15:12.587000
|
||||
CVE-2024-53780,1,1,41b39b8ddfdf6894491c72bff739020f6a4e901c71c1017cf7ca5ffafa52838f,2024-12-02T14:15:18.777000
|
||||
CVE-2024-53781,1,1,f23493b9cc356e47c78651523266ffa74f2d6060783ce01959dcd0f33f2c40a7,2024-12-02T14:15:18.913000
|
||||
CVE-2024-53782,1,1,0be577ffaf6bdeab7a34b0372a908f9192093ec4831f6c13eaf4a3712cd48f96,2024-12-02T14:15:19.050000
|
||||
CVE-2024-53780,0,0,41b39b8ddfdf6894491c72bff739020f6a4e901c71c1017cf7ca5ffafa52838f,2024-12-02T14:15:18.777000
|
||||
CVE-2024-53781,0,0,f23493b9cc356e47c78651523266ffa74f2d6060783ce01959dcd0f33f2c40a7,2024-12-02T14:15:18.913000
|
||||
CVE-2024-53782,0,0,0be577ffaf6bdeab7a34b0372a908f9192093ec4831f6c13eaf4a3712cd48f96,2024-12-02T14:15:19.050000
|
||||
CVE-2024-53783,0,0,909ecd06495a0409d1084773a5a9eaba83eec8f6c25d9d6a1a6e9d198f2b3079,2024-11-30T21:15:15.927000
|
||||
CVE-2024-53784,1,1,ce473411ff65cbcd80dd78ddf490809961bc897973dbe348b16745c618548145,2024-12-02T14:15:19.190000
|
||||
CVE-2024-53784,0,0,ce473411ff65cbcd80dd78ddf490809961bc897973dbe348b16745c618548145,2024-12-02T14:15:19.190000
|
||||
CVE-2024-53786,0,0,797e50a6875d5c7ad9f2fb0112f99749ab00d53e524e87c98b2164603c866fd3,2024-11-30T22:15:19.427000
|
||||
CVE-2024-53787,0,0,60d906f2a3bd854110bab10b544f5d9a15a4d276b5bd4102ed8cfd5bde1101f3,2024-11-30T21:15:16.077000
|
||||
CVE-2024-53788,0,0,f0bb5fb412a0fefe15f72e0e8d7bd5f244651188fb15dab75348d7c3c918196d,2024-11-30T21:15:16.233000
|
||||
CVE-2024-53789,1,1,0cd2c8e734d87f5ff29c7519080e96932e6ae611e3be8577ab3c11bfb215e5c0,2024-12-02T14:15:19.327000
|
||||
CVE-2024-53789,0,0,0cd2c8e734d87f5ff29c7519080e96932e6ae611e3be8577ab3c11bfb215e5c0,2024-12-02T14:15:19.327000
|
||||
CVE-2024-5379,0,0,f1dd25a1f48845d51cd2d3d553915019ba63e0d50a7cb63638140d83426dbbeb,2024-06-04T19:21:07.600000
|
||||
CVE-2024-53792,1,1,f009c6ce656203f8698667a7a8b6410f02ab5bb9d11f62134a5b95054d5b3de6,2024-12-02T14:15:19.460000
|
||||
CVE-2024-53793,1,1,f5cb19ad8d226899765c0a6b6688756efabf7b6fa8f4dcbaf2d25a5eff86f1d9,2024-12-02T14:15:19.587000
|
||||
CVE-2024-53792,0,0,f009c6ce656203f8698667a7a8b6410f02ab5bb9d11f62134a5b95054d5b3de6,2024-12-02T14:15:19.460000
|
||||
CVE-2024-53793,0,0,f5cb19ad8d226899765c0a6b6688756efabf7b6fa8f4dcbaf2d25a5eff86f1d9,2024-12-02T14:15:19.587000
|
||||
CVE-2024-5380,0,0,1a43ccdfd322bdb041c1bd02966c3ff303ab6a44cb8598c469f347dceefe258b,2024-06-04T19:21:07.720000
|
||||
CVE-2024-5381,0,0,e60d0bf720c06b0401aa74a4fcd990afc31874a89cad5638c50edeb5ec515420,2024-06-04T19:21:07.820000
|
||||
CVE-2024-5382,0,0,89de52ac46497e2894cab1bab1dd4b0e93975c2cd2d4911a68fe0b848c20cc76,2024-06-11T18:27:00.427000
|
||||
@ -268034,6 +268045,7 @@ CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2
|
||||
CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000
|
||||
CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
|
||||
CVE-2024-53861,0,0,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000
|
||||
CVE-2024-53862,1,1,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000
|
||||
CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000
|
||||
CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000
|
||||
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
|
||||
@ -268064,7 +268076,9 @@ CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2
|
||||
CVE-2024-53979,0,0,daaf571bfcfd25ad5803f97558dcc6ea565a6375b17d8bed4a6f9cee29769cb2,2024-11-29T19:15:09.847000
|
||||
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
|
||||
CVE-2024-53980,0,0,f2c4b71c263d54957f07bea69df75ebb3d992381d97f959d8cfdaa259a929ae9,2024-11-29T19:15:09.993000
|
||||
CVE-2024-53981,1,1,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b47f,2024-12-02T16:15:14.457000
|
||||
CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000
|
||||
CVE-2024-53984,1,1,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000
|
||||
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
|
||||
CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000
|
||||
@ -270960,6 +270974,7 @@ CVE-2024-8781,0,0,3ec0b05f8d5a664e00f19be45699369ceb748ac3a54899e5a3d5a5f6653a98
|
||||
CVE-2024-8782,0,0,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
|
||||
CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
|
||||
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
|
||||
CVE-2024-8785,1,1,389f4d4466fc599aa1e162e96341d9287a40c3b8fbeefcdf0ef9b4791ab6ee69,2024-12-02T15:15:12.380000
|
||||
CVE-2024-8786,0,0,98535b365547eb81c56b86d17170e324effeb134cfd99a6f8a9199c7d69b6f51,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0ed8,2024-10-16T16:38:14.557000
|
||||
CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user