mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2024-12-21T00:55:36.585540+00:00
This commit is contained in:
parent
380805e16c
commit
3b5cbb79b7
56
CVE-2023/CVE-2023-312xx/CVE-2023-31279.json
Normal file
56
CVE-2023/CVE-2023-312xx/CVE-2023-31279.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-31279",
|
||||
"sourceIdentifier": "security@sierrawireless.com",
|
||||
"published": "2024-12-21T00:15:27.100",
|
||||
"lastModified": "2024-12-21T00:15:27.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AirVantage platform is vulnerable to an unauthorized attacker registering previously unregistered \ndevices on the AirVantage platform when the owner has not disabled the AirVantage Management \nService on the devices or registered the device. This could enable an attacker to configure, manage, \nand execute AT commands on an unsuspecting user\u2019s devices."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@sierrawireless.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@sierrawireless.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-002/",
|
||||
"source": "security@sierrawireless.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-312xx/CVE-2023-31280.json
Normal file
56
CVE-2023/CVE-2023-312xx/CVE-2023-31280.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-31280",
|
||||
"sourceIdentifier": "security@sierrawireless.com",
|
||||
"published": "2024-12-21T00:15:27.603",
|
||||
"lastModified": "2024-12-21T00:15:27.603",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An AirVantage online Warranty Checker tool vulnerability could allow an attacker to \nperform bulk enumeration of IMEI and Serial Numbers pairs. The AirVantage Warranty Checker is updated to no longer return the IMEI and Serial \nNumber in addition to the warranty status when the Serial Number or IMEI is used to look up \nwarranty status."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@sierrawireless.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@sierrawireless.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-002/",
|
||||
"source": "security@sierrawireless.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-118xx/CVE-2024-11811.json
Normal file
60
CVE-2024/CVE-2024-118xx/CVE-2024-11811.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11811",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-20T23:15:05.590",
|
||||
"lastModified": "2024-12-20T23:15:05.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Feedify \u2013 Web Push Notifications plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'platform', 'phone', 'email', and 'store_url' parameters. in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3209183%40push-notification-by-feedify%2Ftrunk&old=3177773%40push-notification-by-feedify%2Ftrunk&sfp_email=&sfph_mail=#file15",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a5a33fd-ecc6-40bf-93a5-10ead1c4c1f5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-49201",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T19:15:11.077",
|
||||
"lastModified": "2024-12-18T19:15:11.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-21T00:15:27.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Keyfactor Remote File Orchestrator (aka remote-file-orchestrator) 2.8 before 2.8.1 allows Information Disclosure: sensitive information could be exposed at the debug logging level."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Keyfactor Remote File Orchestrator (tambi\u00e9n conocido como remote-file-orchestrator) 2.8 antes de 2.8.1 permite la divulgaci\u00f3n de informaci\u00f3n: la informaci\u00f3n confidencial podr\u00eda quedar expuesta en el nivel de registro de depuraci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Keyfactor/remote-file-orchestrator/releases/tag/2.8.1",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-49202",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T19:15:11.203",
|
||||
"lastModified": "2024-12-18T19:15:11.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-21T00:15:28.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Keyfactor Command before 12.5.0 has Incorrect Access Control: access tokens are over permissioned, aka 64099. The fixed versions are 11.5.1.1, 11.5.2.1, 11.5.3.1, 11.5.4.5, 11.5.6.1, 11.6.0, 12.2.0.1, 12.3.0.1, 12.4.0.1, 12.5.0, and 24.4.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El comando Keyfactor anterior a la versi\u00f3n 12.5.0 tiene un control de acceso incorrecto: los tokens de acceso tienen m\u00e1s permisos que los permitidos, es decir, 64099. Las versiones corregidas son 11.5.1.1, 11.5.2.1, 11.5.3.1, 11.5.4.5, 11.5.6.1, 11.6.0, 12.2.0.1, 12.3.0.1, 12.4.0.1, 12.5.0 y 24.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://keyfactor.com",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-55088",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T18:15:07.527",
|
||||
"lastModified": "2024-12-18T18:15:07.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-21T00:15:28.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GetSimple CMS CE 3.3.19 is vulnerable to Server-Side Request Forgery (SSRF) in the backend plugin module."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "GetSimple CMS CE 3.3.19 es vulnerable a Server-Side Request Forgery (SSRF) en el m\u00f3dulo de complemento de backend."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://getsimple-ce.ovh/",
|
||||
|
@ -2,16 +2,32 @@
|
||||
"id": "CVE-2024-55089",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T18:15:07.670",
|
||||
"lastModified": "2024-12-18T18:15:07.670",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-21T00:15:28.487",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rhymix 2.1.19 is vulnerable to Server-Side Request Forgery (SSRF) in the background import data function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Rhymix 2.1.19 es vulnerable a Server-Side Request Forgery (SSRF) en la funci\u00f3n de importaci\u00f3n de datos en segundo plano."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://tasteful-stamp-da4.notion.site/CVE-2024-55089-15b1e0f227cb8064a563c697709b7530?pvs=73",
|
||||
|
35
README.md
35
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-20T23:00:19.935983+00:00
|
||||
2024-12-21T00:55:36.585540+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-20T22:15:24.727000+00:00
|
||||
2024-12-21T00:15:28.487000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,37 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274508
|
||||
274511
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2020-13712](CVE-2020/CVE-2020-137xx/CVE-2020-13712.json) (`2024-12-20T22:15:23.327`)
|
||||
- [CVE-2021-40959](CVE-2021/CVE-2021-409xx/CVE-2021-40959.json) (`2024-12-20T22:15:24.340`)
|
||||
- [CVE-2024-12843](CVE-2024/CVE-2024-128xx/CVE-2024-12843.json) (`2024-12-20T21:15:07.337`)
|
||||
- [CVE-2024-12844](CVE-2024/CVE-2024-128xx/CVE-2024-12844.json) (`2024-12-20T21:15:07.833`)
|
||||
- [CVE-2024-12845](CVE-2024/CVE-2024-128xx/CVE-2024-12845.json) (`2024-12-20T22:15:24.727`)
|
||||
- [CVE-2024-40875](CVE-2024/CVE-2024-408xx/CVE-2024-40875.json) (`2024-12-20T21:15:08.290`)
|
||||
- [CVE-2024-55509](CVE-2024/CVE-2024-555xx/CVE-2024-55509.json) (`2024-12-20T21:15:09.413`)
|
||||
- [CVE-2024-56334](CVE-2024/CVE-2024-563xx/CVE-2024-56334.json) (`2024-12-20T21:15:10.080`)
|
||||
- [CVE-2024-56335](CVE-2024/CVE-2024-563xx/CVE-2024-56335.json) (`2024-12-20T21:15:10.277`)
|
||||
- [CVE-2024-56357](CVE-2024/CVE-2024-563xx/CVE-2024-56357.json) (`2024-12-20T21:15:10.483`)
|
||||
- [CVE-2024-56358](CVE-2024/CVE-2024-563xx/CVE-2024-56358.json) (`2024-12-20T21:15:10.673`)
|
||||
- [CVE-2024-56359](CVE-2024/CVE-2024-563xx/CVE-2024-56359.json) (`2024-12-20T21:15:10.880`)
|
||||
- [CVE-2023-31279](CVE-2023/CVE-2023-312xx/CVE-2023-31279.json) (`2024-12-21T00:15:27.100`)
|
||||
- [CVE-2023-31280](CVE-2023/CVE-2023-312xx/CVE-2023-31280.json) (`2024-12-21T00:15:27.603`)
|
||||
- [CVE-2024-11811](CVE-2024/CVE-2024-118xx/CVE-2024-11811.json) (`2024-12-20T23:15:05.590`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2024-10101](CVE-2024/CVE-2024-101xx/CVE-2024-10101.json) (`2024-12-20T21:15:06.440`)
|
||||
- [CVE-2024-47946](CVE-2024/CVE-2024-479xx/CVE-2024-47946.json) (`2024-12-20T21:15:08.473`)
|
||||
- [CVE-2024-55186](CVE-2024/CVE-2024-551xx/CVE-2024-55186.json) (`2024-12-20T21:15:08.850`)
|
||||
- [CVE-2024-55496](CVE-2024/CVE-2024-554xx/CVE-2024-55496.json) (`2024-12-20T21:15:09.090`)
|
||||
- [CVE-2024-56139](CVE-2024/CVE-2024-561xx/CVE-2024-56139.json) (`2024-12-20T21:15:09.787`)
|
||||
- [CVE-2024-56159](CVE-2024/CVE-2024-561xx/CVE-2024-56159.json) (`2024-12-20T21:15:09.940`)
|
||||
- [CVE-2024-49201](CVE-2024/CVE-2024-492xx/CVE-2024-49201.json) (`2024-12-21T00:15:27.887`)
|
||||
- [CVE-2024-49202](CVE-2024/CVE-2024-492xx/CVE-2024-49202.json) (`2024-12-21T00:15:28.090`)
|
||||
- [CVE-2024-55088](CVE-2024/CVE-2024-550xx/CVE-2024-55088.json) (`2024-12-21T00:15:28.290`)
|
||||
- [CVE-2024-55089](CVE-2024/CVE-2024-550xx/CVE-2024-55089.json) (`2024-12-21T00:15:28.487`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
47
_state.csv
47
_state.csv
@ -148680,7 +148680,7 @@ CVE-2020-1370,0,0,591b16ec8f4f0ae5e9bfc9764d790980f0b8e496af20e9b5d8aa48fbf81d74
|
||||
CVE-2020-13700,0,0,3c1a07741016b4eb735d6b3f93f1d0b53d686b1ab55517970191f502276f3387,2024-11-21T05:01:46.017000
|
||||
CVE-2020-13702,0,0,fb9d9c32cea4b8eed9a095bb8b87efbd259a84d00f3eb8a3d9bfec4836f7d468,2024-11-21T05:01:46.160000
|
||||
CVE-2020-1371,0,0,df64c23919d4672f0a2e0bed77e04ebeb6b6138890a3874b80735274593e7351,2024-11-21T05:10:21.147000
|
||||
CVE-2020-13712,1,1,d92c00e14b08267ded22aa615d83a84b7cd15685433faae0972ae1c837bbd9a3,2024-12-20T22:15:23.327000
|
||||
CVE-2020-13712,0,0,d92c00e14b08267ded22aa615d83a84b7cd15685433faae0972ae1c837bbd9a3,2024-12-20T22:15:23.327000
|
||||
CVE-2020-13713,0,0,f46289f227345384631db36a773e1697a3a688092924976822e45a727dbc6397,2023-11-07T03:16:47.813000
|
||||
CVE-2020-13714,0,0,6b747f644510f2f0d78ce40ad61be7b8f1fe9be127d84e7cad37b6f30b57fe56,2023-11-07T03:16:48.067000
|
||||
CVE-2020-13715,0,0,48e7f07ba30f852f3ca20628661ea499d89f8d29672b944f3ce2363b7c7ccf3d,2023-11-07T03:16:48.323000
|
||||
@ -182898,7 +182898,7 @@ CVE-2021-4095,0,0,1754a7996749f97ae62ffe9d6f3d35da912b4ffd70798b9a69cd4a5ee4df70
|
||||
CVE-2021-40954,0,0,639e0503a3b9b0ab35236e7edf6f5d79668021fc165b35f0ac0e51a6b12a6e7a,2024-11-21T06:25:08.440000
|
||||
CVE-2021-40955,0,0,495403b81f1c06be793e48784ce5d1bc19d3db600fa77dfe943b36f6ff6f5bfb,2024-11-21T06:25:08.633000
|
||||
CVE-2021-40956,0,0,dd4abbc895522cbbd26cef4ab98e8ec75b42723aeb38ab86c2197ce8722a3da4,2024-11-21T06:25:08.820000
|
||||
CVE-2021-40959,1,1,1ab4ed4f7aef783ca92a3424bd191d963f3527ef2e14a032b6ab7c9ee47402d2,2024-12-20T22:15:24.340000
|
||||
CVE-2021-40959,0,0,1ab4ed4f7aef783ca92a3424bd191d963f3527ef2e14a032b6ab7c9ee47402d2,2024-12-20T22:15:24.340000
|
||||
CVE-2021-4096,0,0,8f0aefd8139c8ce3369e7c803f103ca10bab6257c4b75c36f9cea26eb0abe29e,2024-11-21T06:36:53.577000
|
||||
CVE-2021-40960,0,0,97caae704886fa745a8b61578631c4d9ef1a75c12a867e6ced730361f7a36dfa,2024-11-21T06:25:09.007000
|
||||
CVE-2021-40961,0,0,9986058b2dee60748ac95b07b1a853e7ea2dedce3e86abb697312d88c75ea637,2024-11-21T06:25:09.193000
|
||||
@ -224263,7 +224263,9 @@ CVE-2023-31274,0,0,74afa62a283dbe8ee897d4684b002928801b1434298f025431cf2215ed9eb
|
||||
CVE-2023-31275,0,0,a92d3352c973a3a3fd9bc60ccb9e2753c16b2828bbbe4829cdff3477cabdfe3e,2024-11-21T08:01:43.077000
|
||||
CVE-2023-31277,0,0,08b8bbd32f98210a6c89cdb288c882b1eec4c5daab627210049a204ca7a7af75,2024-11-21T08:01:43.197000
|
||||
CVE-2023-31278,0,0,3a937d5f89c611487800cf4bcb80ec191a0e2f133a03c75f450ca19d48989abe,2024-11-21T08:01:43.317000
|
||||
CVE-2023-31279,1,1,a20f334ba6cfccbba82c7209a0f37f63d55c63f7627d03a2dcb5e11cf44ea111,2024-12-21T00:15:27.100000
|
||||
CVE-2023-3128,0,0,d819634e37d15ca4bdd3e5f7da9e48cb634bc6e9eae545d6b691262658c097de,2024-11-21T08:16:31.240000
|
||||
CVE-2023-31280,1,1,a59444ff57b9fee5dd7a2b499d48e6608a2cb297c0aa5656c9d14b23689e1081,2024-12-21T00:15:27.603000
|
||||
CVE-2023-31284,0,0,ac9b7cd01ee0f6d7176537eba224d1a808dcae2e86704a8aaf7ca10d13417b97,2024-11-21T08:01:43.460000
|
||||
CVE-2023-31285,0,0,eae3a417fb0aaed7f7b99367ee9ec752c25f11169afb1f9bf2e63f09c4ea48d3,2024-11-21T08:01:43.623000
|
||||
CVE-2023-31286,0,0,78567364971f63d5dc94c49ad0a4cb4faacaab1686439f1a823e21f28b851f63,2024-11-21T08:01:43.760000
|
||||
@ -243130,7 +243132,7 @@ CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d
|
||||
CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000
|
||||
CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000
|
||||
CVE-2024-10100,0,0,e257ac7ecea7ed9deddddca60657be7d2649829f289e846b06e9d10c365d346b,2024-11-04T19:15:05.297000
|
||||
CVE-2024-10101,0,1,fec1f0c88678ca99198bb58f95f12b144e2edf82230ea1a8688c401204e642f7,2024-12-20T21:15:06.440000
|
||||
CVE-2024-10101,0,0,fec1f0c88678ca99198bb58f95f12b144e2edf82230ea1a8688c401204e642f7,2024-12-20T21:15:06.440000
|
||||
CVE-2024-10103,0,0,e854e5edfcf43e70adfea03c62a4fcbb787ffe431d5323bec06ca7656746d9ef,2024-11-19T21:57:32.967000
|
||||
CVE-2024-10104,0,0,edcf9a609eefa3129230f441c58905f876237c83c0092e5bc98e317fac05c0fd,2024-11-15T19:35:04.683000
|
||||
CVE-2024-10108,0,0,57e3bdf5c93deb8dbbc7ad9bd9f5c8802e9586c3214ce14e9acc02b653026e84,2024-11-01T12:57:03.417000
|
||||
@ -244526,6 +244528,7 @@ CVE-2024-11806,0,0,147dff27e860ef00933a7776022304ba661d66287c508be135dead181fe58
|
||||
CVE-2024-11807,0,0,5b0564826b05464c314eefc84d6d7fdc2dbd57c9a7cdeff75f8e6a6bda0d85b9,2024-12-04T03:15:05.083000
|
||||
CVE-2024-11809,0,0,1f74a5fd4084e6ffe9713972c542683f1719819d3bb81586e87aada1d25da361,2024-12-13T05:15:07.127000
|
||||
CVE-2024-1181,0,0,75e84367823a14869b96be5d2a44185a42194134ed6d728c2cc873c3b47fce46,2024-11-21T08:49:58.703000
|
||||
CVE-2024-11811,1,1,6ce611d6bd52a4392678bccb915b0686796bb8e433589cf7fea80c63ea56e1f0,2024-12-20T23:15:05.590000
|
||||
CVE-2024-11812,0,0,fe2cea9a899f10de25589db8f2a6adff05b98dce0a47e91d0bbfbcfbf92fc5d1,2024-12-20T07:15:11.373000
|
||||
CVE-2024-11813,0,0,47a3a35561cd3c4cfbe2425cc2aa9f8596afbe4dae47aa0811b6748805370891,2024-12-04T03:15:05.227000
|
||||
CVE-2024-11814,0,0,2a13f9fe8be8eabbe1cb3354ac6af91e2a65c049708e435975b8ce27567d551d,2024-12-04T10:15:05.007000
|
||||
@ -245022,9 +245025,9 @@ CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017d
|
||||
CVE-2024-12840,0,0,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000
|
||||
CVE-2024-12841,0,0,ce07921741603bdc97c0ec690662775bbd4f9587340009198702b906e823f20c,2024-12-20T19:15:06.097000
|
||||
CVE-2024-12842,0,0,1e1e34a3ba74abd908652a758db38f2c95bc58aa33ed64b66f2060462a73b056,2024-12-20T20:15:21.880000
|
||||
CVE-2024-12843,1,1,45beb73c507d32bf604e47448dcbac99506f9dd237f3fd11a458d841be06fdcb,2024-12-20T21:15:07.337000
|
||||
CVE-2024-12844,1,1,6d8ec288c31d3bbe3b33ef2f9ad3792a8943c952d5f308d34593c00a3e1c4848,2024-12-20T21:15:07.833000
|
||||
CVE-2024-12845,1,1,4291254c308b66e0c715e21bc18b77504015cd917159726af921dfd1ff44e590,2024-12-20T22:15:24.727000
|
||||
CVE-2024-12843,0,0,45beb73c507d32bf604e47448dcbac99506f9dd237f3fd11a458d841be06fdcb,2024-12-20T21:15:07.337000
|
||||
CVE-2024-12844,0,0,6d8ec288c31d3bbe3b33ef2f9ad3792a8943c952d5f308d34593c00a3e1c4848,2024-12-20T21:15:07.833000
|
||||
CVE-2024-12845,0,0,4291254c308b66e0c715e21bc18b77504015cd917159726af921dfd1ff44e590,2024-12-20T22:15:24.727000
|
||||
CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000
|
||||
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
|
||||
CVE-2024-12867,0,0,01e49ed64d6e9cd55a7b69c5d48fb82a0f55b6ea873444ea934a92cdc9c1bea1,2024-12-20T20:15:22.740000
|
||||
@ -261294,7 +261297,7 @@ CVE-2024-40867,0,0,8601cb8b0c811f09acfb455bf7c1672afe97c43c8dc9da2ce2d48e4ae43c9
|
||||
CVE-2024-4087,0,0,613e4160fe6a490660110dfc2c53a93ebf10bc57536000f1b2fded1f2dd8feb4,2024-11-21T09:42:10.177000
|
||||
CVE-2024-40872,0,0,106c56c655b8aa3b981616dfaebe13acb1900ab261808e9a25876faae11bc34f,2024-11-21T09:31:47.340000
|
||||
CVE-2024-40873,0,0,aa70099da3a2b57fc7692a41f25befffc1d9d9e7c4e118e66794004c0e878cea,2024-11-21T09:31:47.467000
|
||||
CVE-2024-40875,1,1,fe3e54b541bb9a86570a2ae54d45be2b3ca707bbff8be4c9a7cd508d82d50bd7,2024-12-20T21:15:08.290000
|
||||
CVE-2024-40875,0,0,fe3e54b541bb9a86570a2ae54d45be2b3ca707bbff8be4c9a7cd508d82d50bd7,2024-12-20T21:15:08.290000
|
||||
CVE-2024-4088,0,0,d963eca4aeccb54b0c7d87a0eb7a5febe51079680504985dd3064d7dd2e05ff2,2024-11-21T09:42:10.300000
|
||||
CVE-2024-40883,0,0,e322f6133df143969f657d9cc6a7d6b368bf5e5b48f0fbcf0c8a3964addaa128,2024-11-26T09:15:06.443000
|
||||
CVE-2024-40884,0,0,ed9954ff74e93284dab776e5f85f657d7b2f3e463ef905e91d917d70faae6ca7,2024-10-17T14:05:16.247000
|
||||
@ -266297,7 +266300,7 @@ CVE-2024-47942,0,0,099064c27c2b916cca22aafe567708372c6ba9a730970a2887bf6a7a7c842
|
||||
CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000
|
||||
CVE-2024-47944,0,0,2b62f766b4e887a556703c4ed0cb75befb46953f16e7999cc97a39c4906c4816,2024-10-15T16:35:09.410000
|
||||
CVE-2024-47945,0,0,4eaa4330fd6e6ea36aef0bbee2681edcaf5e4575b714ff483b0a9415275f4700,2024-10-21T19:41:10.407000
|
||||
CVE-2024-47946,0,1,8eff08d83a0e5f81c0159854fd0287a2f79c269d6589402493189cd9869f0a5f,2024-12-20T21:15:08.473000
|
||||
CVE-2024-47946,0,0,8eff08d83a0e5f81c0159854fd0287a2f79c269d6589402493189cd9869f0a5f,2024-12-20T21:15:08.473000
|
||||
CVE-2024-47947,0,0,f24b791cf36da926e8c9239dfd41faa528b16583cf9b1b9f83aae3c1b70b6a1a,2024-12-12T16:15:16.417000
|
||||
CVE-2024-47948,0,0,517ff2cf40b380f17f0ca0cb700d9beda797d40f6236e57145e952b4be3c000e,2024-10-11T19:56:44.863000
|
||||
CVE-2024-47949,0,0,c7868bf3f997ce1e01baff6d85be7f51aca23f28e73102f98ffda228afc78456,2024-10-11T19:57:06.207000
|
||||
@ -266926,8 +266929,8 @@ CVE-2024-49193,0,0,f107d286fb452265d3af6ba99ec3a3307a498cc5d0a571f0a12f8237ec4bf
|
||||
CVE-2024-49194,0,0,bedb4da3e6258c98e6831afdfddde5b4487fbf11cb5844d4ce4a41375e376434,2024-12-18T17:15:13.593000
|
||||
CVE-2024-49195,0,0,f09eab8729e42b8f90de1ca9d2dd22f865dd713c9e6432237b0fc072c91310d7,2024-10-17T18:35:13.253000
|
||||
CVE-2024-4920,0,0,fba2df33f6d5af1375476a2a95714547e5f0b6d1d9668d13156ac51cb8462e84,2024-11-21T09:43:52.290000
|
||||
CVE-2024-49201,0,0,8b1f66cc9476326daf639ce90ea10fc49be4ec98dad343f339e234cc3009dd9a,2024-12-18T19:15:11.077000
|
||||
CVE-2024-49202,0,0,74db207f798383815364036dea6222d4e8ee966960ba697ce2cfbf6aab9ab241,2024-12-18T19:15:11.203000
|
||||
CVE-2024-49201,0,1,f1f1cb98a0aac9265c70b98ee9e2458c0a72a188affe8a16068d4f679ccae7e2,2024-12-21T00:15:27.887000
|
||||
CVE-2024-49202,0,1,dd6d2289be67b77fcac21858ac749dc1834785d3abfe754ac83242d097e946b2,2024-12-21T00:15:28.090000
|
||||
CVE-2024-49203,0,0,a5f7ba34b89000941ebf8938140c16c4627d55d6ed61c01c2bfbacf4e90f5479,2024-12-19T16:15:08.537000
|
||||
CVE-2024-49208,0,0,015cd020401085ebeb441a6e29c2c511b67ebda9206e8568e89e3ddff73bd4ca,2024-10-25T20:18:20.550000
|
||||
CVE-2024-49209,0,0,9ae848f5908051a81c06c0975ec096052c93e9171594c97faafd9f3378f596d0,2024-10-25T20:17:36.353000
|
||||
@ -270514,8 +270517,8 @@ CVE-2024-55081,0,0,855a0457c7a798d5579026b29f72e3574c13fd1ab2902fbf356e5fbe01751
|
||||
CVE-2024-55082,0,0,994e1b7dadc046c4801b223dac6c399931fe2dfd839452e36bc3ca930f4f04cd,2024-12-19T16:15:09.127000
|
||||
CVE-2024-55085,0,0,d6bcc24c3e520865e1ee191305765a610a91bdf0e859d65fb14733170ec8b40f,2024-12-17T15:15:15.840000
|
||||
CVE-2024-55086,0,0,64abe15b6f257faa8eb16dcf3e1accc1838584371dde23252015b8f46f5a2727,2024-12-18T19:15:11.613000
|
||||
CVE-2024-55088,0,0,18b9c1489022e0a179f40957d3a21048e8af2ea49529473dadb5343dc852825c,2024-12-18T18:15:07.527000
|
||||
CVE-2024-55089,0,0,a637cc0b19e88ac84b02160f13b9e41a0af09ad76384bf3e1b32c6936afbf42c,2024-12-18T18:15:07.670000
|
||||
CVE-2024-55088,0,1,549322782860e827672de68984aac69441af19c0b367dff4381f3b99d312d264,2024-12-21T00:15:28.290000
|
||||
CVE-2024-55089,0,1,3c5b004dd0c313d49a7d9655a2c778e6d258c2a448ccda837ce481ff1c05f91d,2024-12-21T00:15:28.487000
|
||||
CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000
|
||||
CVE-2024-55099,0,0,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000
|
||||
CVE-2024-5510,0,0,75afe647f1d2c625afdbb2c36005f62cfbbe97b6f78e4011e89b81919ed96856,2024-11-22T20:15:09.343000
|
||||
@ -270530,7 +270533,7 @@ CVE-2024-5515,0,0,71f85130fea0d24f5b9be7e16c835c5ed3481816e9a79890f353f21aacfd58
|
||||
CVE-2024-5516,0,0,c08d269a372fc11280e8cde7e2bd4dd476d490152ebd7e95c97d81e21a24e07b,2024-11-21T09:47:50.973000
|
||||
CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced73e,2024-11-21T09:47:51.110000
|
||||
CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000
|
||||
CVE-2024-55186,0,1,b1b5c923d2388eacebcce51a1075356548ba6fa0952b36e1382343cbd887816a,2024-12-20T21:15:08.850000
|
||||
CVE-2024-55186,0,0,b1b5c923d2388eacebcce51a1075356548ba6fa0952b36e1382343cbd887816a,2024-12-20T21:15:08.850000
|
||||
CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000
|
||||
CVE-2024-55196,0,0,9d11e523a63faa541fa5f25136e4bd3a5a9a55216c26bfb1ac46188bd003d9d8,2024-12-19T19:15:07.947000
|
||||
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
|
||||
@ -270571,12 +270574,12 @@ CVE-2024-55471,0,0,8197056e8f9960cec09b7a262aff3c8a7edfb21525e204bb4dac240446354
|
||||
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
|
||||
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
|
||||
CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad7c0,2024-12-18T19:15:11.777000
|
||||
CVE-2024-55496,0,1,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a24b,2024-12-20T21:15:09.090000
|
||||
CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a24b,2024-12-20T21:15:09.090000
|
||||
CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000
|
||||
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
|
||||
CVE-2024-55505,0,0,8271b89572403d1dfbfb143dcb69f9b9b60f911ca87d421e2e549f9a2e1ae17a,2024-12-18T22:15:07.477000
|
||||
CVE-2024-55506,0,0,c8c2c622c6ffa6a174bc7b56cb9879bd5b1bab2018832221e0611539c21950fe,2024-12-18T23:15:17.523000
|
||||
CVE-2024-55509,1,1,b9e27cdb0324b66757b8e2d500d01d42668e04684fff26be86214e9c263d4f06,2024-12-20T21:15:09.413000
|
||||
CVE-2024-55509,0,0,b9e27cdb0324b66757b8e2d500d01d42668e04684fff26be86214e9c263d4f06,2024-12-20T21:15:09.413000
|
||||
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
|
||||
CVE-2024-55513,0,0,2c70feb0b3a4b5910e279bea5f5b31284be91bf824e57138502d2e4a1a6f68ec,2024-12-18T16:15:14.720000
|
||||
CVE-2024-55514,0,0,aa89c1ff2eec24c5fad92134c8d185f78ce2cace8089f0502184ccc069428486,2024-12-18T16:15:14.900000
|
||||
@ -270759,13 +270762,13 @@ CVE-2024-56116,0,0,e133a09045b787ca79ff39c02ab485d7fb0b9d77c65dad192cc1202addb9e
|
||||
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
|
||||
CVE-2024-56128,0,0,9448cc8db9a8bd4e0b704b441f647abef22739c3613b41a4a55b8229474b0404,2024-12-18T17:15:15.003000
|
||||
CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000
|
||||
CVE-2024-56139,0,1,3024c21b786c6ca0bdd0206dcd9c6c0aa19c59d867560c6433c6053807599e34,2024-12-20T21:15:09.787000
|
||||
CVE-2024-56139,0,0,3024c21b786c6ca0bdd0206dcd9c6c0aa19c59d867560c6433c6053807599e34,2024-12-20T21:15:09.787000
|
||||
CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000
|
||||
CVE-2024-56140,0,0,d0631548de4989ff87cb4466975c10a8b9a9a481cabea121e9d2e8c66b03ddd8,2024-12-18T21:15:08.353000
|
||||
CVE-2024-56142,0,0,46ee75dbf053d17753747d6ac8d88a6799cb24a1d693104ad554a951c48b711e,2024-12-18T16:15:15.433000
|
||||
CVE-2024-56145,0,0,e8fa44102f09f0f36fd71cafc049a2179bb21772192bd2352fc7357b43f472f4,2024-12-19T21:15:08.383000
|
||||
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
|
||||
CVE-2024-56159,0,1,93778ea5258f6d539b92be8f3df8846ef8906cdb84fa04adce279235890441fa,2024-12-20T21:15:09.940000
|
||||
CVE-2024-56159,0,0,93778ea5258f6d539b92be8f3df8846ef8906cdb84fa04adce279235890441fa,2024-12-20T21:15:09.940000
|
||||
CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000
|
||||
CVE-2024-56169,0,0,2f44b9b9fae0fb43dd077aa410d4ee16cde281ba4890fbc569e3bb73e5dfcd66,2024-12-18T05:15:08.853000
|
||||
CVE-2024-56170,0,0,9b8befbbd3944be307d2b653c076f5fc24431389b70428ecce1285ef4c9e5881,2024-12-18T05:15:09.093000
|
||||
@ -270796,8 +270799,8 @@ CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4
|
||||
CVE-2024-56330,0,0,0948df413a5c69f9b84ac0d2f9d73f87e1412fd86c2aab133f127598ac011144,2024-12-20T20:15:24.167000
|
||||
CVE-2024-56331,0,0,656088f14ab95d37562c79ca09b01fad53094f76aca2313baf371cb86cef2cbe,2024-12-20T20:15:24.337000
|
||||
CVE-2024-56333,0,0,68c1c791aa9456c9142c5ee23526a03e66d9256bf45f0935a9a3e1ddc89ba6bc,2024-12-20T20:15:24.520000
|
||||
CVE-2024-56334,1,1,c68ee18733fbb7af87b93a9657cd4ea80b024247de0a538eeafbd332a43f6ef0,2024-12-20T21:15:10.080000
|
||||
CVE-2024-56335,1,1,212673c0092d206a73c10c6bde565efc048733c84573ec9d2c3399975b656f52,2024-12-20T21:15:10.277000
|
||||
CVE-2024-56334,0,0,c68ee18733fbb7af87b93a9657cd4ea80b024247de0a538eeafbd332a43f6ef0,2024-12-20T21:15:10.080000
|
||||
CVE-2024-56335,0,0,212673c0092d206a73c10c6bde565efc048733c84573ec9d2c3399975b656f52,2024-12-20T21:15:10.277000
|
||||
CVE-2024-56337,0,0,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000
|
||||
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
||||
CVE-2024-56348,0,0,cb28f0ed181f8223b2a47a2fb92147cc1a57b8274cdd4b7dbeaa070416c64567,2024-12-20T15:15:05.507000
|
||||
@ -270810,9 +270813,9 @@ CVE-2024-56353,0,0,ae4bf97a5e1ee216e5415c2193a6048425b28543177ec16a6fe8cfcd94c08
|
||||
CVE-2024-56354,0,0,61538a6f4130866818f35928ce5defeadc2b6e7d958e8e8cab12bd8ba0484ab0,2024-12-20T15:15:09.400000
|
||||
CVE-2024-56355,0,0,21efaad8f1c58d999a4416cf6d326431dedd314af26993c0e70693f39d0a6552,2024-12-20T15:15:09.630000
|
||||
CVE-2024-56356,0,0,0311ad340d8557b44a140f6e660b54052200e785ccacf5ea6656b7d035c17abc,2024-12-20T15:15:09.847000
|
||||
CVE-2024-56357,1,1,9859a02c86325eb096d891c0331c0c272fa35fd3f3348ca7975c1433009cd210,2024-12-20T21:15:10.483000
|
||||
CVE-2024-56358,1,1,a5242b1488bc185e31d245df23f8cd112af7bc1ad520eb610922e4932f3aaa06,2024-12-20T21:15:10.673000
|
||||
CVE-2024-56359,1,1,57fb0eb3210037d0725af8cb3d5a41f7619e854b3139ae13f78a6461042373b7,2024-12-20T21:15:10.880000
|
||||
CVE-2024-56357,0,0,9859a02c86325eb096d891c0331c0c272fa35fd3f3348ca7975c1433009cd210,2024-12-20T21:15:10.483000
|
||||
CVE-2024-56358,0,0,a5242b1488bc185e31d245df23f8cd112af7bc1ad520eb610922e4932f3aaa06,2024-12-20T21:15:10.673000
|
||||
CVE-2024-56359,0,0,57fb0eb3210037d0725af8cb3d5a41f7619e854b3139ae13f78a6461042373b7,2024-12-20T21:15:10.880000
|
||||
CVE-2024-5636,0,0,be674ee7db367fbb27ae45f825fa3b6cac855c767643bde3f8b1378da8ddb51a,2024-11-21T09:48:03.883000
|
||||
CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000
|
||||
CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user