mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-12-20T17:00:21.908448+00:00
This commit is contained in:
parent
8d61dbe5b7
commit
45d7a648bb
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-0546",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2014-08-12T21:55:06.460",
|
||||
"lastModified": "2024-11-21T02:02:21.753",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T15:33:24.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-8439",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2014-11-25T23:59:00.053",
|
||||
"lastModified": "2024-11-21T02:19:04.740",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T15:33:13.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-9163",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2014-12-10T21:59:35.163",
|
||||
"lastModified": "2024-11-21T02:20:19.423",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T15:32:40.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-0311",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2015-01-23T21:59:04.897",
|
||||
"lastModified": "2024-11-21T02:22:47.597",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T15:33:05.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-0313",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2015-02-02T19:59:00.053",
|
||||
"lastModified": "2024-11-21T02:22:47.853",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T15:29:17.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0012",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-11-18T16:15:11.683",
|
||||
"lastModified": "2024-11-29T16:15:08.167",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T15:47:59.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -184,11 +184,18 @@
|
||||
},
|
||||
{
|
||||
"url": "https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-103xx/CVE-2024-10385.json
Normal file
82
CVE-2024/CVE-2024-103xx/CVE-2024-10385.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-10385",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-12-20T16:15:21.523",
|
||||
"lastModified": "2024-12-20T16:15:21.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ticket management system in DirectAdmin Evolution Skin is vulnerable to XSS (Cross-site Scripting), which allows a low-privileged user to inject and store malicious JavaScript code.\nIf an admin views the ticket, the script might perform actions with their privileges, including command execution.\u00a0\nThis issue has been fixed in\u00a0version 1.668 of DirectAdmin Evolution Skin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/12/CVE-2024-10385",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://www.directadmin.com/evolution.php",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-11297",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-20T07:15:09.350",
|
||||
"lastModified": "2024-12-20T07:15:09.350",
|
||||
"lastModified": "2024-12-20T16:15:22.107",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12014",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-12-20T13:15:19.430",
|
||||
"lastModified": "2024-12-20T13:15:19.430",
|
||||
"lastModified": "2024-12-20T16:15:23.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -67,6 +89,16 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12356",
|
||||
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
"published": "2024-12-17T05:15:06.413",
|
||||
"lastModified": "2024-12-20T02:00:01.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T15:25:37.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -53,20 +73,65 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "24.3.1",
|
||||
"matchCriteriaId": "D402E4B5-D3EA-4AD1-8954-92FB6A873906"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:beyondtrust:remote_support:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "24.3.1",
|
||||
"matchCriteriaId": "AD0D0CD2-E8CE-40B6-B8F0-2FB1A98DA3F8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12356",
|
||||
"source": "13061848-ea10-403d-bd75-c83a022c2891"
|
||||
"source": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.beyondtrust.com/trust-center/security-advisories/bt24-10",
|
||||
"source": "13061848-ea10-403d-bd75-c83a022c2891"
|
||||
"source": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12356",
|
||||
"source": "13061848-ea10-403d-bd75-c83a022c2891"
|
||||
"source": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-128xx/CVE-2024-12840.json
Normal file
60
CVE-2024/CVE-2024-128xx/CVE-2024-12840.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12840",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-12-20T16:15:23.417",
|
||||
"lastModified": "2024-12-20T16:15:23.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with the http_proxies variable set to localhost, the attacker can fetch the localhost banner."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-12840",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333494",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23225",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-05T20:16:01.370",
|
||||
"lastModified": "2024-11-21T08:57:13.833",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:51:15.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23296",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-03-05T20:16:01.553",
|
||||
"lastModified": "2024-11-21T08:57:26.477",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:51:47.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26792",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.563",
|
||||
"lastModified": "2024-11-21T09:03:05.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T16:15:54.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,145 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la doble liberaci\u00f3n de un dispositivo an\u00f3nimo despu\u00e9s de un error en la creaci\u00f3n de la instant\u00e1nea. Al crear una instant\u00e1nea podemos hacer una doble liberaci\u00f3n de un dispositivo an\u00f3nimo en caso de que haya un error al realizar la transacci\u00f3n. La segunda liberaci\u00f3n puede resultar en la liberaci\u00f3n de un n\u00famero de dispositivo an\u00f3nimo asignado por alg\u00fan otro subSYSTEM en el kernel u otro SYSTEM de archivos btrfs. Los pasos que conducen a esto: 1) En ioctl.c:create_snapshot() asignamos un n\u00famero de dispositivo an\u00f3nimo y lo asignamos a pendiente_snapshot->anon_dev; 2) Luego llamamos a btrfs_commit_transaction() y terminamos en transaction.c:create_pending_snapshot(); 3) All\u00ed llamamos a btrfs_get_new_fs_root() y le pasamos el n\u00famero de dispositivo an\u00f3nimo almacenado en pendiente_snapshot->anon_dev; 4) btrfs_get_new_fs_root() libera ese n\u00famero de dispositivo an\u00f3nimo porque btrfs_lookup_fs_root() devolvi\u00f3 una ra\u00edz; alguien m\u00e1s ya hizo una b\u00fasqueda de la nueva ra\u00edz, lo que podr\u00eda realizar alguna tarea haciendo retroceder la referencia; 5) Despu\u00e9s de eso, ocurre alg\u00fan error en la ruta de confirmaci\u00f3n de la transacci\u00f3n, y en ioctl.c:create_snapshot() saltamos a la etiqueta 'fail', y luego liberamos nuevamente el mismo n\u00famero de dispositivo an\u00f3nimo, que mientras tanto puede haber sido reasignado en otro lugar, porque pendiente_snapshot->anon_dev todav\u00eda tiene el mismo valor que en el paso 1. Recientemente, syzbot se encontr\u00f3 con esto e inform\u00f3 el siguiente seguimiento: ------------[ cortar aqu\u00ed ]---- -------- ida_free solicit\u00f3 id=51 que no est\u00e1 asignado. ADVERTENCIA: CPU: 1 PID: 31038 en lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525 M\u00f3dulos vinculados en: CPU: 1 PID: 31038 Comm: syz-executor.2 No contaminado 6.8.0 -rc4-syzkaller-00410-gc02197fc9076 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/01/2024 RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525 C\u00f3digo: 10 42 80 3c 28 (...) RSP: 0018:ffffc90015a67300 EFLAGS: 00010246 RAX: be5130472f5dd000 RBX: 00000000000000033 RCX: 0000000000040000 RDX: ffffc90009a7a000 R SI: 000000000003ffff RDI: 0000000000040000 RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4 R10: dffffc0000000000 R11: ffff52002b4cdb5 R12: 0000000000000246 R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246 FS: 00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS :0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0 Rastreo de llamadas: < TAREA> btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346 create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837 create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931 btrfs_ transacci\u00f3n_commit+0xf1c/ 0x3740 fs/btrfs/transaction.c:2404 create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848 btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998 btrfs_mksnapshot+0xb5/0xf0 fs/btrfs /ioctl.c :1044 __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306 btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393 btrfs_ioctl+0xa74/0xd40 vfs_ioct l fs/ioctl.c:51 [en l\u00ednea] __do_sys_ioctl fs/ioctl .c:871 [en l\u00ednea] __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857 do_syscall_64+0xfb/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7fca3e67dda9 C\u00f3digo: 28 00 00 00 ( ...) RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9 RDX: 00000000200005c0 RSI: 0000000050009 417 RDI: 0000000000000003 RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 00000000000000000 R10: 00000000000000000 R11: 00000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658 Donde recibimos un mensaje expl\u00edcito donde intentamos liberar un n\u00famero de dispositivo an\u00f3nimo que no est\u00e1 asignado actualmente.,---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.210",
|
||||
"versionEndExcluding": "5.11",
|
||||
"matchCriteriaId": "DC4651AD-5339-45DA-A5EC-D639C20FEA8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.149",
|
||||
"versionEndExcluding": "5.16",
|
||||
"matchCriteriaId": "D9B8AD64-1736-4C16-A29D-8623F482E1A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.79",
|
||||
"versionEndExcluding": "6.1.81",
|
||||
"matchCriteriaId": "392A4A94-BCC7-4AA5-9CD0-E7562E05111C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.18",
|
||||
"versionEndExcluding": "6.6.21",
|
||||
"matchCriteriaId": "29C1AFCE-3BE5-4E3A-9EB4-4BD2E24E28C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.6",
|
||||
"versionEndExcluding": "6.7.9",
|
||||
"matchCriteriaId": "9ADD2879-4CBE-4429-88AE-A23574F0F4AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c34adc20b91a8e55e048b18d63f4f4ae003ecf8f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c8ab7521665bd0f8bc4a900244d1d5a7095cc3b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e2b54eaf28df0c978626c9736b94f003b523b451",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eb3441093aad251418921246fc3b224fd1575701",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c34adc20b91a8e55e048b18d63f4f4ae003ecf8f",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c8ab7521665bd0f8bc4a900244d1d5a7095cc3b9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e2b54eaf28df0c978626c9736b94f003b523b451",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eb3441093aad251418921246fc3b224fd1575701",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26793",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.620",
|
||||
"lastModified": "2024-11-21T09:03:05.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T15:56:00.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,79 +15,263 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: gtp: corrige use-after-free y null-ptr-deref en gtp_newlink() La estructura de operaciones gtp_link_ops para el subSYSTEM debe registrarse despu\u00e9s de registrar la estructura de operaciones pernet gtp_net_ops. Syzkaller encontr\u00f3 el error 'fallo de protecci\u00f3n general en gtp_genl_dump_pdp': [1010.702740] gtp: m\u00f3dulo GTP descargado [1010.715877] fallo de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI [1010.715888 ] KASAN: ptr nulo -deref en el rango [0x0000000000000008-0x000000000000000f] [ 1010.715895] CPU: 1 PID: 128616 Comm: a.out No contaminado 6.8.0-rc6-std-def-alt1 #1 [ 1010.715899] Nombre de hardware: Est\u00e1ndar QEMU PC (Q35+ ICH9, 2009), BIOS 1.16.0-alt1 01/04/2014 [ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp] [ 1010.715915] C\u00f3digo: 80 3c 02 00 0f 85 41 04 00 0 0 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 4 8b8 00 00 00 [ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203 [ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000 000 [ 1010.715933] RDX: 00000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282 [ 1010.715938] RBP: 000000000000000d R08: 000000000000 0001 R09: 0000000000000000 [ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80 [ 1010.715947] R13: 0000000000000000 R14: 00000000000 00000 R15: 0000000000000400 [ 1010.715953] FS: 00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000 [ 1010.715958] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0 [ 1010.715968] PKRU: 55555 554 [1010.715972] Seguimiento de llamadas: [1010.715985]? __die_body.cold+0x1a/0x1f [ 1010.715995] ? die_addr+0x43/0x70 [1010.716002]? exc_general_protection+0x199/0x2f0 [1010.716016]? asm_exc_general_protection+0x1e/0x30 [1010.716026]? gtp_newlink+0x4d7/0x9c0 [gtp] [ 1010.716034] ? gtp_net_exit+0x150/0x150 [gtp] [ 1010.716042] __rtnl_newlink+0x1063/0x1700 [ 1010.716051] ? rtnl_setlink+0x3c0/0x3c0 [1010.716063]? is_bpf_text_address+0xc0/0x1f0 [1010.716070]? kernel_text_address.part.0+0xbb/0xd0 [1010.716076]? __kernel_text_address+0x56/0xa0 [ 1010.716084] ? unwind_get_return_address+0x5a/0xa0 [1010.716091]? create_prof_cpu_mask+0x30/0x30 [1010.716098]? arch_stack_walk+0x9e/0xf0 [1010.716106]? stack_trace_save+0x91/0xd0 [1010.716113]? stack_trace_consume_entry+0x170/0x170 [1010.716121]? __lock_acquire+0x15c5/0x5380 [1010.716139]? mark_held_locks+0x9e/0xe0 [1010.716148]? \u00bfkmem_cache_alloc_trace+0x35f/0x3c0 [1010.716155]? __rtnl_newlink+0x1700/0x1700 [ 1010.716160] rtnl_newlink+0x69/0xa0 [ 1010.716166] rtnetlink_rcv_msg+0x43b/0xc50 [ 1010.716172] ? rtnl_fdb_dump+0x9f0/0x9f0 [1010.716179]? lock_acquire+0x1fe/0x560 [1010.716188]? netlink_deliver_tap+0x12f/0xd50 [ 1010.716196] netlink_rcv_skb+0x14d/0x440 [ 1010.716202] ? rtnl_fdb_dump+0x9f0/0x9f0 [1010.716208]? netlink_ack+0xab0/0xab0 [1010.716213]? netlink_deliver_tap+0x202/0xd50 [1010.716220]? netlink_deliver_tap+0x218/0xd50 [1010.716226]? __virt_addr_valid+0x30b/0x590 [ 1010.716233] netlink_unicast+0x54b/0x800 [ 1010.716240] ? netlink_attachskb+0x870/0x870 [1010.716248]? __check_object_size+0x2de/0x3b0 [ 1010.716254] netlink_sendmsg+0x938/0xe40 [ 1010.716261] ? netlink_unicast+0x800/0x800 [1010.716269]? __import_iovec+0x292/0x510 [ 1010.716276] ? netlink_unicast+0x800/0x800 [ 1010.716284] __sock_sendmsg+0x159/0x190 [ 1010.716290] ____sys_sendmsg+0x712/0x880 [ 1010.716297] ? sock_write_iter+0x3d0/0x3d0 [1010.716304]? __ia32_sys_recvmmsg+0x270/0x270 [1010.716309]? lock_acquire+0x1fe/0x560 [1010.716315]? Drain_array_locked+0x90/0x90 [ 1010.716324] ___sys_sendmsg+0xf8/0x170 [ 1010.716331] ? sendmsg_copy_msghdr+0x170/0x170 [1010.716337]? lockdep_init_map ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.7",
|
||||
"versionEndExcluding": "4.19.309",
|
||||
"matchCriteriaId": "AC54329E-05C1-4B14-9E7D-E2F71295B965"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.271",
|
||||
"matchCriteriaId": "7BE17E30-58A5-468C-A06E-28C355F4F8DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.212",
|
||||
"matchCriteriaId": "01B34738-A022-44A9-9250-DCBC76539CB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.151",
|
||||
"matchCriteriaId": "EEAFD33E-C22F-4FB1-A417-9C96AB3E0358"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.81",
|
||||
"matchCriteriaId": "EC825B0E-DFCA-4034-9B92-F111A4E2A732"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.21",
|
||||
"matchCriteriaId": "B19074A2-9FE5-4E7D-9E2D-020F95013ADA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.9",
|
||||
"matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/01129059d5141d62fae692f7a336ae3bc712d3eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5366969a19a8a0d2ffb3d27ef6e8905e5e4216f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/616d82c3cfa2a2146dd7e3ae47bda7e877ee549e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9376d059a705c5dfaac566c2d09891242013ae16",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/93dd420bc41531c9a31498b9538ca83ba6ec191e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/abd32d7f5c0294c1b2454c5a3b13b18446bac627",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e668b92a3a01429923fd5ca13e99642aab47de69",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec92aa2cab6f0048f10d6aa4f025c5885cb1a1b6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/01129059d5141d62fae692f7a336ae3bc712d3eb",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5366969a19a8a0d2ffb3d27ef6e8905e5e4216f8",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/616d82c3cfa2a2146dd7e3ae47bda7e877ee549e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9376d059a705c5dfaac566c2d09891242013ae16",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/93dd420bc41531c9a31498b9538ca83ba6ec191e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/abd32d7f5c0294c1b2454c5a3b13b18446bac627",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e668b92a3a01429923fd5ca13e99642aab47de69",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec92aa2cab6f0048f10d6aa4f025c5885cb1a1b6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26800",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:09.003",
|
||||
"lastModified": "2024-11-21T09:03:06.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T15:55:10.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,154 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tls: corrige el use-after-free en el descifrado fallido del trabajo pendiente Cuando la solicitud de descifrado va al trabajo pendiente y crypto_aead_decrypt devuelve -EBUSY, tls_do_decryption esperar\u00e1 hasta que se hayan completado todos los descifrados as\u00edncronos. Si uno de ellos falla, tls_do_decryption devolver\u00e1 -EBADMSG y tls_decrypt_sg salta a la ruta del error, liberando todas las p\u00e1ginas. Pero las p\u00e1ginas se pasaron a la devoluci\u00f3n de llamada as\u00edncrona y tls_decrypt_done ya las public\u00f3. El \u00fanico caso as\u00edncrono verdadero es cuando crypto_aead_decrypt devuelve -EINPROGRESS. Con -EBUSY, ya esperamos para poder decirle a tls_sw_recvmsg que los datos est\u00e1n disponibles para copia inmediata, pero debemos notificar a tls_decrypt_sg (a trav\u00e9s del nuevo indicador ->async_done) que la memoria ya ha sido liberada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.18",
|
||||
"versionEndExcluding": "6.6.21",
|
||||
"matchCriteriaId": "29C1AFCE-3BE5-4E3A-9EB4-4BD2E24E28C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7.6",
|
||||
"versionEndExcluding": "6.7.9",
|
||||
"matchCriteriaId": "9ADD2879-4CBE-4429-88AE-A23574F0F4AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13114dc5543069f7b97991e3b79937b6da05f5b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1ac9fb84bc7ecd4bc6428118301d9d864d2a58d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81be85353b0f5a7b660635634b655329b429eefe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f2b85a4cc763841843de693bbd7308fe9a2c4c89",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13114dc5543069f7b97991e3b79937b6da05f5b0",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1ac9fb84bc7ecd4bc6428118301d9d864d2a58d1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81be85353b0f5a7b660635634b655329b429eefe",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f2b85a4cc763841843de693bbd7308fe9a2c4c89",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26801",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:09.050",
|
||||
"lastModified": "2024-11-21T09:03:06.263",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T15:52:36.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,79 +15,259 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: evite el posible use-after-free en hci_error_reset Mientras se maneja el evento HCI_EV_HARDWARE_ERROR, si el controlador BT subyacente no responde, el mecanismo de reinicio de GPIO liberar\u00eda hci_dev y provocar\u00eda un error. use-after-free en hci_error_reset. Este es el seguimiento de llamadas observado en un dispositivo ChromeOS con Intel AX201: queue_work_on+0x3e/0x6c __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth ] ? init_wait_entry+0x31/0x31 __hci_cmd_sync+0x16/0x20 [bluetooth ] hci_error_reset+0x4f/0xa4 [bluetooth ] Process_one_work+0x1d8/0x33f trabajador_thread+0x21b/0x373 kthread+0x13a /0x152 ? pr_cont_work+0x54/0x54? kthread_blkcg+0x31/0x31 ret_from_fork+0x1f/0x30 Este parche mantiene el recuento de referencias en hci_dev mientras procesa un evento HCI_EV_HARDWARE_ERROR para evitar posibles fallas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndExcluding": "4.19.309",
|
||||
"matchCriteriaId": "CF2CC731-FB5F-4BC2-8534-444E3A0DBB80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.271",
|
||||
"matchCriteriaId": "7BE17E30-58A5-468C-A06E-28C355F4F8DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.212",
|
||||
"matchCriteriaId": "01B34738-A022-44A9-9250-DCBC76539CB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.151",
|
||||
"matchCriteriaId": "EEAFD33E-C22F-4FB1-A417-9C96AB3E0358"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.81",
|
||||
"matchCriteriaId": "EC825B0E-DFCA-4034-9B92-F111A4E2A732"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.21",
|
||||
"matchCriteriaId": "B19074A2-9FE5-4E7D-9E2D-020F95013ADA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.9",
|
||||
"matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2449007d3f73b2842c9734f45f0aadb522daf592",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2ab9a19d896f5a0dd386e1f001c5309bc35f433b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/45085686b9559bfbe3a4f41d3d695a520668f5e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/98fb98fd37e42fd4ce13ff657ea64503e24b6090",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da4569d450b193e39e87119fd316c0291b585d14",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd594cdc24f2e48dab441732e6dfcafd6b0711d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e0b278650f07acf2e0932149183458468a731c03",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2449007d3f73b2842c9734f45f0aadb522daf592",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2ab9a19d896f5a0dd386e1f001c5309bc35f433b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/45085686b9559bfbe3a4f41d3d695a520668f5e1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/98fb98fd37e42fd4ce13ff657ea64503e24b6090",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da4569d450b193e39e87119fd316c0291b585d14",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd594cdc24f2e48dab441732e6dfcafd6b0711d1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e0b278650f07acf2e0932149183458468a731c03",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27122",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:14.723",
|
||||
"lastModified": "2024-09-13T21:16:26.670",
|
||||
"lastModified": "2024-12-20T15:48:58.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -81,9 +81,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qnap:notes_station_3:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.3.9.0",
|
||||
"versionEndExcluding": "3.3.9.6",
|
||||
"matchCriteriaId": "EF0DD09E-D97F-492D-8B14-4798E6DED5AC"
|
||||
"versionStartIncluding": "3.9.0",
|
||||
"versionEndExcluding": "3.9.6",
|
||||
"matchCriteriaId": "930EF899-8E18-4269-8179-7C1C744E4F38"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27126",
|
||||
"sourceIdentifier": "security@qnapsecurity.com.tw",
|
||||
"published": "2024-09-06T17:15:15.130",
|
||||
"lastModified": "2024-09-13T20:31:54.437",
|
||||
"lastModified": "2024-12-20T15:49:05.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,8 +91,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:qnap:notes_station_3:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.9.0",
|
||||
"versionEndExcluding": "3.9.6",
|
||||
"matchCriteriaId": "B044B55E-0E0A-4772-B6C2-96B2B8E93C7E"
|
||||
"matchCriteriaId": "930EF899-8E18-4269-8179-7C1C744E4F38"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32113",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-05-08T15:15:10.227",
|
||||
"lastModified": "2024-11-21T09:14:29.843",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:51:57.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -66,7 +66,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37085",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-06-25T15:15:12.377",
|
||||
"lastModified": "2024-11-21T09:23:09.910",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:52:43.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -96,8 +96,8 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0",
|
||||
"versionEndIncluding": "5.2",
|
||||
"matchCriteriaId": "BC8A0BB4-A21B-4914-8F4B-37D300A4BBB9"
|
||||
"versionEndExcluding": "5.2",
|
||||
"matchCriteriaId": "7FA8DFE6-9C74-4711-A8AF-3B170876A1F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37383",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-07T04:15:30.463",
|
||||
"lastModified": "2024-11-21T09:23:44.700",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:52:05.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38856",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-08-05T09:15:56.780",
|
||||
"lastModified": "2024-11-21T09:26:52.837",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:35:41.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -66,7 +66,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,8 +85,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "18.12.15",
|
||||
"matchCriteriaId": "445F4EEE-8237-47E4-AB1C-729659C36A57"
|
||||
"versionEndExcluding": "18.12.15",
|
||||
"matchCriteriaId": "9121C1DF-B4B5-4292-B6D6-A85D855E2B15"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -120,12 +120,15 @@
|
||||
"url": "https://ofbiz.apache.org/security.html",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/08/04/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39891",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-02T18:15:03.447",
|
||||
"lastModified": "2024-11-21T09:28:30.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:15:33.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -135,7 +135,6 @@
|
||||
"url": "https://www.twilio.com/en-us/changelog",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
@ -164,7 +163,6 @@
|
||||
"url": "https://www.twilio.com/en-us/changelog",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40711",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-09-07T17:15:13.260",
|
||||
"lastModified": "2024-11-21T09:31:28.827",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:35:59.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -116,7 +116,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://labs.watchtowr.com/veeam-backup-response-rce-with-auth-but-mostly-without-auth-cve-2024-40711-2/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45519",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T22:15:02.770",
|
||||
"lastModified": "2024-11-21T09:37:53.673",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:38:02.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -550,12 +550,15 @@
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://blog.projectdiscovery.io/zimbra-remote-code-execution/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47732",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:03.363",
|
||||
"lastModified": "2024-10-23T16:31:03.873",
|
||||
"lastModified": "2024-12-20T15:44:01.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50623",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-28T00:15:03.657",
|
||||
"lastModified": "2024-12-17T22:15:06.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T15:04:26.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -44,6 +64,16 @@
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Cleo Multiple Products Unrestricted File Upload Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +85,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cleo:harmony:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.8.0.21",
|
||||
"matchCriteriaId": "829892E7-DFA5-4153-A1B0-D2C64054ED9F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cleo:lexicom:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.8.0.21",
|
||||
"matchCriteriaId": "EA757293-8537-4DCE-BC91-E2D4A5CB08B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cleo:vltrader:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.8.0.21",
|
||||
"matchCriteriaId": "01120D67-ED19-4B22-9484-A39715E02058"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.cleo.com/hc/en-us/articles/27140294267799-Cleo-Product-Security-Advisory",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-53677",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-12-11T16:15:14.593",
|
||||
"lastModified": "2024-12-18T01:15:06.237",
|
||||
"lastModified": "2024-12-20T16:15:23.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File upload logic is flawed vulnerability in Apache Struts.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload .\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067"
|
||||
"value": "File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
25
CVE-2024/CVE-2024-551xx/CVE-2024-55186.json
Normal file
25
CVE-2024/CVE-2024-551xx/CVE-2024-55186.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-55186",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-20T16:15:23.853",
|
||||
"lastModified": "2024-12-20T16:15:23.853",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An IDOR (Insecure Direct Object Reference) vulnerability exists in oqtane Framework 6.0.0, allowing a logged-in user to access inbox messages of other users by manipulating the notification ID in the request URL. By changing the notification ID, an attacker can view sensitive mail details belonging to other users."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/SmitShah1518/00de9ecc46c1a8e2b189185c9d92afb0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/oqtane/oqtane.framework/pull/4876/files",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-554xx/CVE-2024-55470.json
Normal file
25
CVE-2024/CVE-2024-554xx/CVE-2024-55470.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-55470",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-20T16:15:23.977",
|
||||
"lastModified": "2024-12-20T16:15:23.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Kaushikjoshi/2d8ad350ba5e72030fcee2536498cfe4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/oqtane/oqtane.framework/pull/4878/files",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-554xx/CVE-2024-55471.json
Normal file
25
CVE-2024/CVE-2024-554xx/CVE-2024-55471.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-55471",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-20T16:15:24.120",
|
||||
"lastModified": "2024-12-20T16:15:24.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Oqtane Framework is vulnerable to Insecure Direct Object Reference (IDOR) in Oqtane.Controllers.UserController. This allows unauthorized users to access sensitive information of other users by manipulating the id parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/oqtane/oqtane.framework/pull/4880/files",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/@Rudra_2158/cve-2024-55471-breaking-down-the-idor-vulnerability-in-oqtane-framework-c0f4b02f12fc",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-55956",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-13T21:15:13.767",
|
||||
"lastModified": "2024-12-18T02:00:02.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-20T15:21:39.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -44,6 +64,16 @@
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Cleo Multiple Products Unauthenticated File Upload Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,18 +85,58 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cleo:harmony:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.8.0.24",
|
||||
"matchCriteriaId": "20C7BC5F-D07F-4B6C-A674-4F9DDE6179FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cleo:lexicom:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.8.0.24",
|
||||
"matchCriteriaId": "6C1727B4-B497-4F87-87B9-E4D0B63EECA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cleo:vltrader:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.8.0.24",
|
||||
"matchCriteriaId": "1A6FB799-062D-4C25-91DA-4712774293BF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Pending",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-563xx/CVE-2024-56337.json
Normal file
37
CVE-2024/CVE-2024-563xx/CVE-2024-56337.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-56337",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-12-20T16:15:24.260",
|
||||
"lastModified": "2024-12-20T16:15:24.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the\u00a0system property sun.io.useCanonCaches, if set, must be set to false\u00a0(it defaults to false)\n- running on Java 21 onwards: no further configuration is required\u00a0(the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\u00a0sun.io.useCanonCaches to false by default where it can."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56348.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56348.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56348",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:05.507",
|
||||
"lastModified": "2024-12-20T15:15:05.507",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 improper access control allowed viewing details of unauthorized agents"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56349.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56349.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56349",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:08.300",
|
||||
"lastModified": "2024-12-20T15:15:08.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 improper access control allowed unauthorized users to modify build logs"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56350.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56350.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56350",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:08.513",
|
||||
"lastModified": "2024-12-20T15:15:08.513",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 build credentials allowed unauthorized viewing of projects"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56351.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56351.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56351",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:08.720",
|
||||
"lastModified": "2024-12-20T15:15:08.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 access tokens were not revoked after removing user roles"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56352.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56352.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56352",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:08.970",
|
||||
"lastModified": "2024-12-20T15:15:08.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 stored XSS was possible via image name on the agent details page"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56353.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56353.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56353",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:09.183",
|
||||
"lastModified": "2024-12-20T15:15:09.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 backup file exposed user credentials and session cookies"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-212"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56354.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56354.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56354",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:09.400",
|
||||
"lastModified": "2024-12-20T15:15:09.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 password field value were accessible to users with view settings permission"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56355.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56355.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56355",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:09.630",
|
||||
"lastModified": "2024-12-20T15:15:09.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 missing Content-Type header in RemoteBuildLogController response could lead to XSS"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-563xx/CVE-2024-56356.json
Normal file
56
CVE-2024/CVE-2024-563xx/CVE-2024-56356.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56356",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-12-20T15:15:09.847",
|
||||
"lastModified": "2024-12-20T15:15:09.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains TeamCity before 2024.12 insecure XMLParser configuration could lead to potential XXE attack"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7726",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-12-20T11:15:08.720",
|
||||
"lastModified": "2024-12-20T11:15:08.720",
|
||||
"lastModified": "2024-12-20T16:15:24.403",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9474",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-11-18T16:15:29.780",
|
||||
"lastModified": "2024-11-29T16:15:11.400",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-20T16:49:55.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -214,11 +214,18 @@
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/k4nfr3/CVE-2024-9474",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
79
README.md
79
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-20T15:00:35.115913+00:00
|
||||
2024-12-20T17:00:21.908448+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-20T14:53:01.273000+00:00
|
||||
2024-12-20T16:52:43.217000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274470
|
||||
274485
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2024-12014](CVE-2024/CVE-2024-120xx/CVE-2024-12014.json) (`2024-12-20T13:15:19.430`)
|
||||
- [CVE-2024-28767](CVE-2024/CVE-2024-287xx/CVE-2024-28767.json) (`2024-12-20T14:15:23.850`)
|
||||
- [CVE-2024-40695](CVE-2024/CVE-2024-406xx/CVE-2024-40695.json) (`2024-12-20T14:15:24.063`)
|
||||
- [CVE-2024-51466](CVE-2024/CVE-2024-514xx/CVE-2024-51466.json) (`2024-12-20T14:15:24.250`)
|
||||
- [CVE-2024-10385](CVE-2024/CVE-2024-103xx/CVE-2024-10385.json) (`2024-12-20T16:15:21.523`)
|
||||
- [CVE-2024-12840](CVE-2024/CVE-2024-128xx/CVE-2024-12840.json) (`2024-12-20T16:15:23.417`)
|
||||
- [CVE-2024-55186](CVE-2024/CVE-2024-551xx/CVE-2024-55186.json) (`2024-12-20T16:15:23.853`)
|
||||
- [CVE-2024-55470](CVE-2024/CVE-2024-554xx/CVE-2024-55470.json) (`2024-12-20T16:15:23.977`)
|
||||
- [CVE-2024-55471](CVE-2024/CVE-2024-554xx/CVE-2024-55471.json) (`2024-12-20T16:15:24.120`)
|
||||
- [CVE-2024-56337](CVE-2024/CVE-2024-563xx/CVE-2024-56337.json) (`2024-12-20T16:15:24.260`)
|
||||
- [CVE-2024-56348](CVE-2024/CVE-2024-563xx/CVE-2024-56348.json) (`2024-12-20T15:15:05.507`)
|
||||
- [CVE-2024-56349](CVE-2024/CVE-2024-563xx/CVE-2024-56349.json) (`2024-12-20T15:15:08.300`)
|
||||
- [CVE-2024-56350](CVE-2024/CVE-2024-563xx/CVE-2024-56350.json) (`2024-12-20T15:15:08.513`)
|
||||
- [CVE-2024-56351](CVE-2024/CVE-2024-563xx/CVE-2024-56351.json) (`2024-12-20T15:15:08.720`)
|
||||
- [CVE-2024-56352](CVE-2024/CVE-2024-563xx/CVE-2024-56352.json) (`2024-12-20T15:15:08.970`)
|
||||
- [CVE-2024-56353](CVE-2024/CVE-2024-563xx/CVE-2024-56353.json) (`2024-12-20T15:15:09.183`)
|
||||
- [CVE-2024-56354](CVE-2024/CVE-2024-563xx/CVE-2024-56354.json) (`2024-12-20T15:15:09.400`)
|
||||
- [CVE-2024-56355](CVE-2024/CVE-2024-563xx/CVE-2024-56355.json) (`2024-12-20T15:15:09.630`)
|
||||
- [CVE-2024-56356](CVE-2024/CVE-2024-563xx/CVE-2024-56356.json) (`2024-12-20T15:15:09.847`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `51`
|
||||
Recently modified CVEs: `30`
|
||||
|
||||
- [CVE-2024-2146](CVE-2024/CVE-2024-21xx/CVE-2024-2146.json) (`2024-12-20T14:37:34.637`)
|
||||
- [CVE-2024-26633](CVE-2024/CVE-2024-266xx/CVE-2024-26633.json) (`2024-12-20T13:15:19.710`)
|
||||
- [CVE-2024-26784](CVE-2024/CVE-2024-267xx/CVE-2024-26784.json) (`2024-12-20T13:57:21.897`)
|
||||
- [CVE-2024-26791](CVE-2024/CVE-2024-267xx/CVE-2024-26791.json) (`2024-12-20T14:35:01.250`)
|
||||
- [CVE-2024-26813](CVE-2024/CVE-2024-268xx/CVE-2024-26813.json) (`2024-12-20T14:30:24.357`)
|
||||
- [CVE-2024-26882](CVE-2024/CVE-2024-268xx/CVE-2024-26882.json) (`2024-12-20T13:15:20.370`)
|
||||
- [CVE-2024-2887](CVE-2024/CVE-2024-28xx/CVE-2024-2887.json) (`2024-12-20T13:48:51.147`)
|
||||
- [CVE-2024-33043](CVE-2024/CVE-2024-330xx/CVE-2024-33043.json) (`2024-12-20T14:33:22.363`)
|
||||
- [CVE-2024-38303](CVE-2024/CVE-2024-383xx/CVE-2024-38303.json) (`2024-12-20T14:40:09.410`)
|
||||
- [CVE-2024-38304](CVE-2024/CVE-2024-383xx/CVE-2024-38304.json) (`2024-12-20T14:41:01.273`)
|
||||
- [CVE-2024-39584](CVE-2024/CVE-2024-395xx/CVE-2024-39584.json) (`2024-12-20T14:38:16.543`)
|
||||
- [CVE-2024-42424](CVE-2024/CVE-2024-424xx/CVE-2024-42424.json) (`2024-12-20T14:41:45.593`)
|
||||
- [CVE-2024-42427](CVE-2024/CVE-2024-424xx/CVE-2024-42427.json) (`2024-12-20T14:43:52.363`)
|
||||
- [CVE-2024-43222](CVE-2024/CVE-2024-432xx/CVE-2024-43222.json) (`2024-12-20T13:15:20.887`)
|
||||
- [CVE-2024-43234](CVE-2024/CVE-2024-432xx/CVE-2024-43234.json) (`2024-12-20T13:15:21.197`)
|
||||
- [CVE-2024-45663](CVE-2024/CVE-2024-456xx/CVE-2024-45663.json) (`2024-12-20T13:15:21.443`)
|
||||
- [CVE-2024-48948](CVE-2024/CVE-2024-489xx/CVE-2024-48948.json) (`2024-12-20T13:15:21.617`)
|
||||
- [CVE-2024-54214](CVE-2024/CVE-2024-542xx/CVE-2024-54214.json) (`2024-12-20T13:15:21.880`)
|
||||
- [CVE-2024-54215](CVE-2024/CVE-2024-542xx/CVE-2024-54215.json) (`2024-12-20T13:15:22.060`)
|
||||
- [CVE-2024-54216](CVE-2024/CVE-2024-542xx/CVE-2024-54216.json) (`2024-12-20T13:15:22.260`)
|
||||
- [CVE-2024-54529](CVE-2024/CVE-2024-545xx/CVE-2024-54529.json) (`2024-12-20T14:47:44.153`)
|
||||
- [CVE-2024-9407](CVE-2024/CVE-2024-94xx/CVE-2024-9407.json) (`2024-12-20T13:15:22.430`)
|
||||
- [CVE-2024-9729](CVE-2024/CVE-2024-97xx/CVE-2024-9729.json) (`2024-12-20T14:30:05.087`)
|
||||
- [CVE-2024-9730](CVE-2024/CVE-2024-97xx/CVE-2024-9730.json) (`2024-12-20T14:31:40.050`)
|
||||
- [CVE-2024-9731](CVE-2024/CVE-2024-97xx/CVE-2024-9731.json) (`2024-12-20T14:31:37.723`)
|
||||
- [CVE-2024-0012](CVE-2024/CVE-2024-00xx/CVE-2024-0012.json) (`2024-12-20T15:47:59.293`)
|
||||
- [CVE-2024-11297](CVE-2024/CVE-2024-112xx/CVE-2024-11297.json) (`2024-12-20T16:15:22.107`)
|
||||
- [CVE-2024-12014](CVE-2024/CVE-2024-120xx/CVE-2024-12014.json) (`2024-12-20T16:15:23.030`)
|
||||
- [CVE-2024-12356](CVE-2024/CVE-2024-123xx/CVE-2024-12356.json) (`2024-12-20T15:25:37.347`)
|
||||
- [CVE-2024-23225](CVE-2024/CVE-2024-232xx/CVE-2024-23225.json) (`2024-12-20T16:51:15.130`)
|
||||
- [CVE-2024-23296](CVE-2024/CVE-2024-232xx/CVE-2024-23296.json) (`2024-12-20T16:51:47.810`)
|
||||
- [CVE-2024-26792](CVE-2024/CVE-2024-267xx/CVE-2024-26792.json) (`2024-12-20T16:15:54.653`)
|
||||
- [CVE-2024-26793](CVE-2024/CVE-2024-267xx/CVE-2024-26793.json) (`2024-12-20T15:56:00.320`)
|
||||
- [CVE-2024-26800](CVE-2024/CVE-2024-268xx/CVE-2024-26800.json) (`2024-12-20T15:55:10.150`)
|
||||
- [CVE-2024-26801](CVE-2024/CVE-2024-268xx/CVE-2024-26801.json) (`2024-12-20T15:52:36.293`)
|
||||
- [CVE-2024-27122](CVE-2024/CVE-2024-271xx/CVE-2024-27122.json) (`2024-12-20T15:48:58.860`)
|
||||
- [CVE-2024-27126](CVE-2024/CVE-2024-271xx/CVE-2024-27126.json) (`2024-12-20T15:49:05.487`)
|
||||
- [CVE-2024-32113](CVE-2024/CVE-2024-321xx/CVE-2024-32113.json) (`2024-12-20T16:51:57.577`)
|
||||
- [CVE-2024-37085](CVE-2024/CVE-2024-370xx/CVE-2024-37085.json) (`2024-12-20T16:52:43.217`)
|
||||
- [CVE-2024-37383](CVE-2024/CVE-2024-373xx/CVE-2024-37383.json) (`2024-12-20T16:52:05.623`)
|
||||
- [CVE-2024-38856](CVE-2024/CVE-2024-388xx/CVE-2024-38856.json) (`2024-12-20T16:35:41.330`)
|
||||
- [CVE-2024-39891](CVE-2024/CVE-2024-398xx/CVE-2024-39891.json) (`2024-12-20T16:15:33.687`)
|
||||
- [CVE-2024-40711](CVE-2024/CVE-2024-407xx/CVE-2024-40711.json) (`2024-12-20T16:35:59.103`)
|
||||
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-12-20T16:38:02.830`)
|
||||
- [CVE-2024-47732](CVE-2024/CVE-2024-477xx/CVE-2024-47732.json) (`2024-12-20T15:44:01.303`)
|
||||
- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2024-12-20T15:04:26.097`)
|
||||
- [CVE-2024-53677](CVE-2024/CVE-2024-536xx/CVE-2024-53677.json) (`2024-12-20T16:15:23.723`)
|
||||
- [CVE-2024-55956](CVE-2024/CVE-2024-559xx/CVE-2024-55956.json) (`2024-12-20T15:21:39.287`)
|
||||
- [CVE-2024-7726](CVE-2024/CVE-2024-77xx/CVE-2024-7726.json) (`2024-12-20T16:15:24.403`)
|
||||
- [CVE-2024-9474](CVE-2024/CVE-2024-94xx/CVE-2024-9474.json) (`2024-12-20T16:49:55.993`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
183
_state.csv
183
_state.csv
@ -47500,9 +47500,9 @@ CVE-2011-0605,0,0,4ced0b83f779f9fdd224b2f76671550a1023c3e7db81aace907ea6ac4f0ba1
|
||||
CVE-2011-0606,0,0,51cef65cc844628d5c99ab5747b53e0d2c43fe9eca15609cf92aab2db7d15cfa,2024-11-21T01:24:24.377000
|
||||
CVE-2011-0607,0,0,7d5e3ecfe1f0e0cece65cd282d8559c995ab08728290e80e9e28ea03431129a0,2024-11-21T01:24:24.527000
|
||||
CVE-2011-0608,0,0,1206d7ada7b6a9137d1ffb383051a40230ee24214a19eeece7608129028d884c,2024-11-21T01:24:24.690000
|
||||
CVE-2011-0609,0,1,6429cb5568210c451b56ac113faf184c2bf8e7026fbfab7df9cb4a9fde3350b4,2024-12-20T14:46:07.543000
|
||||
CVE-2011-0609,0,0,6429cb5568210c451b56ac113faf184c2bf8e7026fbfab7df9cb4a9fde3350b4,2024-12-20T14:46:07.543000
|
||||
CVE-2011-0610,0,0,9ba4491f83f584a1dedf8f91f68bfad5d68b630276ce8fea484eec049a4855a0,2024-11-21T01:24:25.047000
|
||||
CVE-2011-0611,0,1,e3011858fec0c5b735466365340094cbb2f6a50e781588eade36df01bbc9a36d,2024-12-20T14:46:32.543000
|
||||
CVE-2011-0611,0,0,e3011858fec0c5b735466365340094cbb2f6a50e781588eade36df01bbc9a36d,2024-12-20T14:46:32.543000
|
||||
CVE-2011-0612,0,0,8f772c73b9fd9995d9f9814afa80fc86c7efd91d0536fcf7d4263bc25173747e,2024-11-21T01:24:25.480000
|
||||
CVE-2011-0613,0,0,e4e51a7fb9c0e1cfed907b023e0b16d827d5b6e4b6a32ea223cc0a409777b3ea,2024-11-21T01:24:25.593000
|
||||
CVE-2011-0614,0,0,ae5a51040ee5627fedb624f7314ef6553b71b894e73a4ec40db34adb1818a4ca,2024-11-21T01:24:25.713000
|
||||
@ -49175,7 +49175,7 @@ CVE-2011-2458,0,0,194480c3c01d1d6406a5b6a83e649052a312f041b09ef391e2c74da7864e43
|
||||
CVE-2011-2459,0,0,7613316e258b9c34f798ff788c8a55299b55e5a26eb1563d74866b3266f5af7a,2024-11-21T01:28:19.557000
|
||||
CVE-2011-2460,0,0,6e5404ba8c1a1716c6e9f03e2e8c8d92cc08c5aff308b65eea65eccd75a572bb,2024-11-21T01:28:19.687000
|
||||
CVE-2011-2461,0,0,a3246b5daec55a69c2dad743cc45c0a439bbb10b0b231939cab57495db2b89d1,2024-11-21T01:28:19.817000
|
||||
CVE-2011-2462,0,1,2e75d36d96cf3648290d4240da70447dcba1ac1b98793976dd6f466b20e3293b,2024-12-20T14:47:10.930000
|
||||
CVE-2011-2462,0,0,2e75d36d96cf3648290d4240da70447dcba1ac1b98793976dd6f466b20e3293b,2024-12-20T14:47:10.930000
|
||||
CVE-2011-2463,0,0,2e20f3f33d2c869abc1e0646b020146788731fbbdccd6ef7cf30f3539be9a982,2024-11-21T01:28:20.073000
|
||||
CVE-2011-2464,0,0,cca0f3b9ce1a7abc031d7075715d57fafb42b3b17bf15d9978fc6cb39df92c6e,2024-11-21T01:28:20.183000
|
||||
CVE-2011-2465,0,0,62864dec0cf5ad1a59be7644a955345b27bb112fcc8ba0918c2284988a0a02fb,2024-11-21T01:28:20.380000
|
||||
@ -53672,7 +53672,7 @@ CVE-2012-2030,0,0,604191d06de6a90c94cf3d24011cf96384de9bc5245af009717ee3adeb67b3
|
||||
CVE-2012-2031,0,0,1a1445fa75486e625029e630dcc8541b599d73e3f535c93242ff962317420a81,2024-11-21T01:38:19.863000
|
||||
CVE-2012-2032,0,0,561af705fd2770c5455b799f65b38e327ab1f5788bdbb2026989f02819aa54ec,2024-11-21T01:38:20
|
||||
CVE-2012-2033,0,0,f0505aba2d0f10bfa21f7faaa2b71a0787ea91271a9b0a4da44b079f6fed3ffb,2024-11-21T01:38:20.140000
|
||||
CVE-2012-2034,0,1,7f3077910d1410675f80ce3f3ca7bd894bef3576307d3deab988c3f3b5a92cd1,2024-12-20T14:53:01.273000
|
||||
CVE-2012-2034,0,0,7f3077910d1410675f80ce3f3ca7bd894bef3576307d3deab988c3f3b5a92cd1,2024-12-20T14:53:01.273000
|
||||
CVE-2012-2035,0,0,8a8c72d55caee40ffc8e6c7070a5f0bd554efe6a1d05bbf12f0f434de008c7df,2024-11-21T01:38:21.520000
|
||||
CVE-2012-2036,0,0,0e380d1ca39be4b44a80d334a107794df42b2601ed8e480e7b11a8f26049872a,2024-11-21T01:38:21.653000
|
||||
CVE-2012-2037,0,0,3376cb5ec48213987403ebc67dd9605d946e3de4d05bbf254a442711d55aca5a,2024-11-21T01:38:21.800000
|
||||
@ -56299,7 +56299,7 @@ CVE-2012-5049,0,0,7fd32f369cd8cffd468db464fdb9ced249c7bae116a3d088e5e02cbf896042
|
||||
CVE-2012-5050,0,0,d4fb96b4159216b89addb9b28261379dcd8c52abcec546204707f199f0a9959e,2024-11-21T01:43:55.963000
|
||||
CVE-2012-5051,0,0,3ca88205574e87d8f19415ae7d3d002e49b5c5df103a1c83b2b25f9b75a8b747,2024-11-21T01:43:56.110000
|
||||
CVE-2012-5053,0,0,4916cdf15fa089d1f6bd79d87e712b9776889578f869e5ab67ce667d352a58bf,2024-11-21T01:43:56.247000
|
||||
CVE-2012-5054,0,1,899c505d62f7c492aed2bfca353d0c9d786b48e9cfe736b5382ddcaed1d201ba,2024-12-20T14:28:34.160000
|
||||
CVE-2012-5054,0,0,899c505d62f7c492aed2bfca353d0c9d786b48e9cfe736b5382ddcaed1d201ba,2024-12-20T14:28:34.160000
|
||||
CVE-2012-5055,0,0,1ef30c9e4e9e6726e125fecbd9b1ef734bf0dd962414620afd00e3e8c2b3dc20,2024-11-21T01:43:56.507000
|
||||
CVE-2012-5056,0,0,b2b82460a84b25b429495ae28e5891fddb93f49f0330e7721c91ffe08f7615d6,2024-11-21T01:43:56.640000
|
||||
CVE-2012-5057,0,0,a169d69055124088491d759f4d3f49bd443998718c17449a1b0cfe00058a9779,2024-11-21T01:43:56.783000
|
||||
@ -58283,14 +58283,14 @@ CVE-2013-0621,0,0,3e4707f26617f47d6669dd9a681a61c3e708d9e7287427774d63488ce246cc
|
||||
CVE-2013-0622,0,0,47d5dee44275d4e6b792457ccb5250cb3a93ad114151273470eee43f2f38b429,2024-11-21T01:47:53.150000
|
||||
CVE-2013-0623,0,0,65350929dad09dd6f5f7020e01ede7fd470eb8a12a3160083b424ea4769f607b,2024-11-21T01:47:53.303000
|
||||
CVE-2013-0624,0,0,2132c94fde5e39c7aeb064fa3d20f84c4e4912caf5497b57ef8392933a709dc0,2024-11-21T01:47:53.453000
|
||||
CVE-2013-0625,0,1,7bf8e125d0fedcdddedb9e50a93bc13c25cda30a8f65e71e604bce1059b017a6,2024-12-20T14:29:27.103000
|
||||
CVE-2013-0625,0,0,7bf8e125d0fedcdddedb9e50a93bc13c25cda30a8f65e71e604bce1059b017a6,2024-12-20T14:29:27.103000
|
||||
CVE-2013-0626,0,0,022f061ee149bd4dce55bfb03db4d84056f8e41ec04cfe16538f4eef5bb2babd,2024-11-21T01:47:53.700000
|
||||
CVE-2013-0627,0,0,4f5ccd816e890739eab86815461ec9d00612ee1c0f0c1d40b25980136ccae1fa,2024-11-21T01:47:53.840000
|
||||
CVE-2013-0628,0,0,1b71d922a7f6e32bbd02b308dfc49231e895402783a5845b840886d7760bdd2c,2023-11-07T02:13:52.797000
|
||||
CVE-2013-0629,0,1,838794333ba9f1c9c722f50ef6e7ecc37a39c06170ed9042dc7d599f28a2577b,2024-12-20T14:29:33.643000
|
||||
CVE-2013-0629,0,0,838794333ba9f1c9c722f50ef6e7ecc37a39c06170ed9042dc7d599f28a2577b,2024-12-20T14:29:33.643000
|
||||
CVE-2013-0630,0,0,3555343f9fba5571c3d73bfb8a85f5e5895560de4fb2e9974b2dd89e8cd605ec,2024-11-21T01:47:54.110000
|
||||
CVE-2013-0631,0,1,3df95960dcb839e85c888d2dca691fdfeb4fb1002611728a491e8c4e7dc6c126,2024-12-20T14:29:43.160000
|
||||
CVE-2013-0632,0,1,133f48fcdbf768ce46c68b163d59ff6891e253d442e741567159bd66b5e13dfd,2024-12-20T14:29:50.157000
|
||||
CVE-2013-0631,0,0,3df95960dcb839e85c888d2dca691fdfeb4fb1002611728a491e8c4e7dc6c126,2024-12-20T14:29:43.160000
|
||||
CVE-2013-0632,0,0,133f48fcdbf768ce46c68b163d59ff6891e253d442e741567159bd66b5e13dfd,2024-12-20T14:29:50.157000
|
||||
CVE-2013-0633,0,0,fb3a6c53a8fb3966d5dc4280b9a09d43843bf147b96aa7cc257840cd9a0a8a29,2024-11-21T01:47:54.453000
|
||||
CVE-2013-0634,0,0,c7d3952d9be994dd6b7581393d40048d917f0abfb34ae4e44c7acf40c957ed56,2024-11-21T01:47:54.573000
|
||||
CVE-2013-0635,0,0,26f2584479affd30982f988854e0111cc36d1b4658513a7be6c695ab83fb9be8,2024-11-21T01:47:54.697000
|
||||
@ -58298,15 +58298,15 @@ CVE-2013-0636,0,0,8a469456b002297f675ddfe8f1ea1c6952c679bcaef6277fcb31e5a16ab02a
|
||||
CVE-2013-0637,0,0,f84b874c03e5703e4841b0aa0b7c9ee5d1e426948c10c41ff1da177961710c0f,2024-11-21T01:47:54.933000
|
||||
CVE-2013-0638,0,0,899b20b6fc6033822fc74ad1e705454757b29358bcdd810386ac6dfd00f3c101,2024-11-21T01:47:55.070000
|
||||
CVE-2013-0639,0,0,41a15488474cd578ef1553aed1aa20ab9433d5a3cf6740aba2832ddee76f4c42,2024-11-21T01:47:55.193000
|
||||
CVE-2013-0640,0,1,e55dab41de2053ffa07bcdc0d7b296856aef159f57a465a730398858167f969b,2024-12-20T14:26:52.397000
|
||||
CVE-2013-0641,0,1,a7666c3a24ed673d88988ae96246de235cb46a825fb5deaeeeeac1cd2d5708e4,2024-12-20T14:27:04.143000
|
||||
CVE-2013-0640,0,0,e55dab41de2053ffa07bcdc0d7b296856aef159f57a465a730398858167f969b,2024-12-20T14:26:52.397000
|
||||
CVE-2013-0641,0,0,a7666c3a24ed673d88988ae96246de235cb46a825fb5deaeeeeac1cd2d5708e4,2024-12-20T14:27:04.143000
|
||||
CVE-2013-0642,0,0,db73a0b9367d7d5d2b8510ab77a74bc1056555c68e3ff63a5f9ec6c4e5cd2003,2024-11-21T01:47:55.600000
|
||||
CVE-2013-0643,0,1,adab390da0737a1ca77f549f97753f6f1bc6ce301e2eab6b512a152925f6a9b3,2024-12-20T14:27:26.237000
|
||||
CVE-2013-0643,0,0,adab390da0737a1ca77f549f97753f6f1bc6ce301e2eab6b512a152925f6a9b3,2024-12-20T14:27:26.237000
|
||||
CVE-2013-0644,0,0,24154fd8818f8c123024f87801483ec2f36d36e5df013a0a2b2885e63c21914c,2024-11-21T01:47:55.937000
|
||||
CVE-2013-0645,0,0,18ccf34d095320203b3b7aa25c050b6d6705063020211299147135da0e0423d0,2024-11-21T01:47:56.063000
|
||||
CVE-2013-0646,0,0,25cbab2144669ca137bbb0960b59b5548d86395e4586fb48604305809708c6e3,2024-11-21T01:47:56.187000
|
||||
CVE-2013-0647,0,0,0d4eaf0f58de7df82bdcb15c9d5277d96accff7e7052ae97af9c592820588321,2024-11-21T01:47:56.330000
|
||||
CVE-2013-0648,0,1,0d9dd9caff0e2c6a5550c6ffc76962e9072011c66eadd803a02ec5d719fe75c1,2024-12-20T14:27:54.297000
|
||||
CVE-2013-0648,0,0,0d9dd9caff0e2c6a5550c6ffc76962e9072011c66eadd803a02ec5d719fe75c1,2024-12-20T14:27:54.297000
|
||||
CVE-2013-0649,0,0,4ecfea72ab553b35996cab1018704a806562f04750a2c23d387edbd9afa6b172,2024-11-21T01:47:56.630000
|
||||
CVE-2013-0650,0,0,927555641a4fc70b021dcfc62a6566828529c5ac81ea17e22fc25f48b85375be,2024-11-21T01:47:56.757000
|
||||
CVE-2013-0651,0,0,a0c29a34388af005bb49102b83165ff7209f78851728301e604f6c5cadfc182a,2024-11-21T01:47:56.893000
|
||||
@ -60246,7 +60246,7 @@ CVE-2013-2725,0,0,9da21b163c7df6fc33a169e837941202c8f3f9d2d2677c25f66334e085af5d
|
||||
CVE-2013-2726,0,0,ecac2dee8e24fdedac3f7a5ddb64c7a9e2fe896e3feaf6b38c662113d6510323,2024-11-21T01:52:14.857000
|
||||
CVE-2013-2727,0,0,5b7878bbba100adcdc312e18ff2151f3cadf3cbcc6115582d30309f8c0d7cb57,2024-11-21T01:52:15.007000
|
||||
CVE-2013-2728,0,0,cc40d5964add8c0dd90ddc582e244f12e7b8fa6bb5f6fe405f6b03408a3e2e29,2024-11-21T01:52:15.153000
|
||||
CVE-2013-2729,0,1,dd2596f736a4ab86cc5427b47d0fd1d391b42c5c124ac98b69a51e6adad24c53,2024-12-20T14:27:57.793000
|
||||
CVE-2013-2729,0,0,dd2596f736a4ab86cc5427b47d0fd1d391b42c5c124ac98b69a51e6adad24c53,2024-12-20T14:27:57.793000
|
||||
CVE-2013-2730,0,0,7762814ca60361284b6b2f3ae52aae8b714daeb066da58a3b083c216e9215063,2024-11-21T01:52:15.417000
|
||||
CVE-2013-2731,0,0,217c8525c7080892fdd3382b661779ab42cd1bc1787e70c2f3985d597854923b,2024-11-21T01:52:15.557000
|
||||
CVE-2013-2732,0,0,ac02081b62cf8ee969de770eb5fc3a22778ecdb0f79e00a51c4a8e105ed235ef,2024-11-21T01:52:15.710000
|
||||
@ -60794,7 +60794,7 @@ CVE-2013-3342,0,0,317da02ca44ee72f687131cbc668ee69aeaece777c733ec0a6a36793c0d079
|
||||
CVE-2013-3343,0,0,96dc00fb54e72b44f4b6707fd4c14e8efaea6c9ab1fbfdd9a704c705948872c2,2024-11-21T01:53:26.420000
|
||||
CVE-2013-3344,0,0,458bfdd962f28750620131130e663e6943d20b7a2b65c24db9629098ae7346fb,2024-11-21T01:53:26.550000
|
||||
CVE-2013-3345,0,0,f35850e50050cac180e157aa952d2e1fdb6f75fa7223f33f268d733b9b475f3b,2024-11-21T01:53:26.687000
|
||||
CVE-2013-3346,0,1,8f91ec24a3695888f688f78ad65ee184dcb6feb864a2565721c29b6424090fcb,2024-12-20T14:19:59.700000
|
||||
CVE-2013-3346,0,0,8f91ec24a3695888f688f78ad65ee184dcb6feb864a2565721c29b6424090fcb,2024-12-20T14:19:59.700000
|
||||
CVE-2013-3347,0,0,15ba36969ffce055ab90edecd9ba77467ac0bfe323a1da42d7a5c871fbd69ee9,2024-11-21T01:53:26.953000
|
||||
CVE-2013-3348,0,0,278d9134bdc3aac191df67a37fa94d1bf457eb946ffcce29fff07bfb3de01835,2024-11-21T01:53:27.097000
|
||||
CVE-2013-3349,0,0,4df9b4cab194e76ddeee6c77833b6cf62e7e8901008ed419998ca582b75e6656,2024-11-21T01:53:27.220000
|
||||
@ -64975,13 +64975,13 @@ CVE-2014-0492,0,0,03f93d8ce786c2a0562eb648cef04536dc058189ab1385b92193137230594f
|
||||
CVE-2014-0493,0,0,d6736e39bcbdc30640a4f22eda5b9de2e6931e3d9214bfe1006a8dd86d9f13b3,2024-11-21T02:02:15.020000
|
||||
CVE-2014-0494,0,0,b216dd08448909693d7dedd7f0e5e9456415d0652bc28b0873278fa4ae393b2b,2024-11-21T02:02:15.143000
|
||||
CVE-2014-0495,0,0,f9d59b44d3ef5b3a53abcd380b5d00b1258ed7584e3033050c247ba3762bc1fb,2024-11-21T02:02:15.270000
|
||||
CVE-2014-0496,0,1,2b1c06c8aa4d37a924d954cf76d52154ab4fea14d539f6717741ba43c55ee3ed,2024-12-20T14:20:07.597000
|
||||
CVE-2014-0497,0,1,09acb29d7708dbe26b161bee622d518f6f0a428a056d3f913de05063f5fc3508,2024-12-20T14:20:31.267000
|
||||
CVE-2014-0496,0,0,2b1c06c8aa4d37a924d954cf76d52154ab4fea14d539f6717741ba43c55ee3ed,2024-12-20T14:20:07.597000
|
||||
CVE-2014-0497,0,0,09acb29d7708dbe26b161bee622d518f6f0a428a056d3f913de05063f5fc3508,2024-12-20T14:20:31.267000
|
||||
CVE-2014-0498,0,0,88f90663f24baca072d2e6789a8eff15e382f355e30e6a7579e1ef31e62c2ca1,2024-11-21T02:02:15.730000
|
||||
CVE-2014-0499,0,0,105e13a3b56c5ba37800d3c4e5cbe3c4d31b4ff5873800ca629c8a4afc56a38a,2024-11-21T02:02:15.857000
|
||||
CVE-2014-0500,0,0,3f7c8b09144c18e00b0dc4e0439dfea31ad679fed9e6460d70ef9f81369ca3f9,2024-11-21T02:02:15.990000
|
||||
CVE-2014-0501,0,0,83cb7ee02bbb63a1a3e26370e823a9b42fdd79868448577d6791ae1f69a1d6ec,2024-11-21T02:02:16.103000
|
||||
CVE-2014-0502,0,1,4f0e608449546f51dc2b447d4c750899cca88db98ea2faa85df06c880162b58f,2024-12-20T14:22:23.487000
|
||||
CVE-2014-0502,0,0,4f0e608449546f51dc2b447d4c750899cca88db98ea2faa85df06c880162b58f,2024-12-20T14:22:23.487000
|
||||
CVE-2014-0503,0,0,d64635e06391d1831ff3734953966d217002a1d9b9d70a9e423a3510ef89dd56,2024-11-21T02:02:16.423000
|
||||
CVE-2014-0504,0,0,bd9cdb1888ef9383d5bc88f7df36c22d2c02bf936af6e416f4088702cff74b6e,2024-11-21T02:02:16.540000
|
||||
CVE-2014-0505,0,0,7953e167a9f670c6cf983be681a1d7f9dd8708c13f34cd16f1a2eeb6023b03ab,2024-11-21T02:02:16.647000
|
||||
@ -65025,7 +65025,7 @@ CVE-2014-0542,0,0,fbbae5aa5bd2b99837b91bc5a55d0d23bc0909ce012aa658a0a70de3681197
|
||||
CVE-2014-0543,0,0,b274c780f0466077acaf027916a755319f6e77f2db6123359b58b5b34ee1a354,2024-11-21T02:02:21.360000
|
||||
CVE-2014-0544,0,0,0fa0ea93aa9a3f0a22963adfb2e80712f5ab07190ea3e8b339366579d2c88455,2024-11-21T02:02:21.500000
|
||||
CVE-2014-0545,0,0,528d5e5b2f44f2a0536e86fe2e8c2c1c24a8ab5b69df4e81e30d9f0fa2293a72,2024-11-21T02:02:21.623000
|
||||
CVE-2014-0546,0,0,7258929655deb71b151d073fb42e2f4b44a34c882f01fc11fce8d701dcd66778,2024-11-21T02:02:21.753000
|
||||
CVE-2014-0546,0,1,55ac9bdd18a03eadc98dc1e8a4e26bde5e555855a130d1597346cd314df9f2c7,2024-12-20T15:33:24.647000
|
||||
CVE-2014-0547,0,0,b30a2293b7d47a6ccba0e0df5c871196625c5e65ff5adfc657babd1c1b1be8ed,2024-11-21T02:02:21.870000
|
||||
CVE-2014-0548,0,0,fb4c5f4dc7a5879154d5c4c94ade40155233e90da3caaeda714406abdcecdd40,2024-11-21T02:02:22.010000
|
||||
CVE-2014-0549,0,0,0d1e6ae4e25c16d5596402e35fb70d20b3121eb60ba76da993d65abdfa62050a,2024-11-21T02:02:22.150000
|
||||
@ -72127,7 +72127,7 @@ CVE-2014-8428,0,0,b6d02e02c49a36849b94bfa2e8298b2fdce7ad8f942d2b8e3972a618f499c8
|
||||
CVE-2014-8429,0,0,ba76cc0b542a1e6ef32a49b2bbf728928dbb9278d43b163f756a0f09365813e3,2024-11-21T02:19:04.347000
|
||||
CVE-2014-8437,0,0,5f0759d205fb824ffc9f2a5d3bf7275a4e92b524fcf7167b84c824643fc00c2e,2024-11-21T02:19:04.490000
|
||||
CVE-2014-8438,0,0,09019b643d315e20bd38630e491eef717606dc406acc6fa450a3b164168e8a6f,2024-11-21T02:19:04.613000
|
||||
CVE-2014-8439,0,0,5fb62368e14bf20d0c68a2d22d986b3d2b0ec3d9cb643a2802ff3e2828cea60d,2024-11-21T02:19:04.740000
|
||||
CVE-2014-8439,0,1,37264590e8d1c4410cbcf7b0e8d527e2e5c9ebfc2295bbfdf568cfe41847f4b8,2024-12-20T15:33:13.333000
|
||||
CVE-2014-8440,0,0,c59e2dd21f18dc4d9270faf0637afef41495fc809d000125cf23ff2f98dfbc56,2024-11-21T02:19:04.877000
|
||||
CVE-2014-8441,0,0,079dd71d71eaba192d369ef5bef8c303c0b643ab5b684909fe11569d9d3d090e,2024-11-21T02:19:05.007000
|
||||
CVE-2014-8442,0,0,55b5523b35d331d0247e90863527d0601ee5808be966ff34d107437f3eb1b5df,2024-11-21T02:19:05.137000
|
||||
@ -72701,7 +72701,7 @@ CVE-2014-9159,0,0,8291b393617f554987feab103f3ce6daa4585c739a4ec9eb8679dd843ddf3b
|
||||
CVE-2014-9160,0,0,61db40fdcd07dcbe04d1e45ff3bab0b58ca1b636d8f2f7ae0226f15b42558908,2024-11-21T02:20:19.067000
|
||||
CVE-2014-9161,0,0,989ea6a38561f6a93f8227fc8aa74e2981b55d061c3c5d8f8e3a0f48baafa198,2024-11-21T02:20:19.183000
|
||||
CVE-2014-9162,0,0,e6a41539b18d793eafd23a996a4d9a2bee3216f076219c2affe6594067e67432,2024-11-21T02:20:19.300000
|
||||
CVE-2014-9163,0,0,4cc4d3755d437a0262891bed46d2d3088b5f647a21b6d193177962d7938de564,2024-11-21T02:20:19.423000
|
||||
CVE-2014-9163,0,1,50aa9fb804bf51548e5adf8fb56d6cbd84920001559d8af22d2ab86e888a17b7,2024-12-20T15:32:40.123000
|
||||
CVE-2014-9164,0,0,2563b05438fd704a7dfc65c7c64543ab1fbfd18cb53644ec20ab2640d7555809,2024-11-21T02:20:19.520000
|
||||
CVE-2014-9165,0,0,15ef39c6f19c2a53b3e86470f783a83cdcc34953a6c7971d6e311d55881c6894,2024-11-21T02:20:19.623000
|
||||
CVE-2014-9166,0,0,2e4a860f13fedd28e8e852d81eb16862c30c1cf2c907d592f29293128a248d04,2024-11-21T02:20:19.743000
|
||||
@ -73764,9 +73764,9 @@ CVE-2015-0307,0,0,a65ed1098ff025c2c4bcadd58072f76beb976964e14f3c1bef8f075c54c113
|
||||
CVE-2015-0308,0,0,66fb6aaa33515371aefd0e332532fd32bfd1b7a59d29d40893b3b7dc52edf7ce,2024-11-21T02:22:47.210000
|
||||
CVE-2015-0309,0,0,b10430c9604d0e67194403ac5cf78bcd1f9cc1f8eedc9c51a65b7d27332ccc02,2024-11-21T02:22:47.360000
|
||||
CVE-2015-0310,0,0,f2b3e7a633061f90c37b323cebda45ea27cf1548d97dd9f5d1c9e9294301b76f,2024-11-21T02:22:47.480000
|
||||
CVE-2015-0311,0,0,4386dc92500acad8d3678b1880f19980caa4c839d7040d37957e5484b05e45fe,2024-11-21T02:22:47.597000
|
||||
CVE-2015-0311,0,1,c97415c926606830f400f0e31f0f6e8ae4019d0122235f0816a5452560260e02,2024-12-20T15:33:05.107000
|
||||
CVE-2015-0312,0,0,83f4c3c42e755f4100a5e3b670350c469b5dec2be6cb9601117390221a3ed06f,2024-11-21T02:22:47.727000
|
||||
CVE-2015-0313,0,0,493996078c682a4978f64b19c4969064129de32ac92216fadf60d3d4d2539d60,2024-11-21T02:22:47.853000
|
||||
CVE-2015-0313,0,1,afb51731f024e7489e33793a6f577432acd96d38dce7da9738282c6295980e2c,2024-12-20T15:29:17.507000
|
||||
CVE-2015-0314,0,0,8cfdbc8341fa6444aac0f621f0cd99191bed11d672f66f44aec0b40900e95a7b,2024-11-21T02:22:48
|
||||
CVE-2015-0315,0,0,2a9c122d89e8278f69b82ad7ba11155f5dbeef41b37639827f1ee01a3b57f44e,2024-11-21T02:22:48.120000
|
||||
CVE-2015-0316,0,0,741ccb2def53c6e62937fb3b7557670d368b8447f100b25f10a5a9246821c87a,2024-11-21T02:22:48.243000
|
||||
@ -135269,7 +135269,7 @@ CVE-2019-17542,0,0,bba8dee23d3d4641d9c9e54d270a6db2554e11a19ef0d087e9b2d3d29faa1
|
||||
CVE-2019-17543,0,0,88570a7a54b4b7cd52db3414a44bd4fe82e4e6484f608386fa45121a6cac1bbc,2024-11-21T04:32:29.470000
|
||||
CVE-2019-17544,0,0,a20ceeb9e9810b734e3cd80a6cacf72413f64660f1f3a48bf29c989bd166be8d,2024-11-21T04:32:29.643000
|
||||
CVE-2019-17545,0,0,8c28336f1002ef1df1da8d50b355c0fec7b0ce2b0b0a911d0e75bba00e821ce7,2024-11-21T04:32:29.790000
|
||||
CVE-2019-17546,0,1,08a000452a6ce20d0b9faf6d82919e2de2fc4f92ab269acde7dccc998629525e,2024-12-20T13:15:16.870000
|
||||
CVE-2019-17546,0,0,08a000452a6ce20d0b9faf6d82919e2de2fc4f92ab269acde7dccc998629525e,2024-12-20T13:15:16.870000
|
||||
CVE-2019-17547,0,0,10e450c6bf14b6a3abe2f9dc45748a489e2afbf73df76774bf4b43616fa9bb87,2024-11-21T04:32:30.127000
|
||||
CVE-2019-17549,0,0,014c2de2dd2138e99264935b0e47aba257361da73377e82c244852321f1f4129,2024-11-21T04:32:30.267000
|
||||
CVE-2019-1755,0,0,7b9825a5d3b919bef05e466222322a66358d653067a74a6843a366273a05639a,2024-11-21T04:37:17.687000
|
||||
@ -153132,7 +153132,7 @@ CVE-2020-21572,0,0,1d3ead4365fe450574333f815cef8a9a6431d4ba933c3ae71263c1eedfb1b
|
||||
CVE-2020-21573,0,0,cc02e5751360421035627dd75834a6f40462d9c91c43dc761c50bd1b0d733a4f,2024-11-21T05:12:41.460000
|
||||
CVE-2020-21574,0,0,42daee86d5e39a5523511fd89dee09dedee2b28ee63667782fcc25b8074d053e,2024-11-21T05:12:41.587000
|
||||
CVE-2020-2158,0,0,60130f27cb9958b3a0f023433800d2d38ecd7cbb850bac7849152743865da86a,2024-11-21T05:24:49.227000
|
||||
CVE-2020-21583,0,1,5d28eaaeafc0efe8edb9df2dcac6aaa320e67fb8e5972c45c2c226861d0b68fb,2024-12-20T13:15:18.357000
|
||||
CVE-2020-21583,0,0,5d28eaaeafc0efe8edb9df2dcac6aaa320e67fb8e5972c45c2c226861d0b68fb,2024-12-20T13:15:18.357000
|
||||
CVE-2020-21585,0,0,35983af71d2e53218aa30321eacc531f7e8dff2405abe9c52ff343c601c58f43,2024-11-21T05:12:41.873000
|
||||
CVE-2020-21588,0,0,1506b1c4e4ef5bda11f6bd800d6971ceddac3dca36cd558c74e6455fc3d7dd5c,2024-11-21T05:12:42.010000
|
||||
CVE-2020-2159,0,0,fbcbe6870257ab685b7f029d4a38a558575a7575c0e212497f3b02ecb9b5fe6e,2024-11-21T05:24:49.393000
|
||||
@ -187303,12 +187303,12 @@ CVE-2021-47137,0,0,8dbf908df69b757e32ba3c531007c8adca8165d545b380f5377fe6b184dd2
|
||||
CVE-2021-47138,0,0,6c8c0f5b22ac8d3f7fe50b996f063af62c0fa9ca4ccfd871f306e97dfefb9e8f,2024-11-21T06:35:28.500000
|
||||
CVE-2021-47139,0,0,8151d11e41d234e3fea0f6402fb7f8363013282a5b5430ac83a28afdb4d80397,2024-11-21T06:35:28.607000
|
||||
CVE-2021-47140,0,0,94f2f57f0a6639487b4034158249e543c52bf9de60178bdcf9913a0f4ecf57a8,2024-11-21T06:35:28.713000
|
||||
CVE-2021-47141,0,1,e61404ed12a5ac1ae29217dd66abf34d1c9993567a22e9f40130f3f47929515b,2024-12-20T13:52:15.857000
|
||||
CVE-2021-47141,0,0,e61404ed12a5ac1ae29217dd66abf34d1c9993567a22e9f40130f3f47929515b,2024-12-20T13:52:15.857000
|
||||
CVE-2021-47142,0,0,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000
|
||||
CVE-2021-47143,0,0,c2a5c3dec1ae09dafacf9db55e558de20b9cffc7e28e40cda9f938eecc51f74e,2024-11-21T06:35:29.097000
|
||||
CVE-2021-47144,0,0,7ae5f718c8b8ace4f33fb239cb219fe990a890405bf96e6eb5781eebe4403842,2024-12-17T14:49:22.333000
|
||||
CVE-2021-47145,0,1,43d8e0b6ecfa4a172c868b86d0d689e74785d9a21693602a5589db57ba57a745,2024-12-20T13:54:08.207000
|
||||
CVE-2021-47146,0,1,dbdc77471ed516b8586014a2485eb48d7b639119ac0499cf0380be4cece2ea03,2024-12-20T13:56:08.667000
|
||||
CVE-2021-47145,0,0,43d8e0b6ecfa4a172c868b86d0d689e74785d9a21693602a5589db57ba57a745,2024-12-20T13:54:08.207000
|
||||
CVE-2021-47146,0,0,dbdc77471ed516b8586014a2485eb48d7b639119ac0499cf0380be4cece2ea03,2024-12-20T13:56:08.667000
|
||||
CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000
|
||||
CVE-2021-47148,0,0,a79aea59b658b885a0baa703d45c7d81c359e77c26745d7330c5c2f35be78df6,2024-12-12T14:35:05.817000
|
||||
CVE-2021-47149,0,0,3b3ca077a41384656a669bbbc85dc96acb022d32c1255be2b69a06131ab1d39f,2024-12-12T15:40:48.647000
|
||||
@ -187343,7 +187343,7 @@ CVE-2021-47177,0,0,fbdb7ea23981a65ddb8feb0533b2e1178b9d69bd4e0dcfd5e7200e716d8cc
|
||||
CVE-2021-47178,0,0,442e05ede1ff2e98e4a38c104f48dbd0348e93d7b2273ca73cb747bf1d3b9d1b,2024-11-21T06:35:33.900000
|
||||
CVE-2021-47179,0,0,a8b6b384d1d3dd4500e62419e8055586dec0b9099243b3a6cfff7cfb16fe0e45,2024-11-21T06:35:34.020000
|
||||
CVE-2021-47180,0,0,762708660d7017f96ecb02662d8d323198cadfc9faf90f72f7d546ca846e8408,2024-11-21T06:35:34.167000
|
||||
CVE-2021-47181,0,1,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000
|
||||
CVE-2021-47181,0,0,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000
|
||||
CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340342,2024-11-21T06:35:34.437000
|
||||
CVE-2021-47183,0,0,0e63e98ae71d7513627535219339cdc1c7ccd75d9d5a94c4dc3b6c8b7e3d0c50,2024-11-21T06:35:34.553000
|
||||
CVE-2021-47184,0,0,811277e8073e555ba62e5b080b2256eecc843389e4176b359e9f8a7bdbde5cad,2024-11-21T06:35:34.670000
|
||||
@ -222904,7 +222904,7 @@ CVE-2023-2940,0,0,7ad5423ee87e68f755e2cd74221edf5f886bdd506499833f9705f0fa2df479
|
||||
CVE-2023-29400,0,0,dea608444d68d5c5d1e530af9d1a8a44b7a086015c01eba61bbfe530a925c3f9,2024-12-13T14:15:19.623000
|
||||
CVE-2023-29401,0,0,1bc1f989a3b5d0779284da4092877f45f8ace05de4aefc33b96869475b2d0ea1,2024-11-21T07:56:59.340000
|
||||
CVE-2023-29402,0,0,52a4a4fe8782efb78ce19d89a5b8e0a7a11a18e1c5fb2cce7d061d2f2d455d10,2024-12-13T14:15:20.403000
|
||||
CVE-2023-29403,0,1,2700671187a009e8d8af00e9cb5ab37af8e0ff5af67fc6f04282fdc8fad60b76,2024-12-20T13:15:18.673000
|
||||
CVE-2023-29403,0,0,2700671187a009e8d8af00e9cb5ab37af8e0ff5af67fc6f04282fdc8fad60b76,2024-12-20T13:15:18.673000
|
||||
CVE-2023-29404,0,0,86e4452282f87d5e0aafc218d73148e229bbb1f43598b802704017fcb6ce88da,2024-11-21T07:56:59.690000
|
||||
CVE-2023-29405,0,0,74cd2ca6da030ee467cc89d6c787160ab7368d3095aa6d48bc44dd9371b1a96c,2024-12-06T14:15:19.380000
|
||||
CVE-2023-29406,0,0,c5789d2e959e523926cdc275b7c420fcebd2c815a1c60589f016abef349d1f4b,2024-11-21T07:56:59.913000
|
||||
@ -242155,7 +242155,7 @@ CVE-2024-0008,0,0,f3a0e819c9497c2b0a342098a12d293c5c599f8657da82ca7edaa709641c72
|
||||
CVE-2024-0009,0,0,2705c70b35d4cbd0491e81eb024f836acd6b6b1ca2b25c3adbf3699cab842c62,2024-12-09T15:13:34.713000
|
||||
CVE-2024-0010,0,0,31a4fe9c570d054c731419e8dbca609fd313e658d7d97a146536a70ebab80db7,2024-12-09T15:08:43.783000
|
||||
CVE-2024-0011,0,0,0cdc1a416dec7958965d013c501cb250e08e95b67733c03001a98f99c411ee1c,2024-12-09T15:05:57.857000
|
||||
CVE-2024-0012,0,0,39c96b315f311cf70d7acce2e03df6f2da2b13764db334539ea5108a55d95b48,2024-11-29T16:15:08.167000
|
||||
CVE-2024-0012,0,1,93cccc6ea5c711652172ca0de063d48a9408dc8b9bd12e62a1b6d2395fd8db9b,2024-12-20T15:47:59.293000
|
||||
CVE-2024-0014,0,0,265161d9949465d3602447cae25f01c0800ff61c134bf258208b213d42b830ab,2024-12-13T20:04:22.733000
|
||||
CVE-2024-0015,0,0,ac153671c8f32bfd786c082dd9dcbf06514472c0792e3af9411b311c680fd9cc,2024-12-16T14:39:02.223000
|
||||
CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b99,2024-12-16T14:33:13.613000
|
||||
@ -243040,7 +243040,7 @@ CVE-2024-0980,0,0,0b0cf2cf274aa5011f1334c9bf9f827ad2c15dd7211176348585ac6956002c
|
||||
CVE-2024-0981,0,0,ff5d0045d5a8a398c8154a7c935f4019293c97480e88e5858137ddb0060d7f11,2024-11-21T08:47:56.900000
|
||||
CVE-2024-0983,0,0,9f4909d4767d677327bd901e980efee82d892c092d44eb3ad622aa163f3f5f44,2024-11-21T08:47:57.023000
|
||||
CVE-2024-0984,0,0,fb1e33ae5d3f20e88ae757a36edc2e4a61d4dd5afb6c60cfdee5a6aac1f6daf4,2024-11-21T08:47:57.147000
|
||||
CVE-2024-0985,0,1,a5d15a5d9e859f9dc53b420d16404c5f439648b99dc1e5499dc4dd4c4c093bdd,2024-12-20T13:15:19.070000
|
||||
CVE-2024-0985,0,0,a5d15a5d9e859f9dc53b420d16404c5f439648b99dc1e5499dc4dd4c4c093bdd,2024-12-20T13:15:19.070000
|
||||
CVE-2024-0986,0,0,8af20ad83e0b736451510f1abab02dc3ff951bd6641a28d581e64e2373d25871,2024-11-21T08:47:57.427000
|
||||
CVE-2024-0987,0,0,1c509a99693a940ac194d4b71fa26fd5461d6e95c22da5284f444c12c11f127c,2024-11-21T08:47:57.603000
|
||||
CVE-2024-0988,0,0,826a8ca75244e387b69c8187215629062674d05d35c6ab29125abfdb8c5ed676,2024-11-21T08:47:57.760000
|
||||
@ -243357,6 +243357,7 @@ CVE-2024-1038,0,0,b9222a411b1bc3d07cf4c05f9c610f06b56f337f87abb77c0147739734ce67
|
||||
CVE-2024-10380,0,0,aef46b3de7d53b555c16faf90957b5795e7ff38edc57bb3987b023ae2ffcb5c0,2024-11-01T16:11:00.217000
|
||||
CVE-2024-10381,0,0,487fc7c9d16cacf4d1afd228d87369ba897cce3ee6a5ff470497aebb255413ac,2024-11-14T21:44:53.280000
|
||||
CVE-2024-10382,0,0,1c875f1ae2ed66eebbc6e7f1a875f8ec0ccb16ddce83c24470dd6868acfcbaa3,2024-11-26T11:21:57.823000
|
||||
CVE-2024-10385,1,1,2459d78c3508aa616ad4e90307c1255cc6a75e3bad1918f6f1132f6353703d40,2024-12-20T16:15:21.523000
|
||||
CVE-2024-10386,0,0,7aff12031680710648573b87d488e50b0294f20a294313dd69f5a61164db5fd1,2024-11-05T20:07:59.487000
|
||||
CVE-2024-10387,0,0,57470acac2a2dbbd0df691895c55ce7e9f6693f342e79f6c8afed7fe3b526ff6,2024-11-05T20:05:55.323000
|
||||
CVE-2024-10388,0,0,e9ec8dd17e88ba202ee792d712ed48b3ff6fd0d0e6fbe5270057fa94b498de97,2024-11-19T21:57:32.967000
|
||||
@ -244098,7 +244099,7 @@ CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5
|
||||
CVE-2024-11294,0,0,2eb006c700872e4221a5d65f1f84540c18c42b5a19bdffcef60597b889db391d,2024-12-17T09:15:05.193000
|
||||
CVE-2024-11295,0,0,33f60bf01a9cdc709e5955974a036a6d640572051acba82f69d600e268adeb3e,2024-12-18T07:15:06.737000
|
||||
CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000
|
||||
CVE-2024-11297,0,0,effd0c524156f686ff8114158c7be34b290a65be769194d151de349957b742c3,2024-12-20T07:15:09.350000
|
||||
CVE-2024-11297,0,1,dcc20cf881101ac7914684418643db28e12f1dadcf16d43050679625656d4eee,2024-12-20T16:15:22.107000
|
||||
CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000
|
||||
CVE-2024-1130,0,0,a3e19aef9eb3382013136f74a42e19afeb0e606b8f2206b5fca2ea0a53428b21,2024-11-21T08:49:51.890000
|
||||
CVE-2024-11303,0,0,ad607bb34f4cabffd121b35b6cb4bdf73670583d2b4d1068bee702934c5fa785,2024-11-21T22:15:07.213000
|
||||
@ -244661,7 +244662,7 @@ CVE-2024-12003,0,0,14ef5c0679ec50bb5e5014c8e7b631b4905f5419df127668fd74fc6d22bcf
|
||||
CVE-2024-12004,0,0,3dce40ab1e8f9f1b73bc9bad8477202dd665f9594517ea95d989e909aeed6010,2024-12-11T09:15:05.500000
|
||||
CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000
|
||||
CVE-2024-1201,0,0,98150b7d086d80b767e6802e39750bc86f0479b7a9cd93495263225678c4d4a5,2024-11-21T08:50:01.647000
|
||||
CVE-2024-12014,1,1,5c2955367129e0e52f97d85e13482e54e988c9f662c992ca8884a2f843f30395,2024-12-20T13:15:19.430000
|
||||
CVE-2024-12014,0,1,0fbaf047a11b22ead04fafadea66904b0c2d7feefee4cd71ef9629ea9f715d06,2024-12-20T16:15:23.030000
|
||||
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
|
||||
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
|
||||
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
|
||||
@ -244828,7 +244829,7 @@ CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c
|
||||
CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
|
||||
CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
|
||||
CVE-2024-12355,0,0,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000
|
||||
CVE-2024-12356,0,0,d2ccf7eb8b20cc7b1856bfe447212f60da40f7452bb99d79365cdb7946dbb276,2024-12-20T02:00:01.893000
|
||||
CVE-2024-12356,0,1,105dac76f068e0a7df26029c27e4dd4c6eb4193ba09a6f3d1c3ed5326b9fe200,2024-12-20T15:25:37.347000
|
||||
CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
|
||||
CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
|
||||
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
|
||||
@ -245015,6 +245016,7 @@ CVE-2024-12830,0,0,d198fb1fd8ccf96839a414659389d58b36662edb43142fcb13bdf22550e95
|
||||
CVE-2024-12831,0,0,6a7b0e5cf4fa71c8e07ed8162e3704e196eca9cba00188a493458902a4427e43,2024-12-20T01:15:06.670000
|
||||
CVE-2024-12832,0,0,9a101f7d70f0a623c3454123e2a257a4b7f5154c8200a2b8250142a3bbfb4bc4,2024-12-20T01:15:06.793000
|
||||
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
|
||||
CVE-2024-12840,1,1,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000
|
||||
CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000
|
||||
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
|
||||
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
|
||||
@ -246988,7 +246990,7 @@ CVE-2024-21456,0,0,2e3c4dcfd14eeb2f63e676acc678d841ead7728e5f46d735922f201810dec
|
||||
CVE-2024-21457,0,0,800f81fb2142503c59c991e96a4b9b5ed20bd15b2aee416fe7ec03a225a731db,2024-11-21T08:54:24.753000
|
||||
CVE-2024-21458,0,0,3481c1646a5f6e9a7035b2ac245db8e552fc8d0c4b05d6206d9fc7003b58a2e6,2024-11-21T08:54:25.117000
|
||||
CVE-2024-21459,0,0,960d067989e0b4f209117a58970a72a67c866dd213283a69280b49195d98543a,2024-11-26T14:23:08.273000
|
||||
CVE-2024-2146,0,1,6f2c6ad8bb9e17ea41669ac64ba2340fd9fc617f149b5e5911d622e886ccfcf0,2024-12-20T14:37:34.637000
|
||||
CVE-2024-2146,0,0,6f2c6ad8bb9e17ea41669ac64ba2340fd9fc617f149b5e5911d622e886ccfcf0,2024-12-20T14:37:34.637000
|
||||
CVE-2024-21460,0,0,bbc35bb85743b24cb381a6829c5bdcd665ae90fe45617113a38e351e4de91dc9,2024-11-21T08:54:25.690000
|
||||
CVE-2024-21461,0,0,b8ed00e9f935c14f7c8ff589a6c471c291b3eab36d44de52ee6255ffad25fecf,2024-11-21T08:54:25.873000
|
||||
CVE-2024-21462,0,0,bcbc82ba53d1866480b8fd482c19e43e0b78dde416cc6a766bb3446d7bac28c9,2024-11-21T08:54:26.687000
|
||||
@ -248222,7 +248224,7 @@ CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee2
|
||||
CVE-2024-23222,0,0,234fbc8851ab910f53af22b06eaa70a751c876141fb023e6fa28056f96c7e426,2024-11-29T15:05:53.577000
|
||||
CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000
|
||||
CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000
|
||||
CVE-2024-23225,0,0,9dfb819681987b4a5a9414d770000d224347f0f554d029e87276f60932096d78,2024-11-21T08:57:13.833000
|
||||
CVE-2024-23225,0,1,d9417ddf22a7e380727b54cb6838be4f9e33517682bdefff5dd3056836e5a3dc,2024-12-20T16:51:15.130000
|
||||
CVE-2024-23226,0,0,d35555d4d9166169b2d9ebc0c0d3ddd8a6739dcc9d000507c64ae35e59ee757e,2024-12-05T16:33:06.327000
|
||||
CVE-2024-23227,0,0,eeded3365b3f5ae72b53b6766c3f1571c46876b65611fd208cdef323d44e0e7e,2024-12-05T16:31:39.383000
|
||||
CVE-2024-23228,0,0,4777eb1057e01b89423a9fc98cb690d47cbff49eeda10b8695a9f357523c2a6d,2024-12-12T14:33:00.640000
|
||||
@ -248299,7 +248301,7 @@ CVE-2024-23292,0,0,bc50b53ba7fc65e1b34d769e31ab336ca0f8e999265f13d76265950343381
|
||||
CVE-2024-23293,0,0,d58b5f27056e68bd03b53bf47f5a1d1e1ad4098d585ea2403d8a798a0b2f0289,2024-12-09T16:19:06.307000
|
||||
CVE-2024-23294,0,0,cada88db211fe9d398c8417c264ee5745765f39de0ee8dbdd7036758c5310c0f,2024-12-09T16:16:05.597000
|
||||
CVE-2024-23295,0,0,b9bc21e6e4256230eb4f3c16a88e9c46286188aef9199fc0975ac3a816885626,2024-12-09T16:09:27.130000
|
||||
CVE-2024-23296,0,0,a165defb5fb358d9bdbb4a0d0914eb6506b00c6e96be9d339a3b3ffed7f126c7,2024-11-21T08:57:26.477000
|
||||
CVE-2024-23296,0,1,d47e2db1cb3bc410f41d6dae280a8977c797ac9bcbcf817b122d792aeb8730dd,2024-12-20T16:51:47.810000
|
||||
CVE-2024-23297,0,0,30f7ae35603cb3fdf468d260c3681252597c2f5392d5a475631d593e531bfaac,2024-12-09T15:06:14.650000
|
||||
CVE-2024-23298,0,0,801dc4397d9cb442b2a863f1bc826d70b8fd4009aa54eb2ce4e4f0bf9137623d,2024-12-09T14:44:22.810000
|
||||
CVE-2024-23299,0,0,a4c59975d9e4debf492651a9710e74c1d53dab4df40f27acc3fdd4d1a0a06c1a,2024-11-21T08:57:27.153000
|
||||
@ -250638,7 +250640,7 @@ CVE-2024-2663,0,0,c22f0e7b5ed31e3585ae04604569739fcb5bd35aa21e256ad3298c060be800
|
||||
CVE-2024-26630,0,0,adde7411c6c89a1ccc138c9f1404cb16baf029b425dd47ea72b82cb8b0a9fe04,2024-11-21T09:02:43.470000
|
||||
CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e949ce,2024-11-21T09:02:43.580000
|
||||
CVE-2024-26632,0,0,18a93e834a7dcd1db8cc50b7c98fdc181a5de9c2b7f5b01ec61a37fa30cfd7c6,2024-11-21T09:02:43.700000
|
||||
CVE-2024-26633,0,1,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
|
||||
CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
|
||||
CVE-2024-26634,0,0,1f9eeabf8f133d86a691ddf2fa231459fd38dd0f521c36b94c4201dd9d3e3366,2024-11-21T09:02:44.020000
|
||||
CVE-2024-26635,0,0,a7edca2438cebac503d3d0a80a3b8ba894da4196ace5867bea23ec41425d9fe5,2024-11-21T09:02:44.140000
|
||||
CVE-2024-26636,0,0,e040392dbf5dece5991bbd5b4813e4acf74491af81b2691222339ae1b7720289,2024-11-21T09:02:44.270000
|
||||
@ -250804,7 +250806,7 @@ CVE-2024-26780,0,0,fee0ab2d14222179966bcf01d07c058d2d30ea8f43041aa94eb3ef9c96c6d
|
||||
CVE-2024-26781,0,0,234cdda92e172f233aa585909060a118d36dcbae855f4253f71e53f2e6dadba8,2024-11-21T09:03:03.490000
|
||||
CVE-2024-26782,0,0,af24b295a2a14dd277c2f640dd98af16a16ba55999c8897c07ee47027ad93a8b,2024-11-21T09:03:03.607000
|
||||
CVE-2024-26783,0,0,4c88f8a469d8e3fbcff9fc3b4ec47ce374be17421d39b0d3da1148c684918fac,2024-11-21T09:03:03.733000
|
||||
CVE-2024-26784,0,1,5821b81a5ef90036edef0036b32f90e3136a3fea2205d46ae75dbe8e20d91a20,2024-12-20T13:57:21.897000
|
||||
CVE-2024-26784,0,0,5821b81a5ef90036edef0036b32f90e3136a3fea2205d46ae75dbe8e20d91a20,2024-12-20T13:57:21.897000
|
||||
CVE-2024-26785,0,0,fd8b0c8fbbf5be6442564966d80fad9e8c7c55937393b4a4181ec0d2ac84e9bd,2024-11-21T09:03:03.967000
|
||||
CVE-2024-26786,0,0,3691d992d2ccdcf6ccdab7196cd4e2adf94f7ee23904744966f3cd487959c25f,2024-11-21T09:03:04.153000
|
||||
CVE-2024-26787,0,0,87ad657c7b2a5a22c632aa1b17c8d9f055e26c12fb842a5339bee6690a766b54,2024-11-21T09:03:04.333000
|
||||
@ -250812,9 +250814,9 @@ CVE-2024-26788,0,0,47ff845f0a22a9b02d12271102cc8cd1183419158bc4ce15eb94c98cb7b2d
|
||||
CVE-2024-26789,0,0,f7649e1b7c5a364fa580133d1685007324d1099fc792f643837385799389948b,2024-11-21T09:03:04.573000
|
||||
CVE-2024-2679,0,0,feedb7257c60d2502ade5cb9e097bb8b59af8da697b75c19a9c077cee1ddd6f4,2024-11-21T09:10:16.573000
|
||||
CVE-2024-26790,0,0,2b9b84ef81d8de6aa3dc57d8ff4dfc7945973722731a99c9b7f67727cfc494ad,2024-11-21T09:03:04.763000
|
||||
CVE-2024-26791,0,1,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
|
||||
CVE-2024-26792,0,0,4043c1aa2c41d747cd2a0f41e05074ac8152117afdb0da1bcbc9fbc3a681da6b,2024-11-21T09:03:05
|
||||
CVE-2024-26793,0,0,9e005cb985e8984620229e704675316fe676c2e7bdad3429f79f6ec838613dc5,2024-11-21T09:03:05.110000
|
||||
CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
|
||||
CVE-2024-26792,0,1,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||
CVE-2024-26793,0,1,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
|
||||
CVE-2024-26795,0,0,5d4eabef0c456f46f9992c03723452a3a8d635aa76f96f4b5da9c93ac3ba4967,2024-11-21T09:03:05.433000
|
||||
CVE-2024-26796,0,0,aca8e32fdc5cd17befaa7f3f672c165db4946a599ea680ba270a021c886d5cbc,2024-11-21T09:03:05.557000
|
||||
@ -250822,8 +250824,8 @@ CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d
|
||||
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
|
||||
CVE-2024-26799,0,0,94e40360a58865d9d67dfe9e60236d4a43830fc422ed0bb78cda58451cb646a0,2024-11-21T09:03:05.970000
|
||||
CVE-2024-2680,0,0,f440ad10db5cf562a76ee6e3ce6f89409737492b5e2c89786a4d0fe716aad3cf,2024-11-21T09:10:16.717000
|
||||
CVE-2024-26800,0,0,9c719470da199851ff380bb1d7d0bb706728216ad26ce740d82942c4ad4d47ac,2024-11-21T09:03:06.150000
|
||||
CVE-2024-26801,0,0,5a46a3c04ba6580fe39a28c49181487933b3650b8d6fe090306d021242486d0c,2024-11-21T09:03:06.263000
|
||||
CVE-2024-26800,0,1,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000
|
||||
CVE-2024-26801,0,1,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000
|
||||
CVE-2024-26802,0,0,c3eb25f159f3d9e97001cc75436ed032ab724692e7cfb5cb782ce74be6d22c98,2024-11-21T09:03:06.387000
|
||||
CVE-2024-26803,0,0,da1a5e4a8e1ccdf52da3c008697a74e25b55e57ecff04da71adde2377c898cae,2024-11-21T09:03:06.517000
|
||||
CVE-2024-26804,0,0,59bfb883bba3b84feb6cabc2a731628af8063660636b34871b628531b08d0367,2024-11-21T09:03:06.640000
|
||||
@ -250836,7 +250838,7 @@ CVE-2024-2681,0,0,7387262f1fc9d4fe8af6b5ccf5dce82a5507d894762dae6a81dfec5b4e01fe
|
||||
CVE-2024-26810,0,0,5b78c798ab699830f25c706791bc5869344bd655b9540ce5b00869b839745e17,2024-11-21T09:03:07.600000
|
||||
CVE-2024-26811,0,0,1f1ab1f4a533bc19b5527c1709f6805320734fd6fcffd4a6683b114f73eec701,2024-11-21T09:03:07.800000
|
||||
CVE-2024-26812,0,0,273a59efc8369a16932d07ab9a55baa6ec4ff1880726b42e211559660f4ca87d,2024-11-21T09:03:07.927000
|
||||
CVE-2024-26813,0,1,d5b7f2b6b4f59a7ab93dfaf0cce6b486b64b40821d4f07f5dc544253006ebf3d,2024-12-20T14:30:24.357000
|
||||
CVE-2024-26813,0,0,d5b7f2b6b4f59a7ab93dfaf0cce6b486b64b40821d4f07f5dc544253006ebf3d,2024-12-20T14:30:24.357000
|
||||
CVE-2024-26814,0,0,20cd99fb6ad0608315657eb24897528fe729a92be5e948cde94223ad95db37dc,2024-11-21T09:03:08.187000
|
||||
CVE-2024-26815,0,0,8a4780746051857bad12531bb9de34b73d4d4a9eae902bf0bf67a95ca36078a6,2024-11-21T09:03:08.313000
|
||||
CVE-2024-26816,0,0,bb82a7d330052bb4257d053fb0c33482a4cd16e4dae8c95ade96f2e2cefa3261,2024-11-21T09:03:08.437000
|
||||
@ -250912,7 +250914,7 @@ CVE-2024-26879,0,0,9704d8839b75b0e854eec4c51359697b6a4476f2d785619c7296d3dff7e0f
|
||||
CVE-2024-2688,0,0,624e6cba7891f208737b66e4628d36ed0742937a30bd4d599a6bd893ace9e4d5,2024-11-21T09:10:17.823000
|
||||
CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000
|
||||
CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000
|
||||
CVE-2024-26882,0,1,bbe489ee29c0a7bd46d4fc46f3291be28306717f3a37638640e3b60d051438f5,2024-12-20T13:15:20.370000
|
||||
CVE-2024-26882,0,0,bbe489ee29c0a7bd46d4fc46f3291be28306717f3a37638640e3b60d051438f5,2024-12-20T13:15:20.370000
|
||||
CVE-2024-26883,0,0,d72e5c2a08cc96112a7158053aecf4ca442365affa186e749544aa6413017d60,2024-11-21T09:03:17.527000
|
||||
CVE-2024-26884,0,0,90485ab2ad08ce5980bd35da2176ba31c8ca763f26d4fd993f1e3d22b12d7886,2024-11-21T09:03:17.677000
|
||||
CVE-2024-26885,0,0,446267f933cc671c64b57ab46b84d5d9d05b3aa1cddb1f687f50fb09e97e50f3,2024-11-21T09:03:17.910000
|
||||
@ -251169,10 +251171,10 @@ CVE-2024-27115,0,0,23a704a991128549e4058297cc183510e2f019911bda8330d9d373e7628e6
|
||||
CVE-2024-2712,0,0,4b4fb0ad063b2d4f190eb365c70c98a488f4f0017bb4835e23c70bcc528b4ca7,2024-11-21T09:10:21.153000
|
||||
CVE-2024-27120,0,0,978b2d808accd7bc8081bc8a0bd6550ccb316467ae17faddcc157095d9d04beb,2024-08-20T19:08:54.490000
|
||||
CVE-2024-27121,0,0,be0329e24db65a8da36a413498190604f5646307297a4d866c7be2e68be90acf,2024-11-21T09:03:53.850000
|
||||
CVE-2024-27122,0,0,3cca6b5f1ef1376fbee4af6c7ce3acbea46dfff7cc5655be864033289a1207ef,2024-09-13T21:16:26.670000
|
||||
CVE-2024-27122,0,1,185f0648513e97bbf03bb758600504cd9e9f116f22af26eb5d561914b444f922,2024-12-20T15:48:58.860000
|
||||
CVE-2024-27124,0,0,c86f0b5badee79ea9e80b752eefc6c1bae17c637d8b10b0c9ae6ebb140d07d47,2024-11-21T09:03:54.147000
|
||||
CVE-2024-27125,0,0,62447c94edd533b7ea117fa63d76000c06cae5d78dc21800bb3ac647a710fa6f,2024-09-13T21:06:37.417000
|
||||
CVE-2024-27126,0,0,05708a4fe511bcd1941135a742fee8d5d10ce86c6fd7944439af65722824866a,2024-09-13T20:31:54.437000
|
||||
CVE-2024-27126,0,1,3793bc1732fc2d346704b0b1504a0754792f903d694561b105633abfaff80bb1,2024-12-20T15:49:05.487000
|
||||
CVE-2024-27127,0,0,56f7770e9c17ad7419c2c7a4c9b3a0f42f7e5ab48afbee6ee86b77eec58bfbe7,2024-11-21T09:03:54.430000
|
||||
CVE-2024-27128,0,0,25abf69fc83895a13784e9349a98139b1d75374ed7ab65f669ba6c5628c6f842,2024-11-21T09:03:54.590000
|
||||
CVE-2024-27129,0,0,675d38ad59f656bb9de2a8532dded9ee79e6e9ec1860c1ad35fe28a7fec1161e,2024-11-21T09:03:54.740000
|
||||
@ -252340,7 +252342,7 @@ CVE-2024-28760,0,0,68e010dc44e656e286ebd73c538be9ce7268acda0fbfa9110862129c79d92
|
||||
CVE-2024-28761,0,0,616b7e09c3bcd95cb79ce0093cc728c720fcdd0e8df0ed8d707b9bd5ccafd84e,2024-11-21T09:06:54.880000
|
||||
CVE-2024-28762,0,0,e7146f96c55753c65cd4f661c712c523979eaaba20e1cbe7b3b78b7197e1711c,2024-11-21T09:06:55.017000
|
||||
CVE-2024-28764,0,0,42363a94f8163c9cad8147d31e6295d669ad4dcbcb1cf61276272a7a155229ea,2024-11-21T09:06:55.180000
|
||||
CVE-2024-28767,1,1,bf248c5aa16b7172242353e581cc3e23d856f773c76869ef9b6e5d2ea04fcda8,2024-12-20T14:15:23.850000
|
||||
CVE-2024-28767,0,0,bf248c5aa16b7172242353e581cc3e23d856f773c76869ef9b6e5d2ea04fcda8,2024-12-20T14:15:23.850000
|
||||
CVE-2024-2877,0,0,e8536f3b9a8db8cfb1a01dc3baa76bd8616106f111c0e4e2021b78fa36854ec8,2024-11-21T09:10:44.020000
|
||||
CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000
|
||||
CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000
|
||||
@ -252411,7 +252413,7 @@ CVE-2024-28866,0,0,b4d9a9c7cae11a8cc5512d01e0e004336928eba97a541638291b9c9a93854
|
||||
CVE-2024-28867,0,0,13de37d1251837764571928cd6979ba699a7aa83d7eae7fbaaf533c23265ad8c,2024-11-21T09:07:04.590000
|
||||
CVE-2024-28868,0,0,6c9ea04241ecd2d663619e15c91822465ade59ac9d3964b9066fcf3f51923d3e,2024-11-21T09:07:04.723000
|
||||
CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff4a5,2024-11-21T09:07:04.857000
|
||||
CVE-2024-2887,0,1,70a96806611abc951986b04e22c239259f8682e359651c93ff6f67c8b4acffc6,2024-12-20T13:48:51.147000
|
||||
CVE-2024-2887,0,0,70a96806611abc951986b04e22c239259f8682e359651c93ff6f67c8b4acffc6,2024-12-20T13:48:51.147000
|
||||
CVE-2024-28870,0,0,1948db6c1330344e0305cc9883b822c2b1c7846eda6f6ae64a39b3f568697ade,2024-11-21T09:07:05.013000
|
||||
CVE-2024-28871,0,0,66beb860b668b240441f397870a5def3e52a27283cc1f106699d7ed5d3fb58ea,2024-11-21T09:07:05.180000
|
||||
CVE-2024-28872,0,0,8ec05321c564ebf02cf9ea5ae2ff11b0deea8154abde72d5969c0c62b8cb8210,2024-11-21T09:07:05.323000
|
||||
@ -254865,7 +254867,7 @@ CVE-2024-32109,0,0,c9a7cac737476956b9fbf72c1e5d6a8a50bb5a1742710bddb0f71999ccd9d
|
||||
CVE-2024-3211,0,0,98aac495f2a7a17ab7cb4a24950a45aa52e6a13f3e3a0c46ae3956f9c49aadf2,2024-11-21T09:29:09.530000
|
||||
CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599a80,2024-11-21T09:14:29.573000
|
||||
CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000
|
||||
CVE-2024-32113,0,0,ae903c3c51e0ff18b14712e22132579fd112ac033fe60920236e808a8a659358,2024-11-21T09:14:29.843000
|
||||
CVE-2024-32113,0,1,758bc627df310f7de0704ae877061bf72b342caa11ef83c397db20df8b50d04e,2024-12-20T16:51:57.577000
|
||||
CVE-2024-32114,0,0,ec761db7a5ad46df257b60e3bffba3183bd48091e424b77fbddb80d44570b8c2,2024-11-21T09:14:30.127000
|
||||
CVE-2024-32116,0,0,f10f3c24dc00a2826d06434dd27b29c41c2c38d776ae02f6706b238c0f312734,2024-11-13T17:01:16.850000
|
||||
CVE-2024-32117,0,0,6ced7b5df85b7cf270709040a6c78ad7915ac1694cdc1063e73cbc492ca11ee8,2024-11-13T17:01:16.850000
|
||||
@ -255639,7 +255641,7 @@ CVE-2024-33038,0,0,3fa95bcb86da6690578028a8fd1c5bf34e8f52fe062a9d486732742636ea2
|
||||
CVE-2024-33039,0,0,c70cd5c8387baec87864315064b8cd71824c91bfe9bffb94509e0271db4159ed,2024-12-11T16:15:37
|
||||
CVE-2024-33040,0,0,ec89092e2f81a4db83f210a851ea365544915c884404ba5019a0b6e1e6743860,2024-12-12T15:21:35.590000
|
||||
CVE-2024-33042,0,0,cb5fc696225b31902209ef8ef520020bd65113c14578e54cac28b7b4036e44fd,2024-09-04T17:08:07.433000
|
||||
CVE-2024-33043,0,1,888d59d76f2b08f2775279205fe97ef80c2d9ac568503f1a140b40b0aecf1319,2024-12-20T14:33:22.363000
|
||||
CVE-2024-33043,0,0,888d59d76f2b08f2775279205fe97ef80c2d9ac568503f1a140b40b0aecf1319,2024-12-20T14:33:22.363000
|
||||
CVE-2024-33044,0,0,2d7b18559a893802d33431e8ff7cb5b7a9add59de5079930cd1c576a25dcc1c0,2024-12-12T15:23:26.007000
|
||||
CVE-2024-33045,0,0,8673a65424eab90019063a357b5663b1f759ca152c915d9573bd7beb3fa4b58b,2024-09-04T17:20:55.297000
|
||||
CVE-2024-33047,0,0,fdc808d9bdd24ef6efd4d28f6df207f7502cdcf2791e28df9a25b038dc723d94,2024-09-04T17:07:31.877000
|
||||
@ -258593,7 +258595,7 @@ CVE-2024-37080,0,0,c235125cb88a4c9eb5712f08a6a48067f0e62027eebca5877060642029c78
|
||||
CVE-2024-37081,0,0,5f3b3ea879aeb2af37255c2c906f01b45b1cdb7f35a5125d3d7fa22d1134f005,2024-11-21T09:23:09.430000
|
||||
CVE-2024-37082,0,0,6bf6931c6e4458306423d88f4c271b58742a49de22a708b3fa70ace5c58eee64,2024-11-21T09:23:09.607000
|
||||
CVE-2024-37084,0,0,17b4d0ebb2893714179426a840ba58f383f2be234d957361f160ee486693c99f,2024-11-21T09:23:09.750000
|
||||
CVE-2024-37085,0,0,3caac633bf064dca0fb3c7e5c80e8a8c215211a131918441c23e1af7f5d5c559,2024-11-21T09:23:09.910000
|
||||
CVE-2024-37085,0,1,a9ac54e9575fe85a29aaa945441fdb0d2c9bc9f2949737b6f857d56202f45ca8,2024-12-20T16:52:43.217000
|
||||
CVE-2024-37086,0,0,a717eb3545be15590ba6655f1537e213e7110c01723f60e35623cea4a358284b,2024-11-21T09:23:10.060000
|
||||
CVE-2024-37087,0,0,32aef3b54e03c06293ea895653eb63d65e548a458126992ae45a78a65cd58343,2024-11-21T09:23:10.200000
|
||||
CVE-2024-37089,0,0,8d387479d3a2a6e03e30baefa0716f09d2a1a735bef61b94a2cbba881bf018ea,2024-11-21T09:23:10.330000
|
||||
@ -258867,7 +258869,7 @@ CVE-2024-3738,0,0,6b7c5ee43d749786d04736c3425539aee3d10b90489eb5acbf775617e1e2b2
|
||||
CVE-2024-37380,0,0,77cf3dfb25923a81bead84472c82f0af78f2d433b4d7604e764b919f8522c470,2024-11-21T09:23:44.180000
|
||||
CVE-2024-37381,0,0,9f8a1e24016e672c46f9ac1942c6c3e469697399412e29900bea76bbfcf0caef,2024-11-21T09:23:44.310000
|
||||
CVE-2024-37382,0,0,351acbbb35c6e810a4a4b14170847f37e61db11e04c62933e1148863747f62d1,2024-08-29T14:29:32.920000
|
||||
CVE-2024-37383,0,0,3e8d9db795a8cbf333247d43d4261c368409d42ea0e189227fa5cf2602c8f77f,2024-11-21T09:23:44.700000
|
||||
CVE-2024-37383,0,1,b1ff3cb6598ed1ba41af52ada946067c26e1f9b448619cfbacc86943333f66e9,2024-12-20T16:52:05.623000
|
||||
CVE-2024-37384,0,0,fc4471efd9bb23449fa9db31dee7f8a0d5954ec59042d211a974e2576d8626f9,2024-11-21T09:23:44.963000
|
||||
CVE-2024-37385,0,0,42dba148074eb68f96dc3032ef510bc428ca2ec23394b14e18ac5efc7f3674b6,2024-11-21T09:23:45.193000
|
||||
CVE-2024-37386,0,0,b3b80f364518cfd17d5ee452f25d6cb7775d8ae7b1e0df3e35aae4575b507127,2024-11-21T09:23:45.460000
|
||||
@ -259592,8 +259594,8 @@ CVE-2024-38295,0,0,f358c490df2a2504a6d87be69cb330bfbc1382bb00194c4d2ceb8f0360137
|
||||
CVE-2024-38296,0,0,90ff660165a89e7e7467c3f5b8f9b0ba142341c8df2e0e0450da97394e7f8dfb,2024-12-09T15:15:13.993000
|
||||
CVE-2024-38301,0,0,4ed3fa9c79b4615c31506838a9d16fce326b29b50510a98765e221d758d5a217,2024-11-21T09:25:19.937000
|
||||
CVE-2024-38302,0,0,d8283ff5db2008533114a74a6586fae13c7878d55c406849844820c3fd520bfe,2024-11-21T09:25:20.210000
|
||||
CVE-2024-38303,0,1,48f740ae5336dea6993e1df6502cbae19e1e53f943bf40615f10bf1afa498a91,2024-12-20T14:40:09.410000
|
||||
CVE-2024-38304,0,1,93fc20945861e381c6a93babdafb378ffefe909e70fe03228cef160c3626e6fd,2024-12-20T14:41:01.273000
|
||||
CVE-2024-38303,0,0,48f740ae5336dea6993e1df6502cbae19e1e53f943bf40615f10bf1afa498a91,2024-12-20T14:40:09.410000
|
||||
CVE-2024-38304,0,0,93fc20945861e381c6a93babdafb378ffefe909e70fe03228cef160c3626e6fd,2024-12-20T14:41:01.273000
|
||||
CVE-2024-38305,0,0,b50204d0d2adbfeee4304f94e93a151274edb07a1881b5e4d7cf38bf07c62bde,2024-11-25T18:16:27.450000
|
||||
CVE-2024-38306,0,0,923ef8f5750ef5dc8b1aa0f80ec3ec7f20d2a05cc416d49512377e1d2196c5c7,2024-11-21T09:25:20.867000
|
||||
CVE-2024-38308,0,0,aa0e1dcb340f88b60a097b1f78e4419b606f07980132596118f63e0ca049be13,2024-10-07T15:24:34.517000
|
||||
@ -260080,7 +260082,7 @@ CVE-2024-38832,0,0,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101
|
||||
CVE-2024-38833,0,0,4362568a75fe4ff6f0b022eb6319bcf28879b08f368dc59d539bcf2b96b0e3c0,2024-12-06T20:15:26.097000
|
||||
CVE-2024-38834,0,0,d1e4df2457be3688e7ecbb94c62f14ef708bf2a35a15ef98a11a7f707840deba,2024-12-06T20:15:26.207000
|
||||
CVE-2024-3885,0,0,d8203bf975259cc7c9b8096eb8aae188572edbc7f75dcaea8b5f71a9e139f772,2024-11-21T09:30:37.807000
|
||||
CVE-2024-38856,0,0,e94bdfa5e25fada0f71152b04912dc54a989385e35605bc5f8a906dbc042c74d,2024-11-21T09:26:52.837000
|
||||
CVE-2024-38856,0,1,1179c7b2db8de0f6b621a0e591d1f9edf5c96f25bb4617d01659a6586ed94c66,2024-12-20T16:35:41.330000
|
||||
CVE-2024-38857,0,0,392b260a009bcf153896a24b0ca2ef35f6f5d57e012aa080627851164a4da679,2024-12-04T15:37:16.290000
|
||||
CVE-2024-38858,0,0,0905a6edb93734f4ba33225c6937d7fb9b4d2ff2a1ff03b7aa90c2c6088f27ac,2024-09-04T14:39:10.203000
|
||||
CVE-2024-38859,0,0,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000
|
||||
@ -260566,7 +260568,7 @@ CVE-2024-39580,0,0,060e58f9bc3c16244391fcf26ea0c82abcb1bc9a8ed3e9a123f34b1ba0f2c
|
||||
CVE-2024-39581,0,0,1745bca1ea2304cf837e6e79c64a01ad53baabaf9ef3d48a24a9928bfdc168db,2024-09-16T15:50:55.350000
|
||||
CVE-2024-39582,0,0,a69827660512ff704eb2bcbdf15c32a6caca0d5f2ad2d1ac267b1fb0aa6d37b4,2024-09-16T15:36:21.687000
|
||||
CVE-2024-39583,0,0,2aae5cf43c79545116a984728baf88e52f762295d62fc865b43c54e5d5e1ecfe,2024-09-16T15:42:06.347000
|
||||
CVE-2024-39584,0,1,d1d518ea06be6e756333d5be69bd11ec34f3c16fa00598d0206311f6a596677f,2024-12-20T14:38:16.543000
|
||||
CVE-2024-39584,0,0,d1d518ea06be6e756333d5be69bd11ec34f3c16fa00598d0206311f6a596677f,2024-12-20T14:38:16.543000
|
||||
CVE-2024-39585,0,0,39cd1c0bbfe67f89d1cc8a5b7cefaa0c7460a74c74db12c3d5a47b4cec7b2ce8,2024-09-17T02:15:49.397000
|
||||
CVE-2024-39586,0,0,672d87b269c6fff6669ce4144539b9589c16c6c7762c6e45b6e6d8d6178efece,2024-10-17T14:30:02.843000
|
||||
CVE-2024-39589,0,0,c3436e19e734005c5547c05c0c4052f2c4c31b75ad02d7b3ed0faf4e5c074e30,2024-09-26T21:36:12.887000
|
||||
@ -260810,7 +260812,7 @@ CVE-2024-39887,0,0,8ee03603ace192c884ceda52f2aacab6ea4c099a303b374fdd80802d5de2e
|
||||
CVE-2024-39888,0,0,81c1a1a3b559fb766c964d813b74871c335741225eeead7406d8629b71ea8739,2024-11-21T09:28:30.540000
|
||||
CVE-2024-3989,0,0,282bf7f86f8761318f492d12462b4a7880646f788a5c46f5a9950ff45ab93cd5,2024-11-21T09:30:50.250000
|
||||
CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000
|
||||
CVE-2024-39891,0,0,b708338dd2048fd8630b038eae2cb3bca86a3d4b1959c90087f7ed08c2cbc65b,2024-11-21T09:28:30.683000
|
||||
CVE-2024-39891,0,1,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000
|
||||
CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000
|
||||
CVE-2024-39895,0,0,48e965215ad9f93f32302de4cc2925636a5990f6518710e75a7792ea0f466f5a,2024-11-21T09:28:31.113000
|
||||
CVE-2024-39896,0,0,633e65a00d4c10f39b58379fe78094ad8927ec99c74b82d38cd2d53912355928,2024-11-21T09:28:31.230000
|
||||
@ -261126,7 +261128,7 @@ CVE-2024-40689,0,0,41d3e4691112f48676cdb44eacf0cb30b856617ce94bb50310ea65e78ab40
|
||||
CVE-2024-4069,0,0,94f7ce6ab537b8de29354ee99519ed1e16c84a745bc6420413a49d7a75f78144,2024-11-21T09:42:07.833000
|
||||
CVE-2024-40690,0,0,ac3fd8879f79e94d956d55740e068f2d064b41dedd1ece8ce64e710fe502e9c1,2024-11-21T09:31:28.197000
|
||||
CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76ba35,2024-12-11T03:29:39.627000
|
||||
CVE-2024-40695,1,1,f86aa2eadb9876d1d16695bd4bbe4d0b7d218a6bc0c7ed5c964dcd1e2545ea61,2024-12-20T14:15:24.063000
|
||||
CVE-2024-40695,0,0,f86aa2eadb9876d1d16695bd4bbe4d0b7d218a6bc0c7ed5c964dcd1e2545ea61,2024-12-20T14:15:24.063000
|
||||
CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000
|
||||
CVE-2024-4070,0,0,228e3a9486746eb131dc1faba8cea69af4b69cb949a0fc5caabe789181f2b9b7,2024-11-21T09:42:07.967000
|
||||
CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000
|
||||
@ -261135,7 +261137,7 @@ CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88f
|
||||
CVE-2024-40709,0,0,fc599183e9661cbcade523183f2c327fbd248e82b89d065b196cf8d66176a6c5,2024-09-09T15:35:08.283000
|
||||
CVE-2024-4071,0,0,6b7a15c8812d01f9851365bf0640804d8a54a0d07fe306e122faf1e050f7c253,2024-11-21T09:42:08.097000
|
||||
CVE-2024-40710,0,0,770af878a2a59ef82e06d03d07cf0408429abb3e03291325079d2d5ef2519547,2024-09-09T17:35:04.207000
|
||||
CVE-2024-40711,0,0,be5aab7aa6eb4dc8a4d7e78693ae331cacd496c7e3f9b1269bf5c48c33fda67c,2024-11-21T09:31:28.827000
|
||||
CVE-2024-40711,0,1,7b916b0711bc44aabe5c56eee896ffffaf138f2a0c03f97b9d1731ef29c51dd9,2024-12-20T16:35:59.103000
|
||||
CVE-2024-40712,0,0,9b2697b2eba4c69fff39e4fe2868a8adaaae993e23627840ecc81e505d9046d1,2024-09-09T16:35:06.673000
|
||||
CVE-2024-40713,0,0,a9216adf51dc1ca930e362df269647bc0ed1c0502b95ef822b4a8bff7019db6c,2024-09-09T15:35:08.970000
|
||||
CVE-2024-40714,0,0,026f680bbc0efd7928869ee7a08cabe88c5295f087ce979f6303318acfabe463,2024-09-09T14:35:02.980000
|
||||
@ -262464,10 +262466,10 @@ CVE-2024-4242,0,0,16229b202f4a4845ca60d143db02216ab4ba7ead852059b884da5aa41d2c38
|
||||
CVE-2024-42420,0,0,c141965d63744fc1061446ee1ae1162360d4790ebb601639ac109ac40f0d20d4,2024-11-05T19:39:31.913000
|
||||
CVE-2024-42422,0,0,f64eacceb341ef4b768f40ee59a3acc8f645f72652a962c616340fa5fb7a93cc,2024-12-03T13:15:04.987000
|
||||
CVE-2024-42423,0,0,8264e3551cb249dc1d0a50016c0beecba4be32a4ea61b5936f8d0d7397afda33,2024-09-20T19:42:20.417000
|
||||
CVE-2024-42424,0,1,cdd20f106ec5d8232f1cf93d7c25f7e27225ced2de6387354bfbd69f26558307,2024-12-20T14:41:45.593000
|
||||
CVE-2024-42424,0,0,cdd20f106ec5d8232f1cf93d7c25f7e27225ced2de6387354bfbd69f26558307,2024-12-20T14:41:45.593000
|
||||
CVE-2024-42425,0,0,4b136399741737f30b4c8074218caee04298fffe4ffb70bb1828268e47340c65,2024-09-16T15:46:03.110000
|
||||
CVE-2024-42426,0,0,f4a6ad782e842131d9760e6c87674ce9536f74149d8b726727cdec40979702cf,2024-12-09T15:15:15.450000
|
||||
CVE-2024-42427,0,1,e27087303ea5100deec42ac0b4f9f58e1be3170e3db42adb071e149bc5ec50df,2024-12-20T14:43:52.363000
|
||||
CVE-2024-42427,0,0,e27087303ea5100deec42ac0b4f9f58e1be3170e3db42adb071e149bc5ec50df,2024-12-20T14:43:52.363000
|
||||
CVE-2024-4243,0,0,fca6a85a4835b49fddf5d0335fd4a7549a8fc3f34d76f463d721c47ebcb74e87,2024-11-21T09:42:27.497000
|
||||
CVE-2024-42434,0,0,9351c3a6511f8bd4654b992e3a2dc28615806892c5ceb04ccff2f3cbfaf8ce4b,2024-09-04T21:35:50.963000
|
||||
CVE-2024-42435,0,0,358ce7d8c8d4db67db4278a345f7cf0453db05c04348a1ea4af0bd0f5883a07d,2024-09-04T21:36:53.027000
|
||||
@ -262953,7 +262955,7 @@ CVE-2024-43219,0,0,bc89c1a1e6ce307adcf92ae27635e024a9ced0b5d750954b55bcd81d6e935
|
||||
CVE-2024-4322,0,0,6f535e4301c4177292e8b193dfad1e892d877195cdd8805de5a65bc48139f7d7,2024-11-21T09:42:37.400000
|
||||
CVE-2024-43220,0,0,a5e6bc2b73e869859a6306037ab4ac04781878e232202a6168b0e4a37cb70884,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43221,0,0,52bf4703a192c3b5d3768eaf3c73879eb2cdcf3e5ce777a1d149ec7c0bd8a2ed,2024-08-19T18:36:20.123000
|
||||
CVE-2024-43222,0,1,1f6e84d11f305b7faaa7491a90db1bdda20110120892020a706a65b2aae73939,2024-12-20T13:15:20.887000
|
||||
CVE-2024-43222,0,0,1f6e84d11f305b7faaa7491a90db1bdda20110120892020a706a65b2aae73939,2024-12-20T13:15:20.887000
|
||||
CVE-2024-43223,0,0,10b1f46ac57b6e18c1724b971411da9b7b101822770632c9686f7c2694bf43fb,2024-11-01T20:24:53.730000
|
||||
CVE-2024-43224,0,0,d567ed7362ff738e465a90827beca5137f9f3a243f17be25954e3a800c4e0eb6,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43225,0,0,ba4cc5f0a185ec79a06b1af32b38d62edf190927098d0c1fd69523c1b37f66a7,2024-08-13T12:58:25.437000
|
||||
@ -262965,7 +262967,7 @@ CVE-2024-43230,0,0,3438c9ccfea127a956b5025f46fc0219f157584c782a74b31fb7851ceb9b9
|
||||
CVE-2024-43231,0,0,44c239b38fbd55455653753b3fd25fe2d8d919b27d08f15ee1b05fad9edf9d6b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43232,0,0,52a1852c046c09034701352a38e8ac744730c5fd62b6924733c81dd9ea3e74f7,2024-08-19T18:36:07.297000
|
||||
CVE-2024-43233,0,0,a3cb80d788fcdefbe82efd5cb7c46f3e83ae874c20df2ef7eb293b519d517ebb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43234,0,1,a95bd08f590e3d189096afbaa43b4d3d437b094ea5a086eb51eec8bbe549450f,2024-12-20T13:15:21.197000
|
||||
CVE-2024-43234,0,0,a95bd08f590e3d189096afbaa43b4d3d437b094ea5a086eb51eec8bbe549450f,2024-12-20T13:15:21.197000
|
||||
CVE-2024-43235,0,0,153cf4f640991e76b1fd90c9e2d70c020b64700c307856901f74189cc7743bee,2024-11-01T20:24:53.730000
|
||||
CVE-2024-43236,0,0,31b49ca6a31d05d0d0a34fd55ac45950bc1127c323529a1cff3b9cca0de7458c,2024-08-19T18:36:07.297000
|
||||
CVE-2024-43237,0,0,b06cb1da3f0bf78839a44face593f3df310ca1b2e53335b15d64a161ba7d3890,2024-09-26T13:32:02.803000
|
||||
@ -264686,7 +264688,7 @@ CVE-2024-45513,0,0,25383385e2481e17b58af0b6e8f56bf94670b2d8f40ad98216966f161261e
|
||||
CVE-2024-45514,0,0,7c4b7c6d70b14b13f42d6ce3c0114c4be691ac359315234fcdf5201ecc180838,2024-11-21T18:15:08.980000
|
||||
CVE-2024-45517,0,0,9ae29652a251f6463a9327eae29d2e48904246c6a1726faacae2bdc1383f4e16,2024-11-21T18:15:09.360000
|
||||
CVE-2024-45518,0,0,097e334ff5ea6e41f366599c72134c8651cb553e492c30874b146dfc7c023e19,2024-10-30T21:23:59.893000
|
||||
CVE-2024-45519,0,0,dee4bc6ec9515387211f0e632473400edd658c7ad79cd2b2d900c1e5915d696d,2024-11-21T09:37:53.673000
|
||||
CVE-2024-45519,0,1,a4e00f7b7b350923f5ea9829bd557075a8c7be45eaef48586624621fdc66f332,2024-12-20T16:38:02.830000
|
||||
CVE-2024-4552,0,0,0ac013621f010657983b95b3c9656c63a7805aea50fe3c0c1148c97b70e80ccb,2024-11-21T09:43:05.410000
|
||||
CVE-2024-45520,0,0,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
|
||||
CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab69d,2024-09-05T14:29:32.737000
|
||||
@ -264747,7 +264749,7 @@ CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a43
|
||||
CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000
|
||||
CVE-2024-45656,0,0,bd9c2ffe8b9cbe4ee804430325ca28b90db5a453ccc34b145371cf00c3254208,2024-10-29T14:34:04.427000
|
||||
CVE-2024-4566,0,0,67793534ad65df3a22647f8471d680f58a33cea10b3409d6ba3f0ab52674e69f,2024-11-21T09:43:07.400000
|
||||
CVE-2024-45663,0,1,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b671c,2024-12-20T13:15:21.443000
|
||||
CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b671c,2024-12-20T13:15:21.443000
|
||||
CVE-2024-4567,0,0,22751845307af6a336c20a91c0c6d397e4abd955b5d1c7b822f192181225c614,2024-11-21T09:43:07.517000
|
||||
CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000
|
||||
CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000
|
||||
@ -266117,7 +266119,7 @@ CVE-2024-47729,0,0,fb9a3faae532a190b209638889d4832a1d191c04842bce7afb041141eec36
|
||||
CVE-2024-4773,0,0,f07928dcaaae5547ae54333e5752e7ed4bba50f109f8629be58c47cb4fadd4f8,2024-11-21T09:43:34.870000
|
||||
CVE-2024-47730,0,0,c6a9de9e049a16d83f626647f6f2c8b4ce794fd7c5922ed53347a89cb17a969d,2024-12-14T21:15:26
|
||||
CVE-2024-47731,0,0,2756673f447be2086c764fb0084779dae2a0a2504478f334b1544eccc1563c5d,2024-10-23T17:06:14.323000
|
||||
CVE-2024-47732,0,0,d225b0c59c32949bbe60aaf4664ae3c6722d21c9f6d51787db7a6ccea173c28f,2024-10-23T16:31:03.873000
|
||||
CVE-2024-47732,0,1,05bbc804c4a0c0d9d685cce21a450e0245c74d19ed4566d6c1d9947b0a7b8a56,2024-12-20T15:44:01.303000
|
||||
CVE-2024-47733,0,0,11a8a1225a2051b1e4caaabdc12052064513ae3d9225538c36ed409eb08ff462,2024-10-23T17:11:29.537000
|
||||
CVE-2024-47734,0,0,5e5700382d355b46474a0bfa92c47869d8da9e178f09ce7eb5625a5032dba08c,2024-10-23T17:16:13.457000
|
||||
CVE-2024-47735,0,0,a0c8f15cafb24e18391bda11b17021459a43e5529c34748cf489eefd8dea5af4,2024-10-23T21:00:03.940000
|
||||
@ -266726,7 +266728,7 @@ CVE-2024-48939,0,0,9fd45fdd854de6d1351e4a7a16841cdd4a8b12ab5f31c3c4dfb7ab36c4bdb
|
||||
CVE-2024-4894,0,0,08da41b1eb3b39a5ce145f87a7f03263d958bbcc39f79a29e392f05f23c08d28,2024-11-21T09:43:48.647000
|
||||
CVE-2024-48941,0,0,ac5a4122835fc378fb46e450704764b8fe26775e4f072c0574729413dfa4910e,2024-10-11T21:36:46.327000
|
||||
CVE-2024-48942,0,0,01b20df2f41dbb802f4a1391c6d96fe318f95cae9fddeee38b72a9647c646d8a,2024-10-11T21:36:47.090000
|
||||
CVE-2024-48948,0,1,350fb0c91e46855544ee6431947b6e209e71e7a45b35cd8ffac429aebb5346a5,2024-12-20T13:15:21.617000
|
||||
CVE-2024-48948,0,0,350fb0c91e46855544ee6431947b6e209e71e7a45b35cd8ffac429aebb5346a5,2024-12-20T13:15:21.617000
|
||||
CVE-2024-48949,0,0,ce2daeb07f2e92c4ed5dfe3a7448960700e4a092ef4ccf564054007c623b89ee,2024-10-15T14:07:04.057000
|
||||
CVE-2024-4895,0,0,3024a1fbee38a7ec6c675e9a5868d17a51e330cbe678ef07012606dad66c8a44,2024-11-21T09:43:48.767000
|
||||
CVE-2024-48950,0,0,7387f6158c934b62aa1ce66c1f17619e18421caa2fa3716e33734d532689d10e,2024-11-08T19:01:03.880000
|
||||
@ -268132,7 +268134,7 @@ CVE-2024-50614,0,0,29f22ac93163ff1303a42a1fec38fde0552d285d63129bbab00c726fede4a
|
||||
CVE-2024-50615,0,0,4d2a2e353be570a02fcdfff0b42fb37b106e2c1e8ab4e77f1c580e4daa183aa0,2024-10-30T20:35:37.310000
|
||||
CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac77217c,2024-10-30T20:35:38.380000
|
||||
CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000
|
||||
CVE-2024-50623,0,0,62e8cffd30c5d72092373d41d8ec23b99a4cef515ed628acbe0215e624b1e692,2024-12-17T22:15:06.793000
|
||||
CVE-2024-50623,0,1,fbc7180051d21f3b882ce8b014ba2136036caba5e6fb74887641a3e6975ea4c8,2024-12-20T15:04:26.097000
|
||||
CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000
|
||||
CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000
|
||||
CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000
|
||||
@ -268444,7 +268446,7 @@ CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8
|
||||
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
|
||||
CVE-2024-51460,0,0,5ed8cb0bc6e7264a024f4fdc6bea49f8d819c03171033b2027328a825c325cb4,2024-12-11T13:15:06.510000
|
||||
CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000
|
||||
CVE-2024-51466,1,1,f8d3d47f89339e1c49e199d4d29061c3398d8045235700eb4ff399548ec59171,2024-12-20T14:15:24.250000
|
||||
CVE-2024-51466,0,0,f8d3d47f89339e1c49e199d4d29061c3398d8045235700eb4ff399548ec59171,2024-12-20T14:15:24.250000
|
||||
CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000
|
||||
CVE-2024-51470,0,0,9a68227a72c1064eab4055d83fe70a009177c8e62fdfec5f25404954fdd9cb78,2024-12-18T20:15:23.233000
|
||||
CVE-2024-51471,0,0,da4efc372fa124d54fa44eb99218e2e0080d03b73921d05f5529d8f942405e5d,2024-12-19T18:15:23.153000
|
||||
@ -269760,7 +269762,7 @@ CVE-2024-53673,0,0,998c285a4fe0e35cbecbdb698279013b408c1bb4163a1e69369fac314d145
|
||||
CVE-2024-53674,0,0,f555b7f03d33cd061d1493d8fc99309d52915e66d5ae0672802dcf1d36a50f32,2024-12-12T19:49:49.800000
|
||||
CVE-2024-53675,0,0,1183b1bd94841ad73311a268c8a0b2c37f3657514fc74825a9481690ca681ab0,2024-12-12T19:48:48.443000
|
||||
CVE-2024-53676,0,0,9e5335d7636e62fb7cc2e79040736f3f5e3856b52ef7bfb0006141b3e5724acd,2024-12-11T16:49:45.783000
|
||||
CVE-2024-53677,0,0,b20f80da36871f8fb5324e3fc1c5ec83c8e6575f3a46d6f78ed41ab00c5aabf8,2024-12-18T01:15:06.237000
|
||||
CVE-2024-53677,0,1,2c82f6dfafd4ab59665cd854e88961198dbdaaddbf165399a6a329129ec73fad,2024-12-20T16:15:23.723000
|
||||
CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f416,2024-11-21T09:47:30.877000
|
||||
CVE-2024-53688,0,0,39c0c1265bef5471cee144abe50646778e59e18b4acc0bb850c0ac5745fa9205,2024-12-18T07:15:08.233000
|
||||
CVE-2024-5369,0,0,14abdfed4d5003ff16a96b2708e00658833baa1f8166ee56f5ba2dba896b20f5,2024-11-21T09:47:31.020000
|
||||
@ -270109,9 +270111,9 @@ CVE-2024-54210,0,0,f83f30ee27a661d46c5111f7262e27c9f0414dc5f3f0a660c29ce543d494f
|
||||
CVE-2024-54211,0,0,a0003d81fa664adaeafd319382b45028c00e98bcf6fdefd355db5bce1b24339a,2024-12-06T14:15:26.093000
|
||||
CVE-2024-54212,0,0,60d354c5b09cd00ebae59ef3487f7d2dcbdfd47360fa3c7281188702d2198526,2024-12-06T14:15:26.223000
|
||||
CVE-2024-54213,0,0,509cdc61113dccf0a4117c9f17cbb87e45d7a6efba5fb2b5bc372f73d2bbb0cd,2024-12-06T14:15:26.373000
|
||||
CVE-2024-54214,0,1,6a0d19ffe7e7425aef813bcf3c1322b00952909677745d5ce26bafe4dfab7e84,2024-12-20T13:15:21.880000
|
||||
CVE-2024-54215,0,1,4c4972e5b1b84bb58b882a741abdc0841c8379a0be8dc9634f570589683b55f7,2024-12-20T13:15:22.060000
|
||||
CVE-2024-54216,0,1,b9ee03ecfa56e19e7bcf47310960d12519c23e01638996abc1f8f04f1da5fcf5,2024-12-20T13:15:22.260000
|
||||
CVE-2024-54214,0,0,6a0d19ffe7e7425aef813bcf3c1322b00952909677745d5ce26bafe4dfab7e84,2024-12-20T13:15:21.880000
|
||||
CVE-2024-54215,0,0,4c4972e5b1b84bb58b882a741abdc0841c8379a0be8dc9634f570589683b55f7,2024-12-20T13:15:22.060000
|
||||
CVE-2024-54216,0,0,b9ee03ecfa56e19e7bcf47310960d12519c23e01638996abc1f8f04f1da5fcf5,2024-12-20T13:15:22.260000
|
||||
CVE-2024-54217,0,0,a3ed8b3263a4e322684d40be2981bc661837657463c6eb53f7d4f4f7b5a161a7,2024-12-09T13:15:41.997000
|
||||
CVE-2024-54218,0,0,202e6b151d5bb39dd6bca6d350d7b1cae1666e4417e3fa76a5eecca83609337f,2024-12-09T14:15:12.813000
|
||||
CVE-2024-54219,0,0,1beae381ab249be41d558a5661adb5fad10f38109c4ff8ce46a6b8e6e6d53c19,2024-12-09T13:15:42.130000
|
||||
@ -270396,7 +270398,7 @@ CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9
|
||||
CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
|
||||
CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000
|
||||
CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000
|
||||
CVE-2024-54529,0,1,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000
|
||||
CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000
|
||||
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
|
||||
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
|
||||
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
|
||||
@ -270517,6 +270519,7 @@ CVE-2024-5515,0,0,71f85130fea0d24f5b9be7e16c835c5ed3481816e9a79890f353f21aacfd58
|
||||
CVE-2024-5516,0,0,c08d269a372fc11280e8cde7e2bd4dd476d490152ebd7e95c97d81e21a24e07b,2024-11-21T09:47:50.973000
|
||||
CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced73e,2024-11-21T09:47:51.110000
|
||||
CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000
|
||||
CVE-2024-55186,1,1,1f80915f47017fe86c95b39d3d0d7dcf5d470e148856f0979d72772ad48b8e03,2024-12-20T16:15:23.853000
|
||||
CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000
|
||||
CVE-2024-55196,0,0,9d11e523a63faa541fa5f25136e4bd3a5a9a55216c26bfb1ac46188bd003d9d8,2024-12-19T19:15:07.947000
|
||||
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
|
||||
@ -270550,6 +270553,8 @@ CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40
|
||||
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
||||
CVE-2024-55461,0,0,9aba9528846a5e20a9950a25279e0e578fc2f2326e2132736dcd635d432a883c,2024-12-18T23:15:17.350000
|
||||
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
|
||||
CVE-2024-55470,1,1,e1f3abfd521ac0af47361a762a69061690ca9aef330cb7d7a15e941d9fd00ebc,2024-12-20T16:15:23.977000
|
||||
CVE-2024-55471,1,1,b52a4062fc8e7185ce5e7d77a0f964031e849f7988863d57c0330bb2e29dbcf6,2024-12-20T16:15:24.120000
|
||||
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
|
||||
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
|
||||
CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad7c0,2024-12-18T19:15:11.777000
|
||||
@ -270656,7 +270661,7 @@ CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b50
|
||||
CVE-2024-55951,0,0,0f2ba68ba5d937d3f08ffc28ee064a50ef5129020d2db58a508d614718a5fb19,2024-12-16T20:15:13.823000
|
||||
CVE-2024-55952,0,0,b12980f18101c5484cb3f148aff3182385a343546fffaeb697cc810a408ff07f,2024-12-18T19:15:11.933000
|
||||
CVE-2024-55953,0,0,2fb8456a2c636a9e07d81fd7dc8a938cab1a83bda21c4d2b67051aa5d8d86cd7,2024-12-18T19:15:12.067000
|
||||
CVE-2024-55956,0,0,4dbbe7b27f9e49431f04e908bb363b692252b89466a6d6e1764b8f489f042f8d,2024-12-18T02:00:02.997000
|
||||
CVE-2024-55956,0,1,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000
|
||||
CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000
|
||||
CVE-2024-55969,0,0,9c57b4a45308acc7d73a4bbfc26f9862d4b6f355188666b7df28aa8e0565bef6,2024-12-16T17:15:12.337000
|
||||
CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000
|
||||
@ -270773,8 +270778,18 @@ CVE-2024-56319,0,0,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba9
|
||||
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
|
||||
CVE-2024-56327,0,0,ca1393112b26d20553e2748693dd0e68f578c32c973ba4c41abc461ad3896c85,2024-12-19T23:15:07.147000
|
||||
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
||||
CVE-2024-56337,1,1,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000
|
||||
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
||||
CVE-2024-56348,1,1,cb28f0ed181f8223b2a47a2fb92147cc1a57b8274cdd4b7dbeaa070416c64567,2024-12-20T15:15:05.507000
|
||||
CVE-2024-56349,1,1,ab14f92d286039eccb0c2484d14d266ee0cd7866bd8293eb806c755563ca97b6,2024-12-20T15:15:08.300000
|
||||
CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000
|
||||
CVE-2024-56350,1,1,7b1812d59665b11db258f739125b115bbd155cd393574b71b353cb44b75e793d,2024-12-20T15:15:08.513000
|
||||
CVE-2024-56351,1,1,155dac26658e047b267d56461d036ea027f9b3814fe902c765b71e10add7ea74,2024-12-20T15:15:08.720000
|
||||
CVE-2024-56352,1,1,ca4f1b58a65d31e84d3749d8cf8b089736d75cab42a699b3d1eb93935d436c05,2024-12-20T15:15:08.970000
|
||||
CVE-2024-56353,1,1,ae4bf97a5e1ee216e5415c2193a6048425b28543177ec16a6fe8cfcd94c082af,2024-12-20T15:15:09.183000
|
||||
CVE-2024-56354,1,1,61538a6f4130866818f35928ce5defeadc2b6e7d958e8e8cab12bd8ba0484ab0,2024-12-20T15:15:09.400000
|
||||
CVE-2024-56355,1,1,21efaad8f1c58d999a4416cf6d326431dedd314af26993c0e70693f39d0a6552,2024-12-20T15:15:09.630000
|
||||
CVE-2024-56356,1,1,0311ad340d8557b44a140f6e660b54052200e785ccacf5ea6656b7d035c17abc,2024-12-20T15:15:09.847000
|
||||
CVE-2024-5636,0,0,be674ee7db367fbb27ae45f825fa3b6cac855c767643bde3f8b1378da8ddb51a,2024-11-21T09:48:03.883000
|
||||
CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000
|
||||
CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000
|
||||
@ -272631,7 +272646,7 @@ CVE-2024-7722,0,0,1be42e9fa865f14842632e753ce2fd5525bfe496ac913b8198c3458ae138ff
|
||||
CVE-2024-7723,0,0,53ce768e0253fabfcdcbee8bbee79e38aca674fab610c16e178e185de0bd0f10,2024-10-18T15:45:47.643000
|
||||
CVE-2024-7724,0,0,ab2131ce24737b6ffb1c65566389459a8a15a8bc524a621ec3a84a692ed10d3f,2024-10-18T15:45:35.440000
|
||||
CVE-2024-7725,0,0,146b8c15ef088fe775e30ab61f308dfc209693724a7604dc64296c7f791074f5,2024-10-18T15:45:29.083000
|
||||
CVE-2024-7726,0,0,9f7f812cbf8ca9b75ba221547ec29d58e3f77044e6ee8e24f0ffaa50fe51964a,2024-12-20T11:15:08.720000
|
||||
CVE-2024-7726,0,1,74ee1598c997bc48280475811f61395f508d9d73ccce708888a3fe6630a6e839,2024-12-20T16:15:24.403000
|
||||
CVE-2024-7727,0,0,552f222c31326559d81397831be64909c21cf9eddea22427bcac75d9d64f596e,2024-09-18T18:07:55.450000
|
||||
CVE-2024-7728,0,0,db37ae32cb8fbaca95eaf3a5d1c8bd7414f6cbc0b1d146de5c8b8ffc1f589031,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7729,0,0,3216985110d2bf3d58df21572b65b285ec97282c2bbccb9ffa801e1ebdc5c925,2024-08-14T13:00:37.107000
|
||||
@ -273990,7 +274005,7 @@ CVE-2024-9402,0,0,63b01a6aa3f666e567eb1543fc626efc5699e53df1a2e8aefcfc7ec04c0a71
|
||||
CVE-2024-9403,0,0,07762c94afe8c9eb67ff9236f95ee323f5f0ee5c2916cd9e1970af8b1532841e,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9404,0,0,9b9d00c4ba90eca0b40718374364269d5d9ab6b0ed6b88d7ac8eeda795be7e5d,2024-12-04T04:15:04.843000
|
||||
CVE-2024-9405,0,0,8642cd3daffd984afd6c8d211f16ccc5e756252d3a00aefbed32c81bc22b44d9,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9407,0,1,c3bb216c57e02389fdc038abc31ad60ae236af3d0e61fe20fe1466db79b4cb67,2024-12-20T13:15:22.430000
|
||||
CVE-2024-9407,0,0,c3bb216c57e02389fdc038abc31ad60ae236af3d0e61fe20fe1466db79b4cb67,2024-12-20T13:15:22.430000
|
||||
CVE-2024-9409,0,0,7757f41524ac185e8a2f43a3d9c1ce47c218b14282678873dd27fa00ce011244,2024-11-19T15:59:21.690000
|
||||
CVE-2024-9410,0,0,028b8a1a2a5e04a82d1dfa14d7a40a72d9be3df5384ea784f9b13d8a35e545b6,2024-11-22T19:57:28.770000
|
||||
CVE-2024-9411,0,0,e50aa5df9882c6abf161705df00e21c86ccc46f5aab40d94fb697ab05189f8ec,2024-10-04T13:51:25.567000
|
||||
@ -274041,7 +274056,7 @@ CVE-2024-9470,0,0,de8cca0bb7ecf5d73abf3ec8e7b79c63cfe78584b08d2a23419e01da944fb1
|
||||
CVE-2024-9471,0,0,ee64edae62595652f9e031febeb106a9fef6ec8a4689e59ac10dd4c0ff3f66e2,2024-10-15T16:55:45.090000
|
||||
CVE-2024-9472,0,0,c51f71a634d16101c114efc02d664c96ad53e9b116baeb90934dcb6dd53dd3d1,2024-11-15T13:58:08.913000
|
||||
CVE-2024-9473,0,0,f6c9a898171a9d9c49db03ffaa7b31e8eb0b14f099d64d8ee3734d2400d39156,2024-11-21T09:54:26.150000
|
||||
CVE-2024-9474,0,0,4a24468c830b332dc0a03862bcf9200c2e56f287c192d2c892135a3a103d0092,2024-11-29T16:15:11.400000
|
||||
CVE-2024-9474,0,1,1d31eb3d081616c7758209c9a8d15ae6b9664d71a1b6a74a48b1d5ad5547d62e,2024-12-20T16:49:55.993000
|
||||
CVE-2024-9475,0,0,549f03349a4c2962b2a1e78fa0de4a2bf552d6361ecca4c48badd4c65e80d21d,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9476,0,0,9a4bfa275479230ca0990279f5d3aa6d6ef96696231e23741760bea23fb13726,2024-11-21T17:15:28
|
||||
CVE-2024-9477,0,0,cedb77cc76ea529b92650dd6e41d358747c6c58bf375896899351c8fde982982,2024-11-15T22:54:21.233000
|
||||
@ -274232,9 +274247,9 @@ CVE-2024-9725,0,0,ffc32cb2d9057677d54d0fb34c7a3d0ddb904f67cda7ae2536a11aeb98d4fb
|
||||
CVE-2024-9726,0,0,af7bbe060b2ccf876e62d517bce90114e52bafc8d7754dbac7f1eadb563ff5a7,2024-12-19T19:12:27.903000
|
||||
CVE-2024-9727,0,0,2483ba0a173b001b71fe47c42cf98d9cbea7f6a3586eae2b599f658041b9a97b,2024-12-19T17:46:11.723000
|
||||
CVE-2024-9728,0,0,3b1c4dad21ebd9f8aa87970acf3382ae4afc2818b33a22fc3b7925c14118799f,2024-12-19T17:30:02.427000
|
||||
CVE-2024-9729,0,1,ac4d1053aaaf1fd3c8d9b691ec91996bc29ed75650984660ff2a9de644e0ef87,2024-12-20T14:30:05.087000
|
||||
CVE-2024-9730,0,1,ae3dd3edc48df72b14cd30298987941def303925a5e007ca3641e3d298b8f51c,2024-12-20T14:31:40.050000
|
||||
CVE-2024-9731,0,1,57925ebb99a22bd50adf41d9c8d07d143b056e9e812faf3bbf5ab6546be978c2,2024-12-20T14:31:37.723000
|
||||
CVE-2024-9729,0,0,ac4d1053aaaf1fd3c8d9b691ec91996bc29ed75650984660ff2a9de644e0ef87,2024-12-20T14:30:05.087000
|
||||
CVE-2024-9730,0,0,ae3dd3edc48df72b14cd30298987941def303925a5e007ca3641e3d298b8f51c,2024-12-20T14:31:40.050000
|
||||
CVE-2024-9731,0,0,57925ebb99a22bd50adf41d9c8d07d143b056e9e812faf3bbf5ab6546be978c2,2024-12-20T14:31:37.723000
|
||||
CVE-2024-9732,0,0,5bf98cb3ea904d2c3b5e240793b3b31a9f3b57972e40b98ff055b5117d5229f6,2024-11-25T16:12:03.470000
|
||||
CVE-2024-9733,0,0,8e639f14d07f011b9c87bc040d8dcbb1781e5336fbebf1809f2371a43f3abfbc,2024-11-25T16:46:02.380000
|
||||
CVE-2024-9734,0,0,bfa79295ad03f10469d91c5e9f2fa3a73ba18688e27fbf5bcebad456b20d50b8,2024-11-25T16:45:50.453000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user