mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-12-24T19:00:21.474400+00:00
This commit is contained in:
parent
7ce81bf38d
commit
4c018243e2
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48499",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-06-19T17:15:11.880",
|
||||
"lastModified": "2024-11-21T07:33:26.760",
|
||||
"lastModified": "2024-12-24T17:15:06.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27396",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-19T05:15:09.187",
|
||||
"lastModified": "2024-11-21T07:52:49.407",
|
||||
"lastModified": "2024-12-24T17:15:06.360",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-12096",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-12-24T06:15:32.720",
|
||||
"lastModified": "2024-12-24T06:15:32.720",
|
||||
"lastModified": "2024-12-24T17:15:07.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Exhibit to WP Gallery WordPress plugin through 0.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Exhibit a WP Gallery de WordPress hasta la versi\u00f3n 0.0.2 no desinfecta ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera una Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/aff431fa-d984-40de-8a15-21f18db97859/",
|
||||
|
100
CVE-2024/CVE-2024-127xx/CVE-2024-12744.json
Normal file
100
CVE-2024/CVE-2024-127xx/CVE-2024-12744.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-12744",
|
||||
"sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"published": "2024-12-24T17:15:07.940",
|
||||
"lastModified": "2024-12-24T17:15:07.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection in the Amazon Redshift JDBC Driver in v2.1.0.31 allows a user to gain escalated privileges via the getSchemas, getTables, or getColumns Metadata APIs. Users should upgrade to the driver version 2.1.0.32 or revert to driver version 2.1.0.30."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-8596-2jgr-ppj7",
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-127xx/CVE-2024-12745.json
Normal file
100
CVE-2024/CVE-2024-127xx/CVE-2024-12745.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-12745",
|
||||
"sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"published": "2024-12-24T17:15:08.150",
|
||||
"lastModified": "2024-12-24T17:15:08.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection in the Amazon Redshift Python Connector v2.1.4 allows a user to gain escalated privileges via the get_schemas, get_tables, or get_columns Metadata APIs. Users are recommended to upgrade to the driver version 2.1.5 or revert to driver version 2.1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aws/amazon-redshift-python-driver/security/advisories/GHSA-8gc2-vq6m-rwjw",
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-127xx/CVE-2024-12746.json
Normal file
100
CVE-2024/CVE-2024-127xx/CVE-2024-12746.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-12746",
|
||||
"sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"published": "2024-12-24T17:15:08.353",
|
||||
"lastModified": "2024-12-24T17:15:08.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection in the Amazon Redshift ODBC Driver v2.1.5.0 (Windows or Linux) allows a user to gain escalated privileges via the SQLTables or SQLColumns Metadata APIs. Users are recommended to upgrade to the driver version 2.1.6.0 or revert to driver version 2.1.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aws/amazon-redshift-odbc-driver/security/advisories/GHSA-g63m-5vjv-wr3v",
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12842",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-12-20T20:15:21.880",
|
||||
"lastModified": "2024-12-20T20:15:21.880",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-24T17:15:08.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Emlog Pro up to 2.4.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/user.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en Emlog Pro hasta la versi\u00f3n 2.4.1. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/user.php. La manipulaci\u00f3n de la palabra clave del argumento provoca cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -132,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?id.289078",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/emlog/emlog/issues/305",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-43441",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-12-24T12:15:21.697",
|
||||
"lastModified": "2024-12-24T12:15:21.697",
|
||||
"lastModified": "2024-12-24T18:15:22.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -28,6 +28,10 @@
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/h2607yv32wgcrywov960jpxhvsmmlf12",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/12/24/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-56334",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-20T21:15:10.080",
|
||||
"lastModified": "2024-12-20T21:15:10.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-24T17:15:09.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "systeminformation is a System and OS information library for node.js. In affected versions SSIDs are not sanitized when before they are passed as a parameter to cmd.exe in the `getWindowsIEEE8021x` function. This means that malicious content in the SSID can be executed as OS commands. This vulnerability may enable an attacker, depending on how the package is used, to perform remote code execution or local privilege escalation. This issue has been addressed in version 5.23.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "systeminformation es una librer\u00eda de informaci\u00f3n del sistema y del SO para node.js. En las versiones afectadas, los SSID no se desinfectan antes de que se pasen como par\u00e1metro a cmd.exe en la funci\u00f3n `getWindowsIEEE8021x`. Esto significa que el contenido malicioso en el SSID se puede ejecutar como comandos del SO. Esta vulnerabilidad puede permitir a un atacante, seg\u00fan c\u00f3mo se use el paquete, realizar una ejecuci\u00f3n de c\u00f3digo remoto o una escalada de privilegios locales. Este problema se ha solucionado en la versi\u00f3n 5.23.7 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-cvv5-9h9w-qp2m",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
44
README.md
44
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-24T17:00:20.670334+00:00
|
||||
2024-12-24T19:00:21.474400+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-24T16:39:44.677000+00:00
|
||||
2024-12-24T18:15:22.960000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,44 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274641
|
||||
274644
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-12744](CVE-2024/CVE-2024-127xx/CVE-2024-12744.json) (`2024-12-24T17:15:07.940`)
|
||||
- [CVE-2024-12745](CVE-2024/CVE-2024-127xx/CVE-2024-12745.json) (`2024-12-24T17:15:08.150`)
|
||||
- [CVE-2024-12746](CVE-2024/CVE-2024-127xx/CVE-2024-12746.json) (`2024-12-24T17:15:08.353`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `33`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2021-47319](CVE-2021/CVE-2021-473xx/CVE-2021-47319.json) (`2024-12-24T16:28:05.677`)
|
||||
- [CVE-2021-47320](CVE-2021/CVE-2021-473xx/CVE-2021-47320.json) (`2024-12-24T16:27:02.330`)
|
||||
- [CVE-2021-47330](CVE-2021/CVE-2021-473xx/CVE-2021-47330.json) (`2024-12-24T16:17:26.313`)
|
||||
- [CVE-2021-47331](CVE-2021/CVE-2021-473xx/CVE-2021-47331.json) (`2024-12-24T16:16:33.940`)
|
||||
- [CVE-2021-47332](CVE-2021/CVE-2021-473xx/CVE-2021-47332.json) (`2024-12-24T16:15:56.680`)
|
||||
- [CVE-2021-47337](CVE-2021/CVE-2021-473xx/CVE-2021-47337.json) (`2024-12-24T16:15:04.180`)
|
||||
- [CVE-2021-47338](CVE-2021/CVE-2021-473xx/CVE-2021-47338.json) (`2024-12-24T16:39:44.677`)
|
||||
- [CVE-2021-47344](CVE-2021/CVE-2021-473xx/CVE-2021-47344.json) (`2024-12-24T16:13:44.487`)
|
||||
- [CVE-2021-47345](CVE-2021/CVE-2021-473xx/CVE-2021-47345.json) (`2024-12-24T16:12:42.907`)
|
||||
- [CVE-2021-47353](CVE-2021/CVE-2021-473xx/CVE-2021-47353.json) (`2024-12-24T16:11:59.943`)
|
||||
- [CVE-2021-47359](CVE-2021/CVE-2021-473xx/CVE-2021-47359.json) (`2024-12-24T16:10:44.130`)
|
||||
- [CVE-2021-47397](CVE-2021/CVE-2021-473xx/CVE-2021-47397.json) (`2024-12-24T16:06:56.063`)
|
||||
- [CVE-2021-47399](CVE-2021/CVE-2021-473xx/CVE-2021-47399.json) (`2024-12-24T16:06:15.200`)
|
||||
- [CVE-2021-47404](CVE-2021/CVE-2021-474xx/CVE-2021-47404.json) (`2024-12-24T16:05:42.447`)
|
||||
- [CVE-2024-12896](CVE-2024/CVE-2024-128xx/CVE-2024-12896.json) (`2024-12-24T16:15:24.153`)
|
||||
- [CVE-2024-12897](CVE-2024/CVE-2024-128xx/CVE-2024-12897.json) (`2024-12-24T16:15:24.843`)
|
||||
- [CVE-2024-53093](CVE-2024/CVE-2024-530xx/CVE-2024-53093.json) (`2024-12-24T15:02:22.377`)
|
||||
- [CVE-2024-53094](CVE-2024/CVE-2024-530xx/CVE-2024-53094.json) (`2024-12-24T15:07:35.193`)
|
||||
- [CVE-2024-53096](CVE-2024/CVE-2024-530xx/CVE-2024-53096.json) (`2024-12-24T15:23:55.943`)
|
||||
- [CVE-2024-53097](CVE-2024/CVE-2024-530xx/CVE-2024-53097.json) (`2024-12-24T15:44:19.850`)
|
||||
- [CVE-2024-53098](CVE-2024/CVE-2024-530xx/CVE-2024-53098.json) (`2024-12-24T15:48:21.330`)
|
||||
- [CVE-2024-53099](CVE-2024/CVE-2024-530xx/CVE-2024-53099.json) (`2024-12-24T15:50:44.577`)
|
||||
- [CVE-2024-53100](CVE-2024/CVE-2024-531xx/CVE-2024-53100.json) (`2024-12-24T15:52:44.583`)
|
||||
- [CVE-2024-55239](CVE-2024/CVE-2024-552xx/CVE-2024-55239.json) (`2024-12-24T15:15:27.453`)
|
||||
- [CVE-2024-55947](CVE-2024/CVE-2024-559xx/CVE-2024-55947.json) (`2024-12-24T16:15:25.463`)
|
||||
- [CVE-2022-48499](CVE-2022/CVE-2022-484xx/CVE-2022-48499.json) (`2024-12-24T17:15:06.000`)
|
||||
- [CVE-2023-27396](CVE-2023/CVE-2023-273xx/CVE-2023-27396.json) (`2024-12-24T17:15:06.360`)
|
||||
- [CVE-2024-12096](CVE-2024/CVE-2024-120xx/CVE-2024-12096.json) (`2024-12-24T17:15:07.497`)
|
||||
- [CVE-2024-12842](CVE-2024/CVE-2024-128xx/CVE-2024-12842.json) (`2024-12-24T17:15:08.800`)
|
||||
- [CVE-2024-43441](CVE-2024/CVE-2024-434xx/CVE-2024-43441.json) (`2024-12-24T18:15:22.960`)
|
||||
- [CVE-2024-56334](CVE-2024/CVE-2024-563xx/CVE-2024-56334.json) (`2024-12-24T17:15:09.760`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
81
_state.csv
81
_state.csv
@ -187425,17 +187425,17 @@ CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb4
|
||||
CVE-2021-47257,0,0,56979cfa19b4e765d1c353c91739346331d68d4f631479f694c06bdaf5dfe282,2024-11-21T06:35:44.263000
|
||||
CVE-2021-47258,0,0,4f4a1b110d061f9673aadaa4c56bdd1be27db2e710cd72471ea9130817d04f49,2024-11-21T06:35:44.460000
|
||||
CVE-2021-47259,0,0,9eb3bcb5328201acb9b30d9b28df582c81f256dfa802c2825712912c309437ab,2024-11-21T06:35:44.580000
|
||||
CVE-2021-47260,0,1,de274856a3b7f8e1f610fc2a4bb8c9f374b43bf7a91582bdc883aad46edd7aa3,2024-12-24T16:35:01.477000
|
||||
CVE-2021-47260,0,0,de274856a3b7f8e1f610fc2a4bb8c9f374b43bf7a91582bdc883aad46edd7aa3,2024-12-24T16:35:01.477000
|
||||
CVE-2021-47261,0,0,084fc9509ee193d5a7bc1452c8c4e9638fc55f422c0fdcba5f460a2a51edfab6,2024-11-21T06:35:44.887000
|
||||
CVE-2021-47262,0,0,461d2312c88f5c3d90b68aeac4255bd5721c21df1555b4eaef5e703311044b06,2024-11-21T06:35:45
|
||||
CVE-2021-47263,0,0,dcefe631c466b35e0f40540ba2b98e1ec31fbbaf55744f2fa7ba06315fc7b1d2,2024-11-21T06:35:45.180000
|
||||
CVE-2021-47264,0,1,ca0befb3f2cfeab4dd46a812016c35d2cc4743784a96a99ddec4e72f3ad432ae,2024-12-24T16:34:16.977000
|
||||
CVE-2021-47264,0,0,ca0befb3f2cfeab4dd46a812016c35d2cc4743784a96a99ddec4e72f3ad432ae,2024-12-24T16:34:16.977000
|
||||
CVE-2021-47265,0,0,30e7ca1b9773cb91789e3a60b13ecb7cec823e9a9924c6b30e3f34f498c2886d,2024-11-21T06:35:45.380000
|
||||
CVE-2021-47266,0,0,906e75f98d720176acf86d7640bcd9f0b347ee6bd0dd0527d03724e396a1921d,2024-11-21T06:35:45.477000
|
||||
CVE-2021-47267,0,0,f4027374d1054817c82182e8941f4cb30bbbf31f909e1f83a3e5e014be399dbb,2024-11-21T06:35:45.593000
|
||||
CVE-2021-47268,0,0,45214aa797574913856dd718c35b35d7078740374510d32db705215d1ec1eeda,2024-11-21T06:35:45.800000
|
||||
CVE-2021-47269,0,1,4f34e7fdaf8069233f091ee4d570e2e19ca836c2f25897723ed1ff765446df2c,2024-12-24T16:33:36.863000
|
||||
CVE-2021-47270,0,1,c225feecb56e43fc5dbc2007585ca168570d4e33bb3e9e3172076816604c85fc,2024-12-24T16:32:36.987000
|
||||
CVE-2021-47269,0,0,4f34e7fdaf8069233f091ee4d570e2e19ca836c2f25897723ed1ff765446df2c,2024-12-24T16:33:36.863000
|
||||
CVE-2021-47270,0,0,c225feecb56e43fc5dbc2007585ca168570d4e33bb3e9e3172076816604c85fc,2024-12-24T16:32:36.987000
|
||||
CVE-2021-47271,0,0,8b45f3b51b5efafe6ecfeee684b6d2ad11b9b177811db539ed455892be9f5b45,2024-11-21T06:35:46.113000
|
||||
CVE-2021-47272,0,0,c69eb2be8fce6d6565e5cc4d65c854c3be154d237268aa1e8cd3b803b2dfb1db,2024-11-21T06:35:46.283000
|
||||
CVE-2021-47273,0,0,5f37541365d53e02e2775e54c266e774c0ec6630c116f0d472b2e423dadfe695,2024-11-21T06:35:46.423000
|
||||
@ -187445,8 +187445,8 @@ CVE-2021-47276,0,0,4ac47ce93ef1167f4ed4314455eee89eff59b1a95f594d66693d87bab1dd2
|
||||
CVE-2021-47277,0,0,8690d7a30f6cb1d12af1b6c72d1e9e505e72994dacdc75c1965f64f8c7cb82a2,2024-11-21T06:35:46.993000
|
||||
CVE-2021-47278,0,0,81fe512d93c15d243cbdb630886736c459c6f4b7d2f336c233f1ec6562f0355d,2024-11-21T06:35:47.120000
|
||||
CVE-2021-47279,0,0,a07bfa2ceead911b03923957f3b9f88dcf29a6fe508197242524e41d6508a6b3,2024-11-21T06:35:47.237000
|
||||
CVE-2021-47280,0,1,fa99d562ed370ef88c7a6108c724dc45b3f7a6ac4775aca24ab929a5be7fc204,2024-12-24T16:31:41.267000
|
||||
CVE-2021-47281,0,1,445edac3985fca4436c6fe2478adb4d7551697c7289c147f32e873b96f53b9ed,2024-12-24T16:30:22.490000
|
||||
CVE-2021-47280,0,0,fa99d562ed370ef88c7a6108c724dc45b3f7a6ac4775aca24ab929a5be7fc204,2024-12-24T16:31:41.267000
|
||||
CVE-2021-47281,0,0,445edac3985fca4436c6fe2478adb4d7551697c7289c147f32e873b96f53b9ed,2024-12-24T16:30:22.490000
|
||||
CVE-2021-47282,0,0,6483193e9b3445a7b4bf4be780076723f767023b65b10374e78c42c375e2ffff,2024-11-21T06:35:47.563000
|
||||
CVE-2021-47283,0,0,6526683f0de462b02cef39d15ebfd2084b1d424dd635da6faaeca42e0f5610e7,2024-11-21T06:35:47.680000
|
||||
CVE-2021-47284,0,0,8975c2621028e7284219731a1a907773ed9554f378866a44a158dcbaccb386f2,2024-11-21T06:35:47.793000
|
||||
@ -187479,13 +187479,13 @@ CVE-2021-47310,0,0,3ae749fda9ec456310fc4e7a2f1189042525415e69757e229d99417c58244
|
||||
CVE-2021-47311,0,0,78d42a252462dda1640eb7365fe87e80305daeb702c553a4457fbbbce3e6f75d,2024-11-21T06:35:51.230000
|
||||
CVE-2021-47312,0,0,ff86c9dd2d16a622215b4ad8e9480ff3358e2ff4844e931b7513ca3679660ed3,2024-11-21T06:35:51.343000
|
||||
CVE-2021-47313,0,0,174ef32811d7098b5db5ef1f2809acfcc4a86790f0c1c80b5ea6f0036d215f8d,2024-11-21T06:35:51.557000
|
||||
CVE-2021-47314,0,1,ff82d7f5d9d8e8b670019e9e1121b7bc84e2a204794ea492ea0b9951850e98c8,2024-12-24T16:38:21.477000
|
||||
CVE-2021-47314,0,0,ff82d7f5d9d8e8b670019e9e1121b7bc84e2a204794ea492ea0b9951850e98c8,2024-12-24T16:38:21.477000
|
||||
CVE-2021-47315,0,0,5bcaf9c32079e82b705d6ab9332b28d8f144631fd89fee0889f389a7ecac4b28,2024-11-21T06:35:51.877000
|
||||
CVE-2021-47316,0,1,84a8b71459e2724b9fd56eaaaa584f59f6bab28499815fcf33aa4c939541d9ec,2024-12-24T16:28:58.957000
|
||||
CVE-2021-47316,0,0,84a8b71459e2724b9fd56eaaaa584f59f6bab28499815fcf33aa4c939541d9ec,2024-12-24T16:28:58.957000
|
||||
CVE-2021-47317,0,0,3838e2614ac7ab009e6914ad0a37d76ff9764506da6fe77773a0c7cb8f8c3855,2024-11-21T06:35:52.117000
|
||||
CVE-2021-47318,0,0,481b3d1a56e886d5ea56b583f9c2cb2e1ad0192e671013838cdb4e95bcb53108,2024-11-21T06:35:52.230000
|
||||
CVE-2021-47319,0,1,f9dc96f5a41edc9dfcef5e3a3a1da6df48f7fc3a113fb355238933f47b85cb69,2024-12-24T16:28:05.677000
|
||||
CVE-2021-47320,0,1,e2077708c26c96ef692ca991f56540cb7792b8f72595b9d82919d480c47ed57c,2024-12-24T16:27:02.330000
|
||||
CVE-2021-47319,0,0,f9dc96f5a41edc9dfcef5e3a3a1da6df48f7fc3a113fb355238933f47b85cb69,2024-12-24T16:28:05.677000
|
||||
CVE-2021-47320,0,0,e2077708c26c96ef692ca991f56540cb7792b8f72595b9d82919d480c47ed57c,2024-12-24T16:27:02.330000
|
||||
CVE-2021-47321,0,0,bded64f1ef1d1787703930ace3884bed0ee22a64a9ec55afe952da3cf20ca156,2024-11-21T06:35:52.617000
|
||||
CVE-2021-47322,0,0,3dc7ee4ad2dde4ebc21d7b010403a3fa85239a9262926c7207190f4fa9c5a8f7,2024-11-21T06:35:52.733000
|
||||
CVE-2021-47323,0,0,633211c6bfdb9dfd1c61a272a06bff1bc021219b77a259623ed56d42817f6c9b,2024-11-21T06:35:52.843000
|
||||
@ -187495,22 +187495,22 @@ CVE-2021-47326,0,0,b7ba3c55754026190b941538095c847ce61badf3c8de85aaf74b716b0ad04
|
||||
CVE-2021-47327,0,0,94fa64a5ce947d155501b62feb0b7f033c99b992efebda5cfad453b0cfed060d,2024-11-21T06:35:53.417000
|
||||
CVE-2021-47328,0,0,66ae52fe4cea114e5e86d3d4485d80c1e9b52e3b77c574e073e5fbbff387408d,2024-11-21T06:35:53.613000
|
||||
CVE-2021-47329,0,0,8222de0731b85ff3031c956a52c80ae240eef445f7768112677b25136a2e1ec8,2024-11-21T06:35:53.730000
|
||||
CVE-2021-47330,0,1,d9f3b843b170b0294ac545c697d8ba6579b1d6b9d995ed8f8babe8f83efd2191,2024-12-24T16:17:26.313000
|
||||
CVE-2021-47331,0,1,3ce88fb29ceba132a5d41e08f5e07fb11b07b263eafa064a62a97e4f630efc1d,2024-12-24T16:16:33.940000
|
||||
CVE-2021-47332,0,1,2a1831b394ec98300e42894a00f7e4c98cc7f6e9fce933a7d2e2712dcacf6775,2024-12-24T16:15:56.680000
|
||||
CVE-2021-47330,0,0,d9f3b843b170b0294ac545c697d8ba6579b1d6b9d995ed8f8babe8f83efd2191,2024-12-24T16:17:26.313000
|
||||
CVE-2021-47331,0,0,3ce88fb29ceba132a5d41e08f5e07fb11b07b263eafa064a62a97e4f630efc1d,2024-12-24T16:16:33.940000
|
||||
CVE-2021-47332,0,0,2a1831b394ec98300e42894a00f7e4c98cc7f6e9fce933a7d2e2712dcacf6775,2024-12-24T16:15:56.680000
|
||||
CVE-2021-47333,0,0,bdb5deaea57d22655f110a8e0d67022567d0afdbab52e308004f39cc19993152,2024-11-21T06:35:54.267000
|
||||
CVE-2021-47334,0,0,3b48c3fb0fb205708f9032bfd63455ab1005eb8ff7cd5defef05c7bfad5f517a,2024-11-21T06:35:54.450000
|
||||
CVE-2021-47335,0,0,328eb3645a18c5f29c918b49774ba62cf65897a9bf118eba16623aa0b88c0cc0,2024-11-21T06:35:54.583000
|
||||
CVE-2021-47336,0,0,574b511187a20b144e1a41e424bb252a26bf57fd2f2c258012116c53068fbcd0,2024-11-21T06:35:54.710000
|
||||
CVE-2021-47337,0,1,8ec2c16fbd2d59b62517775d6a115d978a1c780bdbe272cf5580ca5a86d19041,2024-12-24T16:15:04.180000
|
||||
CVE-2021-47338,0,1,425f97b29f6fd84c1870c95018e168e8eda67e84848abca9e2dfac701dc5c166,2024-12-24T16:39:44.677000
|
||||
CVE-2021-47337,0,0,8ec2c16fbd2d59b62517775d6a115d978a1c780bdbe272cf5580ca5a86d19041,2024-12-24T16:15:04.180000
|
||||
CVE-2021-47338,0,0,425f97b29f6fd84c1870c95018e168e8eda67e84848abca9e2dfac701dc5c166,2024-12-24T16:39:44.677000
|
||||
CVE-2021-47339,0,0,63b9388e39658beafde59035eb1ff3db7cc9adf87b46e1928c207b238898cde7,2024-11-21T06:35:55.093000
|
||||
CVE-2021-47340,0,0,4800185c819526cfdd83b27045687b91c60e90a3e12af11337074c136ce8ddde,2024-11-21T06:35:55.207000
|
||||
CVE-2021-47341,0,0,3c56be93889c9031de34d846ba219a9d43c0e65a95b6d7ca5af5e5a8890138b8,2024-11-21T06:35:55.343000
|
||||
CVE-2021-47342,0,0,0e87554b5846bcf09c45d50205daab057f20e5c4eda33e86bc7bf7744c7b5855,2024-11-21T06:35:55.473000
|
||||
CVE-2021-47343,0,0,05baa50e8f01703dbae3936b2595f3acbc4f37225bdead1e4b8828946131a960,2024-11-21T06:35:55.597000
|
||||
CVE-2021-47344,0,1,0287c421eaf460be9da303f1ed618d93b1e3b5047e6ae4b098d9a2bb4b53f405,2024-12-24T16:13:44.487000
|
||||
CVE-2021-47345,0,1,e7fced2d39bb01ac3aa638228f3d111fb4e7a3b155cc0145bd8963569fdff796,2024-12-24T16:12:42.907000
|
||||
CVE-2021-47344,0,0,0287c421eaf460be9da303f1ed618d93b1e3b5047e6ae4b098d9a2bb4b53f405,2024-12-24T16:13:44.487000
|
||||
CVE-2021-47345,0,0,e7fced2d39bb01ac3aa638228f3d111fb4e7a3b155cc0145bd8963569fdff796,2024-12-24T16:12:42.907000
|
||||
CVE-2021-47346,0,0,60c08da0f76e44fbd2579bb6c0d6fd3fcc8ea9d00ac118be4480ef225dc6806d,2024-11-21T06:35:56.020000
|
||||
CVE-2021-47347,0,0,0cc930dc1ed330c553df41204e22122e0adaa56369dd9ae499682bc065fb28c3,2024-11-21T06:35:56.147000
|
||||
CVE-2021-47348,0,0,e4697ba877d750d4853325d31141852c2f5197fb92af29ad909f172ef0454520,2024-11-21T06:35:56.340000
|
||||
@ -187518,13 +187518,13 @@ CVE-2021-47349,0,0,74b3fd93371f16081a6fffb4e795590e7a61ca291891fce9d031e7ea4a200
|
||||
CVE-2021-47350,0,0,1d7b9d31a4bdfd1b9c0cb438d9bfe2ad9418703a3ba90a6dce7d06f4be248667,2024-11-21T06:35:56.687000
|
||||
CVE-2021-47351,0,0,fcfc14160d8a3b6eddacd63fb06456d3ee86896eb32f6b88c5655127b7899b8a,2024-11-21T06:35:56.860000
|
||||
CVE-2021-47352,0,0,8a511fecad7e2772c02e65a06d032010ca0b3bef5108c1b1e7b3eb531664405a,2024-11-21T06:35:56.973000
|
||||
CVE-2021-47353,0,1,a724c8f6cd8472b443329ad03d2854098d93f37ca37cc9702dc1d1690281b092,2024-12-24T16:11:59.943000
|
||||
CVE-2021-47353,0,0,a724c8f6cd8472b443329ad03d2854098d93f37ca37cc9702dc1d1690281b092,2024-12-24T16:11:59.943000
|
||||
CVE-2021-47354,0,0,d5ef8c84b9db88bbfc816382ef81b62a166c649ad48b62621dc38976f4dec14e,2024-11-21T06:35:57.200000
|
||||
CVE-2021-47355,0,0,9930d7122d5a942cbabd358260cb9abf9e4d93c8777a011fc0d49ef1ea1d9c7b,2024-11-21T06:35:57.370000
|
||||
CVE-2021-47356,0,0,548d3a0c0fe8b4836bc03b00e7b22d227432d44488ecdb6eecdc35961d6801d9,2024-11-21T06:35:57.493000
|
||||
CVE-2021-47357,0,0,67a25d43db1234272eec4518230d484ddf78fb15af98659ec374cb92d14541c7,2024-11-21T06:35:57.693000
|
||||
CVE-2021-47358,0,0,7250c3dc75c0a0a285f37a2d8100fbf3e8878a3828ac60bdbb0d5ad4ff602413,2024-11-21T06:35:57.820000
|
||||
CVE-2021-47359,0,1,a8c3865355adf01802d101a119abd31bae543d6b22d119f810adee65d5b14521,2024-12-24T16:10:44.130000
|
||||
CVE-2021-47359,0,0,a8c3865355adf01802d101a119abd31bae543d6b22d119f810adee65d5b14521,2024-12-24T16:10:44.130000
|
||||
CVE-2021-47360,0,0,a3aa7c12dbf442e168ae03d62d9e61f529b43482d63c231e1211c6b40ef61f85,2024-11-21T06:35:58.053000
|
||||
CVE-2021-47361,0,0,d763e86c7ca549ff2cb304adc7a4bbef4bc48cd16f32467bb5c635695be9ca25,2024-11-21T06:35:58.173000
|
||||
CVE-2021-47362,0,0,00c744101153cf7fe09584a9cda87a9d30c1d29d97b6ffead1a8a2c07efaabd5,2024-11-21T06:35:58.297000
|
||||
@ -187562,14 +187562,14 @@ CVE-2021-47393,0,0,cb8604c1f678df5603c14287ccd222cdf9bee87fd56ca2dc7d6971ba3d537
|
||||
CVE-2021-47394,0,0,c09d3376e5602dcd8666383c8bee36e1c07e9795eab0f5aace3d51f2536dedd0,2024-11-21T06:36:03.317000
|
||||
CVE-2021-47395,0,0,bed9ae2678523feb920dc0ab8c1ea494e9fe309d996c61c0c7583d6b417dd2b9,2024-11-21T06:36:03.423000
|
||||
CVE-2021-47396,0,0,1218531809f9b22f861167391c7c6c53877c57c033a282e8dd14c3683c604cfb,2024-11-21T06:36:03.537000
|
||||
CVE-2021-47397,0,1,15e7f502ba571f755e0489a5425995f66f3a94aa55ff9302b96f3500e4220711,2024-12-24T16:06:56.063000
|
||||
CVE-2021-47397,0,0,15e7f502ba571f755e0489a5425995f66f3a94aa55ff9302b96f3500e4220711,2024-12-24T16:06:56.063000
|
||||
CVE-2021-47398,0,0,e3630a76992a0e0cb4d4e034ce74e3e0d8ca68d2b2971f1033b9e16a7a38ec03,2024-11-21T06:36:03.773000
|
||||
CVE-2021-47399,0,1,c94f1ef0340f44c1b19ac5f27a7318803b709fd2ae8159cca95350b02a34346d,2024-12-24T16:06:15.200000
|
||||
CVE-2021-47399,0,0,c94f1ef0340f44c1b19ac5f27a7318803b709fd2ae8159cca95350b02a34346d,2024-12-24T16:06:15.200000
|
||||
CVE-2021-47400,0,0,dac63ab253e754c2b35510166f57e6916cfba5dfd95e7f078149171e94273e9f,2024-11-21T06:36:03.997000
|
||||
CVE-2021-47401,0,0,5db6c53ad5a3be89617dfb52bbe448175afe93c316c35bb6429dc1b11b0da18a,2024-11-21T06:36:04.170000
|
||||
CVE-2021-47402,0,0,cbc02f9fc26fbe6e1a1a08c7dbb130f4d519e7034addb43196b7cdda394a63a5,2024-11-21T06:36:04.283000
|
||||
CVE-2021-47403,0,0,8e9a0db3b62d6c0cacc4676198b64747930d54d96a5fcddadbe78d515353f56a,2024-11-21T06:36:04.397000
|
||||
CVE-2021-47404,0,1,b4a6c4984c318e0b5f084184228def57d269d3a8a4195164e12844a9b471a71c,2024-12-24T16:05:42.447000
|
||||
CVE-2021-47404,0,0,b4a6c4984c318e0b5f084184228def57d269d3a8a4195164e12844a9b471a71c,2024-12-24T16:05:42.447000
|
||||
CVE-2021-47405,0,0,89d57154146c49bfe9495517a8aa4581b03bbe87f488a973134e87054c50fc28,2024-11-21T06:36:04.693000
|
||||
CVE-2021-47406,0,0,29847dbf301ed41a53321d345125f661ba83b5bdb100a716152af1df0991e844,2024-11-21T06:36:04.807000
|
||||
CVE-2021-47407,0,0,99d0a8ae031df6e833de865dd6448cf1a9c23ee872668167073223966e2f1959,2024-11-21T06:36:04.980000
|
||||
@ -212466,7 +212466,7 @@ CVE-2022-48495,0,0,8c02e6938962f781bda5e157e870aa1c33ae3a3b51d8a9b5d00ab6334b977
|
||||
CVE-2022-48496,0,0,71deb3d51fcae767a1e15c2a8115b90068fa4bb4765ab39a9a6865365110a045,2024-12-17T16:15:22.910000
|
||||
CVE-2022-48497,0,0,b9a80e8af28fdcd00a228cc11efc4c9593a8b4c5dd367af14a9c712cd657ece8,2024-12-17T16:15:23.027000
|
||||
CVE-2022-48498,0,0,15d9d8110061493fd5fdb3094dbf089f7e21083b5812e5ce94744c0dd02cf21c,2024-12-12T21:15:05.437000
|
||||
CVE-2022-48499,0,0,0ad3a641e35e343758ed868b667a84aa0a1fa0125214a118c7fc5218df924c4b,2024-11-21T07:33:26.760000
|
||||
CVE-2022-48499,0,1,bb1c347bf240fdece9c39b9504dd71d8241a5add7ba2858a5127cb1a55c70365,2024-12-24T17:15:06
|
||||
CVE-2022-4850,0,0,c9b22dfbe69ddcd775fe8bf5e46305e8356db636b4274a9d88aae562f5f3cb3f,2024-11-21T07:36:04.260000
|
||||
CVE-2022-48500,0,0,f05b96a7496386175228b33634a3aa795d425b2ff80ffb019a9daf03a04b45fd,2024-11-21T07:33:26.857000
|
||||
CVE-2022-48501,0,0,a068d4ab0b49e366b997ac4bbcdf6963322410bde273e1f79ac505085de49455,2024-11-21T07:33:26.957000
|
||||
@ -221076,7 +221076,7 @@ CVE-2023-27391,0,0,68968013741fd92bb0fe0ed6996e81b5b7a164f4108e76e5cc29944557117
|
||||
CVE-2023-27392,0,0,0aa1704c2266c622e2a37cf4d35e4872f27b881a617eb1f4ce75d30bf0c8214c,2024-11-21T07:52:49.027000
|
||||
CVE-2023-27394,0,0,d8ef7d5311db9668c64ea1cf9b5b4402c0ba1fb48f418040e96aed763f47e426,2024-11-21T07:52:49.157000
|
||||
CVE-2023-27395,0,0,fce5752ad35b2d4f801635e0d4ca6c78092b2c44003871e82837df71b3161dd9,2024-11-21T07:52:49.277000
|
||||
CVE-2023-27396,0,0,9b3e3d572d598bd149e1147403da0e973dfc01dda35ebe9b9e82c499fc4b3f8d,2024-11-21T07:52:49.407000
|
||||
CVE-2023-27396,0,1,b53667b34fa555b760f98721a9c7a99d71fe60a165abf981d61285ae1c9e3941,2024-12-24T17:15:06.360000
|
||||
CVE-2023-27397,0,0,2f22259a73d98aa65da071200ce60f7ce038fb29af29bfe59a5f13c693e3d30d,2024-11-21T07:52:49.913000
|
||||
CVE-2023-27398,0,0,72104b93f4f30928f22739d21854548e6ff653a12291db21d09e2d03a00ca10a,2024-11-21T07:52:50.030000
|
||||
CVE-2023-27399,0,0,8adbd08eb07c84bf15cd4c2035045c5d56013cfbb010855bff4e0e37a91a5b35,2024-11-21T07:52:50.140000
|
||||
@ -244724,7 +244724,7 @@ CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f93774
|
||||
CVE-2024-12091,0,0,35c9100407a2a2f03cc09233dbdc35208e548ffdd088d484bb9b374c740b5bc0,2024-12-16T15:15:06.540000
|
||||
CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba42350997260f9,2024-12-16T15:15:06.677000
|
||||
CVE-2024-12094,0,0,918109c0341953bed354c9dc0c1e3bf994d002b139d0d147a6756e1d0b4180c2,2024-12-05T13:15:05.923000
|
||||
CVE-2024-12096,0,0,fe18071081c7ffafc6f7d452e77feb4963923e7859d410990f9129ad9e09ccd5,2024-12-24T06:15:32.720000
|
||||
CVE-2024-12096,0,1,e1686ad9b3968b4668157b7c9cdf0df3fb331fa75ddc2ed601ed908de17346ee,2024-12-24T17:15:07.497000
|
||||
CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e262d,2024-12-04T04:15:04.287000
|
||||
CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf76,2024-11-21T08:50:02.867000
|
||||
CVE-2024-12100,0,0,d36c08f92a239c009a6ddf35a16924f2d7f8840cc80d6bb06a52ecf54ad1016c,2024-12-24T06:15:32.830000
|
||||
@ -245042,6 +245042,9 @@ CVE-2024-12729,0,0,e884fbf395061cc739fddc55aa58e43dec46aecaf3403889ecea11d1206a1
|
||||
CVE-2024-1273,0,0,e8464b176bd39036e0f45e4b49d8110f84d3d3960c826bc9710c36200b4f5e6c,2024-11-21T08:50:12.557000
|
||||
CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000
|
||||
CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e5e3,2024-12-18T20:15:22.390000
|
||||
CVE-2024-12744,1,1,78725b468a6838fc9d3446b27bc7148939594937a057e2fbae83770e53e8a5e9,2024-12-24T17:15:07.940000
|
||||
CVE-2024-12745,1,1,dab7ef9c5411977e5c294799dbb9a429e172aa931a00df35a4460bfe9c29eea5,2024-12-24T17:15:08.150000
|
||||
CVE-2024-12746,1,1,e5d6b57814e4fb16babc699c5413311be4120e9cff603631d2309446a6d28149,2024-12-24T17:15:08.353000
|
||||
CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000
|
||||
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
|
||||
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
|
||||
@ -245073,7 +245076,7 @@ CVE-2024-12832,0,0,9a101f7d70f0a623c3454123e2a257a4b7f5154c8200a2b8250142a3bbfb4
|
||||
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
|
||||
CVE-2024-12840,0,0,6728e4dd233ba33a905cb7475a2ab43481825f682ab1ab63bb8088d737f16a71,2024-12-20T16:15:23.417000
|
||||
CVE-2024-12841,0,0,ce07921741603bdc97c0ec690662775bbd4f9587340009198702b906e823f20c,2024-12-20T19:15:06.097000
|
||||
CVE-2024-12842,0,0,1e1e34a3ba74abd908652a758db38f2c95bc58aa33ed64b66f2060462a73b056,2024-12-20T20:15:21.880000
|
||||
CVE-2024-12842,0,1,fdb5637330c9cf60cacdf27d02f9d4503dc9b60697726cad3b7f383a3475286a,2024-12-24T17:15:08.800000
|
||||
CVE-2024-12843,0,0,45beb73c507d32bf604e47448dcbac99506f9dd237f3fd11a458d841be06fdcb,2024-12-20T21:15:07.337000
|
||||
CVE-2024-12844,0,0,6d8ec288c31d3bbe3b33ef2f9ad3792a8943c952d5f308d34593c00a3e1c4848,2024-12-20T21:15:07.833000
|
||||
CVE-2024-12845,0,0,4291254c308b66e0c715e21bc18b77504015cd917159726af921dfd1ff44e590,2024-12-20T22:15:24.727000
|
||||
@ -245095,8 +245098,8 @@ CVE-2024-12892,0,0,78fb726b8df2a16fb6eb0917a0a0e88fecc9c6f1f88ab8ca30a5dd210b4e6
|
||||
CVE-2024-12893,0,0,0cecbca340b22ce3e457e2f182e11f58f94f145b2638c6f827bb0ed4008214df,2024-12-22T08:15:06.083000
|
||||
CVE-2024-12894,0,0,38ca8339bb6400ff08caeebde70032264a7662949504841ad5ff150add3fcd6e,2024-12-22T12:15:16.203000
|
||||
CVE-2024-12895,0,0,2693178457c1a41a6444992ddd10869064ffff2889e27b11cf327858c567765e,2024-12-22T14:15:04.923000
|
||||
CVE-2024-12896,0,1,438fe183a3bd0ede8cbabe53a7b332d4e562662749bdc8fc0eabd833e1a8a80d,2024-12-24T16:15:24.153000
|
||||
CVE-2024-12897,0,1,27b12af97c1fc6d44bdaab5d2b85b19bf4b9143ce4090b1e9b59a5dbe95fb066,2024-12-24T16:15:24.843000
|
||||
CVE-2024-12896,0,0,438fe183a3bd0ede8cbabe53a7b332d4e562662749bdc8fc0eabd833e1a8a80d,2024-12-24T16:15:24.153000
|
||||
CVE-2024-12897,0,0,27b12af97c1fc6d44bdaab5d2b85b19bf4b9143ce4090b1e9b59a5dbe95fb066,2024-12-24T16:15:24.843000
|
||||
CVE-2024-12898,0,0,01cf06e013b17879e3ad11f28cc90b4f8ab9d8accfe80d6b33f345df309c44cc,2024-12-23T01:15:06.840000
|
||||
CVE-2024-12899,0,0,a8156719562171ad632b82cbae15ec7c223a7a48bfe33b1a670936619c6c2e7c,2024-12-23T01:15:07.020000
|
||||
CVE-2024-1290,0,0,7c95f47c5c3e77faa57d4558ce65f60c9fa0ea7551f118126af89c59b8448f97,2024-11-21T08:50:14.680000
|
||||
@ -263274,7 +263277,7 @@ CVE-2024-43438,0,0,73d1b28c6f38899287538d919cdc80ec31dafefe92f6661fe9a36214164d9
|
||||
CVE-2024-43439,0,0,40ba494cdfdd48b88a4840d8431101c7f1fdc9c475043690f5f31b7b91efbc66,2024-11-12T15:35:10.043000
|
||||
CVE-2024-4344,0,0,f2fc8cf2dc3e9a916d8c0e02c7965d497c7aae8ae1650868477b4aff5dcf5623,2024-11-21T09:42:40.023000
|
||||
CVE-2024-43440,0,0,0d10351622646300ab78c6feb395f887255f528f4060e11d93edde30e1c5afaa,2024-11-08T19:01:03.880000
|
||||
CVE-2024-43441,0,0,82d66dd0d1494a3b8fd89d59d7d5aff81d4208bdba8428a1179a98d74629a843,2024-12-24T12:15:21.697000
|
||||
CVE-2024-43441,0,1,524843510e29ead4801aba53c74256850e6789e9e2a8c6e92c44b5af1257e092,2024-12-24T18:15:22.960000
|
||||
CVE-2024-43442,0,0,7cf6887173b63e3e2077127f17ebb1f8864349b85ded2485a70c9170e31ad69f,2024-08-26T16:35:12.860000
|
||||
CVE-2024-43443,0,0,01387b83c9d3faae4be2489d643851ab28bd718e216da87fe7730786e406c157,2024-08-26T12:47:20.187000
|
||||
CVE-2024-43444,0,0,01fa601f2d9572951dd3491c52e1bfaeb60836d6e72e0f6dc396e203847ee36c,2024-08-26T12:47:20.187000
|
||||
@ -269665,15 +269668,15 @@ CVE-2024-5309,0,0,18ebf89fe4bb75804396d3a19ce6e1ba6418764fa3491b0682a6a84ef2d066
|
||||
CVE-2024-53090,0,0,e8bc7d4418a4586cef8d07d6587e7857778916783eb6733dbca966a4b050fcce,2024-12-24T14:52:35.750000
|
||||
CVE-2024-53091,0,0,a724824bb6eff4c2f24a98050c4d383cf225104a7883ed901dcbb199e1f8cdcf,2024-12-24T14:55:45.720000
|
||||
CVE-2024-53092,0,0,7648140eeea3dbcba07b87610f5bab990445287d13346f351e0a3179515b109f,2024-12-24T14:57:21.500000
|
||||
CVE-2024-53093,0,1,7a2189a6767397ac9a9524b82ec1cfcf95c13b9556edae05a0802a66edbd2129,2024-12-24T15:02:22.377000
|
||||
CVE-2024-53094,0,1,6cdea08f81d52ec066a95bb50c1589dc812eaf5d31206bb51acb4c07058ecd73,2024-12-24T15:07:35.193000
|
||||
CVE-2024-53093,0,0,7a2189a6767397ac9a9524b82ec1cfcf95c13b9556edae05a0802a66edbd2129,2024-12-24T15:02:22.377000
|
||||
CVE-2024-53094,0,0,6cdea08f81d52ec066a95bb50c1589dc812eaf5d31206bb51acb4c07058ecd73,2024-12-24T15:07:35.193000
|
||||
CVE-2024-53095,0,0,4e724c82098942c519f58d8d0672f065c3504379b32765b65ae8d7e7c202ab88,2024-12-11T15:15:17.940000
|
||||
CVE-2024-53096,0,1,f8c044b16533b0e973c2feac2faf8b82cbb3515bbeb6f4a2c6538817b1f4844e,2024-12-24T15:23:55.943000
|
||||
CVE-2024-53097,0,1,c8b4e0e4b2cea4326a95fc9929fae4823328f4bcb85dc78d93b5c59fcdd291d7,2024-12-24T15:44:19.850000
|
||||
CVE-2024-53098,0,1,e841aa1c52390814ec8cb3f228cfb4a113b5a3d775d80a08f6be6b8c677914fc,2024-12-24T15:48:21.330000
|
||||
CVE-2024-53099,0,1,f2feb5cea769380ed5d7ee6f39dd18e018509b099aaad0cebf44ce618ae1a112,2024-12-24T15:50:44.577000
|
||||
CVE-2024-53096,0,0,f8c044b16533b0e973c2feac2faf8b82cbb3515bbeb6f4a2c6538817b1f4844e,2024-12-24T15:23:55.943000
|
||||
CVE-2024-53097,0,0,c8b4e0e4b2cea4326a95fc9929fae4823328f4bcb85dc78d93b5c59fcdd291d7,2024-12-24T15:44:19.850000
|
||||
CVE-2024-53098,0,0,e841aa1c52390814ec8cb3f228cfb4a113b5a3d775d80a08f6be6b8c677914fc,2024-12-24T15:48:21.330000
|
||||
CVE-2024-53099,0,0,f2feb5cea769380ed5d7ee6f39dd18e018509b099aaad0cebf44ce618ae1a112,2024-12-24T15:50:44.577000
|
||||
CVE-2024-5310,0,0,2f7fe56905fa71b6c5244c78a7d9d6396f207d8efd7d5fc87cedf378b01f9572,2024-11-21T09:47:24.280000
|
||||
CVE-2024-53100,0,1,c9b76774e7fbb3d37345443f9fcb41fcc27f64217f335d86b9b5ba659a640559,2024-12-24T15:52:44.583000
|
||||
CVE-2024-53100,0,0,c9b76774e7fbb3d37345443f9fcb41fcc27f64217f335d86b9b5ba659a640559,2024-12-24T15:52:44.583000
|
||||
CVE-2024-53101,0,0,c425bb46b3515da57dc87974bd0976857d07567982d62109b13f805737e7ca08,2024-12-19T18:08:23.857000
|
||||
CVE-2024-53102,0,0,d1c3ad92d75c37363246642f8e4ba479d5a4bde44aee221d715666c203805e79,2024-12-12T16:15:54.967000
|
||||
CVE-2024-53103,0,0,fea1df1ec4e010b077b8ce29997cc11c0435ec37a8a561a5de86032afeb9dcfc,2024-12-02T08:15:08.537000
|
||||
@ -270655,7 +270658,7 @@ CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd
|
||||
CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000
|
||||
CVE-2024-55231,0,0,9b4d96e13b2455de4f7153a0a178979c5c7c43ccbd9321ca719064bd13549e78,2024-12-18T22:15:07.127000
|
||||
CVE-2024-55232,0,0,fe663a132b62e845c6412331dfe4c7f0046c6cb02e889b5be4f207dc0ee83ce5,2024-12-18T22:15:07.297000
|
||||
CVE-2024-55239,0,1,b9b3b94f453c37cf1c7213904cdc6d53c5a744f0e860e5610dfd700a18f6436e,2024-12-24T15:15:27.453000
|
||||
CVE-2024-55239,0,0,b9b3b94f453c37cf1c7213904cdc6d53c5a744f0e860e5610dfd700a18f6436e,2024-12-24T15:15:27.453000
|
||||
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
|
||||
CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674bab,2024-11-21T09:47:52.173000
|
||||
CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000
|
||||
@ -270787,7 +270790,7 @@ CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9
|
||||
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
|
||||
CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000
|
||||
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
|
||||
CVE-2024-55947,0,1,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000
|
||||
CVE-2024-55947,0,0,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000
|
||||
CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22362,2024-12-16T20:15:13.683000
|
||||
CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000
|
||||
CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000
|
||||
@ -270921,7 +270924,7 @@ CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4
|
||||
CVE-2024-56330,0,0,0948df413a5c69f9b84ac0d2f9d73f87e1412fd86c2aab133f127598ac011144,2024-12-20T20:15:24.167000
|
||||
CVE-2024-56331,0,0,656088f14ab95d37562c79ca09b01fad53094f76aca2313baf371cb86cef2cbe,2024-12-20T20:15:24.337000
|
||||
CVE-2024-56333,0,0,68c1c791aa9456c9142c5ee23526a03e66d9256bf45f0935a9a3e1ddc89ba6bc,2024-12-20T20:15:24.520000
|
||||
CVE-2024-56334,0,0,c68ee18733fbb7af87b93a9657cd4ea80b024247de0a538eeafbd332a43f6ef0,2024-12-20T21:15:10.080000
|
||||
CVE-2024-56334,0,1,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f5a4,2024-12-24T17:15:09.760000
|
||||
CVE-2024-56335,0,0,212673c0092d206a73c10c6bde565efc048733c84573ec9d2c3399975b656f52,2024-12-20T21:15:10.277000
|
||||
CVE-2024-56337,0,0,c8708366b7c549dd6a9395b50e3154a03183da77e2dfc48f714159d070e9615b,2024-12-20T16:15:24.260000
|
||||
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user