mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 10:10:41 +00:00
Auto-Update: 2024-11-15T03:00:20.217619+00:00
This commit is contained in:
parent
b3d84cd2b5
commit
570bac3979
67
CVE-2024/CVE-2024-111xx/CVE-2024-11120.json
Normal file
67
CVE-2024/CVE-2024-111xx/CVE-2024-11120.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-11120",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-11-15T02:15:17.757",
|
||||
"lastModified": "2024-11-15T02:15:17.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-52308",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-14T23:15:05.727",
|
||||
"lastModified": "2024-11-14T23:15:05.727",
|
||||
"lastModified": "2024-11-15T01:15:03.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0.\n\nDevelopers connect to remote codespaces through an SSH server running within the devcontainer, which is generally provided through the [default devcontainer image](https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration). GitHub CLI [retrieves SSH connection details](https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244), such as remote username, which is used in [executing `ssh` commands](https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263) for `gh codespace ssh` or `gh codespace logs` commands.\n\nThis exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects `ssh` arguments within the SSH connection details. `gh codespace ssh` and `gh codespace logs` commands could execute arbitrary code on the user's workstation if the remote username contains something like `-oProxyCommand=\"echo hacked\" #`. The `-oProxyCommand` flag causes `ssh` to execute the provided command while `#` shell comment causes any other `ssh` arguments to be ignored.\n\nIn `2.62.0`, the remote username information is being validated before being used."
|
||||
"value": "The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0.\n\nDevelopers connect to remote codespaces through an SSH server running within the devcontainer, which is generally provided through the [default devcontainer image]( https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-... https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration) . GitHub CLI [retrieves SSH connection details]( https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/inv... https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244 ), such as remote username, which is used in [executing `ssh` commands]( https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L2... https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263 ) for `gh codespace ssh` or `gh codespace logs` commands.\n\nThis exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects `ssh` arguments within the SSH connection details. `gh codespace ssh` and `gh codespace logs` commands could execute arbitrary code on the user's workstation if the remote username contains something like `-oProxyCommand=\"echo hacked\" #`. The `-oProxyCommand` flag causes `ssh` to execute the provided command while `#` shell comment causes any other `ssh` arguments to be ignored.\n\nIn `2.62.0`, the remote username information is being validated before being used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-9463",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-10-09T17:15:19.973",
|
||||
"lastModified": "2024-10-15T15:05:25.997",
|
||||
"lastModified": "2024-11-15T02:00:01.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-11-14",
|
||||
"cisaActionDue": "2024-12-05",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Palo Alto Networks Expedition OS Command Injection Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,9 +2,13 @@
|
||||
"id": "CVE-2024-9465",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-10-09T17:15:20.287",
|
||||
"lastModified": "2024-10-17T06:15:04.510",
|
||||
"lastModified": "2024-11-15T02:00:01.687",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-11-14",
|
||||
"cisaActionDue": "2024-12-05",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Palo Alto Networks Expedition SQL Injection Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
26
README.md
26
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-15T00:55:42.101322+00:00
|
||||
2024-11-15T03:00:20.217619+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-14T23:23:52.997000+00:00
|
||||
2024-11-15T02:15:17.757000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,37 +27,29 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-11-14T01:00:10.090725+00:00
|
||||
2024-11-15T01:00:10.103322+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
269788
|
||||
269789
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2017-13227](CVE-2017/CVE-2017-132xx/CVE-2017-13227.json) (`2024-11-14T23:15:05.013`)
|
||||
- [CVE-2024-41206](CVE-2024/CVE-2024-412xx/CVE-2024-41206.json) (`2024-11-14T23:15:05.197`)
|
||||
- [CVE-2024-41209](CVE-2024/CVE-2024-412xx/CVE-2024-41209.json) (`2024-11-14T23:15:05.277`)
|
||||
- [CVE-2024-41217](CVE-2024/CVE-2024-412xx/CVE-2024-41217.json) (`2024-11-14T23:15:05.370`)
|
||||
- [CVE-2024-49776](CVE-2024/CVE-2024-497xx/CVE-2024-49776.json) (`2024-11-14T23:15:05.457`)
|
||||
- [CVE-2024-49777](CVE-2024/CVE-2024-497xx/CVE-2024-49777.json) (`2024-11-14T23:15:05.547`)
|
||||
- [CVE-2024-49778](CVE-2024/CVE-2024-497xx/CVE-2024-49778.json) (`2024-11-14T23:15:05.643`)
|
||||
- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-14T23:15:05.727`)
|
||||
- [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-14T23:15:05.967`)
|
||||
- [CVE-2024-11120](CVE-2024/CVE-2024-111xx/CVE-2024-11120.json) (`2024-11-15T02:15:17.757`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2024-48428](CVE-2024/CVE-2024-484xx/CVE-2024-48428.json) (`2024-11-14T23:15:02.760`)
|
||||
- [CVE-2024-49381](CVE-2024/CVE-2024-493xx/CVE-2024-49381.json) (`2024-11-14T23:04:21.637`)
|
||||
- [CVE-2024-51377](CVE-2024/CVE-2024-513xx/CVE-2024-51377.json) (`2024-11-14T23:23:52.997`)
|
||||
- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-15T01:15:03.740`)
|
||||
- [CVE-2024-9463](CVE-2024/CVE-2024-94xx/CVE-2024-9463.json) (`2024-11-15T02:00:01.687`)
|
||||
- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-11-15T02:00:01.687`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
29
_state.csv
29
_state.csv
@ -96969,7 +96969,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba
|
||||
CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000
|
||||
CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000
|
||||
CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000
|
||||
CVE-2017-13227,1,1,2363cf93995a6f4a056a60aae17e50895cee0cf2a76cdbce9de1dc6613a4ef0f,2024-11-14T23:15:05.013000
|
||||
CVE-2017-13227,0,0,2363cf93995a6f4a056a60aae17e50895cee0cf2a76cdbce9de1dc6613a4ef0f,2024-11-14T23:15:05.013000
|
||||
CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000
|
||||
CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000
|
||||
CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000
|
||||
@ -243095,6 +243095,7 @@ CVE-2024-11115,0,0,6752a3f15fe7742272035ac5069774108f37f03dae8259d5e310243c06e07
|
||||
CVE-2024-11116,0,0,50b6a7b0baae7d93d967770820ad4acb1265e0c8d7e355f7414e720fb7141658,2024-11-13T17:01:16.850000
|
||||
CVE-2024-11117,0,0,44ab0c5f984ce9aed4e52f00adac2e7b146a348c1dbadd3cdaa1ba5594ee10da,2024-11-13T17:01:16.850000
|
||||
CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000
|
||||
CVE-2024-11120,1,1,419abe138b2f7cd49e5a7bf2988b4cdc20f78889f5b3881f13b8849759bcb762,2024-11-15T02:15:17.757000
|
||||
CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000
|
||||
CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000
|
||||
CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000
|
||||
@ -259573,10 +259574,10 @@ CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b24963
|
||||
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
|
||||
CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000
|
||||
CVE-2024-41200,0,0,c6634d5ee9208991d605965f74d59d477ce80a275c83b2ac8c83f9990bd5e19e,2024-11-05T22:35:06.980000
|
||||
CVE-2024-41206,1,1,7e6eccccc069d737de1b776f4e9312e30c44dcadcdc2055f772810c0c5b346e7,2024-11-14T23:15:05.197000
|
||||
CVE-2024-41209,1,1,a4e7aaed923cefcf23362f8e10e2d838de14426aa8be093076feb4ce9f5618ba,2024-11-14T23:15:05.277000
|
||||
CVE-2024-41206,0,0,7e6eccccc069d737de1b776f4e9312e30c44dcadcdc2055f772810c0c5b346e7,2024-11-14T23:15:05.197000
|
||||
CVE-2024-41209,0,0,a4e7aaed923cefcf23362f8e10e2d838de14426aa8be093076feb4ce9f5618ba,2024-11-14T23:15:05.277000
|
||||
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
|
||||
CVE-2024-41217,1,1,ac2469ae081aee00a6ebee50dac48eceae280554daf52e5d74373d7e6d88920f,2024-11-14T23:15:05.370000
|
||||
CVE-2024-41217,0,0,ac2469ae081aee00a6ebee50dac48eceae280554daf52e5d74373d7e6d88920f,2024-11-14T23:15:05.370000
|
||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||
CVE-2024-41226,0,0,a3a85fa64d0c123f261294a19d764a3608a61e848957876669f922adbd8d3b3c,2024-09-03T21:15:15.923000
|
||||
CVE-2024-41228,0,0,f3d365bd2199687dcff5eebde6177461134036d09c1cc3d7eb6b2cb72c0f76b0,2024-09-26T13:32:55.343000
|
||||
@ -264142,7 +264143,7 @@ CVE-2024-48424,0,0,40269a486047942b0c54d704b8b037cd3035d9ce415f6a7c6672231218b45
|
||||
CVE-2024-48425,0,0,b7eeb0390e7509460e2ea67ebb1efb7a20815aad1587b963750ef8a2fc35ee7d,2024-10-28T19:35:28.823000
|
||||
CVE-2024-48426,0,0,22eae115788dfb6a3644903c8f26a6434c39a09ebbab312f7ce1d4567eeebedc,2024-10-29T20:35:31.967000
|
||||
CVE-2024-48427,0,0,7d45011eb8c4b754b119852367badea7e81893db34682583fff9c26b665752d1,2024-10-31T00:07:25.997000
|
||||
CVE-2024-48428,0,1,aa3d04fa35bedb24aa57faf7fb824ad94ab29d91873983596e253a94900b8c80,2024-11-14T23:15:02.760000
|
||||
CVE-2024-48428,0,0,aa3d04fa35bedb24aa57faf7fb824ad94ab29d91873983596e253a94900b8c80,2024-11-14T23:15:02.760000
|
||||
CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-48440,0,0,3e5da93f3d98711cf31668d28b9aca8f0ae7e630b3695e355db661d67a615b49,2024-10-25T20:35:11.890000
|
||||
@ -264580,7 +264581,7 @@ CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea
|
||||
CVE-2024-49378,0,0,09a13f2bc12578e659c5acb1c73f93e5796dca0b69672708f3a85d0256e97128,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49379,0,0,3d849c956546825875132535f54762320e63df7b50f3a78cf46a30babea614e8,2024-11-14T16:35:15.103000
|
||||
CVE-2024-49380,0,0,f56d412280c28c68a65e58c4bcb66239a0fd300a5ecc1079da487338d842284a,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49381,0,1,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000
|
||||
CVE-2024-49381,0,0,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000
|
||||
CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
|
||||
CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
|
||||
CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
|
||||
@ -264775,9 +264776,9 @@ CVE-2024-49771,0,0,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0
|
||||
CVE-2024-49772,0,0,9281743e575857929b74a42ff17b0b9202ae9bb7ed1b47fefe705f7bd0b972d2,2024-11-13T20:19:54.597000
|
||||
CVE-2024-49773,0,0,e7ad43d5c3fd7b249f682f0b65eb1709f39d3084c0fa75087a4fd4a2decb3591,2024-11-13T20:29:11.297000
|
||||
CVE-2024-49774,0,0,ebd8a0eea0a53281f5f3ae3a93acb0432e3d9a4208605b56d1016ce02a10c1a5,2024-11-13T20:40:26.100000
|
||||
CVE-2024-49776,1,1,3d1ccd317f10894624792651edb12d0e80e06fe989d1fab4fe4cc74edd78eb45,2024-11-14T23:15:05.457000
|
||||
CVE-2024-49777,1,1,576c93bcbcdf87d22f75f1a7dfd252079adb9fc9dbf7209565d6f02cf537a981,2024-11-14T23:15:05.547000
|
||||
CVE-2024-49778,1,1,081fab9aa864a56a56b8081043da17977fbd331dbc940ba837e857bf2fe36645,2024-11-14T23:15:05.643000
|
||||
CVE-2024-49776,0,0,3d1ccd317f10894624792651edb12d0e80e06fe989d1fab4fe4cc74edd78eb45,2024-11-14T23:15:05.457000
|
||||
CVE-2024-49777,0,0,576c93bcbcdf87d22f75f1a7dfd252079adb9fc9dbf7209565d6f02cf537a981,2024-11-14T23:15:05.547000
|
||||
CVE-2024-49778,0,0,081fab9aa864a56a56b8081043da17977fbd331dbc940ba837e857bf2fe36645,2024-11-14T23:15:05.643000
|
||||
CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000
|
||||
CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000
|
||||
@ -265660,7 +265661,7 @@ CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73
|
||||
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
|
||||
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
|
||||
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
|
||||
CVE-2024-51377,0,1,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
|
||||
CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
|
||||
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
|
||||
CVE-2024-51379,0,0,2ac9e22a4ada4c046a62bb7cfce4898a690b6639726f7e96ec64275e3571bb6f,2024-11-06T18:17:17.287000
|
||||
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
|
||||
@ -266037,7 +266038,7 @@ CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc331191
|
||||
CVE-2024-52302,0,0,bec456bb6d847ca2f982f444c73f49a605fb31e8a54bf47ab023a23471898db3,2024-11-14T16:15:20.087000
|
||||
CVE-2024-52305,0,0,dc609877fc9dfb62c6c6bc68486e8898c1a92ac08e89f322ce436991076d7cdb,2024-11-13T19:15:08.853000
|
||||
CVE-2024-52306,0,0,59f18663771ceab92cba47c3e31ee5dd3eed1ee3c6f7144187a60ded4a98f970,2024-11-13T17:01:16.850000
|
||||
CVE-2024-52308,1,1,ce2fe749d6574c45534f7ff28c650824fb22a37edc3670a723e9f9b4e7f78f2f,2024-11-14T23:15:05.727000
|
||||
CVE-2024-52308,0,1,5f2903faaa6af73bb516cae7a392d6b05fcfeb189ded112b08497d75479336bb,2024-11-15T01:15:03.740000
|
||||
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
|
||||
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000
|
||||
@ -266112,7 +266113,7 @@ CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535
|
||||
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
||||
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
||||
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
|
||||
CVE-2024-52613,1,1,3e383ee6275a668108ed2d62ea0f0dad8cbfea7922ad0b4d35817148dbb199c1,2024-11-14T23:15:05.967000
|
||||
CVE-2024-52613,0,0,3e383ee6275a668108ed2d62ea0f0dad8cbfea7922ad0b4d35817148dbb199c1,2024-11-14T23:15:05.967000
|
||||
CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000
|
||||
CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000
|
||||
CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b29768e,2024-06-21T17:18:00.973000
|
||||
@ -269464,9 +269465,9 @@ CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8e
|
||||
CVE-2024-9459,0,0,f79fcf5e24399662f2c8fe8a61d79ad22521a784ff705bf6fa7dcce2b4df0ff8,2024-11-06T15:29:04.917000
|
||||
CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
|
||||
CVE-2024-9462,0,0,da874134bd4c6d4628ad3a17d1671b7f5c2018935fed477a57fc0d0990ff5d0e,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9463,0,0,833fbe5400df3e16652b73757d66400db6c2e58ea10075ce0e9e52ee535a69f7,2024-10-15T15:05:25.997000
|
||||
CVE-2024-9463,0,1,4113bfcc0359b86f4600f4bd332ad0fb25180b65c5beb0ba03a5a18a0d79965c,2024-11-15T02:00:01.687000
|
||||
CVE-2024-9464,0,0,2a950a39fbd8d03d9c46c09cf06c881d311182236743fa872a3d09d866901a80,2024-10-17T06:15:04.190000
|
||||
CVE-2024-9465,0,0,b0530209090d1bed821bb19c0251bb2e431fffeec23de7704111ce15419a57a6,2024-10-17T06:15:04.510000
|
||||
CVE-2024-9465,0,1,4ecfaf32a41dbb8eba12ed8cfc02218dbd1e623e37487ebd8f09d7020eb91be6,2024-11-15T02:00:01.687000
|
||||
CVE-2024-9466,0,0,fd9458b730d3a9a669f2d9d658488af28ef360506c84b0ff287be2e6f400846d,2024-10-17T06:15:04.720000
|
||||
CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000
|
||||
CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user