mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-03T15:03:05.766364+00:00
This commit is contained in:
parent
028d629a58
commit
60300ac409
60
CVE-2024/CVE-2024-100xx/CVE-2024-10074.json
Normal file
60
CVE-2024/CVE-2024-100xx/CVE-2024-10074.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-10074",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-12-03T13:15:04.490",
|
||||
"lastModified": "2024-12-03T13:15:04.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "en OpenHarmony v4.1.1 y versiones anteriores se permite que un atacante local haga que el permiso com\u00fan se actualice a root mediante el uso use after free."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "scy@openharmony.io",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "scy@openharmony.io",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md",
|
||||
"source": "scy@openharmony.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-10224",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-11-19T18:15:19.773",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-12-03T14:15:19.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval()."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Qualys descubri\u00f3 que si se usaba una entrada no desinfectada con la librer\u00eda Modules::ScanDeps, antes de la versi\u00f3n 1.36, un atacante local podr\u00eda posiblemente ejecutar comandos de shell arbitrarios abriendo una \"molesta tuber\u00eda\" (como pasar \"commands|\" como nombre de archivo) o pasando cadenas arbitrarias a eval()."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -19,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
@ -59,6 +63,14 @@
|
||||
{
|
||||
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11003",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-11-19T18:15:19.973",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-12-03T14:15:19.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, pasa datos no desinfectados a una librer\u00eda (Modules::ScanDeps) que espera una entrada segura. Esto podr\u00eda permitir que un atacante local ejecute comandos de shell arbitrarios. Consulte el CVE-2024-10224 relacionado en Modules::ScanDeps."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -19,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
@ -63,6 +67,10 @@
|
||||
{
|
||||
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-112xx/CVE-2024-11200.json
Normal file
60
CVE-2024/CVE-2024-112xx/CVE-2024-11200.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11200",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-03T14:15:19.923",
|
||||
"lastModified": "2024-12-03T14:15:19.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Goodlayers Core plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018font-family\u2019 parameter in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://goodlayers.com/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1baa3f0-28ec-409f-a9a5-c35545ab439a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11819",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-27T00:15:17.890",
|
||||
"lastModified": "2024-11-27T00:15:17.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-03T15:00:58.693",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in 1000 Projects Portfolio Management System MCA 1.0. This vulnerability affects unknown code of the file /forgot_password_process.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Portfolio Management System MCA 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /forgot_password_process.php. La manipulaci\u00f3n del argumento username conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,71 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wackymaker/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286192",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286192",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.451433",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11820",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-27T01:15:04.090",
|
||||
"lastModified": "2024-11-27T01:15:04.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-03T14:54:20.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in code-projects Crud Operation System 1.0. This issue affects some unknown processing of the file /add.php. The manipulation of the argument saddress leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Crud Operation System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /add.php. La manipulaci\u00f3n del argumento saddress provoca cross-site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -76,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -107,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -118,28 +142,71 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobai19198/cve/blob/main/xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286193",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286193",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.451525",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-120xx/CVE-2024-12082.json
Normal file
64
CVE-2024/CVE-2024-120xx/CVE-2024-12082.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-12082",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-12-03T13:15:04.843",
|
||||
"lastModified": "2024-12-03T13:15:04.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "en OpenHarmony v4.0.0 y versiones anteriores se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "scy@openharmony.io",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "scy@openharmony.io",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md",
|
||||
"source": "scy@openharmony.io"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20768",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:09.470",
|
||||
"lastModified": "2024-12-02T20:20:27.637",
|
||||
"lastModified": "2024-12-03T14:25:50.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20799",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-04-02T08:15:59.050",
|
||||
"lastModified": "2024-12-02T22:07:32.537",
|
||||
"lastModified": "2024-12-03T14:18:15.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20800",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-04-04T09:15:07.470",
|
||||
"lastModified": "2024-12-02T22:07:34.180",
|
||||
"lastModified": "2024-12-03T14:16:35.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26028",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:09.910",
|
||||
"lastModified": "2024-12-02T22:06:53.717",
|
||||
"lastModified": "2024-12-03T14:18:21.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26030",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:10.130",
|
||||
"lastModified": "2024-12-02T22:06:56.380",
|
||||
"lastModified": "2024-12-03T14:25:09.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26031",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:10.420",
|
||||
"lastModified": "2024-12-02T22:06:58.120",
|
||||
"lastModified": "2024-12-03T14:10:06.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26032",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:10.647",
|
||||
"lastModified": "2024-12-02T22:06:59.920",
|
||||
"lastModified": "2024-12-03T14:40:37.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26033",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:10.867",
|
||||
"lastModified": "2024-12-02T22:07:02.203",
|
||||
"lastModified": "2024-12-03T14:41:32.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26034",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:11.100",
|
||||
"lastModified": "2024-12-02T22:07:03.987",
|
||||
"lastModified": "2024-12-03T14:40:27.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26035",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:11.360",
|
||||
"lastModified": "2024-12-02T22:07:06.280",
|
||||
"lastModified": "2024-12-03T14:39:57.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26038",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:11.570",
|
||||
"lastModified": "2024-12-02T22:07:08.043",
|
||||
"lastModified": "2024-12-03T14:38:32.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26040",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:11.790",
|
||||
"lastModified": "2024-12-02T22:07:09.847",
|
||||
"lastModified": "2024-12-03T14:37:58.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26041",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:12.023",
|
||||
"lastModified": "2024-12-02T22:07:12.473",
|
||||
"lastModified": "2024-12-03T14:35:05.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26042",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:12.273",
|
||||
"lastModified": "2024-12-02T22:07:13.407",
|
||||
"lastModified": "2024-12-03T14:34:28.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26043",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:12.510",
|
||||
"lastModified": "2024-12-02T22:07:15.597",
|
||||
"lastModified": "2024-12-03T14:34:19.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26044",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:12.767",
|
||||
"lastModified": "2024-12-02T22:07:18.390",
|
||||
"lastModified": "2024-12-03T14:32:50.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26045",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:13.007",
|
||||
"lastModified": "2024-12-02T22:07:20.870",
|
||||
"lastModified": "2024-12-03T14:32:46.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26050",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:13.263",
|
||||
"lastModified": "2024-12-02T22:07:22.173",
|
||||
"lastModified": "2024-12-03T14:32:40.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,8 +87,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26056",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:14.097",
|
||||
"lastModified": "2024-12-02T22:07:24.513",
|
||||
"lastModified": "2024-12-03T14:46:21.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26059",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:14.313",
|
||||
"lastModified": "2024-12-02T22:07:26.627",
|
||||
"lastModified": "2024-12-03T14:46:10.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26061",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:14.533",
|
||||
"lastModified": "2024-12-02T22:07:28.717",
|
||||
"lastModified": "2024-12-03T14:45:43.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26062",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:14.760",
|
||||
"lastModified": "2024-12-02T22:07:32.527",
|
||||
"lastModified": "2024-12-03T14:44:08.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26063",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:14.973",
|
||||
"lastModified": "2024-12-02T22:09:53.683",
|
||||
"lastModified": "2024-12-03T14:43:38.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -77,8 +77,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26064",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:15.197",
|
||||
"lastModified": "2024-12-02T22:09:18.633",
|
||||
"lastModified": "2024-12-03T14:42:01.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26065",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-03-18T18:15:15.440",
|
||||
"lastModified": "2024-12-02T22:08:58.650",
|
||||
"lastModified": "2024-12-03T14:41:45.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,8 +67,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2024.03",
|
||||
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
|
||||
"versionEndExcluding": "2024.3.0",
|
||||
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30314",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T12:15:13.280",
|
||||
"lastModified": "2024-05-22T08:15:09.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-03T14:33:44.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,10 +19,12 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,19 +32,37 @@
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.8
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +71,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:dreamweaver:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.4",
|
||||
"matchCriteriaId": "C5CFE74F-C421-442D-A374-42A1C3232B80"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34112",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-06-13T12:15:10.870",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-03T14:35:08.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,10 +19,12 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -42,19 +42,161 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34123",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-07-09T19:15:11.493",
|
||||
"lastModified": "2024-07-11T13:06:13.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-03T14:35:59.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,10 +19,12 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +32,27 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
@ -42,7 +62,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +71,62 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "23.6.7",
|
||||
"matchCriteriaId": "A1E4799F-8D36-419C-A3BD-1CD365D59FBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0",
|
||||
"versionEndExcluding": "24.5",
|
||||
"matchCriteriaId": "034306A8-9B02-4CE1-9F41-B33CA518FCDF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35366",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:19.863",
|
||||
"lastModified": "2024-12-02T17:15:10.497",
|
||||
"lastModified": "2024-12-03T14:15:20.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-39343",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T20:15:06.993",
|
||||
"lastModified": "2024-12-02T20:15:06.993",
|
||||
"lastModified": "2024-12-03T14:15:20.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 un problema en los procesadores m\u00f3viles y port\u00e1tiles Samsung Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, m\u00f3dem 5123 y m\u00f3dem 5300. El software de banda base no verifica correctamente la longitud especificada por el m\u00f3dulo MM (gesti\u00f3n de movilidad), lo que puede provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
|
60
CVE-2024/CVE-2024-424xx/CVE-2024-42422.json
Normal file
60
CVE-2024/CVE-2024-424xx/CVE-2024-42422.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42422",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-03T13:15:04.987",
|
||||
"lastModified": "2024-12-03T13:15:04.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell NetWorker, version(s) 19.10, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell NetWorker, versi\u00f3n 19.10, contiene una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n mediante clave controlada por el usuario. Un atacante no autenticado con acceso remoto podr\u00eda aprovechar esta vulnerabilidad y provocar la divulgaci\u00f3n de informaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-48990",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-11-19T18:15:21.530",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-12-03T14:15:20.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, permite a los atacantes locales ejecutar c\u00f3digo arbitrario como superusuario enga\u00f1ando a needrestart para que ejecute el int\u00e9rprete de Python con una variable de entorno PYTHONPATH controlada por el atacante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -19,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
@ -59,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48991",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-11-19T18:15:21.710",
|
||||
"lastModified": "2024-11-30T13:15:05.133",
|
||||
"lastModified": "2024-12-03T14:15:20.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/11/30/4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-48992",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-11-19T18:15:21.897",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-12-03T14:15:20.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, permite a atacantes locales ejecutar c\u00f3digo arbitrario como superusuario enga\u00f1ando a needrestart para que ejecute el int\u00e9rprete de Ruby con una variable de entorno RUBYLIB controlada por el atacante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -19,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
@ -59,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
103
CVE-2024/CVE-2024-495xx/CVE-2024-49529.json
Normal file
103
CVE-2024/CVE-2024-495xx/CVE-2024-49529.json
Normal file
@ -0,0 +1,103 @@
|
||||
{
|
||||
"id": "CVE-2024-49529",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-11-21T17:15:20.987",
|
||||
"lastModified": "2024-12-03T14:37:05.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "InDesign Desktop versions 19.0, 20.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 19.0, 20.0 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "19.5.1",
|
||||
"matchCriteriaId": "E9742486-3F6F-47F2-8046-5E33EA765A65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:indesign:20.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEF1D0A8-9DAD-403E-800C-FBFB8F9C0F41"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/indesign/apsb24-91.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,17 @@
|
||||
"id": "CVE-2024-52998",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-11-22T19:15:07.433",
|
||||
"lastModified": "2024-11-22T19:15:07.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-03T14:32:51.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Substance3D - Stager versions 3.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Las versiones 3.0.2 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -46,10 +51,48 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.0.3",
|
||||
"matchCriteriaId": "972C9BF4-5DF0-43FE-9F82-D3778F522D6D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-60.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-99xx/CVE-2024-9978.json
Normal file
60
CVE-2024/CVE-2024-99xx/CVE-2024-9978.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-9978",
|
||||
"sourceIdentifier": "scy@openharmony.io",
|
||||
"published": "2024-12-03T13:15:05.140",
|
||||
"lastModified": "2024-12-03T13:15:05.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "en OpenHarmony v4.1.1 y versiones anteriores, se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "scy@openharmony.io",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "scy@openharmony.io",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md",
|
||||
"source": "scy@openharmony.io"
|
||||
}
|
||||
]
|
||||
}
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-03T13:02:19.824299+00:00
|
||||
2024-12-03T15:03:05.766364+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-03T11:15:04.867000+00:00
|
||||
2024-12-03T15:00:58.693000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271981
|
||||
271987
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-11326](CVE-2024/CVE-2024-113xx/CVE-2024-11326.json) (`2024-12-03T11:15:04.867`)
|
||||
- [CVE-2024-10074](CVE-2024/CVE-2024-100xx/CVE-2024-10074.json) (`2024-12-03T13:15:04.490`)
|
||||
- [CVE-2024-11200](CVE-2024/CVE-2024-112xx/CVE-2024-11200.json) (`2024-12-03T14:15:19.923`)
|
||||
- [CVE-2024-12082](CVE-2024/CVE-2024-120xx/CVE-2024-12082.json) (`2024-12-03T13:15:04.843`)
|
||||
- [CVE-2024-42422](CVE-2024/CVE-2024-424xx/CVE-2024-42422.json) (`2024-12-03T13:15:04.987`)
|
||||
- [CVE-2024-49529](CVE-2024/CVE-2024-495xx/CVE-2024-49529.json) (`2024-11-21T17:15:20.987`)
|
||||
- [CVE-2024-9978](CVE-2024/CVE-2024-99xx/CVE-2024-9978.json) (`2024-12-03T13:15:05.140`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `38`
|
||||
|
||||
- [CVE-2024-47476](CVE-2024/CVE-2024-474xx/CVE-2024-47476.json) (`2024-12-03T10:15:05.883`)
|
||||
- [CVE-2024-26035](CVE-2024/CVE-2024-260xx/CVE-2024-26035.json) (`2024-12-03T14:39:57.947`)
|
||||
- [CVE-2024-26038](CVE-2024/CVE-2024-260xx/CVE-2024-26038.json) (`2024-12-03T14:38:32.390`)
|
||||
- [CVE-2024-26040](CVE-2024/CVE-2024-260xx/CVE-2024-26040.json) (`2024-12-03T14:37:58.917`)
|
||||
- [CVE-2024-26041](CVE-2024/CVE-2024-260xx/CVE-2024-26041.json) (`2024-12-03T14:35:05.120`)
|
||||
- [CVE-2024-26042](CVE-2024/CVE-2024-260xx/CVE-2024-26042.json) (`2024-12-03T14:34:28.220`)
|
||||
- [CVE-2024-26043](CVE-2024/CVE-2024-260xx/CVE-2024-26043.json) (`2024-12-03T14:34:19.377`)
|
||||
- [CVE-2024-26044](CVE-2024/CVE-2024-260xx/CVE-2024-26044.json) (`2024-12-03T14:32:50.367`)
|
||||
- [CVE-2024-26045](CVE-2024/CVE-2024-260xx/CVE-2024-26045.json) (`2024-12-03T14:32:46.117`)
|
||||
- [CVE-2024-26050](CVE-2024/CVE-2024-260xx/CVE-2024-26050.json) (`2024-12-03T14:32:40.333`)
|
||||
- [CVE-2024-26056](CVE-2024/CVE-2024-260xx/CVE-2024-26056.json) (`2024-12-03T14:46:21.770`)
|
||||
- [CVE-2024-26059](CVE-2024/CVE-2024-260xx/CVE-2024-26059.json) (`2024-12-03T14:46:10.120`)
|
||||
- [CVE-2024-26061](CVE-2024/CVE-2024-260xx/CVE-2024-26061.json) (`2024-12-03T14:45:43.500`)
|
||||
- [CVE-2024-26062](CVE-2024/CVE-2024-260xx/CVE-2024-26062.json) (`2024-12-03T14:44:08.960`)
|
||||
- [CVE-2024-26063](CVE-2024/CVE-2024-260xx/CVE-2024-26063.json) (`2024-12-03T14:43:38.843`)
|
||||
- [CVE-2024-26064](CVE-2024/CVE-2024-260xx/CVE-2024-26064.json) (`2024-12-03T14:42:01.657`)
|
||||
- [CVE-2024-26065](CVE-2024/CVE-2024-260xx/CVE-2024-26065.json) (`2024-12-03T14:41:45.277`)
|
||||
- [CVE-2024-30314](CVE-2024/CVE-2024-303xx/CVE-2024-30314.json) (`2024-12-03T14:33:44.160`)
|
||||
- [CVE-2024-34112](CVE-2024/CVE-2024-341xx/CVE-2024-34112.json) (`2024-12-03T14:35:08.160`)
|
||||
- [CVE-2024-34123](CVE-2024/CVE-2024-341xx/CVE-2024-34123.json) (`2024-12-03T14:35:59.150`)
|
||||
- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-12-03T14:15:20.107`)
|
||||
- [CVE-2024-39343](CVE-2024/CVE-2024-393xx/CVE-2024-39343.json) (`2024-12-03T14:15:20.397`)
|
||||
- [CVE-2024-48990](CVE-2024/CVE-2024-489xx/CVE-2024-48990.json) (`2024-12-03T14:15:20.627`)
|
||||
- [CVE-2024-48991](CVE-2024/CVE-2024-489xx/CVE-2024-48991.json) (`2024-12-03T14:15:20.740`)
|
||||
- [CVE-2024-48992](CVE-2024/CVE-2024-489xx/CVE-2024-48992.json) (`2024-12-03T14:15:20.850`)
|
||||
- [CVE-2024-52998](CVE-2024/CVE-2024-529xx/CVE-2024-52998.json) (`2024-12-03T14:32:51.580`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
86
_state.csv
86
_state.csv
@ -242727,6 +242727,7 @@ CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552
|
||||
CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000
|
||||
CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000
|
||||
CVE-2024-10073,0,0,9ac62420226c9fe9ed2bbe058542cdb11512629d78e7df28a3c14d1c56a17916,2024-10-29T17:18:17.690000
|
||||
CVE-2024-10074,1,1,b284744f07fe1ddfdf77652f05295a2c0f173bf1f197cb901df5e6965a15cfaa,2024-12-03T13:15:04.490000
|
||||
CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000
|
||||
CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000
|
||||
CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000
|
||||
@ -242844,7 +242845,7 @@ CVE-2024-10218,0,0,80b7300a65e46275d83f3bd59a6350bd0af804c93b7f84ec384cf6c815e43
|
||||
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
|
||||
CVE-2024-10220,0,0,34f293e26dd67da6d92e244e4687b4aa20b912c0b86b79157464f27fb6137073,2024-11-22T17:15:06.650000
|
||||
CVE-2024-10223,0,0,237ebcbe1a44551c4c262c272427d3817a64977114a9e921cdeb1f7ff3ea65fd,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10224,0,0,07b8c95ec9f809249cca3b0789e13bf66e4e14062afd318734f0da25960e79d2,2024-11-19T21:56:45.533000
|
||||
CVE-2024-10224,0,1,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000
|
||||
CVE-2024-10226,0,0,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000
|
||||
CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10228,0,0,d569133a271818bbabb06a409fc5b29be55f5994c84d2df5dcb22d53edb0464d,2024-11-07T17:12:45.750000
|
||||
@ -243391,7 +243392,7 @@ CVE-2024-10999,0,0,e7ea7377e972e711b7f09c97d1f1904a51f2a45036948c3c337a6d1c65fd2
|
||||
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
|
||||
CVE-2024-11000,0,0,a7e8d5385c553ca345a72fc5358bdef9d69bb9b3c3980e31af7a0cfb92d81a8f,2024-11-13T01:05:49.643000
|
||||
CVE-2024-11002,0,0,b6bf6324987f4073b2c9bfe8ed3afef93af42e688e9e8a0c5fdbab27cca15ed5,2024-11-26T07:15:05.413000
|
||||
CVE-2024-11003,0,0,61bfbb93c4ae10f4af71c16c69643bf462c68ffa94733e59b6f95c78952b7f9b,2024-11-19T21:56:45.533000
|
||||
CVE-2024-11003,0,1,a783ec5f16b410f220d004ec7b834ae4a4b65091c9d3bd08888ea586385d6942,2024-12-03T14:15:19.800000
|
||||
CVE-2024-11004,0,0,ae81cd254161ae2b32edcbdeb3c8b9257e0a408bd5a5695d4038ccc9e5adaac9,2024-11-13T17:01:58.603000
|
||||
CVE-2024-11005,0,0,11c6f0332fc033e5f19567e3b4704591ec391ce7bb38c717fd45eebf4e8bd80e,2024-11-22T17:15:06.803000
|
||||
CVE-2024-11006,0,0,94626099ce68e5d3e4adfe80a73960f4ad7b764747da2022a8d4006ce81886f0,2024-11-22T17:15:06.913000
|
||||
@ -243519,6 +243520,7 @@ CVE-2024-11195,0,0,59a97c370771f27b33e51ae1039dc49a821a1858990404541e8309b975c38
|
||||
CVE-2024-11198,0,0,51d6daea956d8949d0eebe7d036d8836a4c8d5c266ea899d7a1d4229a0290103,2024-11-19T21:57:32.967000
|
||||
CVE-2024-11199,0,0,1b252293dc51d6f43d3121b045d01eb3c6301ad12927e01a257a520b4287caef,2024-11-23T10:15:03.897000
|
||||
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
|
||||
CVE-2024-11200,1,1,f4d97ea48501a65608a17fa4e2270dbe4daddfc571376bcd024e4292966bd946,2024-12-03T14:15:19.923000
|
||||
CVE-2024-11202,0,0,51d8d259b86d0f0a0aaf1b7832edde09bf21ffb4ef806afcd5ff2c031b036ac7,2024-11-26T08:15:03.710000
|
||||
CVE-2024-11203,0,0,51c484c857cf59c3f813a2e3506116f16f445f710b53772d92de1b4f877cc338,2024-11-28T09:15:04.007000
|
||||
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
|
||||
@ -243595,7 +243597,7 @@ CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407
|
||||
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
|
||||
CVE-2024-11320,0,0,043dd45fc8afc6a3f6d5124b009a260902c28d8e6731495b55f0e622c6d087a7,2024-11-26T17:26:33.327000
|
||||
CVE-2024-11325,0,0,14da4d35c2181419813fe9ac1dccdd051d8a95ab923f557a3b686e3cf070cb30,2024-12-03T10:15:05.067000
|
||||
CVE-2024-11326,1,1,3601bc2a8aa6c701a70d06e299ecc68b5e3f45dc7fc87ab827ff5000b9b49cb5,2024-12-03T11:15:04.867000
|
||||
CVE-2024-11326,0,0,3601bc2a8aa6c701a70d06e299ecc68b5e3f45dc7fc87ab827ff5000b9b49cb5,2024-12-03T11:15:04.867000
|
||||
CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f095a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-11330,0,0,1c458fab138aae3f3b89b170e15e7403fdc2fbe304c8cf0cbc41ae122ec08539,2024-11-23T07:15:03.737000
|
||||
CVE-2024-11332,0,0,21d8101c0dd73a7dc8b4a9b045dbbf7a2c40f682ad21bdcbf98ef68d6b970235,2024-11-23T05:15:06.520000
|
||||
@ -243868,9 +243870,9 @@ CVE-2024-11805,0,0,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52
|
||||
CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000
|
||||
CVE-2024-11817,0,0,878ee2179044a99d330d167a93477de960b6cf592f6203d72eec9805c4d5d74a,2024-11-26T23:15:04.990000
|
||||
CVE-2024-11818,0,0,db7694cd2fdcae7c78aac428fa42653e88b1d41dfdd73e2502c588c9613c4f73,2024-11-27T00:15:17.727000
|
||||
CVE-2024-11819,0,0,96baade15f9044b9dcb55897d3c533bfc5ed78088c4c0af1b3f20fd7e1b0e87b,2024-11-27T00:15:17.890000
|
||||
CVE-2024-11819,0,1,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000
|
||||
CVE-2024-1182,0,0,fa905e4a8a46b36f13d15329274923ae221fc1fe7f91daf124410752f4903054,2024-07-05T12:55:51.367000
|
||||
CVE-2024-11820,0,0,98b7e3f55278e4e540b5d30afcc2f1c61148c58882b41c21d30f2b114d45baf0,2024-11-27T01:15:04.090000
|
||||
CVE-2024-11820,0,1,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000
|
||||
CVE-2024-11828,0,0,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae62b7,2024-11-26T19:15:22.910000
|
||||
CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c09a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
|
||||
@ -243939,6 +243941,7 @@ CVE-2024-1206,0,0,5f77d40826619ff076a6ee2348b6f5023dd16e0c591d0d5d735c076214b8b6
|
||||
CVE-2024-12062,0,0,053134064f0b6efbb78d94709d74965493fd7936bfcf08f9a9a8ec7d826131fc,2024-12-03T10:15:05.493000
|
||||
CVE-2024-1207,0,0,dcc484c1fca006f292c23965347128c235a983932753c8f043310e93d42eeea4,2024-02-15T02:05:42.313000
|
||||
CVE-2024-1208,0,0,931317b38cffca1e6ab678e3f4e10db5d686e3bb7ffa9e092bfb0d5704f0fe50,2024-02-13T14:06:24.090000
|
||||
CVE-2024-12082,1,1,3b55c847ee02ef0d7f4b58fecd9285e5b3b7a20be8f27582ab2fdc4ac93dfac6,2024-12-03T13:15:04.843000
|
||||
CVE-2024-1209,0,0,b007174870c79d931de8bd87795b421ecc64b354efa55388cf8747cc0f9b9382,2024-02-14T16:51:40.300000
|
||||
CVE-2024-1210,0,0,2bd6c4d9a535fadb91354d7280da4ed73754e214ed933073c198034626ca398d,2024-02-14T17:26:54.873000
|
||||
CVE-2024-1212,0,0,da6373ae7bafa80bc186105339e693a9592b96e608bda44b9b7e9a26c6194323,2024-11-19T17:24:39.480000
|
||||
@ -245270,7 +245273,7 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3
|
||||
CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000
|
||||
CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000
|
||||
CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000
|
||||
CVE-2024-20768,0,0,0a787ae17c1c9554efbce8083ebf2f71929ddd956de1438a76dc74375b810cb1,2024-12-02T20:20:27.637000
|
||||
CVE-2024-20768,0,1,1e3e9e9553fe22dc3d69b454622eff7f4f96055b91832944849f7b2ee61961b0,2024-12-03T14:25:50.643000
|
||||
CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000
|
||||
CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000
|
||||
CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000
|
||||
@ -245297,9 +245300,9 @@ CVE-2024-20795,0,0,339aac1d5967def1721b9f2266bf58d280ddf20a2869a78a797eb0f1e5bbf
|
||||
CVE-2024-20796,0,0,00526c11ef10ac19e26f1b9fd4dbb5343656ad019ba0153210f3164b00fbb116,2024-04-11T12:47:44.137000
|
||||
CVE-2024-20797,0,0,cca548d603d4ef24bc949550666e86662b0fde7c1a3163dc260ede4b6277d4bf,2024-04-11T12:47:44.137000
|
||||
CVE-2024-20798,0,0,8b948926eaf9bb7762236e345460aa95eaff4b64e6ad072852daab65eab7f1c6,2024-04-11T12:47:44.137000
|
||||
CVE-2024-20799,0,0,e14bc255e39a0fbf73332b041fca58be1031162fae1815563fb8ea9b691c56fe,2024-12-02T22:07:32.537000
|
||||
CVE-2024-20799,0,1,8428cb712862354c385635b67f043354a5a529f6758e50018b2185b88daa17c7,2024-12-03T14:18:15.477000
|
||||
CVE-2024-2080,0,0,739bb7bc16949ce8dc42f086707a1965c48b8c0e80b8a96770d78539ca010524,2024-03-22T12:45:36.130000
|
||||
CVE-2024-20800,0,0,63cbca2bd0041e91c4c27520108a691e41ded598aa31ad458d4ca67a8b3670d7,2024-12-02T22:07:34.180000
|
||||
CVE-2024-20800,0,1,e90a6af871b5675be42c72ef35b247ceac517172f67ea5e497ab2a65b8ef6be6,2024-12-03T14:16:35.813000
|
||||
CVE-2024-20802,0,0,199d727c032aa2e620e384dca4e13a9e3425e69f11a38c8295cb8667c34719d8,2024-01-10T16:14:57.787000
|
||||
CVE-2024-20803,0,0,0344cde3efeaae4afbdf650bafe8bd2112bea594bd06ade4eca20bfb4af01ace,2024-01-10T16:11:26.313000
|
||||
CVE-2024-20804,0,0,047c084f6461b3ccfa7e0491c6396c940be7f851c74224e7b3908c6f90469840,2024-04-02T01:15:50.777000
|
||||
@ -249168,47 +249171,47 @@ CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4a
|
||||
CVE-2024-26025,0,0,3352cb4bf9ea0c839d1741e6282396ec44178b4e8d69bb56155c91bf1b50fdf8,2024-09-06T18:54:37.007000
|
||||
CVE-2024-26026,0,0,9489dfd8cfaf84cc429afc6dedc0bc5efa9a938711a5b920a49c5eb5da48c8dd,2024-05-08T17:05:24.083000
|
||||
CVE-2024-26027,0,0,92cac7f77f6e52e5db63c20697f9eef252fe749956e34d00b1955a621b2a7163,2024-09-06T18:52:51.097000
|
||||
CVE-2024-26028,0,0,c517cc3720c90dec606bc7d8dee3896584eb629812e374b25507b7a34818d629,2024-12-02T22:06:53.717000
|
||||
CVE-2024-26028,0,1,ede9fe4cab969be7a28fa27ed4c92b2b85d7eee04aae61937a86bd32f02b4349,2024-12-03T14:18:21.500000
|
||||
CVE-2024-26029,0,0,3b6290d9a75a8e9810fd217f46cbaf1351e6c78f04f13dd99b8776f7c655bd87,2024-08-07T12:15:36.547000
|
||||
CVE-2024-2603,0,0,78190220c4426015d8e369c25fb4d08ae79b05986155963bab2103b320746b59,2024-07-03T01:53:22.183000
|
||||
CVE-2024-26030,0,0,d7acb1e81dd5fa90c7c5b9b18609c55ef6866eae68acd588a8a8bc16b3ccaa0e,2024-12-02T22:06:56.380000
|
||||
CVE-2024-26031,0,0,9251a22057f236e1d3a848e565f60cf6550f57153c17685d81f7d9f0da5a0b28,2024-12-02T22:06:58.120000
|
||||
CVE-2024-26032,0,0,25ba5027b92ba7b29cd5952069e3745d08f29b71e08faea170ccb8512e51d957,2024-12-02T22:06:59.920000
|
||||
CVE-2024-26033,0,0,c78707ded2f2b609bc7eca4313e9210441b759e77c29f088718bb51d621ffcdf,2024-12-02T22:07:02.203000
|
||||
CVE-2024-26034,0,0,6716c83fd1d8d731d8fc3214db861cc7937299ee72e21da7d42be35b66918217,2024-12-02T22:07:03.987000
|
||||
CVE-2024-26035,0,0,be43584d20133ee714916450b0eaa223ef0e0c531281a3b0f6515ff2706e1c73,2024-12-02T22:07:06.280000
|
||||
CVE-2024-26030,0,1,9480f998e12c7225c9291a75c239ad904ef492a904984d0f591e44b1bf95f8b9,2024-12-03T14:25:09.180000
|
||||
CVE-2024-26031,0,1,37778b6b03f34d58e747cfcd35a3b12f95ef62c6450aea058b278695d6d8a2d7,2024-12-03T14:10:06.587000
|
||||
CVE-2024-26032,0,1,645c8078e6a26904d2d551665c39be159598a06b4a7a48d1153d69bd1f42025a,2024-12-03T14:40:37.250000
|
||||
CVE-2024-26033,0,1,e038cd7888bdfa6b33bfe5df359535de6a1e8fecc268a99a38060d9f29c2502f,2024-12-03T14:41:32.627000
|
||||
CVE-2024-26034,0,1,7b6a7735faab8554d9ba0052517c5f5f524ae1f59952c80e36700be3e0c5aef6,2024-12-03T14:40:27.617000
|
||||
CVE-2024-26035,0,1,6d2a0e3789cf1fc6e968489d15f56bea0ed58b0ddac4b2112fa1168e1ff12f68,2024-12-03T14:39:57.947000
|
||||
CVE-2024-26036,0,0,1d83088cd2cd101659224a3fc5c08fa64786f76447e958e3014dda7a1b3b2762,2024-06-14T19:30:06.617000
|
||||
CVE-2024-26037,0,0,93771142bffee162d36251cc4e8ed14800b95d6cabf310d68e7055bd0eea978f,2024-06-14T19:48:13.247000
|
||||
CVE-2024-26038,0,0,b9bb6c98495127ac6071b9f41984d6f796b59bc5be5e7634f158102197235d11,2024-12-02T22:07:08.043000
|
||||
CVE-2024-26038,0,1,968a447ee34eab05a2f4c9717ce5ed7be422a568ee2ecaf855ab8ca2f0d7aecf,2024-12-03T14:38:32.390000
|
||||
CVE-2024-26039,0,0,1174a6c1115f79e7f0889b154dfc89e46af3bb6dd2520ac9d5c13289cf240986,2024-06-14T19:47:57.717000
|
||||
CVE-2024-2604,0,0,450c7d59fe8571ecee58ed217df60ab05189f4ad43db724a13d662a6d29d50fb,2024-05-17T02:38:21.500000
|
||||
CVE-2024-26040,0,0,881490c457662cce773f8ca7cddb2e3a126b8164e3048aefa446f96a3d6a6526,2024-12-02T22:07:09.847000
|
||||
CVE-2024-26041,0,0,82bc3a27e139f2eac0699f5c997717f1714702a611d02caf92170be6080bfa06,2024-12-02T22:07:12.473000
|
||||
CVE-2024-26042,0,0,b4a00f3667ef84694a4e6abf52951c7d51f9277bef08b433c87aba15cfea5dff,2024-12-02T22:07:13.407000
|
||||
CVE-2024-26043,0,0,99ead7d68c938569d32b725222aa01cb299aa9704e98099bfec50c1573334734,2024-12-02T22:07:15.597000
|
||||
CVE-2024-26044,0,0,d48863d0a18ce3b99a996ff7e489563474f3ba710823fa01053fdd4130dff831,2024-12-02T22:07:18.390000
|
||||
CVE-2024-26045,0,0,c0e5a2bde8102da916dc75a0d099b9e904cf36335678ec6973bdd23ad8cb11f5,2024-12-02T22:07:20.870000
|
||||
CVE-2024-26040,0,1,2a0b751b728209a7c9a3b5df0fc88243a60aedc3d5c7976061e63cd1c530eb81,2024-12-03T14:37:58.917000
|
||||
CVE-2024-26041,0,1,2bd5f47ec9ed3dc4f1c1945994ca2a670f7b89c19a6dac4d15773010ee8fc2ed,2024-12-03T14:35:05.120000
|
||||
CVE-2024-26042,0,1,2ea8d4dd55cbe369521d040be468f269c837b84a9eac6286bae77d5ed2d0b904,2024-12-03T14:34:28.220000
|
||||
CVE-2024-26043,0,1,9e5ba2d761fb38599a187ece66b844e2c6f6948768589cb3a7e3e27c1f2048ba,2024-12-03T14:34:19.377000
|
||||
CVE-2024-26044,0,1,66bac57be53c755cbe995e285249cde839b00b7b1d98f8199c1aa466447b6bfc,2024-12-03T14:32:50.367000
|
||||
CVE-2024-26045,0,1,16de77a5d4b0cf723bbdcff02c0b9e5ead3b5ea66df2c839632d092fd2d31a4d,2024-12-03T14:32:46.117000
|
||||
CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000
|
||||
CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000
|
||||
CVE-2024-26050,0,0,a45a43204e66a747018474afbb3bf9e8cced59d2a9da4abea0d1a9ec7441e460,2024-12-02T22:07:22.173000
|
||||
CVE-2024-26050,0,1,e5e2c4f7b84f8f2f1d1ea8570d5ab87ff02bbfb4edf0f2eb8b892f6b238feba4,2024-12-03T14:32:40.333000
|
||||
CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26053,0,0,08b1c01624e7d71b7ff35b901082456bbba3fa5d18db4bad7ba7d58bb2e8e67e,2024-06-14T19:46:37.923000
|
||||
CVE-2024-26054,0,0,eda3484671c40e51a92b63a901454f377d91e0d9bfcdc0a5fb15602bc8f94d81,2024-06-14T19:24:41.580000
|
||||
CVE-2024-26055,0,0,baa99b29bd8823923f255a8118fccf649a7d41ab4a2f879c4c914a9fe0240d12,2024-06-14T19:46:17.973000
|
||||
CVE-2024-26056,0,0,fd25988b2ffb880e93d02ea0a7d6ca550724c5a3bf8011f3370b495b2e1472a4,2024-12-02T22:07:24.513000
|
||||
CVE-2024-26056,0,1,14ff68b17aa108cff431fe42e307f1d738d1d00dbe0108481078696aa0855c29,2024-12-03T14:46:21.770000
|
||||
CVE-2024-26057,0,0,e45b3f0f152eb3c78dc9320bed534a79a66b2c35d46fd8b2b0ef0017333c4b87,2024-06-14T19:46:03.817000
|
||||
CVE-2024-26058,0,0,a93e87c800fd4d920581776c16d0072b04deb406d205f9f24e685781c2f5715f,2024-06-14T19:37:56.100000
|
||||
CVE-2024-26059,0,0,1e0d0341f224106eff1e5af2366626fd5d13edf1ca8e2c987ea5d5df70d49373,2024-12-02T22:07:26.627000
|
||||
CVE-2024-26059,0,1,ac98e6d0b0199134c58aa887f2df563a6de6ceece47482ec1418cea94cf6190c,2024-12-03T14:46:10.120000
|
||||
CVE-2024-2606,0,0,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000
|
||||
CVE-2024-26060,0,0,9cdef2d575b129761f3290b88017e8f07b5021de9d3255eeba059f838c645f83,2024-06-14T18:49:08.077000
|
||||
CVE-2024-26061,0,0,ad2ceb8808417064310c3cdf2f62f9478a68900289ec3c3d53d06a95b0f1f100,2024-12-02T22:07:28.717000
|
||||
CVE-2024-26062,0,0,de3a3c35ada4aa1c5944365be2cf00e2b621e3c48f1c3cd28c67c563a45ac527,2024-12-02T22:07:32.527000
|
||||
CVE-2024-26063,0,0,0be577b3563c3b84879e994b8e663bef83be58c13a6830fc3d5d283ea404cee7,2024-12-02T22:09:53.683000
|
||||
CVE-2024-26064,0,0,22ea7ed6008c6012e35e6e94aafec1da167cb036f2701bb13e0387b484a6c89c,2024-12-02T22:09:18.633000
|
||||
CVE-2024-26065,0,0,9e200907fbcbb393ada9d535c2f77eec4931a2dded2812365f92071cee63cdfa,2024-12-02T22:08:58.650000
|
||||
CVE-2024-26061,0,1,471407acdf51819c0bdd60ee5d73b186c8fadecaf5af71c2ca7d8c11adca573a,2024-12-03T14:45:43.500000
|
||||
CVE-2024-26062,0,1,54cf0e1b1e6d1778aaa7182ecd73a54656c80a039edadc40b460c0c801a0ad52,2024-12-03T14:44:08.960000
|
||||
CVE-2024-26063,0,1,f5a13f3984cabb12f59616fa26efdbef4591cca6826bbc28da51b1600a9b376a,2024-12-03T14:43:38.843000
|
||||
CVE-2024-26064,0,1,3098c3e3de91199d1bd6d20eb89b7ee3464bdc44d99dc9cd1e4ea880cda75894,2024-12-03T14:42:01.657000
|
||||
CVE-2024-26065,0,1,00462b106b4f303ce5343363705987a205782e4b4edc349db65b96bad65b09a1,2024-12-03T14:41:45.277000
|
||||
CVE-2024-26066,0,0,c16f3c27056b3c70c3163298471f82d82d65c7e624bee5584c40df2a2851002f,2024-06-14T18:48:49.183000
|
||||
CVE-2024-26067,0,0,4e837a02e31f2ba959b9ab2cadbab50fe243bb7e44fdf350987cc4ea278caf71,2024-03-18T19:40:00.173000
|
||||
CVE-2024-26068,0,0,8b1bf80f59bd4ba690a55f04b468280504b7e85a202f44401a8c49c1cbdddd95,2024-06-14T18:48:22.843000
|
||||
@ -252470,7 +252473,7 @@ CVE-2024-3031,0,0,fa19e5674d76c5b46624774eba96476ad7fabe41ca511ba02fe99ace14a675
|
||||
CVE-2024-30310,0,0,0318e7fa8c109fbd13dfaf43bb618e0a49e9b16e0b621e77faecb78de1db2a84,2024-12-02T21:22:11.137000
|
||||
CVE-2024-30311,0,0,3840218508a24667161b6ff79a375834ddbf249257e991ddfa8b10e97ab37e31,2024-12-02T21:22:13.143000
|
||||
CVE-2024-30312,0,0,d795e4958162bcd7905c2b6c90993ddfcc6293aa254bf6c539234075dec0a0ba,2024-12-02T21:22:15.280000
|
||||
CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000
|
||||
CVE-2024-30314,0,1,42f4f4f53d09df828a9d772c476dba6f6fd9600ec6925401912c5ffb5da6d3e4,2024-12-03T14:33:44.160000
|
||||
CVE-2024-3032,0,0,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000
|
||||
CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000
|
||||
CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000
|
||||
@ -255302,7 +255305,7 @@ CVE-2024-34109,0,0,c9e7a028e318045ad0e07a30584a8cdf66484faf15b239f83d63fffcfc9c0
|
||||
CVE-2024-3411,0,0,c5534494d0c0f328f6dd6a29b2c75cf0917384aed2d3044a8f39c15c542a2568,2024-07-03T21:15:03.933000
|
||||
CVE-2024-34110,0,0,c15838464fcaf085b2c09e471beb2e732398e46cad7f992477efffffb5459007,2024-07-09T15:09:42.910000
|
||||
CVE-2024-34111,0,0,19c043112b06522ffc5ddb9df0f8b999a9184efbe5f7c5a69c8e8324f21b6533,2024-08-07T15:15:54.520000
|
||||
CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a33d7,2024-06-13T18:35:19.777000
|
||||
CVE-2024-34112,0,1,8f1bc7613512ccaee7d59e04edc3235d03e9488247401e1813f71cbc5a8f5496,2024-12-03T14:35:08.160000
|
||||
CVE-2024-34113,0,0,a2e9f7ac8776392f6be8ef1204f1c90f02f8da5b4c386f27bfe6c53f96f39c9b,2024-08-07T15:15:54.640000
|
||||
CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000
|
||||
CVE-2024-34116,0,0,4851ab33470ffca4c1046ad0fdbe4ebf66556d22cc3b975d80dd125226b02f02,2024-08-07T15:15:54.863000
|
||||
@ -255313,7 +255316,7 @@ CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c1
|
||||
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
|
||||
CVE-2024-34121,0,0,5c4bc5f93a8e677774dfec4d5defe369f17f675204e3af33dbf284e95e296370,2024-11-01T20:35:17.293000
|
||||
CVE-2024-34122,0,0,1ec0410a2782988212e8d53b9aff3b950baab8772620259cd2192140e3a735de,2024-10-11T15:01:24.393000
|
||||
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
|
||||
CVE-2024-34123,0,1,cacd50e122fa9bc468f9dd6ac02f78493bb7ad635f94b1497402fe1b9f16cae1,2024-12-03T14:35:59.150000
|
||||
CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000
|
||||
CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000
|
||||
CVE-2024-34126,0,0,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000
|
||||
@ -256206,7 +256209,7 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc
|
||||
CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000
|
||||
CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000
|
||||
CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000
|
||||
CVE-2024-35366,0,0,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000
|
||||
CVE-2024-35366,0,1,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000
|
||||
CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
|
||||
CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
|
||||
CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000
|
||||
@ -259227,7 +259230,7 @@ CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453c
|
||||
CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000
|
||||
CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000
|
||||
CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000
|
||||
CVE-2024-39343,0,0,5387f0e37d9edeed6f67983994a72c30c3e3ad56112bee25e823237afaf5f39e,2024-12-02T20:15:06.993000
|
||||
CVE-2024-39343,0,1,6171b95408e88154e38dce78348a253a8927c06ba1552f0b46a9bf8a028abd73,2024-12-03T14:15:20.397000
|
||||
CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000
|
||||
CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000
|
||||
CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000
|
||||
@ -261312,6 +261315,7 @@ CVE-2024-42417,0,0,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475
|
||||
CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000
|
||||
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
|
||||
CVE-2024-42420,0,0,03ebd30eeb434ca03d3eabb7d6b0396c2658f46173e6697533666fb020a1c544,2024-11-05T19:39:31.913000
|
||||
CVE-2024-42422,1,1,0b232b35fd06e22a6b730459e5a39791707f9656a48c53d8b2af810ab36d879f,2024-12-03T13:15:04.987000
|
||||
CVE-2024-42423,0,0,d28867b0d8eebf1aff8bd3b42424cd5e577a7dd9340d9f0359d41e2fac4ef5ea,2024-09-20T19:42:20.417000
|
||||
CVE-2024-42424,0,0,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000
|
||||
CVE-2024-42425,0,0,6aa2353bd532f46d0a2e205868494bbec291e24ba1bbc1fc9f37a272eab1bd0b,2024-09-16T15:46:03.110000
|
||||
@ -264579,7 +264583,7 @@ CVE-2024-47462,0,0,be6c9453989893d3dcfbe5bdc6e676b393ed9c49111f1ece54054c135b42f
|
||||
CVE-2024-47463,0,0,2c716c4d7f29d4820a72727f94c0dd565fcb88d49fc25a376e2306f9f47f5669,2024-11-06T18:17:17.287000
|
||||
CVE-2024-47464,0,0,236d04a0c7d407559b9f7742340111549ca9237c3d8e53730db19cfca87c0db1,2024-11-06T18:17:17.287000
|
||||
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
|
||||
CVE-2024-47476,0,1,a9ce0a839530433df414fd290d551556d66aa033c776ff154b9b4a9f858c0987,2024-12-03T10:15:05.883000
|
||||
CVE-2024-47476,0,0,a9ce0a839530433df414fd290d551556d66aa033c776ff154b9b4a9f858c0987,2024-12-03T10:15:05.883000
|
||||
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
|
||||
CVE-2024-47481,0,0,83505b26fa6eb758ddde8dc521f672e8bc2bacfc2db0ee1df66890f0ab8642bc,2024-10-31T00:01:40.487000
|
||||
CVE-2024-47483,0,0,da98222f22e89d9e61f65fd3ac619771e185cbdec7a679159eab7aec6c7cc7a0,2024-10-31T00:01:05.127000
|
||||
@ -265388,9 +265392,9 @@ CVE-2024-48986,0,0,cf9484fda56052e686c7c5f0c8f108e09e57cac0d3001558017ed0e9f5d28
|
||||
CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000
|
||||
CVE-2024-48989,0,0,9073e18090b9ae4eb5079758fa48cb03e03a3dcd9dfe9e38f4453d35dfeb5c4c,2024-11-13T17:01:16.850000
|
||||
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
|
||||
CVE-2024-48990,0,0,01ad64d993b1a34125730a579a223ab965b2b42884353072e3771c0929c4035c,2024-11-19T21:56:45.533000
|
||||
CVE-2024-48991,0,0,cad0aae4b890b506cacb3fef0d5af018cb8eebf417c48af68da7f4d95e131e01,2024-11-30T13:15:05.133000
|
||||
CVE-2024-48992,0,0,7d51388c1721a8523b9ede74fe782bca890c6f1c274f5cf7a619b3f6ce5cedd5,2024-11-19T21:56:45.533000
|
||||
CVE-2024-48990,0,1,8ae314221da60f3f28b2dc061e7fd91a0c68d57bf2594502511d6f645886ec7c,2024-12-03T14:15:20.627000
|
||||
CVE-2024-48991,0,1,d168b58f77340c27c4fe11099d0fc3db2a31f2441bc53eda948353dc7a25f936,2024-12-03T14:15:20.740000
|
||||
CVE-2024-48992,0,1,cfcbe8040e38ad95869aae5b63b2c99ac1950d785833afab83d53352be93cc53,2024-12-03T14:15:20.850000
|
||||
CVE-2024-48993,0,0,196b3895a17ef7dfbcbfdd466d8bb48d5a37a44b82a7d059ceac4c05136016cf,2024-11-19T19:06:50.177000
|
||||
CVE-2024-48994,0,0,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000
|
||||
CVE-2024-48995,0,0,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000
|
||||
@ -265703,6 +265707,7 @@ CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631
|
||||
CVE-2024-49526,0,0,69c6bf5485d49eb3a2da169497c27d72a1196f6e9a7d6c7d2c7c44787150932a,2024-11-18T18:41:33.857000
|
||||
CVE-2024-49527,0,0,0d9fde76ea05a295ae3bcd4b45293562d8fc9654bdbe0c09a49c5875709be45a,2024-11-18T18:39:52.213000
|
||||
CVE-2024-49528,0,0,f04aeabc999019759ae70807d4e936a36d020a33909dd4ffb4e16898d3cf045e,2024-11-18T18:34:56.667000
|
||||
CVE-2024-49529,1,1,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000
|
||||
CVE-2024-49536,0,0,64699087f9e557bcb15e1f1e76804f07eb5cb82ad8ee2392d1aa5d8b2e6ac029,2024-11-19T21:21:45.640000
|
||||
CVE-2024-49557,0,0,d5723680a20b941e0b929edc2959b845b0ec9b5d07125e59e1942c5e8991b90e,2024-11-15T17:36:47.110000
|
||||
CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312603,2024-11-15T17:35:54.480000
|
||||
@ -267810,7 +267815,7 @@ CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc6
|
||||
CVE-2024-5297,0,0,d1218091e3a48aa0835b7de76e914f2fa4d051775431f4beee97941e4c178297,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5298,0,0,751024870f0005efd62d8664aa885c619c01fff4fc9d9e46acd3d648d421b0e1,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5299,0,0,ec4fa401441140dbf77742461a619e82e80b0b3301518890cfd68e9b147d30dc,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52998,0,0,4a588e0a4ac0cc77f65a3f96d5f4c28074598669804bc16c028b0e79eee85554,2024-11-22T19:15:07.433000
|
||||
CVE-2024-52998,0,1,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000
|
||||
CVE-2024-53008,0,0,eb27408d35fd63e0b06a6d91784ac9fdfba636caf4dc616097e327306086f070,2024-11-28T03:15:16.363000
|
||||
CVE-2024-5301,0,0,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000
|
||||
CVE-2024-5302,0,0,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000
|
||||
@ -271963,6 +271968,7 @@ CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee7
|
||||
CVE-2024-9975,0,0,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000
|
||||
CVE-2024-9976,0,0,5980d080e9ad25dff2e581d3c904125c709818a390af58c76d59996e26d292c8,2024-10-16T13:42:24.153000
|
||||
CVE-2024-9977,0,0,8fbf86e7b1f024ef2593e8608c7ccd55ca749b0af624481d1e713f71c065dc16,2024-10-16T16:38:43.170000
|
||||
CVE-2024-9978,1,1,3a2501c5446b394c69c20954ec6ea86a8c312be2c740234a6fdca0863055d2bf,2024-12-03T13:15:05.140000
|
||||
CVE-2024-9979,0,0,bb7e55c386cc249a98b0827bb4feff1257591f1d244a65e7ccd05578ba319079,2024-10-16T16:38:43.170000
|
||||
CVE-2024-9980,0,0,665ae4d3fad1ccd0bc296c2172cff10c0d57400041e58e918121ae8fdfb1183a,2024-10-17T18:03:34.807000
|
||||
CVE-2024-9981,0,0,7aa55e716de319cd032858b815d476396828a27c5d3a7d5b6802447033166c68,2024-10-17T18:05:29.947000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user