mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-02T19:00:42.087633+00:00
This commit is contained in:
parent
2e670e7e08
commit
8e6168a40a
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2023-28461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-15T23:15:10.070",
|
||||
"lastModified": "2024-11-26T02:00:02.500",
|
||||
"lastModified": "2024-12-02T17:15:05.133",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -186,6 +187,14 @@
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36362",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-22T14:15:09.687",
|
||||
"lastModified": "2023-06-30T13:00:27.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-02T17:15:06.610",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -79,6 +89,16 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7387",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36363",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-22T14:15:09.740",
|
||||
"lastModified": "2023-06-28T16:49:34.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-02T17:15:06.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -79,6 +89,16 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7384",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36364",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-22T14:15:09.790",
|
||||
"lastModified": "2023-06-28T19:02:50.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-02T17:15:06.850",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -79,6 +89,16 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7386",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36365",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-22T14:15:09.837",
|
||||
"lastModified": "2023-06-28T19:02:23.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-02T17:15:06.967",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -79,6 +89,16 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7378",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36366",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-22T14:15:09.883",
|
||||
"lastModified": "2023-06-28T19:02:10.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-02T17:15:07.090",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -79,6 +89,16 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7381",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36367",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-22T14:15:09.930",
|
||||
"lastModified": "2023-06-28T18:49:20.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-02T17:15:07.213",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -79,6 +89,16 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7380",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36368",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-22T14:15:09.977",
|
||||
"lastModified": "2023-06-29T18:00:05.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-02T17:15:07.343",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -79,6 +89,16 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7379",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-11696",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.143",
|
||||
"lastModified": "2024-11-26T14:15:19.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T18:15:08.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n no tuvo en cuenta las excepciones generadas por el m\u00e9todo `loadManifestFromFile` durante la verificaci\u00f3n de la firma del complemento. Esta falla, provocada por un manifiesto de extensi\u00f3n no v\u00e1lido o no compatible, podr\u00eda haber causado errores de tiempo de ejecuci\u00f3n que interrumpieron el proceso de validaci\u00f3n de la firma. Como resultado, es posible que se haya omitido la aplicaci\u00f3n de la validaci\u00f3n de la firma para complementos no relacionados. La validaci\u00f3n de la firma en este contexto se utiliza para garantizar que las aplicaciones de terceros en la computadora del usuario no hayan alterado las extensiones del usuario, lo que limita el impacto de este problema. Esta vulnerabilidad afecta a Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133 y Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929600",
|
||||
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-11703",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.810",
|
||||
"lastModified": "2024-11-26T14:15:19.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T18:15:09.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "On Android, Firefox may have inadvertently allowed viewing saved passwords without the required device PIN authentication. This vulnerability affects Firefox < 133."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En Android, Firefox podr\u00eda haber permitido, sin darse cuenta, ver contrase\u00f1as guardadas sin la autenticaci\u00f3n del PIN del dispositivo requerida. Esta vulnerabilidad afecta a Firefox < 133."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1928779",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20116",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:03.833",
|
||||
"lastModified": "2024-12-02T04:15:03.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:08.113",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In cmdq, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09057438; Issue ID: MSV-1696."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En cmdq, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09057438; ID de problema: MSV-1696."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20125",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:04.663",
|
||||
"lastModified": "2024-12-02T04:15:04.663",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:09.543",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MSV-1728."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En vdec, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09046782; ID de problema: MSV-1728."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20127",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:04.777",
|
||||
"lastModified": "2024-12-02T04:15:04.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:09.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2023."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En telefon\u00eda, existe la posibilidad de una lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09289881; ID de problema: MSV-2023."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-20128",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-12-02T04:15:04.967",
|
||||
"lastModified": "2024-12-02T04:15:04.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:10.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En telefon\u00eda, existe la posibilidad de una lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09289881; ID de problema: MSV-2024."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22272",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-06-27T21:15:13.670",
|
||||
"lastModified": "2024-06-28T10:27:00.920",
|
||||
"lastModified": "2024-12-02T18:15:09.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -23,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -30,19 +32,33 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24371",
|
||||
"source": "security@vmware.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24371",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29645",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T15:15:10.960",
|
||||
"lastModified": "2024-12-02T15:15:10.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T18:15:09.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,18 @@
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Crispy-fried-chicken/83f0f5e8a475284d64bf99fb342e9027",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30282",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-05-16T09:15:11.253",
|
||||
"lastModified": "2024-05-16T13:03:05.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-02T17:48:54.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,10 +19,12 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
@ -49,12 +49,75 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.6",
|
||||
"matchCriteriaId": "3E241CF7-1D65-4BF8-8759-EADE0D0FBEEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.3",
|
||||
"matchCriteriaId": "41C1FD5E-1403-4D81-81D7-FE84D39531DA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34923",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-27T20:15:09.060",
|
||||
"lastModified": "2024-05-28T12:39:28.377",
|
||||
"lastModified": "2024-12-02T18:15:09.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el firmware del dispositivo Avocent DSR2030 03.04.00.07 anterior a 03.07.01.23 y en el firmware del dispositivo SVIP1020 01.06.00.03 anterior a 01.07.00.00, hay un cross-site scripting (XSS) Reflejado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Ka1ne1/ka1ne1.github.io/blob/main/avocent_xss.html",
|
||||
@ -24,6 +59,14 @@
|
||||
{
|
||||
"url": "https://ka1ne1.github.io/avocent_xss.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ka1ne1/ka1ne1.github.io/blob/main/avocent_xss.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://ka1ne1.github.io/avocent_xss.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-35366",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:19.863",
|
||||
"lastModified": "2024-11-29T20:15:19.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:10.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FFmpeg n6.1.1 es un desbordamiento de enteros. La vulnerabilidad existe en la funci\u00f3n parse_options de sbgdec.c dentro del m\u00f3dulo libavformat. Al analizar ciertas opciones, el software no valida adecuadamente la entrada. Esto permite que se acepten valores de duraci\u00f3n negativos sin una verificaci\u00f3n de los l\u00edmites adecuada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/1e72f170d58c2547ebd4db4cdf6cfabf",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-35367",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:19.957",
|
||||
"lastModified": "2024-11-29T20:15:19.957",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:10.680",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FFmpeg n6.1.1 tiene una lectura fuera de los l\u00edmites a trav\u00e9s de libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/9754a44845578358f6a403447c458ca4",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-35368",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:20.050",
|
||||
"lastModified": "2024-11-29T20:15:20.050",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:10.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame function within libavcodec/rkmppdec.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FFmpeg n7.0 se ve afectado por una doble liberaci\u00f3n a trav\u00e9s de la funci\u00f3n rkmpp_retrieve_framework dentro de libavcodec/rkmppdec.c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/7e6e47220ae2b2d2fb4611f0d8a31ec5",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-35371",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:20.143",
|
||||
"lastModified": "2024-11-29T20:15:20.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:11.037",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ant-Media-Serverv2.8.2 is affected by Improper Output Neutralization for Logs. The vulnerability stems from insufficient input sanitization in the logging mechanism. Without proper filtering or validation, user-controllable data, such as identifiers or other sensitive information, can be included in log entries without restrictions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Ant-Media-Serverv2.8.2 se ve afectado por una neutralizaci\u00f3n incorrecta de la salida de registros. La vulnerabilidad se origina en una desinfecci\u00f3n insuficiente de la entrada en el mecanismo de registro. Sin un filtrado o validaci\u00f3n adecuados, los datos controlables por el usuario, como identificadores u otra informaci\u00f3n confidencial, pueden incluirse en las entradas de registro sin restricciones."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/4eb17867f2e375f4824274c5e7b4d384",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-36610",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:20.237",
|
||||
"lastModified": "2024-11-29T20:15:20.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:11.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A deserialization vulnerability exists in the Stub class of the VarDumper module in Symfony v7.0.3. The vulnerability stems from deficiencies in the original implementation when handling properties with null or uninitialized values. An attacker could construct specific serialized data and use this vulnerability to execute unauthorized code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de deserializaci\u00f3n en la clase Stub del m\u00f3dulo VarDumper en Symfony v7.0.3. La vulnerabilidad surge de deficiencias en la implementaci\u00f3n original al manejar propiedades con valores nulos o no inicializados. Un atacante podr\u00eda construir datos serializados espec\u00edficos y usar esta vulnerabilidad para ejecutar c\u00f3digo no autorizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/24e93f2905850235e42ad7db6e878bd5",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-36612",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:20.340",
|
||||
"lastModified": "2024-11-29T20:15:20.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:11.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zulip from 8.0 to 8.3 contains a memory leak vulnerability in the handling of popovers."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Zulip de 8.0 a 8.3 contiene una vulnerabilidad de p\u00e9rdida de memoria en el manejo de ventanas emergentes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/f7ff51d24ebbb29e21dfb70a0c97302b",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-36616",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T19:15:07.817",
|
||||
"lastModified": "2024-11-29T19:15:07.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T18:15:09.857",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un desbordamiento de entero en el componente /libavformat/westwood_vqa.c de FFmpeg n6.1.1 permite a atacantes provocar una denegaci\u00f3n de servicio en la aplicaci\u00f3n a trav\u00e9s de un archivo VQA manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/ded3e1509d8296ec4a91817867d108e0",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-36617",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T18:15:07.230",
|
||||
"lastModified": "2024-11-29T18:15:07.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T18:15:10.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FFmpeg n6.1.1 tiene una vulnerabilidad de desbordamiento de enteros en el decodificador CAF de FFmpeg."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/f20749f8addc8f86de9cfacf17ba29df",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-36618",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T18:15:07.390",
|
||||
"lastModified": "2024-11-29T18:15:07.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T18:15:10.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "FFmpeg n6.1.1 tiene una vulnerabilidad en el demuxer AVI de la librer\u00eda libavformat que permite un desbordamiento de enteros, lo que potencialmente resulta en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/a148f3679415a6da53ca112eb2ba1523",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38476",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-01T19:15:04.977",
|
||||
"lastModified": "2024-10-29T17:35:06.547",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-12-02T17:36:33.403",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
@ -43,6 +43,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -50,9 +52,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
@ -60,16 +60,6 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
@ -79,6 +69,16 @@
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -92,8 +92,8 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.4.0",
|
||||
"versionEndIncluding": "2.4.60",
|
||||
"matchCriteriaId": "ADFAFBE0-CE34-4E39-A748-63D487842DB1"
|
||||
"versionEndExcluding": "2.4.60",
|
||||
"matchCriteriaId": "13126636-FD76-4E3E-B949-14A5082DE02A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -129,6 +129,28 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40075",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-22T19:15:02.867",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"lastModified": "2024-12-02T18:15:10.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,11 +15,50 @@
|
||||
"value": " Se descubri\u00f3 que Laravel v11.x contiene una vulnerabilidad de XML External Entity (XXE)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/Q16G/laravel_bug/blob/master/laravelBug.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/Q16G/laravel_bug/blob/master/laravelBug.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-46054",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T15:15:26.200",
|
||||
"lastModified": "2024-11-27T15:15:26.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:11.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /upload route is accessible without authentication, allowing any user to upload files."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "OpenVidReview 1.0 es vulnerable a un control de acceso incorrecto. La ruta /upload es accesible sin autenticaci\u00f3n, lo que permite que cualquier usuario cargue archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/b1d0ws/CVEs/blob/main/CVE-2024-46054.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47078",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-25T16:15:10.907",
|
||||
"lastModified": "2024-10-01T18:29:17.867",
|
||||
"lastModified": "2024-12-02T18:31:56.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,32 +17,14 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -50,26 +32,34 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -83,6 +73,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -94,9 +94,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:meshtastic:meshtastic_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:o:meshtastic:meshtastic_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.5.1",
|
||||
"matchCriteriaId": "958EC971-A6BF-457B-95F0-09DA40B334DE"
|
||||
"matchCriteriaId": "E439DDC9-06DB-4E86-A0E4-4D5FF73E9870"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
82
CVE-2024/CVE-2024-497xx/CVE-2024-49763.json
Normal file
82
CVE-2024/CVE-2024-497xx/CVE-2024-49763.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-49763",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T17:15:11.830",
|
||||
"lastModified": "2024-12-02T17:15:11.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PlexRipper is a cross-platform media downloader for Plex. PlexRipper\u2019s open CORS policy allows attackers to gain sensitive information from PlexRipper by getting the user to access the attacker\u2019s domain. This allows an attacking website to access the /api/PlexAccount endpoint and steal the user\u2019s Plex login. This vulnerability is fixed in 0.24.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-942"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PlexRipper/PlexRipper/commit/184074644a1f5a8ac59519929a9c4b92280fb2a1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-305_PlexRipper/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-503xx/CVE-2024-50380.json
Normal file
78
CVE-2024/CVE-2024-503xx/CVE-2024-50380.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-50380",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-12-02T17:15:11.980",
|
||||
"lastModified": "2024-12-02T17:15:11.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-503xx/CVE-2024-50381.json
Normal file
78
CVE-2024/CVE-2024-503xx/CVE-2024-50381.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-50381",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-12-02T17:15:12.160",
|
||||
"lastModified": "2024-12-02T17:15:12.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in Snap One OVRC cloud where an attacker can impersonate a Hub device and send requests to claim and unclaim devices. The attacker only needs to provide the MAC address of the targeted device and can make a request to unclaim it from its original connection and make a request to claim it."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-525xx/CVE-2024-52596.json
Normal file
86
CVE-2024/CVE-2024-525xx/CVE-2024-52596.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-52596",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T17:15:12.353",
|
||||
"lastModified": "2024-12-02T17:15:12.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SimpleSAMLphp xml-common is a common classes for handling XML-structures. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 1.19.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/simplesamlphp/xml-common/commit/fa4ade391c3194466acf5fbfd5d2ecdbf5e831f5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/simplesamlphp/xml-common/security/advisories/GHSA-2x65-fpch-2fcm",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00001.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-528xx/CVE-2024-52806.json
Normal file
60
CVE-2024/CVE-2024-528xx/CVE-2024-52806.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-52806",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T17:15:12.580",
|
||||
"lastModified": "2024-12-02T17:15:12.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functionality. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 4.6.14 and 5.0.0-alpha.18."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/simplesamlphp/saml2/commit/5fd4ce4596656fb0c1278f15b8305825412e89f7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/simplesamlphp/saml2/security/advisories/GHSA-pxm4-r5ph-q2m2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-532xx/CVE-2024-53259.json
Normal file
68
CVE-2024/CVE-2024-532xx/CVE-2024-53259.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-53259",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T17:15:12.767",
|
||||
"lastModified": "2024-12-02T17:15:12.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "quic-go is an implementation of the QUIC protocol in Go. An off-path attacker can inject an ICMP Packet Too Large packet. Since affected quic-go versions used IP_PMTUDISC_DO, the kernel would then return a \"message too large\" error on sendmsg, i.e. when quic-go attempts to send a packet that exceeds the MTU claimed in that ICMP packet. By setting this value to smaller than 1200 bytes (the minimum MTU for QUIC), the attacker can disrupt a QUIC connection. Crucially, this can be done after completion of the handshake, thereby circumventing any TCP fallback that might be implemented on the application layer (for example, many browsers fall back to HTTP over TCP if they're unable to establish a QUIC connection). The attacker needs to at least know the client's IP and port tuple to mount an attack. This vulnerability is fixed in 0.48.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/quic-go/quic-go/commit/ca31dd355cbe5fc6c5807992d9d1149c66c96a50",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/quic-go/quic-go/pull/4729",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/quic-go/quic-go/releases/tag/v0.48.2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-px8v-pp82-rcvr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-533xx/CVE-2024-53364.json
Normal file
25
CVE-2024/CVE-2024-533xx/CVE-2024-53364.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-53364",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T17:15:12.933",
|
||||
"lastModified": "2024-12-02T17:15:12.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability was found in PHPGURUKUL Vehicle Parking Management System v1.13 in /users/view-detail.php. This vulnerability affects the viewid parameter, where improper input sanitization allows attackers to inject malicious SQL queries."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://phpgurukul.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SCR-athif/CVE/tree/main/CVE-2024-53364",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T16:15:12.637",
|
||||
"lastModified": "2024-12-02T16:15:12.637",
|
||||
"lastModified": "2024-12-02T18:15:11.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Sysax Multi Server 6.99 is vulnerable to Cross Site Scripting (XSS) via the /scgi?sid parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/182467/Sysax-Multi-Server-6.99-Cross-Site-Scripting.html",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53504",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:20.763",
|
||||
"lastModified": "2024-11-29T20:15:20.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:13.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the notebook parameter in /searchHistory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 a trav\u00e9s del par\u00e1metro notebook en /searchHistory."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/siyuan-note/siyuan/issues/13058",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53505",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:20.853",
|
||||
"lastModified": "2024-11-29T20:15:20.853",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:13.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the id parameter at /getAssetContent."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 a trav\u00e9s del par\u00e1metro id en /getAssetContent."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/siyuan-note/siyuan/issues/13059",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53506",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:20.943",
|
||||
"lastModified": "2024-11-29T20:15:20.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:13.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the ids array parameter in /batchGetBlockAttrs."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 a trav\u00e9s del par\u00e1metro de matriz ids en /batchGetBlockAttrs."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/siyuan-note/siyuan/issues/13060",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53507",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T20:15:21.027",
|
||||
"lastModified": "2024-11-29T20:15:21.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:13.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability was discovered in Siyuan 3.1.11 in /getHistoryItems."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 en /getHistoryItems."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/siyuan-note/siyuan/issues/13057",
|
||||
|
21
CVE-2024/CVE-2024-535xx/CVE-2024-53564.json
Normal file
21
CVE-2024/CVE-2024-535xx/CVE-2024-53564.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53564",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T18:15:11.353",
|
||||
"lastModified": "2024-12-02T18:15:11.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An authenticated arbitrary file upload vulnerability in the component /module_admin/upload.php of freepbx v17.0.19.17 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-535xx/CVE-2024-53566.json
Normal file
60
CVE-2024/CVE-2024-535xx/CVE-2024-53566.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-53566",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-02T18:15:11.500",
|
||||
"lastModified": "2024-12-02T18:15:11.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53920",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T15:15:26.837",
|
||||
"lastModified": "2024-11-27T16:15:15.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-02T17:15:13.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En elisp-mode.el de GNU Emacs hasta la versi\u00f3n 30.0.92, un usuario que elija invocar elisp-completion-at-point (para completar el c\u00f3digo) en c\u00f3digo fuente de Emacs Lisp que no sea de confianza puede desencadenar una expansi\u00f3n de macros de Lisp no segura que permita a los atacantes ejecutar c\u00f3digo arbitrario. (Esta expansi\u00f3n no segura tambi\u00e9n ocurre si un usuario elige habilitar el diagn\u00f3stico sobre la marcha de que byte compila c\u00f3digo fuente de Emacs Lisp que no es de confianza)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html",
|
||||
|
90
CVE-2024/CVE-2024-539xx/CVE-2024-53990.json
Normal file
90
CVE-2024/CVE-2024-539xx/CVE-2024-53990.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-53990",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T18:15:11.753",
|
||||
"lastModified": "2024-12-02T18:15:11.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.2,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AsyncHttpClient/async-http-client/commit/d5a83362f7aed81b93ebca559746ac9be0f95425",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/AsyncHttpClient/async-http-client/issues/1964",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/AsyncHttpClient/async-http-client/pull/2033",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/AsyncHttpClient/async-http-client/security/advisories/GHSA-mfj5-cf8g-g2fv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-539xx/CVE-2024-53992.json
Normal file
82
CVE-2024/CVE-2024-539xx/CVE-2024-53992.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-53992",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-02T17:15:14.113",
|
||||
"lastModified": "2024-12-02T17:15:14.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "unzip-bot is a Telegram bot to extract various types of archives. Users could exploit unsanitized inputs to inject malicious commands that are executed through subprocess.Popen with shell=True. Attackers can exploit this vulnerability using a crafted archive name, password, or video name. This vulnerability is fixed in 7.0.3a."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/EDM115/unzip-bot/commit/5213b693eabb562842cdbf21c1074e91bfa00274",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/EDM115/unzip-bot/security/advisories/GHSA-34cg-7f8c-fm5h",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
76
README.md
76
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-02T17:01:43.272285+00:00
|
||||
2024-12-02T19:00:42.087633+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-02T16:15:14.603000+00:00
|
||||
2024-12-02T18:31:56.817000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,49 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271901
|
||||
271912
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-10905](CVE-2024/CVE-2024-109xx/CVE-2024-10905.json) (`2024-12-02T15:15:10.240`)
|
||||
- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T15:15:10.960`)
|
||||
- [CVE-2024-31669](CVE-2024/CVE-2024-316xx/CVE-2024-31669.json) (`2024-12-02T15:15:11.113`)
|
||||
- [CVE-2024-38827](CVE-2024/CVE-2024-388xx/CVE-2024-38827.json) (`2024-12-02T15:15:11.270`)
|
||||
- [CVE-2024-46905](CVE-2024/CVE-2024-469xx/CVE-2024-46905.json) (`2024-12-02T15:15:11.443`)
|
||||
- [CVE-2024-46906](CVE-2024/CVE-2024-469xx/CVE-2024-46906.json) (`2024-12-02T15:15:11.633`)
|
||||
- [CVE-2024-46907](CVE-2024/CVE-2024-469xx/CVE-2024-46907.json) (`2024-12-02T15:15:11.793`)
|
||||
- [CVE-2024-46908](CVE-2024/CVE-2024-469xx/CVE-2024-46908.json) (`2024-12-02T15:15:11.967`)
|
||||
- [CVE-2024-46909](CVE-2024/CVE-2024-469xx/CVE-2024-46909.json) (`2024-12-02T15:15:12.120`)
|
||||
- [CVE-2024-52732](CVE-2024/CVE-2024-527xx/CVE-2024-52732.json) (`2024-12-02T15:15:12.270`)
|
||||
- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T16:15:12.637`)
|
||||
- [CVE-2024-53862](CVE-2024/CVE-2024-538xx/CVE-2024-53862.json) (`2024-12-02T16:15:14.277`)
|
||||
- [CVE-2024-53981](CVE-2024/CVE-2024-539xx/CVE-2024-53981.json) (`2024-12-02T16:15:14.457`)
|
||||
- [CVE-2024-53984](CVE-2024/CVE-2024-539xx/CVE-2024-53984.json) (`2024-12-02T16:15:14.603`)
|
||||
- [CVE-2024-8785](CVE-2024/CVE-2024-87xx/CVE-2024-8785.json) (`2024-12-02T15:15:12.380`)
|
||||
- [CVE-2024-49763](CVE-2024/CVE-2024-497xx/CVE-2024-49763.json) (`2024-12-02T17:15:11.830`)
|
||||
- [CVE-2024-50380](CVE-2024/CVE-2024-503xx/CVE-2024-50380.json) (`2024-12-02T17:15:11.980`)
|
||||
- [CVE-2024-50381](CVE-2024/CVE-2024-503xx/CVE-2024-50381.json) (`2024-12-02T17:15:12.160`)
|
||||
- [CVE-2024-52596](CVE-2024/CVE-2024-525xx/CVE-2024-52596.json) (`2024-12-02T17:15:12.353`)
|
||||
- [CVE-2024-52806](CVE-2024/CVE-2024-528xx/CVE-2024-52806.json) (`2024-12-02T17:15:12.580`)
|
||||
- [CVE-2024-53259](CVE-2024/CVE-2024-532xx/CVE-2024-53259.json) (`2024-12-02T17:15:12.767`)
|
||||
- [CVE-2024-53364](CVE-2024/CVE-2024-533xx/CVE-2024-53364.json) (`2024-12-02T17:15:12.933`)
|
||||
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2024-12-02T18:15:11.353`)
|
||||
- [CVE-2024-53566](CVE-2024/CVE-2024-535xx/CVE-2024-53566.json) (`2024-12-02T18:15:11.500`)
|
||||
- [CVE-2024-53990](CVE-2024/CVE-2024-539xx/CVE-2024-53990.json) (`2024-12-02T18:15:11.753`)
|
||||
- [CVE-2024-53992](CVE-2024/CVE-2024-539xx/CVE-2024-53992.json) (`2024-12-02T17:15:14.113`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `15`
|
||||
Recently modified CVEs: `37`
|
||||
|
||||
- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2024-12-02T15:15:08.200`)
|
||||
- [CVE-2024-11051](CVE-2024/CVE-2024-110xx/CVE-2024-11051.json) (`2024-12-02T15:14:56.087`)
|
||||
- [CVE-2024-11700](CVE-2024/CVE-2024-117xx/CVE-2024-11700.json) (`2024-12-02T15:15:10.557`)
|
||||
- [CVE-2024-20130](CVE-2024/CVE-2024-201xx/CVE-2024-20130.json) (`2024-12-02T16:15:07.200`)
|
||||
- [CVE-2024-20131](CVE-2024/CVE-2024-201xx/CVE-2024-20131.json) (`2024-12-02T16:15:07.387`)
|
||||
- [CVE-2024-20132](CVE-2024/CVE-2024-201xx/CVE-2024-20132.json) (`2024-12-02T16:15:07.557`)
|
||||
- [CVE-2024-20133](CVE-2024/CVE-2024-201xx/CVE-2024-20133.json) (`2024-12-02T16:15:07.737`)
|
||||
- [CVE-2024-20134](CVE-2024/CVE-2024-201xx/CVE-2024-20134.json) (`2024-12-02T16:15:07.907`)
|
||||
- [CVE-2024-20135](CVE-2024/CVE-2024-201xx/CVE-2024-20135.json) (`2024-12-02T16:15:08.097`)
|
||||
- [CVE-2024-20136](CVE-2024/CVE-2024-201xx/CVE-2024-20136.json) (`2024-12-02T16:15:08.260`)
|
||||
- [CVE-2024-20137](CVE-2024/CVE-2024-201xx/CVE-2024-20137.json) (`2024-12-02T16:15:08.433`)
|
||||
- [CVE-2024-20138](CVE-2024/CVE-2024-201xx/CVE-2024-20138.json) (`2024-12-02T16:15:08.603`)
|
||||
- [CVE-2024-20139](CVE-2024/CVE-2024-201xx/CVE-2024-20139.json) (`2024-12-02T16:15:08.770`)
|
||||
- [CVE-2024-21723](CVE-2024/CVE-2024-217xx/CVE-2024-21723.json) (`2024-12-02T16:15:08.967`)
|
||||
- [CVE-2024-45520](CVE-2024/CVE-2024-455xx/CVE-2024-45520.json) (`2024-12-02T16:15:11.293`)
|
||||
- [CVE-2024-20127](CVE-2024/CVE-2024-201xx/CVE-2024-20127.json) (`2024-12-02T17:15:09.827`)
|
||||
- [CVE-2024-20128](CVE-2024/CVE-2024-201xx/CVE-2024-20128.json) (`2024-12-02T17:15:10.230`)
|
||||
- [CVE-2024-22272](CVE-2024/CVE-2024-222xx/CVE-2024-22272.json) (`2024-12-02T18:15:09.290`)
|
||||
- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T18:15:09.453`)
|
||||
- [CVE-2024-30282](CVE-2024/CVE-2024-302xx/CVE-2024-30282.json) (`2024-12-02T17:48:54.733`)
|
||||
- [CVE-2024-34923](CVE-2024/CVE-2024-349xx/CVE-2024-34923.json) (`2024-12-02T18:15:09.617`)
|
||||
- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-12-02T17:15:10.497`)
|
||||
- [CVE-2024-35367](CVE-2024/CVE-2024-353xx/CVE-2024-35367.json) (`2024-12-02T17:15:10.680`)
|
||||
- [CVE-2024-35368](CVE-2024/CVE-2024-353xx/CVE-2024-35368.json) (`2024-12-02T17:15:10.860`)
|
||||
- [CVE-2024-35371](CVE-2024/CVE-2024-353xx/CVE-2024-35371.json) (`2024-12-02T17:15:11.037`)
|
||||
- [CVE-2024-36610](CVE-2024/CVE-2024-366xx/CVE-2024-36610.json) (`2024-12-02T17:15:11.230`)
|
||||
- [CVE-2024-36612](CVE-2024/CVE-2024-366xx/CVE-2024-36612.json) (`2024-12-02T17:15:11.420`)
|
||||
- [CVE-2024-36616](CVE-2024/CVE-2024-366xx/CVE-2024-36616.json) (`2024-12-02T18:15:09.857`)
|
||||
- [CVE-2024-36617](CVE-2024/CVE-2024-366xx/CVE-2024-36617.json) (`2024-12-02T18:15:10.270`)
|
||||
- [CVE-2024-36618](CVE-2024/CVE-2024-366xx/CVE-2024-36618.json) (`2024-12-02T18:15:10.520`)
|
||||
- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-12-02T17:36:33.403`)
|
||||
- [CVE-2024-40075](CVE-2024/CVE-2024-400xx/CVE-2024-40075.json) (`2024-12-02T18:15:10.760`)
|
||||
- [CVE-2024-46054](CVE-2024/CVE-2024-460xx/CVE-2024-46054.json) (`2024-12-02T17:15:11.610`)
|
||||
- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-12-02T18:31:56.817`)
|
||||
- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T18:15:11.123`)
|
||||
- [CVE-2024-53504](CVE-2024/CVE-2024-535xx/CVE-2024-53504.json) (`2024-12-02T17:15:13.047`)
|
||||
- [CVE-2024-53505](CVE-2024/CVE-2024-535xx/CVE-2024-53505.json) (`2024-12-02T17:15:13.257`)
|
||||
- [CVE-2024-53506](CVE-2024/CVE-2024-535xx/CVE-2024-53506.json) (`2024-12-02T17:15:13.497`)
|
||||
- [CVE-2024-53507](CVE-2024/CVE-2024-535xx/CVE-2024-53507.json) (`2024-12-02T17:15:13.707`)
|
||||
- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2024-12-02T17:15:13.913`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
141
_state.csv
141
_state.csv
@ -221882,7 +221882,7 @@ CVE-2023-28458,0,0,ef73a1fa781dc427433a4344f064cf2c5d295719475229911a534302acd48
|
||||
CVE-2023-28459,0,0,ff6d9b0d2a61636a2216f5ca3eebb22b60bf4cdf2177e93c8efd3097129af8b8,2023-05-04T12:38:31.430000
|
||||
CVE-2023-2846,0,0,9aab683976373505e029cb617089a2ec5cce34a049b1b52d471de12eae663bf2,2023-07-10T18:51:01.550000
|
||||
CVE-2023-28460,0,0,946c7b43c3c7b583cdd2cc158d5075c41f481cca09d32fe7ede01d078026a4ac,2023-03-24T14:57:49.207000
|
||||
CVE-2023-28461,0,0,15af5ab242189b26137af25d477ece08e0a8e4d9d182fe4dc9af7216dd963dd0,2024-11-26T02:00:02.500000
|
||||
CVE-2023-28461,0,1,b734dc37bc99200598f1ee9fcd5c811044ce1d1d95438d974fcc0a308eb66f72,2024-12-02T17:15:05.133000
|
||||
CVE-2023-28462,0,0,2e19120130c69bbcf347fab95b0e8c139f8b88e9e8bf09f2cd8f0d3aa1bc78bf,2023-04-07T17:19:22.730000
|
||||
CVE-2023-28464,0,0,cb3ff9a13e0f593237f005a371ce64a52ab72b86a221c83df504e264520ebe96,2023-12-22T21:04:49.027000
|
||||
CVE-2023-28465,0,0,06c8e63c2eb4a5851617744052850dfe59bf346dbe17e85c1e39e4479aeba7f3,2023-12-15T16:35:16.623000
|
||||
@ -226352,7 +226352,7 @@ CVE-2023-34184,0,0,6b37f9feddce7aba2ca90f92dc8f3c51f7944b89051b1ad282cbb6150f423
|
||||
CVE-2023-34185,0,0,563c7630349ce4fda4e82697db7e4483c6146d83421789afbaa13e7c27db6e75,2023-07-18T18:21:37.307000
|
||||
CVE-2023-34186,0,0,c601dee59d899685f4dac19bfea3727b06f03a27cdd0c5191a1823bf6439e20d,2024-05-17T18:36:05.263000
|
||||
CVE-2023-34187,0,0,b30d3a29f02d088f2a343a02dc8816c3ac4f2ba6ee34c5e343a68b83e34759b6,2023-08-31T21:02:52.107000
|
||||
CVE-2023-34188,0,1,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000
|
||||
CVE-2023-34188,0,0,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000
|
||||
CVE-2023-34189,0,0,852069858a43c3b830dd45f0d9f89b339d989703c15bd2112166348e71f45a18,2023-08-02T18:51:03.527000
|
||||
CVE-2023-3419,0,0,dc2398e0d232c730deb43c680eb3a3837a602d0fa3030139e39cb20d21ad8852,2024-08-19T12:59:59.177000
|
||||
CVE-2023-34192,0,0,85d981e01ef8ef1e0680768bc42005fded3d3ef3dece16cd8a3b1675004ee8a0,2023-07-12T23:08:32.340000
|
||||
@ -227739,13 +227739,13 @@ CVE-2023-36359,0,0,e37b9be911e04ec3ff31e7ef9f5eb59833aaea9fd5ca5c06d32cd8c864c3b
|
||||
CVE-2023-3636,0,0,614dee89b74d1f88be51816c6b660ce2752056d128833834b326387d81db8a9e,2023-11-07T04:19:12.717000
|
||||
CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000
|
||||
CVE-2023-36361,0,0,93cdaa989b68200231a2525ea584dfaf163e866781f3629fc9440cd09f618cc4,2023-09-08T16:47:42.827000
|
||||
CVE-2023-36362,0,0,fda020641fb2b60702b0bb93b62a1dab2c4943bd30ca14c5177f801d2aaf459b,2023-06-30T13:00:27.743000
|
||||
CVE-2023-36363,0,0,5d61162f2a82ad6579e56c2e739c9ce4fe0aac915f02fc2efe01034e3629b287,2023-06-28T16:49:34.877000
|
||||
CVE-2023-36364,0,0,ac0efbbdb28c7ff93409a9685dfb5928f16f3f706a34f952336e38ce2cbde1f3,2023-06-28T19:02:50.977000
|
||||
CVE-2023-36365,0,0,758bb57bc43cd128f72f62fd387a969e7ce1874abca60a631c015fe0f47e0ebc,2023-06-28T19:02:23.943000
|
||||
CVE-2023-36366,0,0,9e480deb66bb15b4a8761f2275d382c8447d562a18be1df55be2409a8dad923a,2023-06-28T19:02:10.183000
|
||||
CVE-2023-36367,0,0,dedb51ab8d4978817bfb3fc508951b42a65a43359f68aa05aad778c03b058dc4,2023-06-28T18:49:20.373000
|
||||
CVE-2023-36368,0,0,8eb3d41770b534ac6c5785c64bc0a54abdce58d6234f44ae967b3006bc3b9c19,2023-06-29T18:00:05.380000
|
||||
CVE-2023-36362,0,1,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000
|
||||
CVE-2023-36363,0,1,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000
|
||||
CVE-2023-36364,0,1,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000
|
||||
CVE-2023-36365,0,1,3cee1646a92411ae23b58da3264be3882c3ee35cfa85a4db2f58ac1601bb3fc8,2024-12-02T17:15:06.967000
|
||||
CVE-2023-36366,0,1,cffbaf0f33498e58d50fcda5793d9e85b5fef16d30d1ce519a19c604bf7e95f2,2024-12-02T17:15:07.090000
|
||||
CVE-2023-36367,0,1,ccf739078a731238f1d3bcf2947ff92dafbcfdd82ca9fb37f44d15486d147e6f,2024-12-02T17:15:07.213000
|
||||
CVE-2023-36368,0,1,06ed99c7c4b2db13bcde5eee55492c7c3d29c8ba6e669450d0841c38994eb9b9,2024-12-02T17:15:07.343000
|
||||
CVE-2023-36369,0,0,1397030efe1debf1a2c78b87207e3a04ff15859d12f5f46231974de7e2ee8274,2023-06-29T18:00:21.530000
|
||||
CVE-2023-3637,0,0,73ac1481ddc1df889412bda0c2583fec7bc5e2313684ecf116cb691307a3f25b,2023-11-07T04:19:12.810000
|
||||
CVE-2023-36370,0,0,e114760f1feacab67ceb84869de8d52f3d37062c55d26b2af18b46ed8f63846d,2023-06-29T17:50:13.513000
|
||||
@ -243311,7 +243311,7 @@ CVE-2024-10898,0,0,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372
|
||||
CVE-2024-10899,0,0,3af5ea7b90e5da0230215c5076c9eff9b3749f9f5f947443d89625612842d08a,2024-11-26T21:01:21.643000
|
||||
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000
|
||||
CVE-2024-10905,1,1,e98ffff37b5956a2ad6c437472b8f53d76d0603bed01c95ada00a17c9ce7eb4b,2024-12-02T15:15:10.240000
|
||||
CVE-2024-10905,0,0,e98ffff37b5956a2ad6c437472b8f53d76d0603bed01c95ada00a17c9ce7eb4b,2024-12-02T15:15:10.240000
|
||||
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10913,0,0,4e9b29333972ed20a30c4eccde2c9645761370bd1f3d0211dcdd27a3f9c3d9cf,2024-11-20T14:15:17.253000
|
||||
CVE-2024-10914,0,0,0e11c1731905763ffc173784369687971adc0677422c26a81c4aa2918d85e560,2024-11-24T15:15:06.090000
|
||||
@ -243406,7 +243406,7 @@ CVE-2024-11047,0,0,64dbad14a794669b828bb44eebca3fde6ac51457cfee02dad21b39b098487
|
||||
CVE-2024-11048,0,0,21786d98bafe82af70b0d13927da0cfc2a5e251397b591082c79052adc605aee,2024-11-13T20:53:55.113000
|
||||
CVE-2024-11049,0,0,efe77d054e00096c249033caeded95aa45069f1f11b699edbd4a58681a130c8a,2024-11-23T01:41:19.207000
|
||||
CVE-2024-11050,0,0,4a557ebc68e4a21833dd3972056655a89812d1110bd037fcaf7747ecf814996b,2024-11-23T01:38:15.047000
|
||||
CVE-2024-11051,0,1,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000
|
||||
CVE-2024-11051,0,0,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000
|
||||
CVE-2024-11054,0,0,2b10f7eb7e0ea54cbdf2f44e8ccd2401488923bf3e8bbeb3c99a947af182af3e,2024-11-14T02:43:36.197000
|
||||
CVE-2024-11055,0,0,063f616f81ec8b41ac610800e9641fd71662778ce9165238c4e4d73be7647e35,2024-11-14T15:18:45.933000
|
||||
CVE-2024-11056,0,0,6e0160117ff4187f70de2c20437329aad36979ea68e9d50c9569d1405a688157,2024-11-14T15:21:09.907000
|
||||
@ -243795,15 +243795,15 @@ CVE-2024-11692,0,0,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff
|
||||
CVE-2024-11693,0,0,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000
|
||||
CVE-2024-11694,0,0,8fab8f6682482c80a046d7efcb5d62937e3f2364960b2f04726b7a87f7e40748,2024-11-27T17:15:09.703000
|
||||
CVE-2024-11695,0,0,923949ea70ffb3960535c924daeac21d36cf8875477a4ac90cebfaddff787cf9,2024-11-27T17:15:09.867000
|
||||
CVE-2024-11696,0,0,7ab5e962b1864924c9e631a223b7224b844fe8e800da1f91cb3d221520b39912,2024-11-26T14:15:19.143000
|
||||
CVE-2024-11696,0,1,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000
|
||||
CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000
|
||||
CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
|
||||
CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
|
||||
CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000
|
||||
CVE-2024-11700,0,1,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000
|
||||
CVE-2024-11700,0,0,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000
|
||||
CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11703,0,0,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000
|
||||
CVE-2024-11703,0,1,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a91d,2024-12-02T18:15:09.087000
|
||||
CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
|
||||
CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
|
||||
CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000
|
||||
@ -244773,7 +244773,7 @@ CVE-2024-20112,0,0,f1fecda0bbefb7976a2e5c2d965f45756c3c554b6bb2aece34ce5311395c4
|
||||
CVE-2024-20113,0,0,1e9f0bb5dd8b46cb9c193f293f4e7e65c1c4f4218a8b5da37a81aedf61132d39,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20114,0,0,972dbefe1dd7e2ec5c449b6a55d8a48edf191f12736d3b5ac984afdda696c6ff,2024-11-05T19:58:15.577000
|
||||
CVE-2024-20115,0,0,e0fbbff01a0fa518c41d64f625797efefd6cdce39d74e0c13995ea3dfe394456,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20116,0,0,bf601840a74c417151f81f80d77e62b52662f90568182fa10079ae9d50691ec6,2024-12-02T04:15:03.833000
|
||||
CVE-2024-20116,0,1,1000133cf92be5d4167320d25c02ed658b66c4f3c0eea2c90e9d7fc1bf88b623,2024-12-02T17:15:08.113000
|
||||
CVE-2024-20117,0,0,6baac420d96eb73610546cd262e04d3589f97187f02f3401eb7616db3fa8d745,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20118,0,0,f196c02d943f7181a2b543f340de54479a6ac9433fa46d02a1108eafa392e84d,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20119,0,0,b9d1b34a5ac7be8b5a9ce604f28b7c94e37c0f79b74ec7f206945e209ae81009,2024-11-04T18:50:05.607000
|
||||
@ -244783,21 +244783,21 @@ CVE-2024-20121,0,0,4938115c914642adef5ea2985a500e819409d2c7aa3a5388330765c060ef6
|
||||
CVE-2024-20122,0,0,744b016dd77bf1d3925336cb7504cc81d1bda83c1655bf764225b09f6b0227e4,2024-11-05T08:35:19.593000
|
||||
CVE-2024-20123,0,0,bdf62a4af5c1c1ed58a1e235ea3a69d58e2afa0181d5f68baf40f699c0511aac,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20124,0,0,1799547edf556e9de06685a9fcdc4c8ef9057ff40c9829ccf5d3b3aa46605f16,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20125,0,0,79236626570c08d9b2883b399396bb272e80f9ff7a2001cda01b00130776c00b,2024-12-02T04:15:04.663000
|
||||
CVE-2024-20127,0,0,191445c8421ac764bafa609e191240e08a49a9b03cf7c2f97161e0ac39e8fac0,2024-12-02T04:15:04.777000
|
||||
CVE-2024-20128,0,0,fd4f49b631373e0791fe4bb327ef73d8f0d2affdeeb231166beab6965fc15222,2024-12-02T04:15:04.967000
|
||||
CVE-2024-20125,0,1,a95592121d0de2a82283637e180f978c8268829ce83449ebef9c55894c24ce6b,2024-12-02T17:15:09.543000
|
||||
CVE-2024-20127,0,1,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000
|
||||
CVE-2024-20128,0,1,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000
|
||||
CVE-2024-20129,0,0,671726aba2b1095472532326d37fd302eed94fd6211ea01542506d4087187d34,2024-12-02T04:15:05.073000
|
||||
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
|
||||
CVE-2024-20130,0,1,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000
|
||||
CVE-2024-20131,0,1,1e64bc7a3127731196d2fa87109d2384b3e91b26839694666fe149e4e5b53554,2024-12-02T16:15:07.387000
|
||||
CVE-2024-20132,0,1,f4cc91744b8a6b3af86e4e8d184a868c2fc84388570327f87327ebff157bcaa8,2024-12-02T16:15:07.557000
|
||||
CVE-2024-20133,0,1,fd2d9fef2f12a32cb33536969e0da117c7ff6a7c081a67ea7cd40b5a5f6d630d,2024-12-02T16:15:07.737000
|
||||
CVE-2024-20134,0,1,1d4bc63f9eb4412de5ebc6bed4a6fab51dfdc46af786282811b440ef7d69407c,2024-12-02T16:15:07.907000
|
||||
CVE-2024-20135,0,1,57119bf972026e38996ca755a3f316af2b3402cc04a9db9eba30e1da211f5a53,2024-12-02T16:15:08.097000
|
||||
CVE-2024-20136,0,1,974b7b8826843336352c8b21d2c949dee3a935c2a7f163750d3cfbd49e510cb7,2024-12-02T16:15:08.260000
|
||||
CVE-2024-20137,0,1,fe4bf8bc17a27800d12c2afc646a8a72b841cdaf312d08e530acc587ecfcadc2,2024-12-02T16:15:08.433000
|
||||
CVE-2024-20138,0,1,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000
|
||||
CVE-2024-20139,0,1,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000
|
||||
CVE-2024-20130,0,0,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000
|
||||
CVE-2024-20131,0,0,1e64bc7a3127731196d2fa87109d2384b3e91b26839694666fe149e4e5b53554,2024-12-02T16:15:07.387000
|
||||
CVE-2024-20132,0,0,f4cc91744b8a6b3af86e4e8d184a868c2fc84388570327f87327ebff157bcaa8,2024-12-02T16:15:07.557000
|
||||
CVE-2024-20133,0,0,fd2d9fef2f12a32cb33536969e0da117c7ff6a7c081a67ea7cd40b5a5f6d630d,2024-12-02T16:15:07.737000
|
||||
CVE-2024-20134,0,0,1d4bc63f9eb4412de5ebc6bed4a6fab51dfdc46af786282811b440ef7d69407c,2024-12-02T16:15:07.907000
|
||||
CVE-2024-20135,0,0,57119bf972026e38996ca755a3f316af2b3402cc04a9db9eba30e1da211f5a53,2024-12-02T16:15:08.097000
|
||||
CVE-2024-20136,0,0,974b7b8826843336352c8b21d2c949dee3a935c2a7f163750d3cfbd49e510cb7,2024-12-02T16:15:08.260000
|
||||
CVE-2024-20137,0,0,fe4bf8bc17a27800d12c2afc646a8a72b841cdaf312d08e530acc587ecfcadc2,2024-12-02T16:15:08.433000
|
||||
CVE-2024-20138,0,0,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000
|
||||
CVE-2024-20139,0,0,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000
|
||||
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
|
||||
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
|
||||
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
|
||||
@ -246152,7 +246152,7 @@ CVE-2024-21703,0,0,08d952643f27d625e1a34daf2a14cf006a2e6417e07616e354cd3cfc64f9f
|
||||
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
|
||||
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
|
||||
CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000
|
||||
CVE-2024-21723,0,1,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
|
||||
CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
|
||||
CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000
|
||||
CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000
|
||||
CVE-2024-21726,0,0,258e12429393fbdcadf90bc903b6c4eaa784036f8d4a014cbe225655bb0298a5,2024-11-04T21:35:03.690000
|
||||
@ -246625,7 +246625,7 @@ CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a69
|
||||
CVE-2024-2227,0,0,6858b6fb3beef7b6297eae7344c0bc611e8d1dd2c2ff64967d8d2ab0b2897ccc,2024-03-22T19:02:10.300000
|
||||
CVE-2024-22270,0,0,b9576398a05665519f8e7fa18c7ea965eb2ef26c2b70aff8574e195025c87aea,2024-08-15T19:35:06.457000
|
||||
CVE-2024-22271,0,0,c68c7abf466a660fd4d52c665cf118cb88242b1be3f139e271f3b7d99c4e675f,2024-08-01T13:46:54.670000
|
||||
CVE-2024-22272,0,0,a4dcf85cbf4922799718d1c10a1120b8457bb2d971adaefbd7555789801981e0,2024-06-28T10:27:00.920000
|
||||
CVE-2024-22272,0,1,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000
|
||||
CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da58959d8,2024-05-22T12:46:53.887000
|
||||
CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000
|
||||
CVE-2024-22275,0,0,4e0b17231c07cc777231dbb9d62f6bfa759cfc82db650243f36e18a0ee106c1b,2024-05-22T12:46:53.887000
|
||||
@ -251828,7 +251828,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7
|
||||
CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000
|
||||
CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000
|
||||
CVE-2024-29645,1,1,998bedeba8b13cb24165783aaa6044be39300d70fde69663c8a7c6d0c6cecfa8,2024-12-02T15:15:10.960000
|
||||
CVE-2024-29645,0,1,c6d6850a2c13e1d1159098cd4eb2c9b0077860b94792b5ea30ac8f664de7fd64,2024-12-02T18:15:09.453000
|
||||
CVE-2024-2965,0,0,31194867e3c8375be8a7a72353070c45d11fab5833d7a91937e736bd4749a53d,2024-11-03T17:15:13.107000
|
||||
CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000
|
||||
CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000
|
||||
@ -252407,7 +252407,7 @@ CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940d
|
||||
CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000
|
||||
CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-30281,0,0,aa55f6f337f0eff14aaba79eadac42cf1fa69bcced5e256cfe63f794552ecdfc,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30282,0,0,a990498a43a1ecddf22e7510bd46438fa6701708c2c184811f4ab5f2b9df43a6,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30282,0,1,23f906c56739d2637a62852ff21f89b589c2e003e455e0b879928121b47e538e,2024-12-02T17:48:54.733000
|
||||
CVE-2024-30283,0,0,ba083c1bacb29a7f333eacd467f9eb4c19b7b166e16a58a9ca533c939d8d2cec,2024-05-16T13:03:05.353000
|
||||
CVE-2024-30284,0,0,c3d8cfb90cbc04c8f8451d2b94550163ac2e92e833947aa8e3054cbfbcb5af6b,2024-05-15T16:40:19.330000
|
||||
CVE-2024-30285,0,0,d5d0073a0c86623254404dea22df638b05a2d50f8dfa4429d0e1bb0ebc3d1cd8,2024-07-09T15:52:12.637000
|
||||
@ -253462,7 +253462,7 @@ CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdac
|
||||
CVE-2024-31652,0,0,d3a39df49d7c9a4ac8f46bb863860ab64051b06ba513b7c983446092a2722415,2024-10-30T17:35:05.700000
|
||||
CVE-2024-3166,0,0,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000
|
||||
CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000
|
||||
CVE-2024-31669,1,1,31ec3184aae1ad222bbbb1a4594b8bb1b152b5cce59b11c364f48ace0bb1fce5,2024-12-02T15:15:11.113000
|
||||
CVE-2024-31669,0,0,31ec3184aae1ad222bbbb1a4594b8bb1b152b5cce59b11c364f48ace0bb1fce5,2024-12-02T15:15:11.113000
|
||||
CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000
|
||||
CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000
|
||||
CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000
|
||||
@ -255900,7 +255900,7 @@ CVE-2024-34914,0,0,488c01684aef7fae520eb6f0628a96a961ab856901df991bf866a786a5c90
|
||||
CVE-2024-34919,0,0,823c5c451a1eed666cfdb6436f6850bdbb3997f7dfda43c7cb7477056e9bb3ae,2024-07-03T02:00:54.243000
|
||||
CVE-2024-3492,0,0,8ef42f39857b82e21bb506d939c2ddf771d4cf0a62a956e7e002606ca7a897a1,2024-06-13T18:36:09.010000
|
||||
CVE-2024-34921,0,0,258d6bc4ff16be25947117b994a7b2305574dc7e88be47c1d8439dffb3fb7800,2024-07-03T02:00:55.040000
|
||||
CVE-2024-34923,0,0,4eb062fc2943c9703c6ce714643657218ce1e4ab0248f4efc1ef62aa6ab9477d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-34923,0,1,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5eb94,2024-12-02T18:15:09.617000
|
||||
CVE-2024-34927,0,0,65b6f1073e9034477a827eae4f8e1e96da2dcd8b6b7a4dd6a353ea18c54c97c4,2024-07-03T02:00:55.873000
|
||||
CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8d7a,2024-07-03T02:00:56.653000
|
||||
CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000
|
||||
@ -256177,12 +256177,12 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc
|
||||
CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000
|
||||
CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000
|
||||
CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000
|
||||
CVE-2024-35366,0,0,9b84de888d50ddbd7efcc8707ea3df5f70e05d0c67de0741833ade895b234c7a,2024-11-29T20:15:19.863000
|
||||
CVE-2024-35367,0,0,4cf1651bad5e480a4d826c3f8e668cb9c693764d20895a38503f6b2564a1fcb2,2024-11-29T20:15:19.957000
|
||||
CVE-2024-35368,0,0,b29911c8c82dc3259e072b942eea7a4d1149791db93f1fecc5fe0708cef54fcf,2024-11-29T20:15:20.050000
|
||||
CVE-2024-35366,0,1,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000
|
||||
CVE-2024-35367,0,1,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
|
||||
CVE-2024-35368,0,1,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
|
||||
CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000
|
||||
CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000
|
||||
CVE-2024-35371,0,0,3451d96059fd4d38b9b56c8029c259808886cc489aad6ecd6a8e5b4dc96d8c65,2024-11-29T20:15:20.143000
|
||||
CVE-2024-35371,0,1,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000
|
||||
CVE-2024-35373,0,0,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000
|
||||
CVE-2024-35374,0,0,aa83a1884752e38a4efa40b8d631e010f03947873314106502ec442b10442cd7,2024-08-20T15:35:14.870000
|
||||
CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000
|
||||
@ -257180,13 +257180,13 @@ CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117e
|
||||
CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000
|
||||
CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000
|
||||
CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000
|
||||
CVE-2024-36610,0,0,312841435172043d5dd2190cf6b8c2300f7c9822702ef3e5fa4446eac6b961e2,2024-11-29T20:15:20.237000
|
||||
CVE-2024-36610,0,1,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000
|
||||
CVE-2024-36611,0,0,42465fba5d209a57964c1117a778f054088fdce7482f6b6bd27c3304a10b7c3d,2024-11-29T19:15:06.780000
|
||||
CVE-2024-36612,0,0,fdd926ad563891ccb6e110831ad8dd9cdcf5f661c8c399d337246f268066a229,2024-11-29T20:15:20.340000
|
||||
CVE-2024-36612,0,1,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
|
||||
CVE-2024-36615,0,0,2f8c6f09c7b5113fafb5a41f7e4cbad94a7ad0500652cf2d1c05a06d469ab9d0,2024-11-29T19:15:07.703000
|
||||
CVE-2024-36616,0,0,30073513037d78480eea5288925f8e6f4e5b29c346f1de578cf8c107b66d46e5,2024-11-29T19:15:07.817000
|
||||
CVE-2024-36617,0,0,c18e2eb9b33d632f63d305b3eb6f50e7d6743c0489ab5af161e69fa56de5ba4b,2024-11-29T18:15:07.230000
|
||||
CVE-2024-36618,0,0,f1fe269f8119cc1956333354d8d1ebbf16ea9be0fb3347b792a87c6a5e02f274,2024-11-29T18:15:07.390000
|
||||
CVE-2024-36616,0,1,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
|
||||
CVE-2024-36617,0,1,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000
|
||||
CVE-2024-36618,0,1,1b683ed0f9886fba3e4cae1a9790f48a732ffbacff8e54f88bc0a50590bee2ca,2024-12-02T18:15:10.520000
|
||||
CVE-2024-36619,0,0,d30e29b19403999a360d49eb2b7510653e8a4eeae72cc3067a2b6e14731d746f,2024-11-29T18:15:07.550000
|
||||
CVE-2024-3662,0,0,bf35bc71372b512799f21214c4add2ef96949612530c04611b0774c90b1261c4,2024-04-15T13:15:31.997000
|
||||
CVE-2024-36620,0,0,bd940859e3a70ba9f20daee48c18afd5e689ded5655791c03dcd144494e8ab28,2024-11-29T18:15:07.787000
|
||||
@ -258602,7 +258602,7 @@ CVE-2024-38472,0,0,e2da2567ed5c1bd58671597c1e4c6860b639e273ff91bc91c02bde109665e
|
||||
CVE-2024-38473,0,0,36c5b6d67728da1356289c3874d586ffc56f76a7fbb2f457e14a9e4a12de691d,2024-08-01T13:54:52.397000
|
||||
CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f2035049e0,2024-08-21T15:03:30.407000
|
||||
CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000
|
||||
CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000
|
||||
CVE-2024-38476,0,1,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000
|
||||
CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000
|
||||
CVE-2024-38479,0,0,a59c846ab11aea7508425cae5038126c4ec0f650a8e2bdbef76ed0cb402c0b6f,2024-11-15T13:58:08.913000
|
||||
CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000
|
||||
@ -258943,7 +258943,7 @@ CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d
|
||||
CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000
|
||||
CVE-2024-38821,0,0,bb251b2231aa5ec8776de9aee89d7b4c729d7a41bc68ac186fa12d01aa093b81,2024-10-28T13:58:09.230000
|
||||
CVE-2024-38826,0,0,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000
|
||||
CVE-2024-38827,1,1,3874c464e716661a48f3e22603ab20b7e36bf129e4ab27a217f4348c4a349acc,2024-12-02T15:15:11.270000
|
||||
CVE-2024-38827,0,0,3874c464e716661a48f3e22603ab20b7e36bf129e4ab27a217f4348c4a349acc,2024-12-02T15:15:11.270000
|
||||
CVE-2024-38828,0,0,0c8d1b5128144a8d7d124f30bfb82a89e19f39cd304dc10431ed647af64ddcb3,2024-11-18T17:11:17.393000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-38830,0,0,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000
|
||||
@ -259740,7 +259740,7 @@ CVE-2024-40051,0,0,3d4a07f6874af0ae76d5cc0355a7a49b4d82d6a4d252aa7d1e7489d1164a1
|
||||
CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000
|
||||
CVE-2024-40060,0,0,41909e3bdc1614813f63de5445f9f7b9276e4c7561b3b730c75588f114a39308,2024-11-01T14:42:03.693000
|
||||
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
|
||||
CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40075,0,1,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000
|
||||
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
|
||||
CVE-2024-40083,0,0,002189cbf2bb61a03947d60ab203b9b2c05b38f7fa5f102a2294b4e285e5aee3,2024-10-23T15:12:34.673000
|
||||
CVE-2024-40084,0,0,4bfdc024cb91df5bb8d17d66cec084fec7d97ef49264d00142fadf94256b75f9,2024-10-23T15:12:34.673000
|
||||
@ -263399,7 +263399,7 @@ CVE-2024-45511,0,0,a33b00ed5286e02a99a5d7d32b95a722e842936b42cb3272cb3598da23178
|
||||
CVE-2024-45518,0,0,9735413fa02ac827dc734eb603d392ab15d93caac171e362b785c2b23afa3a6f,2024-10-30T21:23:59.893000
|
||||
CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45520,0,1,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
|
||||
CVE-2024-45520,0,0,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
|
||||
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
|
||||
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
|
||||
CVE-2024-45526,0,0,f14e1fcc5198e28bcb9f7b3a43daa36e99814812ca109c1c007380ac29ec0aa1,2024-10-23T19:35:10.713000
|
||||
@ -263666,7 +263666,7 @@ CVE-2024-46047,0,0,57a3435cb7b6e94de5fb698161c585c7b5ce0f8c27f8db901c567ec5b0f81
|
||||
CVE-2024-46048,0,0,8b386e1ce8db1651262779289df0cde97cc0d4c50d015509acb4f6ce2f921783,2024-09-20T00:35:54.187000
|
||||
CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb874,2024-09-20T00:39:30.443000
|
||||
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
|
||||
CVE-2024-46054,0,0,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000
|
||||
CVE-2024-46054,0,1,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234f2f,2024-12-02T17:15:11.610000
|
||||
CVE-2024-46055,0,0,fb3ab0f0de94860a6cfab293110c9c5563c53335293fdfc002812d3e3e3d5f7a,2024-11-27T18:15:13.300000
|
||||
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
|
||||
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
||||
@ -264123,11 +264123,11 @@ CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4
|
||||
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
|
||||
CVE-2024-46902,0,0,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000
|
||||
CVE-2024-46903,0,0,c5646f2eca42dcdf58f6c7cfced2b89da0d0fd3b53651fe38e295ee3b07935b5,2024-11-01T19:35:27.957000
|
||||
CVE-2024-46905,1,1,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000
|
||||
CVE-2024-46906,1,1,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000
|
||||
CVE-2024-46907,1,1,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000
|
||||
CVE-2024-46908,1,1,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000
|
||||
CVE-2024-46909,1,1,b47bd7ac65aae0a6ebdfdafd0dc3e7316ffb6c2826608679aaa969584ac03798,2024-12-02T15:15:12.120000
|
||||
CVE-2024-46905,0,0,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000
|
||||
CVE-2024-46906,0,0,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000
|
||||
CVE-2024-46907,0,0,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000
|
||||
CVE-2024-46908,0,0,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000
|
||||
CVE-2024-46909,0,0,b47bd7ac65aae0a6ebdfdafd0dc3e7316ffb6c2826608679aaa969584ac03798,2024-12-02T15:15:12.120000
|
||||
CVE-2024-46911,0,0,b22e051b0f3c36b9606e67ab41355b75022485dd9540e72995287ed3b5f31c90,2024-11-01T17:35:07.877000
|
||||
CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000
|
||||
CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000
|
||||
@ -264253,7 +264253,7 @@ CVE-2024-47074,0,0,267a945e17f4a8e8e3ad906b4a73babdb13651aee69ba771912b3792671fd
|
||||
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000
|
||||
CVE-2024-47078,0,0,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000
|
||||
CVE-2024-47078,0,1,10afb9e6722a0aa2d390a08f8c9cc758e3470acdae52bc8d53ba79b68f1e0fed,2024-12-02T18:31:56.817000
|
||||
CVE-2024-47079,0,0,d8ccb016ae09801690996b7754595e296560f1a65a763da55e97f54fd5c7b0dc,2024-10-10T12:57:21.987000
|
||||
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
|
||||
CVE-2024-47080,0,0,aa86a69aa1a9b207836e4ce6e146e436fefd6cc1a294d7c36c55a2bb96d8f384,2024-10-16T16:38:43.170000
|
||||
@ -265789,6 +265789,7 @@ CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9
|
||||
CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000
|
||||
CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000
|
||||
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
|
||||
CVE-2024-49763,1,1,390a387f134353159444b9384ca7139409cca538e6054a310492c29d8a68242c,2024-12-02T17:15:11.830000
|
||||
CVE-2024-49764,0,0,35742a982a82bfbac3ba89ac10d6a85fed15175d4d482af0c8f4cf2b3fa6e2cc,2024-11-20T14:40:02.630000
|
||||
CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000
|
||||
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
|
||||
@ -266371,6 +266372,8 @@ CVE-2024-50376,0,0,c17efa3dc650d5a0b44b765200512faffc52101b81c2385c1a9f8e742ee86
|
||||
CVE-2024-50377,0,0,a88baec8ddbf85dae69a29e2d805cf9a334ef1555a19dac3559d55b727cb3e80,2024-11-26T11:22:08.767000
|
||||
CVE-2024-50378,0,0,d1e7f6cc1c38465f15ead8b558f025ff2fd8c3e8d0c0fab80553e16623c34e06,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
|
||||
CVE-2024-50380,1,1,5cfd4d3058711977d7b02b9e779feffa0e24d95fd021403d8b8b4f61100953a5,2024-12-02T17:15:11.980000
|
||||
CVE-2024-50381,1,1,cc4c78182ccb5412150348a074c0f3fe64b48452294aba2fc4de16da81547ef3,2024-12-02T17:15:12.160000
|
||||
CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000
|
||||
CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000
|
||||
CVE-2024-50386,0,0,e8a2dfb379d3c33fde3d10d50a34e7ed2697dcee8b987f61d477faa743f65676,2024-11-12T15:48:59.103000
|
||||
@ -267644,6 +267647,7 @@ CVE-2024-52585,0,0,ae573765d0059b6c237eb866187766f9c4c0b67ec566925f547df71f0cc9a
|
||||
CVE-2024-52587,0,0,4ff6d32c0cce5d4db211ff88731438a9a256421cd5f2b2cabeafbdadc8a29ef5,2024-11-19T21:57:32.967000
|
||||
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
|
||||
CVE-2024-52595,0,0,8a7985528b5682db55ae119b7b5e36765ed6db59aa7644e450a4161b96108d1c,2024-11-25T14:27:38.087000
|
||||
CVE-2024-52596,1,1,a1b5270424704526254af72af668772c7edcde11b939184b2a93420e4568a321,2024-12-02T17:15:12.353000
|
||||
CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000
|
||||
CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000
|
||||
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
|
||||
@ -267672,7 +267676,7 @@ CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0
|
||||
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
|
||||
CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
|
||||
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
||||
CVE-2024-52732,1,1,d6a80ccb8de450005a7cb1743d48fc0ea7e9c3041c776b4edbabfa2f08461cb5,2024-12-02T15:15:12.270000
|
||||
CVE-2024-52732,0,0,d6a80ccb8de450005a7cb1743d48fc0ea7e9c3041c776b4edbabfa2f08461cb5,2024-12-02T15:15:12.270000
|
||||
CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000
|
||||
CVE-2024-5274,0,0,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000
|
||||
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
|
||||
@ -267706,6 +267710,7 @@ CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176
|
||||
CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000
|
||||
CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000
|
||||
CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000
|
||||
CVE-2024-52806,1,1,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000
|
||||
CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000
|
||||
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
|
||||
CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000
|
||||
@ -267859,6 +267864,7 @@ CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b6
|
||||
CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000
|
||||
CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000
|
||||
CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000
|
||||
CVE-2024-53259,1,1,b56d791ed8a3934da53ca3b2bc8d09134e7671697306e7cd36424993380151b4,2024-12-02T17:15:12.767000
|
||||
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
|
||||
CVE-2024-53260,0,0,f8456e8751226ee5d041fd86437235b7d18924e40a17ade86dc5cd10d0203ce0,2024-11-27T22:15:05.353000
|
||||
CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000
|
||||
@ -267878,6 +267884,7 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e
|
||||
CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
|
||||
CVE-2024-5335,0,0,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000
|
||||
CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000
|
||||
CVE-2024-53364,1,1,98d19b85cee394f2609af2d3c120e10f09c46dfe00af779065231746b6ce8188,2024-12-02T17:15:12.933000
|
||||
CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000
|
||||
CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000
|
||||
CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000
|
||||
@ -267891,16 +267898,16 @@ CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b
|
||||
CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
|
||||
CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000
|
||||
CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000
|
||||
CVE-2024-53459,1,1,245c76a8b1f2e6c0f50dde2742a33bf75027788f3843da5272c1752af8a62ac6,2024-12-02T16:15:12.637000
|
||||
CVE-2024-53459,0,1,bcee038fd506b2d042b2e2518da0df51a6c3759ec3722aac04f828072f98c4d4,2024-12-02T18:15:11.123000
|
||||
CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000
|
||||
CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
|
||||
CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000
|
||||
CVE-2024-53504,0,0,7b94acf3236703c440799d7cea37ecf926431af8ccfa327a5bdac99daac96a25,2024-11-29T20:15:20.763000
|
||||
CVE-2024-53505,0,0,a48aa2a3f2b02e57c4384e6ed488ff8a0bd7c8c19b15bc8f8b5a06a4955c7a08,2024-11-29T20:15:20.853000
|
||||
CVE-2024-53506,0,0,ba2e698ad390074012b311e33d17d473f0ae54b1e9303f2625175edc4f7ce59c,2024-11-29T20:15:20.943000
|
||||
CVE-2024-53507,0,0,c5e946052b7a1eef03672c0a3197d790626776dff0c07041d5c8e1cd1640a81d,2024-11-29T20:15:21.027000
|
||||
CVE-2024-53504,0,1,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000
|
||||
CVE-2024-53505,0,1,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000
|
||||
CVE-2024-53506,0,1,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000
|
||||
CVE-2024-53507,0,1,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000
|
||||
CVE-2024-5351,0,0,5b3be503117b69cfbfdb88b1fae31317d85f3a58c24bc4f082dcbe98687cb2c4,2024-06-04T19:21:05.570000
|
||||
CVE-2024-5352,0,0,da1c4d8b4e23dadce106da9517801ea125925e8071854aa14e0650ba3020a2bf,2024-06-21T18:15:11.303000
|
||||
CVE-2024-5353,0,0,525ae1f28e269a2f910a2998894d881f94e776efad76469271fac08c213e4cb6,2024-06-04T19:21:05.680000
|
||||
@ -267910,6 +267917,8 @@ CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8
|
||||
CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000
|
||||
CVE-2024-53556,0,0,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000
|
||||
CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000
|
||||
CVE-2024-53564,1,1,e10a96030ded2829a41b48cc1671c01830a59f8174dc924d23b218915340bc5b,2024-12-02T18:15:11.353000
|
||||
CVE-2024-53566,1,1,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000
|
||||
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
|
||||
CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000
|
||||
CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59eee,2024-06-04T19:21:06.183000
|
||||
@ -268045,7 +268054,7 @@ CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2
|
||||
CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000
|
||||
CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
|
||||
CVE-2024-53861,0,0,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000
|
||||
CVE-2024-53862,1,1,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000
|
||||
CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000
|
||||
CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000
|
||||
CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000
|
||||
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
|
||||
@ -268064,7 +268073,7 @@ CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd
|
||||
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
|
||||
CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
|
||||
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
|
||||
CVE-2024-53920,0,0,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000
|
||||
CVE-2024-53920,0,1,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
|
||||
CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000
|
||||
CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000
|
||||
CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000
|
||||
@ -268076,10 +268085,12 @@ CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2
|
||||
CVE-2024-53979,0,0,daaf571bfcfd25ad5803f97558dcc6ea565a6375b17d8bed4a6f9cee29769cb2,2024-11-29T19:15:09.847000
|
||||
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
|
||||
CVE-2024-53980,0,0,f2c4b71c263d54957f07bea69df75ebb3d992381d97f959d8cfdaa259a929ae9,2024-11-29T19:15:09.993000
|
||||
CVE-2024-53981,1,1,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b47f,2024-12-02T16:15:14.457000
|
||||
CVE-2024-53981,0,0,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b47f,2024-12-02T16:15:14.457000
|
||||
CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000
|
||||
CVE-2024-53984,1,1,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000
|
||||
CVE-2024-53984,0,0,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000
|
||||
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-53990,1,1,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000
|
||||
CVE-2024-53992,1,1,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000
|
||||
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
|
||||
CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000
|
||||
CVE-2024-54004,0,0,4b55764e78df7d1fab73ac81a29fd36001f40116e182b6aab547372d06b234b5,2024-11-27T19:15:33.723000
|
||||
@ -270974,7 +270985,7 @@ CVE-2024-8781,0,0,3ec0b05f8d5a664e00f19be45699369ceb748ac3a54899e5a3d5a5f6653a98
|
||||
CVE-2024-8782,0,0,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
|
||||
CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
|
||||
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
|
||||
CVE-2024-8785,1,1,389f4d4466fc599aa1e162e96341d9287a40c3b8fbeefcdf0ef9b4791ab6ee69,2024-12-02T15:15:12.380000
|
||||
CVE-2024-8785,0,0,389f4d4466fc599aa1e162e96341d9287a40c3b8fbeefcdf0ef9b4791ab6ee69,2024-12-02T15:15:12.380000
|
||||
CVE-2024-8786,0,0,98535b365547eb81c56b86d17170e324effeb134cfd99a6f8a9199c7d69b6f51,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0ed8,2024-10-16T16:38:14.557000
|
||||
CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user