mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-23T03:00:22.414667+00:00
This commit is contained in:
parent
45e09b4a43
commit
9b4d46036d
56
CVE-2024/CVE-2024-421xx/CVE-2024-42182.json
Normal file
56
CVE-2024/CVE-2024-421xx/CVE-2024-42182.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-42182",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2025-01-23T01:15:26.580",
|
||||
"lastModified": "2025-01-23T01:15:26.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BigFix Patch Download Plug-ins are affected by Server-Side Request Forgery (SSRF) vulnerability. It may allow the application to download files from an internally hosted server on localhost."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 2.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118565",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-421xx/CVE-2024-42183.json
Normal file
56
CVE-2024/CVE-2024-421xx/CVE-2024-42183.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-42183",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2025-01-23T02:15:35.933",
|
||||
"lastModified": "2025-01-23T02:15:35.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BigFix Patch Download Plug-ins are affected by an arbitrary file download vulnerability. It could allow a malicious operator to download files from arbitrary URLs without any proper validation or allowlist controls."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 2.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-494"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118565",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -1,64 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-55410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
|
||||
"published": "2025-01-07T18:15:20.387",
|
||||
"lastModified": "2025-01-07T22:15:31.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-23T02:15:46.463",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the 690b33e1-0462-4e84-9bea-c7552b45432a.sys component of Asus GPU Tweak II Program Driver v1.0.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en el componente 690b33e1-0462-4e84-9bea-c7552b45432a.sys del Asus GPU Tweak II Program Driver v1.0.0.0 permite a los atacantes realizar acciones de lectura y escritura arbitrarias mediante el suministro de solicitudes IOCTL manipuladas."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://asus.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55410/CVE-2024-55410_690b33e1-0462-4e84-9bea-c7552b45432a.sys_README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-55591",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:34.450",
|
||||
"lastModified": "2025-01-15T20:48:30.333",
|
||||
"lastModified": "2025-01-23T02:00:02.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -62,7 +62,7 @@
|
||||
"cisaExploitAdd": "2025-01-14",
|
||||
"cisaActionDue": "2025-01-21",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Fortinet FortiOS Authorization Bypass Vulnerability",
|
||||
"cisaVulnerabilityName": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
|
25
CVE-2024/CVE-2024-577xx/CVE-2024-57719.json
Normal file
25
CVE-2024/CVE-2024-577xx/CVE-2024-57719.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57719",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T01:15:26.740",
|
||||
"lastModified": "2025-01-23T01:15:26.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component blend_transformed_tiled_argb.isra.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sammycage/lunasvg/issues/209",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-577xx/CVE-2024-57720.json
Normal file
25
CVE-2024/CVE-2024-577xx/CVE-2024-57720.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57720",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T01:15:26.847",
|
||||
"lastModified": "2025-01-23T01:15:26.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_blend."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sammycage/lunasvg/issues/209",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-577xx/CVE-2024-57721.json
Normal file
25
CVE-2024/CVE-2024-577xx/CVE-2024-57721.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57721",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T01:15:26.990",
|
||||
"lastModified": "2025-01-23T01:15:26.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_path_add_path."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sammycage/lunasvg/issues/209",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-577xx/CVE-2024-57722.json
Normal file
25
CVE-2024/CVE-2024-577xx/CVE-2024-57722.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57722",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T01:15:27.137",
|
||||
"lastModified": "2025-01-23T01:15:27.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lunasvg v3.0.0 was discovered to contain a allocation-size-too-big bug via the component plutovg_surface_create."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sammycage/lunasvg/issues/209",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-577xx/CVE-2024-57723.json
Normal file
25
CVE-2024/CVE-2024-577xx/CVE-2024-57723.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57723",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T01:15:27.270",
|
||||
"lastModified": "2025-01-23T01:15:27.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component composition_source_over."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sammycage/lunasvg/issues/209",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-577xx/CVE-2024-57724.json
Normal file
25
CVE-2024/CVE-2024-577xx/CVE-2024-57724.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T01:15:27.387",
|
||||
"lastModified": "2025-01-23T01:15:27.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component gray_record_cell."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sammycage/lunasvg/issues/209",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
26
README.md
26
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-23T00:55:23.302680+00:00
|
||||
2025-01-23T03:00:22.414667+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-22T23:02:59.383000+00:00
|
||||
2025-01-23T02:15:46.463000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,29 +27,35 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-01-22T01:00:04.365491+00:00
|
||||
2025-01-23T01:00:04.374239+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
278618
|
||||
278626
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-42182](CVE-2024/CVE-2024-421xx/CVE-2024-42182.json) (`2025-01-23T01:15:26.580`)
|
||||
- [CVE-2024-42183](CVE-2024/CVE-2024-421xx/CVE-2024-42183.json) (`2025-01-23T02:15:35.933`)
|
||||
- [CVE-2024-57719](CVE-2024/CVE-2024-577xx/CVE-2024-57719.json) (`2025-01-23T01:15:26.740`)
|
||||
- [CVE-2024-57720](CVE-2024/CVE-2024-577xx/CVE-2024-57720.json) (`2025-01-23T01:15:26.847`)
|
||||
- [CVE-2024-57721](CVE-2024/CVE-2024-577xx/CVE-2024-57721.json) (`2025-01-23T01:15:26.990`)
|
||||
- [CVE-2024-57722](CVE-2024/CVE-2024-577xx/CVE-2024-57722.json) (`2025-01-23T01:15:27.137`)
|
||||
- [CVE-2024-57723](CVE-2024/CVE-2024-577xx/CVE-2024-57723.json) (`2025-01-23T01:15:27.270`)
|
||||
- [CVE-2024-57724](CVE-2024/CVE-2024-577xx/CVE-2024-57724.json) (`2025-01-23T01:15:27.387`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-57938](CVE-2024/CVE-2024-579xx/CVE-2024-57938.json) (`2025-01-22T23:01:40.253`)
|
||||
- [CVE-2024-57940](CVE-2024/CVE-2024-579xx/CVE-2024-57940.json) (`2025-01-22T23:02:27.493`)
|
||||
- [CVE-2024-57944](CVE-2024/CVE-2024-579xx/CVE-2024-57944.json) (`2025-01-22T23:02:41.850`)
|
||||
- [CVE-2025-21658](CVE-2025/CVE-2025-216xx/CVE-2025-21658.json) (`2025-01-22T23:02:59.383`)
|
||||
- [CVE-2024-55410](CVE-2024/CVE-2024-554xx/CVE-2024-55410.json) (`2025-01-23T02:15:46.463`)
|
||||
- [CVE-2024-55591](CVE-2024/CVE-2024-555xx/CVE-2024-55591.json) (`2025-01-23T02:00:02.310`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
20
_state.csv
20
_state.csv
@ -263639,6 +263639,8 @@ CVE-2024-42179,0,0,196106f2d3fd2b8f10b05ef0357a8e01417f21977d9b370fe7a52116b37eb
|
||||
CVE-2024-4218,0,0,7a0061e75f27495a7259e5a50ce11715685411290c6b771dfa8c54d8a57b046e,2024-11-21T09:42:24.667000
|
||||
CVE-2024-42180,0,0,e809f9eb7c1490df30221feea0eda948578a27863db7d95ec3363e5547031367,2025-01-12T22:15:06.983000
|
||||
CVE-2024-42181,0,0,906efc04675e6ba0dfe172b3f945d5b98bb4c6661097a27e747b5cc96fa37cb6,2025-01-12T22:15:07.120000
|
||||
CVE-2024-42182,1,1,18224d5ee2ac8fd7b3a22f0639a5bd5f7202412e7b859b5dcd22eb1ddc784400,2025-01-23T01:15:26.580000
|
||||
CVE-2024-42183,1,1,2bb39ff2865b68e0a44a69976564b440b6158945315c5c65084cc605c855965a,2025-01-23T02:15:35.933000
|
||||
CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce136e,2024-11-15T13:58:08.913000
|
||||
CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000
|
||||
CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000
|
||||
@ -272491,7 +272493,7 @@ CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e59
|
||||
CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000
|
||||
CVE-2024-55408,0,0,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67ff58,2025-01-07T22:15:31.260000
|
||||
CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000
|
||||
CVE-2024-55410,0,0,71d000e52276290e12865ac7387f5ba02d219f24badb5759737cae3c54cee606,2025-01-07T22:15:31.423000
|
||||
CVE-2024-55410,0,1,fedf703c344a48c52d54b8dfaaeb09205cd99df6ecaaec96872b92c1b00a95d8,2025-01-23T02:15:46.463000
|
||||
CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e5cb,2025-01-08T20:15:28.640000
|
||||
CVE-2024-55412,0,0,6e1875e4d94fbec9f5b13096fd8188b74519aaec7a91136cabb4f52c00245964,2025-01-08T16:15:35.527000
|
||||
CVE-2024-55413,0,0,eef50e9e636ae6bc827b08d7c7eec17970a99ab50a51fccd44bf2d480fff7156,2025-01-08T16:15:35.717000
|
||||
@ -272567,7 +272569,7 @@ CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3
|
||||
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
|
||||
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
|
||||
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
|
||||
CVE-2024-55591,0,0,a4119c3a900eabf0113ebb321de53b83e488411766eec9c46fb6102609e7a164,2025-01-15T20:48:30.333000
|
||||
CVE-2024-55591,0,1,92e19e8d5fbeb8ffc3cb8033dbc9038c812258b0e349023cae68889d8104a7e5,2025-01-23T02:00:02.310000
|
||||
CVE-2024-55593,0,0,9430bce7692d2c8e6d288cbe72f31d16d74be58a9c07a6a6961fc12e525a7607,2025-01-14T14:15:34.610000
|
||||
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
|
||||
CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000
|
||||
@ -273567,7 +273569,13 @@ CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d
|
||||
CVE-2024-57703,0,0,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0801,2025-01-16T23:15:08.003000
|
||||
CVE-2024-57704,0,0,5d3ea96b243ef47ad9a653892bd654803ec2d81d9a41451dd6e5053bc648eb08,2025-01-16T23:15:08.113000
|
||||
CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000
|
||||
CVE-2024-57719,1,1,40eeeb4187dd73d2e17f0b62129b8213a398e15b1812919be7d9e297ef23fc35,2025-01-23T01:15:26.740000
|
||||
CVE-2024-5772,0,0,04004702ec5106d11d8a70be9a1c34eceae4a60526afd5c3eb12e840c71e6683,2024-11-21T09:48:19.003000
|
||||
CVE-2024-57720,1,1,17e830ba80fea7ad4816c5bc301b4dbeee72a213a931d20632be2a991ee22f5e,2025-01-23T01:15:26.847000
|
||||
CVE-2024-57721,1,1,3ac6bcd94885973e38a9d93efdd5bbffe71782af7fd163d8ba8303c34444f112,2025-01-23T01:15:26.990000
|
||||
CVE-2024-57722,1,1,ff99e2ada59b84ddf86c0ec8be18ee23c761364e99c0530741db7fde1655b1e6,2025-01-23T01:15:27.137000
|
||||
CVE-2024-57723,1,1,5711ef5bead24e0994f875340e23a0448f27b5751fe953e0a6dd1e695e3e070a,2025-01-23T01:15:27.270000
|
||||
CVE-2024-57724,1,1,9a92f9263f2cafd6c63af53a263d35f5aa75f59a0f7a2911772118776c972a25,2025-01-23T01:15:27.387000
|
||||
CVE-2024-57726,0,0,65fd2cddc719c88ffa0e00b4be18aec8ffa9fb5d459bdfe85cd0cb0d5409aec0,2025-01-22T16:25:12.533000
|
||||
CVE-2024-57727,0,0,92f5d24a0d77d41fbb6ea3a796a25597f2aecf3a4600a0571ed4ae9364be0356,2025-01-16T21:22:25.317000
|
||||
CVE-2024-57728,0,0,fb354679bf974c668fb55e36081142c182c86cd0df2050f9f41db6946683897d,2025-01-16T21:24:08.077000
|
||||
@ -273702,13 +273710,13 @@ CVE-2024-57934,0,0,43034e503550b569256632c4502d946f08931a3530bd54d0ff9ea3c30d627
|
||||
CVE-2024-57935,0,0,e6daeb99554ae407cceaff9066c461bc5bc63d681f5adb174db5d16d19702a15,2025-01-21T12:15:27.153000
|
||||
CVE-2024-57936,0,0,417d6b45a5c6544407230a177f750b81a6fb6c38ea6d13678499dd9c742ed051,2025-01-21T12:15:27.257000
|
||||
CVE-2024-57937,0,0,f2713cfe55ce0b98723add19c398fbf3ee712c696fe715eebadbe1d21a06c1df,2025-01-22T13:15:20.400000
|
||||
CVE-2024-57938,0,1,b46b86ea806e0c459fb1ead615d70e4371d2946e79a6ef81fedd49881f631f14,2025-01-22T23:01:40.253000
|
||||
CVE-2024-57938,0,0,b46b86ea806e0c459fb1ead615d70e4371d2946e79a6ef81fedd49881f631f14,2025-01-22T23:01:40.253000
|
||||
CVE-2024-57939,0,0,d2414769f2e217c395dc0f8aa10fa264b19bc4c515c6ed730880adaf71b9e812,2025-01-21T13:15:07.903000
|
||||
CVE-2024-57940,0,1,6dee157c6594e466e3cdfaf38d49c3611c870087b6926a7ee4d1289ec29ef96e,2025-01-22T23:02:27.493000
|
||||
CVE-2024-57940,0,0,6dee157c6594e466e3cdfaf38d49c3611c870087b6926a7ee4d1289ec29ef96e,2025-01-22T23:02:27.493000
|
||||
CVE-2024-57941,0,0,7f374a575eccdb21ec7f9d09d0a4e62f6384f134349957689e6f5a5cb2bb715c,2025-01-21T13:15:08.640000
|
||||
CVE-2024-57942,0,0,e3741427d2b6e1a9f599b350dcdf4410a474f8e8c65342410e7099c356758a40,2025-01-21T13:15:08.743000
|
||||
CVE-2024-57943,0,0,dc7e0684b8377f15667d88e1273c5a5004a8c0a280d7d1767bad721d5d8df413,2025-01-21T13:15:08.837000
|
||||
CVE-2024-57944,0,1,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000
|
||||
CVE-2024-57944,0,0,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000
|
||||
CVE-2024-57945,0,0,8e35c260271a7d05a4130bce464cd053ddcd7430dc8ad698dc9980a797cf9881,2025-01-21T13:15:09.033000
|
||||
CVE-2024-57946,0,0,c7f36f65d43623d48215412aac78ff97bd2f343757e90cf928c2a23f40930377,2025-01-21T13:15:09.137000
|
||||
CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000
|
||||
@ -277882,7 +277890,7 @@ CVE-2025-21654,0,0,387bd74314e19ea277d2aa993508db4a58606a45347df382e4b9016f897da
|
||||
CVE-2025-21655,0,0,e5a98c6155ef95beaa77c8f70c04ef1a52b9c9b57ffc8aa737b1a8a15dabbd07,2025-01-20T14:15:27.027000
|
||||
CVE-2025-21656,0,0,e08de214fec57f5455004c22ab31652820945256042ce332af5f60bc4ee6b0eb,2025-01-21T13:15:09.240000
|
||||
CVE-2025-21657,0,0,58d21ab8ed420cad449dc9439925bd7a4bd93e784737aa1340191a73104f8bd9,2025-01-21T13:15:09.340000
|
||||
CVE-2025-21658,0,1,5894a65bd40b58510d3865fd67c42c2240f0de76f9e61b59f9eda7ac84e5b943,2025-01-22T23:02:59.383000
|
||||
CVE-2025-21658,0,0,5894a65bd40b58510d3865fd67c42c2240f0de76f9e61b59f9eda7ac84e5b943,2025-01-22T23:02:59.383000
|
||||
CVE-2025-21659,0,0,a1f4b697b66bab7b57666583da4fd3952bef7152142aae1d092214b71dd2eee4,2025-01-21T13:15:09.540000
|
||||
CVE-2025-21660,0,0,e8f48b67279b891fc134ba898fd31eb80bfc20852a82499d9e449abaf5daac6f,2025-01-21T13:15:09.643000
|
||||
CVE-2025-21661,0,0,e7b9e2e7e2e401ac2c3dd32c6ea5cfa7c3b00783dd71307395f255d241abd981,2025-01-21T13:15:09.747000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user