mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-11-27T19:01:43.480293+00:00
This commit is contained in:
parent
bbe73cc426
commit
a08f5141e4
@ -2,15 +2,43 @@
|
||||
"id": "CVE-2023-2142",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T12:15:18.307",
|
||||
"lastModified": "2024-11-26T12:15:18.307",
|
||||
"lastModified": "2024-11-27T17:15:05.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Nunjucks versions prior to version 3.2.4, it was \npossible to bypass the restrictions which are provided by the autoescape\n functionality. If there are two user-controlled parameters on the same \nline used in the views, it was possible to inject cross site scripting \npayloads using the backslash \\ character."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En las versiones de Nunjucks anteriores a la versi\u00f3n 3.2.4, era posible eludir las restricciones que proporciona la funci\u00f3n de escape autom\u00e1tico. Si hay dos par\u00e1metros controlados por el usuario en la misma l\u00ednea utilizada en las vistas, era posible inyectar payloads de cross-site scripting utilizando el car\u00e1cter de barra invertida \\."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32223",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-06-28T21:15:09.940",
|
||||
"lastModified": "2023-07-06T15:33:10.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-27T17:15:05.937",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -13,32 +13,14 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@cyber.gov.il",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -46,9 +28,27 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -103,6 +113,13 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33298",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-30T22:15:10.077",
|
||||
"lastModified": "2023-08-02T15:40:35.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-27T17:15:06.230",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -88,6 +98,30 @@
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.perimeter81.com/docs/macos-agent-release-notes",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/653767",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ns-echo.com/posts/cve_2023_33298.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-28T20:15:09.540",
|
||||
"lastModified": "2023-07-10T15:53:05.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-27T17:15:06.687",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -71,6 +81,13 @@
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://siltonrenato02.medium.com/a-brief-summary-about-a-ssti-to-rce-in-bagisto-e900ac450490",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35830",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-29T16:15:09.897",
|
||||
"lastModified": "2023-07-11T19:25:28.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-27T17:15:08.783",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -132,6 +142,20 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.stw-mobile-machines.com/fileadmin/user_upload/content/STW/PSIRT/STW-IR-23-001.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.stw-mobile-machines.com/psirt/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-111xx/CVE-2024-11160.json
Normal file
16
CVE-2024/CVE-2024-111xx/CVE-2024-11160.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-11160",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-27T18:15:08.620",
|
||||
"lastModified": "2024-11-27T18:15:08.620",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-11694",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:18.943",
|
||||
"lastModified": "2024-11-26T14:15:18.943",
|
||||
"lastModified": "2024-11-27T17:15:09.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Es posible que el modo estricto de Enhanced Tracking Protection haya permitido inadvertidamente una omisi\u00f3n de frame-src de CSP y un XSS basado en DOM a trav\u00e9s del complemento SafeFrame de Google en la extensi\u00f3n Web Compatibility. Este problema podr\u00eda haber expuesto a los usuarios a marcos maliciosos que se hacen pasar por contenido leg\u00edtimo. Esta vulnerabilidad afecta a Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133 y Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167",
|
||||
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-11695",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:19.040",
|
||||
"lastModified": "2024-11-26T14:15:19.040",
|
||||
"lastModified": "2024-11-27T17:15:09.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una URL manipulada con caracteres \u00e1rabes y espacios en blanco podr\u00eda haber ocultado el verdadero origen de la p\u00e1gina, lo que podr\u00eda dar lugar a un posible ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133 y Thunderbird < 128.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496",
|
||||
|
149
CVE-2024/CVE-2024-118xx/CVE-2024-11860.json
Normal file
149
CVE-2024/CVE-2024-118xx/CVE-2024-11860.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2024-11860",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-27T17:15:10.010",
|
||||
"lastModified": "2024-11-27T17:15:10.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
|
||||
"baseScore": 6.4,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 4.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1CyjtknGVqn5QO_R1WZX-hoGH8ae5DjRq/view",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Unauthorized%20Tenant%20Deletion.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286245",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286245",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.449684",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-217xx/CVE-2024-21703.json
Normal file
56
CVE-2024/CVE-2024-217xx/CVE-2024-21703.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-21703",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-11-27T17:15:10.260",
|
||||
"lastModified": "2024-11-27T18:15:08.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This Medium severity Security Misconfiguration vulnerability was introduced in version 8.8.1 of Confluence Data Center and Server for Windows installations.\n\n\n\nThis Security Misconfiguration vulnerability, with a CVSS Score of 6.4 allows an authenticated attacker of the Windows host to read sensitive information about the Confluence Data Center configuration which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.\n\n\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.18 \n* Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.5\n* Confluence Data Center and Server 8.7: Upgrade to a release greater than or equal to 8.7.2\n* Confluence Data Center and Server 8.8: Upgrade to a release greater than or equal to 8.8.0\n\n\n\nSee the release notes (https://confluence.atlassian.com/conf88/confluence-release-notes-1354501008.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). \n\nThis vulnerability was reported via our Atlassian Bug Bounty Program by Chris Elliot."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/CONFSERVER-98413",
|
||||
"source": "security@atlassian.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-29292",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T18:15:22.970",
|
||||
"lastModified": "2024-11-20T21:15:07.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:10.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple OS Command Injection vulnerabilities affecting Kasda LinkSmart Router KW6512 <= v1.3 enable an authenticated remote attacker to execute arbitrary OS commands via various cgi parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Varias vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo que afectan al enrutador Kasda LinkSmart KW6512 <= v1.3 permiten a un atacante remoto autenticado ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de varios par\u00e1metros cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/QuartzDust/debfd7ddf934a9f5609d7f1a8cd71154",
|
||||
|
64
CVE-2024/CVE-2024-308xx/CVE-2024-30896.json
Normal file
64
CVE-2024/CVE-2024-308xx/CVE-2024-30896.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-30896",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-21T11:15:34.007",
|
||||
"lastModified": "2024-11-27T17:15:10.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an \"influx auth ls\" command. NOTE: the supplier indicates that this is intentional but is a \"poor design choice\" that will be changed in a future release."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "InfluxDB hasta la versi\u00f3n 2.7.10 permite a todos los administradores de Access recuperar todos los tokens sin procesar mediante el comando \"influx auth ls\". NOTA: el proveedor indica que esto es intencional, pero es una \"mala elecci\u00f3n de dise\u00f1o\" que se cambiar\u00e1 en una versi\u00f3n futura."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/XenoM0rph97/CVE-2024-30896",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/influxdata/influxdb/issues/24797",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-319xx/CVE-2024-31976.json
Normal file
25
CVE-2024/CVE-2024-319xx/CVE-2024-31976.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-31976",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T17:15:10.913",
|
||||
"lastModified": "2024-11-27T17:15:10.913",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker to execute arbitrary OS commands via the Controller connectivity parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31976",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/tree/main/EnGenius/EWS356-FIT",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-33439",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T19:15:06.010",
|
||||
"lastModified": "2024-11-20T19:15:06.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:11.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Kasda LinkSmart Router KW5515 v1.7 and before allows an authenticated remote attacker to execute arbitrary OS commands via cgi parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Kasda LinkSmart Router KW5515 v1.7 y anteriores permite que un atacante remoto autenticado ejecute comandos arbitrarios del sistema operativo a trav\u00e9s de par\u00e1metros cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/QuartzDust/848acfddff02c881eb86dd302e859e80",
|
||||
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-37782",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-22T18:15:17.230",
|
||||
"lastModified": "2024-11-22T18:15:17.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:11.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An LDAP injection vulnerability in the login page of Gladinet CentreStack v13.12.9934.54690 allows attackers to access sensitive data or execute arbitrary commands via a crafted payload injected into the username field."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n LDAP en la p\u00e1gina de inicio de sesi\u00f3n de Gladinet CentreStack v13.12.9934.54690 permite a los atacantes acceder a datos confidenciales o ejecutar comandos arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo de nombre de usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.githubusercontent.com/Draoken/ab5465fc339df7a1e42281540b61f887/raw/fb28d4148e311e8cde9778dee4f8b2e64e27ea92/CVE-2024-37782.txt",
|
||||
|
25
CVE-2024/CVE-2024-378xx/CVE-2024-37816.json
Normal file
25
CVE-2024/CVE-2024-378xx/CVE-2024-37816.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-37816",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T17:15:11.570",
|
||||
"lastModified": "2024-11-27T17:15:11.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain a stack overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://quectel.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/quectel-official/Quectel-Security",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-14T22:15:16.147",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"lastModified": "2024-11-27T18:15:09.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La funci\u00f3n 0x49 de Insyde IHISI puede restaurar los valores predeterminados de f\u00e1brica para ciertas variables UEFI sin autenticaci\u00f3n adicional de forma predeterminada, lo que podr\u00eda provocar un posible ataque de reversi\u00f3n en ciertas plataformas. Esto se solucion\u00f3 en: kernel 5.2, versi\u00f3n 05.29.19; kernel 5.3, versi\u00f3n 05.38.19; kernel 5.4, versi\u00f3n 05.46.19; kernel 5.5, versi\u00f3n 05.54.19; kernel 5.6, versi\u00f3n 05.61.19."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.insyde.com/security-pledge/SA-2024007",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44758",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T21:15:09.233",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2024-11-27T18:15:13.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /Production/UploadFile of NUS-M9 ERP Management Software v3.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de archivos manipulados."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-44758.md",
|
||||
|
@ -2,15 +2,32 @@
|
||||
"id": "CVE-2024-44786",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-22T17:15:08.380",
|
||||
"lastModified": "2024-11-22T17:15:08.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:11.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in Meabilis CMS 1.0 allows attackers to access other users' address books via unspecified vectors."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso incorrecto en Meabilis CMS 1.0 permite a los atacantes acceder a las libretas de direcciones de otros usuarios a trav\u00e9s de vectores no especificados."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/luluhackme/8356703c7295d03d6e68a1ca652441b9",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46055",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T15:15:26.290",
|
||||
"lastModified": "2024-11-27T15:15:26.290",
|
||||
"lastModified": "2024-11-27T18:15:13.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "OpenVidReview 1.0 is vulnerable to Cross Site Scripting (XSS) in review names."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/b1d0ws/CVEs/blob/main/CVE-2024-46055.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-49592",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T21:15:11.070",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2024-11-27T17:15:12.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "McAfee Trial Installer 16.0.53 tiene un control de acceso incorrecto que conduce a una escalada local de privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mcafee.com/support/s/article/000002516?language=en_US",
|
||||
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-50657",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-22T18:15:17.570",
|
||||
"lastModified": "2024-11-22T18:15:17.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:12.323",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Owncloud android apk v.4.3.1 allows a physically proximate attacker to escalate privileges via the PassCodeViewModel class, specifically in the checkPassCodeIsValid method"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en la apk de Android v.4.3.1 de Owncloud permite que un atacante f\u00edsicamente pr\u00f3ximo escale privilegios a trav\u00e9s de la clase PassCodeViewModel, espec\u00edficamente en el m\u00e9todo checkPassCodeIsValid"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/drive/folders/1C-ZYjYhmKRGvWs9YN51XOiAS2WxxwdQd?usp=sharing",
|
||||
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-50672",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-25T21:15:19.523",
|
||||
"lastModified": "2024-11-25T21:15:19.523",
|
||||
"lastModified": "2024-11-27T17:15:12.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de inyecci\u00f3n NoSQL en Adapt Learning Adapt Authoring Tool <= 0.11.3 permite a atacantes no autenticados restablecer las contrase\u00f1as de cuentas de usuario y administrador a trav\u00e9s de la funci\u00f3n \"Restablecer contrase\u00f1a\". La vulnerabilidad se produce debido a una validaci\u00f3n insuficiente de la entrada del usuario, que se utiliza como consulta en la funci\u00f3n find() de Mongoose. Esto permite a los atacantes realizar una toma de control total de la cuenta de administrador. Los atacantes pueden utilizar los privilegios administrativos reci\u00e9n obtenidos para cargar un complemento personalizado para realizar la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor que aloja la aplicaci\u00f3n web."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adaptlearning/adapt_authoring",
|
||||
|
@ -2,8 +2,9 @@
|
||||
"id": "CVE-2024-51163",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T17:15:18.417",
|
||||
"lastModified": "2024-11-22T17:15:09.497",
|
||||
"lastModified": "2024-11-27T18:15:17.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de inclusi\u00f3n de archivos locales en Vegam Solutions Vegam 4i v.6.3.47.0 y versiones anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de etiquetado de impresi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163",
|
||||
|
37
CVE-2024/CVE-2024-512xx/CVE-2024-51228.json
Normal file
37
CVE-2024/CVE-2024-512xx/CVE-2024-51228.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-51228",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T17:15:12.800",
|
||||
"lastModified": "2024-11-27T17:15:12.800",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in TOTOLINK-CX-A3002RU V1.0.4-B20171106.1512 and TOTOLINK-CX-N150RT V2.1.6-B20171121.1002 and TOTOLINK-CX-N300RT V2.1.6-B20170724.1420 and TOTOLINK-CX-N300RT V2.1.8-B20171113.1408 and TOTOLINK-CX-N300RT V2.1.8-B20191010.1107 and TOTOLINK-CX-N302RE V2.0.2-B20170511.1523 allows a remote attacker to execute arbitrary code via the /boafrm/formSysCmd component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://totolink.tw/support_view/A3002RU",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://totolink.tw/support_view/N150RT",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.tw/products_view/N300RT",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.tw/products_view/N302RE",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51330",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T19:15:08.057",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2024-11-27T17:15:12.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en UltiMaker Cura v.4.41 y 5.8.1 y anteriores permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del mecanismo de comunicaci\u00f3n entre procesos (IPC) entre la aplicaci\u00f3n Cura y los procesos de CuraEngine, la pila de red del host local, las configuraciones de impresi\u00f3n y los componentes de procesamiento y transmisi\u00f3n de c\u00f3digo G, impresoras 3D Ultimaker."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/HalaAli198/ff06d7a94c06cdfb821dec4d6303e01b",
|
||||
|
64
CVE-2024/CVE-2024-513xx/CVE-2024-51367.json
Normal file
64
CVE-2024/CVE-2024-513xx/CVE-2024-51367.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-51367",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-21T20:15:44.660",
|
||||
"lastModified": "2024-11-27T17:15:13.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the component \\Users\\username.BlackBoard of BlackBoard v2.0.0.2 allows attackers to execute arbitrary code via uploading a crafted .xml file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente \\Users\\username.BlackBoard de BlackBoard v2.0.0.2 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo .xml manipulado espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://blackboard.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Gelcon/PoCofBlackBoard2.0.0.2",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-52726",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-22T19:15:07.297",
|
||||
"lastModified": "2024-11-22T19:15:07.297",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:13.463",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CRMEB v5.4.0 is vulnerable to Arbitrary file read in the save_basics function which allows an attacker to obtain sensitive information"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "CRMEB v5.4.0 es vulnerable a la lectura arbitraria de archivos en la funci\u00f3n save_basics, lo que permite a un atacante obtener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/sec-Kode/bb71138619b22de28c6b0ba986ad58e5",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-52771",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T17:15:20.637",
|
||||
"lastModified": "2024-11-20T17:15:20.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:14.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DedeBIZ v6.3.0 was discovered to contain an arbitrary file deletion vulnerability via the component /admin/file_manage_view."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que DedeBIZ v6.3.0 conten\u00eda una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos a trav\u00e9s del componente /admin/file_manage_view."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
|
||||
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-52787",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-25T18:15:13.597",
|
||||
"lastModified": "2024-11-25T18:15:13.597",
|
||||
"lastModified": "2024-11-27T17:15:14.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en el m\u00e9todo upload_documents de libre-chat v0.0.6 permite a los atacantes ejecutar un path traversal mediante el suministro de un nombre de archivo manipulado en un archivo cargado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jxfzzzt/276a6e8cfbc54d2c2711bb51d8d3dff3",
|
||||
|
@ -2,13 +2,9 @@
|
||||
"id": "CVE-2024-5217",
|
||||
"sourceIdentifier": "psirt@servicenow.com",
|
||||
"published": "2024-07-10T17:15:12.373",
|
||||
"lastModified": "2024-07-30T15:20:54.727",
|
||||
"lastModified": "2024-11-27T18:56:05.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-07-29",
|
||||
"cisaActionDue": "2024-08-19",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -27,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.2,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
@ -58,39 +56,19 @@
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.2,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@servicenow.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -98,26 +76,38 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2024-07-29",
|
||||
"cisaActionDue": "2024-08-19",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@servicenow.com",
|
||||
"type": "Secondary",
|
||||
@ -127,6 +117,16 @@
|
||||
"value": "CWE-184"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-697"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -141,6 +141,11 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69E0078E-1953-4F4F-9D5A-B1A140C4B310"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03FE0B52-C7A6-4632-A09E-BE7AB8610DD7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*",
|
||||
@ -171,6 +176,31 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76439FC6-2DD2-4AD4-9EB6-A2FEAC10B205"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8097D9B0-9329-4EB7-BB7E-0FF3057D408B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFEA8D14-D1C8-486B-ABE7-25C9D6B72CE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5DA716A2-E697-4BC3-8127-E772E67E1C49"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEBB1DCE-25AA-4F95-984C-5BB5341A90ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE34BA83-3810-4314-9A45-B1A8944C6612"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*",
|
||||
@ -191,6 +221,11 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9C467AA-B1A2-4A2A-8363-623232BCBCA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A6E189F6-6623-4A0C-8767-A3CC1C12B759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*",
|
||||
@ -211,6 +246,16 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "481EC1AA-5863-4641-B67F-CD51416ED0EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "402D816A-2650-4743-A386-029C0D063C39"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56CBE65E-2D5A-4191-A2F4-8AC76050404F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*",
|
||||
@ -221,21 +266,71 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76D69B8D-02EE-4E3D-9F54-E94F6DB09D5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC772DD6-2814-4EEF-A524-CC752C277337"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "996C57B4-E8AC-48F6-BA71-328F714B1BAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10B82BE2-BE38-4EA7-85D5-AC28FF4F50BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D66B18D1-486D-4390-9D1E-5348D1C6729A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0EC8ACE-70CA-44FC-ACA7-0868D620C86D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D934721-565F-4707-A32A-B7E4BB9D2DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4AA97D74-290C-47C7-9976-6EF83950C530"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "122E0C17-B29B-44B9-A37E-745B103AD398"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AADFD5CE-9C9D-46FF-9871-E2BD7B2C8B98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECE96EED-C729-4A84-B437-79CCE029C391"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BD49264-D243-4625-828C-AF383D826779"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB29FCEC-3DDB-46EE-A7AA-4728E6B9A1D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC4CA2B8-EFD8-4C01-8F9C-E613619062DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*",
|
||||
@ -251,16 +346,41 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A4CD267-D72A-4F09-BE9B-F008B1804AD9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24D2EBC6-F894-4C1D-A2FF-B49FF4007ED8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26D23EE3-0F88-47F7-ADCD-B74F81A08D9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FB793686-954A-49F8-BC35-A95325D61303"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "38DDACA8-69A9-4047-AD99-A7DDC320EAD8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "926C0F6A-0599-4239-B1CE-5D864BBAA315"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*",
|
||||
@ -271,26 +391,76 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9132AB29-33C1-4825-BAD4-2804C26316B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68D99613-53A1-4B09-9A78-F8EFA0CC6B01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8FCCFB6-DB7E-4DED-A7E0-1C03087754F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ED2051C-FE4F-4C0A-A3BF-E33141DC3250"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CFD4017-5B8E-4CAF-B9E5-4A675C11F01A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40D69E69-DF88-4F8C-A9BD-B642829107E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D21A542-15DC-432C-9C60-F7CABE8D4807"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1596163B-637A-49F9-B01F-C6CC297F7E5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0B915FDA-9DCB-43B5-8081-F0690996A3EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7308FA07-5C6D-41AA-9EE1-EE9BAAB50A1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5ED407E7-9595-4B4D-9D53-1A4807BA327C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1EA5B288-54DB-437E-88C2-05F90FF3C918"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ED497ED-1588-4CF8-AE83-7CC7BEF8B982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A74A3197-68F7-4303-A731-B87A8BF3F831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A08FD0FD-E062-4BEC-BE95-0ED2D106826B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*",
|
||||
@ -301,26 +471,51 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "847F9124-F3C6-4C93-9E80-544CB0580C8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12808B52-8F7D-4EE0-A43E-85A1C70A6BE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "81880B84-5E9D-4B7F-B1D5-1BF8D25DAF5D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8011D2A7-770B-4AE5-80E6-C762F4F0BB55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A58603E3-5AFC-4606-8F9E-1B4FF9A9B843"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BED5F42A-5FFF-43E0-9BAD-A5E6C1110551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABE64339-EF0B-4430-9768-FA7DE82AA61F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF79CA67-765A-4CCB-B1CB-EE1FC02CFCFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3E71353-9AFF-4B6D-89BC-A2909A7C5DDF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9C5B57E-7852-4E38-9BDA-864CF6F9DB5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*",
|
||||
@ -331,11 +526,71 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "650956A6-8DE6-4C16-A77C-2B208B41DF5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A49AC0E0-9164-43AD-959A-55FCB7965858"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46277115-1A2B-4526-83E8-1446EB5A1EAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CDFB167-F252-46A6-A5F6-EF9A4F93FC03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43DE243B-E90A-4857-A3A6-3A045FE2D75F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33689F99-48DD-47C6-AFAC-DC5D10785860"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F664F1F-5FB2-48B1-93C7-5DF415E673B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C641B881-7379-448A-A785-3381C72F8353"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03D48963-936B-4A48-8859-A5066A259E03"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9149B850-7196-476A-9A27-DEB85B8C6F19"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10622260-FCBC-4CC0-804E-55D75200FC46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF44F7A1-D153-4723-BA45-0FE4E4725C2F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*",
|
||||
@ -346,20 +601,55 @@
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "444DD275-789F-4C07-9D98-BBFAA1640DB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B29B708-BD7C-4A6C-9E78-37D045101A17"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F6EDFA3-9014-4AA7-A17F-DDB1FE96588E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DA447CA-A6A2-436C-9909-3F0419B7DD6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F263893-6D34-49D6-9407-ED6CB823595E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D18E2CD1-AC8E-4ABF-88DE-D3E61A297ED1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52FC3724-35E5-4C3A-B6BA-3B270EA4255E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6137BB81-6B48-4DCB-A9F6-A27D869C12FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B06EABB5-0327-4816-AC7B-34D021758812"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29DC5FC9-2ACF-4C51-93C4-2D0982BA0CA6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD5A918-9B71-4CFD-A6DB-437D3B647C6A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -387,6 +677,27 @@
|
||||
"tags": [
|
||||
"Press/Media Coverage"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Press/Media Coverage"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,9 @@
|
||||
"id": "CVE-2024-5274",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-05-28T15:15:10.443",
|
||||
"lastModified": "2024-08-14T17:07:13.270",
|
||||
"lastModified": "2024-11-27T18:12:51.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-05-28",
|
||||
"cisaActionDue": "2024-06-18",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -26,20 +22,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
@ -47,6 +43,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -54,15 +52,17 @@
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2024-05-28",
|
||||
"cisaActionDue": "2024-06-18",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -128,14 +128,15 @@
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/341663589",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -151,6 +152,35 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/341663589",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVC3FNI7HZLVSRIFBVUSBHI233DZYBKP/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBUYVPD4MIFQNNYBGAPI5MOECWXXOB/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-532xx/CVE-2024-53254.json
Normal file
16
CVE-2024/CVE-2024-532xx/CVE-2024-53254.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-53254",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-27T18:15:18.060",
|
||||
"lastModified": "2024-11-27T18:15:18.060",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE is a duplicate of another CVE."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-53438",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-22T17:15:10.857",
|
||||
"lastModified": "2024-11-22T17:15:10.857",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:14.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EventAttendance.php in ChurchCRM 5.7.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability by manipulating the 'Event' parameter, which is directly interpolated into the SQL query without proper sanitization or validation, allowing attackers to execute arbitrary SQL commands."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "EventAttendance.php en ChurchCRM 5.7.0 es vulnerable a la inyecci\u00f3n SQL. Un atacante puede aprovechar esta vulnerabilidad manipulando el par\u00e1metro 'Event', que se interpola directamente en la consulta SQL sin la debida desinfecci\u00f3n o validaci\u00f3n, lo que permite a los atacantes ejecutar comandos SQL arbitrarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/6988",
|
||||
|
@ -2,15 +2,55 @@
|
||||
"id": "CVE-2024-53556",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-25T21:15:21.693",
|
||||
"lastModified": "2024-11-25T21:15:21.693",
|
||||
"lastModified": "2024-11-27T17:15:14.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Open Redirect vulnerability in Taiga v6.8.1 allows attackers to redirect users to arbitrary websites via appending a crafted link to /login?next= in the login page URL."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de redirecci\u00f3n abierta en Taiga v6.8.1 permite a los atacantes redirigir a los usuarios a sitios web arbitrarios mediante la adici\u00f3n de un enlace manipulado a /login?next= en la URL de la p\u00e1gina de inicio de sesi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1CIr8oHSF4JaqOn51wIhyZyvsCtlX0Q_e/view?usp=drive_link",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53635",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T14:15:19.210",
|
||||
"lastModified": "2024-11-27T14:15:19.210",
|
||||
"lastModified": "2024-11-27T18:15:18.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /covid-tms/patient-search-report.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata POST request parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/COVID19/Reflected%20Cross%20Site%20Scripting.pdf",
|
||||
|
@ -2,15 +2,43 @@
|
||||
"id": "CVE-2024-53916",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-25T00:15:04.423",
|
||||
"lastModified": "2024-11-25T00:15:04.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-27T17:15:15.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In OpenStack Neutron through 25.0.0, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. NOTE: 935883 has the \"Work in Progress\" status as of 2024-11-24."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En OpenStack Neutron hasta la versi\u00f3n 25.0.0, neutron/extensions/tagging.py puede usar una ID incorrecta durante la aplicaci\u00f3n de pol\u00edticas. NOTA: 935883 tiene el estado \"Trabajo en progreso\" al 24/11/2024."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openstack/neutron/blob/363ffa6e9e1ab5968f87d45bc2f1cb6394f48b9f/neutron/extensions/tagging.py#L138-L232",
|
||||
|
21
CVE-2024/CVE-2024-540xx/CVE-2024-54003.json
Normal file
21
CVE-2024/CVE-2024-540xx/CVE-2024-54003.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-54003",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-11-27T17:15:15.333",
|
||||
"lastModified": "2024-11-27T17:15:15.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jenkins Simple Queue Plugin 1.4.4 and earlier does not escape the view name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Create permission."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-11-27/#SECURITY-3467",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-540xx/CVE-2024-54004.json
Normal file
21
CVE-2024/CVE-2024-540xx/CVE-2024-54004.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-54004",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-11-27T17:15:15.443",
|
||||
"lastModified": "2024-11-27T17:15:15.443",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jenkins Filesystem List Parameter Plugin 0.0.14 and earlier does not restrict the path used for the File system objects list Parameter, allowing attackers with Item/Configure permission to enumerate file names on the Jenkins controller file system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-11-27/#SECURITY-3367",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,9 @@
|
||||
"id": "CVE-2024-5910",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-07-10T19:15:11.390",
|
||||
"lastModified": "2024-11-14T02:00:02.740",
|
||||
"lastModified": "2024-11-27T17:23:02.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-11-07",
|
||||
"cisaActionDue": "2024-11-28",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Palo Alto Networks Expedition Missing Authentication Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -27,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:M/U:Red",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
@ -58,9 +56,7 @@
|
||||
"recovery": "USER",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "RED",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
],
|
||||
@ -71,6 +67,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -78,19 +76,21 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2024-11-07",
|
||||
"cisaActionDue": "2024-11-28",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Palo Alto Networks Expedition Missing Authentication Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -99,8 +99,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
"type": "Secondary",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -135,6 +135,21 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2024-5910",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-70xx/CVE-2024-7025.json
Normal file
37
CVE-2024/CVE-2024-70xx/CVE-2024-7025.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-7025",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-11-27T18:15:18.420",
|
||||
"lastModified": "2024-11-27T18:15:18.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Integer overflow in Layout in Google Chrome prior to 129.0.6668.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-472"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/367764861",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,9 @@
|
||||
"id": "CVE-2024-7971",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-21T21:15:09.277",
|
||||
"lastModified": "2024-08-27T01:00:02.883",
|
||||
"lastModified": "2024-11-27T17:21:35.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-08-26",
|
||||
"cisaActionDue": "2024-09-16",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -26,20 +22,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
@ -47,6 +43,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -54,19 +52,21 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2024-08-26",
|
||||
"cisaActionDue": "2024-09-16",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -75,8 +75,8 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"type": "Secondary",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -127,6 +127,14 @@
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-93xx/CVE-2024-9369.json
Normal file
25
CVE-2024/CVE-2024-93xx/CVE-2024-9369.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-9369",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-11-27T18:15:18.560",
|
||||
"lastModified": "2024-11-27T18:15:18.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in Mojo in Google Chrome prior to 129.0.6668.89 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/368208152",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
79
README.md
79
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-27T17:00:21.063812+00:00
|
||||
2024-11-27T19:01:43.480293+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-27T16:59:20.303000+00:00
|
||||
2024-11-27T18:56:05.783000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271504
|
||||
271517
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-11862](CVE-2024/CVE-2024-118xx/CVE-2024-11862.json) (`2024-11-27T15:15:25.393`)
|
||||
- [CVE-2024-46054](CVE-2024/CVE-2024-460xx/CVE-2024-46054.json) (`2024-11-27T15:15:26.200`)
|
||||
- [CVE-2024-46055](CVE-2024/CVE-2024-460xx/CVE-2024-46055.json) (`2024-11-27T15:15:26.290`)
|
||||
- [CVE-2024-52307](CVE-2024/CVE-2024-523xx/CVE-2024-52307.json) (`2024-11-21T18:15:12.443`)
|
||||
- [CVE-2024-52951](CVE-2024/CVE-2024-529xx/CVE-2024-52951.json) (`2024-11-27T15:15:26.550`)
|
||||
- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2024-11-27T15:15:26.837`)
|
||||
- [CVE-2024-11160](CVE-2024/CVE-2024-111xx/CVE-2024-11160.json) (`2024-11-27T18:15:08.620`)
|
||||
- [CVE-2024-11860](CVE-2024/CVE-2024-118xx/CVE-2024-11860.json) (`2024-11-27T17:15:10.010`)
|
||||
- [CVE-2024-21703](CVE-2024/CVE-2024-217xx/CVE-2024-21703.json) (`2024-11-27T17:15:10.260`)
|
||||
- [CVE-2024-30896](CVE-2024/CVE-2024-308xx/CVE-2024-30896.json) (`2024-11-21T11:15:34.007`)
|
||||
- [CVE-2024-31976](CVE-2024/CVE-2024-319xx/CVE-2024-31976.json) (`2024-11-27T17:15:10.913`)
|
||||
- [CVE-2024-37816](CVE-2024/CVE-2024-378xx/CVE-2024-37816.json) (`2024-11-27T17:15:11.570`)
|
||||
- [CVE-2024-51228](CVE-2024/CVE-2024-512xx/CVE-2024-51228.json) (`2024-11-27T17:15:12.800`)
|
||||
- [CVE-2024-51367](CVE-2024/CVE-2024-513xx/CVE-2024-51367.json) (`2024-11-21T20:15:44.660`)
|
||||
- [CVE-2024-53254](CVE-2024/CVE-2024-532xx/CVE-2024-53254.json) (`2024-11-27T18:15:18.060`)
|
||||
- [CVE-2024-54003](CVE-2024/CVE-2024-540xx/CVE-2024-54003.json) (`2024-11-27T17:15:15.333`)
|
||||
- [CVE-2024-54004](CVE-2024/CVE-2024-540xx/CVE-2024-54004.json) (`2024-11-27T17:15:15.443`)
|
||||
- [CVE-2024-7025](CVE-2024/CVE-2024-70xx/CVE-2024-7025.json) (`2024-11-27T18:15:18.420`)
|
||||
- [CVE-2024-9369](CVE-2024/CVE-2024-93xx/CVE-2024-9369.json) (`2024-11-27T18:15:18.560`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `112`
|
||||
Recently modified CVEs: `30`
|
||||
|
||||
- [CVE-2024-50272](CVE-2024/CVE-2024-502xx/CVE-2024-50272.json) (`2024-11-27T15:54:32.213`)
|
||||
- [CVE-2024-50273](CVE-2024/CVE-2024-502xx/CVE-2024-50273.json) (`2024-11-27T15:58:02.730`)
|
||||
- [CVE-2024-50274](CVE-2024/CVE-2024-502xx/CVE-2024-50274.json) (`2024-11-27T15:59:35.733`)
|
||||
- [CVE-2024-50275](CVE-2024/CVE-2024-502xx/CVE-2024-50275.json) (`2024-11-27T16:16:53.177`)
|
||||
- [CVE-2024-50277](CVE-2024/CVE-2024-502xx/CVE-2024-50277.json) (`2024-11-27T15:30:55.840`)
|
||||
- [CVE-2024-50278](CVE-2024/CVE-2024-502xx/CVE-2024-50278.json) (`2024-11-27T16:00:23.223`)
|
||||
- [CVE-2024-50279](CVE-2024/CVE-2024-502xx/CVE-2024-50279.json) (`2024-11-27T16:01:09.817`)
|
||||
- [CVE-2024-50284](CVE-2024/CVE-2024-502xx/CVE-2024-50284.json) (`2024-11-27T16:20:08.917`)
|
||||
- [CVE-2024-50285](CVE-2024/CVE-2024-502xx/CVE-2024-50285.json) (`2024-11-27T15:31:58.063`)
|
||||
- [CVE-2024-50288](CVE-2024/CVE-2024-502xx/CVE-2024-50288.json) (`2024-11-27T15:32:45.147`)
|
||||
- [CVE-2024-50291](CVE-2024/CVE-2024-502xx/CVE-2024-50291.json) (`2024-11-27T15:16:30.260`)
|
||||
- [CVE-2024-50296](CVE-2024/CVE-2024-502xx/CVE-2024-50296.json) (`2024-11-27T15:24:16.020`)
|
||||
- [CVE-2024-50297](CVE-2024/CVE-2024-502xx/CVE-2024-50297.json) (`2024-11-27T15:25:04.810`)
|
||||
- [CVE-2024-50298](CVE-2024/CVE-2024-502xx/CVE-2024-50298.json) (`2024-11-27T15:25:38.023`)
|
||||
- [CVE-2024-50302](CVE-2024/CVE-2024-503xx/CVE-2024-50302.json) (`2024-11-27T15:27:00.187`)
|
||||
- [CVE-2024-52323](CVE-2024/CVE-2024-523xx/CVE-2024-52323.json) (`2024-11-27T15:15:26.377`)
|
||||
- [CVE-2024-53044](CVE-2024/CVE-2024-530xx/CVE-2024-53044.json) (`2024-11-27T16:40:06.963`)
|
||||
- [CVE-2024-53045](CVE-2024/CVE-2024-530xx/CVE-2024-53045.json) (`2024-11-27T16:41:06.737`)
|
||||
- [CVE-2024-53079](CVE-2024/CVE-2024-530xx/CVE-2024-53079.json) (`2024-11-27T16:59:20.303`)
|
||||
- [CVE-2024-53080](CVE-2024/CVE-2024-530xx/CVE-2024-53080.json) (`2024-11-27T16:57:47.947`)
|
||||
- [CVE-2024-53081](CVE-2024/CVE-2024-530xx/CVE-2024-53081.json) (`2024-11-27T16:56:35.143`)
|
||||
- [CVE-2024-53603](CVE-2024/CVE-2024-536xx/CVE-2024-53603.json) (`2024-11-27T16:15:14.583`)
|
||||
- [CVE-2024-53673](CVE-2024/CVE-2024-536xx/CVE-2024-53673.json) (`2024-11-27T16:15:14.783`)
|
||||
- [CVE-2024-53975](CVE-2024/CVE-2024-539xx/CVE-2024-53975.json) (`2024-11-27T15:15:26.923`)
|
||||
- [CVE-2024-9413](CVE-2024/CVE-2024-94xx/CVE-2024-9413.json) (`2024-11-27T16:15:15.180`)
|
||||
- [CVE-2024-11694](CVE-2024/CVE-2024-116xx/CVE-2024-11694.json) (`2024-11-27T17:15:09.703`)
|
||||
- [CVE-2024-11695](CVE-2024/CVE-2024-116xx/CVE-2024-11695.json) (`2024-11-27T17:15:09.867`)
|
||||
- [CVE-2024-29292](CVE-2024/CVE-2024-292xx/CVE-2024-29292.json) (`2024-11-27T17:15:10.383`)
|
||||
- [CVE-2024-33439](CVE-2024/CVE-2024-334xx/CVE-2024-33439.json) (`2024-11-27T17:15:11.093`)
|
||||
- [CVE-2024-37782](CVE-2024/CVE-2024-377xx/CVE-2024-37782.json) (`2024-11-27T17:15:11.320`)
|
||||
- [CVE-2024-39707](CVE-2024/CVE-2024-397xx/CVE-2024-39707.json) (`2024-11-27T18:15:09.190`)
|
||||
- [CVE-2024-44758](CVE-2024/CVE-2024-447xx/CVE-2024-44758.json) (`2024-11-27T18:15:13.007`)
|
||||
- [CVE-2024-44786](CVE-2024/CVE-2024-447xx/CVE-2024-44786.json) (`2024-11-27T17:15:11.767`)
|
||||
- [CVE-2024-46055](CVE-2024/CVE-2024-460xx/CVE-2024-46055.json) (`2024-11-27T18:15:13.300`)
|
||||
- [CVE-2024-49592](CVE-2024/CVE-2024-495xx/CVE-2024-49592.json) (`2024-11-27T17:15:12.093`)
|
||||
- [CVE-2024-50657](CVE-2024/CVE-2024-506xx/CVE-2024-50657.json) (`2024-11-27T17:15:12.323`)
|
||||
- [CVE-2024-50672](CVE-2024/CVE-2024-506xx/CVE-2024-50672.json) (`2024-11-27T17:15:12.563`)
|
||||
- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2024-11-27T18:15:17.760`)
|
||||
- [CVE-2024-51330](CVE-2024/CVE-2024-513xx/CVE-2024-51330.json) (`2024-11-27T17:15:12.973`)
|
||||
- [CVE-2024-5217](CVE-2024/CVE-2024-52xx/CVE-2024-5217.json) (`2024-11-27T18:56:05.783`)
|
||||
- [CVE-2024-52726](CVE-2024/CVE-2024-527xx/CVE-2024-52726.json) (`2024-11-27T17:15:13.463`)
|
||||
- [CVE-2024-5274](CVE-2024/CVE-2024-52xx/CVE-2024-5274.json) (`2024-11-27T18:12:51.690`)
|
||||
- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2024-11-27T17:15:14.017`)
|
||||
- [CVE-2024-52787](CVE-2024/CVE-2024-527xx/CVE-2024-52787.json) (`2024-11-27T17:15:14.397`)
|
||||
- [CVE-2024-53438](CVE-2024/CVE-2024-534xx/CVE-2024-53438.json) (`2024-11-27T17:15:14.647`)
|
||||
- [CVE-2024-53556](CVE-2024/CVE-2024-535xx/CVE-2024-53556.json) (`2024-11-27T17:15:14.917`)
|
||||
- [CVE-2024-53635](CVE-2024/CVE-2024-536xx/CVE-2024-53635.json) (`2024-11-27T18:15:18.130`)
|
||||
- [CVE-2024-53916](CVE-2024/CVE-2024-539xx/CVE-2024-53916.json) (`2024-11-27T17:15:15.127`)
|
||||
- [CVE-2024-5910](CVE-2024/CVE-2024-59xx/CVE-2024-5910.json) (`2024-11-27T17:23:02.910`)
|
||||
- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-11-27T17:21:35.077`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
307
_state.csv
307
_state.csv
@ -59865,7 +59865,7 @@ CVE-2013-2247,0,0,a10b84eda5fa7eb734e33c7cae421c90ff553a774cad253490f06fc9dce043
|
||||
CVE-2013-2248,0,0,db47a0c3293ec2dd123a04e49765beb89d0ea2754f09eedf09c35fe9e65138cc,2024-11-21T01:51:19.700000
|
||||
CVE-2013-2249,0,0,3a41ebb91ce6b776aa90b527ce2803bdfd5245ae24b381d393ad332646438452,2024-11-21T01:51:19.820000
|
||||
CVE-2013-2250,0,0,7f772082e082077e836901879b25669c10937d72ff53db0068dc96e1c715f558,2024-11-21T01:51:19.960000
|
||||
CVE-2013-2251,0,1,cb81077bc13f20bba05ab0f70fbfc515337e0f9a18d8bae8050184508c360e7b,2024-11-27T16:07:37.487000
|
||||
CVE-2013-2251,0,0,cb81077bc13f20bba05ab0f70fbfc515337e0f9a18d8bae8050184508c360e7b,2024-11-27T16:07:37.487000
|
||||
CVE-2013-2252,0,0,d504525db46d457241326a706b7130374206cc134c39d971c900a0f8d539cec8,2023-11-07T02:14:59.717000
|
||||
CVE-2013-2254,0,0,5cf5b5b856b10c47cba563b663ef5422a0ee73c3ec411af2cc3edbd10864e5ff,2024-11-21T01:51:20.260000
|
||||
CVE-2013-2255,0,0,9b42aa4a1aae53cddbe680e647a582ce681ee55342741072a9fb46fa64a1d2b7,2019-11-07T19:38:40.460000
|
||||
@ -140594,7 +140594,7 @@ CVE-2019-5474,0,0,5fb8feb22bb226f75e30a0f81a9ceafd2008685b8356c3bc7c4861b1ef4b94
|
||||
CVE-2019-5475,0,0,3a6d24ef29507296acaed35d9270cd4397f7d843d17351c2675f0e6a3549c663,2024-11-21T04:45:00.383000
|
||||
CVE-2019-5476,0,0,abe3109a12786693c64912679e7833957e834495913b2974aa811e3248283962,2024-11-21T04:45:00.500000
|
||||
CVE-2019-5477,0,0,6c998f73dc0b4e6543bf2793d4f9ad3c5d2236c0db7865fb21829a0d51b39d2b,2024-11-21T04:45:00.610000
|
||||
CVE-2019-5478,0,1,1e4dfbda2c81e9947ab6f2c2fe5cba6212b5bc721d1047ed0661206bc01e067b,2024-11-27T16:10:16.277000
|
||||
CVE-2019-5478,0,0,1e4dfbda2c81e9947ab6f2c2fe5cba6212b5bc721d1047ed0661206bc01e067b,2024-11-27T16:10:16.277000
|
||||
CVE-2019-5479,0,0,671a7db6dc33f75942b0c5411e1316fdfeb82e1059486f36fc2e732d8377a07a,2024-11-21T04:45:00.860000
|
||||
CVE-2019-5480,0,0,e221a380042cba5792ad957a8260eeb6873766dd55c7b03160b2dc867b701e04,2024-11-21T04:45:00.980000
|
||||
CVE-2019-5481,0,0,c03bb8b3aca95044cdb92030418c28a03cc1285d1b3ca9899b69cbd0fbcd4c1c,2024-11-21T04:45:01.090000
|
||||
@ -143852,7 +143852,7 @@ CVE-2019-9574,0,0,316deaf2d25dccba3bb59ef295fb782bb276fe0e2b66e887a55c66a6333ebc
|
||||
CVE-2019-9575,0,0,67810d9892a7c3ce763867a23c2c4244fe1f351cd72dcc6e4cfde299be61b43d,2024-11-21T04:51:53.153000
|
||||
CVE-2019-9576,0,0,6f89f15af8b515fc37e131c03aad13a1f9130f82a02809e91e9867f73ce3c2fa,2024-11-21T04:51:53.293000
|
||||
CVE-2019-9578,0,0,614fe324eb35dddb6670619017353a2558fc6306d0bdab852d7692fdb1783015,2024-11-21T04:51:53.433000
|
||||
CVE-2019-9579,0,1,7d18dae679cc7abd9e20cca009c87dfdd33ea8855fa30d3d4898d0d85c52317b,2024-11-27T16:07:37.487000
|
||||
CVE-2019-9579,0,0,7d18dae679cc7abd9e20cca009c87dfdd33ea8855fa30d3d4898d0d85c52317b,2024-11-27T16:07:37.487000
|
||||
CVE-2019-9580,0,0,c2b20fbc6ffeaad29aff28b3bf54c50bbbb738f9617b82666a1e1759bbc1cd5f,2024-11-21T04:51:53.740000
|
||||
CVE-2019-9581,0,0,77ff02a1ab8993034c150b4f9e140deae8964a2590beb0caf436bb6575040988,2024-11-21T04:51:53.887000
|
||||
CVE-2019-9582,0,0,dee06250f9c91d49e045abdac49e4895c92760eba6b2f0b563077292b5e6b3ef,2024-11-21T04:51:54.033000
|
||||
@ -212350,7 +212350,7 @@ CVE-2022-48501,0,0,2ce9e9f27e5624c5b9034e55cb8c3312f95af434a7619ff63718f6f73419a
|
||||
CVE-2022-48502,0,0,205af0b70d685f82d120f2bc75263f88a4640d5dd078fb9eb4b11185369dc047,2023-12-15T15:47:33.157000
|
||||
CVE-2022-48503,0,0,de270207fccacc5f4f1e232440dfc1cff9308bc2f2f94c8f081d05f3c0662e56,2023-08-19T00:42:35.700000
|
||||
CVE-2022-48504,0,0,8aa3ba2d182d2c9f12d05ddee2429ed23b5c2b04fb0651ec2097d7dffc13f9c4,2024-01-17T17:53:36.217000
|
||||
CVE-2022-48505,0,1,5f3cb211c9bfbabf92ef9a5f9f86fda7c50566ffef0a43661562171697633f57,2024-11-27T15:15:21.747000
|
||||
CVE-2022-48505,0,0,5f3cb211c9bfbabf92ef9a5f9f86fda7c50566ffef0a43661562171697633f57,2024-11-27T15:15:21.747000
|
||||
CVE-2022-48506,0,0,5b723496c06b917967011fa23c5ccc2c041a7eb4feaa05105a5551eb3d763c91,2023-07-07T15:05:08.913000
|
||||
CVE-2022-48507,0,0,348e337d6705da85f45d02609bf25a874e522c08ccf7c421db9201b576074a84,2023-07-12T19:20:32.090000
|
||||
CVE-2022-48508,0,0,0dce358aeb5fecd97f6cf0f63f6326be86af6ccdd95bb0454cbed733fa5a326b,2023-07-12T19:25:17.467000
|
||||
@ -213110,7 +213110,7 @@ CVE-2023-0159,0,0,0f6fd55c120318dcef07ff789a61b56634708ba05cdc2c5c90bc468904524a
|
||||
CVE-2023-0160,0,0,09a7027c859003cd69a1385cc1382972c3bab997f733f848d51a31fefb6fb5af,2023-11-07T03:59:46.343000
|
||||
CVE-2023-0161,0,0,2d565afc2a392d75d863e5fdf784db6696b2ebade8f447f4c56c766437755f79,2023-11-07T03:59:46.593000
|
||||
CVE-2023-0162,0,0,433d2d12790885c810d4fa03f75cc93897d0ad22856762b3207cc99a781813da,2023-11-07T03:59:47.037000
|
||||
CVE-2023-0163,0,1,5360902169a616d3b19bf9dc9faa9a1efedd78f45a7ac1ee57e19dbea2141dc4,2024-11-27T16:15:06.757000
|
||||
CVE-2023-0163,0,0,5360902169a616d3b19bf9dc9faa9a1efedd78f45a7ac1ee57e19dbea2141dc4,2024-11-27T16:15:06.757000
|
||||
CVE-2023-0164,0,0,56b714ab48298f96034c3fd165df9da114ff92034fa2e1a03fdc9d853978e2ec,2023-01-28T03:37:57.693000
|
||||
CVE-2023-0165,0,0,441c64ff3d96cd77f0a64b6021d8520baa90e0a13398043debff7990bd94d140,2023-11-07T03:59:47.380000
|
||||
CVE-2023-0166,0,0,a627a63e43014228e0118c8847152cec6a6ad0f5f2d9646ccac489fb22695346,2023-11-07T03:59:47.623000
|
||||
@ -215223,7 +215223,7 @@ CVE-2023-2057,0,0,165de0432b11bd80f63253d5d39a7d757e7675722f3efa39f94976905406f4
|
||||
CVE-2023-20570,0,0,d393e6ba70af93bcb0478ae4bc75964bab1735c72f61228d038d7f06a285faf7,2024-10-17T14:34:52.950000
|
||||
CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55e7c,2023-11-28T18:05:25.177000
|
||||
CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000
|
||||
CVE-2023-20575,0,1,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000
|
||||
CVE-2023-20575,0,0,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000
|
||||
CVE-2023-20578,0,0,e2aae81ed2b9fe5469de595a7d4e7bc7f74e6a04f637c722d6521fd97e68f844,2024-10-02T17:35:44.117000
|
||||
CVE-2023-20579,0,0,eea7d065ebbf11ab22ecb2642783f4f7c9c750dc05223a19e0db0ab258a097d2,2024-10-22T13:33:02.690000
|
||||
CVE-2023-2058,0,0,0c817ab6ea98d27963a0bdd6b94d4e88089c1ee4704beb5ad1d7199dfd901fb8,2024-05-17T02:22:37.783000
|
||||
@ -216086,7 +216086,7 @@ CVE-2023-21416,0,0,6dffe28851c91ee18ceb35579fd29bf8f9a56312fe83491e09cbc3b40f8af
|
||||
CVE-2023-21417,0,0,7d15ce5e3918d9a1b0fa653399fe5450bd6690398fe838839d69e00df17bc67a,2024-11-08T09:15:06.277000
|
||||
CVE-2023-21418,0,0,cc5acdfd8b96726f57b1246a5c5711431cf7fe80fee9f7109425e08575cd3d20,2024-11-08T09:15:06.453000
|
||||
CVE-2023-21419,0,0,45ff905fd2374d2820c27347193893ca16be1c6d6d9cda5e8f57ac5821898928,2023-11-07T04:06:35.657000
|
||||
CVE-2023-2142,0,0,1d48eaf915395dbd32516659db7c49e6d178aaca35f613a3e888c90805a8cb99,2024-11-26T12:15:18.307000
|
||||
CVE-2023-2142,0,1,9e24b63241ce49f973c1a3e9868e31c1395f0909f2faf381ff0f9fd71552f4ab,2024-11-27T17:15:05.200000
|
||||
CVE-2023-21420,0,0,d82fcd1e46c8dac8582cb3dd087d4ad4d83f57df0f5c8e21a51e9da90cd5441d,2023-02-17T20:21:02.333000
|
||||
CVE-2023-21421,0,0,733d09550bbe5bab0dce2921db71c5a7f0b9d54c2679b9cb2f268974bca05ad5,2023-02-21T16:04:38.190000
|
||||
CVE-2023-21422,0,0,2a2fed08bbd0ca52dd22841f89b331fa629b94088c7bced8d629c703c6c7e766,2023-02-21T16:13:30.213000
|
||||
@ -216496,7 +216496,7 @@ CVE-2023-2183,0,0,31d5869356e64f9f6c09d96859bf633a59be491e3337931ca8ab60cf8ede5f
|
||||
CVE-2023-21830,0,0,56670845d6f991f1ebb6f5e910a5362188b55e02c6144fabf835b6cedfd04d57,2024-01-17T15:15:10.047000
|
||||
CVE-2023-21831,0,0,40612f2418cf1d5fe8671c7086162c026d237b011a6f1859f6bfa53b791be71c,2023-01-24T19:26:29.237000
|
||||
CVE-2023-21832,0,0,ddcbe44e57fa0502c697c9e1375ef658e0ee7b48163117c323038199ead7199d,2024-09-17T14:35:03.410000
|
||||
CVE-2023-21833,0,1,e9236bab6dcd9d94ec0aa973c6e3f060cff0a360fc17c511477cd5d36e41be31,2024-11-27T16:32:16.700000
|
||||
CVE-2023-21833,0,0,e9236bab6dcd9d94ec0aa973c6e3f060cff0a360fc17c511477cd5d36e41be31,2024-11-27T16:32:16.700000
|
||||
CVE-2023-21834,0,0,b24d4ab7c8bbc799ac73336d479efcd8846b344534dfd23f5ee9e4c15311b2d8,2023-01-24T19:27:33.833000
|
||||
CVE-2023-21835,0,0,e438453c05d0ac37a8dbebcb8cd50ddd6e38670993d51927e38ec2ac6343ff57,2024-01-17T15:15:10.157000
|
||||
CVE-2023-21836,0,0,c3cecb219c742fa03a835e3e671e7b8a3e8841c61a101c801b316bd594712266,2023-01-24T19:28:01.793000
|
||||
@ -224090,7 +224090,7 @@ CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19
|
||||
CVE-2023-3132,0,0,52ab34552d4912b51189535960f33c42d601a676c80cf99d393d54a820deb2f0,2023-11-07T04:17:58.010000
|
||||
CVE-2023-31320,0,0,94626c9fd18f585c07331302f269c549777a5d34517f86a0946e1593aaaba7c1,2023-11-30T15:10:43.827000
|
||||
CVE-2023-3133,0,0,003d70726348f1765d3e8bbdc7b1fe8c778d5248156227efcf8dfd6079b65e42,2023-11-07T04:17:58.197000
|
||||
CVE-2023-31339,0,1,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000
|
||||
CVE-2023-31339,0,0,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000
|
||||
CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f557,2023-11-07T04:17:58.303000
|
||||
CVE-2023-31341,0,0,dd24cf83580387b35de43a1761935afa05605b69789156e33c8226af92558012,2024-08-14T02:07:05.410000
|
||||
CVE-2023-31346,0,0,baf70a7fbcbac8ee2109bb0ede410a1f9d8a0f3d16eca151ea162e0c8735e373,2024-10-24T15:22:58.270000
|
||||
@ -224682,7 +224682,7 @@ CVE-2023-3222,0,0,c8596742688ff4f4ce34cba08b6e87b6035a92b437604e378530583c1e50c7
|
||||
CVE-2023-32220,0,0,6598ffdb4be98a86b0968f5fa647835aeef5d462978de06a276b077763ea318a,2023-06-27T13:10:22.060000
|
||||
CVE-2023-32221,0,0,a8096a0f62324cd5523fa36c53eba2b8e14dda932ec9e56d4c5a1ef1e4f5bb61,2023-06-26T15:43:42.757000
|
||||
CVE-2023-32222,0,0,1bfffb24c78c59e1305082020bf9bea5ed51017055bcc40fffbb1d815e803550,2023-07-06T15:34:43.723000
|
||||
CVE-2023-32223,0,0,1d299b31efb215e705607460f6fb8a4876f1de490a061e8af9d146f08c171d0b,2023-07-06T15:33:10.737000
|
||||
CVE-2023-32223,0,1,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000
|
||||
CVE-2023-32224,0,0,93e7fba8e52643b83f12b886ffdbf97b296d423ce997520665ec6ec0f71b4ff0,2023-07-06T15:22:40.277000
|
||||
CVE-2023-32225,0,0,c772567b1dfc8e5c4d6aef4e997633a6cfcdcec2ddfba65ca031cfb7841ffea6,2023-08-03T20:46:02.310000
|
||||
CVE-2023-32226,0,0,06d72d0f875d49d0ca2e061add683154237421da117704275da69a03e0bb6b79,2023-08-03T20:49:39.170000
|
||||
@ -225067,7 +225067,7 @@ CVE-2023-32609,0,0,ad071be644dccdc78aa42759730857bc4ab0c387f7bceece5cb15f95cfcb0
|
||||
CVE-2023-3261,0,0,d804b7306842f46510218e49ca93d047e78fc5a76c2a2a392f7a191cee62ed7b,2023-08-25T06:15:08.990000
|
||||
CVE-2023-32610,0,0,4805853c5e520c87eda77ebca6be0653ac150f2f5318e9b6843d232507ac587c,2023-07-07T14:55:04.910000
|
||||
CVE-2023-32611,0,0,74fa864c3b0f5c42d618b0d11300f9fbf0cea9afed15dc7a7a5c9e543c558545,2023-11-27T14:15:07.713000
|
||||
CVE-2023-32612,0,1,48946b265a891ee8ddf06d198ba3756972109e4c356751ada0c06a41b3d405d2,2024-11-27T16:15:09.290000
|
||||
CVE-2023-32612,0,0,48946b265a891ee8ddf06d198ba3756972109e4c356751ada0c06a41b3d405d2,2024-11-27T16:15:09.290000
|
||||
CVE-2023-32613,0,0,f496d4da1cd36ddca38689cd4e5a8ec5895c11b2c4638bc17410c3085a39d4be,2023-07-06T23:38:05.257000
|
||||
CVE-2023-32614,0,0,a784f55ff10684ff0982e590005de61c2c9f48fb842d9b782491c6446577db06,2023-09-26T14:44:23.657000
|
||||
CVE-2023-32615,0,0,091c09c0f2f1329fa59c5332eabb3854daaef309b38ebf1cc8ec5795c893e63f,2023-09-08T17:23:31.060000
|
||||
@ -225688,7 +225688,7 @@ CVE-2023-33293,0,0,aaba53a5bd9606bf2b9ebb8058082a8f9430e4008d1677208c38c998718dc
|
||||
CVE-2023-33294,0,0,512a0d802975effda47c9841c790a12db90febf30fa9787f8f1a643f5cf3846e,2023-05-30T15:34:50.353000
|
||||
CVE-2023-33295,0,0,0ee9ce4891974281a8070ba77006ee5030b6c04f0180cf6fd5145d66b4777c49,2024-01-30T14:29:36.033000
|
||||
CVE-2023-33297,0,0,5d8e3948533e1bd4647cd5fad08a17be514bf07df635b4c9679a8f82e9ab850f,2023-11-07T04:14:49.637000
|
||||
CVE-2023-33298,0,0,2fe7f04c1eab70841d9fb3a8eea01477b543419ec1b2f605e6f740214038e540,2023-08-02T15:40:35.783000
|
||||
CVE-2023-33298,0,1,e6807bb120ed528f6bb6a498cf3fde144b5e9bbb47f26a66ce325564392ac08a,2024-11-27T17:15:06.230000
|
||||
CVE-2023-33299,0,0,38c7cbf55f696320e4e04abc250ce3163757543b746f0dff08506567861aa8c4,2023-11-07T04:14:50.620000
|
||||
CVE-2023-3330,0,0,b62b544dba0e5d46d39d4efdc53e6faa4883ab9f19a259cae52d022b97d4c1b2,2023-08-28T01:15:09.643000
|
||||
CVE-2023-33301,0,0,39458e4f7d0ff50d22acdf1137008f959df75babe7c5e030172d43b12d7ea61d,2023-11-07T04:14:50.840000
|
||||
@ -225847,7 +225847,7 @@ CVE-2023-33567,0,0,6f8070242f0b52f35467ff6fa5967af9712ffd9e8a51a555b37438dd5b9a2
|
||||
CVE-2023-33568,0,0,cf9d1d831d747564c354f3c033b6b23993269e0b62f44d9030fcb701e027e8cd,2023-06-23T19:22:43.680000
|
||||
CVE-2023-33569,0,0,4fadfbd06c77e9caa9b26894eaee099724d33670c303b72aa0401d276bd24594,2023-06-13T15:17:31.487000
|
||||
CVE-2023-3357,0,0,600350ce8cb54d3cd472e5c55fbe0564cc7d45cade0900caff64a5b44a256810,2023-07-06T17:45:06.373000
|
||||
CVE-2023-33570,0,0,9f2846f85e3716647871afc65ae46c02368acab156056b82c3fabd74ffe466ea,2023-07-10T15:53:05.990000
|
||||
CVE-2023-33570,0,1,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726f78,2024-11-27T17:15:06.687000
|
||||
CVE-2023-3358,0,0,12e8757394b39f03915a68fdab7c57a08d2dd1a06e5f61eff9ec3fcd54fa4870,2023-07-06T16:54:55.357000
|
||||
CVE-2023-33580,0,0,b896a7d26da1c4a99df4635960a09e8061b54d8b1045b27b06cfff27cfdd8bba,2024-05-14T13:14:08.210000
|
||||
CVE-2023-33584,0,0,a1f261b95d9793aa4dc94db58be1fdcb1978b62cb448302d23854fb5713a34a5,2024-08-01T13:43:52.090000
|
||||
@ -226065,7 +226065,7 @@ CVE-2023-33901,0,0,b52f1f5caa1a71ed7a3660093cc4ff625ef81a8e57103b9446f0f02ece8bc
|
||||
CVE-2023-33902,0,0,1f72efc992411950d4d63edd663b409a9ade365735b2775ffa85420fe4c927ca,2023-07-18T22:36:36.170000
|
||||
CVE-2023-33903,0,0,bf0c0fe257ca77843a093950bb190c96a208d3b02a2bcd1d680822b64738667d,2023-07-20T01:36:29.007000
|
||||
CVE-2023-33904,0,0,6e8a8301f0e61237f25896ca44140a1d4f7967d97bc04b883674717a6a107b2d,2023-07-20T01:35:11.450000
|
||||
CVE-2023-33905,0,1,3882940bca949272cdc0ab5501ce367e34d2e67106917040374664dcaec9f19a,2024-11-27T16:15:09.610000
|
||||
CVE-2023-33905,0,0,3882940bca949272cdc0ab5501ce367e34d2e67106917040374664dcaec9f19a,2024-11-27T16:15:09.610000
|
||||
CVE-2023-33906,0,0,b1fda6b482ccab08c128646d84ad63d5547dd2cdde95cd6c340c4b80c19d5152,2023-08-09T20:54:32.290000
|
||||
CVE-2023-33907,0,0,0896c19ffe04302fbacdfd4d930e7c33a3432c132a214e05ee871524bc106cec,2023-08-10T14:34:54.647000
|
||||
CVE-2023-33908,0,0,b3731c5f6811d32e1adc6f5d15e5d493af862305160e34132f162715c6497284,2023-08-10T14:35:29.667000
|
||||
@ -226703,9 +226703,9 @@ CVE-2023-34650,0,0,46b1353cbe03e4c1538a32beef8802bfa42c2c9854cc529e5731b6e7d7182
|
||||
CVE-2023-34651,0,0,5959bd81f87f39b6a741a557c197abf7cfde59289b5de1b43248b87a5096a9b2,2023-07-06T15:20:42.360000
|
||||
CVE-2023-34652,0,0,ff947ab860e6120f91e1ca4194d5faab5f86cfd204d0f2ad3e79e4f916272714,2023-11-14T16:36:13.640000
|
||||
CVE-2023-34654,0,0,f66c971439f3d88246860b7a3a652cadf1cbfd9e1ca8fe442fb861d6292aa4c2,2023-07-10T13:59:13.440000
|
||||
CVE-2023-34656,0,1,e8b18d7acdb5258f3011a99a900cbe8bfa5fd0f3cc49dbc6fa2a9cf2299236ff,2024-11-27T15:15:23.147000
|
||||
CVE-2023-34656,0,0,e8b18d7acdb5258f3011a99a900cbe8bfa5fd0f3cc49dbc6fa2a9cf2299236ff,2024-11-27T15:15:23.147000
|
||||
CVE-2023-34657,0,0,9dd1a5c53b7f66fcfe0cf1eaa53a71cc0b26fea430cf6b68cbb074f7dc660b05,2023-06-26T16:26:30.057000
|
||||
CVE-2023-34658,0,1,7e79f39e62fba74cd049d08fa473d9537b089c09510e99356df90f937c1a76b3,2024-11-27T15:15:23.273000
|
||||
CVE-2023-34658,0,0,7e79f39e62fba74cd049d08fa473d9537b089c09510e99356df90f937c1a76b3,2024-11-27T15:15:23.273000
|
||||
CVE-2023-34659,0,0,ba101ae9a9a6d722b772e73640680e94739c59a5da3aff941bdbae8a23637381,2023-06-23T21:25:28.887000
|
||||
CVE-2023-3466,0,0,6a83488758d15c147555e0ff29ed8d720348c008e9c4c1415429f70acbabdc3e,2023-07-28T14:54:11.013000
|
||||
CVE-2023-34660,0,0,3fdae79286adb78105725fa2e0c187c138f0137808c41ee9fccc354d7a02987e,2023-06-23T21:24:20.913000
|
||||
@ -226741,7 +226741,7 @@ CVE-2023-34755,0,0,385ddc4387bd2c5755a94a75b434dd76b08bdc268129c955503dc27a0b6fe
|
||||
CVE-2023-34756,0,0,67d55fee96d1b51f968d7da1697b8e11bb66c530139f57a3e78910d0e6a0d8f6,2023-06-17T03:06:43.303000
|
||||
CVE-2023-34758,0,0,9eccc6d37c9b088248c8aca33c8aa8875c2b998c800435e2964ecc87b1b82cbf,2023-09-12T19:39:31.640000
|
||||
CVE-2023-3476,0,0,cd288e67143a643dc4edcffdb16b25dd34c6d270b5aedde5ea5a4f03a4a84a3a,2024-05-17T02:27:31.387000
|
||||
CVE-2023-34761,0,1,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000
|
||||
CVE-2023-34761,0,0,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000
|
||||
CVE-2023-3477,0,0,5d5692f0acf1fc9588440776a9873fa73da1512d4616d99905805ac7fd5efa4b,2024-05-17T02:27:31.490000
|
||||
CVE-2023-3478,0,0,62ca4275c323b059845d588a6c85dcf0f11942cddcb4326cfb1cfa138f569fcf,2024-05-17T02:27:31.600000
|
||||
CVE-2023-3479,0,0,d48f4215051968fbed645a509aadd86b9d129cff011d403b6f18727633f3065c,2023-07-06T18:50:34.680000
|
||||
@ -227346,7 +227346,7 @@ CVE-2023-35826,0,0,5e43d2b4a6463cc57618d690e3eaa3dcf112fab46da37bf46c4f66930757d
|
||||
CVE-2023-35827,0,0,d5267cc8e5ff57341217408bcba76fb2af5741e775cc4e40c4f4580831015c03,2024-01-11T21:15:10.180000
|
||||
CVE-2023-35828,0,0,13a84b4d359f0a7a20df266cb8df7b222b35808e6042143114f3f2068e115b32,2024-10-21T16:35:06.073000
|
||||
CVE-2023-35829,0,0,d781a1cc18b7b1a4d19b03bc7b61ddc2d06f09ba27700d26ab277831cd36e00e,2024-02-09T19:13:28.167000
|
||||
CVE-2023-35830,0,0,09da6f1a46d1525d1cd80ca8705371b308db2bbf6135eddd66de8da296e8cbe7,2023-07-11T19:25:28.647000
|
||||
CVE-2023-35830,0,1,f9ec7bc37d75084b8f9adb19576e522ba0ca1eac41387899bac0f91ba3a89a7b,2024-11-27T17:15:08.783000
|
||||
CVE-2023-35833,0,0,b59e0c3549ed415537c60ab0c56af9b7ea9f99c585e3da19da7e86a887a60c5c,2024-08-02T17:15:47.460000
|
||||
CVE-2023-35835,0,0,87bd672c840261ccc99c9c2d2a50acb2ac1b47f706fdd52b69110ddc2fb55b32,2024-02-06T14:23:41.733000
|
||||
CVE-2023-35836,0,0,25cc78294cec9506c0321746b6fae3d5b11d667157223d96a0d913704cd8ac87,2024-10-28T19:35:06.850000
|
||||
@ -239335,15 +239335,15 @@ CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661
|
||||
CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000
|
||||
CVE-2023-52343,0,0,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000
|
||||
CVE-2023-52344,0,0,2746ce7294f9dd645e743c241e219d96848cd26c1bbf2a1d45c502d1d5d069c5,2024-11-08T22:35:05.047000
|
||||
CVE-2023-52345,0,1,9b0f7e720892a08eb597995237cf0041e77eb1cbbac52014266e50a5c094fa0b,2024-11-27T16:22:10.590000
|
||||
CVE-2023-52345,0,0,9b0f7e720892a08eb597995237cf0041e77eb1cbbac52014266e50a5c094fa0b,2024-11-27T16:22:10.590000
|
||||
CVE-2023-52346,0,0,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000
|
||||
CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000
|
||||
CVE-2023-52348,0,0,a78f5b9171ee88d03834f0039162b0633f8a198afe00aea2be4a4f4c2fbe83ff,2024-11-19T22:35:02.473000
|
||||
CVE-2023-52349,0,1,c2009aaf4ca39771753ae2450dc22d33c3a41dcb584ed395b9b9fb6df6e40ace,2024-11-27T16:22:27.920000
|
||||
CVE-2023-52349,0,0,c2009aaf4ca39771753ae2450dc22d33c3a41dcb584ed395b9b9fb6df6e40ace,2024-11-27T16:22:27.920000
|
||||
CVE-2023-5235,0,0,9971c38b51da44a2e87e1667cbf8153f9719c021bb80ee285f53405f1ee2831d,2024-01-11T19:37:47.563000
|
||||
CVE-2023-52350,0,1,c42ba7ccf7dc545c6f58ac385eeaea84aeaa885e9881355285e36150928c5107,2024-11-27T16:22:44.777000
|
||||
CVE-2023-52350,0,0,c42ba7ccf7dc545c6f58ac385eeaea84aeaa885e9881355285e36150928c5107,2024-11-27T16:22:44.777000
|
||||
CVE-2023-52351,0,0,e0d15ad66cd3476de6fb03f1fe5885ce689d572ce17666a9de7d2d70a4aa296a,2024-11-05T17:35:04.513000
|
||||
CVE-2023-52352,0,1,900de2da6904bba832006209e250a5947f381893191628f8a88415275fc9389c,2024-11-27T16:23:32.247000
|
||||
CVE-2023-52352,0,0,900de2da6904bba832006209e250a5947f381893191628f8a88415275fc9389c,2024-11-27T16:23:32.247000
|
||||
CVE-2023-52353,0,0,c85321a66aa40615f097e7c4b005042b61f142e80160f23edcb6164f859777c0,2024-01-29T15:53:20.917000
|
||||
CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb691b,2024-01-29T16:56:40.830000
|
||||
CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000
|
||||
@ -239514,7 +239514,7 @@ CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbf
|
||||
CVE-2023-52533,0,0,fb87020ed7c8b21a162b2fc06e0a8d5d89d218140fec502190c9fad28717e9e6,2024-10-25T21:35:02.863000
|
||||
CVE-2023-52534,0,0,7dc9d1c01e69a34629a396cfd8c7fbd7a37026a7d21c7c1a7e3e6c2396f067b0,2024-11-05T20:35:13.253000
|
||||
CVE-2023-52535,0,0,a8b46149ce833cf00e265bd878fbc4e9f6f9152b7344f1759d13bc7224de07eb,2024-09-06T22:35:00.460000
|
||||
CVE-2023-52536,0,1,b70e3b9bf9057c72bfb5ecc0e7da9092e715abaaf98d3f4896e1b5f49ed6c77e,2024-11-27T16:23:42.923000
|
||||
CVE-2023-52536,0,0,b70e3b9bf9057c72bfb5ecc0e7da9092e715abaaf98d3f4896e1b5f49ed6c77e,2024-11-27T16:23:42.923000
|
||||
CVE-2023-52537,0,0,2559d90b1b1794296f22fc0badef4074c5581bcf37f52502d595b11857600810,2024-08-01T14:35:02.953000
|
||||
CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000
|
||||
CVE-2023-52539,0,0,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92b49,2024-08-15T17:35:01.503000
|
||||
@ -243454,6 +243454,7 @@ CVE-2024-11150,0,0,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf
|
||||
CVE-2024-11154,0,0,9c2f24e5b2c6bb0a1acf0aba74e4e593d635b23a924a1df484d24fc0dc0da623,2024-11-20T14:15:17.500000
|
||||
CVE-2024-11159,0,0,40c853846b1f5260f445d8196c4d1f6aec01e81777411e7a4839d765e27bfc1a,2024-11-26T22:15:17.720000
|
||||
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
|
||||
CVE-2024-11160,1,1,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000
|
||||
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
|
||||
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
|
||||
CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000
|
||||
@ -243746,24 +243747,24 @@ CVE-2024-11678,0,0,e780942a86d65f83e2cb7cc5d04e0a3676e4919574029bbf616d3d9c8bbb8
|
||||
CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000
|
||||
CVE-2024-11680,0,0,e59e07fcd0f2caeb9f7525587364f8cd5a94ad91992448a2d5730a3a3fe6f61e,2024-11-26T10:15:04.540000
|
||||
CVE-2024-1169,0,0,a43d6b50f47e310e039f1575550f9d1fe159a31a77f5a57027ebd3dc489ff540,2024-03-07T13:52:27.110000
|
||||
CVE-2024-11691,0,1,7a53223ef1bbb0483180a0674c22f2ddfbf700b35cfbc415f7446deb28e06f8a,2024-11-27T16:15:12.330000
|
||||
CVE-2024-11692,0,1,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff9d0,2024-11-27T16:15:12.530000
|
||||
CVE-2024-11693,0,1,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000
|
||||
CVE-2024-11694,0,0,a6a2c4a535474da2ca567947004ffbecb7b16bb81183cc508d3c10dd53c61627,2024-11-26T14:15:18.943000
|
||||
CVE-2024-11695,0,0,53a60a574530fe77be7f2d369026b93d8b41334f9e92c8be10e90eb5d3f867f3,2024-11-26T14:15:19.040000
|
||||
CVE-2024-11691,0,0,7a53223ef1bbb0483180a0674c22f2ddfbf700b35cfbc415f7446deb28e06f8a,2024-11-27T16:15:12.330000
|
||||
CVE-2024-11692,0,0,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff9d0,2024-11-27T16:15:12.530000
|
||||
CVE-2024-11693,0,0,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000
|
||||
CVE-2024-11694,0,1,8fab8f6682482c80a046d7efcb5d62937e3f2364960b2f04726b7a87f7e40748,2024-11-27T17:15:09.703000
|
||||
CVE-2024-11695,0,1,923949ea70ffb3960535c924daeac21d36cf8875477a4ac90cebfaddff787cf9,2024-11-27T17:15:09.867000
|
||||
CVE-2024-11696,0,0,7ab5e962b1864924c9e631a223b7224b844fe8e800da1f91cb3d221520b39912,2024-11-26T14:15:19.143000
|
||||
CVE-2024-11697,0,1,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000
|
||||
CVE-2024-11698,0,1,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
|
||||
CVE-2024-11699,0,1,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
|
||||
CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000
|
||||
CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
|
||||
CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
|
||||
CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000
|
||||
CVE-2024-11700,0,1,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000
|
||||
CVE-2024-11701,0,1,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,1,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11700,0,0,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000
|
||||
CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11703,0,0,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000
|
||||
CVE-2024-11704,0,1,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
|
||||
CVE-2024-11705,0,1,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
|
||||
CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
|
||||
CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
|
||||
CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000
|
||||
CVE-2024-11708,0,1,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000
|
||||
CVE-2024-11708,0,0,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000
|
||||
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
|
||||
@ -243789,7 +243790,8 @@ CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c0
|
||||
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
|
||||
CVE-2024-1185,0,0,a60268243ee8d3dcf82e9c185863da8146ac8c49246dc744f2663ef723b40081,2024-06-26T15:15:19.220000
|
||||
CVE-2024-1186,0,0,b01b3a0462d1f7a1a803ca8f493a6219bd71eed48ddf8d36021e6ca2af3e1767,2024-05-17T02:35:17.110000
|
||||
CVE-2024-11862,1,1,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000
|
||||
CVE-2024-11860,1,1,8f2a0fbf19059c6c3c8a5836cc661c7d3bd0f5aaad2633071ac71b0a6a9605c7,2024-11-27T17:15:10.010000
|
||||
CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000
|
||||
CVE-2024-1187,0,0,3fcd8394fe17b53cc850805fb2de93d28c688f808245fcfde96cd99bc903bbab,2024-05-17T02:35:17.220000
|
||||
CVE-2024-1188,0,0,6744ad4ad1ed370f6488ba44c137b6887619ea6ff1a51ee5f48fd0aec905e09b,2024-05-17T02:35:17.327000
|
||||
CVE-2024-1189,0,0,b364c59b0d964a14f93b1e1b61d95f98aeb338db4ea440a29e1d18c3cc27c9d5,2024-05-17T02:35:17.427000
|
||||
@ -245268,26 +245270,26 @@ CVE-2024-20899,0,0,1ea5d3c975e5b8e190a2ecdcdb2ffe2594326badefc6428838ae53a3dbe04
|
||||
CVE-2024-2090,0,0,fd740e48f3f1bf206125be718e7b11b445beb9b28db87f1795fcc38f51fc8ca6,2024-08-01T12:42:36.933000
|
||||
CVE-2024-20900,0,0,dd950b876d70624a07b7af1c0b796b44690939cd5e1be274d843ac0163ab8cf9,2024-07-05T17:11:51.040000
|
||||
CVE-2024-20901,0,0,5f9dc6d7e5ec003b4ebac42377482eb7121a0918aab2f40a5dfa15c434211c61,2024-07-05T17:12:08.827000
|
||||
CVE-2024-20903,0,1,f1711e5664886d226fb1c0bbb4ffdbab32f883746b840f88fa51affe34bab471,2024-11-27T16:32:13.240000
|
||||
CVE-2024-20903,0,0,f1711e5664886d226fb1c0bbb4ffdbab32f883746b840f88fa51affe34bab471,2024-11-27T16:32:13.240000
|
||||
CVE-2024-20904,0,0,2825f92c3d915e6e0f0061d68d884ba2126601eadca29a19874902f94d6a74f0,2024-01-20T18:42:09.760000
|
||||
CVE-2024-20905,0,0,5cd75db3ce8e0b4ca7eaa1e088847333bbe8ccce7b8db3715e7ea413af7cfaa2,2024-11-13T16:35:09.767000
|
||||
CVE-2024-20906,0,0,bd717d71015dc5a5435b2e0a0577a3000709ef823cb8b0c048c75367a9de0fe0,2024-01-20T18:41:53.127000
|
||||
CVE-2024-20907,0,1,6cdedde57bcc7effd23429e9b920893b06b04420594036116dcd9d8e33dd747a,2024-11-27T16:32:05.720000
|
||||
CVE-2024-20907,0,0,6cdedde57bcc7effd23429e9b920893b06b04420594036116dcd9d8e33dd747a,2024-11-27T16:32:05.720000
|
||||
CVE-2024-20908,0,0,f48ebbb13e10a919d3724d0ac546c6a4149d41b2169d483ec898b46dd4b06c2b,2024-01-20T18:41:36.717000
|
||||
CVE-2024-20909,0,1,5c37ae12db791f7a5f17a4b4a68da1e4d0037c5574297a109dcc5e84b0bb1e46,2024-11-27T16:32:02.417000
|
||||
CVE-2024-20909,0,0,5c37ae12db791f7a5f17a4b4a68da1e4d0037c5574297a109dcc5e84b0bb1e46,2024-11-27T16:32:02.417000
|
||||
CVE-2024-2091,0,0,63435fbeca7c80879cf4e6a4a5624c08d1bd49b5b35309f8f6c212636e73c360,2024-03-28T12:42:56.150000
|
||||
CVE-2024-20910,0,0,29a700282ac3c23f3ad340e38887f2bcd46589faa3e2b225d7b99161e42d9cd5,2024-01-23T19:42:19.473000
|
||||
CVE-2024-20911,0,1,6afa3f4a97fc1808bab0faf3dd86308a391d08a34d4e09627b3ccd7fd05b9c74,2024-11-27T16:31:58.250000
|
||||
CVE-2024-20911,0,0,6afa3f4a97fc1808bab0faf3dd86308a391d08a34d4e09627b3ccd7fd05b9c74,2024-11-27T16:31:58.250000
|
||||
CVE-2024-20912,0,0,e4df4470bb555b4c07efdd1d6d27dc7847c1f66a5ee925c32c1f7f702b610f9b,2024-01-23T19:42:12.067000
|
||||
CVE-2024-20913,0,1,c65d7e17dc913591eb1991838888914f80deb6a0856863b8facc2f59c78ce3e4,2024-11-27T16:31:55.040000
|
||||
CVE-2024-20913,0,0,c65d7e17dc913591eb1991838888914f80deb6a0856863b8facc2f59c78ce3e4,2024-11-27T16:31:55.040000
|
||||
CVE-2024-20914,0,0,5fcc977754d6cec15612003989da66d699b4d03dfca24398bd8f26b0bc5e1c40,2024-01-20T18:41:05.227000
|
||||
CVE-2024-20915,0,0,48635e3f21fd78d508f12f5ee88f082d01cbe44bc77759d7404c6d47358e2a52,2024-08-29T20:35:59.457000
|
||||
CVE-2024-20916,0,0,fa25cd13f1d5003a9402bf8b2824fbe225d800b2b894fa3cbba3f37644aef975,2024-01-20T18:40:50.423000
|
||||
CVE-2024-20917,0,1,88063e310fdfa917e1b9d40d36604d772b4b7af571f1dc922f92be5dbb09229a,2024-11-27T16:31:52.210000
|
||||
CVE-2024-20917,0,0,88063e310fdfa917e1b9d40d36604d772b4b7af571f1dc922f92be5dbb09229a,2024-11-27T16:31:52.210000
|
||||
CVE-2024-20918,0,0,1f8b1c5c8f27f2bbdd35361436e307f2eb12e55549bc074707cb3c0855b1a1a5,2024-02-15T03:18:09.407000
|
||||
CVE-2024-20919,0,0,f32b38df4be8d406125d20b81a0a36fea655b3c9d080af0ec28f80feefd5b5f5,2024-02-20T19:51:05.510000
|
||||
CVE-2024-2092,0,0,a316801cc7dde85dd006820e50100cb21585dd08f10e55e1c16e6ff68463ad93,2024-07-23T17:14:41.963000
|
||||
CVE-2024-20920,0,1,2c991406da6ae70f9f6e513bfb6b67a971b2ae86d52ed2be7c0d293385e86314,2024-11-27T16:07:37.487000
|
||||
CVE-2024-20920,0,0,2c991406da6ae70f9f6e513bfb6b67a971b2ae86d52ed2be7c0d293385e86314,2024-11-27T16:07:37.487000
|
||||
CVE-2024-20921,0,0,f0986262b45e86fd23744f106528549eb9a9e0900294f36e0f89aa1af025a1b7,2024-11-05T16:35:11.067000
|
||||
CVE-2024-20922,0,0,9dd883413b1ca45dc7c138e52101d4c22dd7eba0af5f925a999c067fb6713829,2024-02-02T17:36:17.387000
|
||||
CVE-2024-20923,0,0,a934b00b98c73c6c804cd41561d4b37cf6c513d57c870a7d7f13953b985bc1d6,2024-02-20T19:51:05.510000
|
||||
@ -245314,7 +245316,7 @@ CVE-2024-20942,0,0,138cd75b35d318f86006ff20a4b3b9623740d177f3b79d48f82f62a57936d
|
||||
CVE-2024-20943,0,0,c893b8e5b6540c97f966b32b9f9335406bebc3fc0fcebe2041732294e6d7a03c,2024-03-12T14:56:31.537000
|
||||
CVE-2024-20944,0,0,455869c6c4218017ed3052a739e20e96a49e80460128731305c47837c36967b5,2024-01-20T18:33:55
|
||||
CVE-2024-20945,0,0,c9a7660aedc8461cf49457ff4506ab3c831d2d70e2229c352a5ff786b482ec6f,2024-11-12T19:35:05.470000
|
||||
CVE-2024-20946,0,1,df3034f1fad61ed84baa5888e8cbfac598e430fe48771252310c446f30669d8c,2024-11-27T16:07:37.487000
|
||||
CVE-2024-20946,0,0,df3034f1fad61ed84baa5888e8cbfac598e430fe48771252310c446f30669d8c,2024-11-27T16:07:37.487000
|
||||
CVE-2024-20947,0,0,0a2e4d20648a1d06c26162eb28926c103f307728c3ed375718ac4fd8da927958,2024-02-20T19:51:05.510000
|
||||
CVE-2024-20948,0,0,12e9e8a4ba5f0d4d5a3ec7d1b0d3211c79a9e2d1eccf174b1829b4aa21974fac,2024-01-20T18:33:19.560000
|
||||
CVE-2024-20949,0,0,a2a9e2bb1ecc05c1ef53d90345f7a09727513acaa3e67eae682ecc91fa3b450c,2024-02-20T19:51:05.510000
|
||||
@ -245324,9 +245326,9 @@ CVE-2024-20952,0,0,ee7670e91d33e31160e61df658911f1f989f8a5d8151285943b5c8af49a8a
|
||||
CVE-2024-20953,0,0,46cccee01b693cef9c9646cac2e0fd84e85cf6e77caa7c1816c2e535a0c5b0f7,2024-02-20T19:51:05.510000
|
||||
CVE-2024-20954,0,0,57a73413d0e3acca6ee4a29e076cb030f710aa01f467c3e7bf98fabced0d9135,2024-04-17T12:48:31.863000
|
||||
CVE-2024-20955,0,0,3ef5989170bb1b485154f91fb8591afd4cb71f457c0fd734cc9a4a4e8a7d2a89,2024-02-09T02:26:25.517000
|
||||
CVE-2024-20956,0,1,78d82b52430d3bd5c36b5846b4138f4e211c247ebf893f680bcabf1f8af52ffe,2024-11-27T16:37:04.993000
|
||||
CVE-2024-20956,0,0,78d82b52430d3bd5c36b5846b4138f4e211c247ebf893f680bcabf1f8af52ffe,2024-11-27T16:37:04.993000
|
||||
CVE-2024-20957,0,0,e93e5f63896ca6389639f28c6915c0999c46dc6fe6eef70f268dfc725114f0ba,2024-01-20T18:31:43.287000
|
||||
CVE-2024-20958,0,1,efd3fe866dd6ac978ea48339b2dd74375e92e3a0c2e0492d39bdbdca54bbfc34,2024-11-27T16:37:02.780000
|
||||
CVE-2024-20958,0,0,efd3fe866dd6ac978ea48339b2dd74375e92e3a0c2e0492d39bdbdca54bbfc34,2024-11-27T16:37:02.780000
|
||||
CVE-2024-20959,0,0,65f727318b2446b38daf72eb41cf2e9b4f6d535e05783839d548b8b026463599,2024-01-20T18:31:27.417000
|
||||
CVE-2024-20960,0,0,010febbf2de2eeb15e19a661a3f5025a963aa8a6df342253dcc279cae1da13d8,2024-02-20T19:51:05.510000
|
||||
CVE-2024-20961,0,0,1cad69d2442213fdaa659cc4c85bbaf05d35d026075b85bdaedf813ff8fbfb75,2024-02-02T17:36:27.917000
|
||||
@ -245350,53 +245352,53 @@ CVE-2024-20977,0,0,3be8e35326984bf735a6f48b20180da3c518283b741d291831fba90f42ec9
|
||||
CVE-2024-20978,0,0,7d695c16c538753b41958698ebecaeec17620ace692b6d6e92b6bcee0dbccbeb,2024-03-01T23:19:21.650000
|
||||
CVE-2024-20979,0,0,d57b35e6e7dde3fdff99cf29258a92afa9b590a25cc9c2305fb3a5b7f5bc7a9e,2024-01-20T18:30:34.090000
|
||||
CVE-2024-2098,0,0,796ed6f6c420691b7d2e05f9f2ef2be6fc42adb0713e4dfd37258c395c790683,2024-06-13T18:36:09.010000
|
||||
CVE-2024-20980,0,1,abde6ecab0a76c34cdd09b34c97cd8350525628bcbe8debc08de3a0bc115e8fa,2024-11-27T16:37:00.523000
|
||||
CVE-2024-20980,0,0,abde6ecab0a76c34cdd09b34c97cd8350525628bcbe8debc08de3a0bc115e8fa,2024-11-27T16:37:00.523000
|
||||
CVE-2024-20981,0,0,738d5bf858a7d236d8ca36c0f60d69759a2053056726d2d11c77fa47893de0b7,2024-02-02T17:24:34.507000
|
||||
CVE-2024-20982,0,1,f87c28901aeea0e5dd67035df643da47399d17872e527cadc5978ee3fcb668f7,2024-11-27T16:36:58.220000
|
||||
CVE-2024-20982,0,0,f87c28901aeea0e5dd67035df643da47399d17872e527cadc5978ee3fcb668f7,2024-11-27T16:36:58.220000
|
||||
CVE-2024-20983,0,0,56700ee75dc4016890aa5a0cc71b96eed25889824b578010696ffc98258279e1,2024-02-02T17:27:04.743000
|
||||
CVE-2024-20984,0,1,59ddd7988f4c87f18f76eebdeb0d759036445e926bdcb1515ffe9fa87d03cb03,2024-11-27T16:36:55.957000
|
||||
CVE-2024-20984,0,0,59ddd7988f4c87f18f76eebdeb0d759036445e926bdcb1515ffe9fa87d03cb03,2024-11-27T16:36:55.957000
|
||||
CVE-2024-20985,0,0,d0d044412617729c46a8268c921735bb458fb0fe9ac60eac01f501aeb8cc31ab,2024-02-02T17:27:12.127000
|
||||
CVE-2024-20986,0,1,6087dcb3b90fcb6ff9e682c89a6638ce3a29264af0095732d921291f4a22d8c3,2024-11-27T16:36:53.537000
|
||||
CVE-2024-20986,0,0,6087dcb3b90fcb6ff9e682c89a6638ce3a29264af0095732d921291f4a22d8c3,2024-11-27T16:36:53.537000
|
||||
CVE-2024-20987,0,0,5674babb479962fb00a1daf77527ad0fcadf7deb1dc2f2e21cb99ae36a705876,2024-01-20T18:30:16.877000
|
||||
CVE-2024-20989,0,1,713513baa3464a81e99a0bb8e30a7b8198551d5abd7c99dd135f5dff2572c1b8,2024-11-27T16:36:51.003000
|
||||
CVE-2024-20990,0,1,dcd7d39a0ffd7652482a915949bb7e9b369d2287680215279ee5a4bac8701548,2024-11-27T16:36:48.747000
|
||||
CVE-2024-20989,0,0,713513baa3464a81e99a0bb8e30a7b8198551d5abd7c99dd135f5dff2572c1b8,2024-11-27T16:36:51.003000
|
||||
CVE-2024-20990,0,0,dcd7d39a0ffd7652482a915949bb7e9b369d2287680215279ee5a4bac8701548,2024-11-27T16:36:48.747000
|
||||
CVE-2024-20991,0,0,94f0f80e95be2725620dad0c6e5443bdd60acc699a66c91ac7c7279a95dd6e81,2024-08-21T15:35:02.493000
|
||||
CVE-2024-20992,0,1,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000
|
||||
CVE-2024-20993,0,1,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000
|
||||
CVE-2024-20994,0,1,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000
|
||||
CVE-2024-20995,0,1,01229a4133ced8daa32eab0323077d3b0640a9df62354c85893871947ef19493,2024-11-27T16:37:10.153000
|
||||
CVE-2024-20992,0,0,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000
|
||||
CVE-2024-20993,0,0,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000
|
||||
CVE-2024-20994,0,0,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000
|
||||
CVE-2024-20995,0,0,01229a4133ced8daa32eab0323077d3b0640a9df62354c85893871947ef19493,2024-11-27T16:37:10.153000
|
||||
CVE-2024-20996,0,0,fcd2292738608c647a4c519832797e84b76f4989a7b5a3e0a96bd0b4bdb3583b,2024-10-17T17:09:42.857000
|
||||
CVE-2024-20997,0,1,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000
|
||||
CVE-2024-20997,0,0,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000
|
||||
CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000
|
||||
CVE-2024-20999,0,1,8bcb3141c521c3778b23e1f32939058ac6a444098cc39214296b0751762d0919,2024-11-27T16:36:14.473000
|
||||
CVE-2024-21000,0,1,5046a94a4249afec3f785dd51126c5c8b28718404eba20f1156f4ea76f53b597,2024-11-27T16:36:11.717000
|
||||
CVE-2024-21001,0,1,416215f17e5ee7b6fd02766a3fe7252d7bc684b3302f3dd4a683e3f6400abefa,2024-11-27T16:36:08.477000
|
||||
CVE-2024-20999,0,0,8bcb3141c521c3778b23e1f32939058ac6a444098cc39214296b0751762d0919,2024-11-27T16:36:14.473000
|
||||
CVE-2024-21000,0,0,5046a94a4249afec3f785dd51126c5c8b28718404eba20f1156f4ea76f53b597,2024-11-27T16:36:11.717000
|
||||
CVE-2024-21001,0,0,416215f17e5ee7b6fd02766a3fe7252d7bc684b3302f3dd4a683e3f6400abefa,2024-11-27T16:36:08.477000
|
||||
CVE-2024-21002,0,0,7f5c86fdcff82f93225a75a7e73262c6da92b927148218de7deb268aa0c73332,2024-10-31T16:35:04.067000
|
||||
CVE-2024-21003,0,0,90a06bec930da30c9a00d7e245d95aa433119de047332777b49810dcb3c38582,2024-04-26T09:15:09.823000
|
||||
CVE-2024-21004,0,0,74d75259359885feb58e67b784c7f0a497e76221cd93421bf881ed958c2f234c,2024-10-31T15:35:24.047000
|
||||
CVE-2024-21005,0,0,3a0033bb21374d9be43479eee698b2830f41d8d2a9d0eb123f27394e5de66035,2024-04-26T09:15:10.030000
|
||||
CVE-2024-21006,0,1,b66db085bb99aa21625f1949517478b22e3fbdd786db1c25a0e1b28fb3539492,2024-11-27T16:36:05.623000
|
||||
CVE-2024-21006,0,0,b66db085bb99aa21625f1949517478b22e3fbdd786db1c25a0e1b28fb3539492,2024-11-27T16:36:05.623000
|
||||
CVE-2024-21007,0,0,318b973189a970b7ce55f9b439b79912feb01731965e9cf4d9ebb34a06f5b815,2024-08-21T15:35:03.230000
|
||||
CVE-2024-21008,0,1,79c8ede7039b9ab861b81e9c13133e11dccfa6b5370f6dc01cdafe6899c0cddb,2024-11-27T16:35:56.737000
|
||||
CVE-2024-21009,0,1,db6fbd7d8accf1ab224f2cb103b25e5731e70907122a90a7ad837151b5ba25a4,2024-11-27T16:35:46.023000
|
||||
CVE-2024-21008,0,0,79c8ede7039b9ab861b81e9c13133e11dccfa6b5370f6dc01cdafe6899c0cddb,2024-11-27T16:35:56.737000
|
||||
CVE-2024-21009,0,0,db6fbd7d8accf1ab224f2cb103b25e5731e70907122a90a7ad837151b5ba25a4,2024-11-27T16:35:46.023000
|
||||
CVE-2024-2101,0,0,f64308a9cf2bd395190830ff176a54d77164cf0faaa20d92ded300e0efbb1c30,2024-07-03T01:53:00.530000
|
||||
CVE-2024-21010,0,1,8da34c621e00a1a6bc6945f4463b7f169614eb79b8866a30350c977ef7474dc1,2024-11-27T16:35:37.613000
|
||||
CVE-2024-21010,0,0,8da34c621e00a1a6bc6945f4463b7f169614eb79b8866a30350c977ef7474dc1,2024-11-27T16:35:37.613000
|
||||
CVE-2024-21011,0,0,3db0dfc4f6d9c0cb1b0594a3fea44420c1ced4ee3ac62b2d2aac28313dd8e801,2024-04-26T09:15:10.240000
|
||||
CVE-2024-21012,0,0,8bb45639916260fb5e290a2144a7289c54983d68a6c83fb494eebd2fbc3b4755,2024-11-13T18:35:25.333000
|
||||
CVE-2024-21013,0,1,f4d7d3d63419f5b65aab5308aa286df618fde3314df1470f82e6a12508e6afd5,2024-11-27T16:35:24.993000
|
||||
CVE-2024-21014,0,1,fd5fd906db48dbc401dceb2950611dc7ac548d204c7b6b0610339c911785edb1,2024-11-27T16:35:17.047000
|
||||
CVE-2024-21015,0,1,f2cd4f3aca6f87b172581e8a6cb037de57f64674ebf070f97b0bb58b0c8cb942,2024-11-27T16:35:00.387000
|
||||
CVE-2024-21016,0,1,7b06a7a101f5499528a019b1bce8248ab4b671498b173ccf1a81511b3be4f699,2024-11-27T16:31:47.750000
|
||||
CVE-2024-21017,0,1,8d6faacd84399cea88d3d3cedcc5018fe820d93d841edc59c022cc994cbb2e6e,2024-11-27T16:31:43.653000
|
||||
CVE-2024-21018,0,1,2e1340b3db5c35ae5b2a9e8c5e499329e51751a7e10154f4c68c14c57ad498d8,2024-11-27T16:31:31.260000
|
||||
CVE-2024-21019,0,1,d73ddbd97890db99ed4a0927678658e890f5a9ffc1913db8deba2f5f417025f4,2024-11-27T16:31:28.057000
|
||||
CVE-2024-21013,0,0,f4d7d3d63419f5b65aab5308aa286df618fde3314df1470f82e6a12508e6afd5,2024-11-27T16:35:24.993000
|
||||
CVE-2024-21014,0,0,fd5fd906db48dbc401dceb2950611dc7ac548d204c7b6b0610339c911785edb1,2024-11-27T16:35:17.047000
|
||||
CVE-2024-21015,0,0,f2cd4f3aca6f87b172581e8a6cb037de57f64674ebf070f97b0bb58b0c8cb942,2024-11-27T16:35:00.387000
|
||||
CVE-2024-21016,0,0,7b06a7a101f5499528a019b1bce8248ab4b671498b173ccf1a81511b3be4f699,2024-11-27T16:31:47.750000
|
||||
CVE-2024-21017,0,0,8d6faacd84399cea88d3d3cedcc5018fe820d93d841edc59c022cc994cbb2e6e,2024-11-27T16:31:43.653000
|
||||
CVE-2024-21018,0,0,2e1340b3db5c35ae5b2a9e8c5e499329e51751a7e10154f4c68c14c57ad498d8,2024-11-27T16:31:31.260000
|
||||
CVE-2024-21019,0,0,d73ddbd97890db99ed4a0927678658e890f5a9ffc1913db8deba2f5f417025f4,2024-11-27T16:31:28.057000
|
||||
CVE-2024-2102,0,0,063af9520b1c53909e19a4c543dd4e89e92c8386c428fad7438fe729761d527f,2024-08-01T13:49:41.380000
|
||||
CVE-2024-21020,0,1,50d0bb623e906d57fffc4a003271c5d8f0fddd70537c5dfcb50f0a25abb536c4,2024-11-27T16:31:24.850000
|
||||
CVE-2024-21020,0,0,50d0bb623e906d57fffc4a003271c5d8f0fddd70537c5dfcb50f0a25abb536c4,2024-11-27T16:31:24.850000
|
||||
CVE-2024-21021,0,0,64827289a059e7d96255e1e78c913ce22eb2f8c3fa061b78e9bca939974553d5,2024-11-12T20:35:07.200000
|
||||
CVE-2024-21022,0,1,64a8139f2b1ea0b3fb6aa0981f9b2d6c01e88bcc85d0046c50f193b99ee667ae,2024-11-27T16:31:22.270000
|
||||
CVE-2024-21022,0,0,64a8139f2b1ea0b3fb6aa0981f9b2d6c01e88bcc85d0046c50f193b99ee667ae,2024-11-27T16:31:22.270000
|
||||
CVE-2024-21023,0,0,927d06c9c846b66c85686832a7d8ba13dd57e57adc9551190b6fa4a25e207424,2024-10-31T15:35:24.947000
|
||||
CVE-2024-21024,0,1,8d2a827a192a1b383481a84dfca9c6be9d11ea475bb8e64e40bd9d2b1883bc26,2024-11-27T16:31:18.080000
|
||||
CVE-2024-21025,0,1,1547ab83b9d1273d90e9f7e7ea464b636c7853cb15c5a10ed0cb04cf6a3f20f7,2024-11-27T16:31:12.720000
|
||||
CVE-2024-21024,0,0,8d2a827a192a1b383481a84dfca9c6be9d11ea475bb8e64e40bd9d2b1883bc26,2024-11-27T16:31:18.080000
|
||||
CVE-2024-21025,0,0,1547ab83b9d1273d90e9f7e7ea464b636c7853cb15c5a10ed0cb04cf6a3f20f7,2024-11-27T16:31:12.720000
|
||||
CVE-2024-21026,0,0,bb4bd2aeeb520f557a235cf2c384bcd9afa22628dbaa611ed6aada649ea8a800,2024-04-19T17:34:46.467000
|
||||
CVE-2024-21027,0,0,274a137cb4ff0ddef3882d5e5a8152cdc087240750de0d4f3f112c1f3ffe5baa,2024-04-19T17:34:33.557000
|
||||
CVE-2024-21028,0,0,e746c963a4f2579f4ff27a79a26bb542b668ecc162136be7b39dea5679186530,2024-04-19T17:34:24.897000
|
||||
@ -245404,20 +245406,20 @@ CVE-2024-21029,0,0,beed54640564c6e877b911608d3aaede78a6c68fba401ae9c1d7333ce2ffd
|
||||
CVE-2024-2103,0,0,56728262bbb9eac431f64527baa684f066aa452f31fabe1cfef087df0e0cc830,2024-04-04T16:33:06.610000
|
||||
CVE-2024-21030,0,0,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000
|
||||
CVE-2024-21031,0,0,47da12e0a06b82feddde80c8f657eef9ceaa2d7cc969db6255ee7d3fcecb3433,2024-04-19T17:31:50.307000
|
||||
CVE-2024-21032,0,1,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000
|
||||
CVE-2024-21033,0,1,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000
|
||||
CVE-2024-21034,0,1,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000
|
||||
CVE-2024-21035,0,1,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000
|
||||
CVE-2024-21032,0,0,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000
|
||||
CVE-2024-21033,0,0,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000
|
||||
CVE-2024-21034,0,0,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000
|
||||
CVE-2024-21035,0,0,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000
|
||||
CVE-2024-21036,0,0,03772262febbe1802cb4e5be8d6e22eef6f08655ecf5ce6b4ff42f4682cb919e,2024-11-07T17:35:12.117000
|
||||
CVE-2024-21037,0,1,275560440d01a5b66d9569c94ab21c078479a2c2079e4d03585c66b053e0c227,2024-11-27T16:29:55.693000
|
||||
CVE-2024-21038,0,1,0c4ce653fce6696c66d05a2ec71f4cc6c038a3fb76934f714b2f35fe6ba08e3c,2024-11-27T16:29:46.520000
|
||||
CVE-2024-21039,0,1,e342c1121fe5cdcd8db5f3285db4e19fc9896de8dc0cd2c0a7bba13348c2b710,2024-11-27T16:29:33.007000
|
||||
CVE-2024-21037,0,0,275560440d01a5b66d9569c94ab21c078479a2c2079e4d03585c66b053e0c227,2024-11-27T16:29:55.693000
|
||||
CVE-2024-21038,0,0,0c4ce653fce6696c66d05a2ec71f4cc6c038a3fb76934f714b2f35fe6ba08e3c,2024-11-27T16:29:46.520000
|
||||
CVE-2024-21039,0,0,e342c1121fe5cdcd8db5f3285db4e19fc9896de8dc0cd2c0a7bba13348c2b710,2024-11-27T16:29:33.007000
|
||||
CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000
|
||||
CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000
|
||||
CVE-2024-21042,0,1,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000
|
||||
CVE-2024-21042,0,0,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000
|
||||
CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
|
||||
CVE-2024-21044,0,1,d6a124edde02ccad4eb1662b040fc85bdd4c8af9652fa58273abc93194a1774e,2024-11-27T16:29:16.483000
|
||||
CVE-2024-21045,0,1,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000
|
||||
CVE-2024-21044,0,0,d6a124edde02ccad4eb1662b040fc85bdd4c8af9652fa58273abc93194a1774e,2024-11-27T16:29:16.483000
|
||||
CVE-2024-21045,0,0,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000
|
||||
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
|
||||
CVE-2024-21047,0,0,2bc5d014697923ab8f9837dde11c202b28c9635338e1429d1d2707b2d34f9717,2024-04-26T09:15:10.500000
|
||||
CVE-2024-21048,0,0,0740c7f75430ed630e47ca8538d7654b46da3ebd0ee4b5951500b7c74c4ef781,2024-04-17T12:48:31.863000
|
||||
@ -246035,6 +246037,7 @@ CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9f
|
||||
CVE-2024-21690,0,0,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000
|
||||
CVE-2024-21697,0,0,407288a03ff597a3a4bb57b1cda7709829bc688e494abd24fba6a6fe97ece8ff,2024-11-19T21:56:45.533000
|
||||
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-21703,1,1,08d952643f27d625e1a34daf2a14cf006a2e6417e07616e354cd3cfc64f9f245,2024-11-27T18:15:08.720000
|
||||
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
|
||||
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
|
||||
CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000
|
||||
@ -246222,7 +246225,7 @@ CVE-2024-21918,0,0,742b173c7dcca847586b3391775dbdbe8cf845cb3792806068b182f51bb9a
|
||||
CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eedea1,2024-03-26T17:09:53.043000
|
||||
CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2193,0,0,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000
|
||||
CVE-2024-21937,0,1,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000
|
||||
CVE-2024-21937,0,0,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000
|
||||
CVE-2024-21938,0,0,6c315d3024c09d7a50812151c8cd7326a5235cfaa6042ecac74aa5983aa83d44,2024-11-13T17:01:58.603000
|
||||
CVE-2024-21939,0,0,a5aa41911721c7484fc24860471dbac89d11ee960d3fa252f5bfcdc696021b47,2024-11-13T17:01:58.603000
|
||||
CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000
|
||||
@ -250174,10 +250177,10 @@ CVE-2024-27307,0,0,f03537f290162378c6385f978df4ca2a996f710091ddafa0723c8d56d920a
|
||||
CVE-2024-27308,0,0,bb9781c241ee836cf4e778ece7a5b280cfcdc753da6cdee2e11b89f24c113b5e,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27309,0,0,18416b733d6ac4edeb2af296593281a1b6deae1e8a8956ba324c7cabf7f2e6ba,2024-07-09T16:22:21.487000
|
||||
CVE-2024-2731,0,0,e2947075d94f67fb0f516acc3c39fdd257b6a53a447028317b4bd1e85304e9ee,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27310,0,1,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000
|
||||
CVE-2024-27310,0,0,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000
|
||||
CVE-2024-27311,0,0,3441ff0e665052a7fb86a3589fae526973b499df9f488dcbbb9db7b9aaef9973,2024-07-18T14:09:40.923000
|
||||
CVE-2024-27312,0,0,44ad9df6373c37d335fa110f1ccf73e3064c9d69081ddac9cedf52edbde67366,2024-11-25T15:14:53.217000
|
||||
CVE-2024-27313,0,1,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000
|
||||
CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000
|
||||
CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000
|
||||
CVE-2024-27315,0,0,db9af09723fb011b8182b6b5bab4f2fc859959fe0ca51aeffec2764eb351e8f1,2024-10-03T13:15:14.710000
|
||||
CVE-2024-27316,0,0,102105139fcfc876580c7206fba57ae17631b403098c79f616e87bd492a5d28f,2024-08-01T13:48:22.100000
|
||||
@ -251602,7 +251605,7 @@ CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734a
|
||||
CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
|
||||
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
|
||||
CVE-2024-29292,0,0,0fdfa2ea68ccb090b32a91a7c432b205558469835d8c95bb4767b1d71d198096,2024-11-20T21:15:07.040000
|
||||
CVE-2024-29292,0,1,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000
|
||||
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
|
||||
CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000
|
||||
CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000
|
||||
@ -252763,6 +252766,7 @@ CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7e
|
||||
CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000
|
||||
CVE-2024-30890,0,0,0f772534d2f25b8992cdb2b7f1614a9b1113da3447c153b6e6f711939289b199,2024-11-04T15:35:31.227000
|
||||
CVE-2024-30891,0,0,396e17014fd3175e72a9c0a6ece22b5363c9ba81b8e8ea154f79fa53fb440cca,2024-08-19T20:35:15.447000
|
||||
CVE-2024-30896,1,1,1c2a8f6103b169f4b2e6374c12c4e276b072d21b33e30de613363d5fad056629,2024-11-27T17:15:10.650000
|
||||
CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b613,2024-05-17T02:39:43.047000
|
||||
CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000
|
||||
CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000
|
||||
@ -253533,6 +253537,7 @@ CVE-2024-31972,0,0,f9241b9f06175c965ad284b5c2136f1f7f8e377bc5d6b68f231b17656172b
|
||||
CVE-2024-31973,0,0,c3480f733abb332799fc1f07ef143103e9de0ed931d381c037c7e12d5a9eb78d,2024-11-01T12:57:03.417000
|
||||
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
|
||||
CVE-2024-31975,0,0,eb324a6bedd4b93ad2ac0707b00b07dfad728d7f39959adabc810317189eae1a,2024-11-04T17:15:07.030000
|
||||
CVE-2024-31976,1,1,86650fc9453e252df3074d41108b57b4ccd00ba612e3f0e59342d64ff7c647e6,2024-11-27T17:15:10.913000
|
||||
CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000
|
||||
CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000
|
||||
@ -254605,7 +254610,7 @@ CVE-2024-33435,0,0,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e
|
||||
CVE-2024-33436,0,0,4b7aad63b1a9d18447e5bf42251db2f590710ce8a67d312a75dbe09e1f3c4107,2024-05-01T13:02:20.750000
|
||||
CVE-2024-33437,0,0,98a2b6e10245b112bb331b45bcb3f30a0dabc9110f63c643d94fcc31a61289bb,2024-08-01T13:51:56.957000
|
||||
CVE-2024-33438,0,0,5149b18a46d53268b7670d8b6f23e45b58f0f7e28bd1fbf2d1e49eff1651e3a5,2024-08-01T13:51:57.143000
|
||||
CVE-2024-33439,0,0,cff768f052081c25bf2badebc993fe13750f42919c9e40af177c06d148312b2d,2024-11-20T19:15:06.010000
|
||||
CVE-2024-33439,0,1,865bf8d936802ea495b622b9117733561ad82697688560b335ffdd7376c09f21,2024-11-27T17:15:11.093000
|
||||
CVE-2024-3344,0,0,70bfed73bbd8c0224afca425b004f1e6ab3832350ac16bb40ba0f3295e2c6f92,2024-04-11T12:47:44.137000
|
||||
CVE-2024-33442,0,0,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000
|
||||
CVE-2024-33443,0,0,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000
|
||||
@ -256607,7 +256612,7 @@ CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d
|
||||
CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000
|
||||
CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000
|
||||
CVE-2024-36036,0,0,f9fb5156304c57a40757d765df5364ac35b8d4db65c442212813c00360bf9d28,2024-10-31T16:35:15.723000
|
||||
CVE-2024-36037,0,1,bbb4c699fc36319f520212a04780263c6b55d12c3ae95dd593b38199e7090fa1,2024-11-27T16:24:06.917000
|
||||
CVE-2024-36037,0,0,bbb4c699fc36319f520212a04780263c6b55d12c3ae95dd593b38199e7090fa1,2024-11-27T16:24:06.917000
|
||||
CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000
|
||||
CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db70a,2024-06-24T07:15:15.230000
|
||||
CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45cbd,2024-08-01T17:39:33.907000
|
||||
@ -257854,7 +257859,7 @@ CVE-2024-3777,0,0,e0440f2946e797118e4ada7698a04ee3805fb04d32040b7b7160eb68c53547
|
||||
CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000
|
||||
CVE-2024-37779,0,0,6e59c8529157382fe2940395deacc91d059ba345fa934b0466ef9ccea286d30e,2024-09-27T14:35:03.517000
|
||||
CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000
|
||||
CVE-2024-37782,0,0,d461addc826c790b5ea01cf6ea01ba779736eb40ca4e76b9dfe7f83c82bb3505,2024-11-22T18:15:17.230000
|
||||
CVE-2024-37782,0,1,e9f210e7f42c046d75d0b9f25adae39b4e1c61a1f888965bb1e0dfce89ee0e10,2024-11-27T17:15:11.320000
|
||||
CVE-2024-37783,0,0,690ccf7acd78cda1161cbf595242a736f04b460c1e840c1328388e07392e0b09,2024-11-22T19:15:06.653000
|
||||
CVE-2024-3779,0,0,1a47972c633583c7bae072fbb56beacb2d6111c4ffff8b051890256727892c2f,2024-08-21T17:38:16.057000
|
||||
CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000
|
||||
@ -257868,6 +257873,7 @@ CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662
|
||||
CVE-2024-37802,0,0,d144fe0e12cc92285cf5a45a291aa1263aaf8f5127240eb000b3aa69fb216783,2024-07-19T14:52:41.287000
|
||||
CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
|
||||
CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37816,1,1,5f0590f8d9670dace00b0c5f7e18119e01619fc887f047676757312ab9c71d8d,2024-11-27T17:15:11.570000
|
||||
CVE-2024-37818,0,0,da6a1f43a8aacd614a81a2f93f80ef733846858e0f1e4aaa3583b19a43f2a1df,2024-10-04T19:15:16.273000
|
||||
CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c9b,2024-04-15T19:12:25.887000
|
||||
CVE-2024-37820,0,0,fa0bbe561377b7b439a8d7f261288bdc816d9d647e91a5782129fd4223c1afcd,2024-07-15T22:15:02.850000
|
||||
@ -259384,7 +259390,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8
|
||||
CVE-2024-39702,0,0,4321dd362ed1e1bbd0d5793b212806c9239d130a489ced0fce340c598b116527,2024-11-26T18:15:19.193000
|
||||
CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
|
||||
CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000
|
||||
CVE-2024-39707,0,0,a705426f80da8c6a5e48f3d7c38b841a2fbb1f6e4435784c498bc1aedae1b179,2024-11-15T13:58:08.913000
|
||||
CVE-2024-39707,0,1,b27b038ddc6cdbabee843db40a21ee56e96ad76d049f977d89dc316ee0e970a2,2024-11-27T18:15:09.190000
|
||||
CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000
|
||||
CVE-2024-39709,0,0,7412cab9f5821072dc4804eb5785dcfaaaebeae4cb15f2e4d1fcbff88c86a4c1,2024-11-23T21:15:14.647000
|
||||
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
|
||||
@ -262680,7 +262686,7 @@ CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c
|
||||
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
|
||||
CVE-2024-44756,0,0,1681a92faf0c64d1815b4eb0c3be7b2fb90b774755ff6087ed8af6c8466588d9,2024-11-19T21:57:56.293000
|
||||
CVE-2024-44757,0,0,afa0b64a73ad54cd2de86e32a9739915e3b6a820b2485a49a35c06cde9462d98,2024-11-19T21:57:56.293000
|
||||
CVE-2024-44758,0,0,4eb170325393d50fb6b1ac0e145b87ee1b40fc3092e830f797f0944442dc9070,2024-11-18T17:11:56.587000
|
||||
CVE-2024-44758,0,1,0f87f6fd64cd3ee32a39610ab34845e08d64c79e468acaf8dd1c0a562c908710,2024-11-27T18:15:13.007000
|
||||
CVE-2024-44759,0,0,74017e4a120ba116b0925bdf36ae176aa3414e2488b714ba0e8a87153b7d0ab6,2024-11-18T17:11:56.587000
|
||||
CVE-2024-44760,0,0,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000
|
||||
CVE-2024-44761,0,0,7f624c83820070ebb06f16b5a059f7fe8de7d537067fdcab263416bb3a81ba98,2024-11-18T18:15:06.160000
|
||||
@ -262693,7 +262699,7 @@ CVE-2024-44777,0,0,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93c
|
||||
CVE-2024-44778,0,0,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000
|
||||
CVE-2024-44779,0,0,8defc64818470b86a1ed4aeff7b1d178fe09f0b4135b6d31847cdbae6f118693,2024-09-03T18:33:51.297000
|
||||
CVE-2024-4478,0,0,dc98d997f68b2645bb873c7bfe328abb5688a66731db128671fb26c7a0667c8b,2024-05-16T13:03:05.353000
|
||||
CVE-2024-44786,0,0,70a4aaf90a125c1220210d1796014250f26869aff96d84958413523d6b27534e,2024-11-22T17:15:08.380000
|
||||
CVE-2024-44786,0,1,2132a56021bb3deb06dc29a9b690059b9000abfdaaee4a4a267842e4b43f4e57,2024-11-27T17:15:11.767000
|
||||
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
|
||||
CVE-2024-44793,0,0,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000
|
||||
CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000
|
||||
@ -263298,7 +263304,7 @@ CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec42
|
||||
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
|
||||
CVE-2024-45689,0,0,6e124b6ad87a6e953df96f9e4b72e7f165b5e26f7ae6e42a154710793d167512,2024-11-20T20:35:10.157000
|
||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||
CVE-2024-45690,0,1,5723764df58775bb65cffc56ee9068e121c35610c7033bd0cf1fbf999d9fcfa1,2024-11-27T15:15:26.050000
|
||||
CVE-2024-45690,0,0,5723764df58775bb65cffc56ee9068e121c35610c7033bd0cf1fbf999d9fcfa1,2024-11-27T15:15:26.050000
|
||||
CVE-2024-45691,0,0,6cf0734b3b1bbfe46d94206888f2657e4fd0103a6560ef66f8d239ce88dda949,2024-11-20T20:35:10.377000
|
||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||
CVE-2024-45693,0,0,8326a6a6c02d5129a5009d67c10554cd90e2c8aefe000e24bf1668842bfb6519,2024-10-17T20:21:11.913000
|
||||
@ -263498,8 +263504,8 @@ CVE-2024-46047,0,0,57a3435cb7b6e94de5fb698161c585c7b5ce0f8c27f8db901c567ec5b0f81
|
||||
CVE-2024-46048,0,0,8b386e1ce8db1651262779289df0cde97cc0d4c50d015509acb4f6ce2f921783,2024-09-20T00:35:54.187000
|
||||
CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb874,2024-09-20T00:39:30.443000
|
||||
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
|
||||
CVE-2024-46054,1,1,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000
|
||||
CVE-2024-46055,1,1,2539fbd3e2bc1252940303bca4727c6bfd8b3714627bdc8680589bdb379c4a50,2024-11-27T15:15:26.290000
|
||||
CVE-2024-46054,0,0,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000
|
||||
CVE-2024-46055,0,1,fb3ab0f0de94860a6cfab293110c9c5563c53335293fdfc002812d3e3e3d5f7a,2024-11-27T18:15:13.300000
|
||||
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
|
||||
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
||||
CVE-2024-46076,0,0,3fbd69f65c02bb3814cc49722b87c72edbd2a4b678c2a211eca1ecb2ed16e13e,2024-10-10T12:57:21.987000
|
||||
@ -265486,7 +265492,7 @@ CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9
|
||||
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
|
||||
CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
|
||||
CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000
|
||||
CVE-2024-49592,0,0,c703ea90112e8bcf8bd25130b1345e2b105fcdfcaded2bbe98ade97b760a4e11,2024-11-18T17:11:56.587000
|
||||
CVE-2024-49592,0,1,2c7b7fb1be7fc5fd754e82efd0fe5851f47e43e4cc7b8ec1fd6fcc2811eb81ce,2024-11-27T17:15:12.093000
|
||||
CVE-2024-49593,0,0,0790debc03c6d685a8ce9800bcaf05d3a2d51714ee514270485ccb66f44467d5,2024-11-18T19:35:04.960000
|
||||
CVE-2024-49595,0,0,b23fd80b60ac647f05027d85537df31a89ac4114f3b437db461e9c48fece4a35,2024-11-26T03:15:06.093000
|
||||
CVE-2024-49596,0,0,59e71c8fcc49b547b7105baadcec16161b1e8926ccc4ef3d091ff33a55518621,2024-11-26T03:15:06.570000
|
||||
@ -265987,8 +265993,8 @@ CVE-2024-50184,0,0,cb05ed3cbf4320d0b6539ece765682947c4e4dd01f32eb669ed72a68abce5
|
||||
CVE-2024-50185,0,0,595738e2988b3e2c25066779b5891f8412116ebeed8b468125ac9343052411c0,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50186,0,0,dc12eba11107a35c5b7f7b4fe757f427daaaa77d7848dff65a7950111c79ee69,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50187,0,0,9e77a6b02e0f58e2042e30bc8e5136053f0f67b10b4b28bd21fa9c5ec3735ee6,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50188,0,1,a0f9600f02706c4c4c201ae8fa928c2340849d4ff2323579e41ceb41b53346b3,2024-11-27T16:14:31.370000
|
||||
CVE-2024-50189,0,1,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc8bd,2024-11-27T16:16:12.133000
|
||||
CVE-2024-50188,0,0,a0f9600f02706c4c4c201ae8fa928c2340849d4ff2323579e41ceb41b53346b3,2024-11-27T16:14:31.370000
|
||||
CVE-2024-50189,0,0,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc8bd,2024-11-27T16:16:12.133000
|
||||
CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845da,2024-08-21T13:43:03.670000
|
||||
CVE-2024-50190,0,0,2962a78db58b5eff7333f4f943b026fd8630dab04243ae02339e9f901787f7d2,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50191,0,0,a6db09c765b7d3d35c26042d26dc5603def4093fc6f320ce46df0d5416572571,2024-11-08T19:01:03.880000
|
||||
@ -266076,40 +266082,40 @@ CVE-2024-50267,0,0,b18e823f7987bf2f207dbb94811263ba2f7cb694e3871f48c8cc2bf39fe90
|
||||
CVE-2024-50268,0,0,8df12e1c63e8f4b2fbb1daa84c5b9f22105342f2b53e103ba693f5c7f0487ea3,2024-11-22T22:13:47.450000
|
||||
CVE-2024-50269,0,0,08dd3f234bbe0775aed81c63daa40d32c7fc72d3655c4eeaed98c1d9c9e8608e,2024-11-26T22:30:27.420000
|
||||
CVE-2024-50270,0,0,e2cebf6c38789da2746318179b61d916a4b8eb21545b04b6001b05e81a6abdea,2024-11-26T22:38:18.377000
|
||||
CVE-2024-50271,0,1,75be6279968206b95ebcae861ce3283df0119a9347956d8cb645a9563e57d5b2,2024-11-27T15:57:03.277000
|
||||
CVE-2024-50272,0,1,0be03e353804a02199c122098a354e1959245d65a9b985e89f09f3439354dd50,2024-11-27T15:54:32.213000
|
||||
CVE-2024-50273,0,1,393c02307774f77273e83c4fdead3fe05517b310064f89579bd4607a52b97cee,2024-11-27T15:58:02.730000
|
||||
CVE-2024-50274,0,1,9989b3c8c4dde1407ba0a455d1f589572c8d1ef9f0e3d426d27ad9e2963d31d2,2024-11-27T15:59:35.733000
|
||||
CVE-2024-50275,0,1,6766267fdfcca38908f6315025367cea845708d4a217d1da8a88049872166d2a,2024-11-27T16:16:53.177000
|
||||
CVE-2024-50271,0,0,75be6279968206b95ebcae861ce3283df0119a9347956d8cb645a9563e57d5b2,2024-11-27T15:57:03.277000
|
||||
CVE-2024-50272,0,0,0be03e353804a02199c122098a354e1959245d65a9b985e89f09f3439354dd50,2024-11-27T15:54:32.213000
|
||||
CVE-2024-50273,0,0,393c02307774f77273e83c4fdead3fe05517b310064f89579bd4607a52b97cee,2024-11-27T15:58:02.730000
|
||||
CVE-2024-50274,0,0,9989b3c8c4dde1407ba0a455d1f589572c8d1ef9f0e3d426d27ad9e2963d31d2,2024-11-27T15:59:35.733000
|
||||
CVE-2024-50275,0,0,6766267fdfcca38908f6315025367cea845708d4a217d1da8a88049872166d2a,2024-11-27T16:16:53.177000
|
||||
CVE-2024-50276,0,0,c538bd80c38457a997dbbbe83c52db48c4decdc4758c4bdca15192ecb6a6c988,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50277,0,1,c1061fa4d8ff42c39e669074ab42e7cb90df575f03a05404df2b2893e3e5b843,2024-11-27T15:30:55.840000
|
||||
CVE-2024-50278,0,1,ed452b3654b9ea3f92fcde24a9a8547cc9d042e768f733fa2d6a6c26f5655850,2024-11-27T16:00:23.223000
|
||||
CVE-2024-50279,0,1,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a25a,2024-11-27T16:01:09.817000
|
||||
CVE-2024-50277,0,0,c1061fa4d8ff42c39e669074ab42e7cb90df575f03a05404df2b2893e3e5b843,2024-11-27T15:30:55.840000
|
||||
CVE-2024-50278,0,0,ed452b3654b9ea3f92fcde24a9a8547cc9d042e768f733fa2d6a6c26f5655850,2024-11-27T16:00:23.223000
|
||||
CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a25a,2024-11-27T16:01:09.817000
|
||||
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
|
||||
CVE-2024-50280,0,0,11a1a8b1b58475d3237a437167dd9ab60a2fb42d1a5d80b74f255c9d05f0dd67,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50281,0,0,e4d73f958349685ab6550ff52c43d006d239999025c4abdf04c625c2dd569d54,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50282,0,0,edca8fb0c68bd2eb1359a831d99bb1855825b22eb947856819184e2bf586acca,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50283,0,0,c4109a99a84dfd37899e24ace8ae763e86313bd13e7117a125625b028c5711df,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50284,0,1,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000
|
||||
CVE-2024-50285,0,1,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000
|
||||
CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000
|
||||
CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000
|
||||
CVE-2024-50286,0,0,b047f979fd53ae155be0a8508cdb3f2f52e50e0ee7507f70c5103e656edad005,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50287,0,0,5a84aaae41c9428e15665fbcd54dc2d4c799cc4b55cc2a6cb8ec683b32ee59df,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50288,0,1,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000
|
||||
CVE-2024-50288,0,0,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000
|
||||
CVE-2024-50289,0,0,cbe890f5c9d4c6f76920eb8ce53083b1779519960db0d61cf86dba6e738923f2,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50290,0,0,472e5b89bdd80749e630d2d7cfdfbfa1f003a07e281a56444507df0faaba7cc5,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50291,0,1,2bfa2e93499428357803d9d1742bd1017215506f4ce049e714c1056a205a95ca,2024-11-27T15:16:30.260000
|
||||
CVE-2024-50291,0,0,2bfa2e93499428357803d9d1742bd1017215506f4ce049e714c1056a205a95ca,2024-11-27T15:16:30.260000
|
||||
CVE-2024-50292,0,0,c8fe60f8cf2667fe6bf44b523d8647b1569630ec063acb5ae501ac4b90f9edb0,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50293,0,0,9696c0877c6aa711d6bbb4e0cdc12ed718f5d22ffeb14c3a923cbf00fbfa862c,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50294,0,0,a56287c7c6c44b3839623aee8786a853478aac87c1c8f4037bacdb635fa62108,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50295,0,0,b5793fe9e5e200c708da8e3fd2d3817806f8597db59622027c2d0bf299d5097d,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50296,0,1,a0ab00a3d94c15ca5a168953900e499984de52c4d2f3ef150ea36247cfc34755,2024-11-27T15:24:16.020000
|
||||
CVE-2024-50297,0,1,18782faadf8e66ce0592c45f4e4ae010037e6a87ea6a4488e69cd940026bbd47,2024-11-27T15:25:04.810000
|
||||
CVE-2024-50298,0,1,c08b26d3bb0c2bc365756a21c195b877cc9dad5b276ad51daa25ce5140c0f1cd,2024-11-27T15:25:38.023000
|
||||
CVE-2024-50296,0,0,a0ab00a3d94c15ca5a168953900e499984de52c4d2f3ef150ea36247cfc34755,2024-11-27T15:24:16.020000
|
||||
CVE-2024-50297,0,0,18782faadf8e66ce0592c45f4e4ae010037e6a87ea6a4488e69cd940026bbd47,2024-11-27T15:25:04.810000
|
||||
CVE-2024-50298,0,0,c08b26d3bb0c2bc365756a21c195b877cc9dad5b276ad51daa25ce5140c0f1cd,2024-11-27T15:25:38.023000
|
||||
CVE-2024-50299,0,0,5aeee9eafaa1a622ea84bc5c27215f72a12d2e934f25cd301792f3ad40da51e9,2024-11-19T21:57:32.967000
|
||||
CVE-2024-5030,0,0,bb4b715ea840400227e7a7cb9b03010c40389d422c5926920262a0b6d21748ab,2024-11-18T17:11:17.393000
|
||||
CVE-2024-50300,0,0,357f2775ab252a4a06a076fcdc9db464e297da34ef827354cfabd45ea720901e,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50301,0,0,6032947c407edcb765791472d12ec09751cf709dcb1308b0f858d51bd46219d3,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50302,0,1,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000
|
||||
CVE-2024-50302,0,0,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000
|
||||
CVE-2024-50303,0,0,57cec19dcdbef42ee5ef5518eda5a8f97b5381ad2e4e83ffe649a20f91b7b500,2024-11-19T21:56:45.533000
|
||||
CVE-2024-50304,0,0,56854a1e99128cd85feb0b11bd3df0ecdf626623d2783528840767997f789d64,2024-11-19T21:56:45.533000
|
||||
CVE-2024-50305,0,0,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000
|
||||
@ -266410,12 +266416,12 @@ CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a63
|
||||
CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000
|
||||
CVE-2024-50654,0,0,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000
|
||||
CVE-2024-50655,0,0,d4ec558baa450e21b64b8fb6af74e8e4b7a98438007bcf88b64f95732f73b83a,2024-11-19T21:51:00.987000
|
||||
CVE-2024-50657,0,0,c62ae8e760b0c797e6305b82b7def79ede70f22ae58be77a448cac328641888f,2024-11-22T18:15:17.570000
|
||||
CVE-2024-50657,0,1,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
|
||||
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
|
||||
CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000
|
||||
CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000
|
||||
CVE-2024-50671,0,0,1223fefc332eddf3a4bf368d5cbbf3c4396b7c221e56523e6bdf733ee7c8c46d,2024-11-25T21:15:19.040000
|
||||
CVE-2024-50672,0,0,e15ff7e7887d1c58e55af7028d141453133b59d77bea70d3086e75a4dc40d21f,2024-11-25T21:15:19.523000
|
||||
CVE-2024-50672,0,1,85b0d6db9be373a6fa69359f08bb412793e42f226dea70f6b5078fe3734ab9e1,2024-11-27T17:15:12.563000
|
||||
CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000
|
||||
CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000
|
||||
CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000
|
||||
@ -266583,7 +266589,7 @@ CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7
|
||||
CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000
|
||||
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
|
||||
CVE-2024-51162,0,0,659179ac55d508d31c34cd8742c699a4dc94023e77b3f77dfac64c460e25f9e9,2024-11-22T17:15:09.353000
|
||||
CVE-2024-51163,0,0,ba4267b1febf3946e2ff435fc29e576537023ed4cf0b2d8ea671bb9981fe6040,2024-11-22T17:15:09.497000
|
||||
CVE-2024-51163,0,1,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000
|
||||
CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000
|
||||
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
|
||||
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
|
||||
@ -266603,6 +266609,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b
|
||||
CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000
|
||||
CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000
|
||||
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
|
||||
CVE-2024-51228,1,1,ac26ba41591551e7b354eebad63edb6c2e6671b4cadbb1ad2fb2ebaf77cd607b,2024-11-27T17:15:12.800000
|
||||
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
|
||||
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
|
||||
CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
|
||||
@ -266642,12 +266649,13 @@ CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5
|
||||
CVE-2024-51328,0,0,2b00b7365b3324739a77fda3a7b20dd87707f9d87480b5fe651b2c4602f0e7fd,2024-11-04T19:35:16.150000
|
||||
CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
|
||||
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
|
||||
CVE-2024-51330,0,0,e96a5de3ed2885ee831e7c318016642092d9f94ed9c27996decdea1687d8ed73,2024-11-18T17:11:56.587000
|
||||
CVE-2024-51330,0,1,b0b4a1198298e101e25b36e98c519271005f74623334a056f35802bef4974c1e,2024-11-27T17:15:12.973000
|
||||
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
|
||||
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
|
||||
CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000
|
||||
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
|
||||
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
|
||||
CVE-2024-51367,1,1,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000
|
||||
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
|
||||
CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
|
||||
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
|
||||
@ -267175,7 +267183,7 @@ CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e
|
||||
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
|
||||
CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000
|
||||
CVE-2024-5217,0,0,f5bf9cf0ef8575eb807fd3b94d1ba33c9e7f461028aa2a7d1bf80d1c2d760eed,2024-07-30T15:20:54.727000
|
||||
CVE-2024-5217,0,1,bcb367f5e8f4934ec54457a6bf1d1b467936c7817252514fef2d7bb7ed19c2bf,2024-11-27T18:56:05.783000
|
||||
CVE-2024-5218,0,0,3f0f08ad7c2d51d3a67b7d7a45835724ecc9f070958f49b8f27381122972dec7,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000
|
||||
CVE-2024-5220,0,0,c038ea6a169ab16726e3cd0d45ec2f73c131df5f0c00c638dfb0aa809792bfe5,2024-05-28T12:39:42.673000
|
||||
@ -267207,7 +267215,7 @@ CVE-2024-52303,0,0,57a6450ca3f2acaad0d7a5708a267a8f541a38de3d501010a97d19dc2553c
|
||||
CVE-2024-52304,0,0,0a277b5748fc03086c52a906e139b6d4003ef5456e902af6a142f3fb7ee5873a,2024-11-19T21:57:32.967000
|
||||
CVE-2024-52305,0,0,fb3e1fe1f55433965f9f85cb35ad56a3033a246ddb638ca95e4c6fc4285767e7,2024-11-19T18:04:12.680000
|
||||
CVE-2024-52306,0,0,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000
|
||||
CVE-2024-52307,1,1,45f018d30c19214fa9c61ad01f4a9b1a0e1092cd201ecac1feef083922ccc61d,2024-11-27T16:15:14.433000
|
||||
CVE-2024-52307,0,0,45f018d30c19214fa9c61ad01f4a9b1a0e1092cd201ecac1feef083922ccc61d,2024-11-27T16:15:14.433000
|
||||
CVE-2024-52308,0,0,0db58aa0fd04755222aa7bdf601c835c719685fb73c2d21a31da5f6db6051fd8,2024-11-20T15:07:43.127000
|
||||
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
|
||||
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
|
||||
@ -267218,7 +267226,7 @@ CVE-2024-52316,0,0,ff532393fbb3fe055624e3ec9b4317af0a9f5c80b8d099f274ce380979ad2
|
||||
CVE-2024-52317,0,0,8dd9cf0b2675d0151da3af6e2ac3dfaef7e6c1fd135283d8e3e44d96c5be783e,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52318,0,0,2bba437e59239c6e36ab9227be3e173d0f3c7cc38d614e024ac840e507a6b100,2024-11-18T17:11:17.393000
|
||||
CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000
|
||||
CVE-2024-52323,0,1,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000
|
||||
CVE-2024-52323,0,0,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000
|
||||
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
|
||||
CVE-2024-52336,0,0,5ed253ebd2a82ef5ea3ab5a60ad11f0bdb76616e1b68538042da9f8c97f4e20a,2024-11-26T19:15:29.747000
|
||||
CVE-2024-52337,0,0,23b4775368bbdf0dec045a90c06cd1e5b3e2f47d3699f76ca9bfb7e9368b5326,2024-11-26T19:15:30.013000
|
||||
@ -267432,10 +267440,10 @@ CVE-2024-52714,0,0,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476a
|
||||
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
|
||||
CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0194,2024-11-22T16:15:33.983000
|
||||
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
|
||||
CVE-2024-52726,0,0,aaab5b915c8420d6dfdbfab6de11b3229799466def6ee1eeacddce3fd46cc0b0,2024-11-22T19:15:07.297000
|
||||
CVE-2024-52726,0,1,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
|
||||
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
|
||||
CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000
|
||||
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
|
||||
CVE-2024-5274,0,1,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000
|
||||
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
|
||||
CVE-2024-52754,0,0,efe2054fb692b3adcc609bd36845f4654abf6a516c024ece2df08033c7e16777,2024-11-22T17:15:09.787000
|
||||
CVE-2024-52755,0,0,201980ce6d3d391174749cb677e5eff116245b0c1dc48789b3b9b50b5ef853a4,2024-11-22T17:15:09.970000
|
||||
@ -267448,9 +267456,9 @@ CVE-2024-52765,0,0,215d573d92d5d4ab707e8db266a06400b9c1cb39b63c86b9575271eef3bcc
|
||||
CVE-2024-52769,0,0,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
|
||||
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
|
||||
CVE-2024-52770,0,0,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
|
||||
CVE-2024-52771,0,0,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
|
||||
CVE-2024-52771,0,1,57831cc0aec212fa9f5452cd5864fd9f742774698e80266ca54ea858d750ac1e,2024-11-27T17:15:14.017000
|
||||
CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
|
||||
CVE-2024-52787,0,0,5cf053b2abc44016dfcc451672fa6172c4f3b8dcb05262e0c71f35e05b29e3fa,2024-11-25T18:15:13.597000
|
||||
CVE-2024-52787,0,1,f0be565609d1e673f989f286ed2b83aaf7115a7b1858a856c2ab7b57c986e03e,2024-11-27T17:15:14.397000
|
||||
CVE-2024-52788,0,0,4abe1fd7690362e0e6e7183fadbb1999ee1afb82444324d21e730957cf5066a2,2024-11-22T17:15:10.490000
|
||||
CVE-2024-52789,0,0,f640d56967c5320ac75d58f4ec0e813038d23df15a507a7fb489e9968905a84b,2024-11-22T17:15:10.660000
|
||||
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
|
||||
@ -267501,7 +267509,7 @@ CVE-2024-52945,0,0,63027697b61e71930738cff69e21a659b1ff06f97d852d7c9fcc49bfd7768
|
||||
CVE-2024-52946,0,0,ef4806982226269ca873cfccc34dff633254ace5ad4fa6e29d31cbf5dd0c16de,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52947,0,0,032f06f1ece995cd81c8fde69d4726dfc9340376c69a3aad6534cd5f5b5e3ade,2024-11-18T18:35:09.517000
|
||||
CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52951,1,1,7c1224f3f2e9ade77f936266b74982e9a872b28e1a9f688df725306494c7ca71,2024-11-27T15:15:26.550000
|
||||
CVE-2024-52951,0,0,7c1224f3f2e9ade77f936266b74982e9a872b28e1a9f688df725306494c7ca71,2024-11-27T15:15:26.550000
|
||||
CVE-2024-52958,0,0,6ac9e217d9bc0433c548430fb0f3b6b9332a74d03a1b74c65d1c288770e97224,2024-11-27T06:15:18.590000
|
||||
CVE-2024-52959,0,0,ec1380cbf80c452cc4c173df77383a977439e1ad3214342e17040813236ddc54,2024-11-27T06:15:19.083000
|
||||
CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc648,2024-05-24T01:15:30.977000
|
||||
@ -267515,8 +267523,8 @@ CVE-2024-5303,0,0,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f8
|
||||
CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000
|
||||
CVE-2024-53042,0,0,6880ebfd034ad41870591bbbdeeaea6760d63ea66896344ed6638c692cbaee51,2024-11-19T21:56:45.533000
|
||||
CVE-2024-53043,0,0,8605345b311f80d829276d5452f92df6619a24b70030cd2d41c05e3973bef2d1,2024-11-22T22:22:03.963000
|
||||
CVE-2024-53044,0,1,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000
|
||||
CVE-2024-53045,0,1,153919019dd492ee2f8a4bd103dc9fb649fa232c55f1697b430888fbb999af0c,2024-11-27T16:41:06.737000
|
||||
CVE-2024-53044,0,0,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000
|
||||
CVE-2024-53045,0,0,153919019dd492ee2f8a4bd103dc9fb649fa232c55f1697b430888fbb999af0c,2024-11-27T16:41:06.737000
|
||||
CVE-2024-53046,0,0,3e71ba1a7c50b773dcf381dbf7fdbc4a342381bd32ad53fdac02d10d506eebd8,2024-11-19T21:56:45.533000
|
||||
CVE-2024-53047,0,0,a0801a2f6d3c55ef95cce30e94c6ed5a76950eafd193774abe55034cb73499bf,2024-11-19T21:56:45.533000
|
||||
CVE-2024-53048,0,0,529447b7e47a46804ce5665f7064fdc0578a20909c47292e6baa06ace21a4eed,2024-11-19T21:56:45.533000
|
||||
@ -267553,9 +267561,9 @@ CVE-2024-53075,0,0,b8a47df9f6008c83b93e2abefdeadbc449d2b3e2a3dcb44f41e184a3b9508
|
||||
CVE-2024-53076,0,0,0be57ac15a64c608a1e52bd99fe58bd7fdd85d1305039bc11b5396e02cea259c,2024-11-22T22:24:24.607000
|
||||
CVE-2024-53077,0,0,00b9d8c03b0897577603ba9722b5741dae994d46788395a5ed57813d6fd9f76e,2024-11-25T20:41:41.093000
|
||||
CVE-2024-53078,0,0,fb4576ab424097abb54c012dfd85f820fb3d67465f92657a79299e53e0dd3ac8,2024-11-25T13:31:57.063000
|
||||
CVE-2024-53079,0,1,842cfa3f805cf283364d877943681242a6e2d56da2e3fc653cb2100a50c04856,2024-11-27T16:59:20.303000
|
||||
CVE-2024-53080,0,1,aab8698cdbcb15572a0f6f56b54b35fb99e8b87751dd7a7ac101c8e70a14a893,2024-11-27T16:57:47.947000
|
||||
CVE-2024-53081,0,1,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc322,2024-11-27T16:56:35.143000
|
||||
CVE-2024-53079,0,0,842cfa3f805cf283364d877943681242a6e2d56da2e3fc653cb2100a50c04856,2024-11-27T16:59:20.303000
|
||||
CVE-2024-53080,0,0,aab8698cdbcb15572a0f6f56b54b35fb99e8b87751dd7a7ac101c8e70a14a893,2024-11-27T16:57:47.947000
|
||||
CVE-2024-53081,0,0,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc322,2024-11-27T16:56:35.143000
|
||||
CVE-2024-53082,0,0,4300d5804f1739d010f3842a1f063115d30827a689b8acceb8e0ef0a875aec0d,2024-11-25T13:35:34.083000
|
||||
CVE-2024-53083,0,0,14bc093b2d0dbf0b458e87cc263fff838a1c2b0f5030c72f49f5cbb2b92721d1,2024-11-19T21:56:45.533000
|
||||
CVE-2024-53084,0,0,2cf825e9737c7232363a4d626913473a9390d79ca2cd868f24741a845042e35c,2024-11-19T21:56:45.533000
|
||||
@ -267584,6 +267592,7 @@ CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570
|
||||
CVE-2024-5324,0,0,68af38ce3b695644cbcf19d3a148fcefd2523c0cdca6a2454fd88f0297edc15c,2024-07-24T17:42:49.020000
|
||||
CVE-2024-5325,0,0,3161b31796f943a80af27275e8f23d08c58d4d31d567c9aa76aee11dec3e806e,2024-07-12T16:34:58.687000
|
||||
CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b65eb,2024-11-22T20:15:09.210000
|
||||
CVE-2024-53254,1,1,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000
|
||||
CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000
|
||||
CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000
|
||||
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
|
||||
@ -267613,7 +267622,7 @@ CVE-2024-5342,0,0,b9462ea77ffff29ff50fcb5529de81f4f86998607e3428d3f0d5025aaca0f2
|
||||
CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000
|
||||
CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000
|
||||
CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b44,2024-06-20T12:44:01.637000
|
||||
CVE-2024-53438,0,0,1f1caf7763eee1499fc294ada560bfb533a27a99b843716b542793ff5fef1fb8,2024-11-22T17:15:10.857000
|
||||
CVE-2024-53438,0,1,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
|
||||
CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000
|
||||
CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000
|
||||
@ -267628,7 +267637,7 @@ CVE-2024-5354,0,0,2705d9995a32176e712249b570d9e2fb33b0b6cf2235d27d22b60367c7562e
|
||||
CVE-2024-5355,0,0,5f2e376ce579cedaa86f2a16497e6e751e8e7c9f0422d5f739a3fa31c20b6848,2024-06-04T19:21:05.883000
|
||||
CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8998,2024-11-26T16:15:18.520000
|
||||
CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000
|
||||
CVE-2024-53556,0,0,48f17862e47add857cc3012444f5820a601a669e2f1886efc4926c973e3aada3,2024-11-25T21:15:21.693000
|
||||
CVE-2024-53556,0,1,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000
|
||||
CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000
|
||||
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
|
||||
CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000
|
||||
@ -267636,19 +267645,19 @@ CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59e
|
||||
CVE-2024-53597,0,0,9a4c545b5865d03e7d82c6ef3ae0f046b57734eab4f58e2724c4e5178d1b9adb,2024-11-25T22:15:19.340000
|
||||
CVE-2024-53599,0,0,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387ef2,2024-11-25T21:15:21.993000
|
||||
CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000
|
||||
CVE-2024-53603,0,1,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000
|
||||
CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000
|
||||
CVE-2024-53604,0,0,47936311e2d1f5cc406b15d873639f8f4b058cff6af769b5c54ad5fe621ee21e,2024-11-27T14:15:19.093000
|
||||
CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000
|
||||
CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000
|
||||
CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000
|
||||
CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000
|
||||
CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000
|
||||
CVE-2024-53635,0,0,49b4054e38e70319300cf37323e732b469b9fb45e2df27cf28379c7859a0f5bf,2024-11-27T14:15:19.210000
|
||||
CVE-2024-53635,0,1,6e8b5160fce2a741e8ac5d43a4a38430a8c2b5d2b740bbc37c715cac813c59a2,2024-11-27T18:15:18.130000
|
||||
CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000
|
||||
CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000
|
||||
CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000
|
||||
CVE-2024-5367,0,0,e1fb712fa137b32c2cb97597a93996bde7ebc629cee38f14d6c04ed9e1154407,2024-06-04T19:21:06.783000
|
||||
CVE-2024-53673,0,1,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000
|
||||
CVE-2024-53673,0,0,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000
|
||||
CVE-2024-53674,0,0,8a5c79f209c5cbb54f78c6e00b940dec235442e0d5729a2a400739bbcabd981c,2024-11-26T22:15:18.713000
|
||||
CVE-2024-53675,0,0,01989df42cc3673d2d670cddd166ccee1a501522f5e01720638d33a9f30efa8c,2024-11-26T22:15:18.990000
|
||||
CVE-2024-53676,0,0,f7ef49b888a4eed0585ba7b9f7899002a769200a6ac0008e5a7b61bb2e49d171,2024-11-27T01:15:05.250000
|
||||
@ -267687,20 +267696,22 @@ CVE-2024-53912,0,0,e6fb43b2737cbcef51e1f874439414b1eb4c2f7a8143f7711c40052685e1c
|
||||
CVE-2024-53913,0,0,db26b2b1e2298beed3b0db25806c1bedf5fbe7d70658f946838e985da0217084,2024-11-26T16:15:20.480000
|
||||
CVE-2024-53914,0,0,99735abb7c2ed42da934a1a9995a70c9a86da0f5e52dfc853c7764c9915f1f97,2024-11-26T16:15:20.700000
|
||||
CVE-2024-53915,0,0,2b435e6209b4777d69d6b127cd04d8b412034b2878f2216636381cb24425f30d,2024-11-26T16:15:20.943000
|
||||
CVE-2024-53916,0,0,2d22f43c748e4fc1802bb59a3d73251bff1a353e6d572eedd66031b5d61e27bd,2024-11-25T00:15:04.423000
|
||||
CVE-2024-53916,0,1,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
|
||||
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
|
||||
CVE-2024-53920,1,1,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000
|
||||
CVE-2024-53920,0,0,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000
|
||||
CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000
|
||||
CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000
|
||||
CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000
|
||||
CVE-2024-5395,0,0,e532c0fafbcef9b666c7ef0302f25a35b4dc4d0c2a33d2079af161ebd3ce2b3c,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc099d,2024-06-04T19:21:08.627000
|
||||
CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000
|
||||
CVE-2024-53975,0,1,db2852f15c06d19ca698273a0c2e6819bbf9c83aca00ef4837eb933aa4601eda,2024-11-27T15:15:26.923000
|
||||
CVE-2024-53975,0,0,db2852f15c06d19ca698273a0c2e6819bbf9c83aca00ef4837eb933aa4601eda,2024-11-27T15:15:26.923000
|
||||
CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2487,2024-11-26T16:15:21.430000
|
||||
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
|
||||
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
|
||||
CVE-2024-54003,1,1,a3c6c675b2f34f375ee2a56ca925b3bb999f2c571194b3341dcd3cd0cdaa5631,2024-11-27T17:15:15.333000
|
||||
CVE-2024-54004,1,1,082a4c012cf14e634e97063024708abf81b0ae88671de2cac0207022f22b82d0,2024-11-27T17:15:15.443000
|
||||
CVE-2024-5402,0,0,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000
|
||||
CVE-2024-5403,0,0,2e916307137919215633d6a47f3e654241b49fba1a899d76e9efd2abd496b6ad,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5404,0,0,9555ba3a9174cf37744b3f17110afa21577889d292df132a8c1f8da3c56bf2a0,2024-06-03T14:46:24.250000
|
||||
@ -268160,7 +268171,7 @@ CVE-2024-5906,0,0,203e49fc12cc805aa814a48bc1ee927a32a234142d80d51288f99e84c6703f
|
||||
CVE-2024-5907,0,0,d1b055b40e0f23972d4010743c95e9e712740577d8745b01a87db7feb49b71fd,2024-08-07T16:59:29.527000
|
||||
CVE-2024-5908,0,0,10ae8b07066771edd89ce262576520c1fd128ba78541519391a2b2649f95b086,2024-08-07T16:55:24.180000
|
||||
CVE-2024-5909,0,0,e304efd89cf74e4d08d4ff371fbe388379e9204881ef926100a0f1e3a8d60e07,2024-08-07T16:53:10.633000
|
||||
CVE-2024-5910,0,0,bac698b7f35de84e6bbf386dfa752340c40a43b520ac5290f26ff52ee5dd650c,2024-11-14T02:00:02.740000
|
||||
CVE-2024-5910,0,1,809032c1554caf15adc6ef3696e5c072f55bc8cbc0c3da859c4558e159670420,2024-11-27T17:23:02.910000
|
||||
CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000
|
||||
@ -269144,6 +269155,7 @@ CVE-2024-7020,0,0,07e3f6eef588b310c604538a1a9169f2247ceb03dd8d5cbbf5f9bf79ffa47d
|
||||
CVE-2024-7022,0,0,f3f91088113b8b5dc64e298e776a2521f61b999864613e4c295fcbf55348078e,2024-09-26T13:32:55.343000
|
||||
CVE-2024-7023,0,0,3f937f5a1230b5cc57e9f6057ef84d68d172cff978e89a42c9f0a7ad62f5c115,2024-09-26T13:32:55.343000
|
||||
CVE-2024-7024,0,0,f6ab692713540ecde032ff4fa92fc29e0807ae6392bd295748f24c8601a6b0ea,2024-09-26T13:32:55.343000
|
||||
CVE-2024-7025,1,1,84f2822d7322b6c4c770714a08a0be1e8c12fd1166fe94eea014f9b723bf12bb,2024-11-27T18:15:18.420000
|
||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7029,0,0,5f4ca22966bfb8fd03ea6c375443c6b1c23e214558aa93ba88feba6b27bd6aa8,2024-09-17T13:30:55.010000
|
||||
CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000
|
||||
@ -269955,7 +269967,7 @@ CVE-2024-7967,0,0,3b754d3fe60ade3dbaf2ceedb5cb492adc3a6d1342157a48ed7f67b8f6c533
|
||||
CVE-2024-7968,0,0,d42fbdf1e125bc5bdd13768ccbb0014f1ef469a1fb717c432eb8628bcf97d06a,2024-08-27T13:35:04.780000
|
||||
CVE-2024-7969,0,0,004186edac2fefffd328a41ea15a25fa627c517f8fe839d3b4b4abc33a5fb6ab,2024-08-28T23:15:05.320000
|
||||
CVE-2024-7970,0,0,4bb992b64808219b839c5254e00c2c7348ddd7f9644ca29d4ab55ca307fec90f,2024-09-04T14:35:15.343000
|
||||
CVE-2024-7971,0,0,46adb6d7721c1dfcc60ee3fda6e97e01d50ab2f0fa3271375a72069a513c0516,2024-08-27T01:00:02.883000
|
||||
CVE-2024-7971,0,1,cbe2daa931187e1258dbe5911fe5622967ef34542556be9e6ad2a0b769c2720b,2024-11-27T17:21:35.077000
|
||||
CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829d6,2024-08-26T15:11:35.017000
|
||||
CVE-2024-7973,0,0,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000
|
||||
CVE-2024-7974,0,0,77d5477c7043c324c587d6ddd1b8725973fdf57ee70889d7f1b834f0b27b2189,2024-10-30T21:35:13.293000
|
||||
@ -271025,6 +271037,7 @@ CVE-2024-9361,0,0,5b39cf107cd2cec76681af4aec2b9617609d3555d1a39f69e46b82bde9fbb6
|
||||
CVE-2024-9364,0,0,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000
|
||||
CVE-2024-9366,0,0,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000
|
||||
CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000
|
||||
CVE-2024-9369,1,1,717a949189134c1304c62734f9cddd0a2758133cac7b4303a63a23d88b34d7a8,2024-11-27T18:15:18.560000
|
||||
CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000
|
||||
CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000
|
||||
CVE-2024-9374,0,0,71b6734f379ef9a804fdc66eda125efbaf96377b76395ed89ad6eee48b26d41e,2024-10-25T12:56:07.750000
|
||||
@ -271060,7 +271073,7 @@ CVE-2024-9409,0,0,3e506ee5c668e864fe32d06ea4b7a74953a7f1e2f6b3e039755ec706eb3dac
|
||||
CVE-2024-9410,0,0,5bec151d8e893e44b70a96e00c59b851f21a71304a48571095d7551a53538240,2024-11-22T19:57:28.770000
|
||||
CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9413,0,1,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae3597,2024-11-27T16:15:15.180000
|
||||
CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae3597,2024-11-27T16:15:15.180000
|
||||
CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user