mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-12-28T21:00:19.190133+00:00
This commit is contained in:
parent
cac6fd16ed
commit
ac0ca30fb6
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50944",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-27T19:15:08.833",
|
||||
"lastModified": "2024-12-27T19:15:08.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-28T19:15:06.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Integer overflow vulnerability exists in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f in the shopping cart functionality. The issue lies in the quantity parameter in the CartController's AddToCart method."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AbdullahAlmutawa/CVE-2024-50944",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50945",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-27T19:15:08.963",
|
||||
"lastModified": "2024-12-27T19:15:08.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-28T19:15:06.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An improper access control vulnerability exists in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f, allowing users to submit reviews without verifying if they have purchased the product."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AbdullahAlmutawa/CVE-2024-50945",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53476",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-27T19:15:09.103",
|
||||
"lastModified": "2024-12-27T19:15:09.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-28T19:15:06.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A race condition vulnerability in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f allows attackers to bypass inventory restrictions by simultaneously submitting purchase requests from multiple accounts for the same product. This can lead to overselling when stock is limited, as the system fails to accurately track inventory under high concurrency, resulting in potential loss and unfulfilled orders."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AbdullahAlmutawa/CVE-2024-53476",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-27T20:15:23.313",
|
||||
"lastModified": "2024-12-27T20:15:23.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-28T19:15:07.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Kurmi Provisioning Suite 7.9.0.33. If an X-Forwarded-For header is received during authentication, the Kurmi application will record the (possibly forged) IP address mentioned in that header rather than the real IP address that the user logged in from. This fake IP address can later be displayed in the My Account popup that shows the IP address that was used to log in."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kurmi-software.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54451",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-27T20:15:23.443",
|
||||
"lastModified": "2024-12-27T20:15:23.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-28T19:15:07.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A cross-site scripting (XSS) vulnerability in the graphicCustomization.do page in Kurmi Provisioning Suite before 7.9.0.38, 7.10.x through 7.10.0.18, and 7.11.x through 7.11.0.15 allows remote attackers (authenticated as system administrators) to inject arbitrary web script or HTML via the COMPONENT_fields(htmlTitle) field, which is rendered in other pages of the application for all users (if the graphical customization has been activated by a super-administrator)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kurmi-software.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-27T20:15:23.557",
|
||||
"lastModified": "2024-12-27T20:15:23.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-28T19:15:07.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue was discovered in Kurmi Provisioning Suite before 7.9.0.35 and 7.10.x through 7.10.0.18. A Directory Traversal and Local File Inclusion vulnerability in the logsSys.do page allows remote attackers (authenticated as administrators) to trigger the display of unintended files. Any file accessible to the Kurmi user account could be displayed, e.g., configuration files with information such as the database password."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kurmi-software.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-56527",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-27T06:15:23.880",
|
||||
"lastModified": "2024-12-27T15:15:13.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-28T19:15:07.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in TCPDF before 6.8.0. The Error function lacks an htmlspecialchars call for the error message."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en TCPDF antes de la versi\u00f3n 6.8.0. La funci\u00f3n Error no tiene una llamada htmlspecialchars para el mensaje de error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
|
27
README.md
27
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-28T19:00:20.368004+00:00
|
||||
2024-12-28T21:00:19.190133+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-28T18:15:10.397000+00:00
|
||||
2024-12-28T19:15:07.800000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -38,26 +38,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2024-56512](CVE-2024/CVE-2024-565xx/CVE-2024-56512.json) (`2024-12-28T17:15:07.967`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2021-22484](CVE-2021/CVE-2021-224xx/CVE-2021-22484.json) (`2024-12-28T17:15:06.360`)
|
||||
- [CVE-2021-37000](CVE-2021/CVE-2021-370xx/CVE-2021-37000.json) (`2024-12-28T17:15:06.793`)
|
||||
- [CVE-2024-43705](CVE-2024/CVE-2024-437xx/CVE-2024-43705.json) (`2024-12-28T17:15:07.190`)
|
||||
- [CVE-2024-46973](CVE-2024/CVE-2024-469xx/CVE-2024-46973.json) (`2024-12-28T17:15:07.420`)
|
||||
- [CVE-2024-50714](CVE-2024/CVE-2024-507xx/CVE-2024-50714.json) (`2024-12-28T18:15:08.193`)
|
||||
- [CVE-2024-50715](CVE-2024/CVE-2024-507xx/CVE-2024-50715.json) (`2024-12-28T18:15:09.790`)
|
||||
- [CVE-2024-50716](CVE-2024/CVE-2024-507xx/CVE-2024-50716.json) (`2024-12-28T18:15:09.997`)
|
||||
- [CVE-2024-50717](CVE-2024/CVE-2024-507xx/CVE-2024-50717.json) (`2024-12-28T18:15:10.210`)
|
||||
- [CVE-2024-54774](CVE-2024/CVE-2024-547xx/CVE-2024-54774.json) (`2024-12-28T18:15:10.397`)
|
||||
- [CVE-2024-54775](CVE-2024/CVE-2024-547xx/CVE-2024-54775.json) (`2024-12-28T17:15:07.733`)
|
||||
- [CVE-2024-56732](CVE-2024/CVE-2024-567xx/CVE-2024-56732.json) (`2024-12-28T17:15:08.190`)
|
||||
- [CVE-2024-50944](CVE-2024/CVE-2024-509xx/CVE-2024-50944.json) (`2024-12-28T19:15:06.197`)
|
||||
- [CVE-2024-50945](CVE-2024/CVE-2024-509xx/CVE-2024-50945.json) (`2024-12-28T19:15:06.667`)
|
||||
- [CVE-2024-53476](CVE-2024/CVE-2024-534xx/CVE-2024-53476.json) (`2024-12-28T19:15:06.880`)
|
||||
- [CVE-2024-54450](CVE-2024/CVE-2024-544xx/CVE-2024-54450.json) (`2024-12-28T19:15:07.103`)
|
||||
- [CVE-2024-54451](CVE-2024/CVE-2024-544xx/CVE-2024-54451.json) (`2024-12-28T19:15:07.340`)
|
||||
- [CVE-2024-54452](CVE-2024/CVE-2024-544xx/CVE-2024-54452.json) (`2024-12-28T19:15:07.570`)
|
||||
- [CVE-2024-56527](CVE-2024/CVE-2024-565xx/CVE-2024-56527.json) (`2024-12-28T19:15:07.800`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
38
_state.csv
38
_state.csv
@ -168964,7 +168964,7 @@ CVE-2021-22480,0,0,2ee40a5f0b744f8d85386ac8f7814fbb64db99b431af2d5fe4ee4168df648
|
||||
CVE-2021-22481,0,0,3bb352b331d9b115a475b892af22ac8a789f8171a863aa0dc715be3219400678,2024-11-21T05:50:12.170000
|
||||
CVE-2021-22482,0,0,064e5fd416b229a2cc3cd57c369c020311f44c434cd44e94f4e7f51e8f96e6e5,2024-11-21T05:50:12.273000
|
||||
CVE-2021-22483,0,0,524ecb58c9226fedfac0aa1d752012c78263971e637a4fab6f2357c665a65c86,2024-11-21T05:50:12.377000
|
||||
CVE-2021-22484,0,1,5c069b96361d3beda42340a28f8df35b3d14dd8e953b3e80d31b794871ecefcb,2024-12-28T17:15:06.360000
|
||||
CVE-2021-22484,0,0,5c069b96361d3beda42340a28f8df35b3d14dd8e953b3e80d31b794871ecefcb,2024-12-28T17:15:06.360000
|
||||
CVE-2021-22485,0,0,70a240bc4e8f228e753950c037f1a99222e031a229192fc1067dae316709cb7c,2024-11-21T05:50:12.477000
|
||||
CVE-2021-22486,0,0,ff718655b7c31ca5258d20fd6fa88dcc7c99213588101d01513f6aca30678d47,2024-11-21T05:50:12.580000
|
||||
CVE-2021-22487,0,0,f412d1dffba0205b3e669b30e0aa0c95982526422d0ee444ccb1ea2d81758abb,2024-11-21T05:50:12.683000
|
||||
@ -179770,7 +179770,7 @@ CVE-2021-36997,0,0,e0416bc29d06ba5d2104b33ea06d00e260fb21201713bb4a52e41ef862240
|
||||
CVE-2021-36998,0,0,2a5b87fdd4cba6e4c7d1ecba2c75232e886aecb744c74d01312049488cbfd80f,2024-11-21T06:14:28.027000
|
||||
CVE-2021-36999,0,0,5c47786127591385e8ef253183f08f85cdf9eff7dd186a5dc91a842f845fb619,2024-11-21T06:14:28.133000
|
||||
CVE-2021-3700,0,0,6f3c340c5b8b70af3c2e5704f87bdbba6c89b149c949c56f5930323b638fb982,2024-11-21T06:22:11.147000
|
||||
CVE-2021-37000,0,1,c29fc95967702dc11d2650bf79a687b3ebbe89fff28192478aca64abb2c2d70d,2024-12-28T17:15:06.793000
|
||||
CVE-2021-37000,0,0,c29fc95967702dc11d2650bf79a687b3ebbe89fff28192478aca64abb2c2d70d,2024-12-28T17:15:06.793000
|
||||
CVE-2021-37001,0,0,720396941ab0bdecaff2714ea79d435b9999605f3fad92e1146886261e23e88c,2024-11-21T06:14:28.247000
|
||||
CVE-2021-37002,0,0,85ee5e216930de66c1eb5cb142fdef511fd9c1d60803b15c9678deca82dfd20c,2024-11-21T06:14:28.357000
|
||||
CVE-2021-37003,0,0,0aeaaf3bfce302da5ea2f00e7e9d5a91b289c67b2c8fb1c0440367b5d8fbee73,2024-11-21T06:14:28.473000
|
||||
@ -263619,7 +263619,7 @@ CVE-2024-43701,0,0,58213fd69d061c99a2baecf3bfc2d3de28885daea59715edf42f5d3058dc9
|
||||
CVE-2024-43702,0,0,026195b67973267c5f7e1b66b43eadfe3de1f0eaa8dad79a11b9df4d6c345a3b,2024-12-01T23:15:06.200000
|
||||
CVE-2024-43703,0,0,e564d47a3ea8e2e59e7c0c62fe5b37de767d270b87bc716325b902fc07b61a86,2024-12-01T23:15:06.383000
|
||||
CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5dc8,2024-11-18T17:11:17.393000
|
||||
CVE-2024-43705,0,1,b91bcb07b8e101706ad39ce9afcb2799ba6896eadb04479b1872b77653b10a4e,2024-12-28T17:15:07.190000
|
||||
CVE-2024-43705,0,0,b91bcb07b8e101706ad39ce9afcb2799ba6896eadb04479b1872b77653b10a4e,2024-12-28T17:15:07.190000
|
||||
CVE-2024-4371,0,0,e83d972dfd798c0045589442b000f085f252e3d21fb48583dd2590000a3618ae,2024-11-21T09:42:43.087000
|
||||
CVE-2024-43712,0,0,9ab3fe760e8f19464e8d37dd73b7335ae43d5382e27e4d6ab5795a2dd3e62314,2024-12-17T15:23:11.173000
|
||||
CVE-2024-43713,0,0,2351d2ccf5a9bdfa299b6fe1f3d7c7e3a4bbc01a6f8443c4348a36cf5880bc04,2024-12-17T14:55:13.953000
|
||||
@ -265696,7 +265696,7 @@ CVE-2024-4697,0,0,6e9eec3fc18bbe27148fb3ae709181d18ecd5466c486132eee5af6541f60f6
|
||||
CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000
|
||||
CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000
|
||||
CVE-2024-46972,0,0,0e34573fc20dd373f66d1b8ed3f8cb5899ffa098578c43ffb6dff5bb8ae5f7ed,2024-12-28T05:15:08.497000
|
||||
CVE-2024-46973,0,1,5b1148979504edc8c412112d196fc9eb688dbc46ad7acc2c72e50589e8a1c99b,2024-12-28T17:15:07.420000
|
||||
CVE-2024-46973,0,0,5b1148979504edc8c412112d196fc9eb688dbc46ad7acc2c72e50589e8a1c99b,2024-12-28T17:15:07.420000
|
||||
CVE-2024-46976,0,0,4a868e4ee15a8784e07959c2ee26d78428d60c159c11da76b493608d7f56cb35,2024-09-23T18:27:05.920000
|
||||
CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000
|
||||
CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000
|
||||
@ -268397,10 +268397,10 @@ CVE-2024-5069,0,0,ad719aec2191fa4733004e376bcb495f235c4247fa2915a6912d571066c414
|
||||
CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000
|
||||
CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000
|
||||
CVE-2024-50713,0,0,ef6222df7fefcdb4ff0c05dd5195e429baad1ae292e8f58093855db0cd9cdceb,2024-12-27T21:15:07.837000
|
||||
CVE-2024-50714,0,1,16a84fabc05c17c54dc3f6c81da670e09dd8653b1c5c6f9870ff04492fd544cd,2024-12-28T18:15:08.193000
|
||||
CVE-2024-50715,0,1,53941174b01f8b93ff7e1466aef626406d1063bf76001ebeacdb4e496d37a8ad,2024-12-28T18:15:09.790000
|
||||
CVE-2024-50716,0,1,c2e59cab5fe74659c53b87c4579a98b488d814173561ccf55ec91942f6dea217,2024-12-28T18:15:09.997000
|
||||
CVE-2024-50717,0,1,7bf921409027ac7fe82a723695fa85794305a5dba301f0856b65dba83639d561,2024-12-28T18:15:10.210000
|
||||
CVE-2024-50714,0,0,16a84fabc05c17c54dc3f6c81da670e09dd8653b1c5c6f9870ff04492fd544cd,2024-12-28T18:15:08.193000
|
||||
CVE-2024-50715,0,0,53941174b01f8b93ff7e1466aef626406d1063bf76001ebeacdb4e496d37a8ad,2024-12-28T18:15:09.790000
|
||||
CVE-2024-50716,0,0,c2e59cab5fe74659c53b87c4579a98b488d814173561ccf55ec91942f6dea217,2024-12-28T18:15:09.997000
|
||||
CVE-2024-50717,0,0,7bf921409027ac7fe82a723695fa85794305a5dba301f0856b65dba83639d561,2024-12-28T18:15:10.210000
|
||||
CVE-2024-5072,0,0,38bd8ba0572ad544e5273dfb8f5f6bfba13772caa98624367620d218345874da,2024-11-21T09:46:54.310000
|
||||
CVE-2024-50724,0,0,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000
|
||||
CVE-2024-5073,0,0,3db02993c22a514df0b86a1b6a0a6541debcfad8c13c8be6691b201564ec2c0b,2024-11-21T09:46:54.480000
|
||||
@ -268469,8 +268469,8 @@ CVE-2024-50930,0,0,ab7e60d69bf9ecdfb091e1a39c70aa41981d95981db536c872725a5ff6771
|
||||
CVE-2024-50931,0,0,bfe4e69023fe06db8f71d2d6d60e3e4922b2fefb11f278f99af6208127c39938,2024-12-11T16:15:13.317000
|
||||
CVE-2024-5094,0,0,f572ab7eafee07c8d987d5a3c905aa40f60dd2446639e00e7652e97e7c95fb47,2024-11-21T09:46:57.203000
|
||||
CVE-2024-50942,0,0,74bb27dcec6f641721fef2704da713b75046095ccb8aeb2b392b8ef1abb8cd71,2024-12-04T17:15:15.020000
|
||||
CVE-2024-50944,0,0,16782b1181d7069a158c2d4cdc0cf733cb8d40bf8562a9e53896dd900f09869b,2024-12-27T19:15:08.833000
|
||||
CVE-2024-50945,0,0,0d724498c8d9fa032ecce73a750fac2b1ab5011b98f411aff95ec14ec83badaa,2024-12-27T19:15:08.963000
|
||||
CVE-2024-50944,0,1,2cd90a2a7a8b74df08cb6d328511ac567ae4dae0459e41bd198ef5d5dcc3a111,2024-12-28T19:15:06.197000
|
||||
CVE-2024-50945,0,1,666e0273d2b4166fecaee8591da7efe31d95892b05add1b6bfde1009b67fdb8b,2024-12-28T19:15:06.667000
|
||||
CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721971,2024-12-05T20:15:22.180000
|
||||
CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000
|
||||
CVE-2024-5095,0,0,435f4b1943c8e810fb8465989f6b408e8982e554cc5e9afb3bd58dc0f211a716,2024-11-21T09:46:57.340000
|
||||
@ -270055,7 +270055,7 @@ CVE-2024-53470,0,0,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1db
|
||||
CVE-2024-53471,0,0,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000
|
||||
CVE-2024-53472,0,0,f62f01117567dfa980810b663addc9d4b9e324fc111266531f31ef2f0fb28372,2024-12-11T17:15:19.720000
|
||||
CVE-2024-53473,0,0,4f11e5668fdef12cb16e2bf05d839c650d20a6c384846fe0258311160154b68b,2024-12-12T02:07:58.713000
|
||||
CVE-2024-53476,0,0,2d59cdeaf227086b3195913c676b1676021104f9eca25fc971a8fb5f8cc0dc70,2024-12-27T19:15:09.103000
|
||||
CVE-2024-53476,0,1,1000f6416155c52d1da19e6dc9557a007310c3d11f9d581a9eab03f7acd41c61,2024-12-28T19:15:06.880000
|
||||
CVE-2024-53477,0,0,3dfbb52637bb052a793d1b67a024cd50b899929ad7fee8a9366a9aa6e069e388,2024-12-11T16:15:14.150000
|
||||
CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000
|
||||
CVE-2024-53480,0,0,5e46c0ee9bfffb1ecaafb500e19fbf13655a91348c28c3d7d2daabc702146564,2024-12-12T15:15:15.917000
|
||||
@ -270710,9 +270710,9 @@ CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1
|
||||
CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000
|
||||
CVE-2024-54443,0,0,a19735fa20af88aa6b80d25f5f3fba13bc36980cd33611fe0939754004239647,2024-12-16T15:15:23.420000
|
||||
CVE-2024-5445,0,0,868cf662746874f2c335da1d583d2882ec8b61a1e57de341d372842bb0244e3a,2024-08-12T13:41:36.517000
|
||||
CVE-2024-54450,0,0,5e5cb22afb674c9995d07f799ba105c0cc1f5e5ef92004e6f0ab693d64679ab2,2024-12-27T20:15:23.313000
|
||||
CVE-2024-54451,0,0,9737ed066fdfdded9aeecb6c798a0f1ae6b5dba3c3dace6d1f6f90a9ba4bc00a,2024-12-27T20:15:23.443000
|
||||
CVE-2024-54452,0,0,5920b2e73692b6570180bc279f4d4cf77509771ecbdee700139447ceb2265019,2024-12-27T20:15:23.557000
|
||||
CVE-2024-54450,0,1,aabb18820136b7c039cd7c034c7f73bb4fbf564b47289185c90837686625b797,2024-12-28T19:15:07.103000
|
||||
CVE-2024-54451,0,1,eb5dc636c5bdd52381b7fa77adc3a2623336dbdd2148286dff7294e8af2d17f3,2024-12-28T19:15:07.340000
|
||||
CVE-2024-54452,0,1,580ca4477632f0f9b88f16b8293e24b9d00dfbf3c0e7ff0a9b0468914ad431d2,2024-12-28T19:15:07.570000
|
||||
CVE-2024-54453,0,0,1d29d387e8d483eb2d9c2fac7421c2316d1f5ad23687a8624aafda457808ac20,2024-12-27T20:15:23.670000
|
||||
CVE-2024-54454,0,0,d47284e16acb38d36b7357f0d17c834483610159e501bace03ffb7af0ec70668,2024-12-27T20:15:23.777000
|
||||
CVE-2024-54457,0,0,da0353a7ec7d859fd477580e7c54e31a24aeea86ab2c2ac2e00b7a1eda59c2cf,2024-12-18T07:15:08.377000
|
||||
@ -270794,8 +270794,8 @@ CVE-2024-54749,0,0,2c9d895fdb5b90a3967a9403130c1863e1d8648bd0343f58138b0aee4bfec
|
||||
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
|
||||
CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000
|
||||
CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000
|
||||
CVE-2024-54774,0,1,5b6b4359a3fb94447f33ed1e073c9509186e7f815a8b42fa29e6ba1315e40c34,2024-12-28T18:15:10.397000
|
||||
CVE-2024-54775,0,1,bad1b41c772881f62112a2f9957cabf43b381dd98576517846c832bb62091ffe,2024-12-28T17:15:07.733000
|
||||
CVE-2024-54774,0,0,5b6b4359a3fb94447f33ed1e073c9509186e7f815a8b42fa29e6ba1315e40c34,2024-12-28T18:15:10.397000
|
||||
CVE-2024-54775,0,0,bad1b41c772881f62112a2f9957cabf43b381dd98576517846c832bb62091ffe,2024-12-28T17:15:07.733000
|
||||
CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000
|
||||
CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000
|
||||
CVE-2024-54790,0,0,3a11030c83dbcc059133dbf89bccc19714ba09427b01225923225c91c3331882,2024-12-19T16:15:08.950000
|
||||
@ -271200,13 +271200,13 @@ CVE-2024-56508,0,0,b546c065919848651cd3969519ab1a632e0ac231aaba23200efeba51f4445
|
||||
CVE-2024-56509,0,0,9eaeae1f7b8c8e75d17552f014dec0e2f8e3eb274c4a7605543f4a62406c31f6,2024-12-27T21:15:08.483000
|
||||
CVE-2024-5651,0,0,1b52d2c21baa1eebb0031be2e17eaf5cabf9f1b7ab486745a4d7c4c1e8ed2d60,2024-08-30T14:15:16.820000
|
||||
CVE-2024-56510,0,0,628cf455c5d073351deb04857a30ea4a4964dad3ef3dc8716b118a8686175e7f,2024-12-26T21:15:06.743000
|
||||
CVE-2024-56512,1,1,fb4379c8a390a1b759f4166891b605054b948310a82def3157334ebd2bad532f,2024-12-28T17:15:07.967000
|
||||
CVE-2024-56512,0,0,fb4379c8a390a1b759f4166891b605054b948310a82def3157334ebd2bad532f,2024-12-28T17:15:07.967000
|
||||
CVE-2024-56519,0,0,eff34b522be262d74b6b60fd08fffa0cfbdfc4bdea937916892fd39272ff4c9e,2024-12-27T05:15:07.677000
|
||||
CVE-2024-5652,0,0,1dda3b28a95a3027cca32754d8e2a9cb8bd181dca86e7b0a455abcf575817afc,2024-11-21T09:48:05.750000
|
||||
CVE-2024-56520,0,0,4a9aa9a1a3adcd1997d0b43db425637bc4984e59f1d448be2595594ab203989e,2024-12-27T05:15:07.837000
|
||||
CVE-2024-56521,0,0,97b68e3a5a928b0646ce77bf269259779b5065ddddc387966f52663153bd98a8,2024-12-27T05:15:07.977000
|
||||
CVE-2024-56522,0,0,932806003c80917db6a4613c79f24ada3f16757e896618a1b3cbf4f9e43c330c,2024-12-27T05:15:08.130000
|
||||
CVE-2024-56527,0,0,dab1750dba7011f720d0e872851547ae4b76d8885c770ca588ec84e0d205cba8,2024-12-27T15:15:13.580000
|
||||
CVE-2024-56527,0,1,bc553a98c63c830a826f605f9380ce4cabbc6f74db77f93c30b7ece0efc5737f,2024-12-28T19:15:07.800000
|
||||
CVE-2024-5653,0,0,6a43b27cee3d2293652e8e6e2ccb4fc0236822263be85c5365c247a4f0b2a7b5,2024-11-21T09:48:05.873000
|
||||
CVE-2024-56531,0,0,aa7a2b0529de2aaf00ad78e03c50eb61b577053ac1fd73582426ce44706e04f7,2024-12-27T14:15:32.503000
|
||||
CVE-2024-56532,0,0,356bd52ed55ce1deb2238d9f1d6546ed8f5000ee1eb152ee78a656b54595c191,2024-12-27T14:15:32.640000
|
||||
@ -271405,7 +271405,7 @@ CVE-2024-56708,0,0,01fc648fbd4d0320492dbd784f8f9a0b9c372d04309ee9d5bf65ddda29656
|
||||
CVE-2024-5671,0,0,ed90f881c7f33cc4424c259b337566a1f77772369738ebea5bec64062f030b65,2024-11-21T09:48:07.823000
|
||||
CVE-2024-5672,0,0,959d4e0f075fbde1ffae4f52f6c938c4cdb5c2c3237469dedb1dd077104a3da1,2024-11-21T09:48:07.940000
|
||||
CVE-2024-5673,0,0,f8b3774ce465f722b68e8727929e95d8d546e4b203a41a4244c7e4dffeee7a73,2024-11-21T09:48:08.057000
|
||||
CVE-2024-56732,0,1,287b71ca5ec03d5825a19e7eb68f3eaf02e994b222dd83ad368ff3860bd04893,2024-12-28T17:15:08.190000
|
||||
CVE-2024-56732,0,0,287b71ca5ec03d5825a19e7eb68f3eaf02e994b222dd83ad368ff3860bd04893,2024-12-28T17:15:08.190000
|
||||
CVE-2024-5674,0,0,7c06c249e0424ac37040b124ed7da9cd19cf8f5ce54c37fa3d48f3eda72c297e,2024-11-21T09:48:08.183000
|
||||
CVE-2024-5675,0,0,a93ae1d48690177c193b4a8fbcc4865158a63f066f83c2c6531b88eed5564aca,2024-11-21T09:48:08.303000
|
||||
CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e4847379,2024-11-21T09:48:08.420000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user