mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-11-29T23:01:09.305842+00:00
This commit is contained in:
parent
45309ec0c1
commit
bd22bcfa70
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2017-13316",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T20:15:22.363",
|
||||
"lastModified": "2024-11-27T20:15:22.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:04.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In checkPermissions of RecognitionService.java, there is a possible\u00a0permissions bypass due to a missing permission check. This could lead to\u00a0local escalation of privilege with no additional execution privileges\u00a0needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En checkPermissions de RecognitionService.java, existe una posible omisi\u00f3n de permisos debido a una verificaci\u00f3n de permisos faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2018-05-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2017-13319",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T20:15:22.493",
|
||||
"lastModified": "2024-11-27T20:15:22.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:04.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In pvmp3_get_main_data_size of pvmp3_get_main_data_size.cpp, there is a\u00a0possible buffer overread due to a missing bounds check. This could lead to\u00a0remote information disclosure of global static variables with no additional\u00a0execution privileges needed. User interaction is not needed for\u00a0exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En pvmp3_get_main_data_size de pvmp3_get_main_data_size.cpp, existe una posible sobrelectura del b\u00fafer debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n remota de informaci\u00f3n de variables est\u00e1ticas globales sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2017-13320",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T22:15:04.800",
|
||||
"lastModified": "2024-11-27T22:15:04.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:05.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In impeg2d_bit_stream_flush() of libmpeg2dec there is a possible OOB read due to a missing bounds check. This could lead to Remote DoS with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En impeg2d_bit_stream_flush() de libmpeg2dec existe una posible lectura OOB debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar un ataque DoS remoto sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2017-13321",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T22:15:04.900",
|
||||
"lastModified": "2024-11-27T22:15:04.900",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:05.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In SensorService::isDataInjectionEnabled of\u00a0frameworks/native/services/sensorservice/SensorService.cpp, there is a\u00a0possible out of bounds read due to a missing bounds check. This could lead\u00a0to local information disclosure with no additional execution privileges\u00a0needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En SensorService::isDataInjectionEnabled de frameworks/native/services/sensorservice/SensorService.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2017-13323",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T22:15:04.983",
|
||||
"lastModified": "2024-11-27T22:15:04.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:05.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In String16 of String16.cpp, there is a possible out of bounds write due to\u00a0an integer overflow. This could lead to local escalation of privilege in an\u00a0unprivileged process with no additional execution privileges needed. User\u00a0interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En String16 de String16.cpp, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar una escalada local de privilegios en un proceso sin privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9349",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T22:15:05.090",
|
||||
"lastModified": "2024-11-27T22:15:05.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:05.460",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In mv_err_cost of mcomp.c there is a possible out of bounds read due to missing bounds check. This could lead to denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En mv_err_cost de mcomp.c existe una posible lectura fuera de los l\u00edmites debido a la falta de verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9350",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T22:15:05.197",
|
||||
"lastModified": "2024-11-27T22:15:05.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:05.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ih264d_assign_pic_num of ih264d_utils.c there is a possible out of bound read due to missing bounds check. This could lead to a denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En ih264d_assign_pic_num de ih264d_utils.c existe una posible lectura fuera de los l\u00edmites debido a la falta de verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9351",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T23:15:04.343",
|
||||
"lastModified": "2024-11-27T23:15:04.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:05.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ih264e_fmt_conv_420p_to_420sp of ih264e_fmt_conv.c there is a possible out of bound read due to missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En ih264e_fmt_conv_420p_to_420sp de ih264e_fmt_conv.c existe una posible lectura fuera de los l\u00edmites debido a la falta de verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9352",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T23:15:04.467",
|
||||
"lastModified": "2024-11-27T23:15:04.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:05.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ihevcd_allocate_dynamic_bufs of ihevcd_api.c there is a possible resource exhaustion due to integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En ihevcd_allocate_dynamic_bufs de ihevcd_api.c existe un posible agotamiento de recursos debido a un desbordamiento de n\u00fameros enteros. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9353",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T23:15:04.560",
|
||||
"lastModified": "2024-11-27T23:15:04.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:06.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ihevcd_parse_slice_data of ihevcd_parse_slice.c there is a possible heap buffer out of bound read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En ihevcd_parse_slice_data de ihevcd_parse_slice.c existe una posible lectura fuera de los l\u00edmites del b\u00fafer de mont\u00f3n debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9354",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-27T23:15:04.650",
|
||||
"lastModified": "2024-11-27T23:15:04.650",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:06.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In VideoFrameScheduler.cpp of VideoFrameScheduler::PLL::fit, there is a\u00a0possible remote denial of service due to divide by 0. This could lead to\u00a0remote denial of service with no additional execution privileges needed.\u00a0User interaction is needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En VideoFrameScheduler.cpp de VideoFrameScheduler::PLL::fit, existe una posible denegaci\u00f3n de servicio remota debido a una divisi\u00f3n por 0. Esto podr\u00eda generar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9374",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-28T00:15:03.827",
|
||||
"lastModified": "2024-11-28T00:15:03.827",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:06.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In installPackageLI of PackageManagerService.java, there is a possible\u00a0permissions bypass. This could lead to local escalation of privilege with\u00a0User execution privileges needed. User interaction is not needed for\u00a0exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En installPackageLI de PackageManagerService.java, existe una posible omisi\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del usuario. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2018-9377",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-28T01:15:04.320",
|
||||
"lastModified": "2024-11-28T01:15:04.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:06.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a\u00a0possible information disclosure due to uninitialized data. This could lead\u00a0to local information disclosure with no additional execution privileges\u00a0needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En BnAudioPolicyService::onTransact de IAudioPolicyService.cpp, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda generar una divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
|
||||
|
145
CVE-2024/CVE-2024-119xx/CVE-2024-11995.json
Normal file
145
CVE-2024/CVE-2024-119xx/CVE-2024-11995.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-11995",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-29T21:15:04.290",
|
||||
"lastModified": "2024-11-29T21:15:04.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in code-projects Farmacia 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /pagamento.php. The manipulation of the argument total leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/5p4rk/cve/blob/main/xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286411",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286411",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.453639",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-31976",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T17:15:10.913",
|
||||
"lastModified": "2024-11-27T17:15:10.913",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T21:15:05.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker to execute arbitrary OS commands via the Controller connectivity parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los dispositivos EnGenius EWS356-FIR 1.1.30 y anteriores permiten que un atacante remoto ejecute comandos arbitrarios del sistema operativo a trav\u00e9s del par\u00e1metro de conectividad del controlador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31976",
|
||||
|
@ -2,20 +2,47 @@
|
||||
"id": "CVE-2024-38309",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-28T03:15:15.963",
|
||||
"lastModified": "2024-11-28T03:15:15.963",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T21:15:05.287",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There are multiple stack-based buffer overflow vulnerabilities in V-SFT (v6.2.2.0 and earlier), TELLUS (v4.0.19.0 and earlier), and TELLUS Lite (v4.0.19.0 and earlier).\r\nIf a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existen m\u00faltiples vulnerabilidades de desbordamiento de b\u00fafer basadas en pila en V-SFT (v6.2.2.0 y anteriores), TELLUS (v4.0.19.0 y anteriores) y TELLUS Lite (v4.0.19.0 y anteriores). Si un usuario abre un archivo especialmente manipulado, se puede divulgar informaci\u00f3n y/o ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,20 +2,47 @@
|
||||
"id": "CVE-2024-38389",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-28T03:15:16.113",
|
||||
"lastModified": "2024-11-28T03:15:16.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T21:15:05.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an Out-of-bounds read vulnerability in TELLUS (v4.0.19.0 and earlier) and TELLUS Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites en TELLUS (v4.0.19.0 y anteriores) y TELLUS Lite (v4.0.19.0 y anteriores). Si un usuario abre un archivo especialmente manipulado, se puede divulgar informaci\u00f3n y/o ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,20 +2,47 @@
|
||||
"id": "CVE-2024-38658",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-11-28T03:15:16.237",
|
||||
"lastModified": "2024-11-28T03:15:16.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T21:15:05.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an Out-of-bounds read vulnerability in V-Server (v4.0.19.0 and earlier) and V-Server Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites en V-Server (v4.0.19.0 y anteriores) y V-Server Lite (v4.0.19.0 y anteriores). Si un usuario abre un archivo especialmente manipulado, se puede divulgar informaci\u00f3n y/o ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50986",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T15:15:07.773",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2024-11-29T22:15:06.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Clementine v.1.3.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo DLL manipulado espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/clementine-player/Clementine",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-52769",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-20T17:15:19.907",
|
||||
"lastModified": "2024-11-20T17:15:19.907",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-29T22:15:06.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the component /admin/friendlink_edit of DedeBIZ v6.3.0 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /admin/friendlink_edit de DedeBIZ v6.3.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
|
||||
|
52
CVE-2024/CVE-2024-541xx/CVE-2024-54159.json
Normal file
52
CVE-2024/CVE-2024-541xx/CVE-2024-54159.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-54159",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-29T22:15:07.017",
|
||||
"lastModified": "2024-11-29T22:15:07.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "stalld through 1.19.7 allows local users to cause a denial of service (file overwrite) via a /tmp/rtthrottle symlink attack."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/61.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.opensuse.org/2024/11/29/stalld-fixed-tmp-file.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/11/29/3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
81
README.md
81
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-29T21:02:22.449173+00:00
|
||||
2024-11-29T23:01:09.305842+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-29T21:00:47.937000+00:00
|
||||
2024-11-29T22:15:07.017000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271706
|
||||
271708
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `25`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-11-29T20:15:19.863`)
|
||||
- [CVE-2024-35367](CVE-2024/CVE-2024-353xx/CVE-2024-35367.json) (`2024-11-29T20:15:19.957`)
|
||||
- [CVE-2024-35368](CVE-2024/CVE-2024-353xx/CVE-2024-35368.json) (`2024-11-29T20:15:20.050`)
|
||||
- [CVE-2024-35371](CVE-2024/CVE-2024-353xx/CVE-2024-35371.json) (`2024-11-29T20:15:20.143`)
|
||||
- [CVE-2024-36610](CVE-2024/CVE-2024-366xx/CVE-2024-36610.json) (`2024-11-29T20:15:20.237`)
|
||||
- [CVE-2024-36611](CVE-2024/CVE-2024-366xx/CVE-2024-36611.json) (`2024-11-29T19:15:06.780`)
|
||||
- [CVE-2024-36612](CVE-2024/CVE-2024-366xx/CVE-2024-36612.json) (`2024-11-29T20:15:20.340`)
|
||||
- [CVE-2024-36615](CVE-2024/CVE-2024-366xx/CVE-2024-36615.json) (`2024-11-29T19:15:07.703`)
|
||||
- [CVE-2024-36616](CVE-2024/CVE-2024-366xx/CVE-2024-36616.json) (`2024-11-29T19:15:07.817`)
|
||||
- [CVE-2024-52003](CVE-2024/CVE-2024-520xx/CVE-2024-52003.json) (`2024-11-29T19:15:08.170`)
|
||||
- [CVE-2024-52800](CVE-2024/CVE-2024-528xx/CVE-2024-52800.json) (`2024-11-29T19:15:08.713`)
|
||||
- [CVE-2024-52801](CVE-2024/CVE-2024-528xx/CVE-2024-52801.json) (`2024-11-29T19:15:08.890`)
|
||||
- [CVE-2024-52809](CVE-2024/CVE-2024-528xx/CVE-2024-52809.json) (`2024-11-29T19:15:09.030`)
|
||||
- [CVE-2024-52810](CVE-2024/CVE-2024-528xx/CVE-2024-52810.json) (`2024-11-29T19:15:09.163`)
|
||||
- [CVE-2024-53504](CVE-2024/CVE-2024-535xx/CVE-2024-53504.json) (`2024-11-29T20:15:20.763`)
|
||||
- [CVE-2024-53505](CVE-2024/CVE-2024-535xx/CVE-2024-53505.json) (`2024-11-29T20:15:20.853`)
|
||||
- [CVE-2024-53506](CVE-2024/CVE-2024-535xx/CVE-2024-53506.json) (`2024-11-29T20:15:20.943`)
|
||||
- [CVE-2024-53507](CVE-2024/CVE-2024-535xx/CVE-2024-53507.json) (`2024-11-29T20:15:21.027`)
|
||||
- [CVE-2024-53848](CVE-2024/CVE-2024-538xx/CVE-2024-53848.json) (`2024-11-29T19:15:09.290`)
|
||||
- [CVE-2024-53861](CVE-2024/CVE-2024-538xx/CVE-2024-53861.json) (`2024-11-29T19:15:09.433`)
|
||||
- [CVE-2024-53864](CVE-2024/CVE-2024-538xx/CVE-2024-53864.json) (`2024-11-29T19:15:09.577`)
|
||||
- [CVE-2024-53865](CVE-2024/CVE-2024-538xx/CVE-2024-53865.json) (`2024-11-29T19:15:09.710`)
|
||||
- [CVE-2024-53979](CVE-2024/CVE-2024-539xx/CVE-2024-53979.json) (`2024-11-29T19:15:09.847`)
|
||||
- [CVE-2024-53980](CVE-2024/CVE-2024-539xx/CVE-2024-53980.json) (`2024-11-29T19:15:09.993`)
|
||||
- [CVE-2024-53983](CVE-2024/CVE-2024-539xx/CVE-2024-53983.json) (`2024-11-29T19:15:10.137`)
|
||||
- [CVE-2024-11995](CVE-2024/CVE-2024-119xx/CVE-2024-11995.json) (`2024-11-29T21:15:04.290`)
|
||||
- [CVE-2024-54159](CVE-2024/CVE-2024-541xx/CVE-2024-54159.json) (`2024-11-29T22:15:07.017`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `56`
|
||||
Recently modified CVEs: `19`
|
||||
|
||||
- [CVE-2024-52763](CVE-2024/CVE-2024-527xx/CVE-2024-52763.json) (`2024-11-29T21:00:47.937`)
|
||||
- [CVE-2024-53909](CVE-2024/CVE-2024-539xx/CVE-2024-53909.json) (`2024-11-29T20:54:47.700`)
|
||||
- [CVE-2024-53910](CVE-2024/CVE-2024-539xx/CVE-2024-53910.json) (`2024-11-29T20:54:55.080`)
|
||||
- [CVE-2024-53911](CVE-2024/CVE-2024-539xx/CVE-2024-53911.json) (`2024-11-29T20:55:04.683`)
|
||||
- [CVE-2024-53912](CVE-2024/CVE-2024-539xx/CVE-2024-53912.json) (`2024-11-29T20:55:13.483`)
|
||||
- [CVE-2024-53913](CVE-2024/CVE-2024-539xx/CVE-2024-53913.json) (`2024-11-29T20:55:25.543`)
|
||||
- [CVE-2024-53914](CVE-2024/CVE-2024-539xx/CVE-2024-53914.json) (`2024-11-29T20:55:35.293`)
|
||||
- [CVE-2024-53915](CVE-2024/CVE-2024-539xx/CVE-2024-53915.json) (`2024-11-29T20:55:43.810`)
|
||||
- [CVE-2024-54123](CVE-2024/CVE-2024-541xx/CVE-2024-54123.json) (`2024-11-29T19:15:10.287`)
|
||||
- [CVE-2024-54124](CVE-2024/CVE-2024-541xx/CVE-2024-54124.json) (`2024-11-29T19:15:10.443`)
|
||||
- [CVE-2024-8726](CVE-2024/CVE-2024-87xx/CVE-2024-8726.json) (`2024-11-29T20:59:02.697`)
|
||||
- [CVE-2024-8825](CVE-2024/CVE-2024-88xx/CVE-2024-8825.json) (`2024-11-29T20:20:44.863`)
|
||||
- [CVE-2024-8826](CVE-2024/CVE-2024-88xx/CVE-2024-8826.json) (`2024-11-29T20:08:47.553`)
|
||||
- [CVE-2024-8827](CVE-2024/CVE-2024-88xx/CVE-2024-8827.json) (`2024-11-29T20:20:34.137`)
|
||||
- [CVE-2024-8828](CVE-2024/CVE-2024-88xx/CVE-2024-8828.json) (`2024-11-29T20:20:25.293`)
|
||||
- [CVE-2024-8829](CVE-2024/CVE-2024-88xx/CVE-2024-8829.json) (`2024-11-29T20:20:01.307`)
|
||||
- [CVE-2024-8830](CVE-2024/CVE-2024-88xx/CVE-2024-8830.json) (`2024-11-29T20:19:22.237`)
|
||||
- [CVE-2024-8831](CVE-2024/CVE-2024-88xx/CVE-2024-8831.json) (`2024-11-29T20:19:09.460`)
|
||||
- [CVE-2024-8832](CVE-2024/CVE-2024-88xx/CVE-2024-8832.json) (`2024-11-29T20:18:52.840`)
|
||||
- [CVE-2024-8833](CVE-2024/CVE-2024-88xx/CVE-2024-8833.json) (`2024-11-29T20:18:39.087`)
|
||||
- [CVE-2024-8834](CVE-2024/CVE-2024-88xx/CVE-2024-8834.json) (`2024-11-29T20:18:18.010`)
|
||||
- [CVE-2024-8835](CVE-2024/CVE-2024-88xx/CVE-2024-8835.json) (`2024-11-29T20:17:52.063`)
|
||||
- [CVE-2024-8836](CVE-2024/CVE-2024-88xx/CVE-2024-8836.json) (`2024-11-29T20:17:29.823`)
|
||||
- [CVE-2024-8837](CVE-2024/CVE-2024-88xx/CVE-2024-8837.json) (`2024-11-29T20:10:41.130`)
|
||||
- [CVE-2024-9777](CVE-2024/CVE-2024-97xx/CVE-2024-9777.json) (`2024-11-29T20:57:53.423`)
|
||||
- [CVE-2017-13316](CVE-2017/CVE-2017-133xx/CVE-2017-13316.json) (`2024-11-29T22:15:04.140`)
|
||||
- [CVE-2017-13319](CVE-2017/CVE-2017-133xx/CVE-2017-13319.json) (`2024-11-29T22:15:04.860`)
|
||||
- [CVE-2017-13320](CVE-2017/CVE-2017-133xx/CVE-2017-13320.json) (`2024-11-29T22:15:05.003`)
|
||||
- [CVE-2017-13321](CVE-2017/CVE-2017-133xx/CVE-2017-13321.json) (`2024-11-29T22:15:05.143`)
|
||||
- [CVE-2017-13323](CVE-2017/CVE-2017-133xx/CVE-2017-13323.json) (`2024-11-29T22:15:05.290`)
|
||||
- [CVE-2018-9349](CVE-2018/CVE-2018-93xx/CVE-2018-9349.json) (`2024-11-29T22:15:05.460`)
|
||||
- [CVE-2018-9350](CVE-2018/CVE-2018-93xx/CVE-2018-9350.json) (`2024-11-29T22:15:05.603`)
|
||||
- [CVE-2018-9351](CVE-2018/CVE-2018-93xx/CVE-2018-9351.json) (`2024-11-29T22:15:05.750`)
|
||||
- [CVE-2018-9352](CVE-2018/CVE-2018-93xx/CVE-2018-9352.json) (`2024-11-29T22:15:05.890`)
|
||||
- [CVE-2018-9353](CVE-2018/CVE-2018-93xx/CVE-2018-9353.json) (`2024-11-29T22:15:06.027`)
|
||||
- [CVE-2018-9354](CVE-2018/CVE-2018-93xx/CVE-2018-9354.json) (`2024-11-29T22:15:06.180`)
|
||||
- [CVE-2018-9374](CVE-2018/CVE-2018-93xx/CVE-2018-9374.json) (`2024-11-29T22:15:06.327`)
|
||||
- [CVE-2018-9377](CVE-2018/CVE-2018-93xx/CVE-2018-9377.json) (`2024-11-29T22:15:06.483`)
|
||||
- [CVE-2024-31976](CVE-2024/CVE-2024-319xx/CVE-2024-31976.json) (`2024-11-29T21:15:05.093`)
|
||||
- [CVE-2024-38309](CVE-2024/CVE-2024-383xx/CVE-2024-38309.json) (`2024-11-29T21:15:05.287`)
|
||||
- [CVE-2024-38389](CVE-2024/CVE-2024-383xx/CVE-2024-38389.json) (`2024-11-29T21:15:05.470`)
|
||||
- [CVE-2024-38658](CVE-2024/CVE-2024-386xx/CVE-2024-38658.json) (`2024-11-29T21:15:05.633`)
|
||||
- [CVE-2024-50986](CVE-2024/CVE-2024-509xx/CVE-2024-50986.json) (`2024-11-29T22:15:06.677`)
|
||||
- [CVE-2024-52769](CVE-2024/CVE-2024-527xx/CVE-2024-52769.json) (`2024-11-29T22:15:06.853`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
202
_state.csv
202
_state.csv
@ -97067,12 +97067,12 @@ CVE-2017-13312,0,0,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8
|
||||
CVE-2017-13313,0,0,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
|
||||
CVE-2017-13314,0,0,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
|
||||
CVE-2017-13315,0,0,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7ebce,2024-11-20T17:35:01.990000
|
||||
CVE-2017-13316,0,0,5db58d5fcffc666dbf46dcd9ec43d4700444ee57d99469243ffa93bd56c0868d,2024-11-27T20:15:22.363000
|
||||
CVE-2017-13319,0,0,1d1b7dfdf2779ff2945134b62ddc3791719a4e5d79b113376b0605acf4afdecc,2024-11-27T20:15:22.493000
|
||||
CVE-2017-13316,0,1,c4c5129b9dbb6560afe63cb0142b790bbb3b4646bf79ff3cb413c25a7131034f,2024-11-29T22:15:04.140000
|
||||
CVE-2017-13319,0,1,f23393a69de133f7a90b48ab44b5288d95b1d1856c774cba21f21a354eb95583,2024-11-29T22:15:04.860000
|
||||
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
|
||||
CVE-2017-13320,0,0,de91243412dd43ee85eff8af5b611185796470ba65437f956b129b0a7ac18300,2024-11-27T22:15:04.800000
|
||||
CVE-2017-13321,0,0,3ef527fe1b1c77388a090f66cd4fc38df7299a309df655e09080f710af7f68a8,2024-11-27T22:15:04.900000
|
||||
CVE-2017-13323,0,0,b846dc8e55e399e7a1e6836361bb561a98765f43d77858d6935ca27ca897203c,2024-11-27T22:15:04.983000
|
||||
CVE-2017-13320,0,1,2c6b19809decb7ef48d0cb3b58013fc270474be81d813a6332b8478c37dd0f00,2024-11-29T22:15:05.003000
|
||||
CVE-2017-13321,0,1,e0165a8e0af1c5b4aae8f4db068af25dca06fbd804d387a3f084ce815cbde546,2024-11-29T22:15:05.143000
|
||||
CVE-2017-13323,0,1,94cc8173cb7471a76d034d3d60a34c444a103c13c0a6460a8fdf605bd8abe259,2024-11-29T22:15:05.290000
|
||||
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
|
||||
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
|
||||
CVE-2017-1335,0,0,b4a4c4ceab320c0448477587defc160489b79dc191839b439254c53bf621ace5,2017-10-10T15:08:05.843000
|
||||
@ -126911,12 +126911,12 @@ CVE-2018-9345,0,0,9088018caabf82275cae10a91c6c951b29b1132e400477d435fc3e026fbf10
|
||||
CVE-2018-9346,0,0,7b3ffcf2c599b1ca45fc9362a7edc8a6b7cb4040a988482d54ba2191d8e834c0,2024-11-22T16:26:16.143000
|
||||
CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000
|
||||
CVE-2018-9348,0,0,1e52cd3e7fe64078256a975e9434db6f814769b9353caff59c9044c95fe7f30c,2024-11-22T21:14:05.813000
|
||||
CVE-2018-9349,0,0,1ec898f6f78e054584e11b8f72b4678ecddc41ba346c89b86409a5b107146e43,2024-11-27T22:15:05.090000
|
||||
CVE-2018-9350,0,0,4a1d2f92bfae5d6df3c835ec5f8b5a6cd6d525e155781cadf73bd709e4a84044,2024-11-27T22:15:05.197000
|
||||
CVE-2018-9351,0,0,9c8dc76f325443d2af09564f69a7d6289b0498b7244f03d79b61c3b4a50b4c4d,2024-11-27T23:15:04.343000
|
||||
CVE-2018-9352,0,0,8ece7877aa94119895e2fd49311f9899770d4dda8ae2d811be2cb2d5341165eb,2024-11-27T23:15:04.467000
|
||||
CVE-2018-9353,0,0,c522d18fc4abc6f6a0a63f1deada0c502f1b5f96434a80e3e9a1c3c391f6d4f0,2024-11-27T23:15:04.560000
|
||||
CVE-2018-9354,0,0,043e16cd6bd66c9b34f19d6cdddb5b438e1e4de0a18dd80cef438f00d49545ef,2024-11-27T23:15:04.650000
|
||||
CVE-2018-9349,0,1,b75691ccc166c70aafce9210d034cc46d450af4593d1806a52d5b3a92566c14b,2024-11-29T22:15:05.460000
|
||||
CVE-2018-9350,0,1,f25c7c87bd8d87ff295d8598cc53e70314948ffef9b6e673f8e9028df5e1de06,2024-11-29T22:15:05.603000
|
||||
CVE-2018-9351,0,1,e44060c50f6ccee31cd46a33f7e86cc7a461fbfa6189a5751eaee489bfea586d,2024-11-29T22:15:05.750000
|
||||
CVE-2018-9352,0,1,7a06878196fa7e0a103b02e82bac78d7f385dfe438523a1cfdd9a50e78726648,2024-11-29T22:15:05.890000
|
||||
CVE-2018-9353,0,1,a9ef360291c04284491c5fd46a3fdbf5f7b25e7f6a3a8a7900f33dac6e523b6d,2024-11-29T22:15:06.027000
|
||||
CVE-2018-9354,0,1,dd37169178de3aca428bb4d7e910a33e918270392fdac879be991d83c8b76ac2,2024-11-29T22:15:06.180000
|
||||
CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000
|
||||
CVE-2018-9356,0,0,21c7b89f47d2b248793d1becde812d30b3640d909c40ac658a8c842107272366,2018-12-14T21:00:15.003000
|
||||
CVE-2018-9357,0,0,b108f834ec62803dd7e497cf27a71d840f665249e07751f13a6e34a3e56225ce,2018-12-12T15:44:27.167000
|
||||
@ -126935,8 +126935,8 @@ CVE-2018-9369,0,0,aba8b31bfaad07093e35204c3acbfdd205ba52be28c76bf4d75bf1f22d977b
|
||||
CVE-2018-9370,0,0,ae53e355aa0524bf60f4d348ee71944e38f6c6c59f44b44474743ec3d5eda58d,2024-11-22T21:24:57.467000
|
||||
CVE-2018-9371,0,0,dce1635a39fc875c3a6010e78992681138a4af74d8f57da615da4dd9d5becbf0,2024-11-22T21:25:48.853000
|
||||
CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000
|
||||
CVE-2018-9374,0,0,98a6fbbb04a2957aedc1b044162badd058f6e51b87cbbbc6085ee46fbc44a729,2024-11-28T00:15:03.827000
|
||||
CVE-2018-9377,0,0,c031ed8956527a9392741d5679d4c3a9ceec752c203602c9fe045e60dfa9de21,2024-11-28T01:15:04.320000
|
||||
CVE-2018-9374,0,1,b5c9257b4379d5ec059f557b277f9ab8f86bedde18eae66967ba271cf76e5f31,2024-11-29T22:15:06.327000
|
||||
CVE-2018-9377,0,1,e4a0a8bd1ac9734ae148f92ac66c4e7d1d997837e82ad8c47cc9f88531e107dc,2024-11-29T22:15:06.483000
|
||||
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
|
||||
CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000
|
||||
CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000
|
||||
@ -243309,7 +243309,7 @@ CVE-2024-10897,0,0,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f
|
||||
CVE-2024-10898,0,0,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372718,2024-11-26T20:32:20.217000
|
||||
CVE-2024-10899,0,0,3af5ea7b90e5da0230215c5076c9eff9b3749f9f5f947443d89625612842d08a,2024-11-26T21:01:21.643000
|
||||
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10900,0,1,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000
|
||||
CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000
|
||||
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10913,0,0,4e9b29333972ed20a30c4eccde2c9645761370bd1f3d0211dcdd27a3f9c3d9cf,2024-11-20T14:15:17.253000
|
||||
CVE-2024-10914,0,0,0e11c1731905763ffc173784369687971adc0677422c26a81c4aa2918d85e560,2024-11-24T15:15:06.090000
|
||||
@ -243888,6 +243888,7 @@ CVE-2024-11983,0,0,1494cd6825cb1279c1c5cc1f6b3f60736092f3a2dc6c2ab58516f5286cd35
|
||||
CVE-2024-1199,0,0,9a04e528b30ee4387e68bb38a7f1be0392a71f3796108477e123a7601c79c0fa,2024-05-17T02:35:18.570000
|
||||
CVE-2024-11990,0,0,0ea61f760bb00d4ee0bb54c1c5f4898913a822219e93c4dad86c6424a909019a,2024-11-29T13:15:04.170000
|
||||
CVE-2024-11992,0,0,dec6f82d309a9ca3d0c0e65e3be01067bf6c8b19cbafb67c3c3b2120ec9fbb36,2024-11-29T13:15:05.210000
|
||||
CVE-2024-11995,1,1,659ce94b6e16e4b5841f6ecdfa5b75901b46fdf4f7f3359160ef6a760f2f39d5,2024-11-29T21:15:04.290000
|
||||
CVE-2024-1200,0,0,cbf824dd51d7a3b837d210f60d3bc2fcd8c0de7dc55b64bf2469e6bd3fafa8cd,2024-05-17T02:35:18.673000
|
||||
CVE-2024-1201,0,0,f9834193bbb62b403f23d3357a53cc3ad9bb6173e269e5c9bf81a47c0a1a0786,2024-02-09T19:27:29.517000
|
||||
CVE-2024-1202,0,0,6132da5e9762048f130f38f4ec670738f94221153725a0b95c9666bf5c59cb16,2024-08-01T19:15:32.277000
|
||||
@ -245116,7 +245117,7 @@ CVE-2024-20667,0,0,9d5c87b92b390b6ea82da7c9e633e5a17c87d51d922713c3d873a0f77449a
|
||||
CVE-2024-20669,0,0,f0c902f60789f9dc18d42d1330ca1f80cdc454a4d5b89781b9df633a47d4c661,2024-04-10T13:24:22.187000
|
||||
CVE-2024-2067,0,0,8291771316cf392475e14c13e92e6fa7b48bf072b9ca3ea306126fc052a45f60,2024-05-17T02:38:01.493000
|
||||
CVE-2024-20670,0,0,0b09c1865cde63a5f73fcf3c23f43c88436f13584e9768b43db156ed2524cc12,2024-04-10T13:24:22.187000
|
||||
CVE-2024-20671,0,1,6b0a7f41059b2984fe800d80092f13f75ad163ac7e615b02ff43563d05f345cb,2024-11-29T20:40:08.810000
|
||||
CVE-2024-20671,0,0,6b0a7f41059b2984fe800d80092f13f75ad163ac7e615b02ff43563d05f345cb,2024-11-29T20:40:08.810000
|
||||
CVE-2024-20672,0,0,2a2ae3b672a71823076941440200b49123ed47b379e2ba84eaa542df20ae3ed6,2024-06-11T15:15:56.723000
|
||||
CVE-2024-20673,0,0,92359ae1babe87f9d2569c86c5d2659bf4645ee0674948fdd4bd4a81fec3df6d,2024-06-11T15:15:56.927000
|
||||
CVE-2024-20674,0,0,da1fed3fc9882951bbd9a307c57a38164e881c2c901c1975152e12872c8dd97c,2024-06-11T15:15:57.087000
|
||||
@ -245785,7 +245786,7 @@ CVE-2024-21330,0,0,b2ac5d60b9bce9457d738f60e3ac9bb05697d436bd7be2810a9e1f7c3a676
|
||||
CVE-2024-21331,0,0,92cd30ae764b239f28c0a8df0c95713f1cf63a2fae07aa40ae29b0b0ea46cc37,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21332,0,0,e26f081e210bc97138c2c24c4864fe4562659ce63b5b575f0c0fb25cc97812b8,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21333,0,0,32851108840c7a13c1ee82ea16c50177907e4bcd2e482894344fc3874564fc20,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21334,0,1,a2fadb28958f4c873cb0666784d6c1f11fe970b44d08bbb31b67617f0dfb3d6a,2024-11-29T20:52:35.697000
|
||||
CVE-2024-21334,0,0,a2fadb28958f4c873cb0666784d6c1f11fe970b44d08bbb31b67617f0dfb3d6a,2024-11-29T20:52:35.697000
|
||||
CVE-2024-21335,0,0,d3be0da75c93e40dc74ef43532ac464e7457c464e235cbe682e70d325b6a979e,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21336,0,0,4632192569ed60af4d57d1dd58a5b140d682aa1d82fc677d5ec51bcb39be3541,2024-06-11T15:15:59.553000
|
||||
CVE-2024-21337,0,0,1ed4e9ec6936be258d1de771e0acb5830541ca48fb0a246032f3c3930147d134,2024-05-29T00:15:20.793000
|
||||
@ -245849,7 +245850,7 @@ CVE-2024-21389,0,0,45e04e95ea2df4355a256491d2fd84dc18fc915c0e6f04b4c26e5cb7104a1
|
||||
CVE-2024-2139,0,0,b3135502da92e95e16c2b5b9fb535ef64e920678d73e9ac518e10c09c2ae19dd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-21390,0,0,825edcf38cfbeb450d8ce686d8ed931b72dd5fbbd9947124a708715e091607ac,2024-04-11T20:15:28.173000
|
||||
CVE-2024-21391,0,0,abcc609910d8356bbf221f6824538c8f8dccb2b167955bff922a627eaed11837,2024-05-29T00:15:32.207000
|
||||
CVE-2024-21392,0,1,f456f49aab1a6749cce2eb5b590eaeaa8b7133a2c686945470441f78eb54e1bb,2024-11-29T20:52:32.870000
|
||||
CVE-2024-21392,0,0,f456f49aab1a6749cce2eb5b590eaeaa8b7133a2c686945470441f78eb54e1bb,2024-11-29T20:52:32.870000
|
||||
CVE-2024-21393,0,0,38081cbb15c019a6d6a5ebae688b74c2cac694832eb96676185080e3d938325e,2024-05-29T00:15:32.587000
|
||||
CVE-2024-21394,0,0,aa75466b0aaf4d3ff3bbec78793ccbcfd1afc16c532cab8eae1991bcd2df2554,2024-05-29T00:15:32.707000
|
||||
CVE-2024-21395,0,0,e344e1d068e814165683c2d644d3dff647258b1ba561cb9b39845a1e1518a759,2024-05-29T00:15:32.827000
|
||||
@ -245858,7 +245859,7 @@ CVE-2024-21397,0,0,b0ec241328054a214047be8b8375fba9ad1406b2a99b2fb228fd123085bb3
|
||||
CVE-2024-21398,0,0,c4c7d6f98e04a810853dfb263ff519362e5129031c36304acc0da85b748d5ae9,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21399,0,0,001820e0109335f5a2640c4a5189f5fe8ac80b4b4f2ff4d1526569f2ec1fd18f,2024-06-11T15:16:02.503000
|
||||
CVE-2024-2140,0,0,f13df4d472ba646e6aac958170cf967e223db17be65b98ce4a37e6d44e80809a,2024-04-01T01:12:59.077000
|
||||
CVE-2024-21400,0,1,2de01f4dbeb37da40535fdb046ba8fe35fb67bd6f8108c5aa79d114487cbb998,2024-11-29T20:52:31.103000
|
||||
CVE-2024-21400,0,0,2de01f4dbeb37da40535fdb046ba8fe35fb67bd6f8108c5aa79d114487cbb998,2024-11-29T20:52:31.103000
|
||||
CVE-2024-21401,0,0,4b2a9c60547467c59f9b439a18da60452bb72bfbcd0f28b98d7478e2777b8310,2024-05-29T00:15:33.247000
|
||||
CVE-2024-21402,0,0,30768b38d5acb186afa5a073ad3bf20aec4d542134aab6ee100b1ef4d75c9e65,2024-05-29T00:15:33.383000
|
||||
CVE-2024-21403,0,0,8f71e0b167eb11d7fdd6149f06e349c1f5d981ec85fc70817f5e47a2e0410a89,2024-10-07T14:03:00.607000
|
||||
@ -245878,22 +245879,22 @@ CVE-2024-21415,0,0,42bcd1202ef0ba594d559bd9441152ac5ae9644c270ba50531381a1aa41e9
|
||||
CVE-2024-21416,0,0,7cc6fd4c84942ce1dc818417cef771869802afebc6e3c7d7b19ed19e00198c83,2024-09-20T18:55:14.573000
|
||||
CVE-2024-21417,0,0,b49ef9a4a1641236078c066f567251303fbb25636e983b46ec501a6c4a0c9cb3,2024-07-11T13:05:54.930000
|
||||
CVE-2024-21418,0,0,0f25c581a81e174a088bbd635450254be7b5c931f905496efb1385b8f25ccca1,2024-05-29T00:15:34.853000
|
||||
CVE-2024-21419,0,1,3cb3fdb5be67b19326a793bdd9f0d7cc48c79a6f3fd2ccef4d9014d402593d28,2024-11-29T20:52:29.267000
|
||||
CVE-2024-21419,0,0,3cb3fdb5be67b19326a793bdd9f0d7cc48c79a6f3fd2ccef4d9014d402593d28,2024-11-29T20:52:29.267000
|
||||
CVE-2024-2142,0,0,44f8897a85c55e986bec9130d64561487683ff5057711f75d9355872ef6d360c,2024-04-01T01:12:59.077000
|
||||
CVE-2024-21420,0,0,dbdb3da803abfd446d4196a8fbdd1a526fe0842184e24ea68b2aaa7257e503ef,2024-10-07T14:05:29.367000
|
||||
CVE-2024-21421,0,0,aa003351515fa6a13b090cbacd30e2c8bf4eb2017cb79e6a1063d808b3f7cdca,2024-03-12T17:46:17.273000
|
||||
CVE-2024-21423,0,1,f9af7e37fa4ac00db3d27c63c91f6cab8fd61fd4e0cd58b29bafe7da8fbc1bbb,2024-11-29T20:42:08.630000
|
||||
CVE-2024-21423,0,0,f9af7e37fa4ac00db3d27c63c91f6cab8fd61fd4e0cd58b29bafe7da8fbc1bbb,2024-11-29T20:42:08.630000
|
||||
CVE-2024-21424,0,0,77e44977e766588a59c87cb45706c3bfc2a9108d9dbf7fbc64f556e35f14f570,2024-04-10T13:24:00.070000
|
||||
CVE-2024-21425,0,0,2812cfc5eff10f169d419b1ab02c34a9eddedbeb477ccb53ff000f9cf064044f,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21426,0,1,28cc51db69ba03e1e83cb7f3a9f5914be340ff48d83ec7285f47ab6e4a1893d0,2024-11-29T20:50:09.910000
|
||||
CVE-2024-21427,0,1,c8fca909f1ebd3caf8e518589319c47ad8bb6383ef7d8dedc9738dca072eb2c7,2024-11-29T20:49:42.757000
|
||||
CVE-2024-21426,0,0,28cc51db69ba03e1e83cb7f3a9f5914be340ff48d83ec7285f47ab6e4a1893d0,2024-11-29T20:50:09.910000
|
||||
CVE-2024-21427,0,0,c8fca909f1ebd3caf8e518589319c47ad8bb6383ef7d8dedc9738dca072eb2c7,2024-11-29T20:49:42.757000
|
||||
CVE-2024-21428,0,0,d4326ce0e7de9ba79740916e4b692bd60f0e0e1e1ad6ad9543bd3e7e8895901a,2024-07-09T18:18:38.713000
|
||||
CVE-2024-21429,0,1,79bf9da0c0c440cacc8d7c59a249e2fecfe91cb5928203b47289aa3010fba9f8,2024-11-29T20:43:50.370000
|
||||
CVE-2024-21429,0,0,79bf9da0c0c440cacc8d7c59a249e2fecfe91cb5928203b47289aa3010fba9f8,2024-11-29T20:43:50.370000
|
||||
CVE-2024-2143,0,0,b4196c236271ea86599a9a6a71fa5d263ddeb4583a563a5493a42f4b531b62e8,2024-04-01T01:12:59.077000
|
||||
CVE-2024-21430,0,1,0c82706eb5221197af87e1f265a82dd4b412c443a76d8a68cabb9de79ab86d7a,2024-11-29T20:44:32.717000
|
||||
CVE-2024-21431,0,1,adb271f7c07729890dc0e6600645b6eea17bdcd896aadfcebe92e54de18d6777,2024-11-29T20:44:56.373000
|
||||
CVE-2024-21432,0,1,b26b06b5af97e258df7fe189dd0fd737f77add3019eecc5409fe9334ce5a5d02,2024-11-29T20:47:25.987000
|
||||
CVE-2024-21433,0,1,100deeaf7e9386a87e131a946114df15ff214b00b65b78941702d176f64f5d82,2024-11-29T20:47:35.220000
|
||||
CVE-2024-21430,0,0,0c82706eb5221197af87e1f265a82dd4b412c443a76d8a68cabb9de79ab86d7a,2024-11-29T20:44:32.717000
|
||||
CVE-2024-21431,0,0,adb271f7c07729890dc0e6600645b6eea17bdcd896aadfcebe92e54de18d6777,2024-11-29T20:44:56.373000
|
||||
CVE-2024-21432,0,0,b26b06b5af97e258df7fe189dd0fd737f77add3019eecc5409fe9334ce5a5d02,2024-11-29T20:47:25.987000
|
||||
CVE-2024-21433,0,0,100deeaf7e9386a87e131a946114df15ff214b00b65b78941702d176f64f5d82,2024-11-29T20:47:35.220000
|
||||
CVE-2024-21434,0,0,b1361f70a03881d0b7783b1f104c7680681900021804a88dbbfddef6ed773234,2024-04-11T20:15:31.620000
|
||||
CVE-2024-21435,0,0,af4c6ac7ef76f0f67a1ba6277b5a8737b11e09d1129e2401445d4e52e15c50e8,2024-05-29T00:15:35.713000
|
||||
CVE-2024-21436,0,0,00556a431a6d8f3334e9f93cd607dfc16f3cab8684b005c0250ef6e1b8b30f19,2024-05-29T00:15:35.830000
|
||||
@ -249252,7 +249253,7 @@ CVE-2024-26163,0,0,1cec6fd5081dd6336471bb2c93b29cc598ec8cf690b6a4f047866b54bc86e
|
||||
CVE-2024-26164,0,0,97e84461485204919561d873bba734d2b5d91bb4f6ec5c1ad6eb15a94be78498,2024-04-11T20:15:33.877000
|
||||
CVE-2024-26165,0,0,83eab2c0875e9b88a1f7ce329398a5e0cce759e0512193fa6f5822a067798b74,2024-06-11T16:15:19.780000
|
||||
CVE-2024-26166,0,0,2dced7e6cfb444dab6a8949445585382808844907087fc776f21c6d4c672ba6a,2024-04-11T20:15:33.987000
|
||||
CVE-2024-26167,0,1,8855bcc7e86d2bfb321c97571f709e8374a60be9ce3b496dc4c11c762f54238c,2024-11-29T20:40:52.990000
|
||||
CVE-2024-26167,0,0,8855bcc7e86d2bfb321c97571f709e8374a60be9ce3b496dc4c11c762f54238c,2024-11-29T20:40:52.990000
|
||||
CVE-2024-26168,0,0,79980e86f7902cdfbf2750e2f70229d42c3911a1aa52728ae4a317e89b62a526,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26169,0,0,1019f2fc447e0f9753156720ba4d1d39073dcb9223b8501955c81cf0a85bd6ec,2024-11-29T16:24:31.767000
|
||||
CVE-2024-2617,0,0,c735ab59fafbabeeafc878072d5ef91a88b0cb8e9dc08af938860e93db5c996f,2024-07-03T01:53:23.587000
|
||||
@ -249274,12 +249275,12 @@ CVE-2024-26183,0,0,4d74cd74f15c42ef83e07da0fea854b9308a2d6867480d27e88f16b8021a5
|
||||
CVE-2024-26184,0,0,9a9469b525a1c0948733fdbbefd0c134cd0d1bfb19cc88ca9e1172b5dc220da3,2024-07-17T14:58:41.847000
|
||||
CVE-2024-26185,0,0,9feef43ee36b690f774d8b3be3682410d3a24414bd3e53eb7eb31b5bf9351714,2024-05-29T00:15:37.420000
|
||||
CVE-2024-26186,0,0,36ccb09d2bf153f937e5e66344d4acad5c2798a004f521a6a2f0b10de8b37b05,2024-09-23T16:48:36.993000
|
||||
CVE-2024-26188,0,1,dc54c4d9a5d848ec0b1e8b8383a55a611364acd7c047ade8b5f14981ef4b7578,2024-11-29T20:41:53.547000
|
||||
CVE-2024-26188,0,0,dc54c4d9a5d848ec0b1e8b8383a55a611364acd7c047ade8b5f14981ef4b7578,2024-11-29T20:41:53.547000
|
||||
CVE-2024-26189,0,0,2a49ee8d4a0ba2f801fc699ef40f2bf3b0913e4387987b37ad42d4a5aa46f00e,2024-04-10T13:24:00.070000
|
||||
CVE-2024-2619,0,0,3ad4efc25cc381a08190aaf20f81de7fb62ed67d01a5b4fb428e260f22ab5802,2024-05-17T18:36:05.263000
|
||||
CVE-2024-26190,0,0,2c15f1de93d1a079b40144981fb69e3fc0cface9d9c13ad726466b53618f3452,2024-05-29T00:15:37.597000
|
||||
CVE-2024-26191,0,0,6e7a0054b262a9288872fe975e02e1e98f0d17f2e6eb60a988c9ddaadd8538a4,2024-09-23T16:51:43.927000
|
||||
CVE-2024-26192,0,1,902591bef94f52ba914c3fcd6fecc2d37a089b0a8650f5c905e8f55fef155ff1,2024-11-29T20:41:36.453000
|
||||
CVE-2024-26192,0,0,902591bef94f52ba914c3fcd6fecc2d37a089b0a8650f5c905e8f55fef155ff1,2024-11-29T20:41:36.453000
|
||||
CVE-2024-26193,0,0,8fddc835a44742351670403f475d1a7fbbfaa53f469d57320747dbc6b6cb5a20,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26194,0,0,11c479afbc9197da02f6a4aa14d5718e799cccfb9f0ca6804619eeb622290024,2024-04-10T13:24:00.070000
|
||||
CVE-2024-26195,0,0,f9685945e615e0cfe189b9bd1c92904f15fea6beba07eb018c4de9659528b4d4,2024-04-10T13:24:00.070000
|
||||
@ -253622,7 +253623,7 @@ CVE-2024-31972,0,0,f9241b9f06175c965ad284b5c2136f1f7f8e377bc5d6b68f231b17656172b
|
||||
CVE-2024-31973,0,0,c3480f733abb332799fc1f07ef143103e9de0ed931d381c037c7e12d5a9eb78d,2024-11-01T12:57:03.417000
|
||||
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
|
||||
CVE-2024-31975,0,0,eb324a6bedd4b93ad2ac0707b00b07dfad728d7f39959adabc810317189eae1a,2024-11-04T17:15:07.030000
|
||||
CVE-2024-31976,0,0,86650fc9453e252df3074d41108b57b4ccd00ba612e3f0e59342d64ff7c647e6,2024-11-27T17:15:10.913000
|
||||
CVE-2024-31976,0,1,e929f832b9bdd757f2494eb87df634dbc70969c50f82d9149bf6f93aa2745c92,2024-11-29T21:15:05.093000
|
||||
CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000
|
||||
CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000
|
||||
@ -256139,12 +256140,12 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc
|
||||
CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000
|
||||
CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000
|
||||
CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000
|
||||
CVE-2024-35366,1,1,9b84de888d50ddbd7efcc8707ea3df5f70e05d0c67de0741833ade895b234c7a,2024-11-29T20:15:19.863000
|
||||
CVE-2024-35367,1,1,4cf1651bad5e480a4d826c3f8e668cb9c693764d20895a38503f6b2564a1fcb2,2024-11-29T20:15:19.957000
|
||||
CVE-2024-35368,1,1,b29911c8c82dc3259e072b942eea7a4d1149791db93f1fecc5fe0708cef54fcf,2024-11-29T20:15:20.050000
|
||||
CVE-2024-35366,0,0,9b84de888d50ddbd7efcc8707ea3df5f70e05d0c67de0741833ade895b234c7a,2024-11-29T20:15:19.863000
|
||||
CVE-2024-35367,0,0,4cf1651bad5e480a4d826c3f8e668cb9c693764d20895a38503f6b2564a1fcb2,2024-11-29T20:15:19.957000
|
||||
CVE-2024-35368,0,0,b29911c8c82dc3259e072b942eea7a4d1149791db93f1fecc5fe0708cef54fcf,2024-11-29T20:15:20.050000
|
||||
CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000
|
||||
CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000
|
||||
CVE-2024-35371,1,1,3451d96059fd4d38b9b56c8029c259808886cc489aad6ecd6a8e5b4dc96d8c65,2024-11-29T20:15:20.143000
|
||||
CVE-2024-35371,0,0,3451d96059fd4d38b9b56c8029c259808886cc489aad6ecd6a8e5b4dc96d8c65,2024-11-29T20:15:20.143000
|
||||
CVE-2024-35373,0,0,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000
|
||||
CVE-2024-35374,0,0,aa83a1884752e38a4efa40b8d631e010f03947873314106502ec442b10442cd7,2024-08-20T15:35:14.870000
|
||||
CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000
|
||||
@ -257142,11 +257143,11 @@ CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117e
|
||||
CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000
|
||||
CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000
|
||||
CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000
|
||||
CVE-2024-36610,1,1,312841435172043d5dd2190cf6b8c2300f7c9822702ef3e5fa4446eac6b961e2,2024-11-29T20:15:20.237000
|
||||
CVE-2024-36611,1,1,42465fba5d209a57964c1117a778f054088fdce7482f6b6bd27c3304a10b7c3d,2024-11-29T19:15:06.780000
|
||||
CVE-2024-36612,1,1,fdd926ad563891ccb6e110831ad8dd9cdcf5f661c8c399d337246f268066a229,2024-11-29T20:15:20.340000
|
||||
CVE-2024-36615,1,1,2f8c6f09c7b5113fafb5a41f7e4cbad94a7ad0500652cf2d1c05a06d469ab9d0,2024-11-29T19:15:07.703000
|
||||
CVE-2024-36616,1,1,30073513037d78480eea5288925f8e6f4e5b29c346f1de578cf8c107b66d46e5,2024-11-29T19:15:07.817000
|
||||
CVE-2024-36610,0,0,312841435172043d5dd2190cf6b8c2300f7c9822702ef3e5fa4446eac6b961e2,2024-11-29T20:15:20.237000
|
||||
CVE-2024-36611,0,0,42465fba5d209a57964c1117a778f054088fdce7482f6b6bd27c3304a10b7c3d,2024-11-29T19:15:06.780000
|
||||
CVE-2024-36612,0,0,fdd926ad563891ccb6e110831ad8dd9cdcf5f661c8c399d337246f268066a229,2024-11-29T20:15:20.340000
|
||||
CVE-2024-36615,0,0,2f8c6f09c7b5113fafb5a41f7e4cbad94a7ad0500652cf2d1c05a06d469ab9d0,2024-11-29T19:15:07.703000
|
||||
CVE-2024-36616,0,0,30073513037d78480eea5288925f8e6f4e5b29c346f1de578cf8c107b66d46e5,2024-11-29T19:15:07.817000
|
||||
CVE-2024-36617,0,0,c18e2eb9b33d632f63d305b3eb6f50e7d6743c0489ab5af161e69fa56de5ba4b,2024-11-29T18:15:07.230000
|
||||
CVE-2024-36618,0,0,f1fe269f8119cc1956333354d8d1ebbf16ea9be0fb3347b792a87c6a5e02f274,2024-11-29T18:15:07.390000
|
||||
CVE-2024-36619,0,0,d30e29b19403999a360d49eb2b7510653e8a4eeae72cc3067a2b6e14731d746f,2024-11-29T18:15:07.550000
|
||||
@ -257155,7 +257156,7 @@ CVE-2024-36620,0,0,bd940859e3a70ba9f20daee48c18afd5e689ded5655791c03dcd144494e8a
|
||||
CVE-2024-36621,0,0,395c2e8d706b3be77e22c8c62abd8cdfeac4ff3d292f427ab7129b4c0bf7529f,2024-11-29T18:15:07.993000
|
||||
CVE-2024-36622,0,0,be48e05186f5ac071984ac26618b6189df06db278a956e908f53e3b956f07a62,2024-11-29T18:15:08.140000
|
||||
CVE-2024-36623,0,0,5b0927c621a8ce8b7dff6d101236e2659ea986ccf06dc2c525fa93aebc3aee45,2024-11-29T18:15:08.293000
|
||||
CVE-2024-36624,0,1,0a7b2aae5839929f5368ebe0e8fb0a7dbe600d4804ac108be619ee97ae88a044,2024-11-29T19:15:07.923000
|
||||
CVE-2024-36624,0,0,0a7b2aae5839929f5368ebe0e8fb0a7dbe600d4804ac108be619ee97ae88a044,2024-11-29T19:15:07.923000
|
||||
CVE-2024-36625,0,0,7c23d2425847fcff4ab6a41af1e0a7a10f21527b69c1199afaca70ff1a9c9744,2024-11-29T18:15:08.607000
|
||||
CVE-2024-36626,0,0,7dca574daa62085fcbacc3d2cfa724a9215be24530b261fdff176e59425b90fb,2024-11-29T18:15:08.840000
|
||||
CVE-2024-3663,0,0,aac8884135ebb34dcb3248cfa17d27356201b5565d5879d71d9c52eb44a76d97,2024-05-22T12:46:53.887000
|
||||
@ -258436,7 +258437,7 @@ CVE-2024-38304,0,0,c9c5e31995efec3c1031188bcbced9384b5bd23fcd1002d4307a7715d8d36
|
||||
CVE-2024-38305,0,0,8b2a25f772813217d648083a791c87824d2ddecf111410c1e83c757aac9fac81,2024-11-25T18:16:27.450000
|
||||
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
|
||||
CVE-2024-38308,0,0,fe139b0ba6074f0e39f21bcc0d3b2863f88a6047b3a5a779d5f8bedf5488475c,2024-10-07T15:24:34.517000
|
||||
CVE-2024-38309,0,0,e9859535163e2537f52f330494955ad7e2d3d87be6120960b3eec832ceef721f,2024-11-28T03:15:15.963000
|
||||
CVE-2024-38309,0,1,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000
|
||||
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38312,0,0,1126d925e9f3df6172b0d645f8055a412179734e7392e5e8aca22a182aa8d817,2024-10-30T19:35:13.407000
|
||||
CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000
|
||||
@ -258492,7 +258493,7 @@ CVE-2024-38385,0,0,ad39ce50ee10d7c4352abf70f77a4305b91c93b47f7bafc6237b8077dda88
|
||||
CVE-2024-38386,0,0,4681bfa2c99f249f935e8a6e34318b7575619c3c0775d501b8fe8a79c951203a,2024-09-04T16:56:41.463000
|
||||
CVE-2024-38387,0,0,014a3d44dcc0a711ef94361a639acd581d9d8567d9ef5156c648a25b68eac6a4,2024-11-15T14:00:09.720000
|
||||
CVE-2024-38388,0,0,59d748481b79bef641da29fa14283366526c194312c93d8df5bfc773a451913c,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38389,0,0,71a435fa4e6bc2c9ca202a26967d25085bb6b17864b502b24db74662eb6aab06,2024-11-28T03:15:16.113000
|
||||
CVE-2024-38389,0,1,a8bcc296848fbb0ccec07e637a9f568f5a1ad2cdc405631715a33ea9618a2c4f,2024-11-29T21:15:05.470000
|
||||
CVE-2024-3839,0,0,7c6a8e24e8992e3cadc889bd78886524b88f88c58f4f3536293ab700e2d6e3b8,2024-07-03T02:06:38.637000
|
||||
CVE-2024-38390,0,0,79dc30f8af84c9201715bbbab17f78ad07e2499ec7748a40259461d61601cd3c,2024-09-09T13:38:26.600000
|
||||
CVE-2024-38391,0,0,20b04656bf618f5c1be614d3d82a6f2592410c65ddd3dee3dc7474add7c8b054,2024-07-02T20:15:05.730000
|
||||
@ -258750,7 +258751,7 @@ CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd
|
||||
CVE-2024-38654,0,0,f45589254774140aa774de676d23baded7790116b3c26a33eefbf7b8b5299f5e,2024-11-13T17:35:06.447000
|
||||
CVE-2024-38655,0,0,26921028d57aeb27da418884c4f65831287be30bc954e6fd9c39e161e53e5c78,2024-11-23T21:15:14.393000
|
||||
CVE-2024-38656,0,0,b5a6998a1d2773376aa607cd8041e3c96fc5a1f41c3e7dc16fe74c7fe2d7dea7,2024-11-23T21:15:14.497000
|
||||
CVE-2024-38658,0,0,189a74dc30672c653fcaa143682b6cdb2a8a2fc2179698c0b4296b5f9c046534,2024-11-28T03:15:16.237000
|
||||
CVE-2024-38658,0,1,e6ea9cd2600e863335625bfa75713e2218e611a3fa971502d028f479b505f7e3,2024-11-29T21:15:05.633000
|
||||
CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000
|
||||
CVE-2024-3866,0,0,7a39485bd1345ca492dd2d645f7c31281d1cbae5daa389ff1a3811c5ea0b474f,2024-10-02T18:26:59.520000
|
||||
CVE-2024-38660,0,0,d0d9175d3816ca2e67508172ccde9924c32e55147382a7404f429ab929961a1c,2024-11-15T14:00:09.720000
|
||||
@ -266111,11 +266112,11 @@ CVE-2024-50175,0,0,1dd04fe7e094a215fa5b2a47ea2eae040e04b44ec6d616bd452f4a4ed1eb2
|
||||
CVE-2024-50176,0,0,0bad9ef923589f31e0464c96d6ee2434d25795707eba801c32d45ddd11f3d20d,2024-11-27T20:14:34.360000
|
||||
CVE-2024-50177,0,0,4fb8b3ddb9af9f8a097a514d03b2080fd60587a0766bf44f8281e4c2a563510e,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50178,0,0,eb6ed4bd84ba259d56915cd99f2b35efefd2f01c043441a7f05771cbd0e57d90,2024-11-27T20:11:52.110000
|
||||
CVE-2024-50179,0,1,04adec6ece540a01d1ee9288ee8f51f83801ebaf343e3cd445929a412a36c84f,2024-11-29T20:34:14.350000
|
||||
CVE-2024-50179,0,0,04adec6ece540a01d1ee9288ee8f51f83801ebaf343e3cd445929a412a36c84f,2024-11-29T20:34:14.350000
|
||||
CVE-2024-5018,0,0,ae4fae87d25d0ffdabf3f24c5b2aeefbd28a66a0c556c5b46ab6064495fdefe3,2024-08-21T16:00:23.410000
|
||||
CVE-2024-50180,0,1,cf4c8e6c15b9f741b0c0bfa604d0cfe58a38ee1c257a25fc7ea93d7471cc58f8,2024-11-29T20:35:40.690000
|
||||
CVE-2024-50181,0,1,f16eff39b0ab37ef17ea241d14ae52e7fa64bf6e3b7097227844b21199555f5e,2024-11-29T20:36:52.667000
|
||||
CVE-2024-50182,0,1,6738925cc907b051baea56f323ceab8cf3bc357791144d1faa6ef6ed966954d8,2024-11-29T20:38:47.760000
|
||||
CVE-2024-50180,0,0,cf4c8e6c15b9f741b0c0bfa604d0cfe58a38ee1c257a25fc7ea93d7471cc58f8,2024-11-29T20:35:40.690000
|
||||
CVE-2024-50181,0,0,f16eff39b0ab37ef17ea241d14ae52e7fa64bf6e3b7097227844b21199555f5e,2024-11-29T20:36:52.667000
|
||||
CVE-2024-50182,0,0,6738925cc907b051baea56f323ceab8cf3bc357791144d1faa6ef6ed966954d8,2024-11-29T20:38:47.760000
|
||||
CVE-2024-50183,0,0,1a5c85761b67f4951d4aead272e8cbaeeb6fb4ad164fc8c52190afa66b3996f3,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50184,0,0,cb05ed3cbf4320d0b6539ece765682947c4e4dd01f32eb669ed72a68abce565e,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50185,0,0,595738e2988b3e2c25066779b5891f8412116ebeed8b468125ac9343052411c0,2024-11-08T19:01:03.880000
|
||||
@ -266126,13 +266127,13 @@ CVE-2024-50189,0,0,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc
|
||||
CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845da,2024-08-21T13:43:03.670000
|
||||
CVE-2024-50190,0,0,2962a78db58b5eff7333f4f943b026fd8630dab04243ae02339e9f901787f7d2,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50191,0,0,a6db09c765b7d3d35c26042d26dc5603def4093fc6f320ce46df0d5416572571,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50192,0,1,c63addfc8ced2b086c990b79a9316ef60d0c871b32679a650a4651f7c1584eac,2024-11-29T19:00:45.733000
|
||||
CVE-2024-50193,0,1,cdcb73db336e1b3804f6930b8d0d72f531d36affe38055af409d00e3eb0e592c,2024-11-29T19:29:23.710000
|
||||
CVE-2024-50194,0,1,426419d359b9a48931872d3b17b8f19b6404793a867bd8299ab6d640e9ba5434,2024-11-29T19:33:26.060000
|
||||
CVE-2024-50195,0,1,2c6694528987098c90635214fa32688caaf82b9b9d755d386303fc29c6ab70a8,2024-11-29T20:26:50.623000
|
||||
CVE-2024-50196,0,1,675ca6a3533eddc8a6d45432592fdaaf1bb5dced0aa110561a6b06a466e576c0,2024-11-29T20:28:53.843000
|
||||
CVE-2024-50197,0,1,893b8d49a3c8bfcb1b7ca77d5de84df33485e9af4e3168bdf23d38eaaa3f1acc,2024-11-29T20:33:23.700000
|
||||
CVE-2024-50198,0,1,c618d856f80a65c389660bf5305caa4f554130dfdf672d6f63bde935a5b36126,2024-11-29T20:31:29.787000
|
||||
CVE-2024-50192,0,0,c63addfc8ced2b086c990b79a9316ef60d0c871b32679a650a4651f7c1584eac,2024-11-29T19:00:45.733000
|
||||
CVE-2024-50193,0,0,cdcb73db336e1b3804f6930b8d0d72f531d36affe38055af409d00e3eb0e592c,2024-11-29T19:29:23.710000
|
||||
CVE-2024-50194,0,0,426419d359b9a48931872d3b17b8f19b6404793a867bd8299ab6d640e9ba5434,2024-11-29T19:33:26.060000
|
||||
CVE-2024-50195,0,0,2c6694528987098c90635214fa32688caaf82b9b9d755d386303fc29c6ab70a8,2024-11-29T20:26:50.623000
|
||||
CVE-2024-50196,0,0,675ca6a3533eddc8a6d45432592fdaaf1bb5dced0aa110561a6b06a466e576c0,2024-11-29T20:28:53.843000
|
||||
CVE-2024-50197,0,0,893b8d49a3c8bfcb1b7ca77d5de84df33485e9af4e3168bdf23d38eaaa3f1acc,2024-11-29T20:33:23.700000
|
||||
CVE-2024-50198,0,0,c618d856f80a65c389660bf5305caa4f554130dfdf672d6f63bde935a5b36126,2024-11-29T20:31:29.787000
|
||||
CVE-2024-50199,0,0,790411aeb1eb3c29f71ef981d65498f2cd8c66850ab6f2c0880f47cb2a5c0da3,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50200,0,0,39818810e6a92ba66da874110ced722f11de013303f8d602e577eeb9e4e93e06,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50201,0,0,09a1d2ed13abd2226e3074bd37eb9876228c60757af6992d6779c0487fabffe2,2024-11-19T16:08:36.890000
|
||||
@ -266628,7 +266629,7 @@ CVE-2024-50971,0,0,ee156801cae07792b4c7ace9c875e228c804a408cf91fef9b4ca3523973a6
|
||||
CVE-2024-50972,0,0,2c14ab41c1b348ee30deaa5d615b85f35234660c1a7b2c06060e688c51aa5ba0,2024-11-18T20:35:07.643000
|
||||
CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000
|
||||
CVE-2024-50983,0,0,8777531043813759487a6f705f82a2fde6ced2b839e5ed6ed2d6e79489047cd1,2024-11-18T19:35:05.963000
|
||||
CVE-2024-50986,0,0,a1375d0ed956ca08af4c36c003d3cc8eaaa620cc5988dd8959e4c9eb84629a4c,2024-11-18T17:11:56.587000
|
||||
CVE-2024-50986,0,1,5c6709380990f392049398271a42b083d54548c1c87cb3e159e8a4f7bc208270,2024-11-29T22:15:06.677000
|
||||
CVE-2024-50989,0,0,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000
|
||||
CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000
|
||||
CVE-2024-50990,0,0,3537d7668a1d8721c4b70a753dc5bd5ceae4b32dbcc1547432740e88301eb02f,2024-11-12T20:35:16.907000
|
||||
@ -266738,7 +266739,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b
|
||||
CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000
|
||||
CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000
|
||||
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
|
||||
CVE-2024-51228,0,1,294a28aa06aa347fc595d895098cf7c224edf806b9b37339527f928a6a82f84c,2024-11-29T20:15:20.430000
|
||||
CVE-2024-51228,0,0,294a28aa06aa347fc595d895098cf7c224edf806b9b37339527f928a6a82f84c,2024-11-29T20:15:20.430000
|
||||
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
|
||||
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
|
||||
CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
|
||||
@ -267271,7 +267272,7 @@ CVE-2024-51998,0,0,19a2e1052c10533bdc1ed034b91b5ec816f585536da2e947441dab97cd0af
|
||||
CVE-2024-52000,0,0,53607fd920c5e6c0c523f59cb394de5d5c634c469499e12c0f4cb198af2d27c3,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52001,0,0,ee27726a1c73b7b7f6e5760fe3ce79bb84c8b16431699361ef4c426b16c2de6e,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52002,0,0,c00913d7259c42a7cc8354350f7a82513ce9d83d7bd5962c00b4cf14c2a1047a,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52003,1,1,547d974ce5473fbdc586b143bb803661fb6b34d9b6c117ffda49ea4ee4b6165e,2024-11-29T19:15:08.170000
|
||||
CVE-2024-52003,0,0,547d974ce5473fbdc586b143bb803661fb6b34d9b6c117ffda49ea4ee4b6165e,2024-11-29T19:15:08.170000
|
||||
CVE-2024-52004,0,0,5fa07d0a35480bd23f86ea684f2a0f66c5e4b9b2bf1fbc1961b6e8f9dcc625fa,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52007,0,0,9b9844f37c4a4c3cef932fa358d8594e2305c52695217b7622048372b9ab612f,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52008,0,0,262060a233ecffd7ebab469c10cac8fdefe6653fedfb294b7540834b512d5966,2024-11-26T19:15:29.583000
|
||||
@ -267593,10 +267594,10 @@ CVE-2024-52755,0,0,201980ce6d3d391174749cb677e5eff116245b0c1dc48789b3b9b50b5ef85
|
||||
CVE-2024-52757,0,0,6a532c18cf38d202abc15a627e9192ed6d4c483d87e76d03918e63d2f51dbf79,2024-11-22T17:15:10.150000
|
||||
CVE-2024-52759,0,0,efd0fc3be433f7896365088928907f2feb653062abfc384aa04c2ee4da0825f4,2024-11-22T17:15:10.323000
|
||||
CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000
|
||||
CVE-2024-52762,0,1,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000
|
||||
CVE-2024-52763,0,1,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000
|
||||
CVE-2024-52762,0,0,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000
|
||||
CVE-2024-52763,0,0,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000
|
||||
CVE-2024-52765,0,0,215d573d92d5d4ab707e8db266a06400b9c1cb39b63c86b9575271eef3bcc4b8,2024-11-26T17:15:25.557000
|
||||
CVE-2024-52769,0,0,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
|
||||
CVE-2024-52769,0,1,490626ac8202d209f5822fbd6542164baace6d0fb3960db32f918c184a501c50,2024-11-29T22:15:06.853000
|
||||
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
|
||||
CVE-2024-52770,0,0,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
|
||||
CVE-2024-52771,0,0,57831cc0aec212fa9f5452cd5864fd9f742774698e80266ca54ea858d750ac1e,2024-11-27T17:15:14.017000
|
||||
@ -267614,13 +267615,13 @@ CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd
|
||||
CVE-2024-52793,0,0,0bf635877e4ed12608107333336dcfd2b6a54401c02c3262c9d2babe5054c5c5,2024-11-22T16:15:34.103000
|
||||
CVE-2024-52796,0,0,c4bd427fdb738f1679f0a9210a59387be5f22896c83df074062019be41d6dd7e,2024-11-20T17:15:20.953000
|
||||
CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000
|
||||
CVE-2024-52800,1,1,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176494,2024-11-29T19:15:08.713000
|
||||
CVE-2024-52801,1,1,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000
|
||||
CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176494,2024-11-29T19:15:08.713000
|
||||
CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000
|
||||
CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000
|
||||
CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000
|
||||
CVE-2024-52809,1,1,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000
|
||||
CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000
|
||||
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
|
||||
CVE-2024-52810,1,1,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000
|
||||
CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000
|
||||
CVE-2024-52811,0,0,d732a17bde6f16ede8be31f96ee410aad0e3e114ed23b65cb7e34c8157552b5c,2024-11-25T19:15:11.567000
|
||||
CVE-2024-52814,0,0,05155b182462de438f0b1b6215658fb7f90ef7f2af8e5a0e3c447f1976037015,2024-11-22T16:15:34.553000
|
||||
CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000
|
||||
@ -267786,10 +267787,10 @@ CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb
|
||||
CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
|
||||
CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000
|
||||
CVE-2024-53504,1,1,7b94acf3236703c440799d7cea37ecf926431af8ccfa327a5bdac99daac96a25,2024-11-29T20:15:20.763000
|
||||
CVE-2024-53505,1,1,a48aa2a3f2b02e57c4384e6ed488ff8a0bd7c8c19b15bc8f8b5a06a4955c7a08,2024-11-29T20:15:20.853000
|
||||
CVE-2024-53506,1,1,ba2e698ad390074012b311e33d17d473f0ae54b1e9303f2625175edc4f7ce59c,2024-11-29T20:15:20.943000
|
||||
CVE-2024-53507,1,1,c5e946052b7a1eef03672c0a3197d790626776dff0c07041d5c8e1cd1640a81d,2024-11-29T20:15:21.027000
|
||||
CVE-2024-53504,0,0,7b94acf3236703c440799d7cea37ecf926431af8ccfa327a5bdac99daac96a25,2024-11-29T20:15:20.763000
|
||||
CVE-2024-53505,0,0,a48aa2a3f2b02e57c4384e6ed488ff8a0bd7c8c19b15bc8f8b5a06a4955c7a08,2024-11-29T20:15:20.853000
|
||||
CVE-2024-53506,0,0,ba2e698ad390074012b311e33d17d473f0ae54b1e9303f2625175edc4f7ce59c,2024-11-29T20:15:20.943000
|
||||
CVE-2024-53507,0,0,c5e946052b7a1eef03672c0a3197d790626776dff0c07041d5c8e1cd1640a81d,2024-11-29T20:15:21.027000
|
||||
CVE-2024-5351,0,0,5b3be503117b69cfbfdb88b1fae31317d85f3a58c24bc4f082dcbe98687cb2c4,2024-06-04T19:21:05.570000
|
||||
CVE-2024-5352,0,0,da1c4d8b4e23dadce106da9517801ea125925e8071854aa14e0650ba3020a2bf,2024-06-21T18:15:11.303000
|
||||
CVE-2024-5353,0,0,525ae1f28e269a2f910a2998894d881f94e776efad76469271fac08c213e4cb6,2024-06-04T19:21:05.680000
|
||||
@ -267847,30 +267848,30 @@ CVE-2024-5383,0,0,d150bf26fb35d2a14ee1eb4bf942c0bdbcc9199cee0de8b154db204bf6e235
|
||||
CVE-2024-5384,0,0,73e6d40ec5d3477f7ae6e5e9fbabb11a01cb879f05dde3e0d9f2c2760497516c,2024-06-04T19:21:07.913000
|
||||
CVE-2024-53843,0,0,fb790ea92e56bce04d8543f109eb747d943f316d3eeab0b48f576ddbb2ed9eb5,2024-11-26T00:15:07.430000
|
||||
CVE-2024-53844,0,0,f54d4575fccfa45cb1306e55e04ed154008d30b320d65227acd00b96c54e3472,2024-11-26T19:15:31.463000
|
||||
CVE-2024-53848,1,1,4943d65b2b1e25705325ac81d74abb04005ec4fd6d8cb031814f1f81e80b88e2,2024-11-29T19:15:09.290000
|
||||
CVE-2024-53848,0,0,4943d65b2b1e25705325ac81d74abb04005ec4fd6d8cb031814f1f81e80b88e2,2024-11-29T19:15:09.290000
|
||||
CVE-2024-53849,0,0,7af089348f539339d95898472d9d3628c7f064721068fcc5bf049d36df5b9760,2024-11-27T00:15:18.223000
|
||||
CVE-2024-5385,0,0,5113296fe5b95e2ca5ffa573f35631b642d4f934e6e56cfebf21d51c8e50ce86,2024-05-28T12:39:28.377000
|
||||
CVE-2024-53855,0,0,3b7a475c32d1d09fe2eb4189fd1d6fb7d653d88d8eb34139f0255f4c5d06f551,2024-11-27T19:15:33.563000
|
||||
CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2567,2024-11-27T22:15:05.520000
|
||||
CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000
|
||||
CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
|
||||
CVE-2024-53861,1,1,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000
|
||||
CVE-2024-53864,1,1,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000
|
||||
CVE-2024-53865,1,1,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000
|
||||
CVE-2024-53861,0,0,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000
|
||||
CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000
|
||||
CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000
|
||||
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
|
||||
CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000
|
||||
CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000
|
||||
CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada266a,2024-11-26T18:23:09.517000
|
||||
CVE-2024-5390,0,0,577e03013c579fd5ea5c07b95a092cd4d32be3fa4130d25da9e61ffe468007ab,2024-06-04T19:21:08.020000
|
||||
CVE-2024-53901,0,0,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000
|
||||
CVE-2024-53909,0,1,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000
|
||||
CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000
|
||||
CVE-2024-5391,0,0,a7c29f93c1b76aed47351138468a6c5b251b9f9a4ad39cf688118719a36ed1c7,2024-06-07T20:15:12.687000
|
||||
CVE-2024-53910,0,1,b42cc0f8352ffa3f12c2a867329f0f66efd78292ca02cc30bc8a41459e9297ac,2024-11-29T20:54:55.080000
|
||||
CVE-2024-53911,0,1,7b75124c4de0e1dec78550d56f66099b6b64e5835d2cd608b69ffc2c6a2f62d8,2024-11-29T20:55:04.683000
|
||||
CVE-2024-53912,0,1,1f4db0332861ddc3d21771f81e88e64303e6668de99899f3afc95f8e7d972622,2024-11-29T20:55:13.483000
|
||||
CVE-2024-53913,0,1,f29eb48b3cfa8a7826d6fe7adbaf2bce87f89a85e25f58c699946a9277a37df3,2024-11-29T20:55:25.543000
|
||||
CVE-2024-53914,0,1,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd2a8,2024-11-29T20:55:35.293000
|
||||
CVE-2024-53915,0,1,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
|
||||
CVE-2024-53910,0,0,b42cc0f8352ffa3f12c2a867329f0f66efd78292ca02cc30bc8a41459e9297ac,2024-11-29T20:54:55.080000
|
||||
CVE-2024-53911,0,0,7b75124c4de0e1dec78550d56f66099b6b64e5835d2cd608b69ffc2c6a2f62d8,2024-11-29T20:55:04.683000
|
||||
CVE-2024-53912,0,0,1f4db0332861ddc3d21771f81e88e64303e6668de99899f3afc95f8e7d972622,2024-11-29T20:55:13.483000
|
||||
CVE-2024-53913,0,0,f29eb48b3cfa8a7826d6fe7adbaf2bce87f89a85e25f58c699946a9277a37df3,2024-11-29T20:55:25.543000
|
||||
CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd2a8,2024-11-29T20:55:35.293000
|
||||
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
|
||||
CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
|
||||
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
|
||||
CVE-2024-53920,0,0,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000
|
||||
@ -267882,10 +267883,10 @@ CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc09
|
||||
CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000
|
||||
CVE-2024-53975,0,0,db2852f15c06d19ca698273a0c2e6819bbf9c83aca00ef4837eb933aa4601eda,2024-11-27T15:15:26.923000
|
||||
CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2487,2024-11-26T16:15:21.430000
|
||||
CVE-2024-53979,1,1,daaf571bfcfd25ad5803f97558dcc6ea565a6375b17d8bed4a6f9cee29769cb2,2024-11-29T19:15:09.847000
|
||||
CVE-2024-53979,0,0,daaf571bfcfd25ad5803f97558dcc6ea565a6375b17d8bed4a6f9cee29769cb2,2024-11-29T19:15:09.847000
|
||||
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
|
||||
CVE-2024-53980,1,1,f2c4b71c263d54957f07bea69df75ebb3d992381d97f959d8cfdaa259a929ae9,2024-11-29T19:15:09.993000
|
||||
CVE-2024-53983,1,1,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000
|
||||
CVE-2024-53980,0,0,f2c4b71c263d54957f07bea69df75ebb3d992381d97f959d8cfdaa259a929ae9,2024-11-29T19:15:09.993000
|
||||
CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000
|
||||
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
|
||||
CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000
|
||||
@ -267901,11 +267902,12 @@ CVE-2024-5409,0,0,cf17c00e2696039626da2501323bb63130e64564f7c70e2680f61c8296b748
|
||||
CVE-2024-5410,0,0,33a5ba9b12c1e74f0aa24bc0d8928f8ff241dde36fed372d790c69ac128b19a7,2024-06-10T17:16:34.350000
|
||||
CVE-2024-5411,0,0,6f38aadf376ed626f84103b80eadf7d4a3da9be020ddcb9fa408be6d4c8307b5,2024-06-10T17:16:34.440000
|
||||
CVE-2024-5412,0,0,5e7f5482cbb5bbe521f2cd5ff48f80c18806840859b33baffa51a21bf41b87d8,2024-09-06T18:07:43.940000
|
||||
CVE-2024-54123,0,1,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000
|
||||
CVE-2024-54124,0,1,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000
|
||||
CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000
|
||||
CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000
|
||||
CVE-2024-5413,0,0,b448c8c4fee794a9903e33e6c17f07ddeb3dd7c0bc677024b75809ef047d2c8a,2024-05-28T14:59:09.827000
|
||||
CVE-2024-5414,0,0,08acc305e6c9bea4a9589fa3dba157ea62649fb0f8c0ee74aad6ddc09386f1c2,2024-05-28T14:59:09.827000
|
||||
CVE-2024-5415,0,0,d8ba178a70f3cfb2a3911a07d12ef045cc2ca261b5b8d85db5edc9c9636eef1e,2024-05-28T14:59:09.827000
|
||||
CVE-2024-54159,1,1,d90984b2f7355a1a8a07d418950bf4f2884d76989e35be06ace87948bd98ed40,2024-11-29T22:15:07.017000
|
||||
CVE-2024-5416,0,0,e60ac21c549a64885b0e4526eea23fa8e926aaead7cfc8773dbbebbe7c033943,2024-09-26T14:37:59.290000
|
||||
CVE-2024-5417,0,0,7aeebeb967db19ec82014e996b2aa573677c8d8d73e22110a17d0cf5ea677289,2024-10-07T15:44:01.830000
|
||||
CVE-2024-5418,0,0,a687af8fa8fe7200b6255f9fba7bdce69460001467d8b2873093024e735e15d4,2024-05-31T13:01:46.727000
|
||||
@ -270734,7 +270736,7 @@ CVE-2024-8720,0,0,2f0e821428fb20df24eeb1115d6165ec35266f54d9cfaa09a98cadbec3449f
|
||||
CVE-2024-8723,0,0,730229d7deadc7b514e5d898656fee12ba111958411cb7eec6e86089a429ce7e,2024-10-02T17:00:23.603000
|
||||
CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000
|
||||
CVE-2024-8725,0,0,bda4a6515a704fa51f2d759f535270e57676d8c1b87d3a5cc5dc6f9e3d99ebf6,2024-10-01T14:16:42.727000
|
||||
CVE-2024-8726,0,1,576ba4982f4dcb9927e3dea296f260d0b31716526d20c03d0c73c7835b326f41,2024-11-29T20:59:02.697000
|
||||
CVE-2024-8726,0,0,576ba4982f4dcb9927e3dea296f260d0b31716526d20c03d0c73c7835b326f41,2024-11-29T20:59:02.697000
|
||||
CVE-2024-8727,0,0,cb79e2fb4f4e8ddff2e3cdbb1cbb30b7c8fce0689b3d497e10ebbff2e74dd2da,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8728,0,0,d061a0a3e4a793bdc334c9b032908af2152405a24e9b06b2723d960e58ba5c92,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8729,0,0,d5e2470679c3739002ae67f8937e40f51aaa077d58da9fcd25b709dc6eb342aa,2024-10-15T13:40:37.917000
|
||||
@ -270817,19 +270819,19 @@ CVE-2024-8821,0,0,ae151ee0d4e66a38e1f953a2cb9ea4ca6988ec553e5f5170989052d93bb257
|
||||
CVE-2024-8822,0,0,a61b4cb8c6aee1f5be80cd3b5032f2305f85bca0bf17e2e56b4eda9d422d7d75,2024-11-22T21:15:20.470000
|
||||
CVE-2024-8823,0,0,adc9090f6175b10dd86864237a283448073ad2580380ddb2e56ede96b2c41cdb,2024-11-22T21:15:20.583000
|
||||
CVE-2024-8824,0,0,f51c50e2d27567217553c8b3618880c98307c7f5a4ab0101d5b5f492a5fb59fa,2024-11-22T21:15:20.697000
|
||||
CVE-2024-8825,0,1,386facc7f478cbfcfa85ec990ba31bcaed7eca7d9ceff17e6e15478683dda148,2024-11-29T20:20:44.863000
|
||||
CVE-2024-8826,0,1,f4e52980884276b4d0670106e2ba49b1b78815b10ae4ced581158a7b704c52a8,2024-11-29T20:08:47.553000
|
||||
CVE-2024-8827,0,1,61f5eb5ff8ecf0faa7db8953d296c535df6bfdf7ae19ad117bcc6010c4727fb8,2024-11-29T20:20:34.137000
|
||||
CVE-2024-8828,0,1,d559c62077bcc610b766063a624f7c16b8a43274948124059b52f21bf839a580,2024-11-29T20:20:25.293000
|
||||
CVE-2024-8829,0,1,0b00b0056fe9202481efcc7dac8f714f1666f6a79039f86654dd08247a4c1ca1,2024-11-29T20:20:01.307000
|
||||
CVE-2024-8830,0,1,a3051a23e2e7cc11dfa7f2c928b555d6212575353d95198002add0e62a8c43f5,2024-11-29T20:19:22.237000
|
||||
CVE-2024-8831,0,1,1ac38d02ba72d0682f55168d63a034b50c7e2f3bffca78dd0c510a840391f85c,2024-11-29T20:19:09.460000
|
||||
CVE-2024-8832,0,1,abc35d7e3f3c88d08da905867049c542ddba9c4037a0e6f7e3cbd2e9a3dda073,2024-11-29T20:18:52.840000
|
||||
CVE-2024-8833,0,1,f531ac3549fd3b7afcb3c76073ac4d456c85974c9921faf6f518b95dd23716cb,2024-11-29T20:18:39.087000
|
||||
CVE-2024-8834,0,1,ccf3b1cbd9b873f9e8f2c6c9b25ea0d55c495129845f242b63c5f3111f065fc7,2024-11-29T20:18:18.010000
|
||||
CVE-2024-8835,0,1,ac7088e58560f5b8a53a89d7053ca91953fa04c930410cf78b9450022c4f09c2,2024-11-29T20:17:52.063000
|
||||
CVE-2024-8836,0,1,79e7b0ebef3f34831f5721ae680df12c7c8fda724633587fb2447905129a1385,2024-11-29T20:17:29.823000
|
||||
CVE-2024-8837,0,1,89e656db04439e6a29296845420167328da47c051242908b0604e6fd8193f958,2024-11-29T20:10:41.130000
|
||||
CVE-2024-8825,0,0,386facc7f478cbfcfa85ec990ba31bcaed7eca7d9ceff17e6e15478683dda148,2024-11-29T20:20:44.863000
|
||||
CVE-2024-8826,0,0,f4e52980884276b4d0670106e2ba49b1b78815b10ae4ced581158a7b704c52a8,2024-11-29T20:08:47.553000
|
||||
CVE-2024-8827,0,0,61f5eb5ff8ecf0faa7db8953d296c535df6bfdf7ae19ad117bcc6010c4727fb8,2024-11-29T20:20:34.137000
|
||||
CVE-2024-8828,0,0,d559c62077bcc610b766063a624f7c16b8a43274948124059b52f21bf839a580,2024-11-29T20:20:25.293000
|
||||
CVE-2024-8829,0,0,0b00b0056fe9202481efcc7dac8f714f1666f6a79039f86654dd08247a4c1ca1,2024-11-29T20:20:01.307000
|
||||
CVE-2024-8830,0,0,a3051a23e2e7cc11dfa7f2c928b555d6212575353d95198002add0e62a8c43f5,2024-11-29T20:19:22.237000
|
||||
CVE-2024-8831,0,0,1ac38d02ba72d0682f55168d63a034b50c7e2f3bffca78dd0c510a840391f85c,2024-11-29T20:19:09.460000
|
||||
CVE-2024-8832,0,0,abc35d7e3f3c88d08da905867049c542ddba9c4037a0e6f7e3cbd2e9a3dda073,2024-11-29T20:18:52.840000
|
||||
CVE-2024-8833,0,0,f531ac3549fd3b7afcb3c76073ac4d456c85974c9921faf6f518b95dd23716cb,2024-11-29T20:18:39.087000
|
||||
CVE-2024-8834,0,0,ccf3b1cbd9b873f9e8f2c6c9b25ea0d55c495129845f242b63c5f3111f065fc7,2024-11-29T20:18:18.010000
|
||||
CVE-2024-8835,0,0,ac7088e58560f5b8a53a89d7053ca91953fa04c930410cf78b9450022c4f09c2,2024-11-29T20:17:52.063000
|
||||
CVE-2024-8836,0,0,79e7b0ebef3f34831f5721ae680df12c7c8fda724633587fb2447905129a1385,2024-11-29T20:17:29.823000
|
||||
CVE-2024-8837,0,0,89e656db04439e6a29296845420167328da47c051242908b0604e6fd8193f958,2024-11-29T20:10:41.130000
|
||||
CVE-2024-8838,0,0,e676463d3f7f0a87971635160e5f6d89ae25b12ed9d7c1e6f9c006cc6f501b53,2024-11-22T21:15:22.317000
|
||||
CVE-2024-8839,0,0,2acbb4e8a6b1624d1785c0132d951382284f4d937031ff128ac25b7244df8702,2024-11-22T21:15:22.427000
|
||||
CVE-2024-8840,0,0,bd5b89e0d8e6d7cd1adbf7994707d06af9e474015537950245cf092af468c08b,2024-11-22T21:15:22.537000
|
||||
@ -271522,7 +271524,7 @@ CVE-2024-9768,0,0,904cffc60d5e826fadde1f9279bf1637d0038b817b76c6a013f678cc172cfc
|
||||
CVE-2024-9772,0,0,043bc7caa6859562432d521f3501fd215394ad297fe3470375010095d76d8604,2024-11-25T20:03:01.613000
|
||||
CVE-2024-9775,0,0,2266a7b7c620bc11662bc20c96e5d18079c0f9f6e1ea844a74a70c443b303718,2024-11-26T01:45:57.317000
|
||||
CVE-2024-9776,0,0,9273f765f44bf9e907460b214d240344a8be5b3a239edcb0f9ffb7d3f96c7d26,2024-11-25T18:45:54.377000
|
||||
CVE-2024-9777,0,1,93ee86692c4d166322b2f54769a2de3ae116ef1efe45b8b5542abe4611d31128,2024-11-29T20:57:53.423000
|
||||
CVE-2024-9777,0,0,93ee86692c4d166322b2f54769a2de3ae116ef1efe45b8b5542abe4611d31128,2024-11-29T20:57:53.423000
|
||||
CVE-2024-9778,0,0,c5789fd51af706bd1104828309e4c0bbf44a70e2aa01bf36b8318a8802f25b3a,2024-11-25T19:20:37.163000
|
||||
CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000
|
||||
CVE-2024-9781,0,0,4766ae4e21ddab4bdbe139c0afc58af6fd761963f021734b932e1a0e147ffb05,2024-11-25T18:09:33.853000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user