mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-11-12T00:55:19.271121+00:00
This commit is contained in:
parent
cfd2081ec1
commit
ca64c00da2
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2021-34543",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-12-07T21:15:08.177",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-11T23:15:04.597",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web administration server in Solar-Log 500 before 2.8.2 Build 52 does not require authentication, which allows remote attackers to gain administrative privileges by connecting to the server. As a result, the attacker can modify configuration files and change the system status."
|
||||
"value": "The web administration server in Solar-Log 500 before 2.8.2 Build 52 does not require authentication, which allows remote attackers to gain administrative privileges by connecting to the server. As a result, the attacker can modify configuration files and change the system status. Fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2021-34544",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-12-07T21:15:08.217",
|
||||
"lastModified": "2021-12-09T17:15:35.563",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-11T23:15:04.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Solar-Log 500 before 2.8.2 Build 52 23.04.2013. In /export.html, email.html, and sms.html, cleartext passwords are stored. This may allow sensitive information to be read by someone with access to the device."
|
||||
"value": "An issue was discovered in Solar-Log 500 before 2.8.2 Build 52 23.04.2013. In /export.html, email.html, and sms.html, cleartext passwords are stored. This may allow sensitive information to be read by someone with access to the device. Fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2022-47767",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-26T21:18:05.573",
|
||||
"lastModified": "2023-02-06T17:05:03.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-11T23:15:04.887",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. This affects all Solar-Log devices that use firmware version v4.2.7 up to v5.1.1 (included)."
|
||||
"value": "A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. This affects Solar-Log devices that use firmware version v4.2.7 up to v5.1.1 (included). This does not exist in SL 200, 500, 1000 / fixed in 4.2.8 for SL 250, 300, 1200, 2000, SL 50 Gateway / fixed in 5.1.2 / 6.0.0 for SL Base."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-46344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-02T02:15:16.537",
|
||||
"lastModified": "2024-09-18T19:15:38.530",
|
||||
"lastModified": "2024-11-11T23:15:05.053",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. NOTE: The vendor states that this vulnerability has been fixed in version 6.2.0-170."
|
||||
"value": "A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. NOTE: The vendor states that this vulnerability has been fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -95,6 +95,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.solar-log.com/en/support/firmware-database-1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-110xx/CVE-2024-11079.json
Normal file
60
CVE-2024/CVE-2024-110xx/CVE-2024-11079.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11079",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-11-12T00:15:15.543",
|
||||
"lastModified": "2024-11-12T00:15:15.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-11079",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325171",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-239xx/CVE-2024-23983.json
Normal file
86
CVE-2024/CVE-2024-239xx/CVE-2024-23983.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-23983",
|
||||
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
|
||||
"published": "2024-11-11T23:15:05.217",
|
||||
"lastModified": "2024-11-11T23:15:05.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper handling of canonical URL-encoding may lead to bypass not properly constrained by request rules."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "responsible-disclosure@pingidentity.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:X/V:X/RE:M/U:Amber",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "PRESENT",
|
||||
"automatable": "YES",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "AMBER",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "responsible-disclosure@pingidentity.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-177"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.pingidentity.com/pingaccess/latest/release_notes/pa_811_rn.html",
|
||||
"source": "responsible-disclosure@pingidentity.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.pingidentity.com/en/resources/downloads/pingaccess.html",
|
||||
"source": "responsible-disclosure@pingidentity.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-252xx/CVE-2024-25253.json
Normal file
21
CVE-2024/CVE-2024-252xx/CVE-2024-25253.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-25253",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-11T23:15:05.393",
|
||||
"lastModified": "2024-11-11T23:15:05.393",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Driver Booster v10.6 was discovered to contain a buffer overflow via the Host parameter under the Customize proxy module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exploitart.ist/exploit/2023/09/10/driver-booster-buffer-overflow.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-252xx/CVE-2024-25254.json
Normal file
21
CVE-2024/CVE-2024-252xx/CVE-2024-25254.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-25254",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-11T23:15:05.460",
|
||||
"lastModified": "2024-11-11T23:15:05.460",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exploitart.ist/exploit/2023/09/18/superscan-os-command-injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-252xx/CVE-2024-25255.json
Normal file
21
CVE-2024/CVE-2024-252xx/CVE-2024-25255.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-25255",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-11T23:15:05.523",
|
||||
"lastModified": "2024-11-11T23:15:05.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sublime Text 4 was discovered to contain a command injection vulnerability via the New Build System module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exploitart.ist/exploit/2023/09/17/sublime-text-os-command-injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-40116",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T20:15:04.980",
|
||||
"lastModified": "2024-08-01T13:56:51.153",
|
||||
"lastModified": "2024-11-11T23:15:05.593",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Solar-Log 1000 before v2.8.2 and build 52-23.04.2013 was discovered to store plaintext passwords in the export.html, email.html, and sms.html files."
|
||||
"value": "An issue in Solar-Log 1000 before v2.8.2 and build 52-23.04.2013 was discovered to store plaintext passwords in the export.html, email.html, and sms.html files -- fixed with 3.0.0-60 11.10.2013 for SL 200, 500, 1000 / not existing for SL 250, 300, 1200, 2000, SL 50 Gateway, SL Base."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -32,6 +32,10 @@
|
||||
{
|
||||
"url": "https://github.com/nepenthe0320/cve_poc/blob/master/Solar-Log%201000%20-%20Unprotected%20Storage%20of%20Credentials",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.solar-log.com/en/support/firmware-database-1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-40117",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-26T20:15:05.033",
|
||||
"lastModified": "2024-08-01T13:56:51.860",
|
||||
"lastModified": "2024-11-11T23:15:05.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in Solar-Log 1000 before v2.8.2 and build 52- 23.04.2013 allows attackers to obtain Administrative privileges via connecting to the web administration server."
|
||||
"value": "Incorrect access control in Solar-Log 1000 before v2.8.2 and build 52- 23.04.2013 allows attackers to obtain Administrative privileges via connecting to the web administration server. Not existing for SL 200, 500, 1000 / fixed in 4.2.8 for SL 250, 300, 1200, 2000, SL 50 Gateway / fixed in 5.1.2 / 6.0.0 for SL Base."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/nepenthe0320/cve_poc/blob/master/Solar-Log%201000%20-%20Incorrect%20Access%20Control",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.solar-log.com/en/support/firmware-database-1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-44765",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-08T19:15:05.590",
|
||||
"lastModified": "2024-11-08T19:15:05.590",
|
||||
"lastModified": "2024-11-12T00:15:15.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Authorization (Access Control Misconfiguration) vulnerability in MGT-COMMERCE GmbH v2.0.0 to v2.4.2 allows attackers to escalate privileges and access sensitive information via manipulation of the Nginx configuration file."
|
||||
"value": "An Improper Authorization (Access Control Misconfiguration) vulnerability in MGT-COMMERCE GmbH CloudPanel v2.0.0 to v2.4.2 allows low-privilege users to bypass access controls and gain unauthorized access to sensitive configuration files and administrative functionality."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de autorizaci\u00f3n incorrecta (configuraci\u00f3n incorrecta del control de acceso) en MGT-COMMERCE GmbH v2.0.0 a v2.4.2 permite a los atacantes escalar privilegios y acceder a informaci\u00f3n confidencial mediante la manipulaci\u00f3n del archivo de configuraci\u00f3n de Nginx."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
21
CVE-2024/CVE-2024-506xx/CVE-2024-50601.json
Normal file
21
CVE-2024/CVE-2024-506xx/CVE-2024-50601.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-50601",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-11T23:15:05.763",
|
||||
"lastModified": "2024-11-11T23:15:05.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Persistent and reflected XSS vulnerabilities in the themeMode cookie and _h URL parameter of Axigen Mail Server up to version 10.5.28 allow attackers to execute arbitrary Javascript. Exploitation could lead to session hijacking, data leakage, and further exploitation via a multi-stage attack. Fixed in versions 10.3.3.67, 10.4.42, and 10.5.29."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axigen.com/knowledgebase/Axigen-WebMail-Persistent-and-Reflected-XSS-Vulnerabilities-CVE-2024-50601-_403.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-506xx/CVE-2024-50636.json
Normal file
29
CVE-2024/CVE-2024-506xx/CVE-2024-50636.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-50636",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-11T23:15:05.833",
|
||||
"lastModified": "2024-11-11T23:15:05.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PyMOL 2.5.0 contains a vulnerability in its \"Run Script\" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/schrodinger/pymol-open-source/issues/405",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-50636/Description.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://youtu.be/SWnN_a1tUNc",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-512xx/CVE-2024-51213.json
Normal file
21
CVE-2024/CVE-2024-512xx/CVE-2024-51213.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51213",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-11T23:15:05.900",
|
||||
"lastModified": "2024-11-11T23:15:05.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Online Shop Store v.1.0 allows a remote attacker to execute arbitrary code via the login.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Prabhatsk7/CVE/blob/main/CVE-2024-51213",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-525xx/CVE-2024-52533.json
Normal file
29
CVE-2024/CVE-2024-525xx/CVE-2024-52533.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-52533",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-11T23:15:05.967",
|
||||
"lastModified": "2024-11-11T23:15:05.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\\0' character."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3461",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
38
README.md
38
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-11T23:00:19.408819+00:00
|
||||
2024-11-12T00:55:19.271121+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-11T22:15:13.860000+00:00
|
||||
2024-11-12T00:15:15.777000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
269067
|
||||
269076
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2024-10694](CVE-2024/CVE-2024-106xx/CVE-2024-10694.json) (`2024-11-11T21:15:06.030`)
|
||||
- [CVE-2024-44546](CVE-2024/CVE-2024-445xx/CVE-2024-44546.json) (`2024-11-11T21:15:06.360`)
|
||||
- [CVE-2024-46962](CVE-2024/CVE-2024-469xx/CVE-2024-46962.json) (`2024-11-11T21:15:06.437`)
|
||||
- [CVE-2024-46963](CVE-2024/CVE-2024-469xx/CVE-2024-46963.json) (`2024-11-11T21:15:06.493`)
|
||||
- [CVE-2024-46964](CVE-2024/CVE-2024-469xx/CVE-2024-46964.json) (`2024-11-11T21:15:06.560`)
|
||||
- [CVE-2024-46966](CVE-2024/CVE-2024-469xx/CVE-2024-46966.json) (`2024-11-11T21:15:06.620`)
|
||||
- [CVE-2024-51026](CVE-2024/CVE-2024-510xx/CVE-2024-51026.json) (`2024-11-11T21:15:06.683`)
|
||||
- [CVE-2024-11079](CVE-2024/CVE-2024-110xx/CVE-2024-11079.json) (`2024-11-12T00:15:15.543`)
|
||||
- [CVE-2024-23983](CVE-2024/CVE-2024-239xx/CVE-2024-23983.json) (`2024-11-11T23:15:05.217`)
|
||||
- [CVE-2024-25253](CVE-2024/CVE-2024-252xx/CVE-2024-25253.json) (`2024-11-11T23:15:05.393`)
|
||||
- [CVE-2024-25254](CVE-2024/CVE-2024-252xx/CVE-2024-25254.json) (`2024-11-11T23:15:05.460`)
|
||||
- [CVE-2024-25255](CVE-2024/CVE-2024-252xx/CVE-2024-25255.json) (`2024-11-11T23:15:05.523`)
|
||||
- [CVE-2024-50601](CVE-2024/CVE-2024-506xx/CVE-2024-50601.json) (`2024-11-11T23:15:05.763`)
|
||||
- [CVE-2024-50636](CVE-2024/CVE-2024-506xx/CVE-2024-50636.json) (`2024-11-11T23:15:05.833`)
|
||||
- [CVE-2024-51213](CVE-2024/CVE-2024-512xx/CVE-2024-51213.json) (`2024-11-11T23:15:05.900`)
|
||||
- [CVE-2024-52533](CVE-2024/CVE-2024-525xx/CVE-2024-52533.json) (`2024-11-11T23:15:05.967`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2024-34014](CVE-2024/CVE-2024-340xx/CVE-2024-34014.json) (`2024-11-11T22:15:13.773`)
|
||||
- [CVE-2024-34015](CVE-2024/CVE-2024-340xx/CVE-2024-34015.json) (`2024-11-11T22:15:13.860`)
|
||||
- [CVE-2024-39924](CVE-2024/CVE-2024-399xx/CVE-2024-39924.json) (`2024-11-11T21:15:06.150`)
|
||||
- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2024-11-11T21:15:06.237`)
|
||||
- [CVE-2024-39926](CVE-2024/CVE-2024-399xx/CVE-2024-39926.json) (`2024-11-11T21:15:06.297`)
|
||||
- [CVE-2021-34543](CVE-2021/CVE-2021-345xx/CVE-2021-34543.json) (`2024-11-11T23:15:04.597`)
|
||||
- [CVE-2021-34544](CVE-2021/CVE-2021-345xx/CVE-2021-34544.json) (`2024-11-11T23:15:04.767`)
|
||||
- [CVE-2022-47767](CVE-2022/CVE-2022-477xx/CVE-2022-47767.json) (`2024-11-11T23:15:04.887`)
|
||||
- [CVE-2023-46344](CVE-2023/CVE-2023-463xx/CVE-2023-46344.json) (`2024-11-11T23:15:05.053`)
|
||||
- [CVE-2024-40116](CVE-2024/CVE-2024-401xx/CVE-2024-40116.json) (`2024-11-11T23:15:05.593`)
|
||||
- [CVE-2024-40117](CVE-2024/CVE-2024-401xx/CVE-2024-40117.json) (`2024-11-11T23:15:05.687`)
|
||||
- [CVE-2024-44765](CVE-2024/CVE-2024-447xx/CVE-2024-44765.json) (`2024-11-12T00:15:15.777`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
47
_state.csv
47
_state.csv
@ -177783,8 +177783,8 @@ CVE-2021-34538,0,0,e27df40d84951f93435b6a387c3bab3ce21e57a055c23fd24407c99056ee4
|
||||
CVE-2021-34539,0,0,8d75c3a8861a979f669fbd0d5e23b33350b72e3a7602381a8efa5e2888db6e35,2022-07-12T17:42:04.277000
|
||||
CVE-2021-3454,0,0,5935c4b036630127bf57bd7a2e2c8299bf41947fc0b23edb841cedc01bb1d9ae,2023-07-07T19:13:27.937000
|
||||
CVE-2021-34540,0,0,f7b193796ff4ce785f64332f6008e67cbf1c3c999c3da28dffe5e5e46831fb3e,2021-06-21T17:37:42.973000
|
||||
CVE-2021-34543,0,0,9cb97c9f503da04c086a2dfe4e601ece621be7b2b306d3e3bb482df135373d11,2022-07-12T17:42:04.277000
|
||||
CVE-2021-34544,0,0,1a476d7212b98ad0467c11446fa5e1ac13ba9a3b0f25825995a1d002964e065d,2021-12-09T17:15:35.563000
|
||||
CVE-2021-34543,0,1,b0b880923a73728cc0633c12ac29b349e35d6affb7e1f212be1d702fd220403f,2024-11-11T23:15:04.597000
|
||||
CVE-2021-34544,0,1,e379357b77107a0c4b34e75cb0a57bff0e7b7c1125092d92d4dbba95a663f3d4,2024-11-11T23:15:04.767000
|
||||
CVE-2021-34546,0,0,4cb879dd240399282d65e4766ee0a8283ad80c211eaeacc86e74c55f39639810,2021-06-22T00:52:11.587000
|
||||
CVE-2021-34547,0,0,0a891a024ed191aa712617e3b47599567264cce95b0efdcebf41ba71649974cb,2021-06-21T19:38:50.833000
|
||||
CVE-2021-34548,0,0,663c80b650287f3a4b4e7db673b01738c7b78572486f64b52bf99f17f0c4870d,2023-08-08T14:21:49.707000
|
||||
@ -211705,7 +211705,7 @@ CVE-2022-47758,0,0,980885e7f8c8c123926524f8b49c058ed03a60d8cfd91c79fdae78ab4583d
|
||||
CVE-2022-4776,0,0,89ad70ba78bd0c4574f0d0dd266a0f9b1b0a423fde805c5c865d150d9b5834e8,2023-11-07T03:58:53.807000
|
||||
CVE-2022-47762,0,0,c5ddf8f5613afe98918beceaaea4613fe5c3851eb4d4dd89c26e616d07d69782,2023-02-10T17:31:13.647000
|
||||
CVE-2022-47766,0,0,07f5e9ee0169e3e4e09a1b6a78eb0992a245c4d30a6cbf2c96ea0f82d81ba098,2023-01-25T19:41:20.700000
|
||||
CVE-2022-47767,0,0,ba15ff9395c6d841b2f98f0ae4c6c8e9afd5ee3e809279c1f5071b46af53aec8,2023-02-06T17:05:03.630000
|
||||
CVE-2022-47767,0,1,5cc4efd6c377be6f108249fa5ffac4d26f8b2993d6cdf4f31e4321a93a9ac681,2024-11-11T23:15:04.887000
|
||||
CVE-2022-47768,0,0,a4485e03538fc61442f062c166f3fdb30977c3b0c9cbb6a2158affadb7aa8784,2023-02-08T01:35:48.320000
|
||||
CVE-2022-47769,0,0,17da4d5e9b45f54f2ffa9c0649aee394b1ec469949d1ad2687f0f94a244c942b,2023-02-08T01:37:42.350000
|
||||
CVE-2022-4777,0,0,bbc07d3bef25cf6a58dec60c8107a3051f1e382a7fcc92cfbce9fa0907495a18,2023-11-07T03:58:54.080000
|
||||
@ -234933,7 +234933,7 @@ CVE-2023-46331,0,0,04cd61dfd10963dca9fbcf837dea9f8020c410bf57e5d2798677244025b8b
|
||||
CVE-2023-46332,0,0,6c9559cbc141af18bf835d306eccb7709cce74f80bbd9e0fbef45908546c332c,2023-10-30T19:49:15.050000
|
||||
CVE-2023-4634,0,0,bf7d08858f3a3f582f40dbe02868443761c24fab9208b3b2fbb736c9abe1e825,2023-11-07T04:22:48.157000
|
||||
CVE-2023-46343,0,0,ef8e988e646ba4c0215f7ee2afd0886d674afe5087c355e7ed7e301ff8dcfb19,2024-01-29T22:51:18.303000
|
||||
CVE-2023-46344,0,0,5736d8cfde20b73327fbebdc77ca1b8d417cdd5df4a924540b1648e975c6f2d5,2024-09-18T19:15:38.530000
|
||||
CVE-2023-46344,0,1,2d05682baa4bc5e65a42a42e4b53aec899bc61b3ace8c5368368e32354d4a239,2024-11-11T23:15:05.053000
|
||||
CVE-2023-46345,0,0,55ca20c0ef63e29c15c36f7e62c2585d7978da71058f53bfa1bdd49f3888824d,2023-11-03T18:08:37.197000
|
||||
CVE-2023-46346,0,0,daecd27fc8f2fd4c198e7949e808230ee5fb479c940371b1e54b87fb00266a9c,2024-09-11T20:35:08.777000
|
||||
CVE-2023-46347,0,0,95e0239e93985a03781fe39c8d15effed111f0245b336d3e67ccfa775cce5af5,2024-09-11T21:35:05.457000
|
||||
@ -242817,7 +242817,7 @@ CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5
|
||||
CVE-2024-10688,0,0,b87010fae9ede3dbc09789e0772582c4276000ac6cb27b14936b5c62cabc817d,2024-11-09T07:15:05.720000
|
||||
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
|
||||
CVE-2024-10693,0,0,0d972d4fb67fabef178798fca42d506d87be385cb4dc04f7a4ba35154ff77347,2024-11-09T04:15:04.943000
|
||||
CVE-2024-10694,1,1,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
|
||||
CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
|
||||
CVE-2024-10697,0,0,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000
|
||||
CVE-2024-10698,0,0,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000
|
||||
CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000
|
||||
@ -242990,6 +242990,7 @@ CVE-2024-11074,0,0,3292be654074303b8aa09792e3ecb0850cc4c26bc562e2e86add74b958a09
|
||||
CVE-2024-11076,0,0,7df76c2fec7ddbe95ba6a8ae79e5c42ef3c68523dcd6027c51295ba7db67b000,2024-11-11T18:15:14.940000
|
||||
CVE-2024-11077,0,0,181130d814c7f61538497c5e53f441fcc9247f27113c622321e134d349587ec8,2024-11-11T19:15:03.660000
|
||||
CVE-2024-11078,0,0,8190043eda67017a5363e09bea355d4c2dfef250f70e1b21db23c961bbf97681,2024-11-11T20:15:17.400000
|
||||
CVE-2024-11079,1,1,a13f7144a33d93e55e5f2f65a8534bfe507fba4c4162e528b7ea851542470459,2024-11-12T00:15:15.543000
|
||||
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
|
||||
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
|
||||
CVE-2024-1110,0,0,2a7a998b7b1ccd0c64d40f28b7bfefdfe0681031ac010f23e86b81b22a7f4df6,2024-02-10T04:13:13.260000
|
||||
@ -246943,6 +246944,7 @@ CVE-2024-2398,0,0,1df50a613e2f34671ada45040fb8ddc3d4f8857a9d7670bf2946d253e5c247
|
||||
CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000
|
||||
CVE-2024-23981,0,0,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000
|
||||
CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000
|
||||
CVE-2024-23983,1,1,62337635b3787d95d0b4e8f3d77f6b56b4d73e99439109ebbfddd587166d5b41,2024-11-11T23:15:05.217000
|
||||
CVE-2024-23984,0,0,d3e73193a48d5d3cf92db1c5b64a20f69007ddc7f878f4f1b9cdbda94c886b24,2024-09-16T18:03:16.707000
|
||||
CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000
|
||||
CVE-2024-2399,0,0,6767e789c5e7e80586d75b3b6704c8a0508ed89afe73da734c95859ddd63a842,2024-03-15T12:53:06.423000
|
||||
@ -247710,6 +247712,9 @@ CVE-2024-25249,0,0,c8f53501756495a734a74ff7add6ed7b337966c8ca29065859babe4290aee
|
||||
CVE-2024-2525,0,0,0cd1ed7faad83b5a9e935ff66736a2f3ef52e3e5ca65ec7de6d2b90849c09724,2024-06-11T18:15:13.263000
|
||||
CVE-2024-25250,0,0,30390a3108791fc3d353462d14426df849232b29aa14c37ad0af97fffe69a039,2024-08-27T20:35:13.350000
|
||||
CVE-2024-25251,0,0,4d70de3df6118fbe7d3792c31913c0db5782c21a7d7e078c726229fd1ced9ad9,2024-08-16T18:35:06.257000
|
||||
CVE-2024-25253,1,1,3822bbd656795c7ee7440d90842dc3f0e62ed2069bc0c4b747d07d8d8a98faa3,2024-11-11T23:15:05.393000
|
||||
CVE-2024-25254,1,1,6779a43e66aa1e79b0cdc47b34794f8eddf45e963fa38d77bd9f354c253103c7,2024-11-11T23:15:05.460000
|
||||
CVE-2024-25255,1,1,a959526960c18e6f88774d77d75cd2e62db30f997d7e5372ca3b9e307dff5988,2024-11-11T23:15:05.523000
|
||||
CVE-2024-2526,0,0,da44cbcd46359ce613873d7604fc44e9ca075cba9a523edc17aed5804a21af9d,2024-05-17T02:38:17.223000
|
||||
CVE-2024-25260,0,0,6fa7a07676f89be99cdfd9160294fea45305c2bf656b7b3f6b3836cc1f08767b,2024-08-01T13:47:38.247000
|
||||
CVE-2024-25262,0,0,8f24f4c38fd90e744be4f19671fa5e63b5c263766ec9e369e10b77ef5ec75569,2024-09-04T19:35:11.910000
|
||||
@ -254183,8 +254188,8 @@ CVE-2024-34010,0,0,7772431fddbfa4456518c6f3c79bfb5e61dd9e04f9a0c45164641cb3c48c8
|
||||
CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000
|
||||
CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000
|
||||
CVE-2024-34014,0,1,530943669013f82e8fb90843fc38790c89f82476cd985fa1ead56ab9891121c0,2024-11-11T22:15:13.773000
|
||||
CVE-2024-34015,0,1,eeedaa29e55a398e61de4630fba8facd792ffc23d5d1ad1c7593ea40b1cfc01a,2024-11-11T22:15:13.860000
|
||||
CVE-2024-34014,0,0,530943669013f82e8fb90843fc38790c89f82476cd985fa1ead56ab9891121c0,2024-11-11T22:15:13.773000
|
||||
CVE-2024-34015,0,0,eeedaa29e55a398e61de4630fba8facd792ffc23d5d1ad1c7593ea40b1cfc01a,2024-11-11T22:15:13.860000
|
||||
CVE-2024-34016,0,0,0c2a3147a84e04c06db0d6af075b8e16276b7cf9e5f22acd81f74dbeca1a1c49,2024-09-20T12:31:20.110000
|
||||
CVE-2024-34017,0,0,379da20aff6514952cc55653119ad0cbc16efa57414348c26e21b9e45ed9a8a1,2024-09-12T17:16:09.890000
|
||||
CVE-2024-34018,0,0,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a22992906144958936b,2024-09-12T17:17:20.873000
|
||||
@ -258561,9 +258566,9 @@ CVE-2024-3992,0,0,d59b458f7245a3919fa8340af270cf293071474241b7e0b0583fac012fe733
|
||||
CVE-2024-39920,0,0,6bef49e28b0964791fd5773db4da2a4c4749e9b59fc7a5ce56343d0a0b5eb623,2024-08-05T19:35:13.550000
|
||||
CVE-2024-39921,0,0,8750ad5c2c8d904b148b2fe5647ee9c07abb86c09ba269f3b4588119fa46be47,2024-09-19T14:59:49.977000
|
||||
CVE-2024-39922,0,0,49c31345500e32d6b7c4474f0f0a36570fac3b2db4261dad7ae8eae3450561de,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39924,0,1,4d865982ddda3a94c215171a2e2b2da91bc7a7724a1e146a25b1bcdc760cdbcc,2024-11-11T21:15:06.150000
|
||||
CVE-2024-39925,0,1,377300f4bbcd327b125f32c94f28e2d41ed3214101c0ec4e8b4d11cee8a27c17,2024-11-11T21:15:06.237000
|
||||
CVE-2024-39926,0,1,ca7877795714bc57f19aa820dea0695017f6966c01033e063c526e11b36cbcaa,2024-11-11T21:15:06.297000
|
||||
CVE-2024-39924,0,0,4d865982ddda3a94c215171a2e2b2da91bc7a7724a1e146a25b1bcdc760cdbcc,2024-11-11T21:15:06.150000
|
||||
CVE-2024-39925,0,0,377300f4bbcd327b125f32c94f28e2d41ed3214101c0ec4e8b4d11cee8a27c17,2024-11-11T21:15:06.237000
|
||||
CVE-2024-39926,0,0,ca7877795714bc57f19aa820dea0695017f6966c01033e063c526e11b36cbcaa,2024-11-11T21:15:06.297000
|
||||
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
|
||||
CVE-2024-39928,0,0,fc1a842efa03603045ff23fa5bcb65b8a6ef315564a7722d9ffda28553de47dd,2024-09-26T13:32:02.803000
|
||||
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
|
||||
@ -258624,8 +258629,8 @@ CVE-2024-40101,0,0,886521863c96c11be959a1cf217c3eefcb0791bdf3b877e4dc348f32f4062
|
||||
CVE-2024-4011,0,0,1484f28c8125b702be19148770f89c8b6b993aafff3c3ded37de5b6fc9a35488,2024-08-30T14:15:16.590000
|
||||
CVE-2024-40110,0,0,68d861d5d10a023f1915f02afcd75d8882ae33a201769ba967017148b1a5c0b1,2024-08-01T13:56:50.340000
|
||||
CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca1da,2024-08-26T17:35:05.733000
|
||||
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
|
||||
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
|
||||
CVE-2024-40116,0,1,9c8eb6ee76546a988d2cbc252ec3d3f5818ddeee35032042ba2387b02d68a7a4,2024-11-11T23:15:05.593000
|
||||
CVE-2024-40117,0,1,0fa1bf41495c78c014d18e3c4ad810fdb2a27d5f1e591c54edae048e47983038,2024-11-11T23:15:05.687000
|
||||
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
|
||||
CVE-2024-40125,0,0,b6102a5000d62445f3dfb355103da71acf49221ffdd95d01bc78b0a2980bc0d0,2024-09-25T14:46:52.523000
|
||||
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
|
||||
@ -261509,7 +261514,7 @@ CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88f
|
||||
CVE-2024-44540,0,0,4abad310f91dcba57b664a0055c040b07c16796e1c5dc9c0c69652281e33825a,2024-09-26T13:32:55.343000
|
||||
CVE-2024-44541,0,0,3a1e561d6510cb46fc3025d4e567327c4a8fc313204436661e66190b9e443f5d,2024-09-12T12:35:54.013000
|
||||
CVE-2024-44542,0,0,ae61c0f5fd9542e820a853b434527731c00f8fe17ea27a1b37dfc0ba3c44f2e0,2024-09-20T12:30:17.483000
|
||||
CVE-2024-44546,1,1,0af2aa7b2120b505f3c140655b2db68460cbfa198862b06e0b34bf0b1819f8e2,2024-11-11T21:15:06.360000
|
||||
CVE-2024-44546,0,0,0af2aa7b2120b505f3c140655b2db68460cbfa198862b06e0b34bf0b1819f8e2,2024-11-11T21:15:06.360000
|
||||
CVE-2024-44549,0,0,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000
|
||||
CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000
|
||||
CVE-2024-44550,0,0,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000
|
||||
@ -261578,7 +261583,7 @@ CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c0
|
||||
CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
|
||||
CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
|
||||
CVE-2024-44762,0,0,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000
|
||||
CVE-2024-44765,0,0,69ac2995f100d6b9946c4a74871be69484fc4ac8166ac0a0c28b31f7475bd18a,2024-11-08T19:15:05.590000
|
||||
CVE-2024-44765,0,1,188183cc106f4fbc7f5f3314f8ea941fd49275ee7d9ef0cc80e225745686937a,2024-11-12T00:15:15.777000
|
||||
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
|
||||
CVE-2024-44775,0,0,205ee8ae27d9197291c9317d68e5db327a872699c5adb78e1d5b21baab0f0fd4,2024-10-16T19:35:10.167000
|
||||
CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000
|
||||
@ -262824,11 +262829,11 @@ CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c06
|
||||
CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000
|
||||
CVE-2024-46960,0,0,34c9db930ef4e9e6f8b9462edd0bebd8143074b581b4cd4eaf2ae451689fb83c,2024-11-08T19:01:03.880000
|
||||
CVE-2024-46961,0,0,6281dfd23f05aedb5a57016518bf840f9c3236bd7244aca077f0eeaa5baad6cb,2024-11-08T19:01:03.880000
|
||||
CVE-2024-46962,1,1,699e9832c4f5085d60fa615701babb34b6ee37f956ecaefe53f68aabf3821dba,2024-11-11T21:15:06.437000
|
||||
CVE-2024-46963,1,1,8a455d84ba423d84ebd7ae416c6b3257c3c88e7ee88de9e2a033bbd8df54c61f,2024-11-11T21:15:06.493000
|
||||
CVE-2024-46964,1,1,4562cd5cb3219c462d845507d071d544a1fc5398f514eef73947ac33162fd6ee,2024-11-11T21:15:06.560000
|
||||
CVE-2024-46962,0,0,699e9832c4f5085d60fa615701babb34b6ee37f956ecaefe53f68aabf3821dba,2024-11-11T21:15:06.437000
|
||||
CVE-2024-46963,0,0,8a455d84ba423d84ebd7ae416c6b3257c3c88e7ee88de9e2a033bbd8df54c61f,2024-11-11T21:15:06.493000
|
||||
CVE-2024-46964,0,0,4562cd5cb3219c462d845507d071d544a1fc5398f514eef73947ac33162fd6ee,2024-11-11T21:15:06.560000
|
||||
CVE-2024-46965,0,0,b1fed9b30e2da539a3588ca6bce27b0ada48b333b441ddada52258a3843ded7e,2024-11-11T20:15:17.740000
|
||||
CVE-2024-46966,1,1,811ef517cb3c37bce19b3b92ed511f2be2f9a8eda5292ad25b25c5c6c3f261a9,2024-11-11T21:15:06.620000
|
||||
CVE-2024-46966,0,0,811ef517cb3c37bce19b3b92ed511f2be2f9a8eda5292ad25b25c5c6c3f261a9,2024-11-11T21:15:06.620000
|
||||
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000
|
||||
CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000
|
||||
@ -264870,6 +264875,7 @@ CVE-2024-50592,0,0,1ea6423960cc50e93195b2cf1d9f7905b125a77bfd5004aeb42759deb6410
|
||||
CVE-2024-50593,0,0,2990c55af886ff8c2c12dbcca8abdce067826f7d03b201038626b94cf51f8774,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50599,0,0,3c6f0c29bfc51c064c63c37a765c151941367295dbdeff70ad17448c4c631795,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000
|
||||
CVE-2024-50601,1,1,25615c335aec72439bc642df0ba921a5f5fe397dc6c11b4dc75d7bb647cd9fd0,2024-11-11T23:15:05.763000
|
||||
CVE-2024-50602,0,0,45e9269102f2b541d78d641e3b6d4f0d7b12a8e026b5814df3e38d2c0c706172,2024-10-30T18:35:16.237000
|
||||
CVE-2024-5061,0,0,acb15fde0f7701ee7d55862ecbc276a299a2eba41aa60a0bce397763155cd902,2024-09-03T15:11:56.787000
|
||||
CVE-2024-50610,0,0,2336f18018549d31226ad5c4df53b32342f6a9adf12b0e16f4241999fbebe853,2024-10-30T19:35:30.033000
|
||||
@ -264884,6 +264890,7 @@ CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f
|
||||
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
|
||||
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
|
||||
CVE-2024-50634,0,0,1259534018b84fc966c6bbf71883176c6258839dafca0d12474268de67eb80a9,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50636,1,1,0ade0dea604da8447f47847dfb20b4ef4ecbce093e12be8e7df0e1bf680276fb,2024-11-11T23:15:05.833000
|
||||
CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000
|
||||
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
|
||||
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
|
||||
@ -264963,7 +264970,7 @@ CVE-2024-51021,0,0,b06ad1dc7caa63f0b78f2a692ebfbc7dc3db4861942e25ad61d65ea6408ad
|
||||
CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884419,2024-11-05T16:35:35
|
||||
CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000
|
||||
CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000
|
||||
CVE-2024-51026,1,1,b4a18cb304cdcd98893c390c948e2bd74a14013e8cf53f27bf028896222d12d1,2024-11-11T21:15:06.683000
|
||||
CVE-2024-51026,0,0,b4a18cb304cdcd98893c390c948e2bd74a14013e8cf53f27bf028896222d12d1,2024-11-11T21:15:06.683000
|
||||
CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000
|
||||
CVE-2024-51030,0,0,8864f5f848b4bd116cf6c117fc9413494345870c652480a21b492e7685b9b04b,2024-11-08T19:01:03.880000
|
||||
CVE-2024-51031,0,0,1e5ab5cf9c7a25d9afff4cfa33f3918bc3dcf7d5460284d217623f0076ca881a,2024-11-08T19:01:03.880000
|
||||
@ -265011,6 +265018,7 @@ CVE-2024-51190,0,0,98f0a187727d181cd04296c95bf7f523a0e5d0f2ebffd8b3dc00762fc2ed5
|
||||
CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000
|
||||
CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000
|
||||
CVE-2024-51211,0,0,9f7216f2f8d2a000da238cb20861cfda4ea040b75cc4ecdd6f811f2bee27be17,2024-11-08T19:15:06.347000
|
||||
CVE-2024-51213,1,1,a2dd45dd78a543da33259713e72fe69b4f547b616ddaa87debf61b5669001042,2024-11-11T23:15:05.900000
|
||||
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
|
||||
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
|
||||
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
|
||||
@ -265440,6 +265448,7 @@ CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adab
|
||||
CVE-2024-52530,0,0,3eaa32ccf56907047fdf4b4deac8010886f5cea3e0799d98db773dc18889ead4,2024-11-11T20:15:20.247000
|
||||
CVE-2024-52531,0,0,e1da16d13ad377fa18c4d7acff83ec981e6fd45e16e236f3d3149c47740c9f9c,2024-11-11T20:15:20.313000
|
||||
CVE-2024-52532,0,0,92541ad4eaa4a5badb32130e01157e806e2d95ba7daec0d82fbf422a69aebf7a,2024-11-11T20:15:20.370000
|
||||
CVE-2024-52533,1,1,234a4746689dc23fe52ffcba81b202c439e7f5c45ade0a89e45d4f95cb4fed7b,2024-11-11T23:15:05.967000
|
||||
CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000
|
||||
CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000
|
||||
CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user