mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-12-20T03:00:24.356181+00:00
This commit is contained in:
parent
1f80fc7952
commit
d40a4e0d81
56
CVE-2020/CVE-2020-92xx/CVE-2020-9250.json
Normal file
56
CVE-2020/CVE-2020-92xx/CVE-2020-9250.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2020-9250",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-12-20T02:15:05.150",
|
||||
"lastModified": "2024-12-20T02:15:05.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an insufficient authentication vulnerability in some Huawei smart phone. An unauthenticated, local attacker can crafts software package to exploit this vulnerability. Due to insufficient verification, successful exploitation may impact the service. (Vulnerability ID: HWPSIRT-2019-12302)\n\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9250."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-01-smartphone-en",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-321xx/CVE-2022-32144.json
Normal file
56
CVE-2022/CVE-2022-321xx/CVE-2022-32144.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-32144",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-12-20T02:15:05.320",
|
||||
"lastModified": "2024-12-20T02:15:05.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an insufficient input verification vulnerability in Huawei product. Successful exploitation of this vulnerability may lead to service abnormal. (Vulnerability ID: HWPSIRT-2022-76192)\n\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2022-32144."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@huawei.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220601-01-66843eb3-en",
|
||||
"source": "psirt@huawei.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-12356",
|
||||
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
"published": "2024-12-17T05:15:06.413",
|
||||
"lastModified": "2024-12-17T05:15:06.413",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-20T02:00:01.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha descubierto una vulnerabilidad cr\u00edtica en los productos Privileged Remote Access (PRA) and Remote Support (RS) que puede permitir que un atacante no autenticado inyecte comandos que se ejecutan como un usuario del sitio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,6 +39,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2024-12-19",
|
||||
"cisaActionDue": "2024-12-27",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability ",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
|
56
CVE-2024/CVE-2024-126xx/CVE-2024-12678.json
Normal file
56
CVE-2024/CVE-2024-126xx/CVE-2024-12678.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-12678",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2024-12-20T02:15:05.500",
|
||||
"lastModified": "2024-12-20T02:15:05.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nomad Community and Nomad Enterprise (\"Nomad\") allocations are vulnerable to privilege escalation within a namespace through unredacted workload identity tokens. This vulnerability, identified as CVE-2024-12678, is fixed in Nomad Community Edition 1.9.4 and Nomad Enterprise 1.9.4, 1.8.8, and 1.7.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.hashicorp.com/t/hcsec-2024-29-nomad-allocations-vulnerable-to-privilege-escalation-within-a-namespace-using-unredacted-workload-identity-token/72119",
|
||||
"source": "security@hashicorp.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-128xx/CVE-2024-12829.json
Normal file
56
CVE-2024/CVE-2024-128xx/CVE-2024-12829.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-12829",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-20T01:15:05.737",
|
||||
"lastModified": "2024-12-20T01:15:05.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the ExecManagerImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24015."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1717/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-128xx/CVE-2024-12830.json
Normal file
56
CVE-2024/CVE-2024-128xx/CVE-2024-12830.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-12830",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-20T01:15:06.537",
|
||||
"lastModified": "2024-12-20T01:15:06.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the custom_handler method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-24019."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1718/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-128xx/CVE-2024-12831.json
Normal file
56
CVE-2024/CVE-2024-128xx/CVE-2024-12831.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-12831",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-20T01:15:06.670",
|
||||
"lastModified": "2024-12-20T01:15:06.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Arista NG Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the uvm_login module. The issue results from incorrect authorization. An attacker can leverage this to escalate privileges to resources normally protected from the user. Was ZDI-CAN-24324."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1720/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-128xx/CVE-2024-12832.json
Normal file
56
CVE-2024/CVE-2024-128xx/CVE-2024-12832.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-12832",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-12-20T01:15:06.793",
|
||||
"lastModified": "2024-12-20T01:15:06.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the ReportEntry class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the www-data user. Was ZDI-CAN-24325."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1719/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-545xx/CVE-2024-54538.json
Normal file
45
CVE-2024/CVE-2024-545xx/CVE-2024-54538.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-54538",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-12-20T01:15:06.927",
|
||||
"lastModified": "2024-12-20T01:15:06.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A denial-of-service issue was addressed with improved input validation. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, tvOS 18.1, macOS Sonoma 14.7.1, watchOS 11.1, macOS Ventura 13.7.1. A remote attacker may be able to cause a denial-of-service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121563",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121565",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121566",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121567",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121568",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121569",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121570",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-20T00:55:39.576860+00:00
|
||||
2024-12-20T03:00:24.356181+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-19T23:15:07.147000+00:00
|
||||
2024-12-20T02:15:05.500000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,29 +27,34 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-12-19T01:00:04.362949+00:00
|
||||
2024-12-20T01:00:10.092289+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274423
|
||||
274431
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-12700](CVE-2024/CVE-2024-127xx/CVE-2024-12700.json) (`2024-12-19T23:15:05.860`)
|
||||
- [CVE-2024-54009](CVE-2024/CVE-2024-540xx/CVE-2024-54009.json) (`2024-12-19T23:15:06.887`)
|
||||
- [CVE-2024-54663](CVE-2024/CVE-2024-546xx/CVE-2024-54663.json) (`2024-12-19T23:15:07.023`)
|
||||
- [CVE-2024-56327](CVE-2024/CVE-2024-563xx/CVE-2024-56327.json) (`2024-12-19T23:15:07.147`)
|
||||
- [CVE-2020-9250](CVE-2020/CVE-2020-92xx/CVE-2020-9250.json) (`2024-12-20T02:15:05.150`)
|
||||
- [CVE-2022-32144](CVE-2022/CVE-2022-321xx/CVE-2022-32144.json) (`2024-12-20T02:15:05.320`)
|
||||
- [CVE-2024-12678](CVE-2024/CVE-2024-126xx/CVE-2024-12678.json) (`2024-12-20T02:15:05.500`)
|
||||
- [CVE-2024-12829](CVE-2024/CVE-2024-128xx/CVE-2024-12829.json) (`2024-12-20T01:15:05.737`)
|
||||
- [CVE-2024-12830](CVE-2024/CVE-2024-128xx/CVE-2024-12830.json) (`2024-12-20T01:15:06.537`)
|
||||
- [CVE-2024-12831](CVE-2024/CVE-2024-128xx/CVE-2024-12831.json) (`2024-12-20T01:15:06.670`)
|
||||
- [CVE-2024-12832](CVE-2024/CVE-2024-128xx/CVE-2024-12832.json) (`2024-12-20T01:15:06.793`)
|
||||
- [CVE-2024-54538](CVE-2024/CVE-2024-545xx/CVE-2024-54538.json) (`2024-12-20T01:15:06.927`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-12356](CVE-2024/CVE-2024-123xx/CVE-2024-12356.json) (`2024-12-20T02:00:01.893`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
18
_state.csv
18
_state.csv
@ -164134,6 +164134,7 @@ CVE-2020-9246,0,0,8d96638980ac3e298778573b587edfb2eccd73fe5e0cafaa8dcafae20f6e42
|
||||
CVE-2020-9247,0,0,1aa6d00902f7f27e25be09b6735b54522bddd93735908964695deff2c860fc97,2024-11-21T05:40:15.980000
|
||||
CVE-2020-9248,0,0,ee33905a6909922672d133638d4f88fefda98b796c92d89c724a8a31cb509edb,2024-11-21T05:40:16.183000
|
||||
CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b514865c,2024-11-21T05:40:16.320000
|
||||
CVE-2020-9250,1,1,7a91b0eca5467e17bb9946adcda83c7637d6fb534af8e16a41b913562a6ad3a0,2024-12-20T02:15:05.150000
|
||||
CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000
|
||||
CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000
|
||||
CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000
|
||||
@ -200171,6 +200172,7 @@ CVE-2022-32140,0,0,7a9c3b5e767b67e01c6a2a9bb3acc04d7cf1de810331770e75aa5c4a5208d
|
||||
CVE-2022-32141,0,0,16a67640dfbaae67e72809580d9e4e423033b75e86aa578c1911d7e92b1f7da1,2024-11-21T07:05:49.833000
|
||||
CVE-2022-32142,0,0,979b129644cf56e0bea6e344238189966dd5be67873e008b080fae6175a4d135,2024-11-21T07:05:50
|
||||
CVE-2022-32143,0,0,c52290a030e5a93484ef3cd8a1b6ccb290011b10331e4624cf902dca35a033dd,2024-11-21T07:05:50.140000
|
||||
CVE-2022-32144,1,1,1ac63804ed0a0ec29097ed1c90e27fd60f2c962ddf27e7a9eeddcbeb79aa9ac8,2024-12-20T02:15:05.320000
|
||||
CVE-2022-32145,0,0,ad1c76462e7f77bf1e239e6a5bdcff318df7aae4fb302ac91733071f4fed7172,2024-11-21T07:05:50.277000
|
||||
CVE-2022-32147,0,0,a2264fd8bcc7d6a0a5e02480b2de1eb82ec9c14ea909f7a9a18a929ccf930bdc,2024-07-02T17:15:03.273000
|
||||
CVE-2022-32148,0,0,813429af96ec1d6c841eab58ceae185de144d2d98afeb3672c42b661bc4444ec,2024-11-21T07:05:50.420000
|
||||
@ -244806,7 +244808,7 @@ CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c
|
||||
CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
|
||||
CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
|
||||
CVE-2024-12355,0,0,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000
|
||||
CVE-2024-12356,0,0,c5290f7d6f4b15a04800b9cdb9042cd5c4439cf3225d5ca24016eb3c20c36cc6,2024-12-17T05:15:06.413000
|
||||
CVE-2024-12356,0,1,d2ccf7eb8b20cc7b1856bfe447212f60da40f7452bb99d79365cdb7946dbb276,2024-12-20T02:00:01.893000
|
||||
CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
|
||||
CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
|
||||
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
|
||||
@ -244944,6 +244946,7 @@ CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33
|
||||
CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000
|
||||
CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000
|
||||
CVE-2024-12672,0,0,5cd1d3b4cfb441dfdf1d1b86c433e5f5cf40997f4b5be8408d5185dc7fd334c9,2024-12-19T21:15:07.627000
|
||||
CVE-2024-12678,1,1,a99cebbf2382fb3bdb3a5462f20e28cb436198a7494c25805c55135c7b052910,2024-12-20T02:15:05.500000
|
||||
CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000
|
||||
CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
|
||||
CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000
|
||||
@ -244953,7 +244956,7 @@ CVE-2024-12693,0,0,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84
|
||||
CVE-2024-12694,0,0,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000
|
||||
CVE-2024-12695,0,0,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000
|
||||
CVE-2024-12698,0,0,bb87160466c668f8935491c0e9c96bcd8d37f4e72410a6dabca6f522c3fa9b9a,2024-12-18T05:15:07.840000
|
||||
CVE-2024-12700,1,1,2dcd0b7775a8370ffaf1468123900cd9e3f26a3ad94565de248ad4206488911b,2024-12-19T23:15:05.860000
|
||||
CVE-2024-12700,0,0,2dcd0b7775a8370ffaf1468123900cd9e3f26a3ad94565de248ad4206488911b,2024-12-19T23:15:05.860000
|
||||
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
|
||||
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
|
||||
CVE-2024-12727,0,0,8dc6d64b5bd0539ba7138feca01b9fd823a1b34251d43593934745ae67ae2eb0,2024-12-19T21:15:07.740000
|
||||
@ -244983,7 +244986,11 @@ CVE-2024-12794,0,0,8d12d04ccce1b41a783ac525383e4200b0c5f882612df57c2c9daea1cf111
|
||||
CVE-2024-12798,0,0,615aa02faa1546a4bcdbaffa1772011f8fa9ecfa3d40f9b90eddfea8efa01c41,2024-12-19T16:15:07.557000
|
||||
CVE-2024-12801,0,0,dbb8ac48c138a1f3ec7861cacd64880bb980722359886788ec50961942d98194,2024-12-19T17:15:08.930000
|
||||
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
|
||||
CVE-2024-12829,1,1,cfc0ae23942488fe83c38a8d7edcc4b6ac27b31a864a52e933a2b181e9de0537,2024-12-20T01:15:05.737000
|
||||
CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000
|
||||
CVE-2024-12830,1,1,d198fb1fd8ccf96839a414659389d58b36662edb43142fcb13bdf22550e9563e,2024-12-20T01:15:06.537000
|
||||
CVE-2024-12831,1,1,6a7b0e5cf4fa71c8e07ed8162e3704e196eca9cba00188a493458902a4427e43,2024-12-20T01:15:06.670000
|
||||
CVE-2024-12832,1,1,9a101f7d70f0a623c3454123e2a257a4b7f5154c8200a2b8250142a3bbfb4bc4,2024-12-20T01:15:06.793000
|
||||
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
|
||||
CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000
|
||||
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
|
||||
@ -269955,7 +269962,7 @@ CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0
|
||||
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
|
||||
CVE-2024-54005,0,0,a1140344f7f7dfc4d3d4467b796a2fa8133c201f3d329efe99a74d57c08e17e6,2024-12-10T14:30:47.037000
|
||||
CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000
|
||||
CVE-2024-54009,1,1,6b171013cdfb24c27cb3976d85cb3aa60932bc24cdb8b6e21c88a2cf666daa7c,2024-12-19T23:15:06.887000
|
||||
CVE-2024-54009,0,0,6b171013cdfb24c27cb3976d85cb3aa60932bc24cdb8b6e21c88a2cf666daa7c,2024-12-19T23:15:06.887000
|
||||
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
|
||||
CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000
|
||||
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
|
||||
@ -270359,6 +270366,7 @@ CVE-2024-54529,0,0,4f4002a20fd537285918affdb270ea26020a04c1a9cd33ae156b57c42a237
|
||||
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
|
||||
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
|
||||
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
|
||||
CVE-2024-54538,1,1,a341d84e7331b4f88e4a4de0734a6dbc63f4461b5355f04ec78215b07d52330e,2024-12-20T01:15:06.927000
|
||||
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
|
||||
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
|
||||
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
|
||||
@ -270371,7 +270379,7 @@ CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f2928473
|
||||
CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000
|
||||
CVE-2024-54661,0,0,ea173308d01492e6ad07a3ec27afc15cbcb8638753fa723cdd20d4babce89e4a,2024-12-04T15:15:17.580000
|
||||
CVE-2024-54662,0,0,7255232e2c08d9e5650dac13dce7847b8e812ec4972f21b97c03985763e3c9d0,2024-12-18T16:15:14.220000
|
||||
CVE-2024-54663,1,1,d523e0895a6672ca674a6868ffdbf87ed4a1dc6a1afc93421cf0f79644545fe9,2024-12-19T23:15:07.023000
|
||||
CVE-2024-54663,0,0,d523e0895a6672ca674a6868ffdbf87ed4a1dc6a1afc93421cf0f79644545fe9,2024-12-19T23:15:07.023000
|
||||
CVE-2024-54664,0,0,d20f70ea69f653338f16a7f1cc2d57f70600da4ca2ed7cb633c4eef98563304e,2024-12-04T15:15:18.093000
|
||||
CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000
|
||||
CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000
|
||||
@ -270729,7 +270737,7 @@ CVE-2024-56317,0,0,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826
|
||||
CVE-2024-56318,0,0,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000
|
||||
CVE-2024-56319,0,0,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000
|
||||
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
|
||||
CVE-2024-56327,1,1,ca1393112b26d20553e2748693dd0e68f578c32c973ba4c41abc461ad3896c85,2024-12-19T23:15:07.147000
|
||||
CVE-2024-56327,0,0,ca1393112b26d20553e2748693dd0e68f578c32c973ba4c41abc461ad3896c85,2024-12-19T23:15:07.147000
|
||||
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
||||
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
||||
CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user