Auto-Update: 2024-12-20T03:00:24.356181+00:00

This commit is contained in:
cad-safe-bot 2024-12-20 03:03:46 +00:00
parent 1f80fc7952
commit d40a4e0d81
11 changed files with 475 additions and 17 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2020-9250",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-20T02:15:05.150",
"lastModified": "2024-12-20T02:15:05.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is an insufficient authentication vulnerability in some Huawei smart phone. An unauthenticated, local attacker can crafts software package to exploit this vulnerability. Due to insufficient verification, successful exploitation may impact the service. (Vulnerability ID: HWPSIRT-2019-12302)\n\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9250."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-01-smartphone-en",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-32144",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-20T02:15:05.320",
"lastModified": "2024-12-20T02:15:05.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is an insufficient input verification vulnerability in Huawei product. Successful exploitation of this vulnerability may lead to service abnormal. (Vulnerability ID: HWPSIRT-2022-76192)\n\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2022-32144."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220601-01-66843eb3-en",
"source": "psirt@huawei.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12356", "id": "CVE-2024-12356",
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
"published": "2024-12-17T05:15:06.413", "published": "2024-12-17T05:15:06.413",
"lastModified": "2024-12-17T05:15:06.413", "lastModified": "2024-12-20T02:00:01.893",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user." "value": "A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad cr\u00edtica en los productos Privileged Remote Access (PRA) and Remote Support (RS) que puede permitir que un atacante no autenticado inyecte comandos que se ejecutan como un usuario del sitio."
} }
], ],
"metrics": { "metrics": {
@ -35,6 +39,10 @@
} }
] ]
}, },
"cisaExploitAdd": "2024-12-19",
"cisaActionDue": "2024-12-27",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability ",
"weaknesses": [ "weaknesses": [
{ {
"source": "13061848-ea10-403d-bd75-c83a022c2891", "source": "13061848-ea10-403d-bd75-c83a022c2891",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12678",
"sourceIdentifier": "security@hashicorp.com",
"published": "2024-12-20T02:15:05.500",
"lastModified": "2024-12-20T02:15:05.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nomad Community and Nomad Enterprise (\"Nomad\") allocations are vulnerable to privilege escalation within a namespace through unredacted workload identity tokens. This vulnerability, identified as CVE-2024-12678, is fixed in Nomad Community Edition 1.9.4 and Nomad Enterprise 1.9.4, 1.8.8, and 1.7.16."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2024-29-nomad-allocations-vulnerable-to-privilege-escalation-within-a-namespace-using-unredacted-workload-identity-token/72119",
"source": "security@hashicorp.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12829",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-20T01:15:05.737",
"lastModified": "2024-12-20T01:15:05.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arista NG Firewall ExecManagerImpl Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the ExecManagerImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24015."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1717/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12830",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-20T01:15:06.537",
"lastModified": "2024-12-20T01:15:06.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the custom_handler method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-24019."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1718/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12831",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-20T01:15:06.670",
"lastModified": "2024-12-20T01:15:06.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Arista NG Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the uvm_login module. The issue results from incorrect authorization. An attacker can leverage this to escalate privileges to resources normally protected from the user. Was ZDI-CAN-24324."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1720/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12832",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-12-20T01:15:06.793",
"lastModified": "2024-12-20T01:15:06.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the ReportEntry class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the www-data user. Was ZDI-CAN-24325."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1719/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-54538",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T01:15:06.927",
"lastModified": "2024-12-20T01:15:06.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service issue was addressed with improved input validation. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, tvOS 18.1, macOS Sonoma 14.7.1, watchOS 11.1, macOS Ventura 13.7.1. A remote attacker may be able to cause a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121563",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/121565",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/121566",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/121567",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/121568",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/121569",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/121570",
"source": "product-security@apple.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-12-20T00:55:39.576860+00:00 2024-12-20T03:00:24.356181+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-12-19T23:15:07.147000+00:00 2024-12-20T02:15:05.500000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,29 +27,34 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2024-12-19T01:00:04.362949+00:00 2024-12-20T01:00:10.092289+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
274423 274431
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `8`
- [CVE-2024-12700](CVE-2024/CVE-2024-127xx/CVE-2024-12700.json) (`2024-12-19T23:15:05.860`) - [CVE-2020-9250](CVE-2020/CVE-2020-92xx/CVE-2020-9250.json) (`2024-12-20T02:15:05.150`)
- [CVE-2024-54009](CVE-2024/CVE-2024-540xx/CVE-2024-54009.json) (`2024-12-19T23:15:06.887`) - [CVE-2022-32144](CVE-2022/CVE-2022-321xx/CVE-2022-32144.json) (`2024-12-20T02:15:05.320`)
- [CVE-2024-54663](CVE-2024/CVE-2024-546xx/CVE-2024-54663.json) (`2024-12-19T23:15:07.023`) - [CVE-2024-12678](CVE-2024/CVE-2024-126xx/CVE-2024-12678.json) (`2024-12-20T02:15:05.500`)
- [CVE-2024-56327](CVE-2024/CVE-2024-563xx/CVE-2024-56327.json) (`2024-12-19T23:15:07.147`) - [CVE-2024-12829](CVE-2024/CVE-2024-128xx/CVE-2024-12829.json) (`2024-12-20T01:15:05.737`)
- [CVE-2024-12830](CVE-2024/CVE-2024-128xx/CVE-2024-12830.json) (`2024-12-20T01:15:06.537`)
- [CVE-2024-12831](CVE-2024/CVE-2024-128xx/CVE-2024-12831.json) (`2024-12-20T01:15:06.670`)
- [CVE-2024-12832](CVE-2024/CVE-2024-128xx/CVE-2024-12832.json) (`2024-12-20T01:15:06.793`)
- [CVE-2024-54538](CVE-2024/CVE-2024-545xx/CVE-2024-54538.json) (`2024-12-20T01:15:06.927`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `1`
- [CVE-2024-12356](CVE-2024/CVE-2024-123xx/CVE-2024-12356.json) (`2024-12-20T02:00:01.893`)
## Download and Usage ## Download and Usage

View File

@ -164134,6 +164134,7 @@ CVE-2020-9246,0,0,8d96638980ac3e298778573b587edfb2eccd73fe5e0cafaa8dcafae20f6e42
CVE-2020-9247,0,0,1aa6d00902f7f27e25be09b6735b54522bddd93735908964695deff2c860fc97,2024-11-21T05:40:15.980000 CVE-2020-9247,0,0,1aa6d00902f7f27e25be09b6735b54522bddd93735908964695deff2c860fc97,2024-11-21T05:40:15.980000
CVE-2020-9248,0,0,ee33905a6909922672d133638d4f88fefda98b796c92d89c724a8a31cb509edb,2024-11-21T05:40:16.183000 CVE-2020-9248,0,0,ee33905a6909922672d133638d4f88fefda98b796c92d89c724a8a31cb509edb,2024-11-21T05:40:16.183000
CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b514865c,2024-11-21T05:40:16.320000 CVE-2020-9249,0,0,609764363abccd920effb2bb4981a1b82100be4147729a6eea32d0b2b514865c,2024-11-21T05:40:16.320000
CVE-2020-9250,1,1,7a91b0eca5467e17bb9946adcda83c7637d6fb534af8e16a41b913562a6ad3a0,2024-12-20T02:15:05.150000
CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000 CVE-2020-9251,0,0,beb705051b54230fec1f0b04aa58d84ce8712d444c3c311bd3fd0ff8818aa691,2024-11-21T05:40:16.453000
CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000 CVE-2020-9252,0,0,2e27eed374d3e6d0d74e9cc4bbe3815fab87cc2001c720694ee08405ff819d2a,2024-11-21T05:40:16.590000
CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000 CVE-2020-9254,0,0,8e32c6d6bacd3be7a3f1960e97a7c4a004fc1a8bd60e5faabce33423b1584654,2024-11-21T05:40:16.763000
@ -200171,6 +200172,7 @@ CVE-2022-32140,0,0,7a9c3b5e767b67e01c6a2a9bb3acc04d7cf1de810331770e75aa5c4a5208d
CVE-2022-32141,0,0,16a67640dfbaae67e72809580d9e4e423033b75e86aa578c1911d7e92b1f7da1,2024-11-21T07:05:49.833000 CVE-2022-32141,0,0,16a67640dfbaae67e72809580d9e4e423033b75e86aa578c1911d7e92b1f7da1,2024-11-21T07:05:49.833000
CVE-2022-32142,0,0,979b129644cf56e0bea6e344238189966dd5be67873e008b080fae6175a4d135,2024-11-21T07:05:50 CVE-2022-32142,0,0,979b129644cf56e0bea6e344238189966dd5be67873e008b080fae6175a4d135,2024-11-21T07:05:50
CVE-2022-32143,0,0,c52290a030e5a93484ef3cd8a1b6ccb290011b10331e4624cf902dca35a033dd,2024-11-21T07:05:50.140000 CVE-2022-32143,0,0,c52290a030e5a93484ef3cd8a1b6ccb290011b10331e4624cf902dca35a033dd,2024-11-21T07:05:50.140000
CVE-2022-32144,1,1,1ac63804ed0a0ec29097ed1c90e27fd60f2c962ddf27e7a9eeddcbeb79aa9ac8,2024-12-20T02:15:05.320000
CVE-2022-32145,0,0,ad1c76462e7f77bf1e239e6a5bdcff318df7aae4fb302ac91733071f4fed7172,2024-11-21T07:05:50.277000 CVE-2022-32145,0,0,ad1c76462e7f77bf1e239e6a5bdcff318df7aae4fb302ac91733071f4fed7172,2024-11-21T07:05:50.277000
CVE-2022-32147,0,0,a2264fd8bcc7d6a0a5e02480b2de1eb82ec9c14ea909f7a9a18a929ccf930bdc,2024-07-02T17:15:03.273000 CVE-2022-32147,0,0,a2264fd8bcc7d6a0a5e02480b2de1eb82ec9c14ea909f7a9a18a929ccf930bdc,2024-07-02T17:15:03.273000
CVE-2022-32148,0,0,813429af96ec1d6c841eab58ceae185de144d2d98afeb3672c42b661bc4444ec,2024-11-21T07:05:50.420000 CVE-2022-32148,0,0,813429af96ec1d6c841eab58ceae185de144d2d98afeb3672c42b661bc4444ec,2024-11-21T07:05:50.420000
@ -244806,7 +244808,7 @@ CVE-2024-12352,0,0,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c
CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000 CVE-2024-12353,0,0,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000 CVE-2024-12354,0,0,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
CVE-2024-12355,0,0,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000 CVE-2024-12355,0,0,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000
CVE-2024-12356,0,0,c5290f7d6f4b15a04800b9cdb9042cd5c4439cf3225d5ca24016eb3c20c36cc6,2024-12-17T05:15:06.413000 CVE-2024-12356,0,1,d2ccf7eb8b20cc7b1856bfe447212f60da40f7452bb99d79365cdb7946dbb276,2024-12-20T02:00:01.893000
CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000 CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000 CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000 CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
@ -244944,6 +244946,7 @@ CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33
CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000 CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000
CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000 CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000
CVE-2024-12672,0,0,5cd1d3b4cfb441dfdf1d1b86c433e5f5cf40997f4b5be8408d5185dc7fd334c9,2024-12-19T21:15:07.627000 CVE-2024-12672,0,0,5cd1d3b4cfb441dfdf1d1b86c433e5f5cf40997f4b5be8408d5185dc7fd334c9,2024-12-19T21:15:07.627000
CVE-2024-12678,1,1,a99cebbf2382fb3bdb3a5462f20e28cb436198a7494c25805c55135c7b052910,2024-12-20T02:15:05.500000
CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000
CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000 CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000 CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000
@ -244953,7 +244956,7 @@ CVE-2024-12693,0,0,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84
CVE-2024-12694,0,0,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000 CVE-2024-12694,0,0,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000
CVE-2024-12695,0,0,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000 CVE-2024-12695,0,0,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000
CVE-2024-12698,0,0,bb87160466c668f8935491c0e9c96bcd8d37f4e72410a6dabca6f522c3fa9b9a,2024-12-18T05:15:07.840000 CVE-2024-12698,0,0,bb87160466c668f8935491c0e9c96bcd8d37f4e72410a6dabca6f522c3fa9b9a,2024-12-18T05:15:07.840000
CVE-2024-12700,1,1,2dcd0b7775a8370ffaf1468123900cd9e3f26a3ad94565de248ad4206488911b,2024-12-19T23:15:05.860000 CVE-2024-12700,0,0,2dcd0b7775a8370ffaf1468123900cd9e3f26a3ad94565de248ad4206488911b,2024-12-19T23:15:05.860000
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000 CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
CVE-2024-12727,0,0,8dc6d64b5bd0539ba7138feca01b9fd823a1b34251d43593934745ae67ae2eb0,2024-12-19T21:15:07.740000 CVE-2024-12727,0,0,8dc6d64b5bd0539ba7138feca01b9fd823a1b34251d43593934745ae67ae2eb0,2024-12-19T21:15:07.740000
@ -244983,7 +244986,11 @@ CVE-2024-12794,0,0,8d12d04ccce1b41a783ac525383e4200b0c5f882612df57c2c9daea1cf111
CVE-2024-12798,0,0,615aa02faa1546a4bcdbaffa1772011f8fa9ecfa3d40f9b90eddfea8efa01c41,2024-12-19T16:15:07.557000 CVE-2024-12798,0,0,615aa02faa1546a4bcdbaffa1772011f8fa9ecfa3d40f9b90eddfea8efa01c41,2024-12-19T16:15:07.557000
CVE-2024-12801,0,0,dbb8ac48c138a1f3ec7861cacd64880bb980722359886788ec50961942d98194,2024-12-19T17:15:08.930000 CVE-2024-12801,0,0,dbb8ac48c138a1f3ec7861cacd64880bb980722359886788ec50961942d98194,2024-12-19T17:15:08.930000
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-12829,1,1,cfc0ae23942488fe83c38a8d7edcc4b6ac27b31a864a52e933a2b181e9de0537,2024-12-20T01:15:05.737000
CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000 CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000
CVE-2024-12830,1,1,d198fb1fd8ccf96839a414659389d58b36662edb43142fcb13bdf22550e9563e,2024-12-20T01:15:06.537000
CVE-2024-12831,1,1,6a7b0e5cf4fa71c8e07ed8162e3704e196eca9cba00188a493458902a4427e43,2024-12-20T01:15:06.670000
CVE-2024-12832,1,1,9a101f7d70f0a623c3454123e2a257a4b7f5154c8200a2b8250142a3bbfb4bc4,2024-12-20T01:15:06.793000
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000 CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000 CVE-2024-1285,0,0,d0ab2f865f2e59a6fecad2e70eefd338b3054451b5a20bdd27d60569b43e4f0d,2024-11-21T08:50:13.903000
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000 CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
@ -269955,7 +269962,7 @@ CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000 CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
CVE-2024-54005,0,0,a1140344f7f7dfc4d3d4467b796a2fa8133c201f3d329efe99a74d57c08e17e6,2024-12-10T14:30:47.037000 CVE-2024-54005,0,0,a1140344f7f7dfc4d3d4467b796a2fa8133c201f3d329efe99a74d57c08e17e6,2024-12-10T14:30:47.037000
CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000 CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000
CVE-2024-54009,1,1,6b171013cdfb24c27cb3976d85cb3aa60932bc24cdb8b6e21c88a2cf666daa7c,2024-12-19T23:15:06.887000 CVE-2024-54009,0,0,6b171013cdfb24c27cb3976d85cb3aa60932bc24cdb8b6e21c88a2cf666daa7c,2024-12-19T23:15:06.887000
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000 CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
@ -270359,6 +270366,7 @@ CVE-2024-54529,0,0,4f4002a20fd537285918affdb270ea26020a04c1a9cd33ae156b57c42a237
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
CVE-2024-54538,1,1,a341d84e7331b4f88e4a4de0734a6dbc63f4461b5355f04ec78215b07d52330e,2024-12-20T01:15:06.927000
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
@ -270371,7 +270379,7 @@ CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f2928473
CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000 CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000
CVE-2024-54661,0,0,ea173308d01492e6ad07a3ec27afc15cbcb8638753fa723cdd20d4babce89e4a,2024-12-04T15:15:17.580000 CVE-2024-54661,0,0,ea173308d01492e6ad07a3ec27afc15cbcb8638753fa723cdd20d4babce89e4a,2024-12-04T15:15:17.580000
CVE-2024-54662,0,0,7255232e2c08d9e5650dac13dce7847b8e812ec4972f21b97c03985763e3c9d0,2024-12-18T16:15:14.220000 CVE-2024-54662,0,0,7255232e2c08d9e5650dac13dce7847b8e812ec4972f21b97c03985763e3c9d0,2024-12-18T16:15:14.220000
CVE-2024-54663,1,1,d523e0895a6672ca674a6868ffdbf87ed4a1dc6a1afc93421cf0f79644545fe9,2024-12-19T23:15:07.023000 CVE-2024-54663,0,0,d523e0895a6672ca674a6868ffdbf87ed4a1dc6a1afc93421cf0f79644545fe9,2024-12-19T23:15:07.023000
CVE-2024-54664,0,0,d20f70ea69f653338f16a7f1cc2d57f70600da4ca2ed7cb633c4eef98563304e,2024-12-04T15:15:18.093000 CVE-2024-54664,0,0,d20f70ea69f653338f16a7f1cc2d57f70600da4ca2ed7cb633c4eef98563304e,2024-12-04T15:15:18.093000
CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000 CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000
CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000 CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000
@ -270729,7 +270737,7 @@ CVE-2024-56317,0,0,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826
CVE-2024-56318,0,0,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000 CVE-2024-56318,0,0,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000
CVE-2024-56319,0,0,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000 CVE-2024-56319,0,0,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000 CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
CVE-2024-56327,1,1,ca1393112b26d20553e2748693dd0e68f578c32c973ba4c41abc461ad3896c85,2024-12-19T23:15:07.147000 CVE-2024-56327,0,0,ca1393112b26d20553e2748693dd0e68f578c32c973ba4c41abc461ad3896c85,2024-12-19T23:15:07.147000
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000 CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000 CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000 CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000

Can't render this file because it is too large.