mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-13T15:00:34.276447+00:00
This commit is contained in:
parent
efa9fcace5
commit
d5b0f2797f
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-9217",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-05-24T05:29:00.223",
|
||||
"lastModified": "2024-11-21T03:35:36.520",
|
||||
"lastModified": "2024-12-13T14:15:18.280",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -162,6 +162,10 @@
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0003/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-12122",
|
||||
"sourceIdentifier": "cve-request@iojs.org",
|
||||
"published": "2018-11-28T17:29:00.370",
|
||||
"lastModified": "2024-11-21T03:44:38.317",
|
||||
"lastModified": "2024-12-13T14:15:19.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -221,6 +221,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0009/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-12123",
|
||||
"sourceIdentifier": "cve-request@iojs.org",
|
||||
"published": "2018-11-28T17:29:00.417",
|
||||
"lastModified": "2024-11-21T03:44:38.440",
|
||||
"lastModified": "2024-12-13T14:15:19.250",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -170,6 +170,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0008/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-7738",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-07T02:29:03.533",
|
||||
"lastModified": "2024-11-21T04:12:38.423",
|
||||
"lastModified": "2024-12-13T14:15:19.380",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -170,6 +170,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0002/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://usn.ubuntu.com/4512-1/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29400",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2023-05-11T16:15:09.850",
|
||||
"lastModified": "2024-11-21T07:56:59.223",
|
||||
"lastModified": "2024-12-13T14:15:19.623",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -132,6 +132,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0005/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29402",
|
||||
"sourceIdentifier": "security@golang.org",
|
||||
"published": "2023-06-08T21:15:16.770",
|
||||
"lastModified": "2024-11-21T07:56:59.447",
|
||||
"lastModified": "2024-12-13T14:15:20.403",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -175,6 +175,10 @@
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202311-09",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0004/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43804",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-10-04T17:15:10.163",
|
||||
"lastModified": "2024-11-21T08:24:49.197",
|
||||
"lastModified": "2024-12-13T14:15:20.570",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -72,7 +72,7 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -255,6 +255,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0007/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-11691",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:18.633",
|
||||
"lastModified": "2024-11-27T16:15:12.330",
|
||||
"lastModified": "2024-12-13T14:15:20.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. \n*This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
"value": "Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. \n*This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -67,6 +67,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-70/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-11694",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T14:15:18.943",
|
||||
"lastModified": "2024-11-27T17:15:09.703",
|
||||
"lastModified": "2024-12-13T14:15:21.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
|
||||
"value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -75,6 +75,10 @@
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-70/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-119xx/CVE-2024-11986.json
Normal file
56
CVE-2024/CVE-2024-119xx/CVE-2024-11986.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-11986",
|
||||
"sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
|
||||
"published": "2024-12-13T14:15:21.207",
|
||||
"lastModified": "2024-12-13T14:15:21.207",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://crushftp.com/crush11wiki/Wiki.jsp?page=Update",
|
||||
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-224xx/CVE-2024-22461.json
Normal file
56
CVE-2024/CVE-2024-224xx/CVE-2024-22461.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-22461",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-13T14:15:21.383",
|
||||
"lastModified": "2024-12-13T14:15:21.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. A low privileged remote attacker could potentially exploit this vulnerability by running any command as root, leading to gaining of root-level access and compromise of complete system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29131",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-21T09:15:07.807",
|
||||
"lastModified": "2024-11-21T09:07:37.410",
|
||||
"lastModified": "2024-12-13T14:15:21.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -83,6 +83,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0001/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29404",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-03T17:15:10.087",
|
||||
"lastModified": "2024-12-03T17:15:10.087",
|
||||
"lastModified": "2024-12-13T14:15:21.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Un problema en Razer Synapse 3 v.3.9.131.20813 y Synapse 3 App v.20240213 permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de export de la funci\u00f3n Chroma Effects en el componente Profiles ."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mansk1es/CVE-2024-29404_Razer",
|
||||
|
56
CVE-2024/CVE-2024-384xx/CVE-2024-38488.json
Normal file
56
CVE-2024/CVE-2024-384xx/CVE-2024-38488.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38488",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-13T14:15:21.993",
|
||||
"lastModified": "2024-12-13T14:15:21.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains a vulnerability. An improper Restriction of Excessive Authentication vulnerability where a Network attacker could potentially exploit this vulnerability, leading to a brute force attack or a dictionary attack against the RecoverPoint login form and a complete system compromise.\nThis allows attackers to brute-force the password of valid users in an automated manner."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47241",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-10-18T17:15:12.880",
|
||||
"lastModified": "2024-10-21T17:10:22.857",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-12-13T14:37:10.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:5.24.00.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A8CE3A7-E200-4F68-88D2-878FA0E5EC68"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000237211/dsa-2024-407-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-480xx/CVE-2024-48007.json
Normal file
44
CVE-2024/CVE-2024-480xx/CVE-2024-48007.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-48007",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-13T14:15:22.147",
|
||||
"lastModified": "2024-12-13T14:15:22.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-480xx/CVE-2024-48008.json
Normal file
56
CVE-2024/CVE-2024-480xx/CVE-2024-48008.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48008",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-13T14:15:22.273",
|
||||
"lastModified": "2024-12-13T14:15:22.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files that may contain sensitive information"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-11"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53143",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-07T07:15:03.780",
|
||||
"lastModified": "2024-12-07T07:15:03.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-13T14:15:22.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: Fix ordering of iput() and watched_objects decrement\n\nEnsure the superblock is kept alive until we're done with iput().\nHolding a reference to an inode is not allowed unless we ensure the\nsuperblock stays alive, which fsnotify does by keeping the\nwatched_objects count elevated, so iput() must happen before the\nwatched_objects decrement.\nThis can lead to a UAF of something like sb->s_fs_info in tmpfs, but the\nUAF is hard to hit because race orderings that oops are more likely, thanks\nto the CHECK_DATA_CORRUPTION() block in generic_shutdown_super().\n\nAlso, ensure that fsnotify_put_sb_watched_objects() doesn't call\nfsnotify_sb_watched_objects() on a superblock that may have already been\nfreed, which would cause a UAF read of sb->s_fsnotify_info."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fsnotify: Arreglar el orden de iput() y el decremento de watching_objects Asegurarse de que el superbloque se mantenga activo hasta que terminemos con iput(). No se permite mantener una referencia a un inodo a menos que aseguremos que el superbloque se mantenga activo, lo que fsnotify hace manteniendo elevado el conteo de watching_objects, por lo que iput() debe ocurrir antes del decremento de watching_objects. Esto puede llevar a un UAF de algo como sb->s_fs_info en tmpfs, pero el UAF es dif\u00edcil de alcanzar porque los \u00f3rdenes de carrera que oops son m\u00e1s probables, gracias al bloque CHECK_DATA_CORRUPTION() en generic_shutdown_super(). Adem\u00e1s, aseg\u00farese de que fsnotify_put_sb_watched_objects() no llame a fsnotify_sb_watched_objects() en un superbloque que ya puede haber sido liberado, lo que causar\u00eda una lectura UAF de sb->s_fsnotify_info."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/21d1b618b6b9da46c5116c640ac4b1cc8d40d63a",
|
||||
|
60
CVE-2024/CVE-2024-558xx/CVE-2024-55889.json
Normal file
60
CVE-2024/CVE-2024-558xx/CVE-2024-55889.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-55889",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-13T14:15:22.653",
|
||||
"lastModified": "2024-12-13T14:15:22.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> element without user interaction or explicit consent. Version 3.2.10 fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thorsten/phpMyFAQ/commit/fa0f7368dc3288eedb1915def64ef8fb270f711d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-m3r7-8gw7-qwvc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7254",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2024-09-19T01:15:10.963",
|
||||
"lastModified": "2024-09-20T12:30:17.483",
|
||||
"lastModified": "2024-12-13T14:15:22.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -77,6 +77,10 @@
|
||||
{
|
||||
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0010/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8075",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-22T20:15:10.210",
|
||||
"lastModified": "2024-08-29T21:57:51.377",
|
||||
"lastModified": "2024-12-13T14:46:14.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -171,8 +171,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
|
||||
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8076",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-22T20:15:11.017",
|
||||
"lastModified": "2024-08-29T21:58:31.820",
|
||||
"lastModified": "2024-12-13T14:46:25.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -131,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -161,8 +161,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
|
||||
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8077",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-22T20:15:11.690",
|
||||
"lastModified": "2024-08-29T21:59:08.997",
|
||||
"lastModified": "2024-12-13T14:50:34.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -131,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -161,8 +161,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
|
||||
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8078",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-22T21:15:17.603",
|
||||
"lastModified": "2024-08-29T22:00:43.353",
|
||||
"lastModified": "2024-12-13T14:51:05.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -131,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -161,8 +161,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
|
||||
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-8079",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-22T21:15:17.910",
|
||||
"lastModified": "2024-08-29T22:00:11.680",
|
||||
"lastModified": "2024-12-13T14:53:21.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -131,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -161,8 +161,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
|
||||
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9681",
|
||||
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
||||
"published": "2024-11-06T08:15:03.740",
|
||||
"lastModified": "2024-11-25T19:52:56.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-12-13T14:15:22.953",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,6 +124,10 @@
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241213-0006/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
51
README.md
51
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-13T13:00:14.297263+00:00
|
||||
2024-12-13T15:00:34.276447+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-13T12:15:20.080000+00:00
|
||||
2024-12-13T14:53:21.583000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,34 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
273584
|
||||
273590
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2021-32007](CVE-2021/CVE-2021-320xx/CVE-2021-32007.json) (`2024-12-13T11:15:06.060`)
|
||||
- [CVE-2024-11827](CVE-2024/CVE-2024-118xx/CVE-2024-11827.json) (`2024-12-13T12:15:19.050`)
|
||||
- [CVE-2024-21576](CVE-2024/CVE-2024-215xx/CVE-2024-21576.json) (`2024-12-13T12:15:19.753`)
|
||||
- [CVE-2024-21577](CVE-2024/CVE-2024-215xx/CVE-2024-21577.json) (`2024-12-13T12:15:19.910`)
|
||||
- [CVE-2024-52058](CVE-2024/CVE-2024-520xx/CVE-2024-52058.json) (`2024-12-13T11:15:07.900`)
|
||||
- [CVE-2024-52059](CVE-2024/CVE-2024-520xx/CVE-2024-52059.json) (`2024-12-13T11:15:08.080`)
|
||||
- [CVE-2024-52060](CVE-2024/CVE-2024-520xx/CVE-2024-52060.json) (`2024-12-13T11:15:08.250`)
|
||||
- [CVE-2024-52061](CVE-2024/CVE-2024-520xx/CVE-2024-52061.json) (`2024-12-13T11:15:08.457`)
|
||||
- [CVE-2024-52062](CVE-2024/CVE-2024-520xx/CVE-2024-52062.json) (`2024-12-13T11:15:08.650`)
|
||||
- [CVE-2024-52063](CVE-2024/CVE-2024-520xx/CVE-2024-52063.json) (`2024-12-13T11:15:08.810`)
|
||||
- [CVE-2024-52064](CVE-2024/CVE-2024-520xx/CVE-2024-52064.json) (`2024-12-13T11:15:08.963`)
|
||||
- [CVE-2024-52065](CVE-2024/CVE-2024-520xx/CVE-2024-52065.json) (`2024-12-13T11:15:09.153`)
|
||||
- [CVE-2024-52066](CVE-2024/CVE-2024-520xx/CVE-2024-52066.json) (`2024-12-13T11:15:09.330`)
|
||||
- [CVE-2024-9608](CVE-2024/CVE-2024-96xx/CVE-2024-9608.json) (`2024-12-13T12:15:20.080`)
|
||||
- [CVE-2024-11986](CVE-2024/CVE-2024-119xx/CVE-2024-11986.json) (`2024-12-13T14:15:21.207`)
|
||||
- [CVE-2024-22461](CVE-2024/CVE-2024-224xx/CVE-2024-22461.json) (`2024-12-13T14:15:21.383`)
|
||||
- [CVE-2024-38488](CVE-2024/CVE-2024-384xx/CVE-2024-38488.json) (`2024-12-13T14:15:21.993`)
|
||||
- [CVE-2024-48007](CVE-2024/CVE-2024-480xx/CVE-2024-48007.json) (`2024-12-13T14:15:22.147`)
|
||||
- [CVE-2024-48008](CVE-2024/CVE-2024-480xx/CVE-2024-48008.json) (`2024-12-13T14:15:22.273`)
|
||||
- [CVE-2024-55889](CVE-2024/CVE-2024-558xx/CVE-2024-55889.json) (`2024-12-13T14:15:22.653`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
- [CVE-2024-21726](CVE-2024/CVE-2024-217xx/CVE-2024-21726.json) (`2024-12-13T11:15:07.320`)
|
||||
- [CVE-2017-9217](CVE-2017/CVE-2017-92xx/CVE-2017-9217.json) (`2024-12-13T14:15:18.280`)
|
||||
- [CVE-2018-12122](CVE-2018/CVE-2018-121xx/CVE-2018-12122.json) (`2024-12-13T14:15:19.043`)
|
||||
- [CVE-2018-12123](CVE-2018/CVE-2018-121xx/CVE-2018-12123.json) (`2024-12-13T14:15:19.250`)
|
||||
- [CVE-2018-7738](CVE-2018/CVE-2018-77xx/CVE-2018-7738.json) (`2024-12-13T14:15:19.380`)
|
||||
- [CVE-2023-29400](CVE-2023/CVE-2023-294xx/CVE-2023-29400.json) (`2024-12-13T14:15:19.623`)
|
||||
- [CVE-2023-29402](CVE-2023/CVE-2023-294xx/CVE-2023-29402.json) (`2024-12-13T14:15:20.403`)
|
||||
- [CVE-2023-43804](CVE-2023/CVE-2023-438xx/CVE-2023-43804.json) (`2024-12-13T14:15:20.570`)
|
||||
- [CVE-2024-11691](CVE-2024/CVE-2024-116xx/CVE-2024-11691.json) (`2024-12-13T14:15:20.863`)
|
||||
- [CVE-2024-11694](CVE-2024/CVE-2024-116xx/CVE-2024-11694.json) (`2024-12-13T14:15:21.053`)
|
||||
- [CVE-2024-29131](CVE-2024/CVE-2024-291xx/CVE-2024-29131.json) (`2024-12-13T14:15:21.547`)
|
||||
- [CVE-2024-29404](CVE-2024/CVE-2024-294xx/CVE-2024-29404.json) (`2024-12-13T14:15:21.740`)
|
||||
- [CVE-2024-47241](CVE-2024/CVE-2024-472xx/CVE-2024-47241.json) (`2024-12-13T14:37:10.467`)
|
||||
- [CVE-2024-53143](CVE-2024/CVE-2024-531xx/CVE-2024-53143.json) (`2024-12-13T14:15:22.443`)
|
||||
- [CVE-2024-7254](CVE-2024/CVE-2024-72xx/CVE-2024-7254.json) (`2024-12-13T14:15:22.800`)
|
||||
- [CVE-2024-8075](CVE-2024/CVE-2024-80xx/CVE-2024-8075.json) (`2024-12-13T14:46:14.797`)
|
||||
- [CVE-2024-8076](CVE-2024/CVE-2024-80xx/CVE-2024-8076.json) (`2024-12-13T14:46:25.210`)
|
||||
- [CVE-2024-8077](CVE-2024/CVE-2024-80xx/CVE-2024-8077.json) (`2024-12-13T14:50:34.863`)
|
||||
- [CVE-2024-8078](CVE-2024/CVE-2024-80xx/CVE-2024-8078.json) (`2024-12-13T14:51:05.847`)
|
||||
- [CVE-2024-8079](CVE-2024/CVE-2024-80xx/CVE-2024-8079.json) (`2024-12-13T14:53:21.583`)
|
||||
- [CVE-2024-9681](CVE-2024/CVE-2024-96xx/CVE-2024-9681.json) (`2024-12-13T14:15:22.953`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
76
_state.csv
76
_state.csv
@ -109075,7 +109075,7 @@ CVE-2017-9211,0,0,8ac04e5e672e1add8a6a9531c6cc4a3ffd3016b1b8c39bdf3944c6bba2def3
|
||||
CVE-2017-9212,0,0,dd3cceb2312f8173c083ce896c70444bade103413ae0e502131b7d4e333006f3,2024-11-21T03:35:36
|
||||
CVE-2017-9214,0,0,5c4f3452093820c84562515abe973b0111120ed01c498bea20e75c937683095a,2024-11-21T03:35:36.157000
|
||||
CVE-2017-9216,0,0,eb9f4f37a348f2e37f9ffc259d90d97c7120e3f92977e5792da9c9e30b285fc8,2024-11-21T03:35:36.353000
|
||||
CVE-2017-9217,0,0,09620bdb8eb46b8fef663667a82a27cccc0fb9d8ccbe81c2507883c500dec531,2024-11-21T03:35:36.520000
|
||||
CVE-2017-9217,0,1,60a77859b56bdc7f320b484dd90160644d39be13af36427490b3b9c0551f3bcc,2024-12-13T14:15:18.280000
|
||||
CVE-2017-9218,0,0,bb8c6154d5f4c3c6473e0b17c1b164927b40b65b1ef1788018c326c6cc855729,2024-11-21T03:35:36.683000
|
||||
CVE-2017-9219,0,0,a8919b7c0192e610a06f977f38e4dbebf305b0a6065df8242a2e0c883d409d4b,2024-11-21T03:35:36.843000
|
||||
CVE-2017-9220,0,0,c88f21030475e231efaf1a1b6928d9cf95db16803e75589315f67781d526e268,2024-11-21T03:35:37.013000
|
||||
@ -113145,8 +113145,8 @@ CVE-2018-12116,0,0,14b8604db2dcecf240c6064b334de42d1e6e48ac5efde2b964ef36202e0ac
|
||||
CVE-2018-1212,0,0,c2005bdaf1f0043e5bd6cc157fdb8c9b94ff99498aeea3f0a39918e278fbc5f4,2024-11-21T03:59:24.007000
|
||||
CVE-2018-12120,0,0,5005c1a5ad0427dafca9ff38ab2612a8dd5a245855697ebc9cd45cb7dfb192e2,2024-11-21T03:44:38.050000
|
||||
CVE-2018-12121,0,0,e940d8f61cd0bc34866a74d18300d4d9f30e89625fb45d1587b1bd0803cee824,2024-11-21T03:44:38.177000
|
||||
CVE-2018-12122,0,0,414272a42a95f581ca152e2dd24b1b58e27f89a420d584b20f906675c8a34f4b,2024-11-21T03:44:38.317000
|
||||
CVE-2018-12123,0,0,a56137a14623e8029005ef7f18a447203c14d6be68702433d5cb67dc308fce98,2024-11-21T03:44:38.440000
|
||||
CVE-2018-12122,0,1,b8f9b6ce1ad84a787b195d15e50c17580151ae7354f6ef0d74a280b85ca5a34d,2024-12-13T14:15:19.043000
|
||||
CVE-2018-12123,0,1,0d2c5185ee17eac3b17233c70e3fc4506fcf37a36d5e56d74261221a7020c610,2024-12-13T14:15:19.250000
|
||||
CVE-2018-12125,0,0,f99608b02f3b51d6b7348f2a325bea878fdd51cdd84df5b43567cffb0ba60a6d,2023-11-07T02:52:01.980000
|
||||
CVE-2018-12126,0,0,ce8c44ae920546b909d89d93ec46884ebd8343c4cadc3a6519bbb436b065e55a,2024-11-21T03:44:38.583000
|
||||
CVE-2018-12127,0,0,2aa8b49edb4fab8d15788600eaae7aa292a337b7391dc6f2931e8681dcd62e93,2024-11-21T03:44:38.757000
|
||||
@ -125673,7 +125673,7 @@ CVE-2018-7734,0,0,0b0e2d17705ea67a39f723794ad3f7fb844d038be5ff46a4de610a4d839779
|
||||
CVE-2018-7735,0,0,0639d6992b32040379770cf66a510956a6c7026b8be770922507cb9243a0188f,2024-11-21T04:12:37.983000
|
||||
CVE-2018-7736,0,0,4ff3a089f0e1d332b1e6223efd8599a187091193fd1e19da8c7c5f2638a9170b,2024-11-21T04:12:38.120000
|
||||
CVE-2018-7737,0,0,739e37e446055d9c27dbd564dc05ea3cbe43c37a09b50b92a0ba39c26959423d,2024-11-21T04:12:38.280000
|
||||
CVE-2018-7738,0,0,60297463aeb306da47c2ab2aedf2e189ab36ac51f0f993ce48cb12fcc263bf67,2024-11-21T04:12:38.423000
|
||||
CVE-2018-7738,0,1,d7c228fb8ab034bad803f5149dd183d4de903be0e71c990e6427e1edb33eee01,2024-12-13T14:15:19.380000
|
||||
CVE-2018-7739,0,0,8f38c61b93fd10c0ee55726cde2c7f192f2c8bcb5bf05c7cc5d262050ee80b36,2024-11-21T04:12:38.567000
|
||||
CVE-2018-7740,0,0,0cc38c4ecdcf28b860d6180fb378990bdf7ed6760407a71ce6d4a3d277aa8a67,2024-11-21T04:12:38.703000
|
||||
CVE-2018-7741,0,0,ac292fac867bbd857fc86dd00404d5497fc78f3699b1c5c430dc7ace84acd65c,2024-11-21T04:12:38.850000
|
||||
@ -176138,7 +176138,7 @@ CVE-2021-32003,0,0,0ab0c12e80b6a55e89863cb2bded4fb5faaf86274d40a9063f46cc83d3717
|
||||
CVE-2021-32004,0,0,c711be156e6bab6b83bbf28ba05238de081ebf4afdcf90f1fa1cb16c25906106,2024-11-21T06:06:41.753000
|
||||
CVE-2021-32005,0,0,98c8fbec304b3bcbf9d61ae8e342f36131609e694f7978a1b72e4f2daa374fa4,2024-11-21T06:06:41.883000
|
||||
CVE-2021-32006,0,0,a204caa10486cbbefb41479b5cf43d89ba16b11c29590e9619f668e7bac849ee,2024-11-21T06:06:42.013000
|
||||
CVE-2021-32007,1,1,00e8c02493a988831af7568bb186f220478524a790291108dc261665ce61c712,2024-12-13T11:15:06.060000
|
||||
CVE-2021-32007,0,0,00e8c02493a988831af7568bb186f220478524a790291108dc261665ce61c712,2024-12-13T11:15:06.060000
|
||||
CVE-2021-32008,0,0,c24c0199bba704de19a4ec6ec29630e12085973618b29db0189bff01655deb93,2024-11-21T06:06:42.143000
|
||||
CVE-2021-32009,0,0,f686c9648f02955225833b4606384eca97ead135b90aa0e4d82492e0320a32be,2024-11-21T06:06:42.270000
|
||||
CVE-2021-32010,0,0,e240e56c82ab91b528fee16a10c9fd11cfc0790379fc80db4cebb2fc1e02b258,2024-11-21T06:06:42.393000
|
||||
@ -222837,9 +222837,9 @@ CVE-2023-29388,0,0,ef75a21f904be7a7d0909149ff2271d2ae1b1d42ab55983af2f04f6648c02
|
||||
CVE-2023-29389,0,0,c0a5bc2996fa100a5d1d4dbba184a794dfb7e1a165cf887f98ddec59042a381f,2024-11-21T07:56:59.087000
|
||||
CVE-2023-2939,0,0,5097b0f3fd177e801415b54d7716f4683fb54c1157f3dcb9725b8d5f368e5323,2024-11-21T07:59:36.560000
|
||||
CVE-2023-2940,0,0,7ad5423ee87e68f755e2cd74221edf5f886bdd506499833f9705f0fa2df479b6,2024-11-21T07:59:36.687000
|
||||
CVE-2023-29400,0,0,7b75e37fd3c8289045add4b27ccfa035e7ca67d36bc89cc7729705e0afbce1aa,2024-11-21T07:56:59.223000
|
||||
CVE-2023-29400,0,1,dea608444d68d5c5d1e530af9d1a8a44b7a086015c01eba61bbfe530a925c3f9,2024-12-13T14:15:19.623000
|
||||
CVE-2023-29401,0,0,1bc1f989a3b5d0779284da4092877f45f8ace05de4aefc33b96869475b2d0ea1,2024-11-21T07:56:59.340000
|
||||
CVE-2023-29402,0,0,bff3355604ec4f73f74ba343b16d167c0c0ebe9191f942897a482f68c866ee7b,2024-11-21T07:56:59.447000
|
||||
CVE-2023-29402,0,1,52a4a4fe8782efb78ce19d89a5b8e0a7a11a18e1c5fb2cce7d061d2f2d455d10,2024-12-13T14:15:20.403000
|
||||
CVE-2023-29403,0,0,158e83fda684349d3d4dba1f5c90e7163ce01e3c105b3f694f323cd5d43481d5,2024-11-21T07:56:59.583000
|
||||
CVE-2023-29404,0,0,86e4452282f87d5e0aafc218d73148e229bbb1f43598b802704017fcb6ce88da,2024-11-21T07:56:59.690000
|
||||
CVE-2023-29405,0,0,74cd2ca6da030ee467cc89d6c787160ab7368d3095aa6d48bc44dd9371b1a96c,2024-12-06T14:15:19.380000
|
||||
@ -233613,7 +233613,7 @@ CVE-2023-43800,0,0,a0db61c9da5a639fcd4297c3b18836c82a9507823dda2e5ee03d9a1dff2f1
|
||||
CVE-2023-43801,0,0,407ccc53cf3984bd36e85cad45c81c279907778e02ba5e41e5815b913eeb3b37,2024-11-21T08:24:48.787000
|
||||
CVE-2023-43802,0,0,de3a2fce3c68a65ae7c4e106a097b9c6621a1121d3392aea302bc0dada0024a8,2024-11-21T08:24:48.933000
|
||||
CVE-2023-43803,0,0,0fb2789d6faacc25fe24fdb596a959c39c4fad22a3464a8251a9e641b7361d56,2024-11-21T08:24:49.060000
|
||||
CVE-2023-43804,0,0,8ec1ca1c6c3da8b9fc27a04b970e5d3e6647a0d4d3d56ff35550e84a5a7d0463,2024-11-21T08:24:49.197000
|
||||
CVE-2023-43804,0,1,a2f6099c2fa635f10e2407763d0a4ce0bfbd1158e2010271cb5f0a58909064e8,2024-12-13T14:15:20.570000
|
||||
CVE-2023-43805,0,0,38773a70c1b7284588fb2bfa01590e7b788c2e5568536f3162bd2c636ea3678b,2024-11-21T08:24:49.337000
|
||||
CVE-2023-43809,0,0,29ad5c1da76af84968d3e35a7ea6494fc7e914b1f0784ac7c7a7f5a4604c4e5f,2024-11-21T08:24:49.470000
|
||||
CVE-2023-4381,0,0,997a46aaa323f217b2ca6a6b7dee38188e10a1704607d7b71d83552baee8b904,2024-11-21T08:34:58.403000
|
||||
@ -244212,10 +244212,10 @@ CVE-2024-11685,0,0,ac2887e3bedadf93f8263266da035f2c90903ee2e66a4074483ee4f2d7f8e
|
||||
CVE-2024-11687,0,0,84514bb98732ffc9ca2906ea8e96ab481d88f84c1648da7b939544b1044de35c,2024-12-06T09:15:07.303000
|
||||
CVE-2024-11689,0,0,7b88a11d5320a3330d5b2af56fe9594f7242808622d8f9ea4ecfe750acddd8a8,2024-12-12T04:15:06.657000
|
||||
CVE-2024-1169,0,0,7d005e1e32dcb786dc145e0dc1f4f8a0f524691319a7051d5e1a67ddcb23a460,2024-11-21T08:49:57.153000
|
||||
CVE-2024-11691,0,0,5eea478dab7fa5b6410e52ffca3e42171935ae1213a3687e7fe0b5c6a5e01e3a,2024-11-27T16:15:12.330000
|
||||
CVE-2024-11691,0,1,2d246dea5b0a9088e8294d6349de8afbdc87384baaa314b7a96881dd054b78be,2024-12-13T14:15:20.863000
|
||||
CVE-2024-11692,0,0,9269d1047de5ccf3bbe848f7300e55c4147a58cfd139cb6b7f723bc7b81e3d4c,2024-11-27T16:15:12.530000
|
||||
CVE-2024-11693,0,0,e0fdce984dc3054eba0934c78141d5d7d4f14af64b3544f5156b2322b39ad19d,2024-11-27T16:15:12.753000
|
||||
CVE-2024-11694,0,0,c7112925916f2e6a68139b991bf9c787957596077f531ec2939d8f920bb7d43b,2024-11-27T17:15:09.703000
|
||||
CVE-2024-11694,0,1,d182d77e778a4dff771c63a774757e85b99c1670180934bb698bfc9a48579644,2024-12-13T14:15:21.053000
|
||||
CVE-2024-11695,0,0,35b54f717d0be96208c34eb47c6fef69d2a93cd17f38ac12074dc88482ecc415,2024-11-27T17:15:09.867000
|
||||
CVE-2024-11696,0,0,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000
|
||||
CVE-2024-11697,0,0,031d7df0dfb1ff2b19cbd36a900d70b7e44f6b02ba77063a3d6968aa272edc04,2024-11-27T16:15:12.927000
|
||||
@ -244302,7 +244302,7 @@ CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719c
|
||||
CVE-2024-1182,0,0,3f29301d892b117e83ef161f22ec91ec635f3f594205a460782ee4e3d4d8572d,2024-11-21T08:49:58.813000
|
||||
CVE-2024-11820,0,0,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000
|
||||
CVE-2024-11823,0,0,39aa0fbc102b8a9648f017c9098019c8c94234f421f38dd89f51eddc70f54f40,2024-12-06T09:15:07.463000
|
||||
CVE-2024-11827,1,1,80d64f76d513488d35b0b3043c1b9224eab483c6276ed14747481e2a5f979519,2024-12-13T12:15:19.050000
|
||||
CVE-2024-11827,0,0,80d64f76d513488d35b0b3043c1b9224eab483c6276ed14747481e2a5f979519,2024-12-13T12:15:19.050000
|
||||
CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc503,2024-12-12T21:07:04.270000
|
||||
CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000
|
||||
CVE-2024-11832,0,0,aadf62fc4eeada44adff600b225c42fa09a9b0f6911729915b42277f1c29059c,2024-12-13T09:15:06.113000
|
||||
@ -244387,6 +244387,7 @@ CVE-2024-11981,0,0,4e8c7d73de59078b6dc7a30279d02d329d5e4f81501d91493f618fea96f72
|
||||
CVE-2024-11982,0,0,fdbe1466c75dff41c18009236254b70f07e6dcbf8224b3254ed5447f6369f8be,2024-11-29T08:15:04.580000
|
||||
CVE-2024-11983,0,0,b28164039b0dc59ec068d9e4704804a0da409a26a86a99d005cfe1af9f1df7bd,2024-11-29T08:15:04.733000
|
||||
CVE-2024-11985,0,0,347bd715be95eb6539997f812c032a6ace7cec9111ea8a772c8788473da7f21d,2024-12-04T02:15:04.237000
|
||||
CVE-2024-11986,1,1,970f231a615033e0c3e6ecf36f2f6bc43951bacb7ef93cc8ad6763a7d7f479fe,2024-12-13T14:15:21.207000
|
||||
CVE-2024-1199,0,0,60ffbfb4cdc00bf543d03a59b91efea487f9cf6b0b352d45a15655d219ef20c9,2024-11-21T08:50:01.340000
|
||||
CVE-2024-11990,0,0,d3429cf8c53343ced24272b548e57b9820685f26a76c9d0b20da4abeed376b1f,2024-11-29T13:15:04.170000
|
||||
CVE-2024-11991,0,0,49f7be0e41f58e2c5612446deb4753a827a3c48c90ab2a9762a91507592309ad,2024-12-09T15:15:12.203000
|
||||
@ -246697,8 +246698,8 @@ CVE-2024-2156,0,0,dad16cc8b52bdfe940c458388d7cb4591983119fee4b9576e287f5f27d4e6b
|
||||
CVE-2024-21571,0,0,d37e58d960b59009984c70d286739e560ae0d50ece0a82d653578b73814bd68d,2024-12-06T14:15:19.997000
|
||||
CVE-2024-21574,0,0,45701805f5188114f1888c23c811ceeb10e4b0f020a4cfb74429c69bdd01fe15,2024-12-12T09:15:06.037000
|
||||
CVE-2024-21575,0,0,97accf7ff45ffb715215f838147623de678c993003f8042176e982f0f1f05cf8,2024-12-12T15:15:12.733000
|
||||
CVE-2024-21576,1,1,42157063f6e4ca76e1343c8325c7a2508b01a6ce41e53efbf2a2b11172d442bb,2024-12-13T12:15:19.753000
|
||||
CVE-2024-21577,1,1,ac8ea4d0bcc3e10821f9050ff758868103ecf195d2be69297b820bfb1b2e21f3,2024-12-13T12:15:19.910000
|
||||
CVE-2024-21576,0,0,42157063f6e4ca76e1343c8325c7a2508b01a6ce41e53efbf2a2b11172d442bb,2024-12-13T12:15:19.753000
|
||||
CVE-2024-21577,0,0,ac8ea4d0bcc3e10821f9050ff758868103ecf195d2be69297b820bfb1b2e21f3,2024-12-13T12:15:19.910000
|
||||
CVE-2024-21583,0,0,c1d075392adda1a92bd116f6568c32f98f3861adb7381b8163ad6f1ba61849c1,2024-11-21T08:54:39.443000
|
||||
CVE-2024-21584,0,0,b131eec7e1253fa331b7a55309f8a83408121476547446d36e68e2f68de5bf1d,2024-11-21T08:54:39.587000
|
||||
CVE-2024-21585,0,0,9d0ae936587469574770d0fa4ad5b9b2924c2930649b2050f260c2352ac4f0cd,2024-11-21T08:54:39.697000
|
||||
@ -246811,7 +246812,7 @@ CVE-2024-21722,0,0,5f530469128a41bfa0dd5b7a458e5346dd38dd76f502f71a2747a4c0d3965
|
||||
CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
|
||||
CVE-2024-21724,0,0,71ab50eedb3eaae0cf010b41547c1ab496cb8a61984051a476dd3c8a05ae25c7,2024-11-21T08:54:52.573000
|
||||
CVE-2024-21725,0,0,102bc48d163faec6cc11fa8ada828cb863fe99c32c41e6fe5250a9d25bfe5aa9,2024-11-21T08:54:52.683000
|
||||
CVE-2024-21726,0,1,618dce9f8a5b9eb531a5c86b35312ba1a47b09692b7ec96682d06ac2ff481c50,2024-12-13T11:15:07.320000
|
||||
CVE-2024-21726,0,0,618dce9f8a5b9eb531a5c86b35312ba1a47b09692b7ec96682d06ac2ff481c50,2024-12-13T11:15:07.320000
|
||||
CVE-2024-21727,0,0,d36a5a952f97379e323c6e545f2e862cb297af7e7a1457e672ca02bec68bd484,2024-11-21T08:54:53.040000
|
||||
CVE-2024-21728,0,0,2cbae60f817b8c7a7affecac1a8952c66a9f7eeec8d8bf74d3b215cd2045b4e6,2024-12-03T16:15:21.030000
|
||||
CVE-2024-21729,0,0,ce8a30bafeb6b97535469464c82ba7fd23d6f7caed1d9ff1342347bbafd041de,2024-11-21T08:54:53.400000
|
||||
@ -247459,6 +247460,7 @@ CVE-2024-22457,0,0,81b7fce75e9a7ae03ddb2828fd3b2f600d30eacf6034c3fc68646e619016b
|
||||
CVE-2024-22458,0,0,4f0c52c36121edd6824dbd23d583ace3848b53bc5cc6589bba9950d9013728db,2024-12-04T17:19:03.560000
|
||||
CVE-2024-22459,0,0,a59f3a79899e105a6cc3ac3d292c77dd254a456412e506a47ad8a1495f05a21f,2024-11-21T08:56:19.873000
|
||||
CVE-2024-22460,0,0,cf9685057b4b3269739ae374acfa00b4da824093a0d95fe8e25340068e29c40d,2024-11-21T08:56:20.010000
|
||||
CVE-2024-22461,1,1,d85843fb2191e63866af7ade358fadb60b0c4b52ed33bc07bbe7db7ec59a4e07,2024-12-13T14:15:21.383000
|
||||
CVE-2024-22463,0,0,bc79276d8897735eac5371252a354479af9b0b137998d5b3beba6f3a8bd83642,2024-11-21T08:56:20.147000
|
||||
CVE-2024-22464,0,0,89df0e10ef44510a8e5904e121c14fc7d7fe04dd8b75af148ba79e6d8aedebac,2024-11-21T08:56:20.280000
|
||||
CVE-2024-2247,0,0,0ca7d7b7e23609e28e1499a00333ba2939a4606a46ffba5afb79df586f8f7777,2024-11-21T09:09:20.660000
|
||||
@ -252269,7 +252271,7 @@ CVE-2024-29128,0,0,1fee5bcbd86fe4f86cd9e7c8c9606be3b908374a57b43b2ff18f0f4d640f2
|
||||
CVE-2024-29129,0,0,739d5267e1c2b9428a1b775a27df9111be59167050bf55f589baea8cc5ec0a64,2024-11-21T09:07:37.160000
|
||||
CVE-2024-2913,0,0,bdee00fa9056fa8a0ad1417004d7f8c2e104929c730aae671329cfb89a446ed2,2024-11-21T09:10:49.413000
|
||||
CVE-2024-29130,0,0,78ef57c5071ad31af120491100441316733fa37898d33074aaff5efbf2ed9e6f,2024-11-21T09:07:37.283000
|
||||
CVE-2024-29131,0,0,63ee92e5d96fcdaffb7492bac5cfefc69d11f8d870c96264771d7dcc9404c9bd,2024-11-21T09:07:37.410000
|
||||
CVE-2024-29131,0,1,fd59b728390e0bccbfbb2a551bbea3c712b7624adccf1269f21e233d5bf47342,2024-12-13T14:15:21.547000
|
||||
CVE-2024-29133,0,0,65ab4bafa7d868e3d127ae6fb0b19ae15e43c85e193444814d51e9469d70052e,2024-11-21T09:07:37.603000
|
||||
CVE-2024-29134,0,0,eb7a7708e9c822b1fe886ad1674960072ad013556df73166dc0971b51032c3cb,2024-11-21T09:07:37.813000
|
||||
CVE-2024-29135,0,0,921888755133b2498a0c55fc86f73f3a15f968d9f25cb8ccfae65d2c7868f67d,2024-11-21T09:07:37.963000
|
||||
@ -252431,7 +252433,7 @@ CVE-2024-2940,0,0,d72bf41406e3ec086db8e688bbf1a144517986462dbb4fc5997cfbeec666aa
|
||||
CVE-2024-29400,0,0,b60e49df326991eb27557ce166dcd99358995137b6ae59e95d7fffbbd0b37c22,2024-11-21T09:08:00.253000
|
||||
CVE-2024-29401,0,0,32400f36889e84c9eb29bf3619b3dd286820f63d644126600928028e512d6d8d,2024-11-21T09:08:00.460000
|
||||
CVE-2024-29402,0,0,823440ced7da8e7d0a8b3af16f5a511cd429be38a31d64a72a1bb56686617b9b,2024-11-21T09:08:00.663000
|
||||
CVE-2024-29404,0,0,0b3cb60d019312e339352d67753cf3241ce4c467520a6dea9c4cee5f5424cb88,2024-12-03T17:15:10.087000
|
||||
CVE-2024-29404,0,1,8e0768ffa0e6271c10ef5a904f790cba861a6a3d32897c4a1e9132b2e0d48d5c,2024-12-13T14:15:21.740000
|
||||
CVE-2024-2941,0,0,3e71967aa0c4cbd6af2eecc6a53b210ed6ca835a6b57f301721a578e1f34e48d,2024-11-21T09:10:53.607000
|
||||
CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000
|
||||
CVE-2024-29415,0,0,acea85632df988856e0cb711645ad0b8cabdc55234b76a2d3ca04cd225a9d2bb,2024-11-21T09:08:01.093000
|
||||
@ -259314,6 +259316,7 @@ CVE-2024-38482,0,0,23aec5fa68b4dca4b432634d8e07eea61a04bf96b789d1627bdb6ec4b3c1f
|
||||
CVE-2024-38483,0,0,178f813aaa538f36bfe36509f188778c0f04be9869ce4e1261bd547bb7ef5b0d,2024-09-18T19:19:24.453000
|
||||
CVE-2024-38485,0,0,4b711e79286b7ac72bb9f144f17f69b942959934d2a1b08b06406df54cc75f3c,2024-12-09T15:15:14.110000
|
||||
CVE-2024-38486,0,0,162797fa4fe83e54a958850481312c3e22e21d3355155fa513a21d76bfbc85d6,2024-09-13T20:36:08.597000
|
||||
CVE-2024-38488,1,1,e30d15f9ef68a2ee72bc6a3c8ced19295ad38339dc158696829406a273217df6,2024-12-13T14:15:21.993000
|
||||
CVE-2024-38489,0,0,c8809c3a3b8dbca7d8ce1d14c39e410a336e30ff83b4df53210b8bbc08792dcd,2024-08-02T13:54:55.697000
|
||||
CVE-2024-3849,0,0,c4d82e661506a17f61c6a5ea96e76bd4bfb630a3e4a4f00bce2b38979f6f7063,2024-11-21T09:30:32.223000
|
||||
CVE-2024-38490,0,0,9c754b6cf973a77e1557eb95e0c2522d4326b6127e309d3544471fcb9a43aea5,2024-08-02T13:54:51.277000
|
||||
@ -265219,7 +265222,7 @@ CVE-2024-4723,0,0,4af091203745bd84c430d86c99d3eb1a1bbf42d9cd7d7cc786b00931c8615c
|
||||
CVE-2024-47238,0,0,28feace979e4c73a039ab980206e7b6d2811a5d9004b817d0af89646e91f7c77,2024-12-12T18:15:25.250000
|
||||
CVE-2024-4724,0,0,cfaff446ce857d4884ca5d5aa97ad803d1f94867ae84d40ef51da0f69b75c51d,2024-11-21T09:43:27.537000
|
||||
CVE-2024-47240,0,0,92a5dec476dd087df4961145c909b905b6c005bf5a596b1ea14c96642acb150c,2024-10-22T15:28:55.637000
|
||||
CVE-2024-47241,0,0,33cfb076143b9c1a424810bcce7ac63f0a72953aa6a2926221f310b3ceac01c1,2024-10-21T17:10:22.857000
|
||||
CVE-2024-47241,0,1,b0d6175169ec2eb1b3cefb7c95304da9c64f618bd3ffbb076b6917f1b435ff01,2024-12-13T14:37:10.467000
|
||||
CVE-2024-47248,0,0,92bcb60e07bcda7a3eb684d7bd0a6d91a70e7169e246c3b381697bbd80864f53,2024-12-06T11:15:08.180000
|
||||
CVE-2024-47249,0,0,a7f699a14cd340d6204f2853f013a69adb50d4dad2f1f815c8aefd4039d99e87,2024-12-06T11:15:08.340000
|
||||
CVE-2024-4725,0,0,0143a80f818e6c5c4ca20251d126587e437df1df321ac641cfa89b859480fbd8,2024-11-21T09:43:27.687000
|
||||
@ -265847,6 +265850,8 @@ CVE-2024-47977,0,0,167a11103556db461bec5fe97a2696b0312627da6143ca80c941f2b6fa16e
|
||||
CVE-2024-4798,0,0,67d409a675b221a14312164f5cc62c5f24d760e91c26863f4b27a369f421db4d,2024-11-21T09:43:38.167000
|
||||
CVE-2024-4799,0,0,bcde09b7182d8e0e6116d4d77d66aa7fc678a4d38a1639ef2abc6c729d992c49,2024-11-21T09:43:38.320000
|
||||
CVE-2024-4800,0,0,d6e648ed7e57041fcab1c34d0d022e8b177d9063790ccf92ab37010db4d3952a,2024-11-21T09:43:38.470000
|
||||
CVE-2024-48007,1,1,d0ec47ad3b006df3e7595e841d695e0e8f2a78f5a742c50c5838fc2a9d4fe592,2024-12-13T14:15:22.147000
|
||||
CVE-2024-48008,1,1,5ae6fe6e4612d7cd6b5058f047dfe536b768b675c56d6a677689efe95ae8e705,2024-12-13T14:15:22.273000
|
||||
CVE-2024-4801,0,0,267e61329220ade99a7910aa98f0de25e6611f732de1b6d7e824595026eb04d8,2024-11-21T09:43:38.607000
|
||||
CVE-2024-48010,0,0,8bfa5c4fbebd2aee91d2507ef982cfb796b2239ac566eed501e3cdcb4f94749b,2024-11-26T19:26:13.733000
|
||||
CVE-2024-48011,0,0,d0802d36d8c16d447cb26517cc8d3b6131002351b295b4fb171a8b113f998f1d,2024-11-26T02:12:04.277000
|
||||
@ -268470,16 +268475,16 @@ CVE-2024-52054,0,0,9a2d2ec3a40a48770d9647f97127693cc6b0ef5932cb18c296471a466b60d
|
||||
CVE-2024-52055,0,0,259d73954aece81f7c011d1c96f3f9c4bf1a8d33b43ce9ab6720600ab6632df4,2024-11-21T23:15:05.890000
|
||||
CVE-2024-52056,0,0,da2fb97069f42481988d3de6950366edf96ce98eb60db797a3ccea41a89e8e92,2024-11-21T23:15:06.147000
|
||||
CVE-2024-52057,0,0,4afa017149785f60875924874d6d565d05d116767f78456dbc0402abf3c4ffe7,2024-12-13T10:15:07.320000
|
||||
CVE-2024-52058,1,1,aae85787f6dd61b0c36f921e209af75bb054c384bd96651dad696b6309eb6ca5,2024-12-13T11:15:07.900000
|
||||
CVE-2024-52059,1,1,6bde304d0d8fd04ec20ec1688dd81311f75ec6afc8dae40129bbf0564959da20,2024-12-13T11:15:08.080000
|
||||
CVE-2024-52058,0,0,aae85787f6dd61b0c36f921e209af75bb054c384bd96651dad696b6309eb6ca5,2024-12-13T11:15:07.900000
|
||||
CVE-2024-52059,0,0,6bde304d0d8fd04ec20ec1688dd81311f75ec6afc8dae40129bbf0564959da20,2024-12-13T11:15:08.080000
|
||||
CVE-2024-5206,0,0,8862c9be0fc374f53d6a02e5cb7505c5867d3e503357cffe44c63c1a9e66a567,2024-11-21T09:47:11.143000
|
||||
CVE-2024-52060,1,1,51861fd16a81d9128d9c1930b21fa40dae199275810da1c77565602fc23e71df,2024-12-13T11:15:08.250000
|
||||
CVE-2024-52061,1,1,3e859b2c21a377f69107a7383a75c3f2e624734e6ffe1ef6b5ed51955d3d4382,2024-12-13T11:15:08.457000
|
||||
CVE-2024-52062,1,1,361307b9e16a015a415e53e9cf30be8ae92860be6685212cbf9ca90c5195d5df,2024-12-13T11:15:08.650000
|
||||
CVE-2024-52063,1,1,01a99f2c9a9552c48c26ab7a9ae3aaea1052d83010fae3b40f5cb27ed5fd90c0,2024-12-13T11:15:08.810000
|
||||
CVE-2024-52064,1,1,991b8f36e22e95ac383d6de3f96bd4197dba9a89d12273fee0411c155cfe8081,2024-12-13T11:15:08.963000
|
||||
CVE-2024-52065,1,1,95a067ff6fd4c2b46a05689cbf6895ce02d09ceb321b81c8adccd934fd0156ff,2024-12-13T11:15:09.153000
|
||||
CVE-2024-52066,1,1,3b370b6b71e379be8a024a03d6db1cdc1268457f33eccf40b6255d7a5ebc066b,2024-12-13T11:15:09.330000
|
||||
CVE-2024-52060,0,0,51861fd16a81d9128d9c1930b21fa40dae199275810da1c77565602fc23e71df,2024-12-13T11:15:08.250000
|
||||
CVE-2024-52061,0,0,3e859b2c21a377f69107a7383a75c3f2e624734e6ffe1ef6b5ed51955d3d4382,2024-12-13T11:15:08.457000
|
||||
CVE-2024-52062,0,0,361307b9e16a015a415e53e9cf30be8ae92860be6685212cbf9ca90c5195d5df,2024-12-13T11:15:08.650000
|
||||
CVE-2024-52063,0,0,01a99f2c9a9552c48c26ab7a9ae3aaea1052d83010fae3b40f5cb27ed5fd90c0,2024-12-13T11:15:08.810000
|
||||
CVE-2024-52064,0,0,991b8f36e22e95ac383d6de3f96bd4197dba9a89d12273fee0411c155cfe8081,2024-12-13T11:15:08.963000
|
||||
CVE-2024-52065,0,0,95a067ff6fd4c2b46a05689cbf6895ce02d09ceb321b81c8adccd934fd0156ff,2024-12-13T11:15:09.153000
|
||||
CVE-2024-52066,0,0,3b370b6b71e379be8a024a03d6db1cdc1268457f33eccf40b6255d7a5ebc066b,2024-12-13T11:15:09.330000
|
||||
CVE-2024-52067,0,0,3b3805f082afbbdd7956c2385fa9d932a6e128593a07e351c3b4f992b1659428,2024-11-21T13:57:24.187000
|
||||
CVE-2024-5207,0,0,1dd18e9ab7ff6bfd8ddcbcad1d892aa6d72fe1c4875644c7384ba96bff8c8b12,2024-11-21T09:47:11.280000
|
||||
CVE-2024-5208,0,0,d422f38fd635e5406dd7f21299ff486ffd883cb5b6211c662371966536488116,2024-11-21T09:47:11.387000
|
||||
@ -269110,7 +269115,7 @@ CVE-2024-5314,0,0,3f9bafe97657efc7f668c5d897662a9659297ed1c2230826ab18be8ba9a634
|
||||
CVE-2024-53140,0,0,b503ff41f27d09c97e1340bff7967ee87bb32e39dafc91d99f5fdd4a3e40d538,2024-12-11T16:45:38.077000
|
||||
CVE-2024-53141,0,0,bac15675c09f6811a6d88b2bd40199a11ae7509b12b3a955c8b4511890882333,2024-12-10T19:25:08.247000
|
||||
CVE-2024-53142,0,0,6c3c82afaa65b94acded7ae517ab5c9ebd592257e0bf92056ae5de7a8ded9a3a,2024-12-10T19:17:56.657000
|
||||
CVE-2024-53143,0,0,58aea596a92f51ecb8e396a2e6f1085ce03cd820c5355e9f3433d5e31dfbde48,2024-12-07T07:15:03.780000
|
||||
CVE-2024-53143,0,1,7d8fba7c24860a89d1b840b90918c133ee3933019e46b80ab5b9ae6d981cb066,2024-12-13T14:15:22.443000
|
||||
CVE-2024-5315,0,0,cfc4383f1c53119936ccfb248038372daec91d7a497e742b345000be072ec700,2024-11-21T09:47:24.927000
|
||||
CVE-2024-5317,0,0,c2af981f2442def6d43cf11dee826712fdb79df4e8b131d1c0815426b050d563,2024-11-21T09:47:25.040000
|
||||
CVE-2024-5318,0,0,d3e6ab64f214a31e8be6483f947f606302a807960eeb0dcd1e3ac0fbb29dc9c0,2024-11-21T09:47:25.160000
|
||||
@ -269879,6 +269884,7 @@ CVE-2024-55884,0,0,5d6da0d32263735a14f387d6018828f5961d5e83d83c540231cd267e671ab
|
||||
CVE-2024-55885,0,0,461df12fc4edfbf1f9758c9c1d2eeedab4ec4c04e0446b686d887a656bdb17d2,2024-12-12T20:15:21.760000
|
||||
CVE-2024-55886,0,0,9ec539fe6f9f48b8925ed26ad51cb53691c99ad16b00ba13a8014018fc0535c6,2024-12-12T20:15:21.890000
|
||||
CVE-2024-55888,0,0,6bc68c6e76518b27090ba4f9936a243dab7a518f1ad77584f6ca4caf7f706769,2024-12-12T20:15:22.017000
|
||||
CVE-2024-55889,1,1,132bd1d75843de5e31132e3617c216a334dc8714c65fe11ef120abd1a81b3240,2024-12-13T14:15:22.653000
|
||||
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
|
||||
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
|
||||
CVE-2024-55918,0,0,d8f1370c78ed9a23164eb37b56443cde3ae9864a1ae08343002bd78fcd13a0dc,2024-12-13T07:15:04.827000
|
||||
@ -271346,7 +271352,7 @@ CVE-2024-7250,0,0,77e3676540095583ee54282377d752e59ba470ce7bc9b0c39a793c956014b2
|
||||
CVE-2024-7251,0,0,4f5492038d53a952aae52e1170da3aea84a43d615d1a1fa4149c5ff70cda5bab,2024-11-21T09:51:08.880000
|
||||
CVE-2024-7252,0,0,24d74b26883cf8151f149bfa7deed5d8a63133a6167165e30cc462ead5fd458a,2024-11-21T09:51:09.003000
|
||||
CVE-2024-7253,0,0,7f91c8e02eeb95aaf9a2f323d5aa05bf761bf6c98ff5a15ee0990bf815671c2a,2024-11-26T20:00:48.783000
|
||||
CVE-2024-7254,0,0,5fefb80366227f1896d27eae0780d5833354d64da929bb52ac2349c9b44eb0b2,2024-09-20T12:30:17.483000
|
||||
CVE-2024-7254,0,1,e89eb3a1f139a1b7724c82049128b9101144d09303e1246e0c00754c9c13b027,2024-12-13T14:15:22.800000
|
||||
CVE-2024-7255,0,0,ba60a86cf283a25cbf44d00829e275d7a0bb026ed551fecdfd5dd1e8d3ece898,2024-10-29T20:35:42.023000
|
||||
CVE-2024-7256,0,0,2517a96b7ae4b71627015ee255a3644c2eb8e37bcd815628e7e362c17316dd77,2024-08-03T18:35:04.003000
|
||||
CVE-2024-7257,0,0,e824d36e9091bce947d766daa6e3bb42f606d3c1749eb85a01f040d08b0b6e1f,2024-08-05T12:41:45.957000
|
||||
@ -272051,11 +272057,11 @@ CVE-2024-8071,0,0,1b6c30fcc8f3b02815d9d31b4217b1c8dfc6e30d08dbca24f3c782c63dd0ef
|
||||
CVE-2024-8072,0,0,caaca5156357bdc00de7e59b85243acacb1769673f4ce18202fa8183e1f0d924,2024-11-25T13:15:08.297000
|
||||
CVE-2024-8073,0,0,26c37c8721420aa6f969a23f70a2f91e360f21881a617908cb59877bea60195f,2024-09-12T20:58:56.413000
|
||||
CVE-2024-8074,0,0,b6a465cc87faf1ee8ee15393f94877f7886eac99c7a6e31ba7533b1b21937426,2024-11-21T17:15:26.177000
|
||||
CVE-2024-8075,0,0,88cb446b1f85726a163ada1581d71e96c80c1b6d0fa66254ecff3a34b743f4a9,2024-08-29T21:57:51.377000
|
||||
CVE-2024-8076,0,0,2db9549f71c74e3337642364d1f2ce1db90733999f181ddb2a64d2fc0cce7783,2024-08-29T21:58:31.820000
|
||||
CVE-2024-8077,0,0,c765fb9aa9bfd2e544eefe5e5e39b69b614998806aaa7beb7f73bfc0e8258dbc,2024-08-29T21:59:08.997000
|
||||
CVE-2024-8078,0,0,e2885f553c6bb5f5387356692d717e91ef6db5bb375cc9b58566ee0f94b8b7d2,2024-08-29T22:00:43.353000
|
||||
CVE-2024-8079,0,0,d7e6ce19be5f3dc8655d69a38ff378bad2be17483b5327a7aff10907078239c3,2024-08-29T22:00:11.680000
|
||||
CVE-2024-8075,0,1,17de460a8110e22992c203921ef37b923d7c5e9bc420eee6f199d65db527ca48,2024-12-13T14:46:14.797000
|
||||
CVE-2024-8076,0,1,a6bf38aac8f852421f9cea017728a9c018ded224d4deacf9285020d03a785ffa,2024-12-13T14:46:25.210000
|
||||
CVE-2024-8077,0,1,fbd4e8b874f46021a272a308ca812caec4d574f8a545ca0685084ffdb3715af0,2024-12-13T14:50:34.863000
|
||||
CVE-2024-8078,0,1,584c7b2da5499d95f07015551cd8b8ff916024584f88267967eead662414bca7,2024-12-13T14:51:05.847000
|
||||
CVE-2024-8079,0,1,31fd6c70dfa70f62cda25127a4d664899a0e883a73c88c50fb3da937236ecf3e,2024-12-13T14:53:21.583000
|
||||
CVE-2024-8080,0,0,524bf0aa769efdb044c6d31288b2184b254115e056cc5b4fe70d8c83efcccb20,2024-10-17T14:04:45.617000
|
||||
CVE-2024-8081,0,0,2fa817f4bf3ef5e8499742a4134dddcfbf70ebf15d5840c2e374b4c1856232ce,2024-08-27T16:12:33.580000
|
||||
CVE-2024-8083,0,0,97e8f17c39dce31b538aaade2f678ad821d51aa65b538589a251f8a131768f9e,2024-08-27T16:11:35.730000
|
||||
@ -273265,7 +273271,7 @@ CVE-2024-9600,0,0,ea15b50099d09f31b8281c72f2e9f7d888450824868eb6eb5785430b8539a9
|
||||
CVE-2024-9602,0,0,9d8dd86d0cc225ffb6741a84ee0790d75b0a3de971742428da103b505a33eb9b,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9603,0,0,6f73634986e4f0954072f40ec952c1e4c294de097bee976da4c1af4a65275169,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9607,0,0,46ba6ae19aabe43b4e394b9eaf2c4143d8dae3b6ca887a4181734917d5564e5f,2024-11-05T17:40:57.777000
|
||||
CVE-2024-9608,1,1,b20534ec874707d92a2ff9fb1aa6d12ff20ee5b2f043fdd6617b961662fce412,2024-12-13T12:15:20.080000
|
||||
CVE-2024-9608,0,0,b20534ec874707d92a2ff9fb1aa6d12ff20ee5b2f043fdd6617b961662fce412,2024-12-13T12:15:20.080000
|
||||
CVE-2024-9609,0,0,a32ad4ba0330c8bd46a334ed0a6f34b381196d6ee0adb5a1527caca9a51b5222,2024-11-19T21:28:42.670000
|
||||
CVE-2024-9610,0,0,f327439241391b51adbb56ced5a29061a4e9cbef39684c65a214212a54ae604b,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9611,0,0,049688b12d23536b7521af43a85c6bc56a995bcf550dd4b062c24ab61d06803f,2024-10-15T12:58:51.050000
|
||||
@ -273313,7 +273319,7 @@ CVE-2024-9675,0,0,042e11d1d5f68028611f5290da802c68ab7c3807ddde6d9febec582272624f
|
||||
CVE-2024-9676,0,0,f274ca1f33ebade4ed690e9a2c29367dd55071e678cc70655f57d1ab479c60a8,2024-11-26T09:15:06.820000
|
||||
CVE-2024-9677,0,0,cfbe7ebac9e19e0614aa19077e218b18010f160d6643d0eae35a63f64f2da91a,2024-12-05T22:11:15.217000
|
||||
CVE-2024-9680,0,0,b270ebb58405bce82b545a9823e949fa4790116b7a4834e574606834227d9216,2024-11-26T19:53:56.537000
|
||||
CVE-2024-9681,0,0,36db1cf44aa2f440dfaa6dc17a80f5bfc266b70302053e54d05bfc419207e8f8,2024-11-25T19:52:56.417000
|
||||
CVE-2024-9681,0,1,2ae771a08ca769f211d8d385c4480401b1a952b5ea57b2588c5b5f84fbd4b358,2024-12-13T14:15:22.953000
|
||||
CVE-2024-9682,0,0,6d690df5e8c227b34e224cce5647fb45a6c1d80990a723f81ebd7b281b388f5b,2024-11-19T15:47:07.517000
|
||||
CVE-2024-9683,0,0,e0cd26df0500a0cc9db7c9689d39531f945e069407d58ce00900c54b93d56ed1,2024-12-03T16:14:52.690000
|
||||
CVE-2024-9685,0,0,cc3d7e9b75de00d1df5b699f1225e3406f130ded3472b38175cabcbf3eacf7fe,2024-10-15T14:30:00.483000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user