Auto-Update: 2024-12-13T15:00:34.276447+00:00

This commit is contained in:
cad-safe-bot 2024-12-13 15:03:57 +00:00
parent efa9fcace5
commit d5b0f2797f
28 changed files with 605 additions and 98 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-9217",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-05-24T05:29:00.223",
"lastModified": "2024-11-21T03:35:36.520",
"lastModified": "2024-12-13T14:15:18.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -162,6 +162,10 @@
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0003/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-12122",
"sourceIdentifier": "cve-request@iojs.org",
"published": "2018-11-28T17:29:00.370",
"lastModified": "2024-11-21T03:44:38.317",
"lastModified": "2024-12-13T14:15:19.043",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -221,6 +221,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0009/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-12123",
"sourceIdentifier": "cve-request@iojs.org",
"published": "2018-11-28T17:29:00.417",
"lastModified": "2024-11-21T03:44:38.440",
"lastModified": "2024-12-13T14:15:19.250",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -170,6 +170,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0008/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-7738",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-07T02:29:03.533",
"lastModified": "2024-11-21T04:12:38.423",
"lastModified": "2024-12-13T14:15:19.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -170,6 +170,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0002/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://usn.ubuntu.com/4512-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29400",
"sourceIdentifier": "security@golang.org",
"published": "2023-05-11T16:15:09.850",
"lastModified": "2024-11-21T07:56:59.223",
"lastModified": "2024-12-13T14:15:19.623",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -132,6 +132,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0005/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29402",
"sourceIdentifier": "security@golang.org",
"published": "2023-06-08T21:15:16.770",
"lastModified": "2024-11-21T07:56:59.447",
"lastModified": "2024-12-13T14:15:20.403",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -175,6 +175,10 @@
{
"url": "https://security.gentoo.org/glsa/202311-09",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0004/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43804",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-04T17:15:10.163",
"lastModified": "2024-11-21T08:24:49.197",
"lastModified": "2024-12-13T14:15:20.570",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -72,7 +72,7 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -255,6 +255,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0007/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2023-43804-urllib3-vulnerability-3",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-11691",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-26T14:15:18.633",
"lastModified": "2024-11-27T16:15:12.330",
"lastModified": "2024-12-13T14:15:20.863",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. \n*This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
"value": "Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. \n*This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18."
},
{
"lang": "es",
@ -67,6 +67,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-70/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-11694",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-26T14:15:18.943",
"lastModified": "2024-11-27T17:15:09.703",
"lastModified": "2024-12-13T14:15:21.053",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
"value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18."
},
{
"lang": "es",
@ -75,6 +75,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-70/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11986",
"sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"published": "2024-12-13T14:15:21.207",
"lastModified": "2024-12-13T14:15:21.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://crushftp.com/crush11wiki/Wiki.jsp?page=Update",
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-22461",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-13T14:15:21.383",
"lastModified": "2024-12-13T14:15:21.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains an OS Command injection vulnerability. A low privileged remote attacker could potentially exploit this vulnerability by running any command as root, leading to gaining of root-level access and compromise of complete system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29131",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-21T09:15:07.807",
"lastModified": "2024-11-21T09:07:37.410",
"lastModified": "2024-12-13T14:15:21.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -83,6 +83,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YD4AFTIIQW662LUAQRMWS6BBKYSZG3YS/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29404",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T17:15:10.087",
"lastModified": "2024-12-03T17:15:10.087",
"lastModified": "2024-12-13T14:15:21.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " Un problema en Razer Synapse 3 v.3.9.131.20813 y Synapse 3 App v.20240213 permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de export de la funci\u00f3n Chroma Effects en el componente Profiles ."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/mansk1es/CVE-2024-29404_Razer",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38488",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-13T14:15:21.993",
"lastModified": "2024-12-13T14:15:21.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains a vulnerability. An improper Restriction of Excessive Authentication vulnerability where a Network attacker could potentially exploit this vulnerability, leading to a brute force attack or a dictionary attack against the RecoverPoint login form and a complete system compromise.\nThis allows attackers to brute-force the password of valid users in an automated manner."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47241",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-10-18T17:15:12.880",
"lastModified": "2024-10-21T17:10:22.857",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-13T14:37:10.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:5.24.00.14:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8CE3A7-E200-4F68-88D2-878FA0E5EC68"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000237211/dsa-2024-407-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-48007",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-13T14:15:22.147",
"lastModified": "2024-12-13T14:15:22.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains use of hard-coded credentials vulnerability. A Remote unauthenticated attacker could potentially exploit this vulnerability by gaining access to the source code, easily retrieving these secrets and reusing them to access the system leading to gaining access to unauthorized data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48008",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-13T14:15:22.273",
"lastModified": "2024-12-13T14:15:22.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell RecoverPoint for Virtual Machines 6.0.x contains a OS Command Injection vulnerability. An Low privileged remote attacker could potentially exploit this vulnerability leading to information disclosure ,allowing of unintended actions like reading files that may contain sensitive information"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-11"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000259765/dsa-2024-429-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-third-party-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53143",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-07T07:15:03.780",
"lastModified": "2024-12-07T07:15:03.780",
"vulnStatus": "Received",
"lastModified": "2024-12-13T14:15:22.443",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfsnotify: Fix ordering of iput() and watched_objects decrement\n\nEnsure the superblock is kept alive until we're done with iput().\nHolding a reference to an inode is not allowed unless we ensure the\nsuperblock stays alive, which fsnotify does by keeping the\nwatched_objects count elevated, so iput() must happen before the\nwatched_objects decrement.\nThis can lead to a UAF of something like sb->s_fs_info in tmpfs, but the\nUAF is hard to hit because race orderings that oops are more likely, thanks\nto the CHECK_DATA_CORRUPTION() block in generic_shutdown_super().\n\nAlso, ensure that fsnotify_put_sb_watched_objects() doesn't call\nfsnotify_sb_watched_objects() on a superblock that may have already been\nfreed, which would cause a UAF read of sb->s_fsnotify_info."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fsnotify: Arreglar el orden de iput() y el decremento de watching_objects Asegurarse de que el superbloque se mantenga activo hasta que terminemos con iput(). No se permite mantener una referencia a un inodo a menos que aseguremos que el superbloque se mantenga activo, lo que fsnotify hace manteniendo elevado el conteo de watching_objects, por lo que iput() debe ocurrir antes del decremento de watching_objects. Esto puede llevar a un UAF de algo como sb-&gt;s_fs_info en tmpfs, pero el UAF es dif\u00edcil de alcanzar porque los \u00f3rdenes de carrera que oops son m\u00e1s probables, gracias al bloque CHECK_DATA_CORRUPTION() en generic_shutdown_super(). Adem\u00e1s, aseg\u00farese de que fsnotify_put_sb_watched_objects() no llame a fsnotify_sb_watched_objects() en un superbloque que ya puede haber sido liberado, lo que causar\u00eda una lectura UAF de sb-&gt;s_fsnotify_info."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/21d1b618b6b9da46c5116c640ac4b1cc8d40d63a",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-55889",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-13T14:15:22.653",
"lastModified": "2024-12-13T14:15:22.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "phpMyFAQ is an open source FAQ web application. Prior to version 3.2.10, a vulnerability exists in the FAQ Record component where a privileged attacker can trigger a file download on a victim's machine upon page visit by embedding it in an <iframe> element without user interaction or explicit consent. Version 3.2.10 fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
}
],
"references": [
{
"url": "https://github.com/thorsten/phpMyFAQ/commit/fa0f7368dc3288eedb1915def64ef8fb270f711d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-m3r7-8gw7-qwvc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7254",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-09-19T01:15:10.963",
"lastModified": "2024-09-20T12:30:17.483",
"lastModified": "2024-12-13T14:15:22.800",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -77,6 +77,10 @@
{
"url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa",
"source": "cve-coordination@google.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0010/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T20:15:10.210",
"lastModified": "2024-08-29T21:57:51.377",
"lastModified": "2024-12-13T14:46:14.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -171,8 +171,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T20:15:11.017",
"lastModified": "2024-08-29T21:58:31.820",
"lastModified": "2024-12-13T14:46:25.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -131,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -161,8 +161,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T20:15:11.690",
"lastModified": "2024-08-29T21:59:08.997",
"lastModified": "2024-12-13T14:50:34.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -131,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -161,8 +161,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T21:15:17.603",
"lastModified": "2024-08-29T22:00:43.353",
"lastModified": "2024-12-13T14:51:05.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -131,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -161,8 +161,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-08-22T21:15:17.910",
"lastModified": "2024-08-29T22:00:11.680",
"lastModified": "2024-12-13T14:53:21.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -131,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -161,8 +161,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ac1200_t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79ACFF1F-D852-4C5C-80B4-139890219221"
"criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9681",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-11-06T08:15:03.740",
"lastModified": "2024-11-25T19:52:56.417",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-13T14:15:22.953",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -124,6 +124,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0006/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-13T13:00:14.297263+00:00
2024-12-13T15:00:34.276447+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-13T12:15:20.080000+00:00
2024-12-13T14:53:21.583000+00:00
```
### Last Data Feed Release
@ -33,34 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
273584
273590
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `6`
- [CVE-2021-32007](CVE-2021/CVE-2021-320xx/CVE-2021-32007.json) (`2024-12-13T11:15:06.060`)
- [CVE-2024-11827](CVE-2024/CVE-2024-118xx/CVE-2024-11827.json) (`2024-12-13T12:15:19.050`)
- [CVE-2024-21576](CVE-2024/CVE-2024-215xx/CVE-2024-21576.json) (`2024-12-13T12:15:19.753`)
- [CVE-2024-21577](CVE-2024/CVE-2024-215xx/CVE-2024-21577.json) (`2024-12-13T12:15:19.910`)
- [CVE-2024-52058](CVE-2024/CVE-2024-520xx/CVE-2024-52058.json) (`2024-12-13T11:15:07.900`)
- [CVE-2024-52059](CVE-2024/CVE-2024-520xx/CVE-2024-52059.json) (`2024-12-13T11:15:08.080`)
- [CVE-2024-52060](CVE-2024/CVE-2024-520xx/CVE-2024-52060.json) (`2024-12-13T11:15:08.250`)
- [CVE-2024-52061](CVE-2024/CVE-2024-520xx/CVE-2024-52061.json) (`2024-12-13T11:15:08.457`)
- [CVE-2024-52062](CVE-2024/CVE-2024-520xx/CVE-2024-52062.json) (`2024-12-13T11:15:08.650`)
- [CVE-2024-52063](CVE-2024/CVE-2024-520xx/CVE-2024-52063.json) (`2024-12-13T11:15:08.810`)
- [CVE-2024-52064](CVE-2024/CVE-2024-520xx/CVE-2024-52064.json) (`2024-12-13T11:15:08.963`)
- [CVE-2024-52065](CVE-2024/CVE-2024-520xx/CVE-2024-52065.json) (`2024-12-13T11:15:09.153`)
- [CVE-2024-52066](CVE-2024/CVE-2024-520xx/CVE-2024-52066.json) (`2024-12-13T11:15:09.330`)
- [CVE-2024-9608](CVE-2024/CVE-2024-96xx/CVE-2024-9608.json) (`2024-12-13T12:15:20.080`)
- [CVE-2024-11986](CVE-2024/CVE-2024-119xx/CVE-2024-11986.json) (`2024-12-13T14:15:21.207`)
- [CVE-2024-22461](CVE-2024/CVE-2024-224xx/CVE-2024-22461.json) (`2024-12-13T14:15:21.383`)
- [CVE-2024-38488](CVE-2024/CVE-2024-384xx/CVE-2024-38488.json) (`2024-12-13T14:15:21.993`)
- [CVE-2024-48007](CVE-2024/CVE-2024-480xx/CVE-2024-48007.json) (`2024-12-13T14:15:22.147`)
- [CVE-2024-48008](CVE-2024/CVE-2024-480xx/CVE-2024-48008.json) (`2024-12-13T14:15:22.273`)
- [CVE-2024-55889](CVE-2024/CVE-2024-558xx/CVE-2024-55889.json) (`2024-12-13T14:15:22.653`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `20`
- [CVE-2024-21726](CVE-2024/CVE-2024-217xx/CVE-2024-21726.json) (`2024-12-13T11:15:07.320`)
- [CVE-2017-9217](CVE-2017/CVE-2017-92xx/CVE-2017-9217.json) (`2024-12-13T14:15:18.280`)
- [CVE-2018-12122](CVE-2018/CVE-2018-121xx/CVE-2018-12122.json) (`2024-12-13T14:15:19.043`)
- [CVE-2018-12123](CVE-2018/CVE-2018-121xx/CVE-2018-12123.json) (`2024-12-13T14:15:19.250`)
- [CVE-2018-7738](CVE-2018/CVE-2018-77xx/CVE-2018-7738.json) (`2024-12-13T14:15:19.380`)
- [CVE-2023-29400](CVE-2023/CVE-2023-294xx/CVE-2023-29400.json) (`2024-12-13T14:15:19.623`)
- [CVE-2023-29402](CVE-2023/CVE-2023-294xx/CVE-2023-29402.json) (`2024-12-13T14:15:20.403`)
- [CVE-2023-43804](CVE-2023/CVE-2023-438xx/CVE-2023-43804.json) (`2024-12-13T14:15:20.570`)
- [CVE-2024-11691](CVE-2024/CVE-2024-116xx/CVE-2024-11691.json) (`2024-12-13T14:15:20.863`)
- [CVE-2024-11694](CVE-2024/CVE-2024-116xx/CVE-2024-11694.json) (`2024-12-13T14:15:21.053`)
- [CVE-2024-29131](CVE-2024/CVE-2024-291xx/CVE-2024-29131.json) (`2024-12-13T14:15:21.547`)
- [CVE-2024-29404](CVE-2024/CVE-2024-294xx/CVE-2024-29404.json) (`2024-12-13T14:15:21.740`)
- [CVE-2024-47241](CVE-2024/CVE-2024-472xx/CVE-2024-47241.json) (`2024-12-13T14:37:10.467`)
- [CVE-2024-53143](CVE-2024/CVE-2024-531xx/CVE-2024-53143.json) (`2024-12-13T14:15:22.443`)
- [CVE-2024-7254](CVE-2024/CVE-2024-72xx/CVE-2024-7254.json) (`2024-12-13T14:15:22.800`)
- [CVE-2024-8075](CVE-2024/CVE-2024-80xx/CVE-2024-8075.json) (`2024-12-13T14:46:14.797`)
- [CVE-2024-8076](CVE-2024/CVE-2024-80xx/CVE-2024-8076.json) (`2024-12-13T14:46:25.210`)
- [CVE-2024-8077](CVE-2024/CVE-2024-80xx/CVE-2024-8077.json) (`2024-12-13T14:50:34.863`)
- [CVE-2024-8078](CVE-2024/CVE-2024-80xx/CVE-2024-8078.json) (`2024-12-13T14:51:05.847`)
- [CVE-2024-8079](CVE-2024/CVE-2024-80xx/CVE-2024-8079.json) (`2024-12-13T14:53:21.583`)
- [CVE-2024-9681](CVE-2024/CVE-2024-96xx/CVE-2024-9681.json) (`2024-12-13T14:15:22.953`)
## Download and Usage

View File

@ -109075,7 +109075,7 @@ CVE-2017-9211,0,0,8ac04e5e672e1add8a6a9531c6cc4a3ffd3016b1b8c39bdf3944c6bba2def3
CVE-2017-9212,0,0,dd3cceb2312f8173c083ce896c70444bade103413ae0e502131b7d4e333006f3,2024-11-21T03:35:36
CVE-2017-9214,0,0,5c4f3452093820c84562515abe973b0111120ed01c498bea20e75c937683095a,2024-11-21T03:35:36.157000
CVE-2017-9216,0,0,eb9f4f37a348f2e37f9ffc259d90d97c7120e3f92977e5792da9c9e30b285fc8,2024-11-21T03:35:36.353000
CVE-2017-9217,0,0,09620bdb8eb46b8fef663667a82a27cccc0fb9d8ccbe81c2507883c500dec531,2024-11-21T03:35:36.520000
CVE-2017-9217,0,1,60a77859b56bdc7f320b484dd90160644d39be13af36427490b3b9c0551f3bcc,2024-12-13T14:15:18.280000
CVE-2017-9218,0,0,bb8c6154d5f4c3c6473e0b17c1b164927b40b65b1ef1788018c326c6cc855729,2024-11-21T03:35:36.683000
CVE-2017-9219,0,0,a8919b7c0192e610a06f977f38e4dbebf305b0a6065df8242a2e0c883d409d4b,2024-11-21T03:35:36.843000
CVE-2017-9220,0,0,c88f21030475e231efaf1a1b6928d9cf95db16803e75589315f67781d526e268,2024-11-21T03:35:37.013000
@ -113145,8 +113145,8 @@ CVE-2018-12116,0,0,14b8604db2dcecf240c6064b334de42d1e6e48ac5efde2b964ef36202e0ac
CVE-2018-1212,0,0,c2005bdaf1f0043e5bd6cc157fdb8c9b94ff99498aeea3f0a39918e278fbc5f4,2024-11-21T03:59:24.007000
CVE-2018-12120,0,0,5005c1a5ad0427dafca9ff38ab2612a8dd5a245855697ebc9cd45cb7dfb192e2,2024-11-21T03:44:38.050000
CVE-2018-12121,0,0,e940d8f61cd0bc34866a74d18300d4d9f30e89625fb45d1587b1bd0803cee824,2024-11-21T03:44:38.177000
CVE-2018-12122,0,0,414272a42a95f581ca152e2dd24b1b58e27f89a420d584b20f906675c8a34f4b,2024-11-21T03:44:38.317000
CVE-2018-12123,0,0,a56137a14623e8029005ef7f18a447203c14d6be68702433d5cb67dc308fce98,2024-11-21T03:44:38.440000
CVE-2018-12122,0,1,b8f9b6ce1ad84a787b195d15e50c17580151ae7354f6ef0d74a280b85ca5a34d,2024-12-13T14:15:19.043000
CVE-2018-12123,0,1,0d2c5185ee17eac3b17233c70e3fc4506fcf37a36d5e56d74261221a7020c610,2024-12-13T14:15:19.250000
CVE-2018-12125,0,0,f99608b02f3b51d6b7348f2a325bea878fdd51cdd84df5b43567cffb0ba60a6d,2023-11-07T02:52:01.980000
CVE-2018-12126,0,0,ce8c44ae920546b909d89d93ec46884ebd8343c4cadc3a6519bbb436b065e55a,2024-11-21T03:44:38.583000
CVE-2018-12127,0,0,2aa8b49edb4fab8d15788600eaae7aa292a337b7391dc6f2931e8681dcd62e93,2024-11-21T03:44:38.757000
@ -125673,7 +125673,7 @@ CVE-2018-7734,0,0,0b0e2d17705ea67a39f723794ad3f7fb844d038be5ff46a4de610a4d839779
CVE-2018-7735,0,0,0639d6992b32040379770cf66a510956a6c7026b8be770922507cb9243a0188f,2024-11-21T04:12:37.983000
CVE-2018-7736,0,0,4ff3a089f0e1d332b1e6223efd8599a187091193fd1e19da8c7c5f2638a9170b,2024-11-21T04:12:38.120000
CVE-2018-7737,0,0,739e37e446055d9c27dbd564dc05ea3cbe43c37a09b50b92a0ba39c26959423d,2024-11-21T04:12:38.280000
CVE-2018-7738,0,0,60297463aeb306da47c2ab2aedf2e189ab36ac51f0f993ce48cb12fcc263bf67,2024-11-21T04:12:38.423000
CVE-2018-7738,0,1,d7c228fb8ab034bad803f5149dd183d4de903be0e71c990e6427e1edb33eee01,2024-12-13T14:15:19.380000
CVE-2018-7739,0,0,8f38c61b93fd10c0ee55726cde2c7f192f2c8bcb5bf05c7cc5d262050ee80b36,2024-11-21T04:12:38.567000
CVE-2018-7740,0,0,0cc38c4ecdcf28b860d6180fb378990bdf7ed6760407a71ce6d4a3d277aa8a67,2024-11-21T04:12:38.703000
CVE-2018-7741,0,0,ac292fac867bbd857fc86dd00404d5497fc78f3699b1c5c430dc7ace84acd65c,2024-11-21T04:12:38.850000
@ -176138,7 +176138,7 @@ CVE-2021-32003,0,0,0ab0c12e80b6a55e89863cb2bded4fb5faaf86274d40a9063f46cc83d3717
CVE-2021-32004,0,0,c711be156e6bab6b83bbf28ba05238de081ebf4afdcf90f1fa1cb16c25906106,2024-11-21T06:06:41.753000
CVE-2021-32005,0,0,98c8fbec304b3bcbf9d61ae8e342f36131609e694f7978a1b72e4f2daa374fa4,2024-11-21T06:06:41.883000
CVE-2021-32006,0,0,a204caa10486cbbefb41479b5cf43d89ba16b11c29590e9619f668e7bac849ee,2024-11-21T06:06:42.013000
CVE-2021-32007,1,1,00e8c02493a988831af7568bb186f220478524a790291108dc261665ce61c712,2024-12-13T11:15:06.060000
CVE-2021-32007,0,0,00e8c02493a988831af7568bb186f220478524a790291108dc261665ce61c712,2024-12-13T11:15:06.060000
CVE-2021-32008,0,0,c24c0199bba704de19a4ec6ec29630e12085973618b29db0189bff01655deb93,2024-11-21T06:06:42.143000
CVE-2021-32009,0,0,f686c9648f02955225833b4606384eca97ead135b90aa0e4d82492e0320a32be,2024-11-21T06:06:42.270000
CVE-2021-32010,0,0,e240e56c82ab91b528fee16a10c9fd11cfc0790379fc80db4cebb2fc1e02b258,2024-11-21T06:06:42.393000
@ -222837,9 +222837,9 @@ CVE-2023-29388,0,0,ef75a21f904be7a7d0909149ff2271d2ae1b1d42ab55983af2f04f6648c02
CVE-2023-29389,0,0,c0a5bc2996fa100a5d1d4dbba184a794dfb7e1a165cf887f98ddec59042a381f,2024-11-21T07:56:59.087000
CVE-2023-2939,0,0,5097b0f3fd177e801415b54d7716f4683fb54c1157f3dcb9725b8d5f368e5323,2024-11-21T07:59:36.560000
CVE-2023-2940,0,0,7ad5423ee87e68f755e2cd74221edf5f886bdd506499833f9705f0fa2df479b6,2024-11-21T07:59:36.687000
CVE-2023-29400,0,0,7b75e37fd3c8289045add4b27ccfa035e7ca67d36bc89cc7729705e0afbce1aa,2024-11-21T07:56:59.223000
CVE-2023-29400,0,1,dea608444d68d5c5d1e530af9d1a8a44b7a086015c01eba61bbfe530a925c3f9,2024-12-13T14:15:19.623000
CVE-2023-29401,0,0,1bc1f989a3b5d0779284da4092877f45f8ace05de4aefc33b96869475b2d0ea1,2024-11-21T07:56:59.340000
CVE-2023-29402,0,0,bff3355604ec4f73f74ba343b16d167c0c0ebe9191f942897a482f68c866ee7b,2024-11-21T07:56:59.447000
CVE-2023-29402,0,1,52a4a4fe8782efb78ce19d89a5b8e0a7a11a18e1c5fb2cce7d061d2f2d455d10,2024-12-13T14:15:20.403000
CVE-2023-29403,0,0,158e83fda684349d3d4dba1f5c90e7163ce01e3c105b3f694f323cd5d43481d5,2024-11-21T07:56:59.583000
CVE-2023-29404,0,0,86e4452282f87d5e0aafc218d73148e229bbb1f43598b802704017fcb6ce88da,2024-11-21T07:56:59.690000
CVE-2023-29405,0,0,74cd2ca6da030ee467cc89d6c787160ab7368d3095aa6d48bc44dd9371b1a96c,2024-12-06T14:15:19.380000
@ -233613,7 +233613,7 @@ CVE-2023-43800,0,0,a0db61c9da5a639fcd4297c3b18836c82a9507823dda2e5ee03d9a1dff2f1
CVE-2023-43801,0,0,407ccc53cf3984bd36e85cad45c81c279907778e02ba5e41e5815b913eeb3b37,2024-11-21T08:24:48.787000
CVE-2023-43802,0,0,de3a2fce3c68a65ae7c4e106a097b9c6621a1121d3392aea302bc0dada0024a8,2024-11-21T08:24:48.933000
CVE-2023-43803,0,0,0fb2789d6faacc25fe24fdb596a959c39c4fad22a3464a8251a9e641b7361d56,2024-11-21T08:24:49.060000
CVE-2023-43804,0,0,8ec1ca1c6c3da8b9fc27a04b970e5d3e6647a0d4d3d56ff35550e84a5a7d0463,2024-11-21T08:24:49.197000
CVE-2023-43804,0,1,a2f6099c2fa635f10e2407763d0a4ce0bfbd1158e2010271cb5f0a58909064e8,2024-12-13T14:15:20.570000
CVE-2023-43805,0,0,38773a70c1b7284588fb2bfa01590e7b788c2e5568536f3162bd2c636ea3678b,2024-11-21T08:24:49.337000
CVE-2023-43809,0,0,29ad5c1da76af84968d3e35a7ea6494fc7e914b1f0784ac7c7a7f5a4604c4e5f,2024-11-21T08:24:49.470000
CVE-2023-4381,0,0,997a46aaa323f217b2ca6a6b7dee38188e10a1704607d7b71d83552baee8b904,2024-11-21T08:34:58.403000
@ -244212,10 +244212,10 @@ CVE-2024-11685,0,0,ac2887e3bedadf93f8263266da035f2c90903ee2e66a4074483ee4f2d7f8e
CVE-2024-11687,0,0,84514bb98732ffc9ca2906ea8e96ab481d88f84c1648da7b939544b1044de35c,2024-12-06T09:15:07.303000
CVE-2024-11689,0,0,7b88a11d5320a3330d5b2af56fe9594f7242808622d8f9ea4ecfe750acddd8a8,2024-12-12T04:15:06.657000
CVE-2024-1169,0,0,7d005e1e32dcb786dc145e0dc1f4f8a0f524691319a7051d5e1a67ddcb23a460,2024-11-21T08:49:57.153000
CVE-2024-11691,0,0,5eea478dab7fa5b6410e52ffca3e42171935ae1213a3687e7fe0b5c6a5e01e3a,2024-11-27T16:15:12.330000
CVE-2024-11691,0,1,2d246dea5b0a9088e8294d6349de8afbdc87384baaa314b7a96881dd054b78be,2024-12-13T14:15:20.863000
CVE-2024-11692,0,0,9269d1047de5ccf3bbe848f7300e55c4147a58cfd139cb6b7f723bc7b81e3d4c,2024-11-27T16:15:12.530000
CVE-2024-11693,0,0,e0fdce984dc3054eba0934c78141d5d7d4f14af64b3544f5156b2322b39ad19d,2024-11-27T16:15:12.753000
CVE-2024-11694,0,0,c7112925916f2e6a68139b991bf9c787957596077f531ec2939d8f920bb7d43b,2024-11-27T17:15:09.703000
CVE-2024-11694,0,1,d182d77e778a4dff771c63a774757e85b99c1670180934bb698bfc9a48579644,2024-12-13T14:15:21.053000
CVE-2024-11695,0,0,35b54f717d0be96208c34eb47c6fef69d2a93cd17f38ac12074dc88482ecc415,2024-11-27T17:15:09.867000
CVE-2024-11696,0,0,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000
CVE-2024-11697,0,0,031d7df0dfb1ff2b19cbd36a900d70b7e44f6b02ba77063a3d6968aa272edc04,2024-11-27T16:15:12.927000
@ -244302,7 +244302,7 @@ CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719c
CVE-2024-1182,0,0,3f29301d892b117e83ef161f22ec91ec635f3f594205a460782ee4e3d4d8572d,2024-11-21T08:49:58.813000
CVE-2024-11820,0,0,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000
CVE-2024-11823,0,0,39aa0fbc102b8a9648f017c9098019c8c94234f421f38dd89f51eddc70f54f40,2024-12-06T09:15:07.463000
CVE-2024-11827,1,1,80d64f76d513488d35b0b3043c1b9224eab483c6276ed14747481e2a5f979519,2024-12-13T12:15:19.050000
CVE-2024-11827,0,0,80d64f76d513488d35b0b3043c1b9224eab483c6276ed14747481e2a5f979519,2024-12-13T12:15:19.050000
CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc503,2024-12-12T21:07:04.270000
CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000
CVE-2024-11832,0,0,aadf62fc4eeada44adff600b225c42fa09a9b0f6911729915b42277f1c29059c,2024-12-13T09:15:06.113000
@ -244387,6 +244387,7 @@ CVE-2024-11981,0,0,4e8c7d73de59078b6dc7a30279d02d329d5e4f81501d91493f618fea96f72
CVE-2024-11982,0,0,fdbe1466c75dff41c18009236254b70f07e6dcbf8224b3254ed5447f6369f8be,2024-11-29T08:15:04.580000
CVE-2024-11983,0,0,b28164039b0dc59ec068d9e4704804a0da409a26a86a99d005cfe1af9f1df7bd,2024-11-29T08:15:04.733000
CVE-2024-11985,0,0,347bd715be95eb6539997f812c032a6ace7cec9111ea8a772c8788473da7f21d,2024-12-04T02:15:04.237000
CVE-2024-11986,1,1,970f231a615033e0c3e6ecf36f2f6bc43951bacb7ef93cc8ad6763a7d7f479fe,2024-12-13T14:15:21.207000
CVE-2024-1199,0,0,60ffbfb4cdc00bf543d03a59b91efea487f9cf6b0b352d45a15655d219ef20c9,2024-11-21T08:50:01.340000
CVE-2024-11990,0,0,d3429cf8c53343ced24272b548e57b9820685f26a76c9d0b20da4abeed376b1f,2024-11-29T13:15:04.170000
CVE-2024-11991,0,0,49f7be0e41f58e2c5612446deb4753a827a3c48c90ab2a9762a91507592309ad,2024-12-09T15:15:12.203000
@ -246697,8 +246698,8 @@ CVE-2024-2156,0,0,dad16cc8b52bdfe940c458388d7cb4591983119fee4b9576e287f5f27d4e6b
CVE-2024-21571,0,0,d37e58d960b59009984c70d286739e560ae0d50ece0a82d653578b73814bd68d,2024-12-06T14:15:19.997000
CVE-2024-21574,0,0,45701805f5188114f1888c23c811ceeb10e4b0f020a4cfb74429c69bdd01fe15,2024-12-12T09:15:06.037000
CVE-2024-21575,0,0,97accf7ff45ffb715215f838147623de678c993003f8042176e982f0f1f05cf8,2024-12-12T15:15:12.733000
CVE-2024-21576,1,1,42157063f6e4ca76e1343c8325c7a2508b01a6ce41e53efbf2a2b11172d442bb,2024-12-13T12:15:19.753000
CVE-2024-21577,1,1,ac8ea4d0bcc3e10821f9050ff758868103ecf195d2be69297b820bfb1b2e21f3,2024-12-13T12:15:19.910000
CVE-2024-21576,0,0,42157063f6e4ca76e1343c8325c7a2508b01a6ce41e53efbf2a2b11172d442bb,2024-12-13T12:15:19.753000
CVE-2024-21577,0,0,ac8ea4d0bcc3e10821f9050ff758868103ecf195d2be69297b820bfb1b2e21f3,2024-12-13T12:15:19.910000
CVE-2024-21583,0,0,c1d075392adda1a92bd116f6568c32f98f3861adb7381b8163ad6f1ba61849c1,2024-11-21T08:54:39.443000
CVE-2024-21584,0,0,b131eec7e1253fa331b7a55309f8a83408121476547446d36e68e2f68de5bf1d,2024-11-21T08:54:39.587000
CVE-2024-21585,0,0,9d0ae936587469574770d0fa4ad5b9b2924c2930649b2050f260c2352ac4f0cd,2024-11-21T08:54:39.697000
@ -246811,7 +246812,7 @@ CVE-2024-21722,0,0,5f530469128a41bfa0dd5b7a458e5346dd38dd76f502f71a2747a4c0d3965
CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
CVE-2024-21724,0,0,71ab50eedb3eaae0cf010b41547c1ab496cb8a61984051a476dd3c8a05ae25c7,2024-11-21T08:54:52.573000
CVE-2024-21725,0,0,102bc48d163faec6cc11fa8ada828cb863fe99c32c41e6fe5250a9d25bfe5aa9,2024-11-21T08:54:52.683000
CVE-2024-21726,0,1,618dce9f8a5b9eb531a5c86b35312ba1a47b09692b7ec96682d06ac2ff481c50,2024-12-13T11:15:07.320000
CVE-2024-21726,0,0,618dce9f8a5b9eb531a5c86b35312ba1a47b09692b7ec96682d06ac2ff481c50,2024-12-13T11:15:07.320000
CVE-2024-21727,0,0,d36a5a952f97379e323c6e545f2e862cb297af7e7a1457e672ca02bec68bd484,2024-11-21T08:54:53.040000
CVE-2024-21728,0,0,2cbae60f817b8c7a7affecac1a8952c66a9f7eeec8d8bf74d3b215cd2045b4e6,2024-12-03T16:15:21.030000
CVE-2024-21729,0,0,ce8a30bafeb6b97535469464c82ba7fd23d6f7caed1d9ff1342347bbafd041de,2024-11-21T08:54:53.400000
@ -247459,6 +247460,7 @@ CVE-2024-22457,0,0,81b7fce75e9a7ae03ddb2828fd3b2f600d30eacf6034c3fc68646e619016b
CVE-2024-22458,0,0,4f0c52c36121edd6824dbd23d583ace3848b53bc5cc6589bba9950d9013728db,2024-12-04T17:19:03.560000
CVE-2024-22459,0,0,a59f3a79899e105a6cc3ac3d292c77dd254a456412e506a47ad8a1495f05a21f,2024-11-21T08:56:19.873000
CVE-2024-22460,0,0,cf9685057b4b3269739ae374acfa00b4da824093a0d95fe8e25340068e29c40d,2024-11-21T08:56:20.010000
CVE-2024-22461,1,1,d85843fb2191e63866af7ade358fadb60b0c4b52ed33bc07bbe7db7ec59a4e07,2024-12-13T14:15:21.383000
CVE-2024-22463,0,0,bc79276d8897735eac5371252a354479af9b0b137998d5b3beba6f3a8bd83642,2024-11-21T08:56:20.147000
CVE-2024-22464,0,0,89df0e10ef44510a8e5904e121c14fc7d7fe04dd8b75af148ba79e6d8aedebac,2024-11-21T08:56:20.280000
CVE-2024-2247,0,0,0ca7d7b7e23609e28e1499a00333ba2939a4606a46ffba5afb79df586f8f7777,2024-11-21T09:09:20.660000
@ -252269,7 +252271,7 @@ CVE-2024-29128,0,0,1fee5bcbd86fe4f86cd9e7c8c9606be3b908374a57b43b2ff18f0f4d640f2
CVE-2024-29129,0,0,739d5267e1c2b9428a1b775a27df9111be59167050bf55f589baea8cc5ec0a64,2024-11-21T09:07:37.160000
CVE-2024-2913,0,0,bdee00fa9056fa8a0ad1417004d7f8c2e104929c730aae671329cfb89a446ed2,2024-11-21T09:10:49.413000
CVE-2024-29130,0,0,78ef57c5071ad31af120491100441316733fa37898d33074aaff5efbf2ed9e6f,2024-11-21T09:07:37.283000
CVE-2024-29131,0,0,63ee92e5d96fcdaffb7492bac5cfefc69d11f8d870c96264771d7dcc9404c9bd,2024-11-21T09:07:37.410000
CVE-2024-29131,0,1,fd59b728390e0bccbfbb2a551bbea3c712b7624adccf1269f21e233d5bf47342,2024-12-13T14:15:21.547000
CVE-2024-29133,0,0,65ab4bafa7d868e3d127ae6fb0b19ae15e43c85e193444814d51e9469d70052e,2024-11-21T09:07:37.603000
CVE-2024-29134,0,0,eb7a7708e9c822b1fe886ad1674960072ad013556df73166dc0971b51032c3cb,2024-11-21T09:07:37.813000
CVE-2024-29135,0,0,921888755133b2498a0c55fc86f73f3a15f968d9f25cb8ccfae65d2c7868f67d,2024-11-21T09:07:37.963000
@ -252431,7 +252433,7 @@ CVE-2024-2940,0,0,d72bf41406e3ec086db8e688bbf1a144517986462dbb4fc5997cfbeec666aa
CVE-2024-29400,0,0,b60e49df326991eb27557ce166dcd99358995137b6ae59e95d7fffbbd0b37c22,2024-11-21T09:08:00.253000
CVE-2024-29401,0,0,32400f36889e84c9eb29bf3619b3dd286820f63d644126600928028e512d6d8d,2024-11-21T09:08:00.460000
CVE-2024-29402,0,0,823440ced7da8e7d0a8b3af16f5a511cd429be38a31d64a72a1bb56686617b9b,2024-11-21T09:08:00.663000
CVE-2024-29404,0,0,0b3cb60d019312e339352d67753cf3241ce4c467520a6dea9c4cee5f5424cb88,2024-12-03T17:15:10.087000
CVE-2024-29404,0,1,8e0768ffa0e6271c10ef5a904f790cba861a6a3d32897c4a1e9132b2e0d48d5c,2024-12-13T14:15:21.740000
CVE-2024-2941,0,0,3e71967aa0c4cbd6af2eecc6a53b210ed6ca835a6b57f301721a578e1f34e48d,2024-11-21T09:10:53.607000
CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000
CVE-2024-29415,0,0,acea85632df988856e0cb711645ad0b8cabdc55234b76a2d3ca04cd225a9d2bb,2024-11-21T09:08:01.093000
@ -259314,6 +259316,7 @@ CVE-2024-38482,0,0,23aec5fa68b4dca4b432634d8e07eea61a04bf96b789d1627bdb6ec4b3c1f
CVE-2024-38483,0,0,178f813aaa538f36bfe36509f188778c0f04be9869ce4e1261bd547bb7ef5b0d,2024-09-18T19:19:24.453000
CVE-2024-38485,0,0,4b711e79286b7ac72bb9f144f17f69b942959934d2a1b08b06406df54cc75f3c,2024-12-09T15:15:14.110000
CVE-2024-38486,0,0,162797fa4fe83e54a958850481312c3e22e21d3355155fa513a21d76bfbc85d6,2024-09-13T20:36:08.597000
CVE-2024-38488,1,1,e30d15f9ef68a2ee72bc6a3c8ced19295ad38339dc158696829406a273217df6,2024-12-13T14:15:21.993000
CVE-2024-38489,0,0,c8809c3a3b8dbca7d8ce1d14c39e410a336e30ff83b4df53210b8bbc08792dcd,2024-08-02T13:54:55.697000
CVE-2024-3849,0,0,c4d82e661506a17f61c6a5ea96e76bd4bfb630a3e4a4f00bce2b38979f6f7063,2024-11-21T09:30:32.223000
CVE-2024-38490,0,0,9c754b6cf973a77e1557eb95e0c2522d4326b6127e309d3544471fcb9a43aea5,2024-08-02T13:54:51.277000
@ -265219,7 +265222,7 @@ CVE-2024-4723,0,0,4af091203745bd84c430d86c99d3eb1a1bbf42d9cd7d7cc786b00931c8615c
CVE-2024-47238,0,0,28feace979e4c73a039ab980206e7b6d2811a5d9004b817d0af89646e91f7c77,2024-12-12T18:15:25.250000
CVE-2024-4724,0,0,cfaff446ce857d4884ca5d5aa97ad803d1f94867ae84d40ef51da0f69b75c51d,2024-11-21T09:43:27.537000
CVE-2024-47240,0,0,92a5dec476dd087df4961145c909b905b6c005bf5a596b1ea14c96642acb150c,2024-10-22T15:28:55.637000
CVE-2024-47241,0,0,33cfb076143b9c1a424810bcce7ac63f0a72953aa6a2926221f310b3ceac01c1,2024-10-21T17:10:22.857000
CVE-2024-47241,0,1,b0d6175169ec2eb1b3cefb7c95304da9c64f618bd3ffbb076b6917f1b435ff01,2024-12-13T14:37:10.467000
CVE-2024-47248,0,0,92bcb60e07bcda7a3eb684d7bd0a6d91a70e7169e246c3b381697bbd80864f53,2024-12-06T11:15:08.180000
CVE-2024-47249,0,0,a7f699a14cd340d6204f2853f013a69adb50d4dad2f1f815c8aefd4039d99e87,2024-12-06T11:15:08.340000
CVE-2024-4725,0,0,0143a80f818e6c5c4ca20251d126587e437df1df321ac641cfa89b859480fbd8,2024-11-21T09:43:27.687000
@ -265847,6 +265850,8 @@ CVE-2024-47977,0,0,167a11103556db461bec5fe97a2696b0312627da6143ca80c941f2b6fa16e
CVE-2024-4798,0,0,67d409a675b221a14312164f5cc62c5f24d760e91c26863f4b27a369f421db4d,2024-11-21T09:43:38.167000
CVE-2024-4799,0,0,bcde09b7182d8e0e6116d4d77d66aa7fc678a4d38a1639ef2abc6c729d992c49,2024-11-21T09:43:38.320000
CVE-2024-4800,0,0,d6e648ed7e57041fcab1c34d0d022e8b177d9063790ccf92ab37010db4d3952a,2024-11-21T09:43:38.470000
CVE-2024-48007,1,1,d0ec47ad3b006df3e7595e841d695e0e8f2a78f5a742c50c5838fc2a9d4fe592,2024-12-13T14:15:22.147000
CVE-2024-48008,1,1,5ae6fe6e4612d7cd6b5058f047dfe536b768b675c56d6a677689efe95ae8e705,2024-12-13T14:15:22.273000
CVE-2024-4801,0,0,267e61329220ade99a7910aa98f0de25e6611f732de1b6d7e824595026eb04d8,2024-11-21T09:43:38.607000
CVE-2024-48010,0,0,8bfa5c4fbebd2aee91d2507ef982cfb796b2239ac566eed501e3cdcb4f94749b,2024-11-26T19:26:13.733000
CVE-2024-48011,0,0,d0802d36d8c16d447cb26517cc8d3b6131002351b295b4fb171a8b113f998f1d,2024-11-26T02:12:04.277000
@ -268470,16 +268475,16 @@ CVE-2024-52054,0,0,9a2d2ec3a40a48770d9647f97127693cc6b0ef5932cb18c296471a466b60d
CVE-2024-52055,0,0,259d73954aece81f7c011d1c96f3f9c4bf1a8d33b43ce9ab6720600ab6632df4,2024-11-21T23:15:05.890000
CVE-2024-52056,0,0,da2fb97069f42481988d3de6950366edf96ce98eb60db797a3ccea41a89e8e92,2024-11-21T23:15:06.147000
CVE-2024-52057,0,0,4afa017149785f60875924874d6d565d05d116767f78456dbc0402abf3c4ffe7,2024-12-13T10:15:07.320000
CVE-2024-52058,1,1,aae85787f6dd61b0c36f921e209af75bb054c384bd96651dad696b6309eb6ca5,2024-12-13T11:15:07.900000
CVE-2024-52059,1,1,6bde304d0d8fd04ec20ec1688dd81311f75ec6afc8dae40129bbf0564959da20,2024-12-13T11:15:08.080000
CVE-2024-52058,0,0,aae85787f6dd61b0c36f921e209af75bb054c384bd96651dad696b6309eb6ca5,2024-12-13T11:15:07.900000
CVE-2024-52059,0,0,6bde304d0d8fd04ec20ec1688dd81311f75ec6afc8dae40129bbf0564959da20,2024-12-13T11:15:08.080000
CVE-2024-5206,0,0,8862c9be0fc374f53d6a02e5cb7505c5867d3e503357cffe44c63c1a9e66a567,2024-11-21T09:47:11.143000
CVE-2024-52060,1,1,51861fd16a81d9128d9c1930b21fa40dae199275810da1c77565602fc23e71df,2024-12-13T11:15:08.250000
CVE-2024-52061,1,1,3e859b2c21a377f69107a7383a75c3f2e624734e6ffe1ef6b5ed51955d3d4382,2024-12-13T11:15:08.457000
CVE-2024-52062,1,1,361307b9e16a015a415e53e9cf30be8ae92860be6685212cbf9ca90c5195d5df,2024-12-13T11:15:08.650000
CVE-2024-52063,1,1,01a99f2c9a9552c48c26ab7a9ae3aaea1052d83010fae3b40f5cb27ed5fd90c0,2024-12-13T11:15:08.810000
CVE-2024-52064,1,1,991b8f36e22e95ac383d6de3f96bd4197dba9a89d12273fee0411c155cfe8081,2024-12-13T11:15:08.963000
CVE-2024-52065,1,1,95a067ff6fd4c2b46a05689cbf6895ce02d09ceb321b81c8adccd934fd0156ff,2024-12-13T11:15:09.153000
CVE-2024-52066,1,1,3b370b6b71e379be8a024a03d6db1cdc1268457f33eccf40b6255d7a5ebc066b,2024-12-13T11:15:09.330000
CVE-2024-52060,0,0,51861fd16a81d9128d9c1930b21fa40dae199275810da1c77565602fc23e71df,2024-12-13T11:15:08.250000
CVE-2024-52061,0,0,3e859b2c21a377f69107a7383a75c3f2e624734e6ffe1ef6b5ed51955d3d4382,2024-12-13T11:15:08.457000
CVE-2024-52062,0,0,361307b9e16a015a415e53e9cf30be8ae92860be6685212cbf9ca90c5195d5df,2024-12-13T11:15:08.650000
CVE-2024-52063,0,0,01a99f2c9a9552c48c26ab7a9ae3aaea1052d83010fae3b40f5cb27ed5fd90c0,2024-12-13T11:15:08.810000
CVE-2024-52064,0,0,991b8f36e22e95ac383d6de3f96bd4197dba9a89d12273fee0411c155cfe8081,2024-12-13T11:15:08.963000
CVE-2024-52065,0,0,95a067ff6fd4c2b46a05689cbf6895ce02d09ceb321b81c8adccd934fd0156ff,2024-12-13T11:15:09.153000
CVE-2024-52066,0,0,3b370b6b71e379be8a024a03d6db1cdc1268457f33eccf40b6255d7a5ebc066b,2024-12-13T11:15:09.330000
CVE-2024-52067,0,0,3b3805f082afbbdd7956c2385fa9d932a6e128593a07e351c3b4f992b1659428,2024-11-21T13:57:24.187000
CVE-2024-5207,0,0,1dd18e9ab7ff6bfd8ddcbcad1d892aa6d72fe1c4875644c7384ba96bff8c8b12,2024-11-21T09:47:11.280000
CVE-2024-5208,0,0,d422f38fd635e5406dd7f21299ff486ffd883cb5b6211c662371966536488116,2024-11-21T09:47:11.387000
@ -269110,7 +269115,7 @@ CVE-2024-5314,0,0,3f9bafe97657efc7f668c5d897662a9659297ed1c2230826ab18be8ba9a634
CVE-2024-53140,0,0,b503ff41f27d09c97e1340bff7967ee87bb32e39dafc91d99f5fdd4a3e40d538,2024-12-11T16:45:38.077000
CVE-2024-53141,0,0,bac15675c09f6811a6d88b2bd40199a11ae7509b12b3a955c8b4511890882333,2024-12-10T19:25:08.247000
CVE-2024-53142,0,0,6c3c82afaa65b94acded7ae517ab5c9ebd592257e0bf92056ae5de7a8ded9a3a,2024-12-10T19:17:56.657000
CVE-2024-53143,0,0,58aea596a92f51ecb8e396a2e6f1085ce03cd820c5355e9f3433d5e31dfbde48,2024-12-07T07:15:03.780000
CVE-2024-53143,0,1,7d8fba7c24860a89d1b840b90918c133ee3933019e46b80ab5b9ae6d981cb066,2024-12-13T14:15:22.443000
CVE-2024-5315,0,0,cfc4383f1c53119936ccfb248038372daec91d7a497e742b345000be072ec700,2024-11-21T09:47:24.927000
CVE-2024-5317,0,0,c2af981f2442def6d43cf11dee826712fdb79df4e8b131d1c0815426b050d563,2024-11-21T09:47:25.040000
CVE-2024-5318,0,0,d3e6ab64f214a31e8be6483f947f606302a807960eeb0dcd1e3ac0fbb29dc9c0,2024-11-21T09:47:25.160000
@ -269879,6 +269884,7 @@ CVE-2024-55884,0,0,5d6da0d32263735a14f387d6018828f5961d5e83d83c540231cd267e671ab
CVE-2024-55885,0,0,461df12fc4edfbf1f9758c9c1d2eeedab4ec4c04e0446b686d887a656bdb17d2,2024-12-12T20:15:21.760000
CVE-2024-55886,0,0,9ec539fe6f9f48b8925ed26ad51cb53691c99ad16b00ba13a8014018fc0535c6,2024-12-12T20:15:21.890000
CVE-2024-55888,0,0,6bc68c6e76518b27090ba4f9936a243dab7a518f1ad77584f6ca4caf7f706769,2024-12-12T20:15:22.017000
CVE-2024-55889,1,1,132bd1d75843de5e31132e3617c216a334dc8714c65fe11ef120abd1a81b3240,2024-12-13T14:15:22.653000
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
CVE-2024-55918,0,0,d8f1370c78ed9a23164eb37b56443cde3ae9864a1ae08343002bd78fcd13a0dc,2024-12-13T07:15:04.827000
@ -271346,7 +271352,7 @@ CVE-2024-7250,0,0,77e3676540095583ee54282377d752e59ba470ce7bc9b0c39a793c956014b2
CVE-2024-7251,0,0,4f5492038d53a952aae52e1170da3aea84a43d615d1a1fa4149c5ff70cda5bab,2024-11-21T09:51:08.880000
CVE-2024-7252,0,0,24d74b26883cf8151f149bfa7deed5d8a63133a6167165e30cc462ead5fd458a,2024-11-21T09:51:09.003000
CVE-2024-7253,0,0,7f91c8e02eeb95aaf9a2f323d5aa05bf761bf6c98ff5a15ee0990bf815671c2a,2024-11-26T20:00:48.783000
CVE-2024-7254,0,0,5fefb80366227f1896d27eae0780d5833354d64da929bb52ac2349c9b44eb0b2,2024-09-20T12:30:17.483000
CVE-2024-7254,0,1,e89eb3a1f139a1b7724c82049128b9101144d09303e1246e0c00754c9c13b027,2024-12-13T14:15:22.800000
CVE-2024-7255,0,0,ba60a86cf283a25cbf44d00829e275d7a0bb026ed551fecdfd5dd1e8d3ece898,2024-10-29T20:35:42.023000
CVE-2024-7256,0,0,2517a96b7ae4b71627015ee255a3644c2eb8e37bcd815628e7e362c17316dd77,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e824d36e9091bce947d766daa6e3bb42f606d3c1749eb85a01f040d08b0b6e1f,2024-08-05T12:41:45.957000
@ -272051,11 +272057,11 @@ CVE-2024-8071,0,0,1b6c30fcc8f3b02815d9d31b4217b1c8dfc6e30d08dbca24f3c782c63dd0ef
CVE-2024-8072,0,0,caaca5156357bdc00de7e59b85243acacb1769673f4ce18202fa8183e1f0d924,2024-11-25T13:15:08.297000
CVE-2024-8073,0,0,26c37c8721420aa6f969a23f70a2f91e360f21881a617908cb59877bea60195f,2024-09-12T20:58:56.413000
CVE-2024-8074,0,0,b6a465cc87faf1ee8ee15393f94877f7886eac99c7a6e31ba7533b1b21937426,2024-11-21T17:15:26.177000
CVE-2024-8075,0,0,88cb446b1f85726a163ada1581d71e96c80c1b6d0fa66254ecff3a34b743f4a9,2024-08-29T21:57:51.377000
CVE-2024-8076,0,0,2db9549f71c74e3337642364d1f2ce1db90733999f181ddb2a64d2fc0cce7783,2024-08-29T21:58:31.820000
CVE-2024-8077,0,0,c765fb9aa9bfd2e544eefe5e5e39b69b614998806aaa7beb7f73bfc0e8258dbc,2024-08-29T21:59:08.997000
CVE-2024-8078,0,0,e2885f553c6bb5f5387356692d717e91ef6db5bb375cc9b58566ee0f94b8b7d2,2024-08-29T22:00:43.353000
CVE-2024-8079,0,0,d7e6ce19be5f3dc8655d69a38ff378bad2be17483b5327a7aff10907078239c3,2024-08-29T22:00:11.680000
CVE-2024-8075,0,1,17de460a8110e22992c203921ef37b923d7c5e9bc420eee6f199d65db527ca48,2024-12-13T14:46:14.797000
CVE-2024-8076,0,1,a6bf38aac8f852421f9cea017728a9c018ded224d4deacf9285020d03a785ffa,2024-12-13T14:46:25.210000
CVE-2024-8077,0,1,fbd4e8b874f46021a272a308ca812caec4d574f8a545ca0685084ffdb3715af0,2024-12-13T14:50:34.863000
CVE-2024-8078,0,1,584c7b2da5499d95f07015551cd8b8ff916024584f88267967eead662414bca7,2024-12-13T14:51:05.847000
CVE-2024-8079,0,1,31fd6c70dfa70f62cda25127a4d664899a0e883a73c88c50fb3da937236ecf3e,2024-12-13T14:53:21.583000
CVE-2024-8080,0,0,524bf0aa769efdb044c6d31288b2184b254115e056cc5b4fe70d8c83efcccb20,2024-10-17T14:04:45.617000
CVE-2024-8081,0,0,2fa817f4bf3ef5e8499742a4134dddcfbf70ebf15d5840c2e374b4c1856232ce,2024-08-27T16:12:33.580000
CVE-2024-8083,0,0,97e8f17c39dce31b538aaade2f678ad821d51aa65b538589a251f8a131768f9e,2024-08-27T16:11:35.730000
@ -273265,7 +273271,7 @@ CVE-2024-9600,0,0,ea15b50099d09f31b8281c72f2e9f7d888450824868eb6eb5785430b8539a9
CVE-2024-9602,0,0,9d8dd86d0cc225ffb6741a84ee0790d75b0a3de971742428da103b505a33eb9b,2024-10-10T12:51:56.987000
CVE-2024-9603,0,0,6f73634986e4f0954072f40ec952c1e4c294de097bee976da4c1af4a65275169,2024-10-10T12:51:56.987000
CVE-2024-9607,0,0,46ba6ae19aabe43b4e394b9eaf2c4143d8dae3b6ca887a4181734917d5564e5f,2024-11-05T17:40:57.777000
CVE-2024-9608,1,1,b20534ec874707d92a2ff9fb1aa6d12ff20ee5b2f043fdd6617b961662fce412,2024-12-13T12:15:20.080000
CVE-2024-9608,0,0,b20534ec874707d92a2ff9fb1aa6d12ff20ee5b2f043fdd6617b961662fce412,2024-12-13T12:15:20.080000
CVE-2024-9609,0,0,a32ad4ba0330c8bd46a334ed0a6f34b381196d6ee0adb5a1527caca9a51b5222,2024-11-19T21:28:42.670000
CVE-2024-9610,0,0,f327439241391b51adbb56ced5a29061a4e9cbef39684c65a214212a54ae604b,2024-10-15T12:58:51.050000
CVE-2024-9611,0,0,049688b12d23536b7521af43a85c6bc56a995bcf550dd4b062c24ab61d06803f,2024-10-15T12:58:51.050000
@ -273313,7 +273319,7 @@ CVE-2024-9675,0,0,042e11d1d5f68028611f5290da802c68ab7c3807ddde6d9febec582272624f
CVE-2024-9676,0,0,f274ca1f33ebade4ed690e9a2c29367dd55071e678cc70655f57d1ab479c60a8,2024-11-26T09:15:06.820000
CVE-2024-9677,0,0,cfbe7ebac9e19e0614aa19077e218b18010f160d6643d0eae35a63f64f2da91a,2024-12-05T22:11:15.217000
CVE-2024-9680,0,0,b270ebb58405bce82b545a9823e949fa4790116b7a4834e574606834227d9216,2024-11-26T19:53:56.537000
CVE-2024-9681,0,0,36db1cf44aa2f440dfaa6dc17a80f5bfc266b70302053e54d05bfc419207e8f8,2024-11-25T19:52:56.417000
CVE-2024-9681,0,1,2ae771a08ca769f211d8d385c4480401b1a952b5ea57b2588c5b5f84fbd4b358,2024-12-13T14:15:22.953000
CVE-2024-9682,0,0,6d690df5e8c227b34e224cce5647fb45a6c1d80990a723f81ebd7b281b388f5b,2024-11-19T15:47:07.517000
CVE-2024-9683,0,0,e0cd26df0500a0cc9db7c9689d39531f945e069407d58ce00900c54b93d56ed1,2024-12-03T16:14:52.690000
CVE-2024-9685,0,0,cc3d7e9b75de00d1df5b699f1225e3406f130ded3472b38175cabcbf3eacf7fe,2024-10-15T14:30:00.483000

Can't render this file because it is too large.