mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-12-31T03:00:38.484720+00:00
This commit is contained in:
parent
86647941cd
commit
d9b2ebbd63
60
CVE-2024/CVE-2024-128xx/CVE-2024-12838.json
Normal file
60
CVE-2024/CVE-2024-128xx/CVE-2024-12838.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12838",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-12-31T02:15:05.877",
|
||||
"lastModified": "2024-12-31T02:15:05.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The passwordless login mechanism in CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability, allowing remote attackers with regular privileges to send a crafted request to switch to the identity of any user, including administrators."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-302"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8333-32cf8-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8332-2100f-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-128xx/CVE-2024-12839.json
Normal file
60
CVE-2024/CVE-2024-128xx/CVE-2024-12839.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12839",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-12-31T02:15:06.110",
|
||||
"lastModified": "2024-12-31T02:15:06.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The login mechanism via device authentication of CGFIDO from Changing Information Technology has an Authentication Bypass vulnerability. If a user visits a forged website, the agent program deployed on their device will send an authentication signature to the website. An unauthenticated remote attacker who obtains this signature can use it to log into the system with any device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8335-e4a3f-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8334-8b836-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-130xx/CVE-2024-13040.json
Normal file
60
CVE-2024/CVE-2024-130xx/CVE-2024-13040.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13040",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2024-12-31T02:15:06.303",
|
||||
"lastModified": "2024-12-31T02:15:06.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The QOCA aim from Quanta Computer has an Authorization Bypass Through User-Controlled Key vulnerability. By controlling the user ID parameter, remote attackers with regular privileges could access certain features as any user, modify any user's account information and privileges, leading to privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-8337-7899f-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-8336-aa03b-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-3393",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-12-27T10:15:17.270",
|
||||
"lastModified": "2024-12-27T10:15:17.270",
|
||||
"lastModified": "2024-12-31T02:00:01.807",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de DNS Security feature de Palo Alto Networks PAN-OS software permite que un atacante no autenticado env\u00ede un paquete malicioso a trav\u00e9s del plano de datos del firewall que reinicia el firewall. Los intentos repetidos de activar esta condici\u00f3n har\u00e1n que el firewall entre en modo de mantenimiento."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2024-12-30",
|
||||
"cisaActionDue": "2025-01-20",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@paloaltonetworks.com",
|
||||
|
32
README.md
32
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-30T23:00:20.050896+00:00
|
||||
2024-12-31T03:00:38.484720+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-30T22:15:05.957000+00:00
|
||||
2024-12-31T02:15:06.303000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,41 +27,29 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-12-30T01:00:04.330255+00:00
|
||||
2024-12-31T01:00:04.341613+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
275202
|
||||
275205
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-11944](CVE-2024/CVE-2024-119xx/CVE-2024-11944.json) (`2024-12-30T21:15:05.493`)
|
||||
- [CVE-2024-11946](CVE-2024/CVE-2024-119xx/CVE-2024-11946.json) (`2024-12-30T21:15:05.920`)
|
||||
- [CVE-2024-12751](CVE-2024/CVE-2024-127xx/CVE-2024-12751.json) (`2024-12-30T21:15:06.130`)
|
||||
- [CVE-2024-12752](CVE-2024/CVE-2024-127xx/CVE-2024-12752.json) (`2024-12-30T21:15:06.260`)
|
||||
- [CVE-2024-12753](CVE-2024/CVE-2024-127xx/CVE-2024-12753.json) (`2024-12-30T21:15:06.400`)
|
||||
- [CVE-2024-13042](CVE-2024/CVE-2024-130xx/CVE-2024-13042.json) (`2024-12-30T21:15:06.523`)
|
||||
- [CVE-2024-13043](CVE-2024/CVE-2024-130xx/CVE-2024-13043.json) (`2024-12-30T21:15:06.713`)
|
||||
- [CVE-2024-13044](CVE-2024/CVE-2024-130xx/CVE-2024-13044.json) (`2024-12-30T21:15:06.840`)
|
||||
- [CVE-2024-13045](CVE-2024/CVE-2024-130xx/CVE-2024-13045.json) (`2024-12-30T21:15:06.963`)
|
||||
- [CVE-2024-13046](CVE-2024/CVE-2024-130xx/CVE-2024-13046.json) (`2024-12-30T21:15:07.097`)
|
||||
- [CVE-2024-13047](CVE-2024/CVE-2024-130xx/CVE-2024-13047.json) (`2024-12-30T21:15:07.220`)
|
||||
- [CVE-2024-13048](CVE-2024/CVE-2024-130xx/CVE-2024-13048.json) (`2024-12-30T21:15:07.347`)
|
||||
- [CVE-2024-13049](CVE-2024/CVE-2024-130xx/CVE-2024-13049.json) (`2024-12-30T21:15:07.470`)
|
||||
- [CVE-2024-13050](CVE-2024/CVE-2024-130xx/CVE-2024-13050.json) (`2024-12-30T21:15:07.593`)
|
||||
- [CVE-2024-13051](CVE-2024/CVE-2024-130xx/CVE-2024-13051.json) (`2024-12-30T21:15:07.717`)
|
||||
- [CVE-2024-13058](CVE-2024/CVE-2024-130xx/CVE-2024-13058.json) (`2024-12-30T22:15:05.957`)
|
||||
- [CVE-2024-12838](CVE-2024/CVE-2024-128xx/CVE-2024-12838.json) (`2024-12-31T02:15:05.877`)
|
||||
- [CVE-2024-12839](CVE-2024/CVE-2024-128xx/CVE-2024-12839.json) (`2024-12-31T02:15:06.110`)
|
||||
- [CVE-2024-13040](CVE-2024/CVE-2024-130xx/CVE-2024-13040.json) (`2024-12-31T02:15:06.303`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-3393](CVE-2024/CVE-2024-33xx/CVE-2024-3393.json) (`2024-12-31T02:00:01.807`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
37
_state.csv
37
_state.csv
@ -244676,9 +244676,9 @@ CVE-2024-11940,0,0,01a3f490196796516894d51522c528bc6c3ce1fe45bff9fda5a3ce37bc326
|
||||
CVE-2024-11941,0,0,45c946faed9eb1ec18b9452e07479f063cfb793c63899cab9a102bedb1be5328,2024-12-05T16:15:23.893000
|
||||
CVE-2024-11942,0,0,55526aafa6b479f8732b6654f613495eb95fa16f8129024967b3914532d074f0,2024-12-05T16:15:24.033000
|
||||
CVE-2024-11943,0,0,5db2b5cec073953e68197fa73fddd59bb82bf096d7a8174dee13bdb32f9486e1,2024-12-07T02:15:18.393000
|
||||
CVE-2024-11944,1,1,b634172a3925b100e35875fcdb68c272c3b5ca712036d9b14bc3c274d75de098,2024-12-30T21:15:05.493000
|
||||
CVE-2024-11944,0,0,b634172a3925b100e35875fcdb68c272c3b5ca712036d9b14bc3c274d75de098,2024-12-30T21:15:05.493000
|
||||
CVE-2024-11945,0,0,d5529e16b2c34f9b5e6b9ddc5a03f73ebf6c118ac10e072ab626561b83cdfe71,2024-12-10T10:15:04.810000
|
||||
CVE-2024-11946,1,1,9bb9e62cef0f7be1b4ba198de6929920aa5b1c620ccfeccadc62834476767120,2024-12-30T21:15:05.920000
|
||||
CVE-2024-11946,0,0,9bb9e62cef0f7be1b4ba198de6929920aa5b1c620ccfeccadc62834476767120,2024-12-30T21:15:05.920000
|
||||
CVE-2024-11947,0,0,76594c096f66db4264ce24827f38ddba1b904bd8285bdd79729a6ff69e4900e9,2024-12-13T19:33:07.497000
|
||||
CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103ae6a,2024-12-13T19:32:21.150000
|
||||
CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000
|
||||
@ -245098,9 +245098,9 @@ CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a8
|
||||
CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000
|
||||
CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000
|
||||
CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000
|
||||
CVE-2024-12751,1,1,c021fa6050fdcc7d460a13e6fbbdc375489db9f83ffb1d4962a94fd17a310ee0,2024-12-30T21:15:06.130000
|
||||
CVE-2024-12752,1,1,aceb91b13a48ab0b91f2671dfccf956bcd438f2d51f93df4dee52b510998e9fe,2024-12-30T21:15:06.260000
|
||||
CVE-2024-12753,1,1,e4ba0db71191a4ffaab183a2c11034bf6d7abf0b7b96de04fec1007267c8b1fd,2024-12-30T21:15:06.400000
|
||||
CVE-2024-12751,0,0,c021fa6050fdcc7d460a13e6fbbdc375489db9f83ffb1d4962a94fd17a310ee0,2024-12-30T21:15:06.130000
|
||||
CVE-2024-12752,0,0,aceb91b13a48ab0b91f2671dfccf956bcd438f2d51f93df4dee52b510998e9fe,2024-12-30T21:15:06.260000
|
||||
CVE-2024-12753,0,0,e4ba0db71191a4ffaab183a2c11034bf6d7abf0b7b96de04fec1007267c8b1fd,2024-12-30T21:15:06.400000
|
||||
CVE-2024-12754,0,0,cc49a740b9b02282be04809e0ec9e9f9181e846c2c42209dd24ca5d17558bc72,2024-12-30T17:15:07.127000
|
||||
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
|
||||
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
|
||||
@ -245133,6 +245133,8 @@ CVE-2024-12832,0,0,c36c4dbfbed5d52ec77f535bcad057707bcb3f30150d33c83f565d39d6ff7
|
||||
CVE-2024-12834,0,0,42c1eae502d28c98db195f540a9c8f4947fcef6a936ce9383d090aeedf31e01d,2024-12-30T17:15:07.857000
|
||||
CVE-2024-12835,0,0,456551b469a3e0837a51a7b87cad89a81e52a63efb0e82cd825df7f15bc00b7a,2024-12-30T17:15:08
|
||||
CVE-2024-12836,0,0,947a6526b2f3576c89b08ea6819418230607e057855f6bcd272df393ac987473,2024-12-30T17:15:08.137000
|
||||
CVE-2024-12838,1,1,f16c2ddb711385756859e1dc99cf0ebd4fe756fa76201b554f34b22546aa92b1,2024-12-31T02:15:05.877000
|
||||
CVE-2024-12839,1,1,5410c29dcc5f8afc30bfcd037c9e6fac87d3754b4020401bf2d32d25b3f14db1,2024-12-31T02:15:06.110000
|
||||
CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000
|
||||
CVE-2024-12840,0,0,e7528a4b68539dcba75aad0835821b79ed34f43bac74e1052c7303bbe2f9c53b,2024-12-20T16:15:23.417000
|
||||
CVE-2024-12841,0,0,c738525065181f5fd675eaeda283796811d753e1465fe11eed1df9a607acfd7a,2024-12-20T19:15:06.097000
|
||||
@ -245282,18 +245284,19 @@ CVE-2024-13037,0,0,ad1a2687fd8ca034a4ba7eb450dd7b7cb6ce76af79e47f53a4dcc006981f2
|
||||
CVE-2024-13038,0,0,4583c4724ce1695329d04a091cf334038675ae1fc4b89e1e9c52332e7b115d63,2024-12-30T17:15:08.473000
|
||||
CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000
|
||||
CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000
|
||||
CVE-2024-13042,1,1,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000
|
||||
CVE-2024-13043,1,1,a57d8becfe9ca92a82190ea64963a694c6040f83cb00135ce055f57002bf8d4c,2024-12-30T21:15:06.713000
|
||||
CVE-2024-13044,1,1,6d3c3cdcc975fb5586b26099e393540139d286d458e4c5db4ccad7a86d240708,2024-12-30T21:15:06.840000
|
||||
CVE-2024-13045,1,1,b32d594c46ea0f4c48c42384ee94c921a68ba0cc53643756bb2b38fcd53b620a,2024-12-30T21:15:06.963000
|
||||
CVE-2024-13046,1,1,c23d299c3b59ae6bc264c7b5c5d03889b2a4f3b7dfc1a98cde8f678439be865b,2024-12-30T21:15:07.097000
|
||||
CVE-2024-13047,1,1,dc7aafd74287433931ab2a00582ad328a0bfc903e0fe51d5645e7afe6ca004bd,2024-12-30T21:15:07.220000
|
||||
CVE-2024-13048,1,1,67adbf23fa9118f8304c09b8b6e3ff63b96c91828b41fba5df352ed6981833f4,2024-12-30T21:15:07.347000
|
||||
CVE-2024-13049,1,1,f591721723d514d93b81ea9ce6a3f8016e8d2fa1c15ed626bcbaa083ac3ec9cd,2024-12-30T21:15:07.470000
|
||||
CVE-2024-13040,1,1,a1b5d05401cf418a59b0f679ad1dde1d9e5e2bdf3e303602eafaafe8d09ac44b,2024-12-31T02:15:06.303000
|
||||
CVE-2024-13042,0,0,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000
|
||||
CVE-2024-13043,0,0,a57d8becfe9ca92a82190ea64963a694c6040f83cb00135ce055f57002bf8d4c,2024-12-30T21:15:06.713000
|
||||
CVE-2024-13044,0,0,6d3c3cdcc975fb5586b26099e393540139d286d458e4c5db4ccad7a86d240708,2024-12-30T21:15:06.840000
|
||||
CVE-2024-13045,0,0,b32d594c46ea0f4c48c42384ee94c921a68ba0cc53643756bb2b38fcd53b620a,2024-12-30T21:15:06.963000
|
||||
CVE-2024-13046,0,0,c23d299c3b59ae6bc264c7b5c5d03889b2a4f3b7dfc1a98cde8f678439be865b,2024-12-30T21:15:07.097000
|
||||
CVE-2024-13047,0,0,dc7aafd74287433931ab2a00582ad328a0bfc903e0fe51d5645e7afe6ca004bd,2024-12-30T21:15:07.220000
|
||||
CVE-2024-13048,0,0,67adbf23fa9118f8304c09b8b6e3ff63b96c91828b41fba5df352ed6981833f4,2024-12-30T21:15:07.347000
|
||||
CVE-2024-13049,0,0,f591721723d514d93b81ea9ce6a3f8016e8d2fa1c15ed626bcbaa083ac3ec9cd,2024-12-30T21:15:07.470000
|
||||
CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000
|
||||
CVE-2024-13050,1,1,84109de165147e4a5232ee1fdc9c6d22162f7758c34e8757df3c209c53af5194,2024-12-30T21:15:07.593000
|
||||
CVE-2024-13051,1,1,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c63211509af,2024-12-30T21:15:07.717000
|
||||
CVE-2024-13058,1,1,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000
|
||||
CVE-2024-13050,0,0,84109de165147e4a5232ee1fdc9c6d22162f7758c34e8757df3c209c53af5194,2024-12-30T21:15:07.593000
|
||||
CVE-2024-13051,0,0,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c63211509af,2024-12-30T21:15:07.717000
|
||||
CVE-2024-13058,0,0,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000
|
||||
CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000
|
||||
CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000
|
||||
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
|
||||
@ -256450,7 +256453,7 @@ CVE-2024-33926,0,0,ba3b0b5d452557f451f073e7051635f20935a7d4b0bf1e31891232c3b0d24
|
||||
CVE-2024-33927,0,0,47a33c5c8d9c813c7e0792969b9d2c7f5a02e1e804addbde5e0fd6efc0070e34,2024-11-21T09:17:45.063000
|
||||
CVE-2024-33928,0,0,5485d29b9f1f54b48807c0a7fab77f8660a3f6f005966e3d555ef2b3d42ff3b8,2024-11-21T09:17:45.170000
|
||||
CVE-2024-33929,0,0,9250b6acc401d14df60daf091a118dd6e90efe6072ae5814267d257083c00a7c,2024-11-21T09:17:45.277000
|
||||
CVE-2024-3393,0,0,de2575d1c388525b2eae23a05711ea6bbc3475c36d9e6bfc2dc1497b85579c8c,2024-12-27T10:15:17.270000
|
||||
CVE-2024-3393,0,1,b48542ef6904dd8c7115e5c27bb4a2e96704783642e34a95b81a006de0382425,2024-12-31T02:00:01.807000
|
||||
CVE-2024-33930,0,0,352e81bce8bffcdd250f3e4cc8b8032938f93f842babfe72361bc9938c4c9ff9,2024-11-21T09:17:45.387000
|
||||
CVE-2024-33931,0,0,02797798e9c898cf0c4c463d6fab582aa710f3a0cf7c63a98df878120217d686,2024-11-21T09:17:45.490000
|
||||
CVE-2024-33932,0,0,a959ef4dc107f5a5fd9667e1036684cdb3d2d4571d8d1f2cc49022d8aa2387fc,2024-11-21T09:17:45.610000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user