mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-12-17T00:55:40.113371+00:00
This commit is contained in:
parent
9c10909fb9
commit
e6364e3d65
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10966",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-07T18:15:16.033",
|
||||
"lastModified": "2024-11-08T19:01:03.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-16T23:05:44.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -124,30 +144,80 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:x18_firmware:9.1.0cu.2024_b20220329:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "147FED55-DD5F-4AC0-B261-9FABC0498F67"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:x18:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4D9B188-E15C-4915-848A-4F6C2E6EB067"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Dreamy-elfland/240914",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.283412",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.283412",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.437310",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.youtube.com/watch?v=zRNv1OvT55c",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-119xx/CVE-2024-11900.json
Normal file
60
CVE-2024/CVE-2024-119xx/CVE-2024-11900.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11900",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-17T00:15:04.917",
|
||||
"lastModified": "2024-12-17T00:15:04.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Portfolio \u2013 Filterable Masonry Portfolio Gallery for Professionals plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'portfolio-pro' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/portfolio-pro/trunk/public/class-portfolio-pro-public.php#L358",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1989fe85-5c32-4671-bd20-f9d05cb5034c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-119xx/CVE-2024-11902.json
Normal file
64
CVE-2024/CVE-2024-119xx/CVE-2024-11902.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-11902",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-17T00:15:05.927",
|
||||
"lastModified": "2024-12-17T00:15:05.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Slope Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slope-reservations' shortcode in all versions up to, and including, 4.2.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/slope-widgets/trunk/slope-reservations.php#L298",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/slope-widgets/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7700f1f3-90e2-450d-9cfe-c922d0cc6a1e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-119xx/CVE-2024-11905.json
Normal file
64
CVE-2024/CVE-2024-119xx/CVE-2024-11905.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-11905",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-17T00:15:06.073",
|
||||
"lastModified": "2024-12-17T00:15:06.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Animated Counters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'animatedcounte' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/animated-counters/trunk/animated-counters.php#L32",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/animated-counters/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/afd2f09c-4bd5-47a5-8d4f-7345aa8925f8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-119xx/CVE-2024-11906.json
Normal file
64
CVE-2024/CVE-2024-119xx/CVE-2024-11906.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-11906",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-17T00:15:06.217",
|
||||
"lastModified": "2024-12-17T00:15:06.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The TPG Get Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpg_get_posts' shortcode in all versions up to, and including, 3.6.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tpg-get-posts/trunk/inc/class-tpg-gp-process.php#L478",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/tpg-get-posts/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c22288e6-76f3-4c5a-bd7b-30681334bab7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-124xx/CVE-2024-12443.json
Normal file
68
CVE-2024/CVE-2024-124xx/CVE-2024-12443.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-12443",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-16T23:15:06.097",
|
||||
"lastModified": "2024-12-16T23:15:06.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CRM Perks \u2013 WordPress HelpDesk Integration \u2013 Zendesk, Freshdesk, HelpScout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'crm-perks-tickets' shortcode in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/support-x/trunk/support-x.php#L210",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3207849/support-x/trunk/support-x.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/support-x",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a19e11e7-faa1-4e4d-87de-2454c4ad70f8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25468",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-17T06:15:54.487",
|
||||
"lastModified": "2024-11-21T09:00:51.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-12-16T23:04:51.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,87 @@
|
||||
"value": "Un problema en TOTOLINK X5000R V.9.1.0u.6369_B20230113 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s del par\u00e1metro host_time del componente NTPSyncWithHost."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thKim0/totolink",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/thKim0/totolink",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-28326",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-26T20:15:07.480",
|
||||
"lastModified": "2024-11-21T09:06:11.630",
|
||||
"lastModified": "2024-12-16T23:15:06.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Access Control in Asus RT-N12+ B1 routers allows local attackers to obtain root terminal access via the the UART interface."
|
||||
"value": "Incorrect Access Control in ASUS RT-N12+ B1 and RT-N12 D1 routers allows local attackers to obtain root terminal access via the the UART interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
64
CVE-2024/CVE-2024-352xx/CVE-2024-35230.json
Normal file
64
CVE-2024/CVE-2024-352xx/CVE-2024-35230.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-35230",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-16T23:15:06.467",
|
||||
"lastModified": "2024-12-16T23:15:06.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. In affected versions the welcome and about page includes version and revision information about the software in use (including library and components used). This information is sensitive from a security point of view because it allows software used by the server to be easily identified. This issue has been patched in version 2.26.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geoserver/geoserver/commit/74fdab745a5deff20ac99abca24d8695fe1a52f8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/geoserver/geoserver/commit/8cd1590a604a10875de67b04995f1952f631f920",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6pfc-w86r-54q6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-550xx/CVE-2024-55085.json
Normal file
25
CVE-2024/CVE-2024-550xx/CVE-2024-55085.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-55085",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-16T23:15:06.607",
|
||||
"lastModified": "2024-12-16T23:15:06.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GetSimple CMS CE 3.3.19 suffers from arbitrary code execution in the template editing function in the background management system, which can be used by an attacker to implement RCE."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://getsimple-ce.ovh/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://tasteful-stamp-da4.notion.site/CVE-2024-55085-15b1e0f227cb80a5aee6faeb820bf7e6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-554xx/CVE-2024-55451.json
Normal file
25
CVE-2024/CVE-2024-554xx/CVE-2024-55451.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-55451",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-16T23:15:06.710",
|
||||
"lastModified": "2024-12-16T23:15:06.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in authenticated SVG file upload and viewing functionality in UJCMS 9.6.3. The vulnerability arises from insufficient sanitization of embedded attributes in uploaded SVG files. When a maliciously crafted SVG file is viewed by other backend users, it allows authenticated attackers to execute arbitrary JavaScript in the context of other backend users' browsers, potentially leading to the theft of sensitive tokens."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/ujcms/StoredXSS-SVGUpload.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dromara/ujcms",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-554xx/CVE-2024-55452.json
Normal file
25
CVE-2024/CVE-2024-554xx/CVE-2024-55452.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-55452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-16T23:15:06.817",
|
||||
"lastModified": "2024-12-16T23:15:06.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A URL redirection vulnerability exists in UJCMS 9.6.3 due to improper validation of URLs in the upload and rendering of new block / carousel items. This vulnerability allows authenticated attackers to redirect unprivileged users to an arbitrary, attacker-controlled webpage. When an authenticated user clicks on the malicious block item, they are redirected to the arbitrary untrusted domains, where sensitive tokens, such as JSON Web Tokens, can be stolen via a crafted webpage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/ujcms/OpenRedirect-BlockItemUpload.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dromara/ujcms",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-560xx/CVE-2024-56017.json
Normal file
56
CVE-2024/CVE-2024-560xx/CVE-2024-56017.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56017",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-16T23:15:06.923",
|
||||
"lastModified": "2024-12-16T23:15:06.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Tom Royal Stop Registration Spam allows Stored XSS.This issue affects Stop Registration Spam: from n/a through 1.23."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/stop-registration-spam/vulnerability/wordpress-stop-registration-spam-plugin-1-23-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
53
README.md
53
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-16T23:00:30.349317+00:00
|
||||
2024-12-17T00:55:40.113371+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-16T22:57:06.437000+00:00
|
||||
2024-12-17T00:15:06.217000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,49 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274085
|
||||
274095
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-29671](CVE-2024/CVE-2024-296xx/CVE-2024-29671.json) (`2024-12-16T22:15:05.623`)
|
||||
- [CVE-2024-37773](CVE-2024/CVE-2024-377xx/CVE-2024-37773.json) (`2024-12-16T22:15:05.947`)
|
||||
- [CVE-2024-37774](CVE-2024/CVE-2024-377xx/CVE-2024-37774.json) (`2024-12-16T22:15:06.127`)
|
||||
- [CVE-2024-37775](CVE-2024/CVE-2024-377xx/CVE-2024-37775.json) (`2024-12-16T22:15:06.310`)
|
||||
- [CVE-2024-37776](CVE-2024/CVE-2024-377xx/CVE-2024-37776.json) (`2024-12-16T22:15:06.490`)
|
||||
- [CVE-2024-52949](CVE-2024/CVE-2024-529xx/CVE-2024-52949.json) (`2024-12-16T22:15:06.863`)
|
||||
- [CVE-2024-55100](CVE-2024/CVE-2024-551xx/CVE-2024-55100.json) (`2024-12-16T21:15:08.427`)
|
||||
- [CVE-2024-55103](CVE-2024/CVE-2024-551xx/CVE-2024-55103.json) (`2024-12-16T21:15:08.553`)
|
||||
- [CVE-2024-55104](CVE-2024/CVE-2024-551xx/CVE-2024-55104.json) (`2024-12-16T21:15:08.670`)
|
||||
- [CVE-2024-55554](CVE-2024/CVE-2024-555xx/CVE-2024-55554.json) (`2024-12-16T22:15:07.477`)
|
||||
- [CVE-2024-55557](CVE-2024/CVE-2024-555xx/CVE-2024-55557.json) (`2024-12-16T21:15:08.783`)
|
||||
- [CVE-2024-11900](CVE-2024/CVE-2024-119xx/CVE-2024-11900.json) (`2024-12-17T00:15:04.917`)
|
||||
- [CVE-2024-11902](CVE-2024/CVE-2024-119xx/CVE-2024-11902.json) (`2024-12-17T00:15:05.927`)
|
||||
- [CVE-2024-11905](CVE-2024/CVE-2024-119xx/CVE-2024-11905.json) (`2024-12-17T00:15:06.073`)
|
||||
- [CVE-2024-11906](CVE-2024/CVE-2024-119xx/CVE-2024-11906.json) (`2024-12-17T00:15:06.217`)
|
||||
- [CVE-2024-12443](CVE-2024/CVE-2024-124xx/CVE-2024-12443.json) (`2024-12-16T23:15:06.097`)
|
||||
- [CVE-2024-35230](CVE-2024/CVE-2024-352xx/CVE-2024-35230.json) (`2024-12-16T23:15:06.467`)
|
||||
- [CVE-2024-55085](CVE-2024/CVE-2024-550xx/CVE-2024-55085.json) (`2024-12-16T23:15:06.607`)
|
||||
- [CVE-2024-55451](CVE-2024/CVE-2024-554xx/CVE-2024-55451.json) (`2024-12-16T23:15:06.710`)
|
||||
- [CVE-2024-55452](CVE-2024/CVE-2024-554xx/CVE-2024-55452.json) (`2024-12-16T23:15:06.817`)
|
||||
- [CVE-2024-56017](CVE-2024/CVE-2024-560xx/CVE-2024-56017.json) (`2024-12-16T23:15:06.923`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `19`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2022-48488](CVE-2022/CVE-2022-484xx/CVE-2022-48488.json) (`2024-12-16T21:15:06.287`)
|
||||
- [CVE-2023-42791](CVE-2023/CVE-2023-427xx/CVE-2023-42791.json) (`2024-12-16T22:23:14.027`)
|
||||
- [CVE-2023-47635](CVE-2023/CVE-2023-476xx/CVE-2023-47635.json) (`2024-12-16T21:28:47.970`)
|
||||
- [CVE-2023-48220](CVE-2023/CVE-2023-482xx/CVE-2023-48220.json) (`2024-12-16T21:46:47.680`)
|
||||
- [CVE-2023-51447](CVE-2023/CVE-2023-514xx/CVE-2023-51447.json) (`2024-12-16T22:43:27.217`)
|
||||
- [CVE-2024-1632](CVE-2024/CVE-2024-16xx/CVE-2024-1632.json) (`2024-12-16T21:04:13.760`)
|
||||
- [CVE-2024-1636](CVE-2024/CVE-2024-16xx/CVE-2024-1636.json) (`2024-12-16T21:05:49.493`)
|
||||
- [CVE-2024-21987](CVE-2024/CVE-2024-219xx/CVE-2024-21987.json) (`2024-12-16T22:26:25.610`)
|
||||
- [CVE-2024-22075](CVE-2024/CVE-2024-220xx/CVE-2024-22075.json) (`2024-12-16T22:15:05.397`)
|
||||
- [CVE-2024-2353](CVE-2024/CVE-2024-23xx/CVE-2024-2353.json) (`2024-12-16T22:57:06.437`)
|
||||
- [CVE-2024-28639](CVE-2024/CVE-2024-286xx/CVE-2024-28639.json) (`2024-12-16T22:56:31.737`)
|
||||
- [CVE-2024-37018](CVE-2024/CVE-2024-370xx/CVE-2024-37018.json) (`2024-12-16T21:15:07.897`)
|
||||
- [CVE-2024-37222](CVE-2024/CVE-2024-372xx/CVE-2024-37222.json) (`2024-12-16T22:15:05.827`)
|
||||
- [CVE-2024-44290](CVE-2024/CVE-2024-442xx/CVE-2024-44290.json) (`2024-12-16T22:15:06.690`)
|
||||
- [CVE-2024-52723](CVE-2024/CVE-2024-527xx/CVE-2024-52723.json) (`2024-12-16T22:56:02.690`)
|
||||
- [CVE-2024-54474](CVE-2024/CVE-2024-544xx/CVE-2024-54474.json) (`2024-12-16T22:15:07.160`)
|
||||
- [CVE-2024-54526](CVE-2024/CVE-2024-545xx/CVE-2024-54526.json) (`2024-12-16T22:15:07.320`)
|
||||
- [CVE-2024-54531](CVE-2024/CVE-2024-545xx/CVE-2024-54531.json) (`2024-12-16T21:15:08.113`)
|
||||
- [CVE-2024-55099](CVE-2024/CVE-2024-550xx/CVE-2024-55099.json) (`2024-12-16T21:15:08.253`)
|
||||
- [CVE-2024-10966](CVE-2024/CVE-2024-109xx/CVE-2024-10966.json) (`2024-12-16T23:05:44.547`)
|
||||
- [CVE-2024-25468](CVE-2024/CVE-2024-254xx/CVE-2024-25468.json) (`2024-12-16T23:04:51.047`)
|
||||
- [CVE-2024-28326](CVE-2024/CVE-2024-283xx/CVE-2024-28326.json) (`2024-12-16T23:15:06.253`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
76
_state.csv
76
_state.csv
@ -212414,7 +212414,7 @@ CVE-2022-48482,0,0,7ac41b1951b801fb664e658d13833df47cbab31ad3169e90b364ff040e0a3
|
||||
CVE-2022-48483,0,0,d2bec26748db8a5da63d916cd77a26e7f5ec965ac0c82535ec23b0719f24bb2f,2024-11-21T07:33:25.313000
|
||||
CVE-2022-48486,0,0,a0cdd75943e6739f50af03c52fa560b5a26119dc3004c5c928a0c2c562859314,2024-11-21T07:33:25.450000
|
||||
CVE-2022-48487,0,0,847663737d83c8f2831f21b93d19406978bac505b0e2d927ba6bb1a8c413da60,2024-11-21T07:33:25.550000
|
||||
CVE-2022-48488,0,1,f6e746ab7ffc0663eb0cfbc141164bc4b37be6f3f64dc1163c2b7e837e9087c9,2024-12-16T21:15:06.287000
|
||||
CVE-2022-48488,0,0,f6e746ab7ffc0663eb0cfbc141164bc4b37be6f3f64dc1163c2b7e837e9087c9,2024-12-16T21:15:06.287000
|
||||
CVE-2022-48489,0,0,4f9214f2ba4c67dff3671bbc97115cde1d0641a5c0cd58e658fa153dc15eb881,2024-11-21T07:33:25.750000
|
||||
CVE-2022-4849,0,0,95ea82af9403d8ae880c366bafe13c73151114e74b8e6fcc59d974eacfc7b97d,2024-11-21T07:36:04.140000
|
||||
CVE-2022-48490,0,0,5bdaed2389bcbfe9ba6f9ec51eb7b350e50cdcf1602f1e6f8708d3a066e3e2c8,2024-11-21T07:33:25.847000
|
||||
@ -233053,7 +233053,7 @@ CVE-2023-42788,0,0,0c30b35d8520306a2f83f71d70c6e59375e6c5852cdeb5813f843ade4b3ab
|
||||
CVE-2023-42789,0,0,eebbac5c484c3f93b2be647e7bb4c1bcdda0e75aa8868e3a113ae482b9f36f7e,2024-11-21T08:23:09.387000
|
||||
CVE-2023-4279,0,0,1caed5149541c10d4336248a1287cbb2fb27f3524c93ad81d6b75ca3202c1738,2024-11-21T08:34:46.740000
|
||||
CVE-2023-42790,0,0,d4a58d7345844e2500d9a95d1338ce209447c20c8a9a245fefec6b908b6fd44c,2024-11-21T08:23:09.530000
|
||||
CVE-2023-42791,0,1,9a469e96ceb7289a27f57bada36599a8e7eea3d372acceee964980bff57f3d16,2024-12-16T22:23:14.027000
|
||||
CVE-2023-42791,0,0,9a469e96ceb7289a27f57bada36599a8e7eea3d372acceee964980bff57f3d16,2024-12-16T22:23:14.027000
|
||||
CVE-2023-42792,0,0,b039ad93eb114bba0187448e5be8dc712aa808e9094212e2681cc2587cb17547,2024-11-21T08:23:09.800000
|
||||
CVE-2023-42793,0,0,2cb19f7cac072dbde3861f81c268665fa5adbb63dafa84c63f9b398ce5dc164e,2024-12-16T12:15:04.797000
|
||||
CVE-2023-42794,0,0,48048c4e2d6d564bbcc96727bb6871dccd15ed86260523047edc87d3e3cde6a1,2024-11-21T08:23:10.077000
|
||||
@ -236352,7 +236352,7 @@ CVE-2023-47630,0,0,8b928875fae0998d97a8e6c96cacf3a596a8814e10723e995789b00897c40
|
||||
CVE-2023-47631,0,0,98389b62eadbaa1a996e61411aed8f515a4c88af2b505aba3f094376debecb6f,2024-11-21T08:30:34.130000
|
||||
CVE-2023-47633,0,0,cd7b8e8e5f43218d34bc9d543ce1bc7d60ecb2f05e4a7141da55877dae048d63,2024-11-21T08:30:34.263000
|
||||
CVE-2023-47634,0,0,fc3a17ed2a20ca50780c27f93eac8e846b5bff0cdb5a32d51e1859a0d9d0410a,2024-11-21T08:30:34.400000
|
||||
CVE-2023-47635,0,1,7333de09ab3fd2ca44d686d58adc57c6480b6d3c7d020a8750b0277bb0b40f62,2024-12-16T21:28:47.970000
|
||||
CVE-2023-47635,0,0,7333de09ab3fd2ca44d686d58adc57c6480b6d3c7d020a8750b0277bb0b40f62,2024-12-16T21:28:47.970000
|
||||
CVE-2023-47636,0,0,6aa2ccab8ffea2a137282b65340b7d7ea26cc0f05896154692a2d77b8c507b01,2024-11-21T08:30:34.697000
|
||||
CVE-2023-47637,0,0,4a42b6de46072da446f9342bdebb85449fee6bbee8169614de57996c73f91863,2024-11-21T08:30:34.847000
|
||||
CVE-2023-47638,0,0,bb18d90017c00c210fecafc6bdaf626dc4a655efc767edcd6d3af39f2421a75a,2023-11-15T21:15:08.050000
|
||||
@ -236702,7 +236702,7 @@ CVE-2023-48217,0,0,a379ed7cd6ff7980a3776e118f4ad28c1ebfb07ece7e4a6198cc8757eecd1
|
||||
CVE-2023-48218,0,0,2034341569f3e7fc520ed1397b72f8be8f4af2392e37816f9c592dd9399978c9,2024-11-21T08:31:13.880000
|
||||
CVE-2023-48219,0,0,57a3d54903a729b2c013006b6b643a6eb0af1c715000eb70b98e642317029789,2024-11-21T08:31:14.003000
|
||||
CVE-2023-4822,0,0,04710647a45da8906126ddbd8df4db9c83a00dfddfe760a03b60a12aa4b9a9fa,2024-11-21T08:36:02.730000
|
||||
CVE-2023-48220,0,1,6cb6aec9d8943bf10148e6ca0680a526136e118e13b3d40f50a597978a3ce22a,2024-12-16T21:46:47.680000
|
||||
CVE-2023-48220,0,0,6cb6aec9d8943bf10148e6ca0680a526136e118e13b3d40f50a597978a3ce22a,2024-12-16T21:46:47.680000
|
||||
CVE-2023-48221,0,0,595a3acb95e41db2de6dfc9dd18c5cec89911b5e256fe26f26c2a280b15ea59a,2024-11-21T08:31:14.263000
|
||||
CVE-2023-48222,0,0,853711c2a817e133552508f64e9de9cd5dab4ab07b5c4551a247b4782225a7fc,2024-11-21T08:31:14.430000
|
||||
CVE-2023-48223,0,0,79aa6f1b2bab903b687a34c6032c8ae2d1c422c12757e0f431ac3caabb4cc037,2024-11-21T08:31:14.567000
|
||||
@ -238979,7 +238979,7 @@ CVE-2023-51443,0,0,bc5dfbcf2d47b2402929c15b90b4be90f3f7485f94767446ff8ec5a8bbd43
|
||||
CVE-2023-51444,0,0,116a056edb92acbf6dd904c29a6347e30e07398936b1f8804f303070683a16c9,2024-11-21T08:38:07.880000
|
||||
CVE-2023-51445,0,0,686f25a3deff21aaa9aa53d39e6acc0223b41221377f12f5a26dee16370e04aa,2024-11-21T08:38:07.997000
|
||||
CVE-2023-51446,0,0,477f5d27d22a3cba1e4a3cc51b0aade0149e549a265a572147ead5a7c2014b5d,2024-11-21T08:38:08.127000
|
||||
CVE-2023-51447,0,1,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000
|
||||
CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000
|
||||
CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000
|
||||
CVE-2023-51449,0,0,4cf349ceea2f1c423c4cf23f27571e002121659b0a97a8b63d12c9a4d5f368c4,2024-11-21T08:38:08.513000
|
||||
CVE-2023-5145,0,0,ed136c77a3cb85689d85277aba9853012ad53753c0f759e065c484d72945da3d,2024-11-21T08:41:09.277000
|
||||
@ -243781,7 +243781,7 @@ CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d
|
||||
CVE-2024-10963,0,0,3e61141d5828693cdce9d001c960b53c15a790c4b479fe9fdee66649acdf3afb,2024-11-11T18:15:14.487000
|
||||
CVE-2024-10964,0,0,57b272f10f583f57ad350a67bc460132637ea8e73b01849caa65e88235230d16,2024-11-26T01:36:31.033000
|
||||
CVE-2024-10965,0,0,7a48e746780c9b936f9156485d79a795eb32972691169d69dc596fa55046e4dd,2024-11-23T01:45:14.267000
|
||||
CVE-2024-10966,0,0,b7a50c5d6f825b28e507a19c3844f5a82d0b4c6a45687a7c351c49bc0dd409eb,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10966,0,1,96d20283615ddcd72f8fb0ce7c3259f27d2b882522f620aa1673124372d6f3b3,2024-12-16T23:05:44.547000
|
||||
CVE-2024-10967,0,0,7c3473c2b77a8d05803cf7f270943b5290b5d24c3b903af32185338840b213c3,2024-11-26T01:30:41.650000
|
||||
CVE-2024-10968,0,0,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000
|
||||
CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000
|
||||
@ -244500,9 +244500,13 @@ CVE-2024-11894,0,0,0c2059044c45af848fff3dd9292eb7e51685f6c7fbb508ad9b4173a086520
|
||||
CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000
|
||||
CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000
|
||||
CVE-2024-1190,0,0,234a49a5e7705658abf0b6e88d111180ae34b962c9b1fcba39bd09bd939fee39,2024-11-21T08:49:59.993000
|
||||
CVE-2024-11900,1,1,c48cd00006725e1dae63f3b2c1712aaa44928503feb92b4835c398554c3a2262,2024-12-17T00:15:04.917000
|
||||
CVE-2024-11901,0,0,b4f47b708bd6950d29700a0fa25685f0a500c1152f87b15c0f3253f7e0b084c7,2024-12-12T04:15:06.817000
|
||||
CVE-2024-11902,1,1,3e7e6d5025f95dcc691a71a72ec300283eb2ee94a68ba14c4873d0f65e104ce0,2024-12-17T00:15:05.927000
|
||||
CVE-2024-11903,0,0,1fb664847ae87ab093a142384297236893b764bd45b68ea230b1dd002c36e183,2024-12-04T08:15:06.830000
|
||||
CVE-2024-11904,0,0,cfe02e1e018fdb745163b14d85560843145fb371b7c3a3b355230dde5ae64d47,2024-12-07T02:15:18.263000
|
||||
CVE-2024-11905,1,1,471cfe08f5b353813071a3b89270a596998ed6f7ed2ff849b918b1bf97eb833f,2024-12-17T00:15:06.073000
|
||||
CVE-2024-11906,1,1,bd06f91b81ce065886b8d405edb88e6a7d8f769e622325bb6fd5cdbba074ce6f,2024-12-17T00:15:06.217000
|
||||
CVE-2024-1191,0,0,6f7a8128ca74425a818c30dd0345aad863d38fbb6a993214ffab466088e49214,2024-11-21T08:50:00.150000
|
||||
CVE-2024-11910,0,0,7cdc56d220bb226d66f2e09af7dfa09212676d67ef40d93704c67462fa98d7df,2024-12-13T09:15:06.543000
|
||||
CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db68000f,2024-12-13T09:15:07.083000
|
||||
@ -244734,6 +244738,7 @@ CVE-2024-12420,0,0,ae8d110f5efef295dc5d542d71461638a083f9c010e00a24758178ab1b247
|
||||
CVE-2024-12421,0,0,d0800edd844bf37ccee00fc76da3ec64bb2b51e717430e725122892ee39e78eb,2024-12-13T09:15:08.870000
|
||||
CVE-2024-12422,0,0,05369736cfa99e7a93f623e0bf231830f42417dd4b9e28a7ca0096ebfd842f0b,2024-12-14T06:15:19.357000
|
||||
CVE-2024-12441,0,0,60177bfa0d9dcd79729d5ab6a51352067dd3b55deb7861fd956eb7f2cdfb3058,2024-12-12T05:15:12.703000
|
||||
CVE-2024-12443,1,1,b39fd2946c2fbefa55158bd864172df98a06d98976b732fc4c22eac806259995,2024-12-16T23:15:06.097000
|
||||
CVE-2024-12446,0,0,bc4dc12729ac5f85e4be698a629e224d6f337e87d1b81d5042c0eddb71088b1a,2024-12-14T07:15:07.040000
|
||||
CVE-2024-12447,0,0,c7d237797e5045bf7231fd7a8dd02f5534e2ad794fcb81ab9e39a8e990833ac6,2024-12-14T05:15:10.670000
|
||||
CVE-2024-12448,0,0,11e50dbe77a1a32d7920e9e6082c85f472336b04f5fe27094dc25dc5df597595,2024-12-14T05:15:10.873000
|
||||
@ -245158,11 +245163,11 @@ CVE-2024-1628,0,0,462aaf7a2aba24826516994be48daf03675e0663819d4ebb8cdd24916637fb
|
||||
CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4d9,2024-11-21T08:50:57.473000
|
||||
CVE-2024-1630,0,0,9b1d75e935e3c43047021c7db741b2a5e1070d9e69f1d2a3037779c882a9deac,2024-11-21T08:50:57.613000
|
||||
CVE-2024-1631,0,0,e9e6578f8c2841fcf55accc66d2d8ed4ff49074482673094d89548de7e2bc4e7,2024-11-21T08:50:57.763000
|
||||
CVE-2024-1632,0,1,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000
|
||||
CVE-2024-1632,0,0,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000
|
||||
CVE-2024-1633,0,0,5ccb225bfb0a399abe7a70f1c6fd18da8846101e09ec9f5e0957953da34a4559,2024-11-21T08:50:58.023000
|
||||
CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13ab0,2024-11-21T08:50:58.150000
|
||||
CVE-2024-1635,0,0,880b45e2da4c6518c1b04e3791a09fd8632b660a2ba4a05adcb1a72ef7f1c218,2024-11-21T08:50:58.290000
|
||||
CVE-2024-1636,0,1,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000
|
||||
CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000
|
||||
CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000
|
||||
CVE-2024-1638,0,0,b370dab677aaa82f245c1884c116b7512ca8dfe0263cc60b1de857513f9922dc,2024-11-21T08:50:58.727000
|
||||
CVE-2024-1639,0,0,de447f38a3507556188a654289532a72df4270ff11bdecd8ce53d967434870bc,2024-11-21T08:50:58.857000
|
||||
@ -247230,7 +247235,7 @@ CVE-2024-21982,0,0,ff17b56a256c739f5063a3e2704f03bf15248a52f1ffefbb58b1e5faacb33
|
||||
CVE-2024-21983,0,0,4e2ed0f646abb96dbe85666b2c96a290c2f47be8ddb8c9b6f7ca141e2c151ce2,2024-12-13T17:55:06.957000
|
||||
CVE-2024-21984,0,0,ea7e8be87e57ddf1cb43cffb966825295076274918810d2103c7089d7850ac38,2024-12-13T17:55:08.837000
|
||||
CVE-2024-21985,0,0,63520fa4ce7e029aa7afb7a06539a8fcc598f88e49929e619949a1f3683b48e5,2024-11-21T08:55:19.830000
|
||||
CVE-2024-21987,0,1,d85b3fb5542f16b18141f4b484fe4fe5ba713fa828d101cd5609224cc2267582,2024-12-16T22:26:25.610000
|
||||
CVE-2024-21987,0,0,d85b3fb5542f16b18141f4b484fe4fe5ba713fa828d101cd5609224cc2267582,2024-12-16T22:26:25.610000
|
||||
CVE-2024-21988,0,0,55386eaddbe790c0c8f4791da8d917ba72db26c9496e2de58c929fb47d6a62a1,2024-12-13T17:26:35.453000
|
||||
CVE-2024-21989,0,0,0ad73d03e9628af845e6ee6949146e3dd5c4c8525c64a128b8111f64569064d5,2024-11-21T08:55:20.330000
|
||||
CVE-2024-2199,0,0,48b5d93e19b921381bbebd37d38ada79c5d016f1c0b1a24d51cb7868b725b7ab,2024-11-21T09:09:14.570000
|
||||
@ -247303,7 +247308,7 @@ CVE-2024-22068,0,0,3a2f9b2220ab6a2285bc85464bed279bdafd82fa06bcc024def5e82a1defa
|
||||
CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676c84,2024-08-20T17:22:39.500000
|
||||
CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000
|
||||
CVE-2024-22074,0,0,b3ae6a34f5cbd61f1ba3e8dcc86a120a08f8721281bdaf819b018b5694a237af,2024-11-21T08:55:30.200000
|
||||
CVE-2024-22075,0,1,0093ccb83ae0d7a5d912fce4dbf6fb27f3b91db656d6260efd5798729c4df123,2024-12-16T22:15:05.397000
|
||||
CVE-2024-22075,0,0,0093ccb83ae0d7a5d912fce4dbf6fb27f3b91db656d6260efd5798729c4df123,2024-12-16T22:15:05.397000
|
||||
CVE-2024-22076,0,0,21a4530da33e3bbfe45eac97ca96bfa62b7e645e33a45111dc73f1c2deead9cb,2024-11-21T08:55:30.577000
|
||||
CVE-2024-22077,0,0,9535482984f45d0a95cb58a7ab43b83ebc083de0c29c42f5d160c5ba6c2fa722,2024-11-21T08:55:30.760000
|
||||
CVE-2024-22078,0,0,a0f778a1893b4b1b7bee543bd328d375c770eb977c31a950a319401fc4dea6df,2024-11-21T08:55:31.020000
|
||||
@ -248305,7 +248310,7 @@ CVE-2024-23526,0,0,4305395dc5826f07bea7b7378fb8ce0efb6a5d427a42a91a1b6ee30ebf9a8
|
||||
CVE-2024-23527,0,0,284206a5d33f28b5a87cb46fb1a9bacb429433d17c2f54e297d7ee3c11560e71,2024-11-21T08:57:53.717000
|
||||
CVE-2024-23528,0,0,4ba28d53fc3284f3436ec7bd7c325913ceaf1b21e8308fe5042fc86dcc7b3689,2024-11-21T08:57:53.837000
|
||||
CVE-2024-23529,0,0,9c2cccfd923383e8c7a964ee79fac999b351989d3178014a815d0f98420026c3,2024-11-21T08:57:53.967000
|
||||
CVE-2024-2353,0,1,95bdce6fcd6db1a061b315b6ce55d64774b6240a4374b84886120dd80ffdb11e,2024-12-16T22:57:06.437000
|
||||
CVE-2024-2353,0,0,95bdce6fcd6db1a061b315b6ce55d64774b6240a4374b84886120dd80ffdb11e,2024-12-16T22:57:06.437000
|
||||
CVE-2024-23530,0,0,aa6df258570429dac99ad02d39eb8fe694453eee48bfd29b8fb0c420e2090544,2024-11-21T08:57:54.100000
|
||||
CVE-2024-23531,0,0,b002899f8147c0c8ad75afcad582132d16f4a3775c01f972bad16d552806e3a5,2024-11-21T08:57:54.233000
|
||||
CVE-2024-23532,0,0,7c8e275e0ba36c77ebba1d3abe33906a058bad73311f0066c91339433928a141,2024-11-21T08:57:54.370000
|
||||
@ -249604,7 +249609,7 @@ CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259e
|
||||
CVE-2024-2546,0,0,d8dbc24cbd7978c86546ddde71cebd01d25565528f565e6fd58763686c3d1a3e,2024-11-21T09:09:59.040000
|
||||
CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000
|
||||
CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000
|
||||
CVE-2024-25468,0,0,928d169d4e3dc75d045b40852a2506d43755498fc6de0035856df39fedecaf84,2024-11-21T09:00:51.550000
|
||||
CVE-2024-25468,0,1,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000
|
||||
CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000
|
||||
CVE-2024-2547,0,0,d51d6810aa146e933146766a166169fe2343ecf22475f64c42ecbdb23ae82c57,2024-11-21T09:09:59.170000
|
||||
CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000
|
||||
@ -251952,7 +251957,7 @@ CVE-2024-28320,0,0,156b627473e5ac6bcd288f42ccc346804a8651dfc17bef3f6969a7ebea1ce
|
||||
CVE-2024-28322,0,0,4d8f57dcf95c839919bd19e58d706ebb428b316858edbbc8a9f943ea2521b9e8,2024-11-21T09:06:10.940000
|
||||
CVE-2024-28323,0,0,9e5e2a70f2e5e23491acdbf55cb239ce131de5927f67f0ce1e28bc2023e2002d,2024-11-21T09:06:11.183000
|
||||
CVE-2024-28325,0,0,d1249e48fae34e16a671fbfa77e65f35cecb442da7d1f3e92632a41ef5549acc,2024-11-21T09:06:11.407000
|
||||
CVE-2024-28326,0,0,e24dfe67a26487f8176a99407d927d0e593755c240f19f509edd384fdee0783e,2024-11-21T09:06:11.630000
|
||||
CVE-2024-28326,0,1,50700555c90e4995a2db0290d92539dbadb4550abe62f00e140f1b1674d98ffd,2024-12-16T23:15:06.253000
|
||||
CVE-2024-28327,0,0,1360bb692019a7ed2321e173175aa263e8cbe1c8a295b26b0cc70a6baaa74d06,2024-11-21T09:06:11.867000
|
||||
CVE-2024-28328,0,0,3d9a6b8d42a538362e64f311f5c93eb07142a313db6510d418a4b48150139e7c,2024-11-21T09:06:12.097000
|
||||
CVE-2024-2833,0,0,a59311d12fb4173260131d2df415a4e491307922af927e96d97d65e65d51cf4e,2024-11-21T09:10:38.167000
|
||||
@ -252077,7 +252082,7 @@ CVE-2024-28623,0,0,6b592373ccc058b15c8f7db49b78bfd3e2635e462da34d22a443dc2b48722
|
||||
CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000
|
||||
CVE-2024-2863,0,0,a5b592af60b81b1b665877763bf56c5ec2758267e95bafeacc6ae0c7642054e8,2024-11-21T09:10:42.503000
|
||||
CVE-2024-28635,0,0,61242df335a44a1ffcc8a35eed585f9c6d6e29d973b2b56cd4e07379c5b17c10,2024-11-21T09:06:42.367000
|
||||
CVE-2024-28639,0,1,c3d818d5c7f5eb0feffae38930cd9ee930ce1e830fa6140cd69a998011b8b07b,2024-12-16T22:56:31.737000
|
||||
CVE-2024-28639,0,0,c3d818d5c7f5eb0feffae38930cd9ee930ce1e830fa6140cd69a998011b8b07b,2024-12-16T22:56:31.737000
|
||||
CVE-2024-2864,0,0,3c502f13e25ec0d6338270f38aa63b5e89435a030dae1785f088aeae83e8039f,2024-11-21T09:10:42.620000
|
||||
CVE-2024-28640,0,0,990c29eb8c733a819b0a31dbb2e2b0510b47e9a808edbc4e02611ff94875e45d,2024-11-21T09:06:42.733000
|
||||
CVE-2024-2865,0,0,5829b9f895a4ba79b3592f650e6f3b7b48b361c5424fd86986d5cdb1471edc67,2024-11-21T09:10:42.747000
|
||||
@ -252729,7 +252734,7 @@ CVE-2024-29661,0,0,33eeb097530dd938963a006813b514ee2f217b4805f64bf726e22f92b9d6f
|
||||
CVE-2024-29666,0,0,4816994d3696247c03b8328a9343bd38453cca8e45ebbf1e319026a45443ab8c,2024-11-21T09:08:09.110000
|
||||
CVE-2024-29667,0,0,34b7576b4d736dd47cfaa8af367e24a2a8c6269ec16e4c867b990e680ca7d10e,2024-11-21T09:08:09.327000
|
||||
CVE-2024-2967,0,0,d2ac382f00d4575193077f03ec53a42d2b3a92c77fb89b30f0dc868e4936acc2,2024-11-21T09:10:57.113000
|
||||
CVE-2024-29671,1,1,f78ef3d23b5c136143332597260fa0b86803b52801c6b77bb59392b05f2af3a7,2024-12-16T22:15:05.623000
|
||||
CVE-2024-29671,0,0,f78ef3d23b5c136143332597260fa0b86803b52801c6b77bb59392b05f2af3a7,2024-12-16T22:15:05.623000
|
||||
CVE-2024-29672,0,0,fed6aba6c72c648701c1be281c4b9f1cd2e136095e68e86097f193f0a03d9cf4,2024-11-21T09:08:09.547000
|
||||
CVE-2024-2968,0,0,8581bb73f79fa107c2dede83ff67ae98d1d7fb9830fdfb49f54e97d6c8c6ffcf,2024-11-21T09:10:57.223000
|
||||
CVE-2024-29684,0,0,e8dbdce83a941c64ac6edc30c8842538d41a99e6916fd5c622b5fa9cb194cb43,2024-11-21T09:08:09.727000
|
||||
@ -256978,6 +256983,7 @@ CVE-2024-35227,0,0,f603064d312bdc0236cec2fadb9b100a9b378e884da8c1127fcb9b1191967
|
||||
CVE-2024-35228,0,0,71272b772368179098bc4880da40d61506624e75d28f6489fd71d5eca6523168,2024-11-21T09:19:58.907000
|
||||
CVE-2024-35229,0,0,ada2646518271eaef8855ecc7c3fc8ba90d5b71f7cb323412a25a97d186b4612,2024-11-21T09:19:59.010000
|
||||
CVE-2024-3523,0,0,fc36607b1b975bc950ca25209a56f960461c6b097ca9c650e695dddb8c488a1e,2024-11-21T09:29:46.660000
|
||||
CVE-2024-35230,1,1,92ae45e983006a8b445e602cdf1231b319e8ba440ceb767b00841e4d44e8ca79,2024-12-16T23:15:06.467000
|
||||
CVE-2024-35231,0,0,a1826f3cff4a6dc3aa78243c02b10a4ba54c00dc4dcc3d2a95804f3143227620,2024-11-21T09:19:59.130000
|
||||
CVE-2024-35232,0,0,ae66f9a641dd0b3190010f0319689bc1a6b70ec2a4eec811f6d529159f146823,2024-11-21T09:19:59.250000
|
||||
CVE-2024-35234,0,0,7a4620a92a838ed11dd238a47e2ec5aa7137e8cced27e60b471a70c16df96b28,2024-11-21T09:19:59.373000
|
||||
@ -258337,7 +258343,7 @@ CVE-2024-37014,0,0,257b596aa12a66b3b59835d0a8b2a6126ed475c4cf9b68495d6b50a60cb76
|
||||
CVE-2024-37015,0,0,17bce9aed0f7ee30858a58f944cc52f66e293b9c5c98086bff089bdfbba147d6,2024-08-14T02:07:05.410000
|
||||
CVE-2024-37016,0,0,c006bcb1533ca25fbf8d572424a361ab92f35ad6ae26a93d7478436ff7ecabb8,2024-11-21T09:23:02.640000
|
||||
CVE-2024-37017,0,0,9e9e7d245ae7636635d8fb9b7646e69ff4740b4aee32b577e749a761315fc0d5,2024-11-21T09:23:02.880000
|
||||
CVE-2024-37018,0,1,dcf2b63abe61db319847b5d7e942c36af68b31f1cafe8b47e5200c9fd8419d58,2024-12-16T21:15:07.897000
|
||||
CVE-2024-37018,0,0,dcf2b63abe61db319847b5d7e942c36af68b31f1cafe8b47e5200c9fd8419d58,2024-12-16T21:15:07.897000
|
||||
CVE-2024-37019,0,0,019f9cadac30cdb47b60ef4c54cc291462b2bdbecfeff69d16099a4eb4863742,2024-11-21T09:23:03.357000
|
||||
CVE-2024-37021,0,0,aed1982ac5de94bdbba8a7c49a4c522e3a714c206212126f326e10e002ec5c2c,2024-12-14T21:15:18.940000
|
||||
CVE-2024-37022,0,0,58e15183af3d32942869fe6953f465d4e55099ab2b6c8139c4c8d08e686f90ce,2024-11-21T09:23:03.690000
|
||||
@ -258524,7 +258530,7 @@ CVE-2024-37219,0,0,fbfce4ee9d32dccb1adfe41d3da7347260b18aa3120562b4afeb8741bafe1
|
||||
CVE-2024-3722,0,0,ca72fa86ee5f0692b7634b6034f69bad7dcda24d2e864ef167dcf141b91c8041,2024-11-21T09:30:14.767000
|
||||
CVE-2024-37220,0,0,98d9557c0b2373c397e391012330889d93a206debfe4bd63da11842d272eb9c9,2024-11-01T20:24:53.730000
|
||||
CVE-2024-37221,0,0,f70f8b30d6de7a3f96201731122d40658150f4e153b628cc732f86246b03217b,2024-11-21T09:23:25.603000
|
||||
CVE-2024-37222,0,1,de8aff0b0bffb385b0cfb0c7d08561d0ba9c733f17df16e27a2ec78b473c92f9,2024-12-16T22:15:05.827000
|
||||
CVE-2024-37222,0,0,de8aff0b0bffb385b0cfb0c7d08561d0ba9c733f17df16e27a2ec78b473c92f9,2024-12-16T22:15:05.827000
|
||||
CVE-2024-37223,0,0,0749ccb6a47c50f6954d5cd047e4747c55d1f3709342aa462f514f8195d3b1b1,2024-11-21T09:23:25.977000
|
||||
CVE-2024-37224,0,0,16af1d8f7084895f19150b776b7ea9ba3e194d1de5b36a77065680997f98e2a7,2024-11-21T09:23:26.107000
|
||||
CVE-2024-37225,0,0,2632f3ce1fac81f432fab34e6e841b74462f734ca24cfa3af34d37538e8219de,2024-11-21T09:23:26.237000
|
||||
@ -258918,10 +258924,10 @@ CVE-2024-37768,0,0,2793d768190db7539c96d73238c8df462702d3812318427858b72a73db2bd
|
||||
CVE-2024-37769,0,0,ebb9ba49fb51ffaaf91f9ff8b56894aba69c0664bde10d7ebfe9dd5080822c95,2024-11-21T09:24:18.103000
|
||||
CVE-2024-3777,0,0,6d6468a79705e917b5409dc4c8295a80d29b4efb80ab5212b3e5097b80656f73,2024-11-21T09:30:22.660000
|
||||
CVE-2024-37770,0,0,3ae1b26b08d620f39fd2fc9b0f3e94aeedfe3c4571e06714b0c443b19a9d4c82,2024-11-21T09:24:18.330000
|
||||
CVE-2024-37773,1,1,93d9ddc1d9f09d51843a8aaeb77f6802f5055b280bcfad25197353f14e6cb724,2024-12-16T22:15:05.947000
|
||||
CVE-2024-37774,1,1,0f9205692d47d96c1f194965853ef62a648c1c35c924aa3032410012602a886c,2024-12-16T22:15:06.127000
|
||||
CVE-2024-37775,1,1,6fca9c78ef78fee4e7965b345eb1401a7cd0185244555ec5f57036f65d870f7a,2024-12-16T22:15:06.310000
|
||||
CVE-2024-37776,1,1,2329494dd388ac6fd3c103113eeffe6506d2f069b83bc9c3e1702765b8c7acc5,2024-12-16T22:15:06.490000
|
||||
CVE-2024-37773,0,0,93d9ddc1d9f09d51843a8aaeb77f6802f5055b280bcfad25197353f14e6cb724,2024-12-16T22:15:05.947000
|
||||
CVE-2024-37774,0,0,0f9205692d47d96c1f194965853ef62a648c1c35c924aa3032410012602a886c,2024-12-16T22:15:06.127000
|
||||
CVE-2024-37775,0,0,6fca9c78ef78fee4e7965b345eb1401a7cd0185244555ec5f57036f65d870f7a,2024-12-16T22:15:06.310000
|
||||
CVE-2024-37776,0,0,2329494dd388ac6fd3c103113eeffe6506d2f069b83bc9c3e1702765b8c7acc5,2024-12-16T22:15:06.490000
|
||||
CVE-2024-37779,0,0,0aba20750978da4733349dadb1ca63b8044cf1d1605f2dd296fab6c62fcf39fd,2024-09-27T14:35:03.517000
|
||||
CVE-2024-3778,0,0,c5841f5de458f7e0e081b666f7a24d50a31cf8db2d38b0a5550274be6f0978b4,2024-11-21T09:30:22.783000
|
||||
CVE-2024-37782,0,0,e9f210e7f42c046d75d0b9f25adae39b4e1c61a1f888965bb1e0dfce89ee0e10,2024-11-27T17:15:11.320000
|
||||
@ -263743,7 +263749,7 @@ CVE-2024-44285,0,0,f52551cd151272e75e2e9c1e860d275100cc0677baa4f8ad08a471b6223e7
|
||||
CVE-2024-44287,0,0,f9ab1474cc919e4b5efc0187cf8790f17d184d2909fbec86726d782e04489fe8,2024-10-30T19:35:21.620000
|
||||
CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9238,2024-10-30T16:35:28.097000
|
||||
CVE-2024-4429,0,0,a4a8f97ae1846585dda39a340897585bd413fb1368db5055aa3e7c7ef6d4f3eb,2024-11-21T09:42:48.820000
|
||||
CVE-2024-44290,0,1,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000
|
||||
CVE-2024-44290,0,0,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000
|
||||
CVE-2024-44291,0,0,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000
|
||||
CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000
|
||||
CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000
|
||||
@ -269058,7 +269064,7 @@ CVE-2024-5271,0,0,476c650ea868780269a16562f21ebd1f82fa6ae8de0222fc09d18e39c04683
|
||||
CVE-2024-52711,0,0,82705d4537efc544b27f97ea7020a29c63df676da0b3887989e8d0472e895393,2024-11-22T18:15:17.860000
|
||||
CVE-2024-52714,0,0,d68bd2e6ba70a01a513d32cac86943fd8254d4c3004a24bfd1d27a6a8a9329d8,2024-11-20T20:35:15.260000
|
||||
CVE-2024-5272,0,0,fdbec5333cf64f4ba2599bc33574360d57e60dfadb483e1b524d6c59f71a8f55,2024-11-21T09:47:19.460000
|
||||
CVE-2024-52723,0,1,cf167c520fb0aa50ebf4b153534b6ac9fbe624dd8f2d42728ec1b6f457e27a0a,2024-12-16T22:56:02.690000
|
||||
CVE-2024-52723,0,0,cf167c520fb0aa50ebf4b153534b6ac9fbe624dd8f2d42728ec1b6f457e27a0a,2024-12-16T22:56:02.690000
|
||||
CVE-2024-52724,0,0,30b8a3d6a9741c46bc5b8b7f06f527180966ee6ba100cd8150e213f1d6a21cd5,2024-12-03T15:15:10.943000
|
||||
CVE-2024-52725,0,0,ca83ad92f53ba791b675728b41a882f6bce2ad034a322e498ad5b1a0459b09dd,2024-12-02T21:15:10.977000
|
||||
CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
|
||||
@ -269193,7 +269199,7 @@ CVE-2024-52944,0,0,13f4728598a9169659ecc5ab8bdcbf29b2aee05592382aeebb2b7ebc79d90
|
||||
CVE-2024-52945,0,0,2be5483c630004e32670c1bf2df159c2fc165530e70f2dd74d5a6bc11ca631e4,2024-11-19T16:35:20.020000
|
||||
CVE-2024-52946,0,0,4f1dfe8b6d1ba4959015bfa97e83493e2bb850117484cc15efcaa811c3e03c50,2024-11-21T18:15:13.120000
|
||||
CVE-2024-52947,0,0,2aee58f94b954efaf5164df4a8e601015dc1edc796a589e4848762e3088ebedd,2024-11-18T18:35:09.517000
|
||||
CVE-2024-52949,1,1,e399963e973ceb09f4ad169d9f8a9d211a08869e0805a687628b565bec3e58f1,2024-12-16T22:15:06.863000
|
||||
CVE-2024-52949,0,0,e399963e973ceb09f4ad169d9f8a9d211a08869e0805a687628b565bec3e58f1,2024-12-16T22:15:06.863000
|
||||
CVE-2024-5295,0,0,2396dadecb35968608e7faeb909b9c67144b6a2007cc474b7ce69341811bcf77,2024-11-21T09:47:22.707000
|
||||
CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be506ce,2024-11-27T21:15:07.997000
|
||||
CVE-2024-52958,0,0,965d541bdaa048d08984be57ec6ff291abae1c702954dddd32ec7b0108549df9,2024-11-27T06:15:18.590000
|
||||
@ -270070,7 +270076,7 @@ CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61
|
||||
CVE-2024-54466,0,0,007391ad25f3f19d155f1bab4a612386e47b938cdb46a1c1a05637652e9969fd,2024-12-12T22:15:08.213000
|
||||
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
|
||||
CVE-2024-54471,0,0,3399111b76a7b53e131dff58753f99905e82fd008f1a9ed162ad52c89d594216,2024-12-12T16:15:55.950000
|
||||
CVE-2024-54474,0,1,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
|
||||
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
|
||||
CVE-2024-54476,0,0,68c89cbda1080d94857c8a6c6e5c4dec737447f9cf0eadf8018f4f30bdd8add6,2024-12-12T16:15:56.120000
|
||||
CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000
|
||||
CVE-2024-54479,0,0,8bf37387c4dde8f9cdb0a9e834e8462f66fa3d4a2f05b2799b2fc0f12fb282aa,2024-12-13T18:24:34.090000
|
||||
@ -270103,12 +270109,12 @@ CVE-2024-54514,0,0,380ef09666130bacefa842b3b0a77661fb0c21e237fde90a103631522071a
|
||||
CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000
|
||||
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
|
||||
CVE-2024-54524,0,0,5b400e695af2f949d2ec71578d693bc64ad75aad1f72a1927a39d0da75803b87,2024-12-12T17:15:11.020000
|
||||
CVE-2024-54526,0,1,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
|
||||
CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
|
||||
CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000
|
||||
CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000
|
||||
CVE-2024-54529,0,0,4f4002a20fd537285918affdb270ea26020a04c1a9cd33ae156b57c42a237915,2024-12-12T16:15:56.893000
|
||||
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
|
||||
CVE-2024-54531,0,1,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
|
||||
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
|
||||
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
|
||||
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
|
||||
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
|
||||
@ -270195,12 +270201,13 @@ CVE-2024-5505,0,0,ef8367efb8e62f4d28c1b33787b307fdb06367b98441e7dd6605a6aed68ed8
|
||||
CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000
|
||||
CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000
|
||||
CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000
|
||||
CVE-2024-55085,1,1,dfb0ad4a638155de193b6915984b27bb48398890d42d46adbc5f163f416532a2,2024-12-16T23:15:06.607000
|
||||
CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000
|
||||
CVE-2024-55099,0,1,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000
|
||||
CVE-2024-55099,0,0,003c2c4ff22797586cb2187909eccd6b57a79cec935dd7f92d4829aaa1d0563a,2024-12-16T21:15:08.253000
|
||||
CVE-2024-5510,0,0,75afe647f1d2c625afdbb2c36005f62cfbbe97b6f78e4011e89b81919ed96856,2024-11-22T20:15:09.343000
|
||||
CVE-2024-55100,1,1,f08ace675d18e46eda17b649c65a035d03a4e169b495a06779f1333383217dc1,2024-12-16T21:15:08.427000
|
||||
CVE-2024-55103,1,1,5853bfed60c8178932a3f09933fb05b9ed87e8cb68668f65d0135c39defe5c16,2024-12-16T21:15:08.553000
|
||||
CVE-2024-55104,1,1,b54a78b5f3926e62c545af204c3ce45999442b8dd52ae145d41a8c3ee89ae96b,2024-12-16T21:15:08.670000
|
||||
CVE-2024-55100,0,0,f08ace675d18e46eda17b649c65a035d03a4e169b495a06779f1333383217dc1,2024-12-16T21:15:08.427000
|
||||
CVE-2024-55103,0,0,5853bfed60c8178932a3f09933fb05b9ed87e8cb68668f65d0135c39defe5c16,2024-12-16T21:15:08.553000
|
||||
CVE-2024-55104,0,0,b54a78b5f3926e62c545af204c3ce45999442b8dd52ae145d41a8c3ee89ae96b,2024-12-16T21:15:08.670000
|
||||
CVE-2024-5511,0,0,56fb77e68915452d67789c3a74a2cde0633cd6fde099063447a457a2d0c56373,2024-11-22T20:15:09.453000
|
||||
CVE-2024-5512,0,0,e291a0f62c622b98719d0669427609426642277e7e0c79f3db83875786e582a2,2024-11-22T20:15:09.563000
|
||||
CVE-2024-5513,0,0,6fc05209f2de569aa2d53ff875b7b70727a658dcae4b0d69e9a3aacc36b9dc55,2024-11-22T20:15:09.673000
|
||||
@ -270233,6 +270240,8 @@ CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5
|
||||
CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000
|
||||
CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000
|
||||
CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4f5,2024-11-21T09:47:53.940000
|
||||
CVE-2024-55451,1,1,33d13ace4f05ddc223ccbf83de668e0d3737ecf73982be80adcb7bcf1bffbe89,2024-12-16T23:15:06.710000
|
||||
CVE-2024-55452,1,1,cdbaf3d6dba9fdc1b4cf83a0de9ee6c72b6b4a505720de4e35a2614fd30fca23,2024-12-16T23:15:06.817000
|
||||
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
||||
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
|
||||
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
|
||||
@ -270250,8 +270259,8 @@ CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85af
|
||||
CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000
|
||||
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
|
||||
CVE-2024-55550,0,0,083b12aa55fd376f21b90ec42869839cac3f2d3ae5f0c3d1ccf8b929f82d5435,2024-12-11T15:15:19.653000
|
||||
CVE-2024-55554,1,1,24198bbf39b86e96bbc821836c0d923e43c75a2991fb21dc284e91e42ed5d155,2024-12-16T22:15:07.477000
|
||||
CVE-2024-55557,1,1,5d9f360423c6569f6da4bdefa27bfe0561b88244f9a5fc46fba37875e3828b4c,2024-12-16T21:15:08.783000
|
||||
CVE-2024-55554,0,0,24198bbf39b86e96bbc821836c0d923e43c75a2991fb21dc284e91e42ed5d155,2024-12-16T22:15:07.477000
|
||||
CVE-2024-55557,0,0,5d9f360423c6569f6da4bdefa27bfe0561b88244f9a5fc46fba37875e3828b4c,2024-12-16T21:15:08.783000
|
||||
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
|
||||
CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000
|
||||
CVE-2024-55563,0,0,18204ee9bcd7a443817ede90b4af782476bfed51d18ddfae7057258f3016b43a,2024-12-09T01:15:06.313000
|
||||
@ -270369,6 +270378,7 @@ CVE-2024-56011,0,0,0a424cb818da7335bf1f0c462b0a349e91b8f3641cc66bb68166f781c159c
|
||||
CVE-2024-56012,0,0,1294e1b9cfda889d2897343dbdd5a8f0d69df1b88d00748e64c163cc5857799d,2024-12-16T15:15:27.943000
|
||||
CVE-2024-56013,0,0,98d5f16619c75bf7700fe13a8918184b7016cc1b87371ca36dfb3fcf7e341f9c,2024-12-16T15:15:28.090000
|
||||
CVE-2024-56015,0,0,a40d49c757aa948f90c29b7c6bdf9b80dad98326d3e52005d5d7b1f0a780c74b,2024-12-16T15:15:28.230000
|
||||
CVE-2024-56017,1,1,7eef9fb5124dee0b581e34fbc52a1cfe55d67df71e2e8706e4badc71fbd3ebc8,2024-12-16T23:15:06.923000
|
||||
CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000
|
||||
CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000
|
||||
CVE-2024-5605,0,0,a58f7d5ea1a1f097543f1fa828fe0f4d77e53004da146d280334895bad6f3fd1,2024-11-21T09:48:00.363000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user