mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-12-25T17:00:19.609757+00:00
This commit is contained in:
parent
7aec33761a
commit
e6b545b346
56
CVE-2023/CVE-2023-51xx/CVE-2023-5117.json
Normal file
56
CVE-2023/CVE-2023-51xx/CVE-2023-5117.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-5117",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2024-12-25T15:15:05.900",
|
||||
"lastModified": "2024-12-25T15:15:05.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware that files uploaded to comments on confidential issues and epics of public projects could be accessed without authentication via a direct link to the uploaded file URL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-213"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/398250",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-471xx/CVE-2024-47102.json
Normal file
56
CVE-2024/CVE-2024-471xx/CVE-2024-47102.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47102",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-25T15:15:06.583",
|
||||
"lastModified": "2024-12-25T15:15:06.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1\n\ncould allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179826",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-479xx/CVE-2024-47978.json
Normal file
56
CVE-2024/CVE-2024-479xx/CVE-2024-47978.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47978",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-25T15:15:06.780",
|
||||
"lastModified": "2024-12-25T15:15:06.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2024-51464",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-21T14:15:21.627",
|
||||
"lastModified": "2024-12-21T14:15:21.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-12-25T15:15:07.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed to perform when using Navigator for i."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM i 7.3, 7.4 y 7.5 es vulnerable a la omisi\u00f3n de las restricciones de la interfaz de Navigator for i. Al enviar una solicitud especialmente manipulada, un atacante autenticado podr\u00eda aprovechar esta vulnerabilidad para realizar de forma remota operaciones que el usuario no tiene permitido realizar cuando utiliza Navigator for i."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
@ -42,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-644"
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
56
CVE-2024/CVE-2024-525xx/CVE-2024-52534.json
Normal file
56
CVE-2024/CVE-2024-525xx/CVE-2024-52534.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-52534",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-25T16:15:21.997",
|
||||
"lastModified": "2024-12-25T16:15:21.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Session theft."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-525xx/CVE-2024-52535.json
Normal file
56
CVE-2024/CVE-2024-525xx/CVE-2024-52535.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-52535",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-25T15:15:07.247",
|
||||
"lastModified": "2024-12-25T15:15:07.247",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-61"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000261086/dsa-2024-470-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-525xx/CVE-2024-52543.json
Normal file
56
CVE-2024/CVE-2024-525xx/CVE-2024-52543.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-52543",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-25T16:15:22.387",
|
||||
"lastModified": "2024-12-25T16:15:22.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-378"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-529xx/CVE-2024-52906.json
Normal file
56
CVE-2024/CVE-2024-529xx/CVE-2024-52906.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-52906",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-25T15:15:07.470",
|
||||
"lastModified": "2024-12-25T15:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1\n\n\n\ncould allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7179826",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-532xx/CVE-2024-53291.json
Normal file
56
CVE-2024/CVE-2024-532xx/CVE-2024-53291.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53291",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-12-25T15:15:07.673",
|
||||
"lastModified": "2024-12-25T15:15:07.673",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Exposure of Sensitive Information Through Metadata vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1230"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-25T15:00:19.888898+00:00
|
||||
2024-12-25T17:00:19.609757+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-25T14:15:22.610000+00:00
|
||||
2024-12-25T16:15:22.387000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274661
|
||||
274669
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-39725](CVE-2024/CVE-2024-397xx/CVE-2024-39725.json) (`2024-12-25T14:15:21.660`)
|
||||
- [CVE-2024-39727](CVE-2024/CVE-2024-397xx/CVE-2024-39727.json) (`2024-12-25T14:15:22.610`)
|
||||
- [CVE-2024-8950](CVE-2024/CVE-2024-89xx/CVE-2024-8950.json) (`2024-12-25T13:15:19.057`)
|
||||
- [CVE-2023-5117](CVE-2023/CVE-2023-51xx/CVE-2023-5117.json) (`2024-12-25T15:15:05.900`)
|
||||
- [CVE-2024-47102](CVE-2024/CVE-2024-471xx/CVE-2024-47102.json) (`2024-12-25T15:15:06.583`)
|
||||
- [CVE-2024-47978](CVE-2024/CVE-2024-479xx/CVE-2024-47978.json) (`2024-12-25T15:15:06.780`)
|
||||
- [CVE-2024-52534](CVE-2024/CVE-2024-525xx/CVE-2024-52534.json) (`2024-12-25T16:15:21.997`)
|
||||
- [CVE-2024-52535](CVE-2024/CVE-2024-525xx/CVE-2024-52535.json) (`2024-12-25T15:15:07.247`)
|
||||
- [CVE-2024-52543](CVE-2024/CVE-2024-525xx/CVE-2024-52543.json) (`2024-12-25T16:15:22.387`)
|
||||
- [CVE-2024-52906](CVE-2024/CVE-2024-529xx/CVE-2024-52906.json) (`2024-12-25T15:15:07.470`)
|
||||
- [CVE-2024-53291](CVE-2024/CVE-2024-532xx/CVE-2024-53291.json) (`2024-12-25T15:15:07.673`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-51464](CVE-2024/CVE-2024-514xx/CVE-2024-51464.json) (`2024-12-25T15:15:07.040`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
16
_state.csv
16
_state.csv
@ -238894,6 +238894,7 @@ CVE-2023-5115,0,0,05e3e9c0dc22461b743c2358ed803bf3147865ec12621e61796b475c03cf4d
|
||||
CVE-2023-51154,0,0,1004622243e2a435c323ad288b161b00e21408178e87064850a86cae0dcdcde9,2024-11-21T08:37:54.250000
|
||||
CVE-2023-51157,0,0,9f80b18b8a7b0cc4aad6087dd59c00b328d310cd40a9013afb508a333bdacafe,2024-10-02T16:58:20.160000
|
||||
CVE-2023-5116,0,0,0bc0d2ef7183d3d186c53da0d73b888a77982cd2f16a155c36bbb3ba3253d10a,2024-11-21T08:41:05.700000
|
||||
CVE-2023-5117,1,1,193cecfcabcb618dc9d93c7901e5c5be200e79c307e3a0b36f2f1d5c0d172aa1,2024-12-25T15:15:05.900000
|
||||
CVE-2023-5118,0,0,6f35b4b16a80a49be4e878b09580eb14452d102547cf5069f64518854ff08ff0,2024-11-21T08:41:05.817000
|
||||
CVE-2023-5119,0,0,ecf16c6c035e79f3eaf6e343ec94472bd0208a5d903462d13517d90122e996ee,2024-11-21T08:41:05.940000
|
||||
CVE-2023-51195,0,0,51f71cede0bdb9c7936f2282fb83cb0df673897fa19475ea77fc955e31990b5f,2024-01-10T20:15:45.393000
|
||||
@ -260803,9 +260804,9 @@ CVE-2024-39720,0,0,56b4d276b5bf79d64e33d4488006377883d1926ea37aa08bbe14b948e3752
|
||||
CVE-2024-39721,0,0,8f383f081975755f1c8480c4d7c46c7557e3da56494ccedacf667eae60e062c2,2024-11-01T16:35:24.357000
|
||||
CVE-2024-39722,0,0,3310dd431aef43138d89a0489db78429e88bdad0641d09cdee269db9d8d13bc9,2024-11-01T15:35:17.693000
|
||||
CVE-2024-39723,0,0,bcb1dcc110c96a14094bcf053f7153eaf6a2b700a5f4ed663f41b81704e99c3a,2024-11-21T09:28:17.990000
|
||||
CVE-2024-39725,1,1,b31874f936a4e878816fa89600e0cbd518ebb1293c5348d1670a96439fee6178,2024-12-25T14:15:21.660000
|
||||
CVE-2024-39725,0,0,b31874f936a4e878816fa89600e0cbd518ebb1293c5348d1670a96439fee6178,2024-12-25T14:15:21.660000
|
||||
CVE-2024-39726,0,0,84f4bd0f0e66fd1792095fdf470f4f3cbdbdc235abdd5805255bdd32721e778c,2024-11-19T21:51:40.093000
|
||||
CVE-2024-39727,1,1,92ce461235c4c1c06a5ed4f32da0b358b5d53e84b1c4c1e92c4ef357cc1150e6,2024-12-25T14:15:22.610000
|
||||
CVE-2024-39727,0,0,92ce461235c4c1c06a5ed4f32da0b358b5d53e84b1c4c1e92c4ef357cc1150e6,2024-12-25T14:15:22.610000
|
||||
CVE-2024-39728,0,0,419d6522507eb930af7ae6835142d3dcdf46166050b6817f37759954abce17b8,2024-11-21T09:28:18.217000
|
||||
CVE-2024-39729,0,0,17ef6112215ce540557fe392c3c226b8e791e3105e6cb641f6eb9b3c8bbe26c4,2024-11-21T09:28:18.363000
|
||||
CVE-2024-3973,0,0,1e562721e06ec34010a875bed42bd8dd124b3449743c9a2acf9ba1a2336534dd,2024-08-07T15:17:46.717000
|
||||
@ -265702,6 +265703,7 @@ CVE-2024-47093,0,0,80d34acd1d42b9ec0548b5c2bde111c84ef7562ed8aa3809448dda19ce45d
|
||||
CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000
|
||||
CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000
|
||||
CVE-2024-47102,1,1,688756206af77c535c639193cbdc434ec4118c056e1cad14389fde58683cce7b,2024-12-25T15:15:06.583000
|
||||
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
|
||||
CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000
|
||||
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
|
||||
@ -266425,6 +266427,7 @@ CVE-2024-47974,0,0,5b42e76afcab24c20bdceb8d619dc3b1d3700c61728605186411865d26bbe
|
||||
CVE-2024-47975,0,0,919a5c25fcfdd1004bec82ba910db5fe6300dd9cdcfe2f11fc4b0bb574f4091b,2024-10-11T20:15:05.143000
|
||||
CVE-2024-47976,0,0,b7d584a3048cada45c1f6e92a2751d3e6ae6406892198b5d0fe37bebaa37f847,2024-10-17T22:15:03.210000
|
||||
CVE-2024-47977,0,0,e38680112a30ad62187a3d04ee7a979b5da459a2a6058680229404134a82d5e8,2024-12-16T11:15:06.370000
|
||||
CVE-2024-47978,1,1,76107c041bb3501b5273abccab3ce5a69dde08406393598adbaa4319b08b2a11,2024-12-25T15:15:06.780000
|
||||
CVE-2024-4798,0,0,67d409a675b221a14312164f5cc62c5f24d760e91c26863f4b27a369f421db4d,2024-11-21T09:43:38.167000
|
||||
CVE-2024-47984,0,0,f2bdbdc582424541b49afcc3246712b531918aae288858fba96175f001d774bf,2024-12-13T15:15:27.110000
|
||||
CVE-2024-4799,0,0,bcde09b7182d8e0e6116d4d77d66aa7fc678a4d38a1639ef2abc6c729d992c49,2024-11-21T09:43:38.320000
|
||||
@ -268561,7 +268564,7 @@ CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8
|
||||
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
|
||||
CVE-2024-51460,0,0,5ed8cb0bc6e7264a024f4fdc6bea49f8d819c03171033b2027328a825c325cb4,2024-12-11T13:15:06.510000
|
||||
CVE-2024-51463,0,0,c10145e6070215d7c0984525084a5c3afdf7565c93303fbc3fb7373df154d225,2024-12-21T14:15:21.453000
|
||||
CVE-2024-51464,0,0,69f5d546a83bdd7683722d0859a88a640e895a1b44c51270e757af6904b8f33c,2024-12-21T14:15:21.627000
|
||||
CVE-2024-51464,0,1,6976cf6244f493a37311fb0cbfbc33c06ff05664e1a61fb69527ac2b03e9107d,2024-12-25T15:15:07.040000
|
||||
CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000
|
||||
CVE-2024-51466,0,0,f8d3d47f89339e1c49e199d4d29061c3398d8045235700eb4ff399548ec59171,2024-12-20T14:15:24.250000
|
||||
CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000
|
||||
@ -269374,10 +269377,13 @@ CVE-2024-52530,0,0,78f036a07a80d7c50933eab4b5ec3e54640dd9a8e9ce77e883bfb2118e573
|
||||
CVE-2024-52531,0,0,8eedc16d1aadf080c6f2b302997fd47ee6a376af2a4466e43fcf9633d24182c6,2024-11-12T19:35:15.807000
|
||||
CVE-2024-52532,0,0,54c3190a0eeff653a8f66dda7fd5b580cc7aa4648618e83320436fca355bcda1,2024-11-12T19:35:16.970000
|
||||
CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff06bd,2024-12-06T14:15:21.400000
|
||||
CVE-2024-52534,1,1,7820e0ba924890a736ce88aba45e59a78e389d023258ec741d265aac9be5c12b,2024-12-25T16:15:21.997000
|
||||
CVE-2024-52535,1,1,2fc6a4a30035252b3fe1efc0866346ed5a93aa19e5169be6ec428c9c99a9b9ff,2024-12-25T15:15:07.247000
|
||||
CVE-2024-52537,0,0,79d5bab7a316a4a5e36b347dfcb08651d568dc7cb64073148e1c1e42669123b6,2024-12-11T08:15:05.747000
|
||||
CVE-2024-52538,0,0,1bae7e87d532ab1b896b47e33928c8b9835fb6690e8325140679d38a93ad90cb,2024-12-16T11:15:06.523000
|
||||
CVE-2024-5254,0,0,b08a56d01443c9abf44ee33ecfae9cdfa73a8d20318044fcd2f5caa1e9d31f2e,2024-11-21T09:47:17.063000
|
||||
CVE-2024-52542,0,0,b9ef140e9aba5b496ed2c25474c1d2f358b5c656839b56a93dea59533bce0be8,2024-12-17T12:15:20.703000
|
||||
CVE-2024-52543,1,1,f95691332b8723e38141c007d14687ca24f6efa2e91837c90720d3d872189100,2024-12-25T16:15:22.387000
|
||||
CVE-2024-52544,0,0,c58d604e70e1d52d10e6c46ba91f7cf731eb4ad32c0c46522333c5ba2eb214aa,2024-12-03T21:15:07.390000
|
||||
CVE-2024-52545,0,0,387ccc5d59fa5b7f0e29a5a9d3b818216a2c3bea1d9e491918de17e5ca055044,2024-12-03T21:15:07.490000
|
||||
CVE-2024-52546,0,0,5387c491d047007733dddf4928762fe4affacc09ddf2859617c316a62a5513e1,2024-12-03T21:15:07.593000
|
||||
@ -269565,6 +269571,7 @@ CVE-2024-52897,0,0,381b132ed462b4faa45e569dc53fdf4283419f66b3eee4d6b531c72acef36
|
||||
CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000
|
||||
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
|
||||
CVE-2024-52901,0,0,b816b5cb98cf7a5b0d48398070b9006c656711b2b4741d0569a92b7898dcb78d,2024-12-12T16:15:54.807000
|
||||
CVE-2024-52906,1,1,432a7b0e13ffe8dc54c1398b0a02c0b5b0e2dc251c9417a0fa8319a3eb4564ec,2024-12-25T15:15:07.470000
|
||||
CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000
|
||||
CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52913,0,0,3182ee9c1e3fb83798715d4b9c300b62667d15206aea663fa8688a39a2c605f0,2024-11-18T17:11:17.393000
|
||||
@ -269810,6 +269817,7 @@ CVE-2024-53285,0,0,c2ecada22121f7b17c10fd447456e68801df7cd8946752141828b9091e6bc
|
||||
CVE-2024-53289,0,0,8569657d296d8056ead91ae269679fae58808070b2f82927c0ce8aea97673a55,2024-12-11T08:15:06.010000
|
||||
CVE-2024-5329,0,0,daffb0d0cde1b0a7abdef85d122cb231171a58845d7b7cc2d00de14c5f127b92,2024-11-21T09:47:26.100000
|
||||
CVE-2024-53290,0,0,08e0a042eea6dcb1196f79e060fe5af8f554fba59cbaa553b3654d405551bc5e,2024-12-11T08:15:06.250000
|
||||
CVE-2024-53291,1,1,318e92e79259a9a7331cf36c9930c7627fff266ca815aad87948838b386ab239,2024-12-25T15:15:07.673000
|
||||
CVE-2024-53292,0,0,67896e5cb823d0bbe120641ca2bcb7973e9580249f1b4ecda20948602273ce08,2024-12-11T08:15:06.423000
|
||||
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
||||
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
||||
@ -273833,7 +273841,7 @@ CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d9
|
||||
CVE-2024-8947,0,0,23b90e98b4d0b5ac484fc062b569695b891052af214ed33d731d1a205b7beeae,2024-09-24T13:17:52.397000
|
||||
CVE-2024-8948,0,0,d33c8be61eafb6c6f1399a6681b3e81aa3033fc00349884a89a0d7a9189f2227,2024-09-23T18:10:28.273000
|
||||
CVE-2024-8949,0,0,5ae1b80bdfc570c2dbbc4bf0efff8e610ad07187757c64e752e108409b11f0e8,2024-09-23T18:05:07.043000
|
||||
CVE-2024-8950,1,1,db59029c35d940baabec97c0caeacaf99c60a82838607a0b2064b33fa8b76c62,2024-12-25T13:15:19.057000
|
||||
CVE-2024-8950,0,0,db59029c35d940baabec97c0caeacaf99c60a82838607a0b2064b33fa8b76c62,2024-12-25T13:15:19.057000
|
||||
CVE-2024-8951,0,0,421b70ea69ac7f8a66bf7d315715c47b3ee53b72c4adfbc4647ff96984497ead,2024-09-23T18:12:37.380000
|
||||
CVE-2024-8956,0,0,d05dd0e86b32f79dfafef581ca7f3185d2618ea7886f798509ed3bccd73be818,2024-11-05T02:00:01.697000
|
||||
CVE-2024-8957,0,0,6175e643f46339ff132c2346994cb23e9f442b046b5039790534affc3054adb1,2024-11-05T02:00:01.697000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user