mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-12-25T17:00:19.609757+00:00
This commit is contained in:
parent
7aec33761a
commit
e6b545b346
56
CVE-2023/CVE-2023-51xx/CVE-2023-5117.json
Normal file
56
CVE-2023/CVE-2023-51xx/CVE-2023-5117.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-5117",
|
||||||
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
|
"published": "2024-12-25T15:15:05.900",
|
||||||
|
"lastModified": "2024-12-25T15:15:05.900",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware that files uploaded to comments on confidential issues and epics of public projects could be accessed without authentication via a direct link to the uploaded file URL."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 3.7,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-213"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/398250",
|
||||||
|
"source": "cve@gitlab.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-471xx/CVE-2024-47102.json
Normal file
56
CVE-2024/CVE-2024-471xx/CVE-2024-47102.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-47102",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-12-25T15:15:06.583",
|
||||||
|
"lastModified": "2024-12-25T15:15:06.583",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1\n\ncould allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7179826",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-479xx/CVE-2024-47978.json
Normal file
56
CVE-2024/CVE-2024-479xx/CVE-2024-47978.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-47978",
|
||||||
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
|
"published": "2024-12-25T15:15:06.780",
|
||||||
|
"lastModified": "2024-12-25T15:15:06.780",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-250"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities",
|
||||||
|
"source": "security_alert@emc.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,20 +2,24 @@
|
|||||||
"id": "CVE-2024-51464",
|
"id": "CVE-2024-51464",
|
||||||
"sourceIdentifier": "psirt@us.ibm.com",
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
"published": "2024-12-21T14:15:21.627",
|
"published": "2024-12-21T14:15:21.627",
|
||||||
"lastModified": "2024-12-21T14:15:21.627",
|
"lastModified": "2024-12-25T15:15:07.040",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed to perform when using Navigator for i."
|
"value": "IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed to perform when using Navigator for i."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "IBM i 7.3, 7.4 y 7.5 es vulnerable a la omisi\u00f3n de las restricciones de la interfaz de Navigator for i. Al enviar una solicitud especialmente manipulada, un atacante autenticado podr\u00eda aprovechar esta vulnerabilidad para realizar de forma remota operaciones que el usuario no tiene permitido realizar cuando utiliza Navigator for i."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@us.ibm.com",
|
"source": "psirt@us.ibm.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
@ -42,7 +46,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-644"
|
"value": "CWE-288"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
56
CVE-2024/CVE-2024-525xx/CVE-2024-52534.json
Normal file
56
CVE-2024/CVE-2024-525xx/CVE-2024-52534.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52534",
|
||||||
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
|
"published": "2024-12-25T16:15:21.997",
|
||||||
|
"lastModified": "2024-12-25T16:15:21.997",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Dell ECS, version(s) prior to ECS 3.8.1.3, contain(s) an Authentication Bypass by Capture-replay vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Session theft."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-294"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.dell.com/support/kbdoc/en-us/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities",
|
||||||
|
"source": "security_alert@emc.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-525xx/CVE-2024-52535.json
Normal file
56
CVE-2024/CVE-2024-525xx/CVE-2024-52535.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52535",
|
||||||
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
|
"published": "2024-12-25T15:15:07.247",
|
||||||
|
"lastModified": "2024-12-25T15:15:07.247",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-61"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.dell.com/support/kbdoc/en-us/000261086/dsa-2024-470-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
|
||||||
|
"source": "security_alert@emc.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-525xx/CVE-2024-52543.json
Normal file
56
CVE-2024/CVE-2024-525xx/CVE-2024-52543.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52543",
|
||||||
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
|
"published": "2024-12-25T16:15:22.387",
|
||||||
|
"lastModified": "2024-12-25T16:15:22.387",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) a Creation of Temporary File With Insecure Permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.6,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-378"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities",
|
||||||
|
"source": "security_alert@emc.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-529xx/CVE-2024-52906.json
Normal file
56
CVE-2024/CVE-2024-529xx/CVE-2024-52906.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-52906",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-12-25T15:15:07.470",
|
||||||
|
"lastModified": "2024-12-25T15:15:07.470",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1\n\n\n\ncould allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7179826",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-532xx/CVE-2024-53291.json
Normal file
56
CVE-2024/CVE-2024-532xx/CVE-2024-53291.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-53291",
|
||||||
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
|
"published": "2024-12-25T15:15:07.673",
|
||||||
|
"lastModified": "2024-12-25T15:15:07.673",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Dell NativeEdge, version(s) 2.1.0.0, contain(s) an Exposure of Sensitive Information Through Metadata vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1230"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.dell.com/support/kbdoc/en-us/000258904/dsa-2024-488-security-update-for-dell-nativeedge-multiple-vulnerabilities",
|
||||||
|
"source": "security_alert@emc.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-25T15:00:19.888898+00:00
|
2024-12-25T17:00:19.609757+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-25T14:15:22.610000+00:00
|
2024-12-25T16:15:22.387000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
274661
|
274669
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `3`
|
Recently added CVEs: `8`
|
||||||
|
|
||||||
- [CVE-2024-39725](CVE-2024/CVE-2024-397xx/CVE-2024-39725.json) (`2024-12-25T14:15:21.660`)
|
- [CVE-2023-5117](CVE-2023/CVE-2023-51xx/CVE-2023-5117.json) (`2024-12-25T15:15:05.900`)
|
||||||
- [CVE-2024-39727](CVE-2024/CVE-2024-397xx/CVE-2024-39727.json) (`2024-12-25T14:15:22.610`)
|
- [CVE-2024-47102](CVE-2024/CVE-2024-471xx/CVE-2024-47102.json) (`2024-12-25T15:15:06.583`)
|
||||||
- [CVE-2024-8950](CVE-2024/CVE-2024-89xx/CVE-2024-8950.json) (`2024-12-25T13:15:19.057`)
|
- [CVE-2024-47978](CVE-2024/CVE-2024-479xx/CVE-2024-47978.json) (`2024-12-25T15:15:06.780`)
|
||||||
|
- [CVE-2024-52534](CVE-2024/CVE-2024-525xx/CVE-2024-52534.json) (`2024-12-25T16:15:21.997`)
|
||||||
|
- [CVE-2024-52535](CVE-2024/CVE-2024-525xx/CVE-2024-52535.json) (`2024-12-25T15:15:07.247`)
|
||||||
|
- [CVE-2024-52543](CVE-2024/CVE-2024-525xx/CVE-2024-52543.json) (`2024-12-25T16:15:22.387`)
|
||||||
|
- [CVE-2024-52906](CVE-2024/CVE-2024-529xx/CVE-2024-52906.json) (`2024-12-25T15:15:07.470`)
|
||||||
|
- [CVE-2024-53291](CVE-2024/CVE-2024-532xx/CVE-2024-53291.json) (`2024-12-25T15:15:07.673`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
|
- [CVE-2024-51464](CVE-2024/CVE-2024-514xx/CVE-2024-51464.json) (`2024-12-25T15:15:07.040`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
16
_state.csv
16
_state.csv
@ -238894,6 +238894,7 @@ CVE-2023-5115,0,0,05e3e9c0dc22461b743c2358ed803bf3147865ec12621e61796b475c03cf4d
|
|||||||
CVE-2023-51154,0,0,1004622243e2a435c323ad288b161b00e21408178e87064850a86cae0dcdcde9,2024-11-21T08:37:54.250000
|
CVE-2023-51154,0,0,1004622243e2a435c323ad288b161b00e21408178e87064850a86cae0dcdcde9,2024-11-21T08:37:54.250000
|
||||||
CVE-2023-51157,0,0,9f80b18b8a7b0cc4aad6087dd59c00b328d310cd40a9013afb508a333bdacafe,2024-10-02T16:58:20.160000
|
CVE-2023-51157,0,0,9f80b18b8a7b0cc4aad6087dd59c00b328d310cd40a9013afb508a333bdacafe,2024-10-02T16:58:20.160000
|
||||||
CVE-2023-5116,0,0,0bc0d2ef7183d3d186c53da0d73b888a77982cd2f16a155c36bbb3ba3253d10a,2024-11-21T08:41:05.700000
|
CVE-2023-5116,0,0,0bc0d2ef7183d3d186c53da0d73b888a77982cd2f16a155c36bbb3ba3253d10a,2024-11-21T08:41:05.700000
|
||||||
|
CVE-2023-5117,1,1,193cecfcabcb618dc9d93c7901e5c5be200e79c307e3a0b36f2f1d5c0d172aa1,2024-12-25T15:15:05.900000
|
||||||
CVE-2023-5118,0,0,6f35b4b16a80a49be4e878b09580eb14452d102547cf5069f64518854ff08ff0,2024-11-21T08:41:05.817000
|
CVE-2023-5118,0,0,6f35b4b16a80a49be4e878b09580eb14452d102547cf5069f64518854ff08ff0,2024-11-21T08:41:05.817000
|
||||||
CVE-2023-5119,0,0,ecf16c6c035e79f3eaf6e343ec94472bd0208a5d903462d13517d90122e996ee,2024-11-21T08:41:05.940000
|
CVE-2023-5119,0,0,ecf16c6c035e79f3eaf6e343ec94472bd0208a5d903462d13517d90122e996ee,2024-11-21T08:41:05.940000
|
||||||
CVE-2023-51195,0,0,51f71cede0bdb9c7936f2282fb83cb0df673897fa19475ea77fc955e31990b5f,2024-01-10T20:15:45.393000
|
CVE-2023-51195,0,0,51f71cede0bdb9c7936f2282fb83cb0df673897fa19475ea77fc955e31990b5f,2024-01-10T20:15:45.393000
|
||||||
@ -260803,9 +260804,9 @@ CVE-2024-39720,0,0,56b4d276b5bf79d64e33d4488006377883d1926ea37aa08bbe14b948e3752
|
|||||||
CVE-2024-39721,0,0,8f383f081975755f1c8480c4d7c46c7557e3da56494ccedacf667eae60e062c2,2024-11-01T16:35:24.357000
|
CVE-2024-39721,0,0,8f383f081975755f1c8480c4d7c46c7557e3da56494ccedacf667eae60e062c2,2024-11-01T16:35:24.357000
|
||||||
CVE-2024-39722,0,0,3310dd431aef43138d89a0489db78429e88bdad0641d09cdee269db9d8d13bc9,2024-11-01T15:35:17.693000
|
CVE-2024-39722,0,0,3310dd431aef43138d89a0489db78429e88bdad0641d09cdee269db9d8d13bc9,2024-11-01T15:35:17.693000
|
||||||
CVE-2024-39723,0,0,bcb1dcc110c96a14094bcf053f7153eaf6a2b700a5f4ed663f41b81704e99c3a,2024-11-21T09:28:17.990000
|
CVE-2024-39723,0,0,bcb1dcc110c96a14094bcf053f7153eaf6a2b700a5f4ed663f41b81704e99c3a,2024-11-21T09:28:17.990000
|
||||||
CVE-2024-39725,1,1,b31874f936a4e878816fa89600e0cbd518ebb1293c5348d1670a96439fee6178,2024-12-25T14:15:21.660000
|
CVE-2024-39725,0,0,b31874f936a4e878816fa89600e0cbd518ebb1293c5348d1670a96439fee6178,2024-12-25T14:15:21.660000
|
||||||
CVE-2024-39726,0,0,84f4bd0f0e66fd1792095fdf470f4f3cbdbdc235abdd5805255bdd32721e778c,2024-11-19T21:51:40.093000
|
CVE-2024-39726,0,0,84f4bd0f0e66fd1792095fdf470f4f3cbdbdc235abdd5805255bdd32721e778c,2024-11-19T21:51:40.093000
|
||||||
CVE-2024-39727,1,1,92ce461235c4c1c06a5ed4f32da0b358b5d53e84b1c4c1e92c4ef357cc1150e6,2024-12-25T14:15:22.610000
|
CVE-2024-39727,0,0,92ce461235c4c1c06a5ed4f32da0b358b5d53e84b1c4c1e92c4ef357cc1150e6,2024-12-25T14:15:22.610000
|
||||||
CVE-2024-39728,0,0,419d6522507eb930af7ae6835142d3dcdf46166050b6817f37759954abce17b8,2024-11-21T09:28:18.217000
|
CVE-2024-39728,0,0,419d6522507eb930af7ae6835142d3dcdf46166050b6817f37759954abce17b8,2024-11-21T09:28:18.217000
|
||||||
CVE-2024-39729,0,0,17ef6112215ce540557fe392c3c226b8e791e3105e6cb641f6eb9b3c8bbe26c4,2024-11-21T09:28:18.363000
|
CVE-2024-39729,0,0,17ef6112215ce540557fe392c3c226b8e791e3105e6cb641f6eb9b3c8bbe26c4,2024-11-21T09:28:18.363000
|
||||||
CVE-2024-3973,0,0,1e562721e06ec34010a875bed42bd8dd124b3449743c9a2acf9ba1a2336534dd,2024-08-07T15:17:46.717000
|
CVE-2024-3973,0,0,1e562721e06ec34010a875bed42bd8dd124b3449743c9a2acf9ba1a2336534dd,2024-08-07T15:17:46.717000
|
||||||
@ -265702,6 +265703,7 @@ CVE-2024-47093,0,0,80d34acd1d42b9ec0548b5c2bde111c84ef7562ed8aa3809448dda19ce45d
|
|||||||
CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000
|
CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000
|
||||||
CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000
|
CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000
|
||||||
CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000
|
CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000
|
||||||
|
CVE-2024-47102,1,1,688756206af77c535c639193cbdc434ec4118c056e1cad14389fde58683cce7b,2024-12-25T15:15:06.583000
|
||||||
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
|
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
|
||||||
CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000
|
CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000
|
||||||
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
|
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
|
||||||
@ -266425,6 +266427,7 @@ CVE-2024-47974,0,0,5b42e76afcab24c20bdceb8d619dc3b1d3700c61728605186411865d26bbe
|
|||||||
CVE-2024-47975,0,0,919a5c25fcfdd1004bec82ba910db5fe6300dd9cdcfe2f11fc4b0bb574f4091b,2024-10-11T20:15:05.143000
|
CVE-2024-47975,0,0,919a5c25fcfdd1004bec82ba910db5fe6300dd9cdcfe2f11fc4b0bb574f4091b,2024-10-11T20:15:05.143000
|
||||||
CVE-2024-47976,0,0,b7d584a3048cada45c1f6e92a2751d3e6ae6406892198b5d0fe37bebaa37f847,2024-10-17T22:15:03.210000
|
CVE-2024-47976,0,0,b7d584a3048cada45c1f6e92a2751d3e6ae6406892198b5d0fe37bebaa37f847,2024-10-17T22:15:03.210000
|
||||||
CVE-2024-47977,0,0,e38680112a30ad62187a3d04ee7a979b5da459a2a6058680229404134a82d5e8,2024-12-16T11:15:06.370000
|
CVE-2024-47977,0,0,e38680112a30ad62187a3d04ee7a979b5da459a2a6058680229404134a82d5e8,2024-12-16T11:15:06.370000
|
||||||
|
CVE-2024-47978,1,1,76107c041bb3501b5273abccab3ce5a69dde08406393598adbaa4319b08b2a11,2024-12-25T15:15:06.780000
|
||||||
CVE-2024-4798,0,0,67d409a675b221a14312164f5cc62c5f24d760e91c26863f4b27a369f421db4d,2024-11-21T09:43:38.167000
|
CVE-2024-4798,0,0,67d409a675b221a14312164f5cc62c5f24d760e91c26863f4b27a369f421db4d,2024-11-21T09:43:38.167000
|
||||||
CVE-2024-47984,0,0,f2bdbdc582424541b49afcc3246712b531918aae288858fba96175f001d774bf,2024-12-13T15:15:27.110000
|
CVE-2024-47984,0,0,f2bdbdc582424541b49afcc3246712b531918aae288858fba96175f001d774bf,2024-12-13T15:15:27.110000
|
||||||
CVE-2024-4799,0,0,bcde09b7182d8e0e6116d4d77d66aa7fc678a4d38a1639ef2abc6c729d992c49,2024-11-21T09:43:38.320000
|
CVE-2024-4799,0,0,bcde09b7182d8e0e6116d4d77d66aa7fc678a4d38a1639ef2abc6c729d992c49,2024-11-21T09:43:38.320000
|
||||||
@ -268561,7 +268564,7 @@ CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8
|
|||||||
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
|
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
|
||||||
CVE-2024-51460,0,0,5ed8cb0bc6e7264a024f4fdc6bea49f8d819c03171033b2027328a825c325cb4,2024-12-11T13:15:06.510000
|
CVE-2024-51460,0,0,5ed8cb0bc6e7264a024f4fdc6bea49f8d819c03171033b2027328a825c325cb4,2024-12-11T13:15:06.510000
|
||||||
CVE-2024-51463,0,0,c10145e6070215d7c0984525084a5c3afdf7565c93303fbc3fb7373df154d225,2024-12-21T14:15:21.453000
|
CVE-2024-51463,0,0,c10145e6070215d7c0984525084a5c3afdf7565c93303fbc3fb7373df154d225,2024-12-21T14:15:21.453000
|
||||||
CVE-2024-51464,0,0,69f5d546a83bdd7683722d0859a88a640e895a1b44c51270e757af6904b8f33c,2024-12-21T14:15:21.627000
|
CVE-2024-51464,0,1,6976cf6244f493a37311fb0cbfbc33c06ff05664e1a61fb69527ac2b03e9107d,2024-12-25T15:15:07.040000
|
||||||
CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000
|
CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000
|
||||||
CVE-2024-51466,0,0,f8d3d47f89339e1c49e199d4d29061c3398d8045235700eb4ff399548ec59171,2024-12-20T14:15:24.250000
|
CVE-2024-51466,0,0,f8d3d47f89339e1c49e199d4d29061c3398d8045235700eb4ff399548ec59171,2024-12-20T14:15:24.250000
|
||||||
CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000
|
CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000
|
||||||
@ -269374,10 +269377,13 @@ CVE-2024-52530,0,0,78f036a07a80d7c50933eab4b5ec3e54640dd9a8e9ce77e883bfb2118e573
|
|||||||
CVE-2024-52531,0,0,8eedc16d1aadf080c6f2b302997fd47ee6a376af2a4466e43fcf9633d24182c6,2024-11-12T19:35:15.807000
|
CVE-2024-52531,0,0,8eedc16d1aadf080c6f2b302997fd47ee6a376af2a4466e43fcf9633d24182c6,2024-11-12T19:35:15.807000
|
||||||
CVE-2024-52532,0,0,54c3190a0eeff653a8f66dda7fd5b580cc7aa4648618e83320436fca355bcda1,2024-11-12T19:35:16.970000
|
CVE-2024-52532,0,0,54c3190a0eeff653a8f66dda7fd5b580cc7aa4648618e83320436fca355bcda1,2024-11-12T19:35:16.970000
|
||||||
CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff06bd,2024-12-06T14:15:21.400000
|
CVE-2024-52533,0,0,1eb71d89b0eb5dd4c4750374cbcae2f7fe6179355aa90c3882a1d10864ff06bd,2024-12-06T14:15:21.400000
|
||||||
|
CVE-2024-52534,1,1,7820e0ba924890a736ce88aba45e59a78e389d023258ec741d265aac9be5c12b,2024-12-25T16:15:21.997000
|
||||||
|
CVE-2024-52535,1,1,2fc6a4a30035252b3fe1efc0866346ed5a93aa19e5169be6ec428c9c99a9b9ff,2024-12-25T15:15:07.247000
|
||||||
CVE-2024-52537,0,0,79d5bab7a316a4a5e36b347dfcb08651d568dc7cb64073148e1c1e42669123b6,2024-12-11T08:15:05.747000
|
CVE-2024-52537,0,0,79d5bab7a316a4a5e36b347dfcb08651d568dc7cb64073148e1c1e42669123b6,2024-12-11T08:15:05.747000
|
||||||
CVE-2024-52538,0,0,1bae7e87d532ab1b896b47e33928c8b9835fb6690e8325140679d38a93ad90cb,2024-12-16T11:15:06.523000
|
CVE-2024-52538,0,0,1bae7e87d532ab1b896b47e33928c8b9835fb6690e8325140679d38a93ad90cb,2024-12-16T11:15:06.523000
|
||||||
CVE-2024-5254,0,0,b08a56d01443c9abf44ee33ecfae9cdfa73a8d20318044fcd2f5caa1e9d31f2e,2024-11-21T09:47:17.063000
|
CVE-2024-5254,0,0,b08a56d01443c9abf44ee33ecfae9cdfa73a8d20318044fcd2f5caa1e9d31f2e,2024-11-21T09:47:17.063000
|
||||||
CVE-2024-52542,0,0,b9ef140e9aba5b496ed2c25474c1d2f358b5c656839b56a93dea59533bce0be8,2024-12-17T12:15:20.703000
|
CVE-2024-52542,0,0,b9ef140e9aba5b496ed2c25474c1d2f358b5c656839b56a93dea59533bce0be8,2024-12-17T12:15:20.703000
|
||||||
|
CVE-2024-52543,1,1,f95691332b8723e38141c007d14687ca24f6efa2e91837c90720d3d872189100,2024-12-25T16:15:22.387000
|
||||||
CVE-2024-52544,0,0,c58d604e70e1d52d10e6c46ba91f7cf731eb4ad32c0c46522333c5ba2eb214aa,2024-12-03T21:15:07.390000
|
CVE-2024-52544,0,0,c58d604e70e1d52d10e6c46ba91f7cf731eb4ad32c0c46522333c5ba2eb214aa,2024-12-03T21:15:07.390000
|
||||||
CVE-2024-52545,0,0,387ccc5d59fa5b7f0e29a5a9d3b818216a2c3bea1d9e491918de17e5ca055044,2024-12-03T21:15:07.490000
|
CVE-2024-52545,0,0,387ccc5d59fa5b7f0e29a5a9d3b818216a2c3bea1d9e491918de17e5ca055044,2024-12-03T21:15:07.490000
|
||||||
CVE-2024-52546,0,0,5387c491d047007733dddf4928762fe4affacc09ddf2859617c316a62a5513e1,2024-12-03T21:15:07.593000
|
CVE-2024-52546,0,0,5387c491d047007733dddf4928762fe4affacc09ddf2859617c316a62a5513e1,2024-12-03T21:15:07.593000
|
||||||
@ -269565,6 +269571,7 @@ CVE-2024-52897,0,0,381b132ed462b4faa45e569dc53fdf4283419f66b3eee4d6b531c72acef36
|
|||||||
CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000
|
CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000
|
||||||
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
|
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
|
||||||
CVE-2024-52901,0,0,b816b5cb98cf7a5b0d48398070b9006c656711b2b4741d0569a92b7898dcb78d,2024-12-12T16:15:54.807000
|
CVE-2024-52901,0,0,b816b5cb98cf7a5b0d48398070b9006c656711b2b4741d0569a92b7898dcb78d,2024-12-12T16:15:54.807000
|
||||||
|
CVE-2024-52906,1,1,432a7b0e13ffe8dc54c1398b0a02c0b5b0e2dc251c9417a0fa8319a3eb4564ec,2024-12-25T15:15:07.470000
|
||||||
CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000
|
CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000
|
||||||
CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000
|
CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000
|
||||||
CVE-2024-52913,0,0,3182ee9c1e3fb83798715d4b9c300b62667d15206aea663fa8688a39a2c605f0,2024-11-18T17:11:17.393000
|
CVE-2024-52913,0,0,3182ee9c1e3fb83798715d4b9c300b62667d15206aea663fa8688a39a2c605f0,2024-11-18T17:11:17.393000
|
||||||
@ -269810,6 +269817,7 @@ CVE-2024-53285,0,0,c2ecada22121f7b17c10fd447456e68801df7cd8946752141828b9091e6bc
|
|||||||
CVE-2024-53289,0,0,8569657d296d8056ead91ae269679fae58808070b2f82927c0ce8aea97673a55,2024-12-11T08:15:06.010000
|
CVE-2024-53289,0,0,8569657d296d8056ead91ae269679fae58808070b2f82927c0ce8aea97673a55,2024-12-11T08:15:06.010000
|
||||||
CVE-2024-5329,0,0,daffb0d0cde1b0a7abdef85d122cb231171a58845d7b7cc2d00de14c5f127b92,2024-11-21T09:47:26.100000
|
CVE-2024-5329,0,0,daffb0d0cde1b0a7abdef85d122cb231171a58845d7b7cc2d00de14c5f127b92,2024-11-21T09:47:26.100000
|
||||||
CVE-2024-53290,0,0,08e0a042eea6dcb1196f79e060fe5af8f554fba59cbaa553b3654d405551bc5e,2024-12-11T08:15:06.250000
|
CVE-2024-53290,0,0,08e0a042eea6dcb1196f79e060fe5af8f554fba59cbaa553b3654d405551bc5e,2024-12-11T08:15:06.250000
|
||||||
|
CVE-2024-53291,1,1,318e92e79259a9a7331cf36c9930c7627fff266ca815aad87948838b386ab239,2024-12-25T15:15:07.673000
|
||||||
CVE-2024-53292,0,0,67896e5cb823d0bbe120641ca2bcb7973e9580249f1b4ecda20948602273ce08,2024-12-11T08:15:06.423000
|
CVE-2024-53292,0,0,67896e5cb823d0bbe120641ca2bcb7973e9580249f1b4ecda20948602273ce08,2024-12-11T08:15:06.423000
|
||||||
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
||||||
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
||||||
@ -273833,7 +273841,7 @@ CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d9
|
|||||||
CVE-2024-8947,0,0,23b90e98b4d0b5ac484fc062b569695b891052af214ed33d731d1a205b7beeae,2024-09-24T13:17:52.397000
|
CVE-2024-8947,0,0,23b90e98b4d0b5ac484fc062b569695b891052af214ed33d731d1a205b7beeae,2024-09-24T13:17:52.397000
|
||||||
CVE-2024-8948,0,0,d33c8be61eafb6c6f1399a6681b3e81aa3033fc00349884a89a0d7a9189f2227,2024-09-23T18:10:28.273000
|
CVE-2024-8948,0,0,d33c8be61eafb6c6f1399a6681b3e81aa3033fc00349884a89a0d7a9189f2227,2024-09-23T18:10:28.273000
|
||||||
CVE-2024-8949,0,0,5ae1b80bdfc570c2dbbc4bf0efff8e610ad07187757c64e752e108409b11f0e8,2024-09-23T18:05:07.043000
|
CVE-2024-8949,0,0,5ae1b80bdfc570c2dbbc4bf0efff8e610ad07187757c64e752e108409b11f0e8,2024-09-23T18:05:07.043000
|
||||||
CVE-2024-8950,1,1,db59029c35d940baabec97c0caeacaf99c60a82838607a0b2064b33fa8b76c62,2024-12-25T13:15:19.057000
|
CVE-2024-8950,0,0,db59029c35d940baabec97c0caeacaf99c60a82838607a0b2064b33fa8b76c62,2024-12-25T13:15:19.057000
|
||||||
CVE-2024-8951,0,0,421b70ea69ac7f8a66bf7d315715c47b3ee53b72c4adfbc4647ff96984497ead,2024-09-23T18:12:37.380000
|
CVE-2024-8951,0,0,421b70ea69ac7f8a66bf7d315715c47b3ee53b72c4adfbc4647ff96984497ead,2024-09-23T18:12:37.380000
|
||||||
CVE-2024-8956,0,0,d05dd0e86b32f79dfafef581ca7f3185d2618ea7886f798509ed3bccd73be818,2024-11-05T02:00:01.697000
|
CVE-2024-8956,0,0,d05dd0e86b32f79dfafef581ca7f3185d2618ea7886f798509ed3bccd73be818,2024-11-05T02:00:01.697000
|
||||||
CVE-2024-8957,0,0,6175e643f46339ff132c2346994cb23e9f442b046b5039790534affc3054adb1,2024-11-05T02:00:01.697000
|
CVE-2024-8957,0,0,6175e643f46339ff132c2346994cb23e9f442b046b5039790534affc3054adb1,2024-11-05T02:00:01.697000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user