mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-12-19T00:55:25.344583+00:00
This commit is contained in:
parent
ae49153bfe
commit
f0b83891dc
56
CVE-2021/CVE-2021-205xx/CVE-2021-20553.json
Normal file
56
CVE-2021/CVE-2021-205xx/CVE-2021-20553.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-20553",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-12-19T00:15:04.710",
|
||||||
|
"lastModified": "2024-12-19T00:15:04.710",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/6496761",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2021/CVE-2021-298xx/CVE-2021-29827.json
Normal file
56
CVE-2021/CVE-2021-298xx/CVE-2021-29827.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2021-29827",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2024-12-19T00:15:04.873",
|
||||||
|
"lastModified": "2024-12-19T00:15:04.873",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM InfoSphere Information Server 11.7 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.2,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1021"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/security-bulletin-ibm-infosphere-information-server-vulnerable-cross-frame-scripting-exploit-cve-2021-29827",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-407xx/CVE-2022-40732.json
Normal file
56
CVE-2022/CVE-2022-407xx/CVE-2022-40732.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-40732",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:07.060",
|
||||||
|
"lastModified": "2024-12-18T23:15:07.060",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.0,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1514",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-407xx/CVE-2022-40733.json
Normal file
56
CVE-2022/CVE-2022-407xx/CVE-2022-40733.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-40733",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:07.243",
|
||||||
|
"lastModified": "2024-12-18T23:15:07.243",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.0,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44512.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44512.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44512",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:05.067",
|
||||||
|
"lastModified": "2024-12-19T00:15:05.067",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44513.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44513.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44513",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:05.237",
|
||||||
|
"lastModified": "2024-12-19T00:15:05.237",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44514.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44514.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44514",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:05.400",
|
||||||
|
"lastModified": "2024-12-19T00:15:05.400",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44515.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44515.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44515",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:05.567",
|
||||||
|
"lastModified": "2024-12-19T00:15:05.567",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44516.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44516.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44516",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:05.727",
|
||||||
|
"lastModified": "2024-12-19T00:15:05.727",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44517.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44517.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44517",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:05.880",
|
||||||
|
"lastModified": "2024-12-19T00:15:05.880",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44518.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44518.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44518",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:06.037",
|
||||||
|
"lastModified": "2024-12-19T00:15:06.037",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44519.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44519.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44519",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:06.200",
|
||||||
|
"lastModified": "2024-12-19T00:15:06.200",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44520.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44520.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-44520",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:06.360",
|
||||||
|
"lastModified": "2024-12-19T00:15:06.360",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2023/CVE-2023-215xx/CVE-2023-21586.json
Normal file
56
CVE-2023/CVE-2023-215xx/CVE-2023-21586.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-21586",
|
||||||
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
|
"published": "2024-12-19T00:15:06.530",
|
||||||
|
"lastModified": "2024-12-19T00:15:06.530",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/acrobat/apsb23-01.html",
|
||||||
|
"source": "psirt@adobe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-376xx/CVE-2024-37649.json
Normal file
21
CVE-2024/CVE-2024-376xx/CVE-2024-37649.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-37649",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:07.440",
|
||||||
|
"lastModified": "2024-12-18T23:15:07.440",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Insecure Permissions vulnerability in SecureSTATION v.2.5.5.3116-S50-SMA-B20160811A and before allows a physically proximate attacker to obtain sensitive information via the modification of user credentials."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kklzzcun/SecureSTATION-/blob/main/The%20SecureSTATION%20.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-398xx/CVE-2024-39804.json
Normal file
60
CVE-2024/CVE-2024-398xx/CVE-2024-39804.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-39804",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:07.640",
|
||||||
|
"lastModified": "2024-12-18T23:15:07.640",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in Microsoft PowerPoint 16.83 for macOS. A specially crafted library can leverage PowerPoint's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1974",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1974",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41138.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41138.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-41138",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:07.813",
|
||||||
|
"lastModified": "2024-12-18T23:15:07.813",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in the com.microsoft.teams2.modulehost.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1991",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1991",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41145.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41145.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-41145",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:07.970",
|
||||||
|
"lastModified": "2024-12-18T23:15:07.970",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in the WebView.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1990",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1990",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41159.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41159.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-41159",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:08.140",
|
||||||
|
"lastModified": "2024-12-18T23:15:08.140",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in Microsoft OneNote 16.83 for macOS. A specially crafted library can leverage OneNote's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1975",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1975",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41165.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41165.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-41165",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:08.300",
|
||||||
|
"lastModified": "2024-12-18T23:15:08.300",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in Microsoft Word 16.83 for macOS. A specially crafted library can leverage Word's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1977",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1977",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-420xx/CVE-2024-42004.json
Normal file
60
CVE-2024/CVE-2024-420xx/CVE-2024-42004.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42004",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:08.450",
|
||||||
|
"lastModified": "2024-12-18T23:15:08.450",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1973",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1973",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-422xx/CVE-2024-42220.json
Normal file
60
CVE-2024/CVE-2024-422xx/CVE-2024-42220.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42220",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:08.597",
|
||||||
|
"lastModified": "2024-12-18T23:15:08.597",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in Microsoft Outlook 16.83.3 for macOS. A specially crafted library can leverage Outlook's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-431xx/CVE-2024-43106.json
Normal file
60
CVE-2024/CVE-2024-431xx/CVE-2024-43106.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43106",
|
||||||
|
"sourceIdentifier": "talos-cna@cisco.com",
|
||||||
|
"published": "2024-12-18T23:15:08.760",
|
||||||
|
"lastModified": "2024-12-18T23:15:08.760",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A library injection vulnerability exists in Microsoft Excel 16.83 for macOS. A specially crafted library can leverage Excel's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "talos-cna@cisco.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1976",
|
||||||
|
"source": "talos-cna@cisco.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1976",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2024-43594",
|
"id": "CVE-2024-43594",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2024-12-12T02:00:54.287",
|
"published": "2024-12-12T02:00:54.287",
|
||||||
"lastModified": "2024-12-12T02:00:54.287",
|
"lastModified": "2024-12-18T23:15:08.920",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "System Center Operations Manager Elevation of Privilege Vulnerability"
|
"value": "Microsoft System Center Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -19,7 +19,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||||
@ -42,7 +42,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
25
CVE-2024/CVE-2024-535xx/CVE-2024-53580.json
Normal file
25
CVE-2024/CVE-2024-535xx/CVE-2024-53580.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-53580",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:17.010",
|
||||||
|
"lastModified": "2024-12-18T23:15:17.010",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/neolead/663badf2ebefefa6fe4303695e7aa7a3",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/esnet/iperf/releases/tag/3.18",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-552xx/CVE-2024-55239.json
Normal file
21
CVE-2024/CVE-2024-552xx/CVE-2024-55239.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55239",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:17.180",
|
||||||
|
"lastModified": "2024-12-18T23:15:17.180",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A reflected Cross-Site Scripting vulnerability in the standard documentation upload functionality in Portabilis i-Educar 2.9 allows attacker to craft malicious urls with arbitrary javascript in the 'titulo_documento' parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/RegularUs3r/CVE-Research/blob/main/CVE-2024/Portabilis%20-%20iEducar/CVE-2024-55649%20-%20Reflected%20Cross-Site%20Scripting.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-554xx/CVE-2024-55461.json
Normal file
21
CVE-2024/CVE-2024-554xx/CVE-2024-55461.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55461",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:17.350",
|
||||||
|
"lastModified": "2024-12-18T23:15:17.350",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SeaCMS <=13.0 is vulnerable to command execution in phome.php via the function Ebak_RepPathFiletext()."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitee.com/FengFu01/sea/issues/IB8S1N",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-555xx/CVE-2024-55506.json
Normal file
21
CVE-2024/CVE-2024-555xx/CVE-2024-55506.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55506",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:17.523",
|
||||||
|
"lastModified": "2024-12-18T23:15:17.523",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An IDOR vulnerability in CodeAstro's Complaint Management System v1.0 (version with 0 updates) enables an attacker to execute arbitrary code and obtain sensitive information via the delete.php file and modifying the id parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55506.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
84
CVE-2024/CVE-2024-556xx/CVE-2024-55603.json
Normal file
84
CVE-2024/CVE-2024-556xx/CVE-2024-55603.json
Normal file
@ -0,0 +1,84 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55603",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-12-19T00:15:06.713",
|
||||||
|
"lastModified": "2024-12-19T00:15:06.713",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`).\nThus, a session which's lifetime is already `> time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-613"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kanboard/kanboard/blob/main/app/Core/Session/SessionHandler.php#L40",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kanboard/kanboard/commit/7ce61c34d962ca8b5dce776289ddf4b207be6e78",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gv5c-8pxr-p484",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.php.net/manual/en/function.session-start.php",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-divisor",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-maxlifetime",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-probability",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.php.net/manual/en/sessionhandlerinterface.gc.php",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56115.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56115.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56115",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:17.687",
|
||||||
|
"lastModified": "2024-12-18T23:15:17.687",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ComplianceControl/CVE-2024-56115",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56116.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56116.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56116",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:17.857",
|
||||||
|
"lastModified": "2024-12-18T23:15:17.857",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Cross-Site Request Forgery vulnerability in Amiro.CMS before 7.8.4 allows remote attackers to create an administrator account."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ComplianceControl/CVE-2024-56116",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-563xx/CVE-2024-56317.json
Normal file
33
CVE-2024/CVE-2024-563xx/CVE-2024-56317.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56317",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:18.023",
|
||||||
|
"lastModified": "2024-12-18T23:15:18.023",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0, the WriteAcl function deletes all existing ACL entries first, and then attempts to recreate them based on user input. If input validation fails during decoding, the process stops, and no entries are restored by access-control-server.cpp, i.e., a denial of service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-281"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/project-chip/connectedhomeip/issues/36535",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
41
CVE-2024/CVE-2024-563xx/CVE-2024-56318.json
Normal file
41
CVE-2024/CVE-2024-563xx/CVE-2024-56318.json
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56318",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:18.213",
|
||||||
|
"lastModified": "2024-12-19T00:15:06.897",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In raw\\TCP.cpp in Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0 before 27ca6ec, there is a NULL pointer dereference in TCPBase::ProcessSingleMessage via TCP packets with zero messageSize, leading to denial of service."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/project-chip/connectedhomeip/commit/27ca6ec255b78168e04bd71e0f1a473869cf144b",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/project-chip/connectedhomeip/issues/36750",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/project-chip/connectedhomeip/pull/36751",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
41
CVE-2024/CVE-2024-563xx/CVE-2024-56319.json
Normal file
41
CVE-2024/CVE-2024-563xx/CVE-2024-56319.json
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-56319",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2024-12-18T23:15:18.373",
|
||||||
|
"lastModified": "2024-12-18T23:15:18.373",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0 before e3277eb, unlimited user label appends in a userlabel cluster can lead to a denial of service (resource exhaustion)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/project-chip/connectedhomeip/commit/e3277eb02ed8115de5887e8beca0e35007ba71f3",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/project-chip/connectedhomeip/issues/36760",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/project-chip/connectedhomeip/pull/36843",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-18T23:00:20.790972+00:00
|
2024-12-19T00:55:25.344583+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-12-18T22:39:17.437000+00:00
|
2024-12-19T00:15:06.897000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,55 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
274297
|
274330
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `11`
|
Recently added CVEs: `33`
|
||||||
|
|
||||||
- [CVE-2024-12686](CVE-2024/CVE-2024-126xx/CVE-2024-12686.json) (`2024-12-18T21:15:08.020`)
|
- [CVE-2022-44516](CVE-2022/CVE-2022-445xx/CVE-2022-44516.json) (`2024-12-19T00:15:05.727`)
|
||||||
- [CVE-2024-12692](CVE-2024/CVE-2024-126xx/CVE-2024-12692.json) (`2024-12-18T22:15:05.730`)
|
- [CVE-2022-44517](CVE-2022/CVE-2022-445xx/CVE-2022-44517.json) (`2024-12-19T00:15:05.880`)
|
||||||
- [CVE-2024-12693](CVE-2024/CVE-2024-126xx/CVE-2024-12693.json) (`2024-12-18T22:15:06.293`)
|
- [CVE-2022-44518](CVE-2022/CVE-2022-445xx/CVE-2022-44518.json) (`2024-12-19T00:15:06.037`)
|
||||||
- [CVE-2024-12694](CVE-2024/CVE-2024-126xx/CVE-2024-12694.json) (`2024-12-18T22:15:06.397`)
|
- [CVE-2022-44519](CVE-2022/CVE-2022-445xx/CVE-2022-44519.json) (`2024-12-19T00:15:06.200`)
|
||||||
- [CVE-2024-12695](CVE-2024/CVE-2024-126xx/CVE-2024-12695.json) (`2024-12-18T22:15:06.523`)
|
- [CVE-2022-44520](CVE-2022/CVE-2022-445xx/CVE-2022-44520.json) (`2024-12-19T00:15:06.360`)
|
||||||
- [CVE-2024-45338](CVE-2024/CVE-2024-453xx/CVE-2024-45338.json) (`2024-12-18T21:15:08.173`)
|
- [CVE-2023-21586](CVE-2023/CVE-2023-215xx/CVE-2023-21586.json) (`2024-12-19T00:15:06.530`)
|
||||||
- [CVE-2024-55231](CVE-2024/CVE-2024-552xx/CVE-2024-55231.json) (`2024-12-18T22:15:07.127`)
|
- [CVE-2024-37649](CVE-2024/CVE-2024-376xx/CVE-2024-37649.json) (`2024-12-18T23:15:07.440`)
|
||||||
- [CVE-2024-55232](CVE-2024/CVE-2024-552xx/CVE-2024-55232.json) (`2024-12-18T22:15:07.297`)
|
- [CVE-2024-39804](CVE-2024/CVE-2024-398xx/CVE-2024-39804.json) (`2024-12-18T23:15:07.640`)
|
||||||
- [CVE-2024-55505](CVE-2024/CVE-2024-555xx/CVE-2024-55505.json) (`2024-12-18T22:15:07.477`)
|
- [CVE-2024-41138](CVE-2024/CVE-2024-411xx/CVE-2024-41138.json) (`2024-12-18T23:15:07.813`)
|
||||||
- [CVE-2024-56140](CVE-2024/CVE-2024-561xx/CVE-2024-56140.json) (`2024-12-18T21:15:08.353`)
|
- [CVE-2024-41145](CVE-2024/CVE-2024-411xx/CVE-2024-41145.json) (`2024-12-18T23:15:07.970`)
|
||||||
- [CVE-2024-56145](CVE-2024/CVE-2024-561xx/CVE-2024-56145.json) (`2024-12-18T21:15:08.530`)
|
- [CVE-2024-41159](CVE-2024/CVE-2024-411xx/CVE-2024-41159.json) (`2024-12-18T23:15:08.140`)
|
||||||
|
- [CVE-2024-41165](CVE-2024/CVE-2024-411xx/CVE-2024-41165.json) (`2024-12-18T23:15:08.300`)
|
||||||
|
- [CVE-2024-42004](CVE-2024/CVE-2024-420xx/CVE-2024-42004.json) (`2024-12-18T23:15:08.450`)
|
||||||
|
- [CVE-2024-42220](CVE-2024/CVE-2024-422xx/CVE-2024-42220.json) (`2024-12-18T23:15:08.597`)
|
||||||
|
- [CVE-2024-43106](CVE-2024/CVE-2024-431xx/CVE-2024-43106.json) (`2024-12-18T23:15:08.760`)
|
||||||
|
- [CVE-2024-53580](CVE-2024/CVE-2024-535xx/CVE-2024-53580.json) (`2024-12-18T23:15:17.010`)
|
||||||
|
- [CVE-2024-55239](CVE-2024/CVE-2024-552xx/CVE-2024-55239.json) (`2024-12-18T23:15:17.180`)
|
||||||
|
- [CVE-2024-55461](CVE-2024/CVE-2024-554xx/CVE-2024-55461.json) (`2024-12-18T23:15:17.350`)
|
||||||
|
- [CVE-2024-55506](CVE-2024/CVE-2024-555xx/CVE-2024-55506.json) (`2024-12-18T23:15:17.523`)
|
||||||
|
- [CVE-2024-55603](CVE-2024/CVE-2024-556xx/CVE-2024-55603.json) (`2024-12-19T00:15:06.713`)
|
||||||
|
- [CVE-2024-56115](CVE-2024/CVE-2024-561xx/CVE-2024-56115.json) (`2024-12-18T23:15:17.687`)
|
||||||
|
- [CVE-2024-56116](CVE-2024/CVE-2024-561xx/CVE-2024-56116.json) (`2024-12-18T23:15:17.857`)
|
||||||
|
- [CVE-2024-56317](CVE-2024/CVE-2024-563xx/CVE-2024-56317.json) (`2024-12-18T23:15:18.023`)
|
||||||
|
- [CVE-2024-56318](CVE-2024/CVE-2024-563xx/CVE-2024-56318.json) (`2024-12-18T23:15:18.213`)
|
||||||
|
- [CVE-2024-56319](CVE-2024/CVE-2024-563xx/CVE-2024-56319.json) (`2024-12-18T23:15:18.373`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `40`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2024-47544](CVE-2024/CVE-2024-475xx/CVE-2024-47544.json) (`2024-12-18T21:48:32.893`)
|
- [CVE-2024-43594](CVE-2024/CVE-2024-435xx/CVE-2024-43594.json) (`2024-12-18T23:15:08.920`)
|
||||||
- [CVE-2024-47545](CVE-2024/CVE-2024-475xx/CVE-2024-47545.json) (`2024-12-18T21:49:28.210`)
|
|
||||||
- [CVE-2024-47546](CVE-2024/CVE-2024-475xx/CVE-2024-47546.json) (`2024-12-18T21:50:08.920`)
|
|
||||||
- [CVE-2024-47596](CVE-2024/CVE-2024-475xx/CVE-2024-47596.json) (`2024-12-18T21:51:08.200`)
|
|
||||||
- [CVE-2024-47597](CVE-2024/CVE-2024-475xx/CVE-2024-47597.json) (`2024-12-18T21:39:17.820`)
|
|
||||||
- [CVE-2024-47598](CVE-2024/CVE-2024-475xx/CVE-2024-47598.json) (`2024-12-18T21:40:26.240`)
|
|
||||||
- [CVE-2024-47599](CVE-2024/CVE-2024-475xx/CVE-2024-47599.json) (`2024-12-18T21:41:17.307`)
|
|
||||||
- [CVE-2024-47600](CVE-2024/CVE-2024-476xx/CVE-2024-47600.json) (`2024-12-18T21:43:04.660`)
|
|
||||||
- [CVE-2024-47601](CVE-2024/CVE-2024-476xx/CVE-2024-47601.json) (`2024-12-18T21:43:42.903`)
|
|
||||||
- [CVE-2024-47602](CVE-2024/CVE-2024-476xx/CVE-2024-47602.json) (`2024-12-18T21:27:41.137`)
|
|
||||||
- [CVE-2024-47603](CVE-2024/CVE-2024-476xx/CVE-2024-47603.json) (`2024-12-18T21:28:13.987`)
|
|
||||||
- [CVE-2024-47606](CVE-2024/CVE-2024-476xx/CVE-2024-47606.json) (`2024-12-18T21:35:45.223`)
|
|
||||||
- [CVE-2024-47774](CVE-2024/CVE-2024-477xx/CVE-2024-47774.json) (`2024-12-18T21:36:58.827`)
|
|
||||||
- [CVE-2024-47775](CVE-2024/CVE-2024-477xx/CVE-2024-47775.json) (`2024-12-18T21:37:59.663`)
|
|
||||||
- [CVE-2024-49543](CVE-2024/CVE-2024-495xx/CVE-2024-49543.json) (`2024-12-18T21:22:33.593`)
|
|
||||||
- [CVE-2024-49544](CVE-2024/CVE-2024-495xx/CVE-2024-49544.json) (`2024-12-18T21:22:11.823`)
|
|
||||||
- [CVE-2024-49545](CVE-2024/CVE-2024-495xx/CVE-2024-49545.json) (`2024-12-18T21:21:56.527`)
|
|
||||||
- [CVE-2024-49546](CVE-2024/CVE-2024-495xx/CVE-2024-49546.json) (`2024-12-18T21:21:39.133`)
|
|
||||||
- [CVE-2024-49547](CVE-2024/CVE-2024-495xx/CVE-2024-49547.json) (`2024-12-18T21:20:40.313`)
|
|
||||||
- [CVE-2024-49548](CVE-2024/CVE-2024-495xx/CVE-2024-49548.json) (`2024-12-18T21:20:23.697`)
|
|
||||||
- [CVE-2024-49549](CVE-2024/CVE-2024-495xx/CVE-2024-49549.json) (`2024-12-18T21:19:54.533`)
|
|
||||||
- [CVE-2024-53269](CVE-2024/CVE-2024-532xx/CVE-2024-53269.json) (`2024-12-18T22:15:06.763`)
|
|
||||||
- [CVE-2024-53270](CVE-2024/CVE-2024-532xx/CVE-2024-53270.json) (`2024-12-18T22:15:06.883`)
|
|
||||||
- [CVE-2024-53271](CVE-2024/CVE-2024-532xx/CVE-2024-53271.json) (`2024-12-18T22:15:07.010`)
|
|
||||||
- [CVE-2024-53954](CVE-2024/CVE-2024-539xx/CVE-2024-53954.json) (`2024-12-18T21:16:26.943`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
137
_state.csv
137
_state.csv
@ -129336,7 +129336,7 @@ CVE-2019-10998,0,0,161127b36527ecf2ed6c8d5c408b2b950f0ea4d9c8cadc83798247b49ff47
|
|||||||
CVE-2019-10999,0,0,eca7c08e3a3a663a4247eb777bd211e2ef1683fd47fd5eafbd3364ae2d4cd1fb,2024-11-21T04:20:19.520000
|
CVE-2019-10999,0,0,eca7c08e3a3a663a4247eb777bd211e2ef1683fd47fd5eafbd3364ae2d4cd1fb,2024-11-21T04:20:19.520000
|
||||||
CVE-2019-1100,0,0,3139fa67f72c2ac2a426b9e94a2463ded4c90c91d0d9502dc10ab7acc7202820,2024-11-21T04:36:00.973000
|
CVE-2019-1100,0,0,3139fa67f72c2ac2a426b9e94a2463ded4c90c91d0d9502dc10ab7acc7202820,2024-11-21T04:36:00.973000
|
||||||
CVE-2019-11000,0,0,9f7b47e98cf836a95312c8ca77593d15ab59aa5e2b59d7d023930e92995b07af,2024-11-21T04:20:19.670000
|
CVE-2019-11000,0,0,9f7b47e98cf836a95312c8ca77593d15ab59aa5e2b59d7d023930e92995b07af,2024-11-21T04:20:19.670000
|
||||||
CVE-2019-11001,0,1,3990b0085a0a17399a8582ce087900aeb743bed0cf8a6a60a30fc0ea94af9616,2024-12-18T21:15:06.880000
|
CVE-2019-11001,0,0,3990b0085a0a17399a8582ce087900aeb743bed0cf8a6a60a30fc0ea94af9616,2024-12-18T21:15:06.880000
|
||||||
CVE-2019-11002,0,0,982a4058b8e9adceb38d582ecced8ccba846ed0e12cfcbdbeac2831eb8906fe0,2024-11-21T04:20:19.970000
|
CVE-2019-11002,0,0,982a4058b8e9adceb38d582ecced8ccba846ed0e12cfcbdbeac2831eb8906fe0,2024-11-21T04:20:19.970000
|
||||||
CVE-2019-11003,0,0,ff92b42246a7174753edf14d1e5c940e59427c16eca1f956007e6a48f87b626e,2024-11-21T04:20:20.103000
|
CVE-2019-11003,0,0,ff92b42246a7174753edf14d1e5c940e59427c16eca1f956007e6a48f87b626e,2024-11-21T04:20:20.103000
|
||||||
CVE-2019-11004,0,0,89f4eb2d7c0c64f6cd5b1eed65e37382944a075492a538dc657d48d6922660a5,2024-11-21T04:20:20.247000
|
CVE-2019-11004,0,0,89f4eb2d7c0c64f6cd5b1eed65e37382944a075492a538dc657d48d6922660a5,2024-11-21T04:20:20.247000
|
||||||
@ -167089,6 +167089,7 @@ CVE-2021-2055,0,0,19ef2def0996a3eda979d21e11c85c151931ff02412b22b62ca1d283c91a81
|
|||||||
CVE-2021-20550,0,0,bcfb998103aabb2db68eacb68d6e5e676e366b8736eddb04f9b1959de069212a,2024-11-21T05:46:45.610000
|
CVE-2021-20550,0,0,bcfb998103aabb2db68eacb68d6e5e676e366b8736eddb04f9b1959de069212a,2024-11-21T05:46:45.610000
|
||||||
CVE-2021-20551,0,0,7599827456c11032b04f5d5521c20a3fded80a5e3c708285d2d63204629663a1,2024-11-21T05:46:45.760000
|
CVE-2021-20551,0,0,7599827456c11032b04f5d5521c20a3fded80a5e3c708285d2d63204629663a1,2024-11-21T05:46:45.760000
|
||||||
CVE-2021-20552,0,0,db1b98f153498419c0ae5ac70680b77b702feff37c6f6d82a53523aa26f56b3c,2024-11-21T05:46:45.883000
|
CVE-2021-20552,0,0,db1b98f153498419c0ae5ac70680b77b702feff37c6f6d82a53523aa26f56b3c,2024-11-21T05:46:45.883000
|
||||||
|
CVE-2021-20553,1,1,e1e21ff4ee57a407a14c026e5814a85da9b2c7fa45e6f8a0fa9db7476ce7c76b,2024-12-19T00:15:04.710000
|
||||||
CVE-2021-20554,0,0,2e5190cabe82cd81ebbfc6a35e57e2047a5de9b2faf0ac96253685a1f61ba149,2024-11-21T05:46:46.007000
|
CVE-2021-20554,0,0,2e5190cabe82cd81ebbfc6a35e57e2047a5de9b2faf0ac96253685a1f61ba149,2024-11-21T05:46:46.007000
|
||||||
CVE-2021-20556,0,0,08db6f413d131e81353474d5ce2e943aa08b3bfd763ebf0c40b5b52497b3769f,2024-11-21T05:46:46.143000
|
CVE-2021-20556,0,0,08db6f413d131e81353474d5ce2e943aa08b3bfd763ebf0c40b5b52497b3769f,2024-11-21T05:46:46.143000
|
||||||
CVE-2021-20557,0,0,d4a8b7981ff7e6cc87b1d17dad192132faa62d5127df8614b78f16f4ade1626a,2024-11-21T05:46:46.263000
|
CVE-2021-20557,0,0,d4a8b7981ff7e6cc87b1d17dad192132faa62d5127df8614b78f16f4ade1626a,2024-11-21T05:46:46.263000
|
||||||
@ -174350,6 +174351,7 @@ CVE-2021-29822,0,0,09a76e7138aad6dfc7ab52ca0cd241d312de60620e492ef0053d6d402a455
|
|||||||
CVE-2021-29823,0,0,80ee5ee893b56420ffcc59a83a4fdbfb9d09ab542430ad06550c2ee82f0de962,2024-11-21T06:01:52.670000
|
CVE-2021-29823,0,0,80ee5ee893b56420ffcc59a83a4fdbfb9d09ab542430ad06550c2ee82f0de962,2024-11-21T06:01:52.670000
|
||||||
CVE-2021-29824,0,0,0312c92f3dad203a49fb4d74700e1473773ad1480d6687feea26a8ff93709db1,2024-11-21T06:01:52.800000
|
CVE-2021-29824,0,0,0312c92f3dad203a49fb4d74700e1473773ad1480d6687feea26a8ff93709db1,2024-11-21T06:01:52.800000
|
||||||
CVE-2021-29825,0,0,8f8f9b502a0b14e142a0efa7b37ed3681ff93a41715c013c12b6c888db3c222b,2024-11-21T06:01:52.923000
|
CVE-2021-29825,0,0,8f8f9b502a0b14e142a0efa7b37ed3681ff93a41715c013c12b6c888db3c222b,2024-11-21T06:01:52.923000
|
||||||
|
CVE-2021-29827,1,1,fff930698bc1edbad67b322bb4663d58cf6ad27a708090e12f7e3104487b552b,2024-12-19T00:15:04.873000
|
||||||
CVE-2021-29831,0,0,545e7ff83f1458c2d806dc6f01d1f78b192c18e5db6b05fcf918272ea92a8fa2,2024-11-21T06:01:53.043000
|
CVE-2021-29831,0,0,545e7ff83f1458c2d806dc6f01d1f78b192c18e5db6b05fcf918272ea92a8fa2,2024-11-21T06:01:53.043000
|
||||||
CVE-2021-29832,0,0,8585447c8f00dd814e9f628c9d6ad0f9e20be773b44ab3e6d8b767faf489e5b0,2024-11-21T06:01:53.183000
|
CVE-2021-29832,0,0,8585447c8f00dd814e9f628c9d6ad0f9e20be773b44ab3e6d8b767faf489e5b0,2024-11-21T06:01:53.183000
|
||||||
CVE-2021-29833,0,0,94f9ab4704b65f9fb584fda861c3fc97f24530f660cce16cba412828e72809d8,2024-11-21T06:01:53.310000
|
CVE-2021-29833,0,0,94f9ab4704b65f9fb584fda861c3fc97f24530f660cce16cba412828e72809d8,2024-11-21T06:01:53.310000
|
||||||
@ -192745,7 +192747,7 @@ CVE-2022-23220,0,0,587bdddc175569ce15f6940da02ed26c837c2a2634f31dc1b11143496f1ef
|
|||||||
CVE-2022-23221,0,0,5d57b4180b48987f7f4bfea9bdf7f6d1d256fcf67bfadd1791154e8dad339a61,2024-11-21T06:48:13.213000
|
CVE-2022-23221,0,0,5d57b4180b48987f7f4bfea9bdf7f6d1d256fcf67bfadd1791154e8dad339a61,2024-11-21T06:48:13.213000
|
||||||
CVE-2022-23222,0,0,fbcfcb02bfa7b24347fade63f729949c1d8bf5ab948cbe460e536a4e6f01d068,2024-11-21T06:48:13.447000
|
CVE-2022-23222,0,0,fbcfcb02bfa7b24347fade63f729949c1d8bf5ab948cbe460e536a4e6f01d068,2024-11-21T06:48:13.447000
|
||||||
CVE-2022-23223,0,0,25ae342ae40f88bf1945d23f9f75dfe8fce27795096bf371c09a001e1246210b,2024-11-21T06:48:13.633000
|
CVE-2022-23223,0,0,25ae342ae40f88bf1945d23f9f75dfe8fce27795096bf371c09a001e1246210b,2024-11-21T06:48:13.633000
|
||||||
CVE-2022-23227,0,1,b3706645308eb832d5dccf185c7850eb8de3a07b35fe0eb9b007dd17f92ce0de,2024-12-18T21:15:07.780000
|
CVE-2022-23227,0,0,b3706645308eb832d5dccf185c7850eb8de3a07b35fe0eb9b007dd17f92ce0de,2024-12-18T21:15:07.780000
|
||||||
CVE-2022-23228,0,0,4a44e8524a7adb66befd4b46314168d27b1bea7184eb2236a14910edb3b3678f,2024-11-21T06:48:13.933000
|
CVE-2022-23228,0,0,4a44e8524a7adb66befd4b46314168d27b1bea7184eb2236a14910edb3b3678f,2024-11-21T06:48:13.933000
|
||||||
CVE-2022-2323,0,0,42b9bd1c8aca4c05c89da17a9dd6087ee600d18c2ac835582ed3b37915420177,2024-11-21T07:00:46.103000
|
CVE-2022-2323,0,0,42b9bd1c8aca4c05c89da17a9dd6087ee600d18c2ac835582ed3b37915420177,2024-11-21T07:00:46.103000
|
||||||
CVE-2022-23232,0,0,dcff8a87ed3c8132e455f844254418de8e1ef002dbc4192a1cbdc4832e1bee81,2024-11-21T06:48:14.080000
|
CVE-2022-23232,0,0,dcff8a87ed3c8132e455f844254418de8e1ef002dbc4192a1cbdc4832e1bee81,2024-11-21T06:48:14.080000
|
||||||
@ -206808,6 +206810,8 @@ CVE-2022-40723,0,0,47d5d97a3b0851375c2b0cd12cb373778999cbf5827d4b1ce28e8f14d38c3
|
|||||||
CVE-2022-40724,0,0,1b728da6bac0532a4f5739b366a2da1c4452daf953fa10fb8655d678c82f9430,2024-11-21T07:21:56.407000
|
CVE-2022-40724,0,0,1b728da6bac0532a4f5739b366a2da1c4452daf953fa10fb8655d678c82f9430,2024-11-21T07:21:56.407000
|
||||||
CVE-2022-40725,0,0,64c16d64136c36afe1300757cde787f6df6e9488f4351c1c7e2d255d5914a81b,2024-11-21T07:21:56.533000
|
CVE-2022-40725,0,0,64c16d64136c36afe1300757cde787f6df6e9488f4351c1c7e2d255d5914a81b,2024-11-21T07:21:56.533000
|
||||||
CVE-2022-4073,0,0,eb32f2da0b9d93b3007909848cd6d56479d5d41162c4fcfd4fbb4577d9b55733,2023-11-07T03:56:51.877000
|
CVE-2022-4073,0,0,eb32f2da0b9d93b3007909848cd6d56479d5d41162c4fcfd4fbb4577d9b55733,2023-11-07T03:56:51.877000
|
||||||
|
CVE-2022-40732,1,1,4ecbe6ddae40cf548b03d78e71e932dbff4c7d240fbbed16524dae6f136ab4cb,2024-12-18T23:15:07.060000
|
||||||
|
CVE-2022-40733,1,1,263e280b504b7e245b6924913810fea00aaae4b92505028912d9490dd262597d,2024-12-18T23:15:07.243000
|
||||||
CVE-2022-40734,0,0,58117b64c9a903c8fb7db1a66ef34c3128ad5b1dbf19c93c401ac9d0603417fd,2024-11-21T07:21:56.670000
|
CVE-2022-40734,0,0,58117b64c9a903c8fb7db1a66ef34c3128ad5b1dbf19c93c401ac9d0603417fd,2024-11-21T07:21:56.670000
|
||||||
CVE-2022-40735,0,0,3a7574cff56da967fce27335381a9ca4c7a727787a262097bcb905faced240ce,2024-11-21T07:21:56.900000
|
CVE-2022-40735,0,0,3a7574cff56da967fce27335381a9ca4c7a727787a262097bcb905faced240ce,2024-11-21T07:21:56.900000
|
||||||
CVE-2022-40736,0,0,8a4e1664de00baf170086ecfcf7a348ddfc7ba65bafd4937bc20b78c9585a649,2024-11-21T07:21:57.087000
|
CVE-2022-40736,0,0,8a4e1664de00baf170086ecfcf7a348ddfc7ba65bafd4937bc20b78c9585a649,2024-11-21T07:21:57.087000
|
||||||
@ -209749,7 +209753,16 @@ CVE-2022-44500,0,0,b21789a06c67e872d5d73daab04f115073f5faa5e6ec649e0d7f940af0d83
|
|||||||
CVE-2022-44502,0,0,b5562c7b8267cf67bf0ad6ca70179251fa1596a66e437cdd39ac0d59e88570fa,2024-11-21T07:28:05.083000
|
CVE-2022-44502,0,0,b5562c7b8267cf67bf0ad6ca70179251fa1596a66e437cdd39ac0d59e88570fa,2024-11-21T07:28:05.083000
|
||||||
CVE-2022-4451,0,0,71bd0c76cc1206fc647acf97e23ac3111e5623c6dfa8588b7cd098d39f11a0f8,2024-11-21T07:35:17.343000
|
CVE-2022-4451,0,0,71bd0c76cc1206fc647acf97e23ac3111e5623c6dfa8588b7cd098d39f11a0f8,2024-11-21T07:35:17.343000
|
||||||
CVE-2022-44510,0,0,25c4d0e9515b57632bcb3ae200f1085ef683d9e98b07dbc882d3305076a893b5,2024-11-21T07:28:05.197000
|
CVE-2022-44510,0,0,25c4d0e9515b57632bcb3ae200f1085ef683d9e98b07dbc882d3305076a893b5,2024-11-21T07:28:05.197000
|
||||||
|
CVE-2022-44512,1,1,a6697b3d40069e359e2a92e1659cd8e3f6d6cf9eafebfb11b3afed5e04d2c18f,2024-12-19T00:15:05.067000
|
||||||
|
CVE-2022-44513,1,1,0dc3c342c558d6d3b5ea880dd08edcec553b9b362e84310d242fca8eb26d7e6a,2024-12-19T00:15:05.237000
|
||||||
|
CVE-2022-44514,1,1,d390d0e1b938fb81e6f8af6e4d547e74ad8327182d8a162a57849f661e76080f,2024-12-19T00:15:05.400000
|
||||||
|
CVE-2022-44515,1,1,164f1d12b39643bf8dfcd52a52f89b1917c8074fd5d8dd77b2bf5d8f047deb4d,2024-12-19T00:15:05.567000
|
||||||
|
CVE-2022-44516,1,1,a38975cedcd42d7d0bcd728d44438a3b017464f349988e35d43426b04ed8f75e,2024-12-19T00:15:05.727000
|
||||||
|
CVE-2022-44517,1,1,79890ab09738f6138a4691695c00694a4443bc98a11169f2cdbb2b560c52e9e6,2024-12-19T00:15:05.880000
|
||||||
|
CVE-2022-44518,1,1,710af2b566f1573a6129d21a845c4388ab3915aea2d3523c49a3331a7352ce63,2024-12-19T00:15:06.037000
|
||||||
|
CVE-2022-44519,1,1,48bffe7fa0840bca641de0f1e65e84227c78ca196675477c476c4b95d482e7fd,2024-12-19T00:15:06.200000
|
||||||
CVE-2022-4452,0,0,e23ff09cf254521b138d2873c6b347ecad79392d4de44954995ce14268d350c9,2024-11-21T07:35:17.463000
|
CVE-2022-4452,0,0,e23ff09cf254521b138d2873c6b347ecad79392d4de44954995ce14268d350c9,2024-11-21T07:35:17.463000
|
||||||
|
CVE-2022-44520,1,1,fed01525abf96cbefa5a5c09d4fb79bbfa9e3a88474609f818f285243d3fc52f,2024-12-19T00:15:06.360000
|
||||||
CVE-2022-4453,0,0,9b00e366e9d0c0ef9c324b7b982b02b3dcac63ebb143aa7afbf887a477161fb4,2024-11-21T07:35:17.583000
|
CVE-2022-4453,0,0,9b00e366e9d0c0ef9c324b7b982b02b3dcac63ebb143aa7afbf887a477161fb4,2024-11-21T07:35:17.583000
|
||||||
CVE-2022-44532,0,0,4207f3e98f5233bb1738bdd6c69782a0cd2348956681f5d35417e00bb16bafe5,2024-11-21T07:28:05.340000
|
CVE-2022-44532,0,0,4207f3e98f5233bb1738bdd6c69782a0cd2348956681f5d35417e00bb16bafe5,2024-11-21T07:28:05.340000
|
||||||
CVE-2022-44533,0,0,35103e589f79c98255b730dc3b424c6479616183eb90f9be40ddec7fdd1d6e6e,2024-11-21T07:28:05.460000
|
CVE-2022-44533,0,0,35103e589f79c98255b730dc3b424c6479616183eb90f9be40ddec7fdd1d6e6e,2024-11-21T07:28:05.460000
|
||||||
@ -216332,6 +216345,7 @@ CVE-2023-21582,0,0,4f5bb933cd17a5c1613aa364a41ce8982934e8b8f3eae19a30c441e8cd6b7
|
|||||||
CVE-2023-21583,0,0,da3e056f56ad63f7eae14f2e8d9ffa08b78397274979a093ffb37a9e5e3ee287,2024-11-21T07:43:07.860000
|
CVE-2023-21583,0,0,da3e056f56ad63f7eae14f2e8d9ffa08b78397274979a093ffb37a9e5e3ee287,2024-11-21T07:43:07.860000
|
||||||
CVE-2023-21584,0,0,9b4764fbfdd2b085572e653159d7e41bc33dae3d1026fdf2ef7488386e1ab612,2024-11-21T07:43:07.970000
|
CVE-2023-21584,0,0,9b4764fbfdd2b085572e653159d7e41bc33dae3d1026fdf2ef7488386e1ab612,2024-11-21T07:43:07.970000
|
||||||
CVE-2023-21585,0,0,cff3f3c1e359f7c3a70fbba0253fdce9609b428d2fe451cc230c57a04c06c5d6,2024-11-21T07:43:08.090000
|
CVE-2023-21585,0,0,cff3f3c1e359f7c3a70fbba0253fdce9609b428d2fe451cc230c57a04c06c5d6,2024-11-21T07:43:08.090000
|
||||||
|
CVE-2023-21586,1,1,c7342d9abd36c8ce439cd66ee023e93be01e88b044fb33ce9b7c5f4cb38f4702,2024-12-19T00:15:06.530000
|
||||||
CVE-2023-21587,0,0,529caf054840ca5e36185792609bc9be0ffc5215314f723e5c9028d34abee64c,2024-11-21T07:43:08.223000
|
CVE-2023-21587,0,0,529caf054840ca5e36185792609bc9be0ffc5215314f723e5c9028d34abee64c,2024-11-21T07:43:08.223000
|
||||||
CVE-2023-21588,0,0,baff138c9f76bdbd381c2c168eebd52f4b047936191139a0418408fd3b806d62,2024-11-21T07:43:08.360000
|
CVE-2023-21588,0,0,baff138c9f76bdbd381c2c168eebd52f4b047936191139a0418408fd3b806d62,2024-11-21T07:43:08.360000
|
||||||
CVE-2023-21589,0,0,4b9a8c28267032bdbbeeb191175e5f1bfdffcc52264c17cc8c8f9227af3eddc6,2024-11-21T07:43:08.470000
|
CVE-2023-21589,0,0,4b9a8c28267032bdbbeeb191175e5f1bfdffcc52264c17cc8c8f9227af3eddc6,2024-11-21T07:43:08.470000
|
||||||
@ -232395,7 +232409,7 @@ CVE-2023-41873,0,0,144df708eec5cdc99bf9fc900b8b496963af7a10b5fe491bc7a23f78f7855
|
|||||||
CVE-2023-41874,0,0,a273518103b67315483aec10e4142508e72449f6d8f6ebe80921f7b6ecf22161,2024-11-21T08:21:49.820000
|
CVE-2023-41874,0,0,a273518103b67315483aec10e4142508e72449f6d8f6ebe80921f7b6ecf22161,2024-11-21T08:21:49.820000
|
||||||
CVE-2023-41875,0,0,0219e72c04918431bddec1b861997edbd6f7ffe58adb18a9206c7114d4b37885,2024-12-13T15:15:25.950000
|
CVE-2023-41875,0,0,0219e72c04918431bddec1b861997edbd6f7ffe58adb18a9206c7114d4b37885,2024-12-13T15:15:25.950000
|
||||||
CVE-2023-41876,0,0,c65a67afd85426602e7ce8d50691736379577812fe96ecc473c7a63fea44bdeb,2024-11-21T08:21:49.953000
|
CVE-2023-41876,0,0,c65a67afd85426602e7ce8d50691736379577812fe96ecc473c7a63fea44bdeb,2024-11-21T08:21:49.953000
|
||||||
CVE-2023-41877,0,1,05182afcf80722c5de0a5cdefd2d1d6589a76671002a6dde20b43c88da286b35,2024-12-18T22:01:15.063000
|
CVE-2023-41877,0,0,05182afcf80722c5de0a5cdefd2d1d6589a76671002a6dde20b43c88da286b35,2024-12-18T22:01:15.063000
|
||||||
CVE-2023-41878,0,0,69f5df70c8cf256edf441a21003ad975c00708528a81d027d3cbb62167be0250,2024-11-21T08:21:50.207000
|
CVE-2023-41878,0,0,69f5df70c8cf256edf441a21003ad975c00708528a81d027d3cbb62167be0250,2024-11-21T08:21:50.207000
|
||||||
CVE-2023-41879,0,0,26c3b9818b764a1ed064ebf13595d3ddd709f842d054238762177756b3db12b0,2024-11-21T08:21:50.350000
|
CVE-2023-41879,0,0,26c3b9818b764a1ed064ebf13595d3ddd709f842d054238762177756b3db12b0,2024-11-21T08:21:50.350000
|
||||||
CVE-2023-4188,0,0,2d805671cfcf3697b72c8ab984da36d2fcc19712a1dca338f0c3f2fe40c54075,2024-11-21T08:34:34.847000
|
CVE-2023-4188,0,0,2d805671cfcf3697b72c8ab984da36d2fcc19712a1dca338f0c3f2fe40c54075,2024-11-21T08:34:34.847000
|
||||||
@ -238985,8 +238999,8 @@ CVE-2023-51440,0,0,1169f2ff9e326f6a3788f618809df1fe8188ee99151bee69ee1c834192da2
|
|||||||
CVE-2023-51441,0,0,a1f5c39c8dff7bf99bb5a5fa410c3c1174c89222db585eebd25100439c38d134,2024-11-21T08:38:07.500000
|
CVE-2023-51441,0,0,a1f5c39c8dff7bf99bb5a5fa410c3c1174c89222db585eebd25100439c38d134,2024-11-21T08:38:07.500000
|
||||||
CVE-2023-51442,0,0,1c1738101beb2069f2b1a7e3fda08286945bd667c62bf8c2c6862c2db1b18d8f,2024-11-21T08:38:07.630000
|
CVE-2023-51442,0,0,1c1738101beb2069f2b1a7e3fda08286945bd667c62bf8c2c6862c2db1b18d8f,2024-11-21T08:38:07.630000
|
||||||
CVE-2023-51443,0,0,bc5dfbcf2d47b2402929c15b90b4be90f3f7485f94767446ff8ec5a8bbd43f0a,2024-11-21T08:38:07.743000
|
CVE-2023-51443,0,0,bc5dfbcf2d47b2402929c15b90b4be90f3f7485f94767446ff8ec5a8bbd43f0a,2024-11-21T08:38:07.743000
|
||||||
CVE-2023-51444,0,1,e8424d7dbab81f18c11cb58faf4fc4e186576a125c882d03ea2d7e9cf75e0421,2024-12-18T21:58:24.790000
|
CVE-2023-51444,0,0,e8424d7dbab81f18c11cb58faf4fc4e186576a125c882d03ea2d7e9cf75e0421,2024-12-18T21:58:24.790000
|
||||||
CVE-2023-51445,0,1,41116820fca24ff32c8b590dc0a48077ad37e3c179f86cf28f8cf11b3c34d0b5,2024-12-18T21:56:24.053000
|
CVE-2023-51445,0,0,41116820fca24ff32c8b590dc0a48077ad37e3c179f86cf28f8cf11b3c34d0b5,2024-12-18T21:56:24.053000
|
||||||
CVE-2023-51446,0,0,477f5d27d22a3cba1e4a3cc51b0aade0149e549a265a572147ead5a7c2014b5d,2024-11-21T08:38:08.127000
|
CVE-2023-51446,0,0,477f5d27d22a3cba1e4a3cc51b0aade0149e549a265a572147ead5a7c2014b5d,2024-11-21T08:38:08.127000
|
||||||
CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000
|
CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000
|
||||||
CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000
|
CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000
|
||||||
@ -244896,13 +244910,13 @@ CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33
|
|||||||
CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000
|
CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000
|
||||||
CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000
|
CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000
|
||||||
CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000
|
CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000
|
||||||
CVE-2024-12686,1,1,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
|
CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
|
||||||
CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000
|
CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000
|
||||||
CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000
|
CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000
|
||||||
CVE-2024-12692,1,1,650dea48ea2dbe7711dc0bf271331ff770ac41a6b305ff8ad09ffba0d2163ba7,2024-12-18T22:15:05.730000
|
CVE-2024-12692,0,0,650dea48ea2dbe7711dc0bf271331ff770ac41a6b305ff8ad09ffba0d2163ba7,2024-12-18T22:15:05.730000
|
||||||
CVE-2024-12693,1,1,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84281,2024-12-18T22:15:06.293000
|
CVE-2024-12693,0,0,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84281,2024-12-18T22:15:06.293000
|
||||||
CVE-2024-12694,1,1,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000
|
CVE-2024-12694,0,0,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000
|
||||||
CVE-2024-12695,1,1,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000
|
CVE-2024-12695,0,0,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000
|
||||||
CVE-2024-12698,0,0,bb87160466c668f8935491c0e9c96bcd8d37f4e72410a6dabca6f522c3fa9b9a,2024-12-18T05:15:07.840000
|
CVE-2024-12698,0,0,bb87160466c668f8935491c0e9c96bcd8d37f4e72410a6dabca6f522c3fa9b9a,2024-12-18T05:15:07.840000
|
||||||
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
|
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
|
||||||
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
|
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
|
||||||
@ -249144,7 +249158,7 @@ CVE-2024-24743,0,0,8b8eb5a56f12b6c53a7a972a91c151337f030c81d2382bab605f73cf09ae6
|
|||||||
CVE-2024-24746,0,0,29b64eb040fe3dc6e09b5dd0640a77052b82c31dc0faef52d04d78f87eb66b86,2024-11-21T08:59:36.647000
|
CVE-2024-24746,0,0,29b64eb040fe3dc6e09b5dd0640a77052b82c31dc0faef52d04d78f87eb66b86,2024-11-21T08:59:36.647000
|
||||||
CVE-2024-24747,0,0,8125c5ab54fcbe503d2d7453a1ee5839c17e4edb306b2c7df3df0dd863da6429,2024-11-21T08:59:36.850000
|
CVE-2024-24747,0,0,8125c5ab54fcbe503d2d7453a1ee5839c17e4edb306b2c7df3df0dd863da6429,2024-11-21T08:59:36.850000
|
||||||
CVE-2024-24748,0,0,0cdfc68f983790a7c3e213f0da1280264c12625bb9d03e0a2404e1b3d3a4e6c4,2024-11-21T08:59:36.993000
|
CVE-2024-24748,0,0,0cdfc68f983790a7c3e213f0da1280264c12625bb9d03e0a2404e1b3d3a4e6c4,2024-11-21T08:59:36.993000
|
||||||
CVE-2024-24749,0,1,5250cf2390a657b7cf3426d2a81201c26d285bcd980c249283207a957e369a70,2024-12-18T22:08:46.760000
|
CVE-2024-24749,0,0,5250cf2390a657b7cf3426d2a81201c26d285bcd980c249283207a957e369a70,2024-12-18T22:08:46.760000
|
||||||
CVE-2024-2475,0,0,84dd791b3d89c80d7bd01728fd7a39eb99447b51627d0914f35715b92d401100,2024-11-21T09:09:50.110000
|
CVE-2024-2475,0,0,84dd791b3d89c80d7bd01728fd7a39eb99447b51627d0914f35715b92d401100,2024-11-21T09:09:50.110000
|
||||||
CVE-2024-24750,0,0,cc34797da60c6d05caf20a8995e2225cf1cccf6fbd6e3c7bedfabc7705510111,2024-12-17T17:40:47.303000
|
CVE-2024-24750,0,0,cc34797da60c6d05caf20a8995e2225cf1cccf6fbd6e3c7bedfabc7705510111,2024-12-17T17:40:47.303000
|
||||||
CVE-2024-24751,0,0,332b3d4e3a209828a661991efd3347cced117fe88519ae4eeeb1b40b069fd0f8,2024-11-21T08:59:37.407000
|
CVE-2024-24751,0,0,332b3d4e3a209828a661991efd3347cced117fe88519ae4eeeb1b40b069fd0f8,2024-11-21T08:59:37.407000
|
||||||
@ -249789,12 +249803,12 @@ CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0
|
|||||||
CVE-2024-25615,0,0,50c65986bbb8dc5aafc867c9e37b361b7c08d50d65dd263fb769956dc6ae116a,2024-11-21T09:01:05.260000
|
CVE-2024-25615,0,0,50c65986bbb8dc5aafc867c9e37b361b7c08d50d65dd263fb769956dc6ae116a,2024-11-21T09:01:05.260000
|
||||||
CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000
|
CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000
|
||||||
CVE-2024-25617,0,0,17f484e162566f54c12e8f4f84695e904b29b76183dabdc64b901466b20a705f,2024-11-21T09:01:05.533000
|
CVE-2024-25617,0,0,17f484e162566f54c12e8f4f84695e904b29b76183dabdc64b901466b20a705f,2024-11-21T09:01:05.533000
|
||||||
CVE-2024-25618,0,1,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000
|
CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000
|
||||||
CVE-2024-25619,0,1,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000
|
CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000
|
||||||
CVE-2024-2562,0,0,6acc014ac1c8f4275f46fe82a47eb5d09d436c296b92b3bb232858f0cdeed994,2024-11-21T09:10:01.040000
|
CVE-2024-2562,0,0,6acc014ac1c8f4275f46fe82a47eb5d09d436c296b92b3bb232858f0cdeed994,2024-11-21T09:10:01.040000
|
||||||
CVE-2024-25620,0,0,b50e6d09af7ce768a716dc2ff7ffa7e76bd9a236ffa80ba663793968d8d53334,2024-11-21T09:01:05.923000
|
CVE-2024-25620,0,0,b50e6d09af7ce768a716dc2ff7ffa7e76bd9a236ffa80ba663793968d8d53334,2024-11-21T09:01:05.923000
|
||||||
CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000
|
CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000
|
||||||
CVE-2024-25623,0,1,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000
|
CVE-2024-25623,0,0,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000
|
||||||
CVE-2024-25624,0,0,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000
|
CVE-2024-25624,0,0,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000
|
||||||
CVE-2024-25625,0,0,84707cd28e1bdaa9fde780703bf2a9a7e5d5981a505df8c5ad93f3b9fec8212d,2024-11-21T09:01:06.387000
|
CVE-2024-25625,0,0,84707cd28e1bdaa9fde780703bf2a9a7e5d5981a505df8c5ad93f3b9fec8212d,2024-11-21T09:01:06.387000
|
||||||
CVE-2024-25626,0,0,fd128277875e205dcfef22acbe212d50e94b3f10ad9e2e84a95cfbcc859efdc3,2024-11-21T09:01:06.513000
|
CVE-2024-25626,0,0,fd128277875e205dcfef22acbe212d50e94b3f10ad9e2e84a95cfbcc859efdc3,2024-11-21T09:01:06.513000
|
||||||
@ -251029,7 +251043,7 @@ CVE-2024-27079,0,0,07de70fa8c3b809ff48e2ff24e87d600a8debe70cf3c7268624ebbd9a1379
|
|||||||
CVE-2024-2708,0,0,bf697bc47a2f6d1f340b86849095414aa8022fd5fa182a3b6858d8aad137b35f,2024-12-12T17:29:07.680000
|
CVE-2024-2708,0,0,bf697bc47a2f6d1f340b86849095414aa8022fd5fa182a3b6858d8aad137b35f,2024-12-12T17:29:07.680000
|
||||||
CVE-2024-27080,0,0,02429991ce9474cf345b7cb16f8cc48985b566887cfdb16e19d4245116b2d135,2024-11-21T09:03:49.183000
|
CVE-2024-27080,0,0,02429991ce9474cf345b7cb16f8cc48985b566887cfdb16e19d4245116b2d135,2024-11-21T09:03:49.183000
|
||||||
CVE-2024-27081,0,0,80ca12be4ccb643aa9b9acced80a6c8edec931ae4a7630a48e36baddb6e3240c,2024-11-21T09:03:49.310000
|
CVE-2024-27081,0,0,80ca12be4ccb643aa9b9acced80a6c8edec931ae4a7630a48e36baddb6e3240c,2024-11-21T09:03:49.310000
|
||||||
CVE-2024-27082,0,1,4317d32a3e0e8ed99d5825e499a15b4bf1a86f7bc115f4ec81a78b0bcd430db5,2024-12-18T21:01:17.677000
|
CVE-2024-27082,0,0,4317d32a3e0e8ed99d5825e499a15b4bf1a86f7bc115f4ec81a78b0bcd430db5,2024-12-18T21:01:17.677000
|
||||||
CVE-2024-27083,0,0,0a867c69f0761d5202838e0d6673017855748c22aaa12a5775e2cc98792089a5,2024-11-21T09:03:49.570000
|
CVE-2024-27083,0,0,0a867c69f0761d5202838e0d6673017855748c22aaa12a5775e2cc98792089a5,2024-11-21T09:03:49.570000
|
||||||
CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416e16,2024-02-26T18:15:07.920000
|
CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416e16,2024-02-26T18:15:07.920000
|
||||||
CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000
|
CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000
|
||||||
@ -253003,7 +253017,7 @@ CVE-2024-29890,0,0,d7aeef7b1a852d07093e767dae05e03ec8f713df2d306c8f69aabec8a291c
|
|||||||
CVE-2024-29891,0,0,f037b09b07aae70e8f17162cf2f9555dce693854577cc8fe640959768b6c2f9c,2024-11-21T09:08:33.593000
|
CVE-2024-29891,0,0,f037b09b07aae70e8f17162cf2f9555dce693854577cc8fe640959768b6c2f9c,2024-11-21T09:08:33.593000
|
||||||
CVE-2024-29892,0,0,0eabeb7cb6695ef5e7c670b1dc02008d4a59b639330a4432c44db18dea85266a,2024-11-21T09:08:33.727000
|
CVE-2024-29892,0,0,0eabeb7cb6695ef5e7c670b1dc02008d4a59b639330a4432c44db18dea85266a,2024-11-21T09:08:33.727000
|
||||||
CVE-2024-29893,0,0,c8af367d9c587e41584706a11632b08d7b7ae69bfffc1ce0ee4de371d408e149,2024-11-21T09:08:33.863000
|
CVE-2024-29893,0,0,c8af367d9c587e41584706a11632b08d7b7ae69bfffc1ce0ee4de371d408e149,2024-11-21T09:08:33.863000
|
||||||
CVE-2024-29894,0,1,63a0f8ebc2b89dbefe86d49c0639f6e96b849498d3625b601a9b5117c947eff3,2024-12-18T21:10:38.887000
|
CVE-2024-29894,0,0,63a0f8ebc2b89dbefe86d49c0639f6e96b849498d3625b601a9b5117c947eff3,2024-12-18T21:10:38.887000
|
||||||
CVE-2024-29895,0,0,304ec674d940c6c6be41bc00c8f8967d1334e98bed6f24f921965e14ed63e7ab,2024-11-21T09:08:34.137000
|
CVE-2024-29895,0,0,304ec674d940c6c6be41bc00c8f8967d1334e98bed6f24f921965e14ed63e7ab,2024-11-21T09:08:34.137000
|
||||||
CVE-2024-29896,0,0,145f328aab85293779e8f763f5e2657bc5ad706121e996820012b73884b52f55,2024-11-21T09:08:34.273000
|
CVE-2024-29896,0,0,145f328aab85293779e8f763f5e2657bc5ad706121e996820012b73884b52f55,2024-11-21T09:08:34.273000
|
||||||
CVE-2024-29897,0,0,890ab49af1d0f2615103d1d58d4cf202a16f4b443c3efac64624c08c88a21b24,2024-11-21T09:08:34.397000
|
CVE-2024-29897,0,0,890ab49af1d0f2615103d1d58d4cf202a16f4b443c3efac64624c08c88a21b24,2024-11-21T09:08:34.397000
|
||||||
@ -258966,6 +258980,7 @@ CVE-2024-37642,0,0,fe3461e5fb2788de711bfd9b6bb47fd5e17a67ddb0ff15346912de18f8c42
|
|||||||
CVE-2024-37643,0,0,1d855f4bf0f785e71cea62cbc0f369511f6ea0dce9a50a9f322baa5658c69f7b,2024-11-21T09:24:10.850000
|
CVE-2024-37643,0,0,1d855f4bf0f785e71cea62cbc0f369511f6ea0dce9a50a9f322baa5658c69f7b,2024-11-21T09:24:10.850000
|
||||||
CVE-2024-37644,0,0,04b02f37a9b83c09d899849116b647177377d8a76e70c7d8db488f726c3bd5e7,2024-11-21T09:24:11.063000
|
CVE-2024-37644,0,0,04b02f37a9b83c09d899849116b647177377d8a76e70c7d8db488f726c3bd5e7,2024-11-21T09:24:11.063000
|
||||||
CVE-2024-37645,0,0,e4c63e220f43de5878e40a5e77259bd215d94fa70db73f63ff4753c220b74c30,2024-11-21T09:24:11.293000
|
CVE-2024-37645,0,0,e4c63e220f43de5878e40a5e77259bd215d94fa70db73f63ff4753c220b74c30,2024-11-21T09:24:11.293000
|
||||||
|
CVE-2024-37649,1,1,611c86dc432bb1f4b55a852e080016fea79189b71e099793c648f84ae33340a4,2024-12-18T23:15:07.440000
|
||||||
CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000
|
CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000
|
||||||
CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000
|
CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000
|
||||||
CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000
|
CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000
|
||||||
@ -260633,6 +260648,7 @@ CVE-2024-3979,0,0,0afe50bc44d6fa6b597cd86ec198fb5812e3efa26f9c96f16b2dc019765fb5
|
|||||||
CVE-2024-39791,0,0,84800cbf50106122b4ec00c830726d3c0c16e597f5511aff68896621728fa7b5,2024-08-20T17:15:56.067000
|
CVE-2024-39791,0,0,84800cbf50106122b4ec00c830726d3c0c16e597f5511aff68896621728fa7b5,2024-08-20T17:15:56.067000
|
||||||
CVE-2024-39792,0,0,a0e01fb34a5f6d0b714b844b637779a453bc01fac9209900d57b56253997cfee,2024-08-19T16:20:28.967000
|
CVE-2024-39792,0,0,a0e01fb34a5f6d0b714b844b637779a453bc01fac9209900d57b56253997cfee,2024-08-19T16:20:28.967000
|
||||||
CVE-2024-3980,0,0,5ed554dffef87bebecad0e1e92147ec3b9a94d4293f1f5208c881e426d70aa58,2024-10-30T15:33:12.697000
|
CVE-2024-3980,0,0,5ed554dffef87bebecad0e1e92147ec3b9a94d4293f1f5208c881e426d70aa58,2024-10-30T15:33:12.697000
|
||||||
|
CVE-2024-39804,1,1,1443ebe065e0e4d5717fd837b10d865cedfd8feca4b62ad4eaf3caa3103ebfa2,2024-12-18T23:15:07.640000
|
||||||
CVE-2024-39806,0,0,820d3b5181086101e827009cfe4b737213c68e8e8373d5aee74b56640c974b56,2024-10-16T16:49:41.507000
|
CVE-2024-39806,0,0,820d3b5181086101e827009cfe4b737213c68e8e8373d5aee74b56640c974b56,2024-10-16T16:49:41.507000
|
||||||
CVE-2024-39807,0,0,a5f08786585e608d689a1daeac36093e7823985001ef9fadb52054fa4e796736,2024-11-21T09:28:22.227000
|
CVE-2024-39807,0,0,a5f08786585e608d689a1daeac36093e7823985001ef9fadb52054fa4e796736,2024-11-21T09:28:22.227000
|
||||||
CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa7f1,2024-09-11T16:26:11.920000
|
CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa7f1,2024-09-11T16:26:11.920000
|
||||||
@ -261434,11 +261450,13 @@ CVE-2024-41133,0,0,eaa006680fbe52171c055ee02d725e1b8155ec7b71c3a3acf39eb708d36d5
|
|||||||
CVE-2024-41134,0,0,23d5c7d7f4402caa31388f429a7315bd4b4bc9813b8271b656a2f311d8a3a753,2024-11-21T09:32:18.087000
|
CVE-2024-41134,0,0,23d5c7d7f4402caa31388f429a7315bd4b4bc9813b8271b656a2f311d8a3a753,2024-11-21T09:32:18.087000
|
||||||
CVE-2024-41135,0,0,fcaf63fba315037fb68d1d925bded9bb7982510c754a09114db334bb9fd16881,2024-11-21T09:32:18.203000
|
CVE-2024-41135,0,0,fcaf63fba315037fb68d1d925bded9bb7982510c754a09114db334bb9fd16881,2024-11-21T09:32:18.203000
|
||||||
CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000
|
CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000
|
||||||
|
CVE-2024-41138,1,1,de8937ba571c423a59c7f9fe9e19d9f039af80b9830484d75c60de74332fb341,2024-12-18T23:15:07.813000
|
||||||
CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000
|
CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000
|
||||||
CVE-2024-4114,0,0,bffdfff59b8e8c1973fa293ec179ba5ad5b6804845f0d8c3580b8b465845a4ff,2024-11-21T09:42:12.847000
|
CVE-2024-4114,0,0,bffdfff59b8e8c1973fa293ec179ba5ad5b6804845f0d8c3580b8b465845a4ff,2024-11-21T09:42:12.847000
|
||||||
CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000
|
CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000
|
||||||
CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000
|
CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000
|
||||||
CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000
|
CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000
|
||||||
|
CVE-2024-41145,1,1,77e2343197ccbb28092a01ae4f2a3524bb2b2c483f0a4f8ccc0f2107bf596127,2024-12-18T23:15:07.970000
|
||||||
CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000
|
CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000
|
||||||
CVE-2024-4115,0,0,b57267cb8e1bb6187223c6763b432c2e47371c5db7fb3c6e57e19714f114293c,2024-11-21T09:42:12.977000
|
CVE-2024-4115,0,0,b57267cb8e1bb6187223c6763b432c2e47371c5db7fb3c6e57e19714f114293c,2024-11-21T09:42:12.977000
|
||||||
CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000
|
CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000
|
||||||
@ -261446,12 +261464,14 @@ CVE-2024-41151,0,0,00f13e1e96fa8ce3e2849a0ecdb2937bd23efcaa80a1d6b9e409fd228363f
|
|||||||
CVE-2024-41153,0,0,c0ab6701dfb0e7935b555b1fa094f0ee4f1bf4a1c16645e01a3ec31537dc2a4e,2024-10-31T14:37:48.533000
|
CVE-2024-41153,0,0,c0ab6701dfb0e7935b555b1fa094f0ee4f1bf4a1c16645e01a3ec31537dc2a4e,2024-10-31T14:37:48.533000
|
||||||
CVE-2024-41156,0,0,4e48f11d1fb4cd9de12eef64bee0a3ff2f5403553caa8e40519c489b9350c166,2024-12-05T15:29:31.730000
|
CVE-2024-41156,0,0,4e48f11d1fb4cd9de12eef64bee0a3ff2f5403553caa8e40519c489b9350c166,2024-12-05T15:29:31.730000
|
||||||
CVE-2024-41157,0,0,687c6bf6c1a2a644076449fb3f6cf8733831e4b295f95e907ece1f39dc641094,2024-09-04T16:30:40.737000
|
CVE-2024-41157,0,0,687c6bf6c1a2a644076449fb3f6cf8733831e4b295f95e907ece1f39dc641094,2024-09-04T16:30:40.737000
|
||||||
|
CVE-2024-41159,1,1,03637d611014a38e6e3b05f7bde30132e51a028877d0bba9b9ae193cd7ffe82e,2024-12-18T23:15:08.140000
|
||||||
CVE-2024-4116,0,0,fb13e9eda5d5b0f87b4a1a6faf2d47dd767a1cd80c123d34508608e977fd6f59,2024-11-21T09:42:13.103000
|
CVE-2024-4116,0,0,fb13e9eda5d5b0f87b4a1a6faf2d47dd767a1cd80c123d34508608e977fd6f59,2024-11-21T09:42:13.103000
|
||||||
CVE-2024-41160,0,0,59352b379d517c3d21973bcf1f1dabfc101e56caaa086108874e9f5a5016dec8,2024-09-09T12:21:53.383000
|
CVE-2024-41160,0,0,59352b379d517c3d21973bcf1f1dabfc101e56caaa086108874e9f5a5016dec8,2024-09-09T12:21:53.383000
|
||||||
CVE-2024-41161,0,0,c44c40c9181bdc0411297b718d634c69b4cc443072a4bbfc4be96011581fd659,2024-08-20T17:09:50.647000
|
CVE-2024-41161,0,0,c44c40c9181bdc0411297b718d634c69b4cc443072a4bbfc4be96011581fd659,2024-08-20T17:09:50.647000
|
||||||
CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138759,2024-09-04T17:03:53.010000
|
CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138759,2024-09-04T17:03:53.010000
|
||||||
CVE-2024-41163,0,0,acd3d59e23a7c7b4b0c3e74d19b58377cdb81402be9adbd0a5cfe7a91ece1831,2024-12-18T15:15:10.730000
|
CVE-2024-41163,0,0,acd3d59e23a7c7b4b0c3e74d19b58377cdb81402be9adbd0a5cfe7a91ece1831,2024-12-18T15:15:10.730000
|
||||||
CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000
|
CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000
|
||||||
|
CVE-2024-41165,1,1,8f8f25c9e56a41527b25ef69ce06e4eed865113e8f19257748f26cee82a5ddfb,2024-12-18T23:15:08.300000
|
||||||
CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000
|
CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000
|
||||||
CVE-2024-4117,0,0,6cc086281cfe564ad1a8b73d3f7bd2e9fa0d2a40b390da51a0a4f6965f4fec1f,2024-11-21T09:42:13.230000
|
CVE-2024-4117,0,0,6cc086281cfe564ad1a8b73d3f7bd2e9fa0d2a40b390da51a0a4f6965f4fec1f,2024-11-21T09:42:13.230000
|
||||||
CVE-2024-41170,0,0,7c50c7e0ef992b5a3c278ba9993ae63d88ca15fcfd1b1982b492fe16db9c5784,2024-09-10T12:09:50.377000
|
CVE-2024-41170,0,0,7c50c7e0ef992b5a3c278ba9993ae63d88ca15fcfd1b1982b492fe16db9c5784,2024-09-10T12:09:50.377000
|
||||||
@ -261965,6 +261985,7 @@ CVE-2024-41999,0,0,b97edfde7ae6eb79fac26588dc330cd7e8dfe8ef88db849221e314600b8cf
|
|||||||
CVE-2024-4200,0,0,f038714f68ea12f4c74fb21fbba21d18e23ff4002802fc658c541b8aad8db5b3,2024-11-21T09:42:22.677000
|
CVE-2024-4200,0,0,f038714f68ea12f4c74fb21fbba21d18e23ff4002802fc658c541b8aad8db5b3,2024-11-21T09:42:22.677000
|
||||||
CVE-2024-42000,0,0,2e5e6eba94260d1248a64e384ab7190b55ba9e666e827b568cb017e068a9a34b,2024-11-14T16:48:30.013000
|
CVE-2024-42000,0,0,2e5e6eba94260d1248a64e384ab7190b55ba9e666e827b568cb017e068a9a34b,2024-11-14T16:48:30.013000
|
||||||
CVE-2024-42001,0,0,7b8b45588c9e661c6cad79b697fc90c37112d9be488e1f5fc1421e2d70534ef5,2024-08-20T16:37:05.447000
|
CVE-2024-42001,0,0,7b8b45588c9e661c6cad79b697fc90c37112d9be488e1f5fc1421e2d70534ef5,2024-08-20T16:37:05.447000
|
||||||
|
CVE-2024-42004,1,1,817bffe189720697fa27094cb065692dab1e4b1f1fda226cf8e46b370d47891a,2024-12-18T23:15:08.450000
|
||||||
CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447d04,2024-10-23T18:22:48.937000
|
CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447d04,2024-10-23T18:22:48.937000
|
||||||
CVE-2024-42006,0,0,db719e10e8f2437035bfb372f689cb5ad1b3ba987ed59129a01e11cdd446ff43,2024-08-21T13:26:54.577000
|
CVE-2024-42006,0,0,db719e10e8f2437035bfb372f689cb5ad1b3ba987ed59129a01e11cdd446ff43,2024-08-21T13:26:54.577000
|
||||||
CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000
|
CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000
|
||||||
@ -262142,6 +262163,7 @@ CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d8
|
|||||||
CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000
|
CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000
|
||||||
CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000
|
CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000
|
||||||
CVE-2024-4222,0,0,404604444d77dc73b57c36b8a95aa3dc38057a1a3ba659619f4989018835c2b9,2024-11-21T09:42:25.043000
|
CVE-2024-4222,0,0,404604444d77dc73b57c36b8a95aa3dc38057a1a3ba659619f4989018835c2b9,2024-11-21T09:42:25.043000
|
||||||
|
CVE-2024-42220,1,1,3efaea9f9008d92d0d433576bd8e615ab7d920bd31eb633108deeefd65ebfba2,2024-12-18T23:15:08.597000
|
||||||
CVE-2024-42222,0,0,31d1ecceb29f6dc0a006287b8f36eb69950f688f623593894878e73f68b4744b,2024-11-21T09:33:45.030000
|
CVE-2024-42222,0,0,31d1ecceb29f6dc0a006287b8f36eb69950f688f623593894878e73f68b4744b,2024-11-21T09:33:45.030000
|
||||||
CVE-2024-42223,0,0,bfd3e9b2497c2cd4ce56cfc4b3f7c8c085d8282b329417cd9636c8478537873e,2024-11-21T09:33:45.160000
|
CVE-2024-42223,0,0,bfd3e9b2497c2cd4ce56cfc4b3f7c8c085d8282b329417cd9636c8478537873e,2024-11-21T09:33:45.160000
|
||||||
CVE-2024-42224,0,0,a2467d1fdcd4f892f0d1e376bc5d4807929bf44cfae506d429e598dfa3e2b882,2024-11-21T09:33:45.307000
|
CVE-2024-42224,0,0,a2467d1fdcd4f892f0d1e376bc5d4807929bf44cfae506d429e598dfa3e2b882,2024-11-21T09:33:45.307000
|
||||||
@ -262741,6 +262763,7 @@ CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec
|
|||||||
CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000
|
CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000
|
||||||
CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000
|
CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000
|
||||||
CVE-2024-43105,0,0,e347f7b09a6bd72c4cce9575828cf84dd0078060fb85e7c631ae4a4f65e5a4e2,2024-08-23T16:18:28.547000
|
CVE-2024-43105,0,0,e347f7b09a6bd72c4cce9575828cf84dd0078060fb85e7c631ae4a4f65e5a4e2,2024-08-23T16:18:28.547000
|
||||||
|
CVE-2024-43106,1,1,7c35bd64ddd80049f7425ea57212cdb212a079b1dc41737dbd159b80835e180b,2024-12-18T23:15:08.760000
|
||||||
CVE-2024-43108,0,0,77fa3735512d5828a3d75fa92bafe3bf54d868b127562dbed774be5fb641f858,2024-10-17T17:15:11.883000
|
CVE-2024-43108,0,0,77fa3735512d5828a3d75fa92bafe3bf54d868b127562dbed774be5fb641f858,2024-10-17T17:15:11.883000
|
||||||
CVE-2024-4311,0,0,76e51b82bcf102c4a7a18c5b03d4ba2a6e78929354b4c7d54c7e39e256fd7ef3,2024-11-18T16:35:13.737000
|
CVE-2024-4311,0,0,76e51b82bcf102c4a7a18c5b03d4ba2a6e78929354b4c7d54c7e39e256fd7ef3,2024-11-18T16:35:13.737000
|
||||||
CVE-2024-43110,0,0,51650deb7aee7ab0cf914391f943f7fe2c91b657e3cdae3cff1f5f569194dcba,2024-09-05T21:22:04.810000
|
CVE-2024-43110,0,0,51650deb7aee7ab0cf914391f943f7fe2c91b657e3cdae3cff1f5f569194dcba,2024-09-05T21:22:04.810000
|
||||||
@ -263211,7 +263234,7 @@ CVE-2024-43590,0,0,56f37bed6fa12b529a536cabd867859c2b7202ec5a699f63f91ae2da59bda
|
|||||||
CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000
|
CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000
|
||||||
CVE-2024-43592,0,0,aefb3ea2eef4806b0b04bf1216ce25a8b6f83f456c5748fe7fb5b675b193040f,2024-10-22T19:30:02.777000
|
CVE-2024-43592,0,0,aefb3ea2eef4806b0b04bf1216ce25a8b6f83f456c5748fe7fb5b675b193040f,2024-10-22T19:30:02.777000
|
||||||
CVE-2024-43593,0,0,2bb48f4f0afa52430e295c1e926a52b9335896fd8f7df026028468d0b3163bed,2024-10-22T19:30:19.870000
|
CVE-2024-43593,0,0,2bb48f4f0afa52430e295c1e926a52b9335896fd8f7df026028468d0b3163bed,2024-10-22T19:30:19.870000
|
||||||
CVE-2024-43594,0,0,8921bf0377c016d75fd4356966ea13d61f6576d4d52419bfdffebda90cdc8066,2024-12-12T02:00:54.287000
|
CVE-2024-43594,0,1,0023a318bb29ccf0663d52c356794a59ebf2071b9e9fd567a194381db13ebb6c,2024-12-18T23:15:08.920000
|
||||||
CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d922654387160cb,2024-10-18T16:55:06.487000
|
CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d922654387160cb,2024-10-18T16:55:06.487000
|
||||||
CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000
|
CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000
|
||||||
CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000
|
CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000
|
||||||
@ -264434,7 +264457,7 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44
|
|||||||
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
|
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
|
||||||
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
|
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
|
||||||
CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000
|
CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000
|
||||||
CVE-2024-45338,1,1,35f6048860fb1c72b6b6ce0a98d0bb29575e2c25156ad8356eec8ef7e12f590d,2024-12-18T21:15:08.173000
|
CVE-2024-45338,0,0,35f6048860fb1c72b6b6ce0a98d0bb29575e2c25156ad8356eec8ef7e12f590d,2024-12-18T21:15:08.173000
|
||||||
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
|
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
|
||||||
CVE-2024-45346,0,0,42bcf491a94494c9433ce7696078ac7ab2eca46d8c28dcac4158f4b2b20fa4a5,2024-08-29T03:15:05.247000
|
CVE-2024-45346,0,0,42bcf491a94494c9433ce7696078ac7ab2eca46d8c28dcac4158f4b2b20fa4a5,2024-08-29T03:15:05.247000
|
||||||
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
|
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
|
||||||
@ -265795,16 +265818,16 @@ CVE-2024-47534,0,0,df13f2ee68fa5e66e525b7b1f66f6aa0f0e1c060ce893dece259dc49bb627
|
|||||||
CVE-2024-47535,0,0,298d41133677422a8f6d390f12d2cec10b4d60092e295406e026ea754c8a295e,2024-11-13T17:01:58.603000
|
CVE-2024-47535,0,0,298d41133677422a8f6d390f12d2cec10b4d60092e295406e026ea754c8a295e,2024-11-13T17:01:58.603000
|
||||||
CVE-2024-47536,0,0,6f8a4b4f8220f9b26154b954ad727df271a73f901fc0c3d5863c162fae5afc51,2024-10-04T13:51:25.567000
|
CVE-2024-47536,0,0,6f8a4b4f8220f9b26154b954ad727df271a73f901fc0c3d5863c162fae5afc51,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-47537,0,0,0c8153afca3aac84f186ec27f0837ced55d59e8e8e65c8031c4d84dd680e9f85,2024-12-12T02:03:27.877000
|
CVE-2024-47537,0,0,0c8153afca3aac84f186ec27f0837ced55d59e8e8e65c8031c4d84dd680e9f85,2024-12-12T02:03:27.877000
|
||||||
CVE-2024-47538,0,1,ad7972197a18862beb8bdd90c0ae99acdd81ab31bd6496a51470f43a9079cf2c,2024-12-18T21:51:56.203000
|
CVE-2024-47538,0,0,ad7972197a18862beb8bdd90c0ae99acdd81ab31bd6496a51470f43a9079cf2c,2024-12-18T21:51:56.203000
|
||||||
CVE-2024-47539,0,1,e700345225afbdb189fa376bdd8d61a4fac3ed4f8377392883f6552c7cecac25,2024-12-18T21:52:56.307000
|
CVE-2024-47539,0,0,e700345225afbdb189fa376bdd8d61a4fac3ed4f8377392883f6552c7cecac25,2024-12-18T21:52:56.307000
|
||||||
CVE-2024-4754,0,0,f946bc350cafc376503b251e8950814dfbf85a03e7ce93cc628c4f28533490c5,2024-11-21T09:43:31.777000
|
CVE-2024-4754,0,0,f946bc350cafc376503b251e8950814dfbf85a03e7ce93cc628c4f28533490c5,2024-11-21T09:43:31.777000
|
||||||
CVE-2024-47540,0,1,ff2a6bd413545302aed64a381dac3c3c798a6ff96b7902bb0d3fe72444b2dc99,2024-12-18T21:53:53.963000
|
CVE-2024-47540,0,0,ff2a6bd413545302aed64a381dac3c3c798a6ff96b7902bb0d3fe72444b2dc99,2024-12-18T21:53:53.963000
|
||||||
CVE-2024-47541,0,0,4245d049a4573901f7770b7cf133d400396b6f6af9f5943422209e14455bd4e7,2024-12-13T19:21:49.873000
|
CVE-2024-47541,0,0,4245d049a4573901f7770b7cf133d400396b6f6af9f5943422209e14455bd4e7,2024-12-13T19:21:49.873000
|
||||||
CVE-2024-47542,0,0,fa3b6dab6f59424d3e6bc955760c56fdbb1b4dc68420b8f72a81cfbb7447d6d8,2024-12-13T19:03:40.280000
|
CVE-2024-47542,0,0,fa3b6dab6f59424d3e6bc955760c56fdbb1b4dc68420b8f72a81cfbb7447d6d8,2024-12-13T19:03:40.280000
|
||||||
CVE-2024-47543,0,1,00b1195ce79dc116199316d3c815d4607310cfe7a5454432362672154c825d2a,2024-12-18T21:47:18.337000
|
CVE-2024-47543,0,0,00b1195ce79dc116199316d3c815d4607310cfe7a5454432362672154c825d2a,2024-12-18T21:47:18.337000
|
||||||
CVE-2024-47544,0,1,f80f67aec2936bf3a4215ee30c8ee9cfd457dca117e54c936aa38886d04f8fa0,2024-12-18T21:48:32.893000
|
CVE-2024-47544,0,0,f80f67aec2936bf3a4215ee30c8ee9cfd457dca117e54c936aa38886d04f8fa0,2024-12-18T21:48:32.893000
|
||||||
CVE-2024-47545,0,1,428cf72ec7808d91481b7207049d2e117dcbb6beb17798245f304000d1594899,2024-12-18T21:49:28.210000
|
CVE-2024-47545,0,0,428cf72ec7808d91481b7207049d2e117dcbb6beb17798245f304000d1594899,2024-12-18T21:49:28.210000
|
||||||
CVE-2024-47546,0,1,b95cd270aed883f8f010c4648c391da8a614c825b1b38218b56931fefba049ef,2024-12-18T21:50:08.920000
|
CVE-2024-47546,0,0,b95cd270aed883f8f010c4648c391da8a614c825b1b38218b56931fefba049ef,2024-12-18T21:50:08.920000
|
||||||
CVE-2024-47547,0,0,2e86dfc31a612610fcd211703820a9bbd2e41912415648f4197e55f76e2b416e,2024-12-10T19:57:32.987000
|
CVE-2024-47547,0,0,2e86dfc31a612610fcd211703820a9bbd2e41912415648f4197e55f76e2b416e,2024-12-10T19:57:32.987000
|
||||||
CVE-2024-47549,0,0,ec88edfad973e804c3e080b206fe5d22667e6bea7ecbaa56013ae1c9427b52bf,2024-11-05T19:40:52.070000
|
CVE-2024-47549,0,0,ec88edfad973e804c3e080b206fe5d22667e6bea7ecbaa56013ae1c9427b52bf,2024-11-05T19:40:52.070000
|
||||||
CVE-2024-4755,0,0,cf57304aa4a44badae0bfd971e93fc9d9b32ba95a21a3c55b71d92c862671250,2024-11-21T09:43:31.903000
|
CVE-2024-4755,0,0,cf57304aa4a44badae0bfd971e93fc9d9b32ba95a21a3c55b71d92c862671250,2024-11-21T09:43:31.903000
|
||||||
@ -265842,17 +265865,17 @@ CVE-2024-47592,0,0,7514b1d0682229e8e8d72f71655b912eae2bf102984769f70b3a93113c524
|
|||||||
CVE-2024-47593,0,0,4485a35cf6d452090b7fd36461c91f586cdd110571706bdf5c04b7a553b6ebe0,2024-11-12T15:35:13.233000
|
CVE-2024-47593,0,0,4485a35cf6d452090b7fd36461c91f586cdd110571706bdf5c04b7a553b6ebe0,2024-11-12T15:35:13.233000
|
||||||
CVE-2024-47594,0,0,7e345ff54c7effa11a9979482e9e679ccb391308ea3cdbd79ee7edd65b331424,2024-11-14T16:12:13.877000
|
CVE-2024-47594,0,0,7e345ff54c7effa11a9979482e9e679ccb391308ea3cdbd79ee7edd65b331424,2024-11-14T16:12:13.877000
|
||||||
CVE-2024-47595,0,0,8487073d9f25df501ffd874ff6ba96468e413512174a07e87d56dec935df872f,2024-11-14T15:21:32.080000
|
CVE-2024-47595,0,0,8487073d9f25df501ffd874ff6ba96468e413512174a07e87d56dec935df872f,2024-11-14T15:21:32.080000
|
||||||
CVE-2024-47596,0,1,b152f2a6a6ebefa7b3e6b61694cb3243028cd12cc07dbd87336faa57de37e534,2024-12-18T21:51:08.200000
|
CVE-2024-47596,0,0,b152f2a6a6ebefa7b3e6b61694cb3243028cd12cc07dbd87336faa57de37e534,2024-12-18T21:51:08.200000
|
||||||
CVE-2024-47597,0,1,b148e096ccc1cb4fa8263cb44f98c3d689a6158bf24ebccb58eacfececb121c4,2024-12-18T21:39:17.820000
|
CVE-2024-47597,0,0,b148e096ccc1cb4fa8263cb44f98c3d689a6158bf24ebccb58eacfececb121c4,2024-12-18T21:39:17.820000
|
||||||
CVE-2024-47598,0,1,7df76f9573d9d47beac295737ee53e510ea4292cdada2b6bdcefc61567e5a1e8,2024-12-18T21:40:26.240000
|
CVE-2024-47598,0,0,7df76f9573d9d47beac295737ee53e510ea4292cdada2b6bdcefc61567e5a1e8,2024-12-18T21:40:26.240000
|
||||||
CVE-2024-47599,0,1,79a940e4ed1dc0e11d45a35557efb0692c48247304aee36c5226aab6500a00ea,2024-12-18T21:41:17.307000
|
CVE-2024-47599,0,0,79a940e4ed1dc0e11d45a35557efb0692c48247304aee36c5226aab6500a00ea,2024-12-18T21:41:17.307000
|
||||||
CVE-2024-4760,0,0,de926bec8e8c13a7e4c13bca922cad2399c8ba3da1db5b99551a2507b2214b2e,2024-11-21T09:43:32.823000
|
CVE-2024-4760,0,0,de926bec8e8c13a7e4c13bca922cad2399c8ba3da1db5b99551a2507b2214b2e,2024-11-21T09:43:32.823000
|
||||||
CVE-2024-47600,0,1,cf9fd806dd5b2bdb890624068780e8bc61c5a7e7f4b357f6028c70964d446732,2024-12-18T21:43:04.660000
|
CVE-2024-47600,0,0,cf9fd806dd5b2bdb890624068780e8bc61c5a7e7f4b357f6028c70964d446732,2024-12-18T21:43:04.660000
|
||||||
CVE-2024-47601,0,1,f075b90e2fa0550816f7530f0832934f105615b601836ec61a3f3b9371879f1c,2024-12-18T21:43:42.903000
|
CVE-2024-47601,0,0,f075b90e2fa0550816f7530f0832934f105615b601836ec61a3f3b9371879f1c,2024-12-18T21:43:42.903000
|
||||||
CVE-2024-47602,0,1,3590424c5a1e5ab2c409ce352a836f4cff6bfe6739d6dce4410c2d8f9101ee03,2024-12-18T21:27:41.137000
|
CVE-2024-47602,0,0,3590424c5a1e5ab2c409ce352a836f4cff6bfe6739d6dce4410c2d8f9101ee03,2024-12-18T21:27:41.137000
|
||||||
CVE-2024-47603,0,1,e2f22752273db695c89b30b387b9d18f99d96e81bdc9ec5d981ef632b4380656,2024-12-18T21:28:13.987000
|
CVE-2024-47603,0,0,e2f22752273db695c89b30b387b9d18f99d96e81bdc9ec5d981ef632b4380656,2024-12-18T21:28:13.987000
|
||||||
CVE-2024-47604,0,0,0bc47ae414bdd6b01a65c265f3f3055e1a0a5458b44c790858631e91134d9f75,2024-11-13T23:17:14.437000
|
CVE-2024-47604,0,0,0bc47ae414bdd6b01a65c265f3f3055e1a0a5458b44c790858631e91134d9f75,2024-11-13T23:17:14.437000
|
||||||
CVE-2024-47606,0,1,4800f16c54aa7ffc30bd35e785cee8b35a6989e3b8bc32b9da0d43ad7d5700a6,2024-12-18T21:35:45.223000
|
CVE-2024-47606,0,0,4800f16c54aa7ffc30bd35e785cee8b35a6989e3b8bc32b9da0d43ad7d5700a6,2024-12-18T21:35:45.223000
|
||||||
CVE-2024-47607,0,0,382969a888801c46134ab6b16f4a50a4d9e68502ecd36882250f06d39efd0e1d,2024-12-18T19:53:21.123000
|
CVE-2024-47607,0,0,382969a888801c46134ab6b16f4a50a4d9e68502ecd36882250f06d39efd0e1d,2024-12-18T19:53:21.123000
|
||||||
CVE-2024-47608,0,0,6568bd19016506539b4ea82412fdcb1ecdc2fcf519cca4e0194fbcee5a3c48e7,2024-10-07T18:51:05.650000
|
CVE-2024-47608,0,0,6568bd19016506539b4ea82412fdcb1ecdc2fcf519cca4e0194fbcee5a3c48e7,2024-10-07T18:51:05.650000
|
||||||
CVE-2024-47609,0,0,20abbd49af76b9706e2ef27aa5069189f8951d7c9ed85341c5ad92d8d50e5593,2024-11-21T17:15:17.250000
|
CVE-2024-47609,0,0,20abbd49af76b9706e2ef27aa5069189f8951d7c9ed85341c5ad92d8d50e5593,2024-11-21T17:15:17.250000
|
||||||
@ -266034,8 +266057,8 @@ CVE-2024-4777,0,0,0559f9fc05b16fbfafe09a51db41feace21d30c4b62adaed6c18b481b5c868
|
|||||||
CVE-2024-47771,0,0,d9e667f8f1c80546a8045e1095310494da0b5c3573a4d135848ba5926d74346b,2024-10-16T16:38:43.170000
|
CVE-2024-47771,0,0,d9e667f8f1c80546a8045e1095310494da0b5c3573a4d135848ba5926d74346b,2024-10-16T16:38:43.170000
|
||||||
CVE-2024-47772,0,0,268d48580bc08bc06a9592581bf7c15b183982df7936e45259c48576c264bf04,2024-10-19T00:58:21.947000
|
CVE-2024-47772,0,0,268d48580bc08bc06a9592581bf7c15b183982df7936e45259c48576c264bf04,2024-10-19T00:58:21.947000
|
||||||
CVE-2024-47773,0,0,2009644e404b2ecafb661ade272442df90db2955e19ee81df643af922d4ed623,2024-10-10T12:56:30.817000
|
CVE-2024-47773,0,0,2009644e404b2ecafb661ade272442df90db2955e19ee81df643af922d4ed623,2024-10-10T12:56:30.817000
|
||||||
CVE-2024-47774,0,1,d9a20a982fb496f6083a435ac0a6cb4f3ec570793b74190eb6677390ddcab513,2024-12-18T21:36:58.827000
|
CVE-2024-47774,0,0,d9a20a982fb496f6083a435ac0a6cb4f3ec570793b74190eb6677390ddcab513,2024-12-18T21:36:58.827000
|
||||||
CVE-2024-47775,0,1,4cb38872c65de22cea970d08bc6186a4cfc1da367205d3fd171bc95863a0127e,2024-12-18T21:37:59.663000
|
CVE-2024-47775,0,0,4cb38872c65de22cea970d08bc6186a4cfc1da367205d3fd171bc95863a0127e,2024-12-18T21:37:59.663000
|
||||||
CVE-2024-47776,0,0,4bfd490849c432ea6d8b47b8d34a3d0513182cb37ced94cdb8bdc27d44da9cd8,2024-12-18T19:28:07.190000
|
CVE-2024-47776,0,0,4bfd490849c432ea6d8b47b8d34a3d0513182cb37ced94cdb8bdc27d44da9cd8,2024-12-18T19:28:07.190000
|
||||||
CVE-2024-47777,0,0,74c700c365f3ca38348532fbb82d166627257e082bc598283831bf32f30ca229,2024-12-18T19:40:54.580000
|
CVE-2024-47777,0,0,74c700c365f3ca38348532fbb82d166627257e082bc598283831bf32f30ca229,2024-12-18T19:40:54.580000
|
||||||
CVE-2024-47778,0,0,17041bebabee26d850eadf5a9c3c89ddec38d5af8fa65bfccd1445413536a59e,2024-12-18T19:34:23.850000
|
CVE-2024-47778,0,0,17041bebabee26d850eadf5a9c3c89ddec38d5af8fa65bfccd1445413536a59e,2024-12-18T19:34:23.850000
|
||||||
@ -267034,13 +267057,13 @@ CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4
|
|||||||
CVE-2024-49537,0,0,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000
|
CVE-2024-49537,0,0,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000
|
||||||
CVE-2024-49538,0,0,3efeb7dc63ffb7e319a4e954aebfe791b3219c328f7308ff66639e511536c65d,2024-12-18T15:17:43.620000
|
CVE-2024-49538,0,0,3efeb7dc63ffb7e319a4e954aebfe791b3219c328f7308ff66639e511536c65d,2024-12-18T15:17:43.620000
|
||||||
CVE-2024-49541,0,0,8cb92ef5ac02101c8bfec3741ecff82e1c57862d3057b0e6d10bda1324aa00b2,2024-12-18T15:17:34.523000
|
CVE-2024-49541,0,0,8cb92ef5ac02101c8bfec3741ecff82e1c57862d3057b0e6d10bda1324aa00b2,2024-12-18T15:17:34.523000
|
||||||
CVE-2024-49543,0,1,5c9ddcdaa9255475a13f93c1f688671e9741f1fa4d42d8398f37c3f39cc17f51,2024-12-18T21:22:33.593000
|
CVE-2024-49543,0,0,5c9ddcdaa9255475a13f93c1f688671e9741f1fa4d42d8398f37c3f39cc17f51,2024-12-18T21:22:33.593000
|
||||||
CVE-2024-49544,0,1,3877cc8588bc5ebbb9b01f454634c8627d877bd6eca3c53e6c78ee80b13c15e2,2024-12-18T21:22:11.823000
|
CVE-2024-49544,0,0,3877cc8588bc5ebbb9b01f454634c8627d877bd6eca3c53e6c78ee80b13c15e2,2024-12-18T21:22:11.823000
|
||||||
CVE-2024-49545,0,1,5db55d2d8d6168bdd48a7e37feac51f475cdfd768017d41a6ce988bec915da08,2024-12-18T21:21:56.527000
|
CVE-2024-49545,0,0,5db55d2d8d6168bdd48a7e37feac51f475cdfd768017d41a6ce988bec915da08,2024-12-18T21:21:56.527000
|
||||||
CVE-2024-49546,0,1,e7406aa69daae5b3f9b186afb0fe222e3e103f09324bd3cbfa8a611fc2496e6f,2024-12-18T21:21:39.133000
|
CVE-2024-49546,0,0,e7406aa69daae5b3f9b186afb0fe222e3e103f09324bd3cbfa8a611fc2496e6f,2024-12-18T21:21:39.133000
|
||||||
CVE-2024-49547,0,1,08ef1caad58a50d92797b22ae0aebac3032f67625ecc17a9fb0b5f29a705d8d5,2024-12-18T21:20:40.313000
|
CVE-2024-49547,0,0,08ef1caad58a50d92797b22ae0aebac3032f67625ecc17a9fb0b5f29a705d8d5,2024-12-18T21:20:40.313000
|
||||||
CVE-2024-49548,0,1,5a12b5b1dc8bedba17dcecf2876fb4f58ecba3b29d026dee51d4a4c474d174b3,2024-12-18T21:20:23.697000
|
CVE-2024-49548,0,0,5a12b5b1dc8bedba17dcecf2876fb4f58ecba3b29d026dee51d4a4c474d174b3,2024-12-18T21:20:23.697000
|
||||||
CVE-2024-49549,0,1,5726a49fe09ed2d4d4b15249b135eb0746c47bbc2d80be31d5669cf23ae6601a,2024-12-18T21:19:54.533000
|
CVE-2024-49549,0,0,5726a49fe09ed2d4d4b15249b135eb0746c47bbc2d80be31d5669cf23ae6601a,2024-12-18T21:19:54.533000
|
||||||
CVE-2024-49550,0,0,27e56b904436c74833992eef941b9e27e78e6d34b2add18e9d4136f40cc8e03c,2024-12-10T21:15:17.903000
|
CVE-2024-49550,0,0,27e56b904436c74833992eef941b9e27e78e6d34b2add18e9d4136f40cc8e03c,2024-12-10T21:15:17.903000
|
||||||
CVE-2024-49551,0,0,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000
|
CVE-2024-49551,0,0,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000
|
||||||
CVE-2024-49552,0,0,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000
|
CVE-2024-49552,0,0,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000
|
||||||
@ -269509,10 +269532,10 @@ CVE-2024-53262,0,0,a30976483b4a3447c0f3cd137bc9d61475976254751462f53de127c8053e7
|
|||||||
CVE-2024-53264,0,0,a32d4daa26a746493ea0f873c770ba4e99221937a3918a07719b9b2327c46ce8,2024-11-27T19:15:33.400000
|
CVE-2024-53264,0,0,a32d4daa26a746493ea0f873c770ba4e99221937a3918a07719b9b2327c46ce8,2024-11-27T19:15:33.400000
|
||||||
CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000
|
CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000
|
||||||
CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000
|
CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000
|
||||||
CVE-2024-53269,0,1,726b25237cecdb10013aca1f7ac22243bebf6fb79b773926a4789babcab824a5,2024-12-18T22:15:06.763000
|
CVE-2024-53269,0,0,726b25237cecdb10013aca1f7ac22243bebf6fb79b773926a4789babcab824a5,2024-12-18T22:15:06.763000
|
||||||
CVE-2024-5327,0,0,c9fe7d7fa06a5d3d75a080dba8857bf423c18144dc7f53781589989842b7c438,2024-11-21T09:47:25.873000
|
CVE-2024-5327,0,0,c9fe7d7fa06a5d3d75a080dba8857bf423c18144dc7f53781589989842b7c438,2024-11-21T09:47:25.873000
|
||||||
CVE-2024-53270,0,1,ab99630aa4e5713c62f25881e105086918537b9e2bad09f25843588aeb2dd649,2024-12-18T22:15:06.883000
|
CVE-2024-53270,0,0,ab99630aa4e5713c62f25881e105086918537b9e2bad09f25843588aeb2dd649,2024-12-18T22:15:06.883000
|
||||||
CVE-2024-53271,0,1,499acc75875f99bd6f3549b218af954aa74104ef78140adf13227181b20340a2,2024-12-18T22:15:07.010000
|
CVE-2024-53271,0,0,499acc75875f99bd6f3549b218af954aa74104ef78140adf13227181b20340a2,2024-12-18T22:15:07.010000
|
||||||
CVE-2024-53272,0,0,f3ae5c3af00a8a1ede971886e8407e0fd8e6e8ff1a7606066ce068e53ea18328,2024-12-12T02:15:28.670000
|
CVE-2024-53272,0,0,f3ae5c3af00a8a1ede971886e8407e0fd8e6e8ff1a7606066ce068e53ea18328,2024-12-12T02:15:28.670000
|
||||||
CVE-2024-53273,0,0,4be201cb4a2a2818369414ac4a638086038f7b2129c8882fb2f8ed84d4b3ca40,2024-12-12T02:15:28.813000
|
CVE-2024-53273,0,0,4be201cb4a2a2818369414ac4a638086038f7b2129c8882fb2f8ed84d4b3ca40,2024-12-12T02:15:28.813000
|
||||||
CVE-2024-53274,0,0,1b082934bf5e9b4005ba0f77ebbc282458901418112daa847bcdad246d3a28e8,2024-12-12T02:15:28.940000
|
CVE-2024-53274,0,0,1b082934bf5e9b4005ba0f77ebbc282458901418112daa847bcdad246d3a28e8,2024-12-12T02:15:28.940000
|
||||||
@ -269596,6 +269619,7 @@ CVE-2024-53564,0,0,bf61935418f5f92f32cd62964e032ec47360caecda9e24bdf2d4ee2ea5631
|
|||||||
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
|
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
|
||||||
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
|
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
|
||||||
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
|
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
|
||||||
|
CVE-2024-53580,1,1,c3703276e05c4d594b51f46c7c6316b9cfecf5dde3914c666e4b556031b13d4f,2024-12-18T23:15:17.010000
|
||||||
CVE-2024-53589,0,0,728322b8c5b51205676d46003289ad227ccda2e910c9140fa8921fafd791e832,2024-12-11T17:15:20.233000
|
CVE-2024-53589,0,0,728322b8c5b51205676d46003289ad227ccda2e910c9140fa8921fafd791e832,2024-12-11T17:15:20.233000
|
||||||
CVE-2024-5359,0,0,a1926c7cffc0ddd7cf732ce221c5b773e4f3ba3b6110f8717338c32417e29d1e,2024-11-21T09:47:29.680000
|
CVE-2024-5359,0,0,a1926c7cffc0ddd7cf732ce221c5b773e4f3ba3b6110f8717338c32417e29d1e,2024-11-21T09:47:29.680000
|
||||||
CVE-2024-53597,0,0,438026e14ae09726543276b1bb70c22feed1a3a736c09b864ce876954f4f80b7,2024-11-27T21:15:08.170000
|
CVE-2024-53597,0,0,438026e14ae09726543276b1bb70c22feed1a3a736c09b864ce876954f4f80b7,2024-11-27T21:15:08.170000
|
||||||
@ -269822,7 +269846,7 @@ CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f
|
|||||||
CVE-2024-53951,0,0,bed406754e2e414b104efd3eb1c72bdfbbfd0447862bc041d6f24ed2188caeb2,2024-12-18T15:08:14.407000
|
CVE-2024-53951,0,0,bed406754e2e414b104efd3eb1c72bdfbbfd0447862bc041d6f24ed2188caeb2,2024-12-18T15:08:14.407000
|
||||||
CVE-2024-53952,0,0,e709da7c68f85daad426a8b159797750fb6868aacc174441eebd3216c961f6c5,2024-12-18T15:07:51.167000
|
CVE-2024-53952,0,0,e709da7c68f85daad426a8b159797750fb6868aacc174441eebd3216c961f6c5,2024-12-18T15:07:51.167000
|
||||||
CVE-2024-53953,0,0,25545c98eaf201fa933493a2580b3dc8c368ea4fdf737cf4102803979b779545,2024-12-18T19:58:21.397000
|
CVE-2024-53953,0,0,25545c98eaf201fa933493a2580b3dc8c368ea4fdf737cf4102803979b779545,2024-12-18T19:58:21.397000
|
||||||
CVE-2024-53954,0,1,4bd87d0c098b91f29bd342f8c78da18e602b5f15127a12d69db0634c891d1cbd,2024-12-18T21:16:26.943000
|
CVE-2024-53954,0,0,4bd87d0c098b91f29bd342f8c78da18e602b5f15127a12d69db0634c891d1cbd,2024-12-18T21:16:26.943000
|
||||||
CVE-2024-53955,0,0,8aa46e10bc17559dbedd3ecdffab1753d45263b50071af9071472921d4bbee43,2024-12-13T18:29:02.127000
|
CVE-2024-53955,0,0,8aa46e10bc17559dbedd3ecdffab1753d45263b50071af9071472921d4bbee43,2024-12-13T18:29:02.127000
|
||||||
CVE-2024-53956,0,0,09bc8469f16fb911c5ffda4e607436b9105e5de1566da87561ea95eda7fb2ed5,2024-12-13T18:28:36.207000
|
CVE-2024-53956,0,0,09bc8469f16fb911c5ffda4e607436b9105e5de1566da87561ea95eda7fb2ed5,2024-12-13T18:28:36.207000
|
||||||
CVE-2024-53957,0,0,a6d6ebb3ae5e849219af3ed7c9ef344f0fde8547787241a0f7c5f17b54e97dcf,2024-12-13T18:24:48.200000
|
CVE-2024-53957,0,0,a6d6ebb3ae5e849219af3ed7c9ef344f0fde8547787241a0f7c5f17b54e97dcf,2024-12-13T18:24:48.200000
|
||||||
@ -270373,8 +270397,9 @@ CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1a
|
|||||||
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
|
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
|
||||||
CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000
|
CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000
|
||||||
CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000
|
CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000
|
||||||
CVE-2024-55231,1,1,fc13b65817c8ac6a05de306c348d0f747f1848717936b21c85f240ddf2a7c32b,2024-12-18T22:15:07.127000
|
CVE-2024-55231,0,0,fc13b65817c8ac6a05de306c348d0f747f1848717936b21c85f240ddf2a7c32b,2024-12-18T22:15:07.127000
|
||||||
CVE-2024-55232,1,1,a1b7652c4d868ce09f148b918944b3aa70cf5f6cfd7e2bf688258822e8d0886f,2024-12-18T22:15:07.297000
|
CVE-2024-55232,0,0,a1b7652c4d868ce09f148b918944b3aa70cf5f6cfd7e2bf688258822e8d0886f,2024-12-18T22:15:07.297000
|
||||||
|
CVE-2024-55239,1,1,95fde9b654a58a5a4f63426beaf6b7d5bd5bf4fd927cde67b4e0e54174641b1f,2024-12-18T23:15:17.180000
|
||||||
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
|
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
|
||||||
CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674bab,2024-11-21T09:47:52.173000
|
CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674bab,2024-11-21T09:47:52.173000
|
||||||
CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000
|
CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000
|
||||||
@ -270397,6 +270422,7 @@ CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4
|
|||||||
CVE-2024-55451,0,0,1823afcfa4259711211e484b3a6e957134d35bc2739f7f67be50c6afb632ad1b,2024-12-17T17:15:09.687000
|
CVE-2024-55451,0,0,1823afcfa4259711211e484b3a6e957134d35bc2739f7f67be50c6afb632ad1b,2024-12-17T17:15:09.687000
|
||||||
CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40453,2024-12-17T15:15:16.287000
|
CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40453,2024-12-17T15:15:16.287000
|
||||||
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
||||||
|
CVE-2024-55461,1,1,9aba9528846a5e20a9950a25279e0e578fc2f2326e2132736dcd635d432a883c,2024-12-18T23:15:17.350000
|
||||||
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
|
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
|
||||||
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
|
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
|
||||||
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
|
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
|
||||||
@ -270404,7 +270430,8 @@ CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad
|
|||||||
CVE-2024-55496,0,0,4a3321851c89fc343921299c0a2d1c4d4d998fd1f65ffe9f84e4d2aab27cd704,2024-12-17T18:15:25.683000
|
CVE-2024-55496,0,0,4a3321851c89fc343921299c0a2d1c4d4d998fd1f65ffe9f84e4d2aab27cd704,2024-12-17T18:15:25.683000
|
||||||
CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000
|
CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000
|
||||||
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
|
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
|
||||||
CVE-2024-55505,1,1,8271b89572403d1dfbfb143dcb69f9b9b60f911ca87d421e2e549f9a2e1ae17a,2024-12-18T22:15:07.477000
|
CVE-2024-55505,0,0,8271b89572403d1dfbfb143dcb69f9b9b60f911ca87d421e2e549f9a2e1ae17a,2024-12-18T22:15:07.477000
|
||||||
|
CVE-2024-55506,1,1,c8c2c622c6ffa6a174bc7b56cb9879bd5b1bab2018832221e0611539c21950fe,2024-12-18T23:15:17.523000
|
||||||
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
|
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
|
||||||
CVE-2024-55513,0,0,2c70feb0b3a4b5910e279bea5f5b31284be91bf824e57138502d2e4a1a6f68ec,2024-12-18T16:15:14.720000
|
CVE-2024-55513,0,0,2c70feb0b3a4b5910e279bea5f5b31284be91bf824e57138502d2e4a1a6f68ec,2024-12-18T16:15:14.720000
|
||||||
CVE-2024-55514,0,0,aa89c1ff2eec24c5fad92134c8d185f78ce2cace8089f0502184ccc069428486,2024-12-18T16:15:14.900000
|
CVE-2024-55514,0,0,aa89c1ff2eec24c5fad92134c8d185f78ce2cace8089f0502184ccc069428486,2024-12-18T16:15:14.900000
|
||||||
@ -270440,6 +270467,7 @@ CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f01
|
|||||||
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
|
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
|
||||||
CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000
|
CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000
|
||||||
CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000
|
CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000
|
||||||
|
CVE-2024-55603,1,1,1f4b42ae5da711e3fab21bbee693e839a7187a21b5759cecf8dc1873f22640a9,2024-12-19T00:15:06.713000
|
||||||
CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000
|
CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000
|
||||||
CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000
|
CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000
|
||||||
CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000
|
CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000
|
||||||
@ -270581,14 +270609,16 @@ CVE-2024-56087,0,0,71bdda0ff7417396ad31c25e1bfa27f6b23e1f9a164b7da02056ec46ee4b5
|
|||||||
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
|
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
|
||||||
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
|
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
|
||||||
CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000
|
CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000
|
||||||
|
CVE-2024-56115,1,1,f05eda8263d4d568f41c89a3bd42a209f97ca709ed9920abf409adc86c73cb35,2024-12-18T23:15:17.687000
|
||||||
|
CVE-2024-56116,1,1,e133a09045b787ca79ff39c02ab485d7fb0b9d77c65dad192cc1202addb9ea31,2024-12-18T23:15:17.857000
|
||||||
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
|
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
|
||||||
CVE-2024-56128,0,0,9448cc8db9a8bd4e0b704b441f647abef22739c3613b41a4a55b8229474b0404,2024-12-18T17:15:15.003000
|
CVE-2024-56128,0,0,9448cc8db9a8bd4e0b704b441f647abef22739c3613b41a4a55b8229474b0404,2024-12-18T17:15:15.003000
|
||||||
CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000
|
CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000
|
||||||
CVE-2024-56139,0,0,51f3702c94f0ffd91c7bd6b4a37a8fbb30240d1963c2f10d645e10159f128016,2024-12-17T19:15:07.010000
|
CVE-2024-56139,0,0,51f3702c94f0ffd91c7bd6b4a37a8fbb30240d1963c2f10d645e10159f128016,2024-12-17T19:15:07.010000
|
||||||
CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000
|
CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000
|
||||||
CVE-2024-56140,1,1,d0631548de4989ff87cb4466975c10a8b9a9a481cabea121e9d2e8c66b03ddd8,2024-12-18T21:15:08.353000
|
CVE-2024-56140,0,0,d0631548de4989ff87cb4466975c10a8b9a9a481cabea121e9d2e8c66b03ddd8,2024-12-18T21:15:08.353000
|
||||||
CVE-2024-56142,0,0,46ee75dbf053d17753747d6ac8d88a6799cb24a1d693104ad554a951c48b711e,2024-12-18T16:15:15.433000
|
CVE-2024-56142,0,0,46ee75dbf053d17753747d6ac8d88a6799cb24a1d693104ad554a951c48b711e,2024-12-18T16:15:15.433000
|
||||||
CVE-2024-56145,1,1,39361c9ccf1de2097d52f9d4bd3693e26d97b41f06be9fa6d88d91286795f475,2024-12-18T21:15:08.530000
|
CVE-2024-56145,0,0,39361c9ccf1de2097d52f9d4bd3693e26d97b41f06be9fa6d88d91286795f475,2024-12-18T21:15:08.530000
|
||||||
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
|
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
|
||||||
CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000
|
CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000
|
||||||
CVE-2024-56169,0,0,2f44b9b9fae0fb43dd077aa410d4ee16cde281ba4890fbc569e3bb73e5dfcd66,2024-12-18T05:15:08.853000
|
CVE-2024-56169,0,0,2f44b9b9fae0fb43dd077aa410d4ee16cde281ba4890fbc569e3bb73e5dfcd66,2024-12-18T05:15:08.853000
|
||||||
@ -270609,6 +270639,9 @@ CVE-2024-5628,0,0,755412ba03c7f502c54c635c9705b96a4154da09bb9bfca64f93d1d41d08cf
|
|||||||
CVE-2024-5629,0,0,f9daa1fe2950a7ccef0838fb6e6cae4a7319a3ab1da6174da12e5faf2c955f5a,2024-11-21T09:48:02.860000
|
CVE-2024-5629,0,0,f9daa1fe2950a7ccef0838fb6e6cae4a7319a3ab1da6174da12e5faf2c955f5a,2024-11-21T09:48:02.860000
|
||||||
CVE-2024-5630,0,0,50874e31f2d6c9403bb3dbaf933b8b3f439196ea7c18b531eba9bc061324fe0f,2024-11-21T09:48:03.020000
|
CVE-2024-5630,0,0,50874e31f2d6c9403bb3dbaf933b8b3f439196ea7c18b531eba9bc061324fe0f,2024-11-21T09:48:03.020000
|
||||||
CVE-2024-5631,0,0,2a74e658158bae900a85436e92fd017c375ea2371e9ccb7b5a67e7bbd481f6b3,2024-11-21T09:48:03.210000
|
CVE-2024-5631,0,0,2a74e658158bae900a85436e92fd017c375ea2371e9ccb7b5a67e7bbd481f6b3,2024-11-21T09:48:03.210000
|
||||||
|
CVE-2024-56317,1,1,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826ae7,2024-12-18T23:15:18.023000
|
||||||
|
CVE-2024-56318,1,1,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000
|
||||||
|
CVE-2024-56319,1,1,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000
|
||||||
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
|
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
|
||||||
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
||||||
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user