mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2024-12-19T00:55:25.344583+00:00
This commit is contained in:
parent
ae49153bfe
commit
f0b83891dc
56
CVE-2021/CVE-2021-205xx/CVE-2021-20553.json
Normal file
56
CVE-2021/CVE-2021-205xx/CVE-2021-20553.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-20553",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-19T00:15:04.710",
|
||||
"lastModified": "2024-12-19T00:15:04.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6496761",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2021/CVE-2021-298xx/CVE-2021-29827.json
Normal file
56
CVE-2021/CVE-2021-298xx/CVE-2021-29827.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2021-29827",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-19T00:15:04.873",
|
||||
"lastModified": "2024-12-19T00:15:04.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/security-bulletin-ibm-infosphere-information-server-vulnerable-cross-frame-scripting-exploit-cve-2021-29827",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-407xx/CVE-2022-40732.json
Normal file
56
CVE-2022/CVE-2022-407xx/CVE-2022-40732.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-40732",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:07.060",
|
||||
"lastModified": "2024-12-18T23:15:07.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1514",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-407xx/CVE-2022-40733.json
Normal file
56
CVE-2022/CVE-2022-407xx/CVE-2022-40733.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-40733",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:07.243",
|
||||
"lastModified": "2024-12-18T23:15:07.243",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44512.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44512.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44512",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:05.067",
|
||||
"lastModified": "2024-12-19T00:15:05.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44513.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44513.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44513",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:05.237",
|
||||
"lastModified": "2024-12-19T00:15:05.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44514.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44514.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44514",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:05.400",
|
||||
"lastModified": "2024-12-19T00:15:05.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44515.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44515.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44515",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:05.567",
|
||||
"lastModified": "2024-12-19T00:15:05.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44516.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44516.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44516",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:05.727",
|
||||
"lastModified": "2024-12-19T00:15:05.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44517.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44517.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44517",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:05.880",
|
||||
"lastModified": "2024-12-19T00:15:05.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44518.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44518.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44518",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:06.037",
|
||||
"lastModified": "2024-12-19T00:15:06.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44519.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44519.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44519",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:06.200",
|
||||
"lastModified": "2024-12-19T00:15:06.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2022/CVE-2022-445xx/CVE-2022-44520.json
Normal file
56
CVE-2022/CVE-2022-445xx/CVE-2022-44520.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2022-44520",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:06.360",
|
||||
"lastModified": "2024-12-19T00:15:06.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-215xx/CVE-2023-21586.json
Normal file
56
CVE-2023/CVE-2023-215xx/CVE-2023-21586.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-21586",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-12-19T00:15:06.530",
|
||||
"lastModified": "2024-12-19T00:15:06.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb23-01.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-376xx/CVE-2024-37649.json
Normal file
21
CVE-2024/CVE-2024-376xx/CVE-2024-37649.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-37649",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:07.440",
|
||||
"lastModified": "2024-12-18T23:15:07.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in SecureSTATION v.2.5.5.3116-S50-SMA-B20160811A and before allows a physically proximate attacker to obtain sensitive information via the modification of user credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kklzzcun/SecureSTATION-/blob/main/The%20SecureSTATION%20.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-398xx/CVE-2024-39804.json
Normal file
60
CVE-2024/CVE-2024-398xx/CVE-2024-39804.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-39804",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:07.640",
|
||||
"lastModified": "2024-12-18T23:15:07.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in Microsoft PowerPoint 16.83 for macOS. A specially crafted library can leverage PowerPoint's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1974",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1974",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41138.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41138.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41138",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:07.813",
|
||||
"lastModified": "2024-12-18T23:15:07.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in the com.microsoft.teams2.modulehost.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1991",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1991",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41145.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41145.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41145",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:07.970",
|
||||
"lastModified": "2024-12-18T23:15:07.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in the WebView.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1990",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1990",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41159.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41159.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41159",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:08.140",
|
||||
"lastModified": "2024-12-18T23:15:08.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in Microsoft OneNote 16.83 for macOS. A specially crafted library can leverage OneNote's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1975",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1975",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-411xx/CVE-2024-41165.json
Normal file
60
CVE-2024/CVE-2024-411xx/CVE-2024-41165.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41165",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:08.300",
|
||||
"lastModified": "2024-12-18T23:15:08.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in Microsoft Word 16.83 for macOS. A specially crafted library can leverage Word's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1977",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1977",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-420xx/CVE-2024-42004.json
Normal file
60
CVE-2024/CVE-2024-420xx/CVE-2024-42004.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42004",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:08.450",
|
||||
"lastModified": "2024-12-18T23:15:08.450",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1973",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1973",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-422xx/CVE-2024-42220.json
Normal file
60
CVE-2024/CVE-2024-422xx/CVE-2024-42220.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-42220",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:08.597",
|
||||
"lastModified": "2024-12-18T23:15:08.597",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in Microsoft Outlook 16.83.3 for macOS. A specially crafted library can leverage Outlook's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-431xx/CVE-2024-43106.json
Normal file
60
CVE-2024/CVE-2024-431xx/CVE-2024-43106.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43106",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-12-18T23:15:08.760",
|
||||
"lastModified": "2024-12-18T23:15:08.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A library injection vulnerability exists in Microsoft Excel 16.83 for macOS. A specially crafted library can leverage Excel's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "talos-cna@cisco.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1976",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1976",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-43594",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-12-12T02:00:54.287",
|
||||
"lastModified": "2024-12-12T02:00:54.287",
|
||||
"lastModified": "2024-12-18T23:15:08.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "System Center Operations Manager Elevation of Privilege Vulnerability"
|
||||
"value": "Microsoft System Center Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
25
CVE-2024/CVE-2024-535xx/CVE-2024-53580.json
Normal file
25
CVE-2024/CVE-2024-535xx/CVE-2024-53580.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-53580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:17.010",
|
||||
"lastModified": "2024-12-18T23:15:17.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/neolead/663badf2ebefefa6fe4303695e7aa7a3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/esnet/iperf/releases/tag/3.18",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-552xx/CVE-2024-55239.json
Normal file
21
CVE-2024/CVE-2024-552xx/CVE-2024-55239.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-55239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:17.180",
|
||||
"lastModified": "2024-12-18T23:15:17.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A reflected Cross-Site Scripting vulnerability in the standard documentation upload functionality in Portabilis i-Educar 2.9 allows attacker to craft malicious urls with arbitrary javascript in the 'titulo_documento' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RegularUs3r/CVE-Research/blob/main/CVE-2024/Portabilis%20-%20iEducar/CVE-2024-55649%20-%20Reflected%20Cross-Site%20Scripting.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-554xx/CVE-2024-55461.json
Normal file
21
CVE-2024/CVE-2024-554xx/CVE-2024-55461.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-55461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:17.350",
|
||||
"lastModified": "2024-12-18T23:15:17.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SeaCMS <=13.0 is vulnerable to command execution in phome.php via the function Ebak_RepPathFiletext()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/FengFu01/sea/issues/IB8S1N",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-555xx/CVE-2024-55506.json
Normal file
21
CVE-2024/CVE-2024-555xx/CVE-2024-55506.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-55506",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:17.523",
|
||||
"lastModified": "2024-12-18T23:15:17.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An IDOR vulnerability in CodeAstro's Complaint Management System v1.0 (version with 0 updates) enables an attacker to execute arbitrary code and obtain sensitive information via the delete.php file and modifying the id parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55506.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
84
CVE-2024/CVE-2024-556xx/CVE-2024-55603.json
Normal file
84
CVE-2024/CVE-2024-556xx/CVE-2024-55603.json
Normal file
@ -0,0 +1,84 @@
|
||||
{
|
||||
"id": "CVE-2024-55603",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-19T00:15:06.713",
|
||||
"lastModified": "2024-12-19T00:15:06.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kanboard is project management software that focuses on the Kanban methodology. In affected versions sessions are still usable even though their lifetime has exceeded. Kanboard implements a cutom session handler (`app/Core/Session/SessionHandler.php`), to store the session data in a database. Therefore, when a `session_id` is given, kanboard queries the data from the `sessions` sql table. At this point, it does not correctly verify, if a given `session_id` has already exceeded its lifetime (`expires_at`).\nThus, a session which's lifetime is already `> time()`, is still queried from the database and hence a valid login. The implemented **SessionHandlerInterface::gc** function, that does remove invalid sessions, is called only **with a certain probability** (_Cleans up expired sessions. Called by `session_start()`, based on `session.gc_divisor`, `session.gc_probability` and `session.gc_maxlifetime` settings_) accordingly to the php documentation. In the official Kanboard docker image these values default to: session.gc_probability=1, session.gc_divisor=1000. Thus, an expired session is only terminated with probability 1/1000. This issue has been addressed in release 1.2.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kanboard/kanboard/blob/main/app/Core/Session/SessionHandler.php#L40",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kanboard/kanboard/commit/7ce61c34d962ca8b5dce776289ddf4b207be6e78",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-gv5c-8pxr-p484",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/manual/en/function.session-start.php",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-divisor",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-maxlifetime",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/manual/en/session.configuration.php#ini.session.gc-probability",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.php.net/manual/en/sessionhandlerinterface.gc.php",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56115.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56115.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-56115",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:17.687",
|
||||
"lastModified": "2024-12-18T23:15:17.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ComplianceControl/CVE-2024-56115",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-561xx/CVE-2024-56116.json
Normal file
21
CVE-2024/CVE-2024-561xx/CVE-2024-56116.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-56116",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:17.857",
|
||||
"lastModified": "2024-12-18T23:15:17.857",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery vulnerability in Amiro.CMS before 7.8.4 allows remote attackers to create an administrator account."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ComplianceControl/CVE-2024-56116",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-563xx/CVE-2024-56317.json
Normal file
33
CVE-2024/CVE-2024-563xx/CVE-2024-56317.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-56317",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:18.023",
|
||||
"lastModified": "2024-12-18T23:15:18.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0, the WriteAcl function deletes all existing ACL entries first, and then attempts to recreate them based on user input. If input validation fails during decoding, the process stops, and no entries are restored by access-control-server.cpp, i.e., a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/project-chip/connectedhomeip/issues/36535",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-563xx/CVE-2024-56318.json
Normal file
41
CVE-2024/CVE-2024-563xx/CVE-2024-56318.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-56318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:18.213",
|
||||
"lastModified": "2024-12-19T00:15:06.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In raw\\TCP.cpp in Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0 before 27ca6ec, there is a NULL pointer dereference in TCPBase::ProcessSingleMessage via TCP packets with zero messageSize, leading to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/project-chip/connectedhomeip/commit/27ca6ec255b78168e04bd71e0f1a473869cf144b",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/project-chip/connectedhomeip/issues/36750",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/project-chip/connectedhomeip/pull/36751",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
41
CVE-2024/CVE-2024-563xx/CVE-2024-56319.json
Normal file
41
CVE-2024/CVE-2024-563xx/CVE-2024-56319.json
Normal file
@ -0,0 +1,41 @@
|
||||
{
|
||||
"id": "CVE-2024-56319",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-18T23:15:18.373",
|
||||
"lastModified": "2024-12-18T23:15:18.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0 before e3277eb, unlimited user label appends in a userlabel cluster can lead to a denial of service (resource exhaustion)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/project-chip/connectedhomeip/commit/e3277eb02ed8115de5887e8beca0e35007ba71f3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/project-chip/connectedhomeip/issues/36760",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/project-chip/connectedhomeip/pull/36843",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
72
README.md
72
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-18T23:00:20.790972+00:00
|
||||
2024-12-19T00:55:25.344583+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-18T22:39:17.437000+00:00
|
||||
2024-12-19T00:15:06.897000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,55 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
274297
|
||||
274330
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `33`
|
||||
|
||||
- [CVE-2024-12686](CVE-2024/CVE-2024-126xx/CVE-2024-12686.json) (`2024-12-18T21:15:08.020`)
|
||||
- [CVE-2024-12692](CVE-2024/CVE-2024-126xx/CVE-2024-12692.json) (`2024-12-18T22:15:05.730`)
|
||||
- [CVE-2024-12693](CVE-2024/CVE-2024-126xx/CVE-2024-12693.json) (`2024-12-18T22:15:06.293`)
|
||||
- [CVE-2024-12694](CVE-2024/CVE-2024-126xx/CVE-2024-12694.json) (`2024-12-18T22:15:06.397`)
|
||||
- [CVE-2024-12695](CVE-2024/CVE-2024-126xx/CVE-2024-12695.json) (`2024-12-18T22:15:06.523`)
|
||||
- [CVE-2024-45338](CVE-2024/CVE-2024-453xx/CVE-2024-45338.json) (`2024-12-18T21:15:08.173`)
|
||||
- [CVE-2024-55231](CVE-2024/CVE-2024-552xx/CVE-2024-55231.json) (`2024-12-18T22:15:07.127`)
|
||||
- [CVE-2024-55232](CVE-2024/CVE-2024-552xx/CVE-2024-55232.json) (`2024-12-18T22:15:07.297`)
|
||||
- [CVE-2024-55505](CVE-2024/CVE-2024-555xx/CVE-2024-55505.json) (`2024-12-18T22:15:07.477`)
|
||||
- [CVE-2024-56140](CVE-2024/CVE-2024-561xx/CVE-2024-56140.json) (`2024-12-18T21:15:08.353`)
|
||||
- [CVE-2024-56145](CVE-2024/CVE-2024-561xx/CVE-2024-56145.json) (`2024-12-18T21:15:08.530`)
|
||||
- [CVE-2022-44516](CVE-2022/CVE-2022-445xx/CVE-2022-44516.json) (`2024-12-19T00:15:05.727`)
|
||||
- [CVE-2022-44517](CVE-2022/CVE-2022-445xx/CVE-2022-44517.json) (`2024-12-19T00:15:05.880`)
|
||||
- [CVE-2022-44518](CVE-2022/CVE-2022-445xx/CVE-2022-44518.json) (`2024-12-19T00:15:06.037`)
|
||||
- [CVE-2022-44519](CVE-2022/CVE-2022-445xx/CVE-2022-44519.json) (`2024-12-19T00:15:06.200`)
|
||||
- [CVE-2022-44520](CVE-2022/CVE-2022-445xx/CVE-2022-44520.json) (`2024-12-19T00:15:06.360`)
|
||||
- [CVE-2023-21586](CVE-2023/CVE-2023-215xx/CVE-2023-21586.json) (`2024-12-19T00:15:06.530`)
|
||||
- [CVE-2024-37649](CVE-2024/CVE-2024-376xx/CVE-2024-37649.json) (`2024-12-18T23:15:07.440`)
|
||||
- [CVE-2024-39804](CVE-2024/CVE-2024-398xx/CVE-2024-39804.json) (`2024-12-18T23:15:07.640`)
|
||||
- [CVE-2024-41138](CVE-2024/CVE-2024-411xx/CVE-2024-41138.json) (`2024-12-18T23:15:07.813`)
|
||||
- [CVE-2024-41145](CVE-2024/CVE-2024-411xx/CVE-2024-41145.json) (`2024-12-18T23:15:07.970`)
|
||||
- [CVE-2024-41159](CVE-2024/CVE-2024-411xx/CVE-2024-41159.json) (`2024-12-18T23:15:08.140`)
|
||||
- [CVE-2024-41165](CVE-2024/CVE-2024-411xx/CVE-2024-41165.json) (`2024-12-18T23:15:08.300`)
|
||||
- [CVE-2024-42004](CVE-2024/CVE-2024-420xx/CVE-2024-42004.json) (`2024-12-18T23:15:08.450`)
|
||||
- [CVE-2024-42220](CVE-2024/CVE-2024-422xx/CVE-2024-42220.json) (`2024-12-18T23:15:08.597`)
|
||||
- [CVE-2024-43106](CVE-2024/CVE-2024-431xx/CVE-2024-43106.json) (`2024-12-18T23:15:08.760`)
|
||||
- [CVE-2024-53580](CVE-2024/CVE-2024-535xx/CVE-2024-53580.json) (`2024-12-18T23:15:17.010`)
|
||||
- [CVE-2024-55239](CVE-2024/CVE-2024-552xx/CVE-2024-55239.json) (`2024-12-18T23:15:17.180`)
|
||||
- [CVE-2024-55461](CVE-2024/CVE-2024-554xx/CVE-2024-55461.json) (`2024-12-18T23:15:17.350`)
|
||||
- [CVE-2024-55506](CVE-2024/CVE-2024-555xx/CVE-2024-55506.json) (`2024-12-18T23:15:17.523`)
|
||||
- [CVE-2024-55603](CVE-2024/CVE-2024-556xx/CVE-2024-55603.json) (`2024-12-19T00:15:06.713`)
|
||||
- [CVE-2024-56115](CVE-2024/CVE-2024-561xx/CVE-2024-56115.json) (`2024-12-18T23:15:17.687`)
|
||||
- [CVE-2024-56116](CVE-2024/CVE-2024-561xx/CVE-2024-56116.json) (`2024-12-18T23:15:17.857`)
|
||||
- [CVE-2024-56317](CVE-2024/CVE-2024-563xx/CVE-2024-56317.json) (`2024-12-18T23:15:18.023`)
|
||||
- [CVE-2024-56318](CVE-2024/CVE-2024-563xx/CVE-2024-56318.json) (`2024-12-18T23:15:18.213`)
|
||||
- [CVE-2024-56319](CVE-2024/CVE-2024-563xx/CVE-2024-56319.json) (`2024-12-18T23:15:18.373`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `40`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-47544](CVE-2024/CVE-2024-475xx/CVE-2024-47544.json) (`2024-12-18T21:48:32.893`)
|
||||
- [CVE-2024-47545](CVE-2024/CVE-2024-475xx/CVE-2024-47545.json) (`2024-12-18T21:49:28.210`)
|
||||
- [CVE-2024-47546](CVE-2024/CVE-2024-475xx/CVE-2024-47546.json) (`2024-12-18T21:50:08.920`)
|
||||
- [CVE-2024-47596](CVE-2024/CVE-2024-475xx/CVE-2024-47596.json) (`2024-12-18T21:51:08.200`)
|
||||
- [CVE-2024-47597](CVE-2024/CVE-2024-475xx/CVE-2024-47597.json) (`2024-12-18T21:39:17.820`)
|
||||
- [CVE-2024-47598](CVE-2024/CVE-2024-475xx/CVE-2024-47598.json) (`2024-12-18T21:40:26.240`)
|
||||
- [CVE-2024-47599](CVE-2024/CVE-2024-475xx/CVE-2024-47599.json) (`2024-12-18T21:41:17.307`)
|
||||
- [CVE-2024-47600](CVE-2024/CVE-2024-476xx/CVE-2024-47600.json) (`2024-12-18T21:43:04.660`)
|
||||
- [CVE-2024-47601](CVE-2024/CVE-2024-476xx/CVE-2024-47601.json) (`2024-12-18T21:43:42.903`)
|
||||
- [CVE-2024-47602](CVE-2024/CVE-2024-476xx/CVE-2024-47602.json) (`2024-12-18T21:27:41.137`)
|
||||
- [CVE-2024-47603](CVE-2024/CVE-2024-476xx/CVE-2024-47603.json) (`2024-12-18T21:28:13.987`)
|
||||
- [CVE-2024-47606](CVE-2024/CVE-2024-476xx/CVE-2024-47606.json) (`2024-12-18T21:35:45.223`)
|
||||
- [CVE-2024-47774](CVE-2024/CVE-2024-477xx/CVE-2024-47774.json) (`2024-12-18T21:36:58.827`)
|
||||
- [CVE-2024-47775](CVE-2024/CVE-2024-477xx/CVE-2024-47775.json) (`2024-12-18T21:37:59.663`)
|
||||
- [CVE-2024-49543](CVE-2024/CVE-2024-495xx/CVE-2024-49543.json) (`2024-12-18T21:22:33.593`)
|
||||
- [CVE-2024-49544](CVE-2024/CVE-2024-495xx/CVE-2024-49544.json) (`2024-12-18T21:22:11.823`)
|
||||
- [CVE-2024-49545](CVE-2024/CVE-2024-495xx/CVE-2024-49545.json) (`2024-12-18T21:21:56.527`)
|
||||
- [CVE-2024-49546](CVE-2024/CVE-2024-495xx/CVE-2024-49546.json) (`2024-12-18T21:21:39.133`)
|
||||
- [CVE-2024-49547](CVE-2024/CVE-2024-495xx/CVE-2024-49547.json) (`2024-12-18T21:20:40.313`)
|
||||
- [CVE-2024-49548](CVE-2024/CVE-2024-495xx/CVE-2024-49548.json) (`2024-12-18T21:20:23.697`)
|
||||
- [CVE-2024-49549](CVE-2024/CVE-2024-495xx/CVE-2024-49549.json) (`2024-12-18T21:19:54.533`)
|
||||
- [CVE-2024-53269](CVE-2024/CVE-2024-532xx/CVE-2024-53269.json) (`2024-12-18T22:15:06.763`)
|
||||
- [CVE-2024-53270](CVE-2024/CVE-2024-532xx/CVE-2024-53270.json) (`2024-12-18T22:15:06.883`)
|
||||
- [CVE-2024-53271](CVE-2024/CVE-2024-532xx/CVE-2024-53271.json) (`2024-12-18T22:15:07.010`)
|
||||
- [CVE-2024-53954](CVE-2024/CVE-2024-539xx/CVE-2024-53954.json) (`2024-12-18T21:16:26.943`)
|
||||
- [CVE-2024-43594](CVE-2024/CVE-2024-435xx/CVE-2024-43594.json) (`2024-12-18T23:15:08.920`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
137
_state.csv
137
_state.csv
@ -129336,7 +129336,7 @@ CVE-2019-10998,0,0,161127b36527ecf2ed6c8d5c408b2b950f0ea4d9c8cadc83798247b49ff47
|
||||
CVE-2019-10999,0,0,eca7c08e3a3a663a4247eb777bd211e2ef1683fd47fd5eafbd3364ae2d4cd1fb,2024-11-21T04:20:19.520000
|
||||
CVE-2019-1100,0,0,3139fa67f72c2ac2a426b9e94a2463ded4c90c91d0d9502dc10ab7acc7202820,2024-11-21T04:36:00.973000
|
||||
CVE-2019-11000,0,0,9f7b47e98cf836a95312c8ca77593d15ab59aa5e2b59d7d023930e92995b07af,2024-11-21T04:20:19.670000
|
||||
CVE-2019-11001,0,1,3990b0085a0a17399a8582ce087900aeb743bed0cf8a6a60a30fc0ea94af9616,2024-12-18T21:15:06.880000
|
||||
CVE-2019-11001,0,0,3990b0085a0a17399a8582ce087900aeb743bed0cf8a6a60a30fc0ea94af9616,2024-12-18T21:15:06.880000
|
||||
CVE-2019-11002,0,0,982a4058b8e9adceb38d582ecced8ccba846ed0e12cfcbdbeac2831eb8906fe0,2024-11-21T04:20:19.970000
|
||||
CVE-2019-11003,0,0,ff92b42246a7174753edf14d1e5c940e59427c16eca1f956007e6a48f87b626e,2024-11-21T04:20:20.103000
|
||||
CVE-2019-11004,0,0,89f4eb2d7c0c64f6cd5b1eed65e37382944a075492a538dc657d48d6922660a5,2024-11-21T04:20:20.247000
|
||||
@ -167089,6 +167089,7 @@ CVE-2021-2055,0,0,19ef2def0996a3eda979d21e11c85c151931ff02412b22b62ca1d283c91a81
|
||||
CVE-2021-20550,0,0,bcfb998103aabb2db68eacb68d6e5e676e366b8736eddb04f9b1959de069212a,2024-11-21T05:46:45.610000
|
||||
CVE-2021-20551,0,0,7599827456c11032b04f5d5521c20a3fded80a5e3c708285d2d63204629663a1,2024-11-21T05:46:45.760000
|
||||
CVE-2021-20552,0,0,db1b98f153498419c0ae5ac70680b77b702feff37c6f6d82a53523aa26f56b3c,2024-11-21T05:46:45.883000
|
||||
CVE-2021-20553,1,1,e1e21ff4ee57a407a14c026e5814a85da9b2c7fa45e6f8a0fa9db7476ce7c76b,2024-12-19T00:15:04.710000
|
||||
CVE-2021-20554,0,0,2e5190cabe82cd81ebbfc6a35e57e2047a5de9b2faf0ac96253685a1f61ba149,2024-11-21T05:46:46.007000
|
||||
CVE-2021-20556,0,0,08db6f413d131e81353474d5ce2e943aa08b3bfd763ebf0c40b5b52497b3769f,2024-11-21T05:46:46.143000
|
||||
CVE-2021-20557,0,0,d4a8b7981ff7e6cc87b1d17dad192132faa62d5127df8614b78f16f4ade1626a,2024-11-21T05:46:46.263000
|
||||
@ -174350,6 +174351,7 @@ CVE-2021-29822,0,0,09a76e7138aad6dfc7ab52ca0cd241d312de60620e492ef0053d6d402a455
|
||||
CVE-2021-29823,0,0,80ee5ee893b56420ffcc59a83a4fdbfb9d09ab542430ad06550c2ee82f0de962,2024-11-21T06:01:52.670000
|
||||
CVE-2021-29824,0,0,0312c92f3dad203a49fb4d74700e1473773ad1480d6687feea26a8ff93709db1,2024-11-21T06:01:52.800000
|
||||
CVE-2021-29825,0,0,8f8f9b502a0b14e142a0efa7b37ed3681ff93a41715c013c12b6c888db3c222b,2024-11-21T06:01:52.923000
|
||||
CVE-2021-29827,1,1,fff930698bc1edbad67b322bb4663d58cf6ad27a708090e12f7e3104487b552b,2024-12-19T00:15:04.873000
|
||||
CVE-2021-29831,0,0,545e7ff83f1458c2d806dc6f01d1f78b192c18e5db6b05fcf918272ea92a8fa2,2024-11-21T06:01:53.043000
|
||||
CVE-2021-29832,0,0,8585447c8f00dd814e9f628c9d6ad0f9e20be773b44ab3e6d8b767faf489e5b0,2024-11-21T06:01:53.183000
|
||||
CVE-2021-29833,0,0,94f9ab4704b65f9fb584fda861c3fc97f24530f660cce16cba412828e72809d8,2024-11-21T06:01:53.310000
|
||||
@ -192745,7 +192747,7 @@ CVE-2022-23220,0,0,587bdddc175569ce15f6940da02ed26c837c2a2634f31dc1b11143496f1ef
|
||||
CVE-2022-23221,0,0,5d57b4180b48987f7f4bfea9bdf7f6d1d256fcf67bfadd1791154e8dad339a61,2024-11-21T06:48:13.213000
|
||||
CVE-2022-23222,0,0,fbcfcb02bfa7b24347fade63f729949c1d8bf5ab948cbe460e536a4e6f01d068,2024-11-21T06:48:13.447000
|
||||
CVE-2022-23223,0,0,25ae342ae40f88bf1945d23f9f75dfe8fce27795096bf371c09a001e1246210b,2024-11-21T06:48:13.633000
|
||||
CVE-2022-23227,0,1,b3706645308eb832d5dccf185c7850eb8de3a07b35fe0eb9b007dd17f92ce0de,2024-12-18T21:15:07.780000
|
||||
CVE-2022-23227,0,0,b3706645308eb832d5dccf185c7850eb8de3a07b35fe0eb9b007dd17f92ce0de,2024-12-18T21:15:07.780000
|
||||
CVE-2022-23228,0,0,4a44e8524a7adb66befd4b46314168d27b1bea7184eb2236a14910edb3b3678f,2024-11-21T06:48:13.933000
|
||||
CVE-2022-2323,0,0,42b9bd1c8aca4c05c89da17a9dd6087ee600d18c2ac835582ed3b37915420177,2024-11-21T07:00:46.103000
|
||||
CVE-2022-23232,0,0,dcff8a87ed3c8132e455f844254418de8e1ef002dbc4192a1cbdc4832e1bee81,2024-11-21T06:48:14.080000
|
||||
@ -206808,6 +206810,8 @@ CVE-2022-40723,0,0,47d5d97a3b0851375c2b0cd12cb373778999cbf5827d4b1ce28e8f14d38c3
|
||||
CVE-2022-40724,0,0,1b728da6bac0532a4f5739b366a2da1c4452daf953fa10fb8655d678c82f9430,2024-11-21T07:21:56.407000
|
||||
CVE-2022-40725,0,0,64c16d64136c36afe1300757cde787f6df6e9488f4351c1c7e2d255d5914a81b,2024-11-21T07:21:56.533000
|
||||
CVE-2022-4073,0,0,eb32f2da0b9d93b3007909848cd6d56479d5d41162c4fcfd4fbb4577d9b55733,2023-11-07T03:56:51.877000
|
||||
CVE-2022-40732,1,1,4ecbe6ddae40cf548b03d78e71e932dbff4c7d240fbbed16524dae6f136ab4cb,2024-12-18T23:15:07.060000
|
||||
CVE-2022-40733,1,1,263e280b504b7e245b6924913810fea00aaae4b92505028912d9490dd262597d,2024-12-18T23:15:07.243000
|
||||
CVE-2022-40734,0,0,58117b64c9a903c8fb7db1a66ef34c3128ad5b1dbf19c93c401ac9d0603417fd,2024-11-21T07:21:56.670000
|
||||
CVE-2022-40735,0,0,3a7574cff56da967fce27335381a9ca4c7a727787a262097bcb905faced240ce,2024-11-21T07:21:56.900000
|
||||
CVE-2022-40736,0,0,8a4e1664de00baf170086ecfcf7a348ddfc7ba65bafd4937bc20b78c9585a649,2024-11-21T07:21:57.087000
|
||||
@ -209749,7 +209753,16 @@ CVE-2022-44500,0,0,b21789a06c67e872d5d73daab04f115073f5faa5e6ec649e0d7f940af0d83
|
||||
CVE-2022-44502,0,0,b5562c7b8267cf67bf0ad6ca70179251fa1596a66e437cdd39ac0d59e88570fa,2024-11-21T07:28:05.083000
|
||||
CVE-2022-4451,0,0,71bd0c76cc1206fc647acf97e23ac3111e5623c6dfa8588b7cd098d39f11a0f8,2024-11-21T07:35:17.343000
|
||||
CVE-2022-44510,0,0,25c4d0e9515b57632bcb3ae200f1085ef683d9e98b07dbc882d3305076a893b5,2024-11-21T07:28:05.197000
|
||||
CVE-2022-44512,1,1,a6697b3d40069e359e2a92e1659cd8e3f6d6cf9eafebfb11b3afed5e04d2c18f,2024-12-19T00:15:05.067000
|
||||
CVE-2022-44513,1,1,0dc3c342c558d6d3b5ea880dd08edcec553b9b362e84310d242fca8eb26d7e6a,2024-12-19T00:15:05.237000
|
||||
CVE-2022-44514,1,1,d390d0e1b938fb81e6f8af6e4d547e74ad8327182d8a162a57849f661e76080f,2024-12-19T00:15:05.400000
|
||||
CVE-2022-44515,1,1,164f1d12b39643bf8dfcd52a52f89b1917c8074fd5d8dd77b2bf5d8f047deb4d,2024-12-19T00:15:05.567000
|
||||
CVE-2022-44516,1,1,a38975cedcd42d7d0bcd728d44438a3b017464f349988e35d43426b04ed8f75e,2024-12-19T00:15:05.727000
|
||||
CVE-2022-44517,1,1,79890ab09738f6138a4691695c00694a4443bc98a11169f2cdbb2b560c52e9e6,2024-12-19T00:15:05.880000
|
||||
CVE-2022-44518,1,1,710af2b566f1573a6129d21a845c4388ab3915aea2d3523c49a3331a7352ce63,2024-12-19T00:15:06.037000
|
||||
CVE-2022-44519,1,1,48bffe7fa0840bca641de0f1e65e84227c78ca196675477c476c4b95d482e7fd,2024-12-19T00:15:06.200000
|
||||
CVE-2022-4452,0,0,e23ff09cf254521b138d2873c6b347ecad79392d4de44954995ce14268d350c9,2024-11-21T07:35:17.463000
|
||||
CVE-2022-44520,1,1,fed01525abf96cbefa5a5c09d4fb79bbfa9e3a88474609f818f285243d3fc52f,2024-12-19T00:15:06.360000
|
||||
CVE-2022-4453,0,0,9b00e366e9d0c0ef9c324b7b982b02b3dcac63ebb143aa7afbf887a477161fb4,2024-11-21T07:35:17.583000
|
||||
CVE-2022-44532,0,0,4207f3e98f5233bb1738bdd6c69782a0cd2348956681f5d35417e00bb16bafe5,2024-11-21T07:28:05.340000
|
||||
CVE-2022-44533,0,0,35103e589f79c98255b730dc3b424c6479616183eb90f9be40ddec7fdd1d6e6e,2024-11-21T07:28:05.460000
|
||||
@ -216332,6 +216345,7 @@ CVE-2023-21582,0,0,4f5bb933cd17a5c1613aa364a41ce8982934e8b8f3eae19a30c441e8cd6b7
|
||||
CVE-2023-21583,0,0,da3e056f56ad63f7eae14f2e8d9ffa08b78397274979a093ffb37a9e5e3ee287,2024-11-21T07:43:07.860000
|
||||
CVE-2023-21584,0,0,9b4764fbfdd2b085572e653159d7e41bc33dae3d1026fdf2ef7488386e1ab612,2024-11-21T07:43:07.970000
|
||||
CVE-2023-21585,0,0,cff3f3c1e359f7c3a70fbba0253fdce9609b428d2fe451cc230c57a04c06c5d6,2024-11-21T07:43:08.090000
|
||||
CVE-2023-21586,1,1,c7342d9abd36c8ce439cd66ee023e93be01e88b044fb33ce9b7c5f4cb38f4702,2024-12-19T00:15:06.530000
|
||||
CVE-2023-21587,0,0,529caf054840ca5e36185792609bc9be0ffc5215314f723e5c9028d34abee64c,2024-11-21T07:43:08.223000
|
||||
CVE-2023-21588,0,0,baff138c9f76bdbd381c2c168eebd52f4b047936191139a0418408fd3b806d62,2024-11-21T07:43:08.360000
|
||||
CVE-2023-21589,0,0,4b9a8c28267032bdbbeeb191175e5f1bfdffcc52264c17cc8c8f9227af3eddc6,2024-11-21T07:43:08.470000
|
||||
@ -232395,7 +232409,7 @@ CVE-2023-41873,0,0,144df708eec5cdc99bf9fc900b8b496963af7a10b5fe491bc7a23f78f7855
|
||||
CVE-2023-41874,0,0,a273518103b67315483aec10e4142508e72449f6d8f6ebe80921f7b6ecf22161,2024-11-21T08:21:49.820000
|
||||
CVE-2023-41875,0,0,0219e72c04918431bddec1b861997edbd6f7ffe58adb18a9206c7114d4b37885,2024-12-13T15:15:25.950000
|
||||
CVE-2023-41876,0,0,c65a67afd85426602e7ce8d50691736379577812fe96ecc473c7a63fea44bdeb,2024-11-21T08:21:49.953000
|
||||
CVE-2023-41877,0,1,05182afcf80722c5de0a5cdefd2d1d6589a76671002a6dde20b43c88da286b35,2024-12-18T22:01:15.063000
|
||||
CVE-2023-41877,0,0,05182afcf80722c5de0a5cdefd2d1d6589a76671002a6dde20b43c88da286b35,2024-12-18T22:01:15.063000
|
||||
CVE-2023-41878,0,0,69f5df70c8cf256edf441a21003ad975c00708528a81d027d3cbb62167be0250,2024-11-21T08:21:50.207000
|
||||
CVE-2023-41879,0,0,26c3b9818b764a1ed064ebf13595d3ddd709f842d054238762177756b3db12b0,2024-11-21T08:21:50.350000
|
||||
CVE-2023-4188,0,0,2d805671cfcf3697b72c8ab984da36d2fcc19712a1dca338f0c3f2fe40c54075,2024-11-21T08:34:34.847000
|
||||
@ -238985,8 +238999,8 @@ CVE-2023-51440,0,0,1169f2ff9e326f6a3788f618809df1fe8188ee99151bee69ee1c834192da2
|
||||
CVE-2023-51441,0,0,a1f5c39c8dff7bf99bb5a5fa410c3c1174c89222db585eebd25100439c38d134,2024-11-21T08:38:07.500000
|
||||
CVE-2023-51442,0,0,1c1738101beb2069f2b1a7e3fda08286945bd667c62bf8c2c6862c2db1b18d8f,2024-11-21T08:38:07.630000
|
||||
CVE-2023-51443,0,0,bc5dfbcf2d47b2402929c15b90b4be90f3f7485f94767446ff8ec5a8bbd43f0a,2024-11-21T08:38:07.743000
|
||||
CVE-2023-51444,0,1,e8424d7dbab81f18c11cb58faf4fc4e186576a125c882d03ea2d7e9cf75e0421,2024-12-18T21:58:24.790000
|
||||
CVE-2023-51445,0,1,41116820fca24ff32c8b590dc0a48077ad37e3c179f86cf28f8cf11b3c34d0b5,2024-12-18T21:56:24.053000
|
||||
CVE-2023-51444,0,0,e8424d7dbab81f18c11cb58faf4fc4e186576a125c882d03ea2d7e9cf75e0421,2024-12-18T21:58:24.790000
|
||||
CVE-2023-51445,0,0,41116820fca24ff32c8b590dc0a48077ad37e3c179f86cf28f8cf11b3c34d0b5,2024-12-18T21:56:24.053000
|
||||
CVE-2023-51446,0,0,477f5d27d22a3cba1e4a3cc51b0aade0149e549a265a572147ead5a7c2014b5d,2024-11-21T08:38:08.127000
|
||||
CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d7a5,2024-12-16T22:43:27.217000
|
||||
CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000
|
||||
@ -244896,13 +244910,13 @@ CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33
|
||||
CVE-2024-12670,0,0,e7b8f3ddb5169d290af2bda66232fe815bee4c71a4a1f7548206ceb5efabd15b,2024-12-17T16:15:25.140000
|
||||
CVE-2024-12671,0,0,33a51da7a5cafc871ec2982a392093d750bc50c7ea020ed8c4ecce107234fbc4,2024-12-17T16:15:25.260000
|
||||
CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000
|
||||
CVE-2024-12686,1,1,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
|
||||
CVE-2024-12686,0,0,7c2cc2e0f5f82b44071cc4c1a2dd0de5cead79d1be06d7509bdb9e40b2202caf,2024-12-18T21:15:08.020000
|
||||
CVE-2024-12687,0,0,b00d9880cccbae5eb0e2d628c15c0e5ee14a121d2bf1c4da798bc7a4cb1efb81,2024-12-16T20:15:09.777000
|
||||
CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000
|
||||
CVE-2024-12692,1,1,650dea48ea2dbe7711dc0bf271331ff770ac41a6b305ff8ad09ffba0d2163ba7,2024-12-18T22:15:05.730000
|
||||
CVE-2024-12693,1,1,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84281,2024-12-18T22:15:06.293000
|
||||
CVE-2024-12694,1,1,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000
|
||||
CVE-2024-12695,1,1,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000
|
||||
CVE-2024-12692,0,0,650dea48ea2dbe7711dc0bf271331ff770ac41a6b305ff8ad09ffba0d2163ba7,2024-12-18T22:15:05.730000
|
||||
CVE-2024-12693,0,0,fa244e87a1d7ee3a7d9e92d40315fcb2fe89f2c8d9d7f214206a533f7af84281,2024-12-18T22:15:06.293000
|
||||
CVE-2024-12694,0,0,1113db203568a421b80ffccb5b5bd23979d9e164b3f0172a2af39541f3027ff7,2024-12-18T22:15:06.397000
|
||||
CVE-2024-12695,0,0,f61d3c90ed3c2af8f67c04eb0428efa0b92ce5a62ba88d311245291d200e23c6,2024-12-18T22:15:06.523000
|
||||
CVE-2024-12698,0,0,bb87160466c668f8935491c0e9c96bcd8d37f4e72410a6dabca6f522c3fa9b9a,2024-12-18T05:15:07.840000
|
||||
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
|
||||
CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000
|
||||
@ -249144,7 +249158,7 @@ CVE-2024-24743,0,0,8b8eb5a56f12b6c53a7a972a91c151337f030c81d2382bab605f73cf09ae6
|
||||
CVE-2024-24746,0,0,29b64eb040fe3dc6e09b5dd0640a77052b82c31dc0faef52d04d78f87eb66b86,2024-11-21T08:59:36.647000
|
||||
CVE-2024-24747,0,0,8125c5ab54fcbe503d2d7453a1ee5839c17e4edb306b2c7df3df0dd863da6429,2024-11-21T08:59:36.850000
|
||||
CVE-2024-24748,0,0,0cdfc68f983790a7c3e213f0da1280264c12625bb9d03e0a2404e1b3d3a4e6c4,2024-11-21T08:59:36.993000
|
||||
CVE-2024-24749,0,1,5250cf2390a657b7cf3426d2a81201c26d285bcd980c249283207a957e369a70,2024-12-18T22:08:46.760000
|
||||
CVE-2024-24749,0,0,5250cf2390a657b7cf3426d2a81201c26d285bcd980c249283207a957e369a70,2024-12-18T22:08:46.760000
|
||||
CVE-2024-2475,0,0,84dd791b3d89c80d7bd01728fd7a39eb99447b51627d0914f35715b92d401100,2024-11-21T09:09:50.110000
|
||||
CVE-2024-24750,0,0,cc34797da60c6d05caf20a8995e2225cf1cccf6fbd6e3c7bedfabc7705510111,2024-12-17T17:40:47.303000
|
||||
CVE-2024-24751,0,0,332b3d4e3a209828a661991efd3347cced117fe88519ae4eeeb1b40b069fd0f8,2024-11-21T08:59:37.407000
|
||||
@ -249789,12 +249803,12 @@ CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0
|
||||
CVE-2024-25615,0,0,50c65986bbb8dc5aafc867c9e37b361b7c08d50d65dd263fb769956dc6ae116a,2024-11-21T09:01:05.260000
|
||||
CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000
|
||||
CVE-2024-25617,0,0,17f484e162566f54c12e8f4f84695e904b29b76183dabdc64b901466b20a705f,2024-11-21T09:01:05.533000
|
||||
CVE-2024-25618,0,1,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000
|
||||
CVE-2024-25619,0,1,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000
|
||||
CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000
|
||||
CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000
|
||||
CVE-2024-2562,0,0,6acc014ac1c8f4275f46fe82a47eb5d09d436c296b92b3bb232858f0cdeed994,2024-11-21T09:10:01.040000
|
||||
CVE-2024-25620,0,0,b50e6d09af7ce768a716dc2ff7ffa7e76bd9a236ffa80ba663793968d8d53334,2024-11-21T09:01:05.923000
|
||||
CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb161,2024-11-12T20:04:39.957000
|
||||
CVE-2024-25623,0,1,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000
|
||||
CVE-2024-25623,0,0,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000
|
||||
CVE-2024-25624,0,0,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000
|
||||
CVE-2024-25625,0,0,84707cd28e1bdaa9fde780703bf2a9a7e5d5981a505df8c5ad93f3b9fec8212d,2024-11-21T09:01:06.387000
|
||||
CVE-2024-25626,0,0,fd128277875e205dcfef22acbe212d50e94b3f10ad9e2e84a95cfbcc859efdc3,2024-11-21T09:01:06.513000
|
||||
@ -251029,7 +251043,7 @@ CVE-2024-27079,0,0,07de70fa8c3b809ff48e2ff24e87d600a8debe70cf3c7268624ebbd9a1379
|
||||
CVE-2024-2708,0,0,bf697bc47a2f6d1f340b86849095414aa8022fd5fa182a3b6858d8aad137b35f,2024-12-12T17:29:07.680000
|
||||
CVE-2024-27080,0,0,02429991ce9474cf345b7cb16f8cc48985b566887cfdb16e19d4245116b2d135,2024-11-21T09:03:49.183000
|
||||
CVE-2024-27081,0,0,80ca12be4ccb643aa9b9acced80a6c8edec931ae4a7630a48e36baddb6e3240c,2024-11-21T09:03:49.310000
|
||||
CVE-2024-27082,0,1,4317d32a3e0e8ed99d5825e499a15b4bf1a86f7bc115f4ec81a78b0bcd430db5,2024-12-18T21:01:17.677000
|
||||
CVE-2024-27082,0,0,4317d32a3e0e8ed99d5825e499a15b4bf1a86f7bc115f4ec81a78b0bcd430db5,2024-12-18T21:01:17.677000
|
||||
CVE-2024-27083,0,0,0a867c69f0761d5202838e0d6673017855748c22aaa12a5775e2cc98792089a5,2024-11-21T09:03:49.570000
|
||||
CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416e16,2024-02-26T18:15:07.920000
|
||||
CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000
|
||||
@ -253003,7 +253017,7 @@ CVE-2024-29890,0,0,d7aeef7b1a852d07093e767dae05e03ec8f713df2d306c8f69aabec8a291c
|
||||
CVE-2024-29891,0,0,f037b09b07aae70e8f17162cf2f9555dce693854577cc8fe640959768b6c2f9c,2024-11-21T09:08:33.593000
|
||||
CVE-2024-29892,0,0,0eabeb7cb6695ef5e7c670b1dc02008d4a59b639330a4432c44db18dea85266a,2024-11-21T09:08:33.727000
|
||||
CVE-2024-29893,0,0,c8af367d9c587e41584706a11632b08d7b7ae69bfffc1ce0ee4de371d408e149,2024-11-21T09:08:33.863000
|
||||
CVE-2024-29894,0,1,63a0f8ebc2b89dbefe86d49c0639f6e96b849498d3625b601a9b5117c947eff3,2024-12-18T21:10:38.887000
|
||||
CVE-2024-29894,0,0,63a0f8ebc2b89dbefe86d49c0639f6e96b849498d3625b601a9b5117c947eff3,2024-12-18T21:10:38.887000
|
||||
CVE-2024-29895,0,0,304ec674d940c6c6be41bc00c8f8967d1334e98bed6f24f921965e14ed63e7ab,2024-11-21T09:08:34.137000
|
||||
CVE-2024-29896,0,0,145f328aab85293779e8f763f5e2657bc5ad706121e996820012b73884b52f55,2024-11-21T09:08:34.273000
|
||||
CVE-2024-29897,0,0,890ab49af1d0f2615103d1d58d4cf202a16f4b443c3efac64624c08c88a21b24,2024-11-21T09:08:34.397000
|
||||
@ -258966,6 +258980,7 @@ CVE-2024-37642,0,0,fe3461e5fb2788de711bfd9b6bb47fd5e17a67ddb0ff15346912de18f8c42
|
||||
CVE-2024-37643,0,0,1d855f4bf0f785e71cea62cbc0f369511f6ea0dce9a50a9f322baa5658c69f7b,2024-11-21T09:24:10.850000
|
||||
CVE-2024-37644,0,0,04b02f37a9b83c09d899849116b647177377d8a76e70c7d8db488f726c3bd5e7,2024-11-21T09:24:11.063000
|
||||
CVE-2024-37645,0,0,e4c63e220f43de5878e40a5e77259bd215d94fa70db73f63ff4753c220b74c30,2024-11-21T09:24:11.293000
|
||||
CVE-2024-37649,1,1,611c86dc432bb1f4b55a852e080016fea79189b71e099793c648f84ae33340a4,2024-12-18T23:15:07.440000
|
||||
CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000
|
||||
CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000
|
||||
CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000
|
||||
@ -260633,6 +260648,7 @@ CVE-2024-3979,0,0,0afe50bc44d6fa6b597cd86ec198fb5812e3efa26f9c96f16b2dc019765fb5
|
||||
CVE-2024-39791,0,0,84800cbf50106122b4ec00c830726d3c0c16e597f5511aff68896621728fa7b5,2024-08-20T17:15:56.067000
|
||||
CVE-2024-39792,0,0,a0e01fb34a5f6d0b714b844b637779a453bc01fac9209900d57b56253997cfee,2024-08-19T16:20:28.967000
|
||||
CVE-2024-3980,0,0,5ed554dffef87bebecad0e1e92147ec3b9a94d4293f1f5208c881e426d70aa58,2024-10-30T15:33:12.697000
|
||||
CVE-2024-39804,1,1,1443ebe065e0e4d5717fd837b10d865cedfd8feca4b62ad4eaf3caa3103ebfa2,2024-12-18T23:15:07.640000
|
||||
CVE-2024-39806,0,0,820d3b5181086101e827009cfe4b737213c68e8e8373d5aee74b56640c974b56,2024-10-16T16:49:41.507000
|
||||
CVE-2024-39807,0,0,a5f08786585e608d689a1daeac36093e7823985001ef9fadb52054fa4e796736,2024-11-21T09:28:22.227000
|
||||
CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa7f1,2024-09-11T16:26:11.920000
|
||||
@ -261434,11 +261450,13 @@ CVE-2024-41133,0,0,eaa006680fbe52171c055ee02d725e1b8155ec7b71c3a3acf39eb708d36d5
|
||||
CVE-2024-41134,0,0,23d5c7d7f4402caa31388f429a7315bd4b4bc9813b8271b656a2f311d8a3a753,2024-11-21T09:32:18.087000
|
||||
CVE-2024-41135,0,0,fcaf63fba315037fb68d1d925bded9bb7982510c754a09114db334bb9fd16881,2024-11-21T09:32:18.203000
|
||||
CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000
|
||||
CVE-2024-41138,1,1,de8937ba571c423a59c7f9fe9e19d9f039af80b9830484d75c60de74332fb341,2024-12-18T23:15:07.813000
|
||||
CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000
|
||||
CVE-2024-4114,0,0,bffdfff59b8e8c1973fa293ec179ba5ad5b6804845f0d8c3580b8b465845a4ff,2024-11-21T09:42:12.847000
|
||||
CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000
|
||||
CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000
|
||||
CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000
|
||||
CVE-2024-41145,1,1,77e2343197ccbb28092a01ae4f2a3524bb2b2c483f0a4f8ccc0f2107bf596127,2024-12-18T23:15:07.970000
|
||||
CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000
|
||||
CVE-2024-4115,0,0,b57267cb8e1bb6187223c6763b432c2e47371c5db7fb3c6e57e19714f114293c,2024-11-21T09:42:12.977000
|
||||
CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000
|
||||
@ -261446,12 +261464,14 @@ CVE-2024-41151,0,0,00f13e1e96fa8ce3e2849a0ecdb2937bd23efcaa80a1d6b9e409fd228363f
|
||||
CVE-2024-41153,0,0,c0ab6701dfb0e7935b555b1fa094f0ee4f1bf4a1c16645e01a3ec31537dc2a4e,2024-10-31T14:37:48.533000
|
||||
CVE-2024-41156,0,0,4e48f11d1fb4cd9de12eef64bee0a3ff2f5403553caa8e40519c489b9350c166,2024-12-05T15:29:31.730000
|
||||
CVE-2024-41157,0,0,687c6bf6c1a2a644076449fb3f6cf8733831e4b295f95e907ece1f39dc641094,2024-09-04T16:30:40.737000
|
||||
CVE-2024-41159,1,1,03637d611014a38e6e3b05f7bde30132e51a028877d0bba9b9ae193cd7ffe82e,2024-12-18T23:15:08.140000
|
||||
CVE-2024-4116,0,0,fb13e9eda5d5b0f87b4a1a6faf2d47dd767a1cd80c123d34508608e977fd6f59,2024-11-21T09:42:13.103000
|
||||
CVE-2024-41160,0,0,59352b379d517c3d21973bcf1f1dabfc101e56caaa086108874e9f5a5016dec8,2024-09-09T12:21:53.383000
|
||||
CVE-2024-41161,0,0,c44c40c9181bdc0411297b718d634c69b4cc443072a4bbfc4be96011581fd659,2024-08-20T17:09:50.647000
|
||||
CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138759,2024-09-04T17:03:53.010000
|
||||
CVE-2024-41163,0,0,acd3d59e23a7c7b4b0c3e74d19b58377cdb81402be9adbd0a5cfe7a91ece1831,2024-12-18T15:15:10.730000
|
||||
CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000
|
||||
CVE-2024-41165,1,1,8f8f25c9e56a41527b25ef69ce06e4eed865113e8f19257748f26cee82a5ddfb,2024-12-18T23:15:08.300000
|
||||
CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000
|
||||
CVE-2024-4117,0,0,6cc086281cfe564ad1a8b73d3f7bd2e9fa0d2a40b390da51a0a4f6965f4fec1f,2024-11-21T09:42:13.230000
|
||||
CVE-2024-41170,0,0,7c50c7e0ef992b5a3c278ba9993ae63d88ca15fcfd1b1982b492fe16db9c5784,2024-09-10T12:09:50.377000
|
||||
@ -261965,6 +261985,7 @@ CVE-2024-41999,0,0,b97edfde7ae6eb79fac26588dc330cd7e8dfe8ef88db849221e314600b8cf
|
||||
CVE-2024-4200,0,0,f038714f68ea12f4c74fb21fbba21d18e23ff4002802fc658c541b8aad8db5b3,2024-11-21T09:42:22.677000
|
||||
CVE-2024-42000,0,0,2e5e6eba94260d1248a64e384ab7190b55ba9e666e827b568cb017e068a9a34b,2024-11-14T16:48:30.013000
|
||||
CVE-2024-42001,0,0,7b8b45588c9e661c6cad79b697fc90c37112d9be488e1f5fc1421e2d70534ef5,2024-08-20T16:37:05.447000
|
||||
CVE-2024-42004,1,1,817bffe189720697fa27094cb065692dab1e4b1f1fda226cf8e46b370d47891a,2024-12-18T23:15:08.450000
|
||||
CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447d04,2024-10-23T18:22:48.937000
|
||||
CVE-2024-42006,0,0,db719e10e8f2437035bfb372f689cb5ad1b3ba987ed59129a01e11cdd446ff43,2024-08-21T13:26:54.577000
|
||||
CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000
|
||||
@ -262142,6 +262163,7 @@ CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d8
|
||||
CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000
|
||||
CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000
|
||||
CVE-2024-4222,0,0,404604444d77dc73b57c36b8a95aa3dc38057a1a3ba659619f4989018835c2b9,2024-11-21T09:42:25.043000
|
||||
CVE-2024-42220,1,1,3efaea9f9008d92d0d433576bd8e615ab7d920bd31eb633108deeefd65ebfba2,2024-12-18T23:15:08.597000
|
||||
CVE-2024-42222,0,0,31d1ecceb29f6dc0a006287b8f36eb69950f688f623593894878e73f68b4744b,2024-11-21T09:33:45.030000
|
||||
CVE-2024-42223,0,0,bfd3e9b2497c2cd4ce56cfc4b3f7c8c085d8282b329417cd9636c8478537873e,2024-11-21T09:33:45.160000
|
||||
CVE-2024-42224,0,0,a2467d1fdcd4f892f0d1e376bc5d4807929bf44cfae506d429e598dfa3e2b882,2024-11-21T09:33:45.307000
|
||||
@ -262741,6 +262763,7 @@ CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec
|
||||
CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000
|
||||
CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000
|
||||
CVE-2024-43105,0,0,e347f7b09a6bd72c4cce9575828cf84dd0078060fb85e7c631ae4a4f65e5a4e2,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43106,1,1,7c35bd64ddd80049f7425ea57212cdb212a079b1dc41737dbd159b80835e180b,2024-12-18T23:15:08.760000
|
||||
CVE-2024-43108,0,0,77fa3735512d5828a3d75fa92bafe3bf54d868b127562dbed774be5fb641f858,2024-10-17T17:15:11.883000
|
||||
CVE-2024-4311,0,0,76e51b82bcf102c4a7a18c5b03d4ba2a6e78929354b4c7d54c7e39e256fd7ef3,2024-11-18T16:35:13.737000
|
||||
CVE-2024-43110,0,0,51650deb7aee7ab0cf914391f943f7fe2c91b657e3cdae3cff1f5f569194dcba,2024-09-05T21:22:04.810000
|
||||
@ -263211,7 +263234,7 @@ CVE-2024-43590,0,0,56f37bed6fa12b529a536cabd867859c2b7202ec5a699f63f91ae2da59bda
|
||||
CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000
|
||||
CVE-2024-43592,0,0,aefb3ea2eef4806b0b04bf1216ce25a8b6f83f456c5748fe7fb5b675b193040f,2024-10-22T19:30:02.777000
|
||||
CVE-2024-43593,0,0,2bb48f4f0afa52430e295c1e926a52b9335896fd8f7df026028468d0b3163bed,2024-10-22T19:30:19.870000
|
||||
CVE-2024-43594,0,0,8921bf0377c016d75fd4356966ea13d61f6576d4d52419bfdffebda90cdc8066,2024-12-12T02:00:54.287000
|
||||
CVE-2024-43594,0,1,0023a318bb29ccf0663d52c356794a59ebf2071b9e9fd567a194381db13ebb6c,2024-12-18T23:15:08.920000
|
||||
CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d922654387160cb,2024-10-18T16:55:06.487000
|
||||
CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000
|
||||
CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000
|
||||
@ -264434,7 +264457,7 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44
|
||||
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
|
||||
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
|
||||
CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000
|
||||
CVE-2024-45338,1,1,35f6048860fb1c72b6b6ce0a98d0bb29575e2c25156ad8356eec8ef7e12f590d,2024-12-18T21:15:08.173000
|
||||
CVE-2024-45338,0,0,35f6048860fb1c72b6b6ce0a98d0bb29575e2c25156ad8356eec8ef7e12f590d,2024-12-18T21:15:08.173000
|
||||
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
|
||||
CVE-2024-45346,0,0,42bcf491a94494c9433ce7696078ac7ab2eca46d8c28dcac4158f4b2b20fa4a5,2024-08-29T03:15:05.247000
|
||||
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
|
||||
@ -265795,16 +265818,16 @@ CVE-2024-47534,0,0,df13f2ee68fa5e66e525b7b1f66f6aa0f0e1c060ce893dece259dc49bb627
|
||||
CVE-2024-47535,0,0,298d41133677422a8f6d390f12d2cec10b4d60092e295406e026ea754c8a295e,2024-11-13T17:01:58.603000
|
||||
CVE-2024-47536,0,0,6f8a4b4f8220f9b26154b954ad727df271a73f901fc0c3d5863c162fae5afc51,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47537,0,0,0c8153afca3aac84f186ec27f0837ced55d59e8e8e65c8031c4d84dd680e9f85,2024-12-12T02:03:27.877000
|
||||
CVE-2024-47538,0,1,ad7972197a18862beb8bdd90c0ae99acdd81ab31bd6496a51470f43a9079cf2c,2024-12-18T21:51:56.203000
|
||||
CVE-2024-47539,0,1,e700345225afbdb189fa376bdd8d61a4fac3ed4f8377392883f6552c7cecac25,2024-12-18T21:52:56.307000
|
||||
CVE-2024-47538,0,0,ad7972197a18862beb8bdd90c0ae99acdd81ab31bd6496a51470f43a9079cf2c,2024-12-18T21:51:56.203000
|
||||
CVE-2024-47539,0,0,e700345225afbdb189fa376bdd8d61a4fac3ed4f8377392883f6552c7cecac25,2024-12-18T21:52:56.307000
|
||||
CVE-2024-4754,0,0,f946bc350cafc376503b251e8950814dfbf85a03e7ce93cc628c4f28533490c5,2024-11-21T09:43:31.777000
|
||||
CVE-2024-47540,0,1,ff2a6bd413545302aed64a381dac3c3c798a6ff96b7902bb0d3fe72444b2dc99,2024-12-18T21:53:53.963000
|
||||
CVE-2024-47540,0,0,ff2a6bd413545302aed64a381dac3c3c798a6ff96b7902bb0d3fe72444b2dc99,2024-12-18T21:53:53.963000
|
||||
CVE-2024-47541,0,0,4245d049a4573901f7770b7cf133d400396b6f6af9f5943422209e14455bd4e7,2024-12-13T19:21:49.873000
|
||||
CVE-2024-47542,0,0,fa3b6dab6f59424d3e6bc955760c56fdbb1b4dc68420b8f72a81cfbb7447d6d8,2024-12-13T19:03:40.280000
|
||||
CVE-2024-47543,0,1,00b1195ce79dc116199316d3c815d4607310cfe7a5454432362672154c825d2a,2024-12-18T21:47:18.337000
|
||||
CVE-2024-47544,0,1,f80f67aec2936bf3a4215ee30c8ee9cfd457dca117e54c936aa38886d04f8fa0,2024-12-18T21:48:32.893000
|
||||
CVE-2024-47545,0,1,428cf72ec7808d91481b7207049d2e117dcbb6beb17798245f304000d1594899,2024-12-18T21:49:28.210000
|
||||
CVE-2024-47546,0,1,b95cd270aed883f8f010c4648c391da8a614c825b1b38218b56931fefba049ef,2024-12-18T21:50:08.920000
|
||||
CVE-2024-47543,0,0,00b1195ce79dc116199316d3c815d4607310cfe7a5454432362672154c825d2a,2024-12-18T21:47:18.337000
|
||||
CVE-2024-47544,0,0,f80f67aec2936bf3a4215ee30c8ee9cfd457dca117e54c936aa38886d04f8fa0,2024-12-18T21:48:32.893000
|
||||
CVE-2024-47545,0,0,428cf72ec7808d91481b7207049d2e117dcbb6beb17798245f304000d1594899,2024-12-18T21:49:28.210000
|
||||
CVE-2024-47546,0,0,b95cd270aed883f8f010c4648c391da8a614c825b1b38218b56931fefba049ef,2024-12-18T21:50:08.920000
|
||||
CVE-2024-47547,0,0,2e86dfc31a612610fcd211703820a9bbd2e41912415648f4197e55f76e2b416e,2024-12-10T19:57:32.987000
|
||||
CVE-2024-47549,0,0,ec88edfad973e804c3e080b206fe5d22667e6bea7ecbaa56013ae1c9427b52bf,2024-11-05T19:40:52.070000
|
||||
CVE-2024-4755,0,0,cf57304aa4a44badae0bfd971e93fc9d9b32ba95a21a3c55b71d92c862671250,2024-11-21T09:43:31.903000
|
||||
@ -265842,17 +265865,17 @@ CVE-2024-47592,0,0,7514b1d0682229e8e8d72f71655b912eae2bf102984769f70b3a93113c524
|
||||
CVE-2024-47593,0,0,4485a35cf6d452090b7fd36461c91f586cdd110571706bdf5c04b7a553b6ebe0,2024-11-12T15:35:13.233000
|
||||
CVE-2024-47594,0,0,7e345ff54c7effa11a9979482e9e679ccb391308ea3cdbd79ee7edd65b331424,2024-11-14T16:12:13.877000
|
||||
CVE-2024-47595,0,0,8487073d9f25df501ffd874ff6ba96468e413512174a07e87d56dec935df872f,2024-11-14T15:21:32.080000
|
||||
CVE-2024-47596,0,1,b152f2a6a6ebefa7b3e6b61694cb3243028cd12cc07dbd87336faa57de37e534,2024-12-18T21:51:08.200000
|
||||
CVE-2024-47597,0,1,b148e096ccc1cb4fa8263cb44f98c3d689a6158bf24ebccb58eacfececb121c4,2024-12-18T21:39:17.820000
|
||||
CVE-2024-47598,0,1,7df76f9573d9d47beac295737ee53e510ea4292cdada2b6bdcefc61567e5a1e8,2024-12-18T21:40:26.240000
|
||||
CVE-2024-47599,0,1,79a940e4ed1dc0e11d45a35557efb0692c48247304aee36c5226aab6500a00ea,2024-12-18T21:41:17.307000
|
||||
CVE-2024-47596,0,0,b152f2a6a6ebefa7b3e6b61694cb3243028cd12cc07dbd87336faa57de37e534,2024-12-18T21:51:08.200000
|
||||
CVE-2024-47597,0,0,b148e096ccc1cb4fa8263cb44f98c3d689a6158bf24ebccb58eacfececb121c4,2024-12-18T21:39:17.820000
|
||||
CVE-2024-47598,0,0,7df76f9573d9d47beac295737ee53e510ea4292cdada2b6bdcefc61567e5a1e8,2024-12-18T21:40:26.240000
|
||||
CVE-2024-47599,0,0,79a940e4ed1dc0e11d45a35557efb0692c48247304aee36c5226aab6500a00ea,2024-12-18T21:41:17.307000
|
||||
CVE-2024-4760,0,0,de926bec8e8c13a7e4c13bca922cad2399c8ba3da1db5b99551a2507b2214b2e,2024-11-21T09:43:32.823000
|
||||
CVE-2024-47600,0,1,cf9fd806dd5b2bdb890624068780e8bc61c5a7e7f4b357f6028c70964d446732,2024-12-18T21:43:04.660000
|
||||
CVE-2024-47601,0,1,f075b90e2fa0550816f7530f0832934f105615b601836ec61a3f3b9371879f1c,2024-12-18T21:43:42.903000
|
||||
CVE-2024-47602,0,1,3590424c5a1e5ab2c409ce352a836f4cff6bfe6739d6dce4410c2d8f9101ee03,2024-12-18T21:27:41.137000
|
||||
CVE-2024-47603,0,1,e2f22752273db695c89b30b387b9d18f99d96e81bdc9ec5d981ef632b4380656,2024-12-18T21:28:13.987000
|
||||
CVE-2024-47600,0,0,cf9fd806dd5b2bdb890624068780e8bc61c5a7e7f4b357f6028c70964d446732,2024-12-18T21:43:04.660000
|
||||
CVE-2024-47601,0,0,f075b90e2fa0550816f7530f0832934f105615b601836ec61a3f3b9371879f1c,2024-12-18T21:43:42.903000
|
||||
CVE-2024-47602,0,0,3590424c5a1e5ab2c409ce352a836f4cff6bfe6739d6dce4410c2d8f9101ee03,2024-12-18T21:27:41.137000
|
||||
CVE-2024-47603,0,0,e2f22752273db695c89b30b387b9d18f99d96e81bdc9ec5d981ef632b4380656,2024-12-18T21:28:13.987000
|
||||
CVE-2024-47604,0,0,0bc47ae414bdd6b01a65c265f3f3055e1a0a5458b44c790858631e91134d9f75,2024-11-13T23:17:14.437000
|
||||
CVE-2024-47606,0,1,4800f16c54aa7ffc30bd35e785cee8b35a6989e3b8bc32b9da0d43ad7d5700a6,2024-12-18T21:35:45.223000
|
||||
CVE-2024-47606,0,0,4800f16c54aa7ffc30bd35e785cee8b35a6989e3b8bc32b9da0d43ad7d5700a6,2024-12-18T21:35:45.223000
|
||||
CVE-2024-47607,0,0,382969a888801c46134ab6b16f4a50a4d9e68502ecd36882250f06d39efd0e1d,2024-12-18T19:53:21.123000
|
||||
CVE-2024-47608,0,0,6568bd19016506539b4ea82412fdcb1ecdc2fcf519cca4e0194fbcee5a3c48e7,2024-10-07T18:51:05.650000
|
||||
CVE-2024-47609,0,0,20abbd49af76b9706e2ef27aa5069189f8951d7c9ed85341c5ad92d8d50e5593,2024-11-21T17:15:17.250000
|
||||
@ -266034,8 +266057,8 @@ CVE-2024-4777,0,0,0559f9fc05b16fbfafe09a51db41feace21d30c4b62adaed6c18b481b5c868
|
||||
CVE-2024-47771,0,0,d9e667f8f1c80546a8045e1095310494da0b5c3573a4d135848ba5926d74346b,2024-10-16T16:38:43.170000
|
||||
CVE-2024-47772,0,0,268d48580bc08bc06a9592581bf7c15b183982df7936e45259c48576c264bf04,2024-10-19T00:58:21.947000
|
||||
CVE-2024-47773,0,0,2009644e404b2ecafb661ade272442df90db2955e19ee81df643af922d4ed623,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47774,0,1,d9a20a982fb496f6083a435ac0a6cb4f3ec570793b74190eb6677390ddcab513,2024-12-18T21:36:58.827000
|
||||
CVE-2024-47775,0,1,4cb38872c65de22cea970d08bc6186a4cfc1da367205d3fd171bc95863a0127e,2024-12-18T21:37:59.663000
|
||||
CVE-2024-47774,0,0,d9a20a982fb496f6083a435ac0a6cb4f3ec570793b74190eb6677390ddcab513,2024-12-18T21:36:58.827000
|
||||
CVE-2024-47775,0,0,4cb38872c65de22cea970d08bc6186a4cfc1da367205d3fd171bc95863a0127e,2024-12-18T21:37:59.663000
|
||||
CVE-2024-47776,0,0,4bfd490849c432ea6d8b47b8d34a3d0513182cb37ced94cdb8bdc27d44da9cd8,2024-12-18T19:28:07.190000
|
||||
CVE-2024-47777,0,0,74c700c365f3ca38348532fbb82d166627257e082bc598283831bf32f30ca229,2024-12-18T19:40:54.580000
|
||||
CVE-2024-47778,0,0,17041bebabee26d850eadf5a9c3c89ddec38d5af8fa65bfccd1445413536a59e,2024-12-18T19:34:23.850000
|
||||
@ -267034,13 +267057,13 @@ CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4
|
||||
CVE-2024-49537,0,0,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000
|
||||
CVE-2024-49538,0,0,3efeb7dc63ffb7e319a4e954aebfe791b3219c328f7308ff66639e511536c65d,2024-12-18T15:17:43.620000
|
||||
CVE-2024-49541,0,0,8cb92ef5ac02101c8bfec3741ecff82e1c57862d3057b0e6d10bda1324aa00b2,2024-12-18T15:17:34.523000
|
||||
CVE-2024-49543,0,1,5c9ddcdaa9255475a13f93c1f688671e9741f1fa4d42d8398f37c3f39cc17f51,2024-12-18T21:22:33.593000
|
||||
CVE-2024-49544,0,1,3877cc8588bc5ebbb9b01f454634c8627d877bd6eca3c53e6c78ee80b13c15e2,2024-12-18T21:22:11.823000
|
||||
CVE-2024-49545,0,1,5db55d2d8d6168bdd48a7e37feac51f475cdfd768017d41a6ce988bec915da08,2024-12-18T21:21:56.527000
|
||||
CVE-2024-49546,0,1,e7406aa69daae5b3f9b186afb0fe222e3e103f09324bd3cbfa8a611fc2496e6f,2024-12-18T21:21:39.133000
|
||||
CVE-2024-49547,0,1,08ef1caad58a50d92797b22ae0aebac3032f67625ecc17a9fb0b5f29a705d8d5,2024-12-18T21:20:40.313000
|
||||
CVE-2024-49548,0,1,5a12b5b1dc8bedba17dcecf2876fb4f58ecba3b29d026dee51d4a4c474d174b3,2024-12-18T21:20:23.697000
|
||||
CVE-2024-49549,0,1,5726a49fe09ed2d4d4b15249b135eb0746c47bbc2d80be31d5669cf23ae6601a,2024-12-18T21:19:54.533000
|
||||
CVE-2024-49543,0,0,5c9ddcdaa9255475a13f93c1f688671e9741f1fa4d42d8398f37c3f39cc17f51,2024-12-18T21:22:33.593000
|
||||
CVE-2024-49544,0,0,3877cc8588bc5ebbb9b01f454634c8627d877bd6eca3c53e6c78ee80b13c15e2,2024-12-18T21:22:11.823000
|
||||
CVE-2024-49545,0,0,5db55d2d8d6168bdd48a7e37feac51f475cdfd768017d41a6ce988bec915da08,2024-12-18T21:21:56.527000
|
||||
CVE-2024-49546,0,0,e7406aa69daae5b3f9b186afb0fe222e3e103f09324bd3cbfa8a611fc2496e6f,2024-12-18T21:21:39.133000
|
||||
CVE-2024-49547,0,0,08ef1caad58a50d92797b22ae0aebac3032f67625ecc17a9fb0b5f29a705d8d5,2024-12-18T21:20:40.313000
|
||||
CVE-2024-49548,0,0,5a12b5b1dc8bedba17dcecf2876fb4f58ecba3b29d026dee51d4a4c474d174b3,2024-12-18T21:20:23.697000
|
||||
CVE-2024-49549,0,0,5726a49fe09ed2d4d4b15249b135eb0746c47bbc2d80be31d5669cf23ae6601a,2024-12-18T21:19:54.533000
|
||||
CVE-2024-49550,0,0,27e56b904436c74833992eef941b9e27e78e6d34b2add18e9d4136f40cc8e03c,2024-12-10T21:15:17.903000
|
||||
CVE-2024-49551,0,0,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000
|
||||
CVE-2024-49552,0,0,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000
|
||||
@ -269509,10 +269532,10 @@ CVE-2024-53262,0,0,a30976483b4a3447c0f3cd137bc9d61475976254751462f53de127c8053e7
|
||||
CVE-2024-53264,0,0,a32d4daa26a746493ea0f873c770ba4e99221937a3918a07719b9b2327c46ce8,2024-11-27T19:15:33.400000
|
||||
CVE-2024-53267,0,0,accd32a67a608848754723b681c6e9dcbc299572dceeb0ccc536e90037eb33ec,2024-11-26T19:15:30.473000
|
||||
CVE-2024-53268,0,0,a408af8f5ee18e6e866628a8181262e5b345f36ec790e37835b95d7b67c7ce70,2024-11-25T20:15:10.583000
|
||||
CVE-2024-53269,0,1,726b25237cecdb10013aca1f7ac22243bebf6fb79b773926a4789babcab824a5,2024-12-18T22:15:06.763000
|
||||
CVE-2024-53269,0,0,726b25237cecdb10013aca1f7ac22243bebf6fb79b773926a4789babcab824a5,2024-12-18T22:15:06.763000
|
||||
CVE-2024-5327,0,0,c9fe7d7fa06a5d3d75a080dba8857bf423c18144dc7f53781589989842b7c438,2024-11-21T09:47:25.873000
|
||||
CVE-2024-53270,0,1,ab99630aa4e5713c62f25881e105086918537b9e2bad09f25843588aeb2dd649,2024-12-18T22:15:06.883000
|
||||
CVE-2024-53271,0,1,499acc75875f99bd6f3549b218af954aa74104ef78140adf13227181b20340a2,2024-12-18T22:15:07.010000
|
||||
CVE-2024-53270,0,0,ab99630aa4e5713c62f25881e105086918537b9e2bad09f25843588aeb2dd649,2024-12-18T22:15:06.883000
|
||||
CVE-2024-53271,0,0,499acc75875f99bd6f3549b218af954aa74104ef78140adf13227181b20340a2,2024-12-18T22:15:07.010000
|
||||
CVE-2024-53272,0,0,f3ae5c3af00a8a1ede971886e8407e0fd8e6e8ff1a7606066ce068e53ea18328,2024-12-12T02:15:28.670000
|
||||
CVE-2024-53273,0,0,4be201cb4a2a2818369414ac4a638086038f7b2129c8882fb2f8ed84d4b3ca40,2024-12-12T02:15:28.813000
|
||||
CVE-2024-53274,0,0,1b082934bf5e9b4005ba0f77ebbc282458901418112daa847bcdad246d3a28e8,2024-12-12T02:15:28.940000
|
||||
@ -269596,6 +269619,7 @@ CVE-2024-53564,0,0,bf61935418f5f92f32cd62964e032ec47360caecda9e24bdf2d4ee2ea5631
|
||||
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
|
||||
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
|
||||
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
|
||||
CVE-2024-53580,1,1,c3703276e05c4d594b51f46c7c6316b9cfecf5dde3914c666e4b556031b13d4f,2024-12-18T23:15:17.010000
|
||||
CVE-2024-53589,0,0,728322b8c5b51205676d46003289ad227ccda2e910c9140fa8921fafd791e832,2024-12-11T17:15:20.233000
|
||||
CVE-2024-5359,0,0,a1926c7cffc0ddd7cf732ce221c5b773e4f3ba3b6110f8717338c32417e29d1e,2024-11-21T09:47:29.680000
|
||||
CVE-2024-53597,0,0,438026e14ae09726543276b1bb70c22feed1a3a736c09b864ce876954f4f80b7,2024-11-27T21:15:08.170000
|
||||
@ -269822,7 +269846,7 @@ CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f
|
||||
CVE-2024-53951,0,0,bed406754e2e414b104efd3eb1c72bdfbbfd0447862bc041d6f24ed2188caeb2,2024-12-18T15:08:14.407000
|
||||
CVE-2024-53952,0,0,e709da7c68f85daad426a8b159797750fb6868aacc174441eebd3216c961f6c5,2024-12-18T15:07:51.167000
|
||||
CVE-2024-53953,0,0,25545c98eaf201fa933493a2580b3dc8c368ea4fdf737cf4102803979b779545,2024-12-18T19:58:21.397000
|
||||
CVE-2024-53954,0,1,4bd87d0c098b91f29bd342f8c78da18e602b5f15127a12d69db0634c891d1cbd,2024-12-18T21:16:26.943000
|
||||
CVE-2024-53954,0,0,4bd87d0c098b91f29bd342f8c78da18e602b5f15127a12d69db0634c891d1cbd,2024-12-18T21:16:26.943000
|
||||
CVE-2024-53955,0,0,8aa46e10bc17559dbedd3ecdffab1753d45263b50071af9071472921d4bbee43,2024-12-13T18:29:02.127000
|
||||
CVE-2024-53956,0,0,09bc8469f16fb911c5ffda4e607436b9105e5de1566da87561ea95eda7fb2ed5,2024-12-13T18:28:36.207000
|
||||
CVE-2024-53957,0,0,a6d6ebb3ae5e849219af3ed7c9ef344f0fde8547787241a0f7c5f17b54e97dcf,2024-12-13T18:24:48.200000
|
||||
@ -270373,8 +270397,9 @@ CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1a
|
||||
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
|
||||
CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000
|
||||
CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000
|
||||
CVE-2024-55231,1,1,fc13b65817c8ac6a05de306c348d0f747f1848717936b21c85f240ddf2a7c32b,2024-12-18T22:15:07.127000
|
||||
CVE-2024-55232,1,1,a1b7652c4d868ce09f148b918944b3aa70cf5f6cfd7e2bf688258822e8d0886f,2024-12-18T22:15:07.297000
|
||||
CVE-2024-55231,0,0,fc13b65817c8ac6a05de306c348d0f747f1848717936b21c85f240ddf2a7c32b,2024-12-18T22:15:07.127000
|
||||
CVE-2024-55232,0,0,a1b7652c4d868ce09f148b918944b3aa70cf5f6cfd7e2bf688258822e8d0886f,2024-12-18T22:15:07.297000
|
||||
CVE-2024-55239,1,1,95fde9b654a58a5a4f63426beaf6b7d5bd5bf4fd927cde67b4e0e54174641b1f,2024-12-18T23:15:17.180000
|
||||
CVE-2024-5524,0,0,96c1a4bf81cf964718431dd9c92394b3c99d70800d36b6797c2485b5f853cce6,2024-11-21T09:47:52.060000
|
||||
CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674bab,2024-11-21T09:47:52.173000
|
||||
CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000
|
||||
@ -270397,6 +270422,7 @@ CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4
|
||||
CVE-2024-55451,0,0,1823afcfa4259711211e484b3a6e957134d35bc2739f7f67be50c6afb632ad1b,2024-12-17T17:15:09.687000
|
||||
CVE-2024-55452,0,0,3c98dae32438005b53119779d39072e95df5163307db0234424be9e14cf40453,2024-12-17T15:15:16.287000
|
||||
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
||||
CVE-2024-55461,1,1,9aba9528846a5e20a9950a25279e0e578fc2f2326e2132736dcd635d432a883c,2024-12-18T23:15:17.350000
|
||||
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
|
||||
CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000
|
||||
CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000
|
||||
@ -270404,7 +270430,8 @@ CVE-2024-55492,0,0,7169bd1cba99c8fcd824f287f20a194fa262842d9049846185e890a8a7fad
|
||||
CVE-2024-55496,0,0,4a3321851c89fc343921299c0a2d1c4d4d998fd1f65ffe9f84e4d2aab27cd704,2024-12-17T18:15:25.683000
|
||||
CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000
|
||||
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
|
||||
CVE-2024-55505,1,1,8271b89572403d1dfbfb143dcb69f9b9b60f911ca87d421e2e549f9a2e1ae17a,2024-12-18T22:15:07.477000
|
||||
CVE-2024-55505,0,0,8271b89572403d1dfbfb143dcb69f9b9b60f911ca87d421e2e549f9a2e1ae17a,2024-12-18T22:15:07.477000
|
||||
CVE-2024-55506,1,1,c8c2c622c6ffa6a174bc7b56cb9879bd5b1bab2018832221e0611539c21950fe,2024-12-18T23:15:17.523000
|
||||
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
|
||||
CVE-2024-55513,0,0,2c70feb0b3a4b5910e279bea5f5b31284be91bf824e57138502d2e4a1a6f68ec,2024-12-18T16:15:14.720000
|
||||
CVE-2024-55514,0,0,aa89c1ff2eec24c5fad92134c8d185f78ce2cace8089f0502184ccc069428486,2024-12-18T16:15:14.900000
|
||||
@ -270440,6 +270467,7 @@ CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f01
|
||||
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
|
||||
CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000
|
||||
CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000
|
||||
CVE-2024-55603,1,1,1f4b42ae5da711e3fab21bbee693e839a7187a21b5759cecf8dc1873f22640a9,2024-12-19T00:15:06.713000
|
||||
CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000
|
||||
CVE-2024-55633,0,0,c4adbf002e3ac0157724f2b4e7760aa632e73f70f1dac02e75e7bdb334ba90e7,2024-12-12T18:15:27.733000
|
||||
CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000
|
||||
@ -270581,14 +270609,16 @@ CVE-2024-56087,0,0,71bdda0ff7417396ad31c25e1bfa27f6b23e1f9a164b7da02056ec46ee4b5
|
||||
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
|
||||
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
|
||||
CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000
|
||||
CVE-2024-56115,1,1,f05eda8263d4d568f41c89a3bd42a209f97ca709ed9920abf409adc86c73cb35,2024-12-18T23:15:17.687000
|
||||
CVE-2024-56116,1,1,e133a09045b787ca79ff39c02ab485d7fb0b9d77c65dad192cc1202addb9ea31,2024-12-18T23:15:17.857000
|
||||
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
|
||||
CVE-2024-56128,0,0,9448cc8db9a8bd4e0b704b441f647abef22739c3613b41a4a55b8229474b0404,2024-12-18T17:15:15.003000
|
||||
CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000
|
||||
CVE-2024-56139,0,0,51f3702c94f0ffd91c7bd6b4a37a8fbb30240d1963c2f10d645e10159f128016,2024-12-17T19:15:07.010000
|
||||
CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000
|
||||
CVE-2024-56140,1,1,d0631548de4989ff87cb4466975c10a8b9a9a481cabea121e9d2e8c66b03ddd8,2024-12-18T21:15:08.353000
|
||||
CVE-2024-56140,0,0,d0631548de4989ff87cb4466975c10a8b9a9a481cabea121e9d2e8c66b03ddd8,2024-12-18T21:15:08.353000
|
||||
CVE-2024-56142,0,0,46ee75dbf053d17753747d6ac8d88a6799cb24a1d693104ad554a951c48b711e,2024-12-18T16:15:15.433000
|
||||
CVE-2024-56145,1,1,39361c9ccf1de2097d52f9d4bd3693e26d97b41f06be9fa6d88d91286795f475,2024-12-18T21:15:08.530000
|
||||
CVE-2024-56145,0,0,39361c9ccf1de2097d52f9d4bd3693e26d97b41f06be9fa6d88d91286795f475,2024-12-18T21:15:08.530000
|
||||
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
|
||||
CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000
|
||||
CVE-2024-56169,0,0,2f44b9b9fae0fb43dd077aa410d4ee16cde281ba4890fbc569e3bb73e5dfcd66,2024-12-18T05:15:08.853000
|
||||
@ -270609,6 +270639,9 @@ CVE-2024-5628,0,0,755412ba03c7f502c54c635c9705b96a4154da09bb9bfca64f93d1d41d08cf
|
||||
CVE-2024-5629,0,0,f9daa1fe2950a7ccef0838fb6e6cae4a7319a3ab1da6174da12e5faf2c955f5a,2024-11-21T09:48:02.860000
|
||||
CVE-2024-5630,0,0,50874e31f2d6c9403bb3dbaf933b8b3f439196ea7c18b531eba9bc061324fe0f,2024-11-21T09:48:03.020000
|
||||
CVE-2024-5631,0,0,2a74e658158bae900a85436e92fd017c375ea2371e9ccb7b5a67e7bbd481f6b3,2024-11-21T09:48:03.210000
|
||||
CVE-2024-56317,1,1,1b60ef16141d73cd0f0747efc64f0d9e7a2dad003ed04e53f5c44f0c08826ae7,2024-12-18T23:15:18.023000
|
||||
CVE-2024-56318,1,1,7e9ceef4c12fe86faea49612fe05c60a10ea7fd55b4be44462fee213f6c94dbd,2024-12-19T00:15:06.897000
|
||||
CVE-2024-56319,1,1,8f1658ca3dd3d7bbac7edabd430e51e38c4537a2a924c742ed71899044ba913f,2024-12-18T23:15:18.373000
|
||||
CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000
|
||||
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
|
||||
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user