mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-11-26T23:00:57.702464+00:00
This commit is contained in:
parent
a7b01566d8
commit
f34b07204b
@ -2,15 +2,39 @@
|
||||
"id": "CVE-2023-1521",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-26T12:15:18.203",
|
||||
"lastModified": "2024-11-26T12:15:18.203",
|
||||
"lastModified": "2024-11-26T21:15:04.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.\n\n\nIf the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mozilla.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29145",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-30T20:15:09.427",
|
||||
"lastModified": "2023-07-11T16:09:09.340",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-26T21:15:05.140",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -85,6 +95,20 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://malwarebytes.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.malwarebytes.com/secure/cves/cve-2023-29145",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34834",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-29T03:15:09.563",
|
||||
"lastModified": "2023-07-11T18:59:16.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-26T22:15:16.200",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -56,9 +66,9 @@
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mcl-collection:mcl-net:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E7CA504-1A26-4F94-AF47-68ED6BBE42FA"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mcl-collection:mcl-net_firmware:4.3.5.8788:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E3A120C-9DC1-46AC-BE65-E9082B64DE54"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -67,9 +77,9 @@
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:mcl-collection:mcl-net_firmware:4.3.5.8788:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E3A120C-9DC1-46AC-BE65-E9082B64DE54"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mcl-collection:mcl-net:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E7CA504-1A26-4F94-AF47-68ED6BBE42FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -92,6 +102,22 @@
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.mclv4.mcl-collection.com/index.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/51542",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34844",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-29T15:15:09.657",
|
||||
"lastModified": "2023-07-07T16:02:37.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-26T22:15:16.783",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +28,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-273"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -73,6 +83,14 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hacku.top/wl/?id=MACBtnorZyp6hC3E5bw2CqBAusuWoKe3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,29 @@
|
||||
"id": "CVE-2024-10899",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-20T07:15:08.260",
|
||||
"lastModified": "2024-11-20T07:15:08.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-26T21:01:21.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The The WooCommerce Product Table Lite plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.8.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. The same 'id' parameter is vulnerable to Reflected Cross-Site Scripting as well."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WooCommerce Product Table Lite para WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios en todas las versiones hasta la 3.8.6 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios. El mismo par\u00e1metro 'id' tambi\u00e9n es vulnerable a Cross-Site Scripting reflejado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -26,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,18 +51,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wcproducttable:woocommerce_product_table:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "3.8.7",
|
||||
"matchCriteriaId": "7154E801-C6D8-46FE-B897-096398119056"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wc-product-table-lite/tags/3.8.6/main.php#L1778",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3190789%40wc-product-table-lite&new=3190789%40wc-product-table-lite&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9b010ff-8a4a-4553-bb2b-d58a254d7ee4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11159",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-11-13T14:15:15.330",
|
||||
"lastModified": "2024-11-19T14:56:37.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-26T22:15:17.720",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -30,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -97,6 +107,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-116xx/CVE-2024-11622.json
Normal file
56
CVE-2024/CVE-2024-116xx/CVE-2024-11622.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-11622",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-26T22:15:17.860",
|
||||
"lastModified": "2024-11-26T22:15:17.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04731en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-117xx/CVE-2024-11744.json
Normal file
145
CVE-2024/CVE-2024-117xx/CVE-2024-11744.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-11744",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-26T21:15:06.483",
|
||||
"lastModified": "2024-11-26T21:15:06.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zdwf-klm/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286141",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286141",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.449734",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2024/CVE-2024-117xx/CVE-2024-11745.json
Normal file
145
CVE-2024/CVE-2024-117xx/CVE-2024-11745.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2024-11745",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-26T21:15:06.733",
|
||||
"lastModified": "2024-11-26T21:15:06.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC8 16.03.34.09 and classified as critical. Affected by this issue is the function route_static_check of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://tasty-foxtrot-3a8.notion.site/Tenda-AC8v4-route_static_check-stack-overflow-1460448e6195803087a5d39755d2bb6b?pvs=74",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.286142",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.286142",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.449893",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-39281",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2024-11-12T15:15:09.203",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"lastModified": "2024-11-26T21:15:06.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El comando ctl_persistent_reserve_out permite al llamador especificar un tama\u00f1o arbitrario que se pasar\u00e1 al asignador de memoria del n\u00facleo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secteam@freebsd.org",
|
||||
|
60
CVE-2024/CVE-2024-437xx/CVE-2024-43784.json
Normal file
60
CVE-2024/CVE-2024-437xx/CVE-2024-43784.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-43784",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-26T21:15:07.160",
|
||||
"lastModified": "2024-11-26T21:15:07.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lakeFS is an open-source tool that transforms object storage into a Git-like repository. Existing lakeFS users who have issued credentials to users who have been deleted are affected by this vulnerability. When creating a new user with the same username as a deleted user, that user will inherit all of the previous user's credentials. This issue has been addressed in release version 1.33.0 and all users are advised to upgrade. The only known workaround for those who cannot upgrade is to not reuse usernames."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/treeverse/lakeFS/releases/tag/v1.33.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/treeverse/lakeFS/security/advisories/GHSA-hh33-46q4-hwm2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-48991",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-11-19T18:15:21.710",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"lastModified": "2024-11-26T21:15:07.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter)."
|
||||
"value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, permite a atacantes locales ejecutar c\u00f3digo arbitrario como superusuario ganando una condici\u00f3n de ejecuci\u00f3n y enga\u00f1ando a needrestart para que ejecute su propio int\u00e9rprete de Python falso (en lugar del int\u00e9rprete de Python real del sistema)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -19,6 +23,8 @@
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -26,9 +32,7 @@
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
@ -36,6 +40,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/liske/needrestart/commit/42af5d328901287a4f79d1f5861ac827a53fd56d",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/liske/needrestart/commit/6ce6136cccc307c6b8a0f8cae12f9a22ac2aad59",
|
||||
"source": "security@ubuntu.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50269",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T02:16:28.930",
|
||||
"lastModified": "2024-11-19T21:57:32.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-26T22:30:27.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,210 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: musb: sunxi: Se solucion\u00f3 el acceso a un usb phy liberado. Commit 6ed05c68cbca (\"usb: musb: sunxi: Liberar expl\u00edcitamente USB PHY al salir\") provocar\u00e1 que se acceda al usb phy @glue->xceiv despu\u00e9s de su liberaci\u00f3n. 1) registrar el controlador de la plataforma @sunxi_musb_driver // obtener el usb phy @glue->xceiv sunxi_musb_probe() -> devm_usb_get_phy(). 2) registrar y anular el registro del controlador de la plataforma @musb_driver musb_probe() -> sunxi_musb_init() usa el phy aqu\u00ed //el phy se publica aqu\u00ed musb_remove() -> sunxi_musb_exit() -> devm_usb_put_phy() 3) registrar @musb_driver nuevamente musb_probe() -> sunxi_musb_init() usa el phy aqu\u00ed pero el phy se ha publicado en 2). ... Se solucion\u00f3 revirtiendo el commit, es decir, eliminando devm_usb_put_phy() de sunxi_musb_exit()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.95",
|
||||
"versionEndExcluding": "4.5",
|
||||
"matchCriteriaId": "1E714DC6-1868-4774-91B0-D0274B6E3C0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.9.59",
|
||||
"versionEndExcluding": "4.10",
|
||||
"matchCriteriaId": "D8D41D45-DE35-43A0-91F0-5FFDCB2A508A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.13.10",
|
||||
"versionEndExcluding": "4.14",
|
||||
"matchCriteriaId": "F8E04794-8DBA-45C9-8040-A37E6BF20680"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.14",
|
||||
"versionEndExcluding": "4.19.324",
|
||||
"matchCriteriaId": "8DF05B23-9480-4E31-BE15-A93F374269CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.286",
|
||||
"matchCriteriaId": "9952C897-8A61-4D4B-9D6D-7D063E9EA15E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.230",
|
||||
"matchCriteriaId": "BF5B32D0-72C9-41C3-A0BB-D4946153C134"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.172",
|
||||
"matchCriteriaId": "88812664-4296-42AC-AE0F-ED71086C1BB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.117",
|
||||
"matchCriteriaId": "0DD7F755-2F6B-4707-8973-78496AD5AA8E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.61",
|
||||
"matchCriteriaId": "630ED7EB-C97E-4435-B884-1E309E40D6F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.8",
|
||||
"matchCriteriaId": "0BD000F7-3DAD-4DD3-8906-98EA1EC67E95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/498dbd9aea205db9da674994b74c7bf8e18448bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4aa77d5ea9944468e16c3eed15e858fd5de44de1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/63559ba8077cbadae1c92a65b73ea522bf377dd9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6e2848d1c8c0139161e69ac0a94133e90e9988e8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/721ddad945596220c123eb6f7126729fe277ee4f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8a30da5aa9609663b3e05bcc91a916537f66a4cd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b08baa75b989cf779cbfa0969681f8ba2dc46569",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ccd811c304d2ee56189bfbc49302cb3c44361893",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50270",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T02:16:29.033",
|
||||
"lastModified": "2024-11-19T21:57:32.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-26T22:38:18.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,105 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/core: evitar desbordamientos en damon_feed_loop_next_input() damon_feed_loop_next_input() es ineficiente y fr\u00e1gil a desbordamientos. Espec\u00edficamente, el c\u00e1lculo de 'score_goal_diff_bp' puede desbordarse cuando 'score' es alto. El c\u00e1lculo es realmente innecesario en absoluto porque 'goal' es una constante de valor 10,000. El c\u00e1lculo de 'compensaci\u00f3n' es nuevamente fr\u00e1gil a desbordamientos. El c\u00e1lculo final del valor de retorno para el caso de bajo rendimiento es nuevamente fr\u00e1gil a desbordamientos cuando el puntaje actual no alcanza el objetivo. Agregue dos casos extremos de manejo al comienzo de la funci\u00f3n para hacer que el cuerpo sea m\u00e1s f\u00e1cil de leer y reescriba el cuerpo de la funci\u00f3n para evitar desbordamientos y el c\u00e1lculo innecesario del valor bp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.11.8",
|
||||
"matchCriteriaId": "24AB354E-701F-4D6C-8B18-A0BBA5C21C30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2d339a1f0f16ff5dea58e612ff336f0be0d041e9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4401e9d10ab0281a520b9f8c220f30f60b5c248f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-509xx/CVE-2024-50942.json
Normal file
29
CVE-2024/CVE-2024-509xx/CVE-2024-50942.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-50942",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-26T21:15:07.470",
|
||||
"lastModified": "2024-11-26T21:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "qiwen-file v1.4.0 was discovered to contain a SQL injection vulnerability via the component /mapper/NoticeMapper.xml."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://qiwen-file.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/3xsh0re/4253401806bc35b2f95dcea12a4310fc",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.qiwenshare.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51562",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2024-11-12T15:15:10.820",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"lastModified": "2024-11-26T21:15:07.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "La funci\u00f3n del controlador NVMe nvme_opc_get_log_page es vulnerable a una sobrelectura del b\u00fafer desde un valor controlado por el invitado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secteam@freebsd.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51563",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2024-11-12T15:15:10.903",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"lastModified": "2024-11-26T21:15:07.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "La funci\u00f3n virtio_vq_recordon est\u00e1 sujeta a una condici\u00f3n de ejecuci\u00f3n de tiempo de verificaci\u00f3n a tiempo de uso (TOCTOU)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secteam@freebsd.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51565",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2024-11-12T15:15:11.083",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"lastModified": "2024-11-26T21:15:08.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El controlador hda es vulnerable a una sobrelectura de b\u00fafer desde un valor controlado por el invitado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secteam@freebsd.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-51566",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2024-11-12T15:15:11.170",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"lastModified": "2024-11-26T21:15:08.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El procesamiento de la cola del controlador NVMe es vulnerable a bucles infinitos inducidos por el invitado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secteam@freebsd.org",
|
||||
|
@ -2,24 +2,118 @@
|
||||
"id": "CVE-2024-53071",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T18:15:26.793",
|
||||
"lastModified": "2024-11-19T21:56:45.533",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-26T22:18:28.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Be stricter about IO mapping flags\n\nThe current panthor_device_mmap_io() implementation has two issues:\n\n1. For mapping DRM_PANTHOR_USER_FLUSH_ID_MMIO_OFFSET,\n panthor_device_mmap_io() bails if VM_WRITE is set, but does not clear\n VM_MAYWRITE. That means userspace can use mprotect() to make the mapping\n writable later on. This is a classic Linux driver gotcha.\n I don't think this actually has any impact in practice:\n When the GPU is powered, writes to the FLUSH_ID seem to be ignored; and\n when the GPU is not powered, the dummy_latest_flush page provided by the\n driver is deliberately designed to not do any flushes, so the only thing\n writing to the dummy_latest_flush could achieve would be to make *more*\n flushes happen.\n\n2. panthor_device_mmap_io() does not block MAP_PRIVATE mappings (which are\n mappings without the VM_SHARED flag).\n MAP_PRIVATE in combination with VM_MAYWRITE indicates that the VMA has\n copy-on-write semantics, which for VM_PFNMAP are semi-supported but\n fairly cursed.\n In particular, in such a mapping, the driver can only install PTEs\n during mmap() by calling remap_pfn_range() (because remap_pfn_range()\n wants to **store the physical address of the mapped physical memory into\n the vm_pgoff of the VMA**); installing PTEs later on with a fault\n handler (as panthor does) is not supported in private mappings, and so\n if you try to fault in such a mapping, vmf_insert_pfn_prot() splats when\n it hits a BUG() check.\n\nFix it by clearing the VM_MAYWRITE flag (userspace writing to the FLUSH_ID\ndoesn't make sense) and requiring VM_SHARED (copy-on-write semantics for\nthe FLUSH_ID don't make sense).\n\nReproducers for both scenarios are in the notes of my patch on the mailing\nlist; I tested that these bugs exist on a Rock 5B machine.\n\nNote that I only compile-tested the patch, I haven't tested it; I don't\nhave a working kernel build setup for the test machine yet. Please test it\nbefore applying it."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/panthor: Sea m\u00e1s estricto con las banderas de mapeo de IO La implementaci\u00f3n actual de panthor_device_mmap_io() tiene dos problemas: 1. Para mapear DRM_PANTHOR_USER_FLUSH_ID_MMIO_OFFSET, panthor_device_mmap_io() abandona si VM_WRITE est\u00e1 configurado, pero no borra VM_MAYWRITE. Eso significa que el espacio de usuario puede usar mprotect() para hacer que el mapeo sea escribible m\u00e1s tarde. Este es un problema cl\u00e1sico del controlador de Linux. No creo que esto realmente tenga alg\u00fan impacto en la pr\u00e1ctica: cuando la GPU est\u00e1 encendida, las escrituras en FLUSH_ID parecen ignorarse; y cuando la GPU no est\u00e1 encendida, la p\u00e1gina dummy_latest_flush proporcionada por el controlador est\u00e1 dise\u00f1ada deliberadamente para no hacer ning\u00fan vaciado, por lo que lo \u00fanico que escribir en dummy_latest_flush podr\u00eda lograr ser\u00eda hacer que ocurrieran *m\u00e1s* vaciados. 2. panthor_device_mmap_io() no bloquea las asignaciones MAP_PRIVATE (que son asignaciones sin el indicador VM_SHARED). MAP_PRIVATE en combinaci\u00f3n con VM_MAYWRITE indica que la VMA tiene sem\u00e1ntica de copia en escritura, que para VM_PFNMAP son semicompatibles pero con bastante mala calidad. En particular, en una asignaci\u00f3n de este tipo, el controlador solo puede instalar PTE durante mmap() llamando a remap_pfn_range() (porque remap_pfn_range() quiere **almacenar la direcci\u00f3n f\u00edsica de la memoria f\u00edsica asignada en el vm_pgoff de la VMA**); la instalaci\u00f3n de PTE m\u00e1s tarde con un controlador de errores (como lo hace panthor) no se admite en asignaciones privadas y, por lo tanto, si intenta generar un error en una asignaci\u00f3n de este tipo, vmf_insert_pfn_prot() se bloquea cuando llega a una comprobaci\u00f3n de ERROR(). Arr\u00e9glelo borrando la marca VM_MAYWRITE (la escritura en el espacio de usuario en FLUSH_ID no tiene sentido) y requiriendo VM_SHARED (la sem\u00e1ntica de copia en escritura para FLUSH_ID no tiene sentido). Los reproductores para ambos escenarios est\u00e1n en las notas de mi parche en la lista de correo; prob\u00e9 que estos errores existen en una m\u00e1quina Rock 5B. Tenga en cuenta que solo prob\u00e9 la compilaci\u00f3n del parche, no lo he probado; a\u00fan no tengo una configuraci\u00f3n de compilaci\u00f3n de kernel que funcione para la m\u00e1quina de prueba. Pru\u00e9belo antes de aplicarlo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.11.8",
|
||||
"matchCriteriaId": "ECA7D13C-A6AD-4239-BDEF-6B70FF23A4A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2604afd65043e8f9d4be036cb1242adf6b5723cf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f432a1621f049bb207e78363d9d0e3c6fa2da5db",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53555",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-26T17:15:26.300",
|
||||
"lastModified": "2024-11-26T17:15:26.300",
|
||||
"lastModified": "2024-11-26T21:15:08.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A CSV injection vulnerability in Taiga v6.8.1 allows attackers to execute arbitrary code via uploading a crafted CSV file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1236"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1M4UjoTUqlPWLYjevCuE3WhdUqQkRj0-r/view?usp=drive_link",
|
||||
|
56
CVE-2024/CVE-2024-536xx/CVE-2024-53673.json
Normal file
56
CVE-2024/CVE-2024-536xx/CVE-2024-53673.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53673",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-26T22:15:18.547",
|
||||
"lastModified": "2024-11-26T22:15:18.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A java deserialization vulnerability in HPE Remote Insight Support allows an unauthenticated attacker to execute code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04731en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-536xx/CVE-2024-53674.json
Normal file
56
CVE-2024/CVE-2024-536xx/CVE-2024-53674.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53674",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-26T22:15:18.713",
|
||||
"lastModified": "2024-11-26T22:15:18.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04731en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-536xx/CVE-2024-53675.json
Normal file
56
CVE-2024/CVE-2024-536xx/CVE-2024-53675.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-53675",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-26T22:15:18.990",
|
||||
"lastModified": "2024-11-26T22:15:18.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04731en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
83
README.md
83
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-26T21:01:59.977631+00:00
|
||||
2024-11-26T23:00:57.702464+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-26T20:59:50.643000+00:00
|
||||
2024-11-26T22:38:18.377000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,68 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
271457
|
||||
271465
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2019-17082](CVE-2019/CVE-2019-170xx/CVE-2019-17082.json) (`2024-11-26T20:15:19.957`)
|
||||
- [CVE-2024-10240](CVE-2024/CVE-2024-102xx/CVE-2024-10240.json) (`2024-11-26T20:15:24.487`)
|
||||
- [CVE-2024-10898](CVE-2024/CVE-2024-108xx/CVE-2024-10898.json) (`2024-11-21T11:15:23.610`)
|
||||
- [CVE-2024-11145](CVE-2024/CVE-2024-111xx/CVE-2024-11145.json) (`2024-11-26T20:15:25.270`)
|
||||
- [CVE-2024-11668](CVE-2024/CVE-2024-116xx/CVE-2024-11668.json) (`2024-11-26T19:15:22.027`)
|
||||
- [CVE-2024-11669](CVE-2024/CVE-2024-116xx/CVE-2024-11669.json) (`2024-11-26T19:15:22.367`)
|
||||
- [CVE-2024-11742](CVE-2024/CVE-2024-117xx/CVE-2024-11742.json) (`2024-11-26T20:15:25.703`)
|
||||
- [CVE-2024-11743](CVE-2024/CVE-2024-117xx/CVE-2024-11743.json) (`2024-11-26T20:15:25.930`)
|
||||
- [CVE-2024-11828](CVE-2024/CVE-2024-118xx/CVE-2024-11828.json) (`2024-11-26T19:15:22.910`)
|
||||
- [CVE-2024-32965](CVE-2024/CVE-2024-329xx/CVE-2024-32965.json) (`2024-11-26T19:15:23.343`)
|
||||
- [CVE-2024-48747](CVE-2024/CVE-2024-487xx/CVE-2024-48747.json) (`2024-11-21T15:15:32.423`)
|
||||
- [CVE-2024-49035](CVE-2024/CVE-2024-490xx/CVE-2024-49035.json) (`2024-11-26T20:15:31.763`)
|
||||
- [CVE-2024-49038](CVE-2024/CVE-2024-490xx/CVE-2024-49038.json) (`2024-11-26T20:15:31.943`)
|
||||
- [CVE-2024-49052](CVE-2024/CVE-2024-490xx/CVE-2024-49052.json) (`2024-11-26T20:15:32.723`)
|
||||
- [CVE-2024-49053](CVE-2024/CVE-2024-490xx/CVE-2024-49053.json) (`2024-11-26T20:15:32.890`)
|
||||
- [CVE-2024-52008](CVE-2024/CVE-2024-520xx/CVE-2024-52008.json) (`2024-11-26T19:15:29.583`)
|
||||
- [CVE-2024-53267](CVE-2024/CVE-2024-532xx/CVE-2024-53267.json) (`2024-11-26T19:15:30.473`)
|
||||
- [CVE-2024-53619](CVE-2024/CVE-2024-536xx/CVE-2024-53619.json) (`2024-11-26T19:15:30.727`)
|
||||
- [CVE-2024-53620](CVE-2024/CVE-2024-536xx/CVE-2024-53620.json) (`2024-11-26T19:15:31.127`)
|
||||
- [CVE-2024-53844](CVE-2024/CVE-2024-538xx/CVE-2024-53844.json) (`2024-11-26T19:15:31.463`)
|
||||
- [CVE-2024-8114](CVE-2024/CVE-2024-81xx/CVE-2024-8114.json) (`2024-11-26T19:15:31.660`)
|
||||
- [CVE-2024-8177](CVE-2024/CVE-2024-81xx/CVE-2024-8177.json) (`2024-11-26T19:15:31.860`)
|
||||
- [CVE-2024-8237](CVE-2024/CVE-2024-82xx/CVE-2024-8237.json) (`2024-11-26T19:15:32.033`)
|
||||
- [CVE-2024-8676](CVE-2024/CVE-2024-86xx/CVE-2024-8676.json) (`2024-11-26T20:15:34.260`)
|
||||
- [CVE-2024-11622](CVE-2024/CVE-2024-116xx/CVE-2024-11622.json) (`2024-11-26T22:15:17.860`)
|
||||
- [CVE-2024-11744](CVE-2024/CVE-2024-117xx/CVE-2024-11744.json) (`2024-11-26T21:15:06.483`)
|
||||
- [CVE-2024-11745](CVE-2024/CVE-2024-117xx/CVE-2024-11745.json) (`2024-11-26T21:15:06.733`)
|
||||
- [CVE-2024-43784](CVE-2024/CVE-2024-437xx/CVE-2024-43784.json) (`2024-11-26T21:15:07.160`)
|
||||
- [CVE-2024-50942](CVE-2024/CVE-2024-509xx/CVE-2024-50942.json) (`2024-11-26T21:15:07.470`)
|
||||
- [CVE-2024-53673](CVE-2024/CVE-2024-536xx/CVE-2024-53673.json) (`2024-11-26T22:15:18.547`)
|
||||
- [CVE-2024-53674](CVE-2024/CVE-2024-536xx/CVE-2024-53674.json) (`2024-11-26T22:15:18.713`)
|
||||
- [CVE-2024-53675](CVE-2024/CVE-2024-536xx/CVE-2024-53675.json) (`2024-11-26T22:15:18.990`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `55`
|
||||
Recently modified CVEs: `16`
|
||||
|
||||
- [CVE-2024-52677](CVE-2024/CVE-2024-526xx/CVE-2024-52677.json) (`2024-11-26T19:15:30.253`)
|
||||
- [CVE-2024-53365](CVE-2024/CVE-2024-533xx/CVE-2024-53365.json) (`2024-11-26T20:15:33.650`)
|
||||
- [CVE-2024-53901](CVE-2024/CVE-2024-539xx/CVE-2024-53901.json) (`2024-11-26T19:52:01.653`)
|
||||
- [CVE-2024-7253](CVE-2024/CVE-2024-72xx/CVE-2024-7253.json) (`2024-11-26T20:00:48.783`)
|
||||
- [CVE-2024-7352](CVE-2024/CVE-2024-73xx/CVE-2024-7352.json) (`2024-11-26T20:58:09.063`)
|
||||
- [CVE-2024-8190](CVE-2024/CVE-2024-81xx/CVE-2024-8190.json) (`2024-11-26T19:55:46.433`)
|
||||
- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-11-26T19:15:32.253`)
|
||||
- [CVE-2024-9114](CVE-2024/CVE-2024-91xx/CVE-2024-9114.json) (`2024-11-26T20:58:01.907`)
|
||||
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-26T19:15:32.637`)
|
||||
- [CVE-2024-9407](CVE-2024/CVE-2024-94xx/CVE-2024-9407.json) (`2024-11-26T19:15:32.847`)
|
||||
- [CVE-2024-9474](CVE-2024/CVE-2024-94xx/CVE-2024-9474.json) (`2024-11-26T19:55:09.117`)
|
||||
- [CVE-2024-9653](CVE-2024/CVE-2024-96xx/CVE-2024-9653.json) (`2024-11-26T20:37:07.913`)
|
||||
- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-11-26T19:53:56.537`)
|
||||
- [CVE-2024-9751](CVE-2024/CVE-2024-97xx/CVE-2024-9751.json) (`2024-11-26T20:57:50.440`)
|
||||
- [CVE-2024-9752](CVE-2024/CVE-2024-97xx/CVE-2024-9752.json) (`2024-11-26T20:57:56.567`)
|
||||
- [CVE-2024-9753](CVE-2024/CVE-2024-97xx/CVE-2024-9753.json) (`2024-11-26T20:58:47.057`)
|
||||
- [CVE-2024-9754](CVE-2024/CVE-2024-97xx/CVE-2024-9754.json) (`2024-11-26T20:55:13.947`)
|
||||
- [CVE-2024-9755](CVE-2024/CVE-2024-97xx/CVE-2024-9755.json) (`2024-11-26T20:53:47.730`)
|
||||
- [CVE-2024-9757](CVE-2024/CVE-2024-97xx/CVE-2024-9757.json) (`2024-11-26T20:53:19.560`)
|
||||
- [CVE-2024-9758](CVE-2024/CVE-2024-97xx/CVE-2024-9758.json) (`2024-11-26T20:41:51.187`)
|
||||
- [CVE-2024-9759](CVE-2024/CVE-2024-97xx/CVE-2024-9759.json) (`2024-11-26T20:57:23.673`)
|
||||
- [CVE-2024-9764](CVE-2024/CVE-2024-97xx/CVE-2024-9764.json) (`2024-11-26T20:58:05.673`)
|
||||
- [CVE-2024-9767](CVE-2024/CVE-2024-97xx/CVE-2024-9767.json) (`2024-11-26T20:57:03.197`)
|
||||
- [CVE-2024-9941](CVE-2024/CVE-2024-99xx/CVE-2024-9941.json) (`2024-11-26T19:37:15.283`)
|
||||
- [CVE-2024-9942](CVE-2024/CVE-2024-99xx/CVE-2024-9942.json) (`2024-11-26T19:33:35.843`)
|
||||
- [CVE-2023-1521](CVE-2023/CVE-2023-15xx/CVE-2023-1521.json) (`2024-11-26T21:15:04.650`)
|
||||
- [CVE-2023-29145](CVE-2023/CVE-2023-291xx/CVE-2023-29145.json) (`2024-11-26T21:15:05.140`)
|
||||
- [CVE-2023-34834](CVE-2023/CVE-2023-348xx/CVE-2023-34834.json) (`2024-11-26T22:15:16.200`)
|
||||
- [CVE-2023-34844](CVE-2023/CVE-2023-348xx/CVE-2023-34844.json) (`2024-11-26T22:15:16.783`)
|
||||
- [CVE-2024-10899](CVE-2024/CVE-2024-108xx/CVE-2024-10899.json) (`2024-11-26T21:01:21.643`)
|
||||
- [CVE-2024-11159](CVE-2024/CVE-2024-111xx/CVE-2024-11159.json) (`2024-11-26T22:15:17.720`)
|
||||
- [CVE-2024-39281](CVE-2024/CVE-2024-392xx/CVE-2024-39281.json) (`2024-11-26T21:15:06.960`)
|
||||
- [CVE-2024-48991](CVE-2024/CVE-2024-489xx/CVE-2024-48991.json) (`2024-11-26T21:15:07.330`)
|
||||
- [CVE-2024-50269](CVE-2024/CVE-2024-502xx/CVE-2024-50269.json) (`2024-11-26T22:30:27.420`)
|
||||
- [CVE-2024-50270](CVE-2024/CVE-2024-502xx/CVE-2024-50270.json) (`2024-11-26T22:38:18.377`)
|
||||
- [CVE-2024-51562](CVE-2024/CVE-2024-515xx/CVE-2024-51562.json) (`2024-11-26T21:15:07.710`)
|
||||
- [CVE-2024-51563](CVE-2024/CVE-2024-515xx/CVE-2024-51563.json) (`2024-11-26T21:15:07.900`)
|
||||
- [CVE-2024-51565](CVE-2024/CVE-2024-515xx/CVE-2024-51565.json) (`2024-11-26T21:15:08.097`)
|
||||
- [CVE-2024-51566](CVE-2024/CVE-2024-515xx/CVE-2024-51566.json) (`2024-11-26T21:15:08.313`)
|
||||
- [CVE-2024-53071](CVE-2024/CVE-2024-530xx/CVE-2024-53071.json) (`2024-11-26T22:18:28.540`)
|
||||
- [CVE-2024-53555](CVE-2024/CVE-2024-535xx/CVE-2024-53555.json) (`2024-11-26T21:15:08.560`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
198
_state.csv
198
_state.csv
@ -134806,7 +134806,7 @@ CVE-2019-17075,0,0,6c67e370139775cd1e925938fb001d4b71b771245e24ddacd568d40b2effd
|
||||
CVE-2019-17076,0,0,d84b180305c73904726454e82d5db7b7f8f542bd8c83f33d78678c7635f39bd1,2020-01-13T15:30:21.473000
|
||||
CVE-2019-1708,0,0,9006a2ba53e0870429edd5bba0f147f1eb1f6eda4c7196558eaea613ab4ba050,2024-11-21T04:37:08.910000
|
||||
CVE-2019-17080,0,0,2a488ea23d390e1fb88429fbe7a37b7acbc8d07ffeb4e88dc3950d50eca4f037,2024-11-21T04:31:39.823000
|
||||
CVE-2019-17082,1,1,af0c24dd308979977032a4b87f2ff9cffd6c181f9ade0f88151f6b9f985d5141,2024-11-26T20:15:19.957000
|
||||
CVE-2019-17082,0,0,af0c24dd308979977032a4b87f2ff9cffd6c181f9ade0f88151f6b9f985d5141,2024-11-26T20:15:19.957000
|
||||
CVE-2019-17085,0,0,6a579bf9a4c4beb2e5be8da2984a18f75826ebe0e03ba5336b9556afed432350,2024-11-21T04:31:39.973000
|
||||
CVE-2019-17087,0,0,e986c15b9585ad0005789c9873a334fb24fa6684a91755162638e32f4ac8dcfe,2024-11-21T04:31:40.080000
|
||||
CVE-2019-1709,0,0,b96c6382814fc1768b179e98a5ecda71e13ebc5999976accd8d14dc0f61909dc,2024-11-26T16:09:02.407000
|
||||
@ -195608,7 +195608,7 @@ CVE-2022-26655,0,0,ff684fd3e551541b555c6f1d8e83c9dd4516b9f968dd56206b929a8c027ef
|
||||
CVE-2022-26656,0,0,7ed69c9a68b491b3f464a29ed426873d90ccf1bbf6ff8487eb0c5e6786f29637,2022-07-18T13:37:50.977000
|
||||
CVE-2022-26657,0,0,2f7ac21b6cc4b0e24b0ddd874c708e9543304330f4cd0053f33e1a8492b91490,2022-07-18T13:37:28.867000
|
||||
CVE-2022-26659,0,0,d5fcba57a57c9cfdf876412779140633c59b3b19b9f88d148654d3ab6eb0cb7f,2024-11-21T06:54:16.620000
|
||||
CVE-2022-2666,0,1,8202c6c02bde86ca814dec2a97eeba0d1692e91c1cfb378e3df2a5471b559d5e,2024-11-26T20:29:57.070000
|
||||
CVE-2022-2666,0,0,8202c6c02bde86ca814dec2a97eeba0d1692e91c1cfb378e3df2a5471b559d5e,2024-11-26T20:29:57.070000
|
||||
CVE-2022-26660,0,0,09337680f2235a8291a5d00d3af7c6811f9681eb3b51a304081f87472f235915,2024-11-21T06:54:16.793000
|
||||
CVE-2022-26661,0,0,56dd2d5f8307164b81bb1615450bacf0421d7c0bec979428a7dc59cf78754c23,2024-11-21T06:54:16.947000
|
||||
CVE-2022-26662,0,0,c002a8d09c98dfc31b8e1d090351d38d7a887a6ab14e5b0b015802e488c820bb,2024-11-21T06:54:17.103000
|
||||
@ -195617,7 +195617,7 @@ CVE-2022-26666,0,0,4451f78127a7b701619a27549151a802fffdecb72a526d00b2b5d40e6351e
|
||||
CVE-2022-26667,0,0,5d1c40a5cf7129198c1a3e1f52338b0734b91c80a041b3770e2dd775be7ec7ca,2024-11-21T06:54:17.557000
|
||||
CVE-2022-26668,0,0,0fc81a6691e051f0e72025f7ad2c578635aae88f1ee70ebc271d001264fcbd3a,2022-06-27T18:46:18.067000
|
||||
CVE-2022-26669,0,0,4908e0ea8879a39aa83df8ca9b67cc489ca685da525debff9eae4a934d248768,2022-06-27T18:45:05.067000
|
||||
CVE-2022-2667,0,1,d572f560e0f2f1c122173b9e2752b6605602bb3855d928383108bc08d959cf63,2024-11-26T20:29:57.070000
|
||||
CVE-2022-2667,0,0,d572f560e0f2f1c122173b9e2752b6605602bb3855d928383108bc08d959cf63,2024-11-26T20:29:57.070000
|
||||
CVE-2022-26670,0,0,61afb1c13411006617363577590f4dff6486e0b748ab565fb9967eb817df314d,2024-11-21T06:54:17.920000
|
||||
CVE-2022-26671,0,0,07729f6e17ddfc9357010d3713b18eddcc3e69ed8b49e9adf93e9cdd4130edc1,2024-11-21T06:54:18.050000
|
||||
CVE-2022-26672,0,0,423ab8c3657ccfa7f8b671136caf5c885b089896603f167715cc29de913d8ced,2024-11-21T06:54:18.180000
|
||||
@ -196422,7 +196422,7 @@ CVE-2022-27656,0,0,675b9b7d15c433445a78bd2dc59db401f593afcc45d0a4cd623a51e7807d1
|
||||
CVE-2022-27657,0,0,609d180e200c4e26126e8c8ff2cd6c58a9ad74069496e7e46fecb325444c2345,2024-11-21T06:56:06.977000
|
||||
CVE-2022-27658,0,0,f76ec14c437b2972b351499effb819c76e3de55f6e839bd90d45e5d7b557b9da,2024-11-21T06:56:07.100000
|
||||
CVE-2022-27659,0,0,656dd11b3faf59dc2a412847909a9c5bcb12821431d7efbbd68e72c9804591d8,2024-11-21T06:56:07.220000
|
||||
CVE-2022-2766,0,1,de95ae536ac41a0f5c8b69505d418b59f5b8717f416a92365f510c42fe7f6551,2024-11-26T20:29:57.070000
|
||||
CVE-2022-2766,0,0,de95ae536ac41a0f5c8b69505d418b59f5b8717f416a92365f510c42fe7f6551,2024-11-26T20:29:57.070000
|
||||
CVE-2022-27660,0,0,75e73e46df9c161c7e33ce702cc3fb371b55a1c3d7e665989eb0b938d31fe48c,2023-06-28T13:59:57.707000
|
||||
CVE-2022-27661,0,0,d306f4326411fd75ac6f36f4bc7f644b906735df300b1f2cf89b48424c9491f4,2023-08-08T14:22:24.967000
|
||||
CVE-2022-27662,0,0,895b36a635dcec1eee6df9ba12753360b6092e7531b7e1cdf17f18dfdae2b07c,2024-11-21T06:56:07.580000
|
||||
@ -204194,8 +204194,8 @@ CVE-2022-37130,0,0,524d1b2dd789284c43b03c3f76fdd230e76c4f27b3b8cbad312d0ef90c7ea
|
||||
CVE-2022-37133,0,0,99bf2fcb8a34c7515f377c0d019e862a98eb077748889fcd3e385efeed2b1754,2022-08-24T15:57:31.517000
|
||||
CVE-2022-37134,0,0,c3dba6ad995830bfbbcc8cdf385680886b7c3fe9c69025af7748c88184a885c2,2023-08-08T14:21:49.707000
|
||||
CVE-2022-37137,0,0,375ff1a79c50f580c2c5321be9414918f2e452aaf124827c1af6bd42ccacd83f,2022-09-16T03:19:03.430000
|
||||
CVE-2022-37138,0,1,210b1d4872aff141ea9a76eb69624c2a301b34f66080d97e4507e60a9b3ff245,2024-11-26T20:29:57.070000
|
||||
CVE-2022-37139,0,1,14b6abc78202f8a11c9e3ca5b3f2244271024397b453412c93ccffc9c26d2fa0,2024-11-26T20:29:57.070000
|
||||
CVE-2022-37138,0,0,210b1d4872aff141ea9a76eb69624c2a301b34f66080d97e4507e60a9b3ff245,2024-11-26T20:29:57.070000
|
||||
CVE-2022-37139,0,0,14b6abc78202f8a11c9e3ca5b3f2244271024397b453412c93ccffc9c26d2fa0,2024-11-26T20:29:57.070000
|
||||
CVE-2022-3714,0,0,e921fb25e154d26afa56755d15cfb2711e556d4e691a5d446cd837bd08735f6e,2023-12-28T19:06:23.727000
|
||||
CVE-2022-37140,0,0,98b77d96fd4b8b8ee8082cf58c9837c144ad9fde9e11adde119ce73f01f7410c,2022-09-16T03:18:08.883000
|
||||
CVE-2022-37144,0,0,daf1781e51ef8adbded8d080fc4177dc3fe4da6bd8b49f186f7221dd305ee76d,2022-09-13T13:29:01.500000
|
||||
@ -214404,7 +214404,7 @@ CVE-2023-1515,0,0,a3e2778cac4d2dfc37f0f537a9169b2077aac94d94eaac95fafc3d93a2755a
|
||||
CVE-2023-1516,0,0,b2ab000015c6f7b122df774c50027a5e44cc1e7add30403d2f12052fae3f0b2c,2023-11-07T04:04:01.627000
|
||||
CVE-2023-1517,0,0,3ab00ddb7ff4e0314ecce4142c2d5a1baff3f3da000ef6e3a6d8b5ba4e309821,2023-03-23T18:37:42.770000
|
||||
CVE-2023-1518,0,0,1eb2c86860bee0ad0f9d4fa488db9d2692f6dc9f81f91a48eca9442de38c9413,2023-11-07T04:04:01.880000
|
||||
CVE-2023-1521,0,0,5ef406ee0ead3d762685c3047a264b7aa2187e63482fb5e8d8f9b5e41ae6f374,2024-11-26T12:15:18.203000
|
||||
CVE-2023-1521,0,1,c2ec6eb4ac06ae265923800c248f99bc0c3a6c31db369bde7c4611fe99eb7fb2,2024-11-26T21:15:04.650000
|
||||
CVE-2023-1522,0,0,d61a31b789772fcb1a2b790ef6bab8476e3c0bb2da2994fd477146bb42423e1f,2023-11-07T04:04:02.113000
|
||||
CVE-2023-1523,0,0,2953a5172ee5c60a8f92fd0fe9fe018483e0a876d0d679f04fff96dc00b7329a,2023-09-08T17:17:40.033000
|
||||
CVE-2023-1524,0,0,6eb9362bbf420237a5ad649bfd30799147a8972e5581c31e83bffa4b851bf44b,2023-11-07T04:04:02.450000
|
||||
@ -220763,7 +220763,7 @@ CVE-2023-27239,0,0,437c1ed4caa2359ded26737bcfd9cbaa2958d823d76194508f9dfb47ac936
|
||||
CVE-2023-2724,0,0,191167da54ef77767ea9e9c0ad85e636eb0bdb3bae693e465055392eac557556,2023-11-25T11:15:15.230000
|
||||
CVE-2023-27240,0,0,dd1a332e9f5736367bbc3ab6210c0dc1613780b8322c71d3fe5909f124506172,2023-03-21T15:04:28.480000
|
||||
CVE-2023-27241,0,0,0be9807fb01f06b81a50d96e45c1f3794a83c594dc4e37c7838913982ad385a3,2023-03-31T19:06:17.193000
|
||||
CVE-2023-27242,0,1,12f8d08d97266dc76f5fd05c1505ed206b01d930fe4d92100304b78c8f159032,2024-11-26T20:29:57.070000
|
||||
CVE-2023-27242,0,0,12f8d08d97266dc76f5fd05c1505ed206b01d930fe4d92100304b78c8f159032,2024-11-26T20:29:57.070000
|
||||
CVE-2023-27243,0,0,fbc1114feccec00fd900c27321751a7daa5190f9519421856209ea3904aaf2d0,2023-06-28T13:50:19.303000
|
||||
CVE-2023-27245,0,0,25f306d33e464404532acde29fabe136caa9c3888170367f3a43a0855be9a0f3,2023-03-31T19:00:52.530000
|
||||
CVE-2023-27246,0,0,e25c4f462a98f9ff2adce9c1b230cb9922a8a6e023c904a8768146e008cb47d8,2023-04-04T01:16:40.757000
|
||||
@ -220981,7 +220981,7 @@ CVE-2023-27462,0,0,406bb7063c733f4bc588140f672d535c7c5e4ea71ac853ff7f1d45abf6f0b
|
||||
CVE-2023-27463,0,0,5943e2fc48ff892ad71fc7b2f68c64e8ae8a5867ea7b63bf1dae97a0d0d7ae24,2023-03-17T17:09:40.223000
|
||||
CVE-2023-27464,0,0,56b82478fb14d5060be9c73115275113bef172136621e4ada9c230821adfd7ff,2023-04-19T19:59:34.863000
|
||||
CVE-2023-27465,0,0,6381cec8f1230a4497dd1b138bd04078a15d6b3870ec5ecb9400d8892f94175b,2023-07-05T17:48:25.550000
|
||||
CVE-2023-27469,0,1,4473c4d944071cdc409e0f8b0c1694375dcf295bdec7c2071fb8b18e433bce62,2024-11-26T19:15:19.773000
|
||||
CVE-2023-27469,0,0,4473c4d944071cdc409e0f8b0c1694375dcf295bdec7c2071fb8b18e433bce62,2024-11-26T19:15:19.773000
|
||||
CVE-2023-2747,0,0,e90894efddc01c892fb00706ab06f5bd0ce40f70e660fc4d4d110f3724f3285f,2024-09-27T17:15:11.707000
|
||||
CVE-2023-27470,0,0,76aae6223b89f2c3b44e264ca3a64d3a33684db6f927f63fa7d5dd0334487ea2,2023-09-13T17:04:11.437000
|
||||
CVE-2023-27471,0,0,0b3452a32a36f29e53e40277a667eea0e023b5a7234ce58c2095a06cee372f5f,2023-08-24T16:14:42.057000
|
||||
@ -222498,8 +222498,8 @@ CVE-2023-29139,0,0,a084abe4671913bf28180551675c0dbfa25127f3fda557309fe9d663812e5
|
||||
CVE-2023-2914,0,0,fb96b81c26f91b5f4bdeffb2f195e44ffdea3b423b2d1559f1d9b0bc39ae30c8,2023-08-23T15:46:19.610000
|
||||
CVE-2023-29140,0,0,b94fcdfab8cca20efcbe31f3cf9644c07adf66ad697a73757bbc9884aa2fb4fc,2023-04-11T06:08:23.753000
|
||||
CVE-2023-29141,0,0,6c69dbc26dbaae6600664a7934bbb13af86a1bf32335c6233ee4de20a90ef464,2023-11-07T04:11:04.657000
|
||||
CVE-2023-29145,0,0,8520bc21716d757e718878873bab242c0db2dcaa6938fe52a8d565724aba2997,2023-07-11T16:09:09.340000
|
||||
CVE-2023-29147,0,1,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000
|
||||
CVE-2023-29145,0,1,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000
|
||||
CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000
|
||||
CVE-2023-2915,0,0,ca3c147439eb6a9d542dec64d7a347fdc4e620cfec61a608ce9f4f8889f3b050,2023-08-23T15:49:03.143000
|
||||
CVE-2023-29150,0,0,57b0b07ccb636870566d2931159b6bdcd9a78dbbc12a81c105984ab1e3336512,2023-11-07T04:11:05.567000
|
||||
CVE-2023-29151,0,0,af232fc81ad657bec5131f859ab52410d7381f35f2bff860b286cbb1b40164e9,2023-11-07T04:11:05.710000
|
||||
@ -224098,7 +224098,7 @@ CVE-2023-31347,0,0,5703df889e7697d9a941bc897ce8eaa50a95592c03760c9ac7c4b13dd7995
|
||||
CVE-2023-31348,0,0,c306f0d237e2d8af9608a978530584d20b1bf70ff2c23a680094507cc83d2886,2024-08-14T15:35:02.560000
|
||||
CVE-2023-31349,0,0,fec448b23889f050ed9b2294a5aa334ceb009f790e378982e075155aa7b4ad20,2024-08-14T02:07:05.410000
|
||||
CVE-2023-3135,0,0,6bf4d178b889b1c4b1b5225d3bec9008408415fe638f98a0c794b0c27b2df020,2023-11-07T04:17:58.450000
|
||||
CVE-2023-31355,0,1,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000
|
||||
CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000
|
||||
CVE-2023-31356,0,0,bea061db9cade12e882f1ffccc4c3b6bf3ed6261d08ca2362e9f4fdc16dd90c9,2024-10-30T19:35:03.503000
|
||||
CVE-2023-3136,0,0,89749c73105b8a3b2f93105e2704853e3e122996e34e8067a103f24e2d5a7180,2023-11-07T04:17:58.613000
|
||||
CVE-2023-31366,0,0,44bbd1f8a094e73a70261f57615c2508c43003e09aed16040afe9f888e90fdaa,2024-08-14T17:15:14.097000
|
||||
@ -224446,7 +224446,7 @@ CVE-2023-3199,0,0,4ff7c7ed333e860dbf20b20cd32a62d2614c657d27a53a92dd51036a18eed5
|
||||
CVE-2023-31994,0,0,55b495c701a3afcb9a0613c5692bde0c35418af8cc27d0a48037c62c14add2c0,2023-06-08T15:43:50.280000
|
||||
CVE-2023-31995,0,0,ccde77b0a8aedc74cf8f2e7a2e5bf0d30fbc042d38f31a7d36b28b5a25b17a2a,2023-05-30T18:45:24.693000
|
||||
CVE-2023-31996,0,0,ee8783260109f42b80f3819341b3e52a17c76066d374cbf1298bbb942d1a3738,2023-05-31T00:29:23.163000
|
||||
CVE-2023-31997,0,1,23a6860242c9df6be185c42cfd4a4a473fe5b3dfcafad46e19bcae2a47554244,2024-11-26T19:15:20.320000
|
||||
CVE-2023-31997,0,0,23a6860242c9df6be185c42cfd4a4a473fe5b3dfcafad46e19bcae2a47554244,2024-11-26T19:15:20.320000
|
||||
CVE-2023-31998,0,0,0cb7a2f5ff71486384a9d0f64eaa121057876713e622d0a1405873cb11a83cd3,2024-10-29T16:35:10.213000
|
||||
CVE-2023-31999,0,0,fffa3ed6fbd25c3d86ee6b68528fce8a50751b49e144aa6b4f785f85126f6b98,2023-07-17T18:49:36.997000
|
||||
CVE-2023-3200,0,0,973499c3ddf1024c520b61f7f3b565541ca97ac2ac3665738bbce9dd15b42507,2023-11-07T04:18:12.337000
|
||||
@ -225782,7 +225782,7 @@ CVE-2023-33457,0,0,1384ae3af2ae126b976a8a49d245e4d9d630594ec67ec1a0c83e25e59db3b
|
||||
CVE-2023-3346,0,0,33bddee86a4fcb6f7d399db916548680973608a860f8539444f55b9ca22edd3a,2023-08-11T21:01:53.977000
|
||||
CVE-2023-33460,0,0,dec1279f75b613ee523baf40af12e9841457a1045d55e63c789323f254e76f54,2023-11-07T04:14:54.257000
|
||||
CVE-2023-33461,0,0,0de3f4305f427b4ff32b903080fb5c836a3af93f2489c41c6aae59dfd6589d2b,2024-06-07T14:11:55.450000
|
||||
CVE-2023-33466,0,1,8f3bb95382db1efdd63c10853d2c8cab520a0781d1269adfe6c9d0fc3cdbbf5b,2024-11-26T19:15:20.670000
|
||||
CVE-2023-33466,0,0,8f3bb95382db1efdd63c10853d2c8cab520a0781d1269adfe6c9d0fc3cdbbf5b,2024-11-26T19:15:20.670000
|
||||
CVE-2023-33468,0,0,44c774863a2d55e63b1845bf55de3fe4506ca7c2a56eeb4bf92cb746976655cf,2023-08-16T18:03:44.977000
|
||||
CVE-2023-33469,0,0,9dfbe3344d4b40c67ae0a1b0ae4fa865b29407207caaece6d4bed88b6c198b8f,2023-08-17T01:40:13.813000
|
||||
CVE-2023-3347,0,0,3fd9151d476078e653a42d2b9a1d6a14241e18d5cb22f2096b264fc568cc0686,2024-09-16T13:15:05.877000
|
||||
@ -226759,7 +226759,7 @@ CVE-2023-34830,0,0,b12b07e6e6eef524c645037f535fe54265745c396d0589ef83119c1ba681d
|
||||
CVE-2023-34831,0,0,d34c568e3832a62eca049162552930578f7a2c0130105f5c860e7494a64ab7bc,2023-07-06T18:52:42.250000
|
||||
CVE-2023-34832,0,0,54c5ef267bcb834d7d26599879d8d8ab7ebb51163e3ce1b2ffa84befaed96195,2023-06-23T21:19:44.893000
|
||||
CVE-2023-34833,0,0,eb74f9151a32a7f6af22b9d89c1ecfa8a6baa461451e1beb94932fa785331442,2023-12-07T14:22:18.950000
|
||||
CVE-2023-34834,0,0,2e6255a95d378c58252aa5855b1905575bfb4db74dffeb583dbeaa4729cf08ef,2023-07-11T18:59:16.717000
|
||||
CVE-2023-34834,0,1,bc1dc02df04fbbab2965ea25e8992c5b771701a5ac090b0cead74edf7b3bd7f9,2024-11-26T22:15:16.200000
|
||||
CVE-2023-34835,0,0,165ee471d9eb9d97751eef49317d8065f952df9c6eea47663872b31e1858aee9,2023-07-03T19:30:38.090000
|
||||
CVE-2023-34836,0,0,59859a20b322a225a4ea25783bd6a81efdd65e6a59377dcadb8a59ce779a4f87,2023-07-03T19:30:27.440000
|
||||
CVE-2023-34837,0,0,0b035f595e7762c9ba516d98bb12a163abfd3c21c940e05af96bd6c15511fcf2,2023-07-03T19:30:12.097000
|
||||
@ -226769,7 +226769,7 @@ CVE-2023-3484,0,0,1a890c9945f581829188504b57e7e69bd4c6c364673b677f58ac3f2e5a71f6
|
||||
CVE-2023-34840,0,0,59cae827756c70d5ac6b80dfa06f5976b7d0341fd55286eb13039a1f80f92e84,2023-07-07T14:37:15.100000
|
||||
CVE-2023-34842,0,0,b656b1b01d555747d5cbf90b49adeb15d3adc849458855c6c2d28dd82835408d,2023-08-04T18:49:11.130000
|
||||
CVE-2023-34843,0,0,d8011e5918a2e776979849210dbeca61c9a5b90a3eacf5ac9f16a41c692dd830,2023-07-06T17:17:27.053000
|
||||
CVE-2023-34844,0,0,3132722ef9ef4a25f914615fefd0d2d53c3049c508e267926df238e6a3a38209,2023-07-07T16:02:37.313000
|
||||
CVE-2023-34844,0,1,bb80cfd23a49841fc65ecc5aead43508e389c67aafe1d5943d6f23ed56465451,2024-11-26T22:15:16.783000
|
||||
CVE-2023-34845,0,0,b547b7ecc800da895510dfa514845b250f856961c3d72b948247b7b3b7f931d5,2024-08-02T17:15:27.840000
|
||||
CVE-2023-34849,0,0,b9407e9a6351cfbc186a26419f1bec14acf4135cdf5da5b4167f5c92b3a0ee10,2023-07-06T18:46:25.047000
|
||||
CVE-2023-3485,0,0,d7b89ba05861f77e9dcfe6824046d25e768f499e3485190e35a0a94e9bdc7b9e,2023-07-07T23:35:45.077000
|
||||
@ -227834,7 +227834,7 @@ CVE-2023-36483,0,0,23020ec1f7050e0bfecf93aa64a8a5f145e3bb19a289fde271462da1e3f8e
|
||||
CVE-2023-36484,0,0,d7cbc783e0626f914a1ddbf44aca0bb791ddd42ba91b7dfb57a4ea68e908e0f4,2023-07-07T16:46:54.217000
|
||||
CVE-2023-36485,0,0,a455576be489a0bd4778198a5d7c69acd9d3dfc9306a1d049c7543d839294143,2024-02-14T00:22:22.397000
|
||||
CVE-2023-36486,0,0,caa4fa5ab5bcbd3bd43f88778b4fb9fe089bdcef4ecac2b7c7f377a939be8054,2024-02-14T00:22:06.447000
|
||||
CVE-2023-36487,0,1,47703c2a22e96a97d43d970a43f1512ebb8f47f1d04832a1c39a93f1575665c1,2024-11-26T20:15:22.007000
|
||||
CVE-2023-36487,0,0,47703c2a22e96a97d43d970a43f1512ebb8f47f1d04832a1c39a93f1575665c1,2024-11-26T20:15:22.007000
|
||||
CVE-2023-36488,0,0,8a8c94d3e56d54aa8236dd81881b8fd4e3b6cf6358546f3bd01ade2f9809eb94,2023-07-07T17:17:29.997000
|
||||
CVE-2023-36489,0,0,dc3b2a16fb93102da57c7283fbace2014f377f0bd7bc62fc2588a28c19875238,2023-09-11T13:36:35.507000
|
||||
CVE-2023-3649,0,0,e5601b17dd56710e279a251177061f0fafab9b420c2e2a77a3dbf0de88036ac3,2023-07-25T18:20:46.537000
|
||||
@ -228416,7 +228416,7 @@ CVE-2023-37250,0,0,df6ff7ed34c7cf9848f0ae58775b7e2e53d7e9eb01737275f95174b0f0306
|
||||
CVE-2023-37251,0,0,edf0ff9a61af9fb380dbd75d2687de94282e16fdf00aec85c0c11a6b49eb97bf,2023-07-06T18:45:16.053000
|
||||
CVE-2023-37254,0,0,635c70615d1d3dba46d965334783cdd5cc5f47f6ca21bd12cc047812d2d065db,2023-07-06T18:45:09.180000
|
||||
CVE-2023-37255,0,0,a88851c81e0cf08070e4a379e6f9fd7f724fbeedc31f2004c4001f4a7668af08,2023-07-06T18:45:01.657000
|
||||
CVE-2023-37256,0,1,c29eaed134575faea91efc060dbe3df393a335db65827b049cc26285e09929af,2024-11-26T20:15:22.663000
|
||||
CVE-2023-37256,0,0,c29eaed134575faea91efc060dbe3df393a335db65827b049cc26285e09929af,2024-11-26T20:15:22.663000
|
||||
CVE-2023-37257,0,0,bdd95001d6f44b2903bfb4e793d6ce718c5eebe6a673941402c4bb8c02d0a9cc,2023-08-01T20:18:55.260000
|
||||
CVE-2023-37258,0,0,301434023073df56e43939a38727c12a591bc68baff4a3d214ad04b9cf693f7e,2023-08-01T20:20:01.997000
|
||||
CVE-2023-37259,0,0,2f9b5082581a7aebacec1febeac57030a68305972dc7037ae296f8b9e6346423,2023-07-27T19:50:08.540000
|
||||
@ -241739,7 +241739,7 @@ CVE-2023-7293,0,0,3ff26f743daf817328ce1e7b515ad1f2deed298b0d8689dfddb5df0187445a
|
||||
CVE-2023-7294,0,0,d0b71a4c236f4255c919d5db4070d2576b7afb89eda904442cd363b27a1bf802,2024-10-17T17:34:31.020000
|
||||
CVE-2023-7295,0,0,b8d3b90fa8b1f5fca88683560b9fb1d91f91e8cd04661179b8f194af025390da,2024-10-16T16:38:14.557000
|
||||
CVE-2023-7296,0,0,be181fe43284276606c9b6c67c3d207ca36f37958bcd920c07e436932d46c8d7,2024-10-16T16:38:14.557000
|
||||
CVE-2023-7299,0,1,f8ba3831fb16272b6390e22d6eaa25d74661688ce5f857119dc4946c9fdef8e8,2024-11-26T19:12:43.750000
|
||||
CVE-2023-7299,0,0,f8ba3831fb16272b6390e22d6eaa25d74661688ce5f857119dc4946c9fdef8e8,2024-11-26T19:12:43.750000
|
||||
CVE-2024-0001,0,0,ddc97ec95f63469ba72943e3a1a3c2055a0f787a376d00af08b9e1c9de1e66b0,2024-09-27T14:08:57.327000
|
||||
CVE-2024-0002,0,0,8eba00d67fa29dcfc182e2e2367ab4a3c005649f9c2970e7f365907a3a42b06a,2024-09-27T14:13:24.427000
|
||||
CVE-2024-0003,0,0,46c85e4a496f19260982bccddc0ca5126276fd9fc3f3c6d4be9e905c5a7e34b8,2024-09-27T14:23:58.243000
|
||||
@ -242826,7 +242826,7 @@ CVE-2024-10232,0,0,98e97f86e77c9008185f9ff2c9f54dab5146c7a71a0b7823df9bcfdfb1c88
|
||||
CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10234,0,0,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000
|
||||
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
|
||||
CVE-2024-10240,1,1,895bb52e7bb345d17c9a0ae1c62601f710a16d97de65064646b494f8c5ebb315,2024-11-26T20:15:24.487000
|
||||
CVE-2024-10240,0,0,895bb52e7bb345d17c9a0ae1c62601f710a16d97de65064646b494f8c5ebb315,2024-11-26T20:15:24.487000
|
||||
CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10245,0,0,a0531404f8e42b22ebf8edf706088f8f3bbff70573c99f5feaf6c300487731f6,2024-11-12T13:55:21.227000
|
||||
CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000
|
||||
@ -242911,7 +242911,7 @@ CVE-2024-10355,0,0,2602c2076153349e7adf5f2683fe39bdc0cb3abdcbf15a26de13daaf9ad9d
|
||||
CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000
|
||||
CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000
|
||||
CVE-2024-10360,0,0,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10365,0,1,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000
|
||||
CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000
|
||||
CVE-2024-10367,0,0,547b3c1385167e643f44f204c281f5898850caa0e5c0b7e1f18c8aec4af5d4c6,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10368,0,0,c8e0d6969c93ffe96acf5e0ee7b5c26394eeb4c801dc04ebad8a62cf1ce3fd82,2024-10-30T16:46:30.783000
|
||||
CVE-2024-10369,0,0,5a59dc320150c27565cde3d9105528beaf16a536e1981e9f54165bf31963ac02,2024-10-30T16:50:32.567000
|
||||
@ -243253,7 +243253,7 @@ CVE-2024-10851,0,0,bb060e17bfcaee979e3c022ab213f6f8185e0d32d9334f9a45831591a3ac5
|
||||
CVE-2024-10852,0,0,f6b203b7b939235aa255ffed248e8cf068dd3b791229b609e430feca6cc83541,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10853,0,0,02830723c1cfc34942045c33ee361ea42546311dacb0cff9be0a3634be59c448,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10854,0,0,15cfe2e17b56db5e0c11761ae38ecac4069d0ddad2bb05d2f72a443bc2fa6485,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10855,0,1,ae24b9251832889f0ab5093466f5bbce4d7ad6d8dd4bf7a8321d2155c2606591,2024-11-26T20:34:02.857000
|
||||
CVE-2024-10855,0,0,ae24b9251832889f0ab5093466f5bbce4d7ad6d8dd4bf7a8321d2155c2606591,2024-11-26T20:34:02.857000
|
||||
CVE-2024-10857,0,0,7fa5b5a886f884eab497f541a0fe9dbbf359fc91d9012b33d55a7533bd76e633,2024-11-26T07:15:05.003000
|
||||
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
|
||||
CVE-2024-10861,0,0,0e475116cbc916b1684eb819921303de89576e8768786550a96cf2c67b7dbecb,2024-11-18T17:11:17.393000
|
||||
@ -243279,8 +243279,8 @@ CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076
|
||||
CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10891,0,0,75368c42ada2eff64310eb4f2bf04c277030b9ed62814601df628d2e55a629ad,2024-11-20T10:15:05.273000
|
||||
CVE-2024-10897,0,0,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f534,2024-11-20T16:09:16.643000
|
||||
CVE-2024-10898,1,1,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372718,2024-11-26T20:32:20.217000
|
||||
CVE-2024-10899,0,0,4368cb3772d2f8c2a1f35ff550289018215916506b0b69e65d8983cd35dad906,2024-11-20T07:15:08.260000
|
||||
CVE-2024-10898,0,0,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372718,2024-11-26T20:32:20.217000
|
||||
CVE-2024-10899,0,1,3af5ea7b90e5da0230215c5076c9eff9b3749f9f5f947443d89625612842d08a,2024-11-26T21:01:21.643000
|
||||
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10900,0,0,f0a1068a03da92137242d5778d1db0773cba2fb63def13779ff35e3410d8f989,2024-11-20T07:15:08.690000
|
||||
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
|
||||
@ -243441,11 +243441,11 @@ CVE-2024-11136,0,0,24240577f7b850705f8148f1e2257c636c3b9dc696f019566c5d55e0511cc
|
||||
CVE-2024-11138,0,0,7b0edb369e2d9df427aea00759a3991acb4ee32080a1e83cba9502f5a7a362f2,2024-11-13T17:01:58.603000
|
||||
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
|
||||
CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000
|
||||
CVE-2024-11145,1,1,3738165869fe25349bba8fb98171e1f4dedc6c9049342172a78ba671f869bf13,2024-11-26T20:15:25.270000
|
||||
CVE-2024-11145,0,0,3738165869fe25349bba8fb98171e1f4dedc6c9049342172a78ba671f869bf13,2024-11-26T20:15:25.270000
|
||||
CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000
|
||||
CVE-2024-11150,0,0,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf362,2024-11-19T16:57:05.407000
|
||||
CVE-2024-11154,0,0,9c2f24e5b2c6bb0a1acf0aba74e4e593d635b23a924a1df484d24fc0dc0da623,2024-11-20T14:15:17.500000
|
||||
CVE-2024-11159,0,0,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000
|
||||
CVE-2024-11159,0,1,40c853846b1f5260f445d8196c4d1f6aec01e81777411e7a4839d765e27bfc1a,2024-11-26T22:15:17.720000
|
||||
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
|
||||
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
|
||||
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
|
||||
@ -243486,7 +243486,7 @@ CVE-2024-11229,0,0,8de69af2e8ef71bf0699d395c3530a96b920df18def0dd7e9945c9cd35c53
|
||||
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
|
||||
CVE-2024-11231,0,0,340d4a67a1a53dfc3acaeb8d7a5545a089dda27cdd6d90b8d47ab035e0216159,2024-11-23T12:15:19.387000
|
||||
CVE-2024-11233,0,0,f693569babb39b28690250bf399e234d5652aa087fc09c6fa53135c369c0e730,2024-11-26T18:26:37.783000
|
||||
CVE-2024-11234,0,1,76a20d0b5df369c7dd2c3a2819b7721a96e80c779172c74c627d64ef7ab10b79,2024-11-26T19:06:10.243000
|
||||
CVE-2024-11234,0,0,76a20d0b5df369c7dd2c3a2819b7721a96e80c779172c74c627d64ef7ab10b79,2024-11-26T19:06:10.243000
|
||||
CVE-2024-11236,0,0,550d85bfafd1434d8d927c6d8dee8c7c226d05255dec5cf2f93f8237a1b74e8c,2024-11-26T18:29:05.820000
|
||||
CVE-2024-11237,0,0,9213e2a4eef9d88853d744219598c19b6ea93ab11d996277723bb7fe3b4dafb0,2024-11-19T19:04:14.987000
|
||||
CVE-2024-11238,0,0,ce4db66c60999acd981d78df2e1b620167b9a91ec92fb71a2c401cfcff716486,2024-11-19T19:01:13.060000
|
||||
@ -243514,7 +243514,7 @@ CVE-2024-11262,0,0,5bda125849c583f0ebaa29ca4d26cf0dcf9667997688ed2241531b87cb595
|
||||
CVE-2024-11263,0,0,6a1ac9d3a12801a9f848747b946a0ac459e1982e45197319659c04e5ba98bfce,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11265,0,0,f4b2a3318dbaf2f938f5bb6f39194c9b65cc4b5c5a1f983e90346e6df34abb44,2024-11-23T06:15:18.310000
|
||||
CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f08c,2024-03-13T18:16:18.563000
|
||||
CVE-2024-11277,0,1,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b481b5,2024-11-26T20:59:50.643000
|
||||
CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b481b5,2024-11-26T20:59:50.643000
|
||||
CVE-2024-11278,0,0,cc19a6be7ba80ee301c92f54c29f2c5c95b3da6dd7918df5b7b1d59f8e31a90e,2024-11-20T05:15:16.530000
|
||||
CVE-2024-1128,0,0,de5352d9c421a908307277eb7da3f5f6fcfc08a095ea033ab740d4804aa5ccea,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1129,0,0,bb6d36851ed2d72741a575302302ac57d511f2bf349c6ca7db7385fd53c3529a,2024-02-29T13:49:29.390000
|
||||
@ -243693,6 +243693,7 @@ CVE-2024-11612,0,0,43a8546b6f6704b744b4ad0e6cd3f837ef8030a4f6b6c5a5933b6bba0c215
|
||||
CVE-2024-11618,0,0,792ab788b226a2722a3426e09b749bb9acdd3d0ab845ea998dacbd90a5e66f09,2024-11-22T19:15:05.437000
|
||||
CVE-2024-11619,0,0,a4838d434b8c8bb61e21ea750aab44437d9c4068a035e504d5209865637cd703,2024-11-22T21:15:17.500000
|
||||
CVE-2024-1162,0,0,6517ec14e6db831ee5a33abab5e0e4729a77c306548683589462e3183aa8cdb4,2024-02-08T14:22:37.180000
|
||||
CVE-2024-11622,1,1,9983eca95a5d42bc88a9506949841ef9afaec6eac673c24e94ea89c2baa2d6f0,2024-11-26T22:15:17.860000
|
||||
CVE-2024-1163,0,0,23d47391c7884329270abc739e0d42e17852ac69017fc11ff4fa38853ad7cf71,2024-11-03T19:15:04.143000
|
||||
CVE-2024-11630,0,0,124823e79cad8f52614d45dfbfa425539f468c43cf02153ebcf347d478214259,2024-11-22T22:15:13.637000
|
||||
CVE-2024-11631,0,0,570ceb0c85d63bd361de89b3e02d09184658915631c383aecab754524c3a2fca,2024-11-25T16:54:46.333000
|
||||
@ -243721,8 +243722,8 @@ CVE-2024-11663,0,0,3626413ca3e66966b7d786a611d25e545ae4de59326fcb8c9442c9f727c44
|
||||
CVE-2024-11664,0,0,f7e3e3893aefbf47475119b5cc15d35a6bf3fef30ce727b8b58d082d350666b1,2024-11-25T09:15:06.800000
|
||||
CVE-2024-11665,0,0,432484acd0139af98341fd7fe90b0662197ea5956295af2989047d68fc0277cd,2024-11-25T00:15:03.957000
|
||||
CVE-2024-11666,0,0,2250b20e698d0c0188636489287d2b59448a3bc6ff2a33a1b94eca03d876ba25,2024-11-25T00:15:04.040000
|
||||
CVE-2024-11668,1,1,76595504dbd2b64d21bcff47f11c8e8cc91ab680fc6cee5f2ffc1737d953cc2b,2024-11-26T19:15:22.027000
|
||||
CVE-2024-11669,1,1,a5de8e98bfb8b633c540619e4d481ef856cf620fef729b0da27716832b9fbae5,2024-11-26T19:15:22.367000
|
||||
CVE-2024-11668,0,0,76595504dbd2b64d21bcff47f11c8e8cc91ab680fc6cee5f2ffc1737d953cc2b,2024-11-26T19:15:22.027000
|
||||
CVE-2024-11669,0,0,a5de8e98bfb8b633c540619e4d481ef856cf620fef729b0da27716832b9fbae5,2024-11-26T19:15:22.367000
|
||||
CVE-2024-1167,0,0,ed50fa0852f2fbdcdff47243517d528056863b720fcd10bdada66efed3504e8a,2024-02-09T20:20:51.900000
|
||||
CVE-2024-11670,0,0,da97a331b546adbf73f2b38147c185b1f7045c13e5878ca1de4e9a941cf83c83,2024-11-25T16:15:12.173000
|
||||
CVE-2024-11671,0,0,2615e6d984f10785804bed1195d17e9edea1f659c624af4ab21f00fc47d133cf,2024-11-25T17:15:11.930000
|
||||
@ -243736,7 +243737,7 @@ CVE-2024-11678,0,0,e780942a86d65f83e2cb7cc5d04e0a3676e4919574029bbf616d3d9c8bbb8
|
||||
CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000
|
||||
CVE-2024-11680,0,0,e59e07fcd0f2caeb9f7525587364f8cd5a94ad91992448a2d5730a3a3fe6f61e,2024-11-26T10:15:04.540000
|
||||
CVE-2024-1169,0,0,a43d6b50f47e310e039f1575550f9d1fe159a31a77f5a57027ebd3dc489ff540,2024-03-07T13:52:27.110000
|
||||
CVE-2024-11691,0,1,3e42765637e5c72d6e1a2c134f6b1e9090a88c7e849121733a5e70a45a699ec7,2024-11-26T19:15:22.673000
|
||||
CVE-2024-11691,0,0,3e42765637e5c72d6e1a2c134f6b1e9090a88c7e849121733a5e70a45a699ec7,2024-11-26T19:15:22.673000
|
||||
CVE-2024-11692,0,0,55049561fa0f71cffa0c7b6a627b36584acc14eb5f275a9c38067a068ae91926,2024-11-26T14:15:18.743000
|
||||
CVE-2024-11693,0,0,2373f8efea5deb80fd8960ce5bc1e616f0b62c5febf07239d836708229799dac,2024-11-26T14:15:18.847000
|
||||
CVE-2024-11694,0,0,a6a2c4a535474da2ca567947004ffbecb7b16bb81183cc508d3c10dd53c61627,2024-11-26T14:15:18.943000
|
||||
@ -243758,8 +243759,10 @@ CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a6
|
||||
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
|
||||
CVE-2024-1174,0,0,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000
|
||||
CVE-2024-11742,1,1,67990b8c6d291afd926a35484e6c0e210504d9728dfca33a0ba1469d0b959cb7,2024-11-26T20:15:25.703000
|
||||
CVE-2024-11743,1,1,4f6422c96bd4f753ba6c7b4e725945a7686018b3a7c5c8f40a5c1bd59c112f03,2024-11-26T20:15:25.930000
|
||||
CVE-2024-11742,0,0,67990b8c6d291afd926a35484e6c0e210504d9728dfca33a0ba1469d0b959cb7,2024-11-26T20:15:25.703000
|
||||
CVE-2024-11743,0,0,4f6422c96bd4f753ba6c7b4e725945a7686018b3a7c5c8f40a5c1bd59c112f03,2024-11-26T20:15:25.930000
|
||||
CVE-2024-11744,1,1,00cf39a5ff638eb8540e5762c3b7d5f96d7e68d9cff105ba77a0024d8435ddd0,2024-11-26T21:15:06.483000
|
||||
CVE-2024-11745,1,1,7dcacd2cf20ed5acc6af6d89bc5904d91f3ced648b148a25b404dd36098893ff,2024-11-26T21:15:06.733000
|
||||
CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e1e,2024-07-24T20:32:01.573000
|
||||
CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000
|
||||
@ -243768,7 +243771,7 @@ CVE-2024-1179,0,0,18b2d0d135c66f5f21d2d252edc06809b11030eef4b80a686f580bba7c8722
|
||||
CVE-2024-1180,0,0,bb83e3fdc0a8f87f14b71aa596dc16c65435770562b16333b2c46b0a903dc99c,2024-04-03T17:24:18.150000
|
||||
CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000
|
||||
CVE-2024-1182,0,0,fa905e4a8a46b36f13d15329274923ae221fc1fe7f91daf124410752f4903054,2024-07-05T12:55:51.367000
|
||||
CVE-2024-11828,1,1,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae62b7,2024-11-26T19:15:22.910000
|
||||
CVE-2024-11828,0,0,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae62b7,2024-11-26T19:15:22.910000
|
||||
CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c09a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
|
||||
CVE-2024-1185,0,0,a60268243ee8d3dcf82e9c185863da8146ac8c49246dc744f2663ef723b40081,2024-06-26T15:15:19.220000
|
||||
@ -244302,7 +244305,7 @@ CVE-2024-1749,0,0,f620be6c4367805be5c83719352e695698d105470ce084642dece004f1c7c3
|
||||
CVE-2024-1750,0,0,7f9ce3864064263c9a72249a090e6a4b7033b154fc6d744d107ff4cdf65d126b,2024-05-17T02:35:35.177000
|
||||
CVE-2024-1751,0,0,154c401fe290eec38fd9c24bb6a8378784a8ac703cfa36934de32237c4b2fc0e,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1752,0,0,ebd28678960fb125918a034bc6797117b5ad867c71cd1502baeff6b2a6777f59,2024-10-27T23:35:02.790000
|
||||
CVE-2024-1753,0,1,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f64503d,2024-11-26T20:15:26.237000
|
||||
CVE-2024-1753,0,0,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f64503d,2024-11-26T20:15:26.237000
|
||||
CVE-2024-1754,0,0,6d02707455f72bdff06cdba8f236495298ba067f3e3a9d1cc5b84a96ef4c9f88,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1755,0,0,3d3eb53461864a2d0b6846883348dbee673cb6d9a59185cf31292954d770d20b,2024-07-08T14:17:11.257000
|
||||
CVE-2024-1756,0,0,3e84813a966b3d138c76e22bdd3fcd8ab2964d96bf9c77ed86651d769e5bb5a7,2024-04-24T13:39:42.883000
|
||||
@ -246221,10 +246224,10 @@ CVE-2024-21972,0,0,faeb67500b1dc4ef8f1b7649334b23a7c70f07a8990a8b6dfa5400e248a30
|
||||
CVE-2024-21974,0,0,e945cdce0481a2236f8c3fc3597c2e09e0fcffcce9462be19907f54901a45889,2024-11-15T19:20:09.980000
|
||||
CVE-2024-21975,0,0,3d78cb740262f648775e64b558262f7d13f861a84d692c656d8015e29ef15d89,2024-11-15T19:15:18.770000
|
||||
CVE-2024-21976,0,0,316a014d75b9b72921e8ef227aeb700f1f1d9634c14a7f67ab46550a5882ed94,2024-11-13T17:01:58.603000
|
||||
CVE-2024-21978,0,1,f9ad75ec7a255d6b77864f55761b0fe46f8517bc08965faf4d5ddf7905db1b8d,2024-11-26T19:13:33.683000
|
||||
CVE-2024-21978,0,0,f9ad75ec7a255d6b77864f55761b0fe46f8517bc08965faf4d5ddf7905db1b8d,2024-11-26T19:13:33.683000
|
||||
CVE-2024-21979,0,0,69d970687ec7fc10c2117ffd8a662f03f2976fe858767ebadf9aede1ce3bc7bd,2024-04-24T13:39:42.883000
|
||||
CVE-2024-2198,0,0,1df4cff98d86f3bfed69b5c9a5afedec636b00bc821bafe7fe3fd5ac8b6e5483,2024-04-10T13:23:38.787000
|
||||
CVE-2024-21980,0,1,13552d6d45ad7bc904edc4f73922a621593d0beb32beb13705593c55f1df49ed,2024-11-26T19:13:55.167000
|
||||
CVE-2024-21980,0,0,13552d6d45ad7bc904edc4f73922a621593d0beb32beb13705593c55f1df49ed,2024-11-26T19:13:55.167000
|
||||
CVE-2024-21981,0,0,deb1e8a78bb55715b4492773fc3097281d0a3412a2bc91cb4f6c00fad354f4e4,2024-08-15T18:35:06.310000
|
||||
CVE-2024-21982,0,0,a1d7a0b52867843a898049d8dcbdf321d190ddcdceaa8b86d96038ebb2885957,2024-01-18T20:16:20.420000
|
||||
CVE-2024-21983,0,0,f2de681a28bdb7d62262b30d8ab0c99245f80036b39bf9cc43012d973caf3ccc,2024-02-20T19:51:05.510000
|
||||
@ -247895,7 +247898,7 @@ CVE-2024-24431,0,0,4a17e71430d299dc76b10f523b5bf34391f8435e621178a2d658fb28da0e4
|
||||
CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000
|
||||
CVE-2024-24446,0,0,4c6e15fdd35cea3b2028a0ca801486700d3d050a15d3ac5c7114877688fb3063,2024-11-19T17:35:10.263000
|
||||
CVE-2024-24447,0,0,68577331a6f4e1af2736b20dbfd3e5dfc70e89a5bafd5ffca69920501cd70cdc,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24449,0,1,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc45d,2024-11-26T19:15:23.090000
|
||||
CVE-2024-24449,0,0,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc45d,2024-11-26T19:15:23.090000
|
||||
CVE-2024-2445,0,0,4580fbdabeda1a44cff89d119283db83c12561dfbbac9584647c19bac102f840,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24450,0,0,390d4f5ce7626fbcfad34af0fc653541b705484563fee9cdc21d7a5f37a2063e,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24452,0,0,215c34bc5144b82ae2422378a4e24e5a234549a60097442b2418405ce8d77af4,2024-11-18T17:11:56.587000
|
||||
@ -254331,7 +254334,7 @@ CVE-2024-32961,0,0,6a2bc47e3f079ae3760e7e20a355b986d2cc4b1830bfe52ea9b46ea57b55e
|
||||
CVE-2024-32962,0,0,0ccefa80df1fe2f4511fc5eb3d9dd6ff74b48f3d30b3249e52ce0d307bcfb377,2024-07-05T16:15:04.657000
|
||||
CVE-2024-32963,0,0,4033e938076410e0bcb77b62664ef8258e99f8caf87c01b4c2d33d4d67dfbc0c,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32964,0,0,b623874e6a0274971696b1b7da0d2f443f746dffed315cb1a514ae93f0a27caa,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32965,1,1,74056c895659d28134c93cc43319642c2b74dc481fe9db8a3be363705957f1d8,2024-11-26T19:15:23.343000
|
||||
CVE-2024-32965,0,0,74056c895659d28134c93cc43319642c2b74dc481fe9db8a3be363705957f1d8,2024-11-26T19:15:23.343000
|
||||
CVE-2024-32966,0,0,c438f55196809bbbc973f729157ff8c0c6df1250009855187f1fc3a5f9a87d17,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32967,0,0,edb16c37f9c2fc6d1e9a47803a7b1119309dad5cfcac07761a5d0ee65a1bacec,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32969,0,0,6ef0f8d88265e6683965945b29c1106dae41ceee98d494ed8c3a06c6d351066c,2024-05-24T01:15:30.977000
|
||||
@ -255861,7 +255864,7 @@ CVE-2024-35154,0,0,81f33a307af9c715167f98750875b4e038421ef510b7138badb02afca1fe6
|
||||
CVE-2024-35155,0,0,371571e1aae62a09e601d6099b5578266a4a707997394118a0b1e39997d5568b,2024-08-01T17:56:03.997000
|
||||
CVE-2024-35156,0,0,c60c77ef40353c2652552678563f99e9cae12e7989782b9c762483c729b4d520,2024-08-21T14:48:04.303000
|
||||
CVE-2024-3516,0,0,61323fc04733960d047e16de47c6d5cda2ae2931ba7c42276f6e75842f73a295,2024-07-03T02:06:20.027000
|
||||
CVE-2024-35160,0,1,318ce523570aa2a281e98ab12c2ca421a0d155ef6ca7820b4c93b91389e32554,2024-11-26T19:08:22.473000
|
||||
CVE-2024-35160,0,0,318ce523570aa2a281e98ab12c2ca421a0d155ef6ca7820b4c93b91389e32554,2024-11-26T19:08:22.473000
|
||||
CVE-2024-35161,0,0,6aea9c3989d886688e1b7e99fb5bea03a80c08fc501d3b5e12f47ed8f4b07628,2024-08-13T09:15:04.610000
|
||||
CVE-2024-35162,0,0,e2e13ef2eb30c7b92e657f4b1e361b879f73f57d79701db01dafa5276f6f5a54,2024-08-12T16:35:03.640000
|
||||
CVE-2024-35165,0,0,a5a2ced0aefc202025ce7b223ffafe3ffc4109906dfd07a5a8a0577e3f72ac5b,2024-05-14T16:11:39.510000
|
||||
@ -258969,7 +258972,7 @@ CVE-2024-39276,0,0,32d71e300deae390ebad47139e8119dcf57d5112942186e3daeae896a6726
|
||||
CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000
|
||||
CVE-2024-39278,0,0,51fae5fc06f1bea217dd270a1a945e50fc908e01cdd6aa79fc8df1b8bf725907,2024-10-04T14:36:35.340000
|
||||
CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000
|
||||
CVE-2024-39281,0,0,5a82608b3d46dab2364e08aced6d31aadb52249e7f3d825a6460399ee7da2050,2024-11-12T15:48:59.103000
|
||||
CVE-2024-39281,0,1,5ed5d465de373b8bf330232a27c4c9fb3e495543d30fe777bc2a6417530cfeb0,2024-11-26T21:15:06.960000
|
||||
CVE-2024-39283,0,0,3cb180f3de5aa4a3b64779758cf8f61008b6ae73b857127aaaa5aa752ce57774,2024-09-12T19:15:46.390000
|
||||
CVE-2024-39285,0,0,b1c6d3c642e9af183b02a5dea78479f665c25d357dc70e9b85394065780bbfca,2024-11-15T14:00:09.720000
|
||||
CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000
|
||||
@ -262038,6 +262041,7 @@ CVE-2024-43780,0,0,d9608e5282027284dec0a71836db679a0d0aeb03741c7f05a7da689503d59
|
||||
CVE-2024-43781,0,0,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43782,0,0,5703533b3fa89464edfce2a0c22f8a172fe2aa48f2f15930053049c9144e5860,2024-09-12T18:29:50.943000
|
||||
CVE-2024-43783,0,0,ddca1425623bacb4f350aa37099519b24871b2f03a1ef61a2ee233ff179354b6,2024-09-12T21:33:56.637000
|
||||
CVE-2024-43784,1,1,424de0eeb4e8f32ee638f443f45f332802e143526b740600ac49ba0e9c7f1027,2024-11-26T21:15:07.160000
|
||||
CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43787,0,0,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000
|
||||
CVE-2024-43788,0,0,a03aaa9704dba33d1000f4af935b205178542791785852dc4658122c86bef661,2024-09-03T15:15:15.937000
|
||||
@ -263404,7 +263408,7 @@ CVE-2024-45873,0,0,c49a27b891c2cba5f20315647687fde4c837ff4206eca9eaffb57a4f0d790
|
||||
CVE-2024-45874,0,0,2e0e68e484da1ec476bcb0982736db7f6eddfb72b06a902a4960817b887d973a,2024-10-10T12:57:21.987000
|
||||
CVE-2024-45875,0,0,4511e7c6c223f11ba90de4d69c66ff141aa95f1f82f947b14caa9f3bcdaed5e7,2024-11-15T14:00:09.720000
|
||||
CVE-2024-45876,0,0,027a13f13cb51be837afea68fb1d7e00076030912fc4892d2dca3a25b5f9f3ba,2024-11-15T14:00:09.720000
|
||||
CVE-2024-45877,0,1,9582f95508441ff8668fb3c2396c695e228995bf0aaadec2b0ea7dd7c2886d0c,2024-11-26T20:15:29.633000
|
||||
CVE-2024-45877,0,0,9582f95508441ff8668fb3c2396c695e228995bf0aaadec2b0ea7dd7c2886d0c,2024-11-26T20:15:29.633000
|
||||
CVE-2024-45878,0,0,b7f1cf9ff04c142b3f7a2f664dd5de800a21d58640f5d311d359fd7697e8408f,2024-11-15T14:00:09.720000
|
||||
CVE-2024-45879,0,0,1a89d4d18e049d294aa3955b22a2d83fd9c1ca44cb5ff049165076871ffb8a88,2024-11-15T14:00:09.720000
|
||||
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
|
||||
@ -264725,7 +264729,7 @@ CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e010
|
||||
CVE-2024-4799,0,0,bef187df7ab031f873bee32f009cee90466081192edf9662131655f9488e20b3,2024-06-04T19:20:49.917000
|
||||
CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef97724,2024-06-04T19:20:50.013000
|
||||
CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000
|
||||
CVE-2024-48010,0,1,8bfa5c4fbebd2aee91d2507ef982cfb796b2239ac566eed501e3cdcb4f94749b,2024-11-26T19:26:13.733000
|
||||
CVE-2024-48010,0,0,8bfa5c4fbebd2aee91d2507ef982cfb796b2239ac566eed501e3cdcb4f94749b,2024-11-26T19:26:13.733000
|
||||
CVE-2024-48011,0,0,a9728badb7d598d793c75f011338af9c8ecb3c3f11de72d571fad0ef11851267,2024-11-26T02:12:04.277000
|
||||
CVE-2024-48016,0,0,79b8427a21b025c2b604d3c3d72e2379266e5f76164b198ef3ca33d423daa7ad,2024-10-21T17:10:22.857000
|
||||
CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000
|
||||
@ -264897,7 +264901,7 @@ CVE-2024-4840,0,0,7a8f20a0ec5233209e4a41e695adc74d1c7cda82b3b5dffacdd4c6925c1a6f
|
||||
CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000
|
||||
CVE-2024-48410,0,0,ccc65ac0ed111907d1e5a65a9755c401ec69cc35af0c3e48b39cab031ff07170,2024-11-04T21:35:10.317000
|
||||
CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000
|
||||
CVE-2024-48415,0,1,bb9e3b97ff90d39743d554ba54d4e6857ce95f8c7a439d575dc2c98763652ebd,2024-11-26T20:29:57.070000
|
||||
CVE-2024-48415,0,0,bb9e3b97ff90d39743d554ba54d4e6857ce95f8c7a439d575dc2c98763652ebd,2024-11-26T20:29:57.070000
|
||||
CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
|
||||
CVE-2024-48423,0,0,5dcbe66de23651d18f02f6e3dbae179ad5758bfe582bf16fbabeb5630b6f2dd9,2024-11-05T17:54:34.027000
|
||||
CVE-2024-48424,0,0,40269a486047942b0c54d704b8b037cd3035d9ce415f6a7c6672231218b45918,2024-10-28T18:35:03.257000
|
||||
@ -265011,7 +265015,7 @@ CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f
|
||||
CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000
|
||||
CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000
|
||||
CVE-2024-48746,0,0,cc71971d0c35eb6ede5bd98dffa458b269b0f1ad6fe183bb1ac7ae9499973876,2024-11-06T18:17:17.287000
|
||||
CVE-2024-48747,1,1,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95804,2024-11-26T19:15:26.443000
|
||||
CVE-2024-48747,0,0,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95804,2024-11-26T19:15:26.443000
|
||||
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
|
||||
CVE-2024-48758,0,0,a0017ffb6fab9626ea62b98de0c6903a7dbb8c74f73f1e588de68b4bc17a833d,2024-10-18T12:53:04.627000
|
||||
CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000
|
||||
@ -265145,7 +265149,7 @@ CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32f
|
||||
CVE-2024-48989,0,0,9073e18090b9ae4eb5079758fa48cb03e03a3dcd9dfe9e38f4453d35dfeb5c4c,2024-11-13T17:01:16.850000
|
||||
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
|
||||
CVE-2024-48990,0,0,01ad64d993b1a34125730a579a223ab965b2b42884353072e3771c0929c4035c,2024-11-19T21:56:45.533000
|
||||
CVE-2024-48991,0,0,1168383c279ea31e2b545c819ef761fe3fca7dce9ba4a8e7eda59e6a525fefc7,2024-11-19T21:56:45.533000
|
||||
CVE-2024-48991,0,1,6f75849d879aa70a06c5980be61bce26016ea355a36322ccaf36b00c1fba8279,2024-11-26T21:15:07.330000
|
||||
CVE-2024-48992,0,0,7d51388c1721a8523b9ede74fe782bca890c6f1c274f5cf7a619b3f6ce5cedd5,2024-11-19T21:56:45.533000
|
||||
CVE-2024-48993,0,0,196b3895a17ef7dfbcbfdd466d8bb48d5a37a44b82a7d059ceac4c05136016cf,2024-11-19T19:06:50.177000
|
||||
CVE-2024-48994,0,0,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000
|
||||
@ -265189,8 +265193,8 @@ CVE-2024-49030,0,0,593cd98277b4a2f03786fe9452fade2fe8094f0a76a79e95147391239b55f
|
||||
CVE-2024-49031,0,0,b495cac2b66ea6bd08375163a8c3deed4879c768ae6c2515d6045a564174a6e7,2024-11-18T20:31:54.983000
|
||||
CVE-2024-49032,0,0,4b545ebbbd503cfb4f9044313cab083e94f10995cfa1fa34c750f5e6d8a8b9bd,2024-11-18T20:31:05.720000
|
||||
CVE-2024-49033,0,0,63058f1330e847b335fbf4311cedb25087f2de5c7e23c690bdb31c685f252bf9,2024-11-16T00:05:44.867000
|
||||
CVE-2024-49035,1,1,a0ddab84ae6d08cda29fdcef0f87b735aa4b299d466c6c5e8ff8c3bf9dfbf1b4,2024-11-26T20:15:31.763000
|
||||
CVE-2024-49038,1,1,c1a6574e4f2173ba91eba71f5cd01b7f54d3209b6836e71217b68b1ec62e52f1,2024-11-26T20:15:31.943000
|
||||
CVE-2024-49035,0,0,a0ddab84ae6d08cda29fdcef0f87b735aa4b299d466c6c5e8ff8c3bf9dfbf1b4,2024-11-26T20:15:31.763000
|
||||
CVE-2024-49038,0,0,c1a6574e4f2173ba91eba71f5cd01b7f54d3209b6836e71217b68b1ec62e52f1,2024-11-26T20:15:31.943000
|
||||
CVE-2024-49039,0,0,35081b6450a24914db672b1bfea30c0edc233e94d1f078f8c664cf196464b147,2024-11-14T15:20:51.670000
|
||||
CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000
|
||||
CVE-2024-49040,0,0,7a758192e076767fe257f5372e318acec3bbf74a999fea4db7595a5b865f2211,2024-11-16T00:05:03.997000
|
||||
@ -265203,8 +265207,8 @@ CVE-2024-49049,0,0,676e59d622368d0e2de502959e0aa570d5a79d19d908c25acf07cf3944fb3
|
||||
CVE-2024-4905,0,0,acf7154e104fe12ce44ad2e90ccc9d1c19899bcc28d8f8bfc61002cc40187062,2024-06-04T19:20:52.480000
|
||||
CVE-2024-49050,0,0,93eeb9096370b7db9bf9f90a3fe0c42db4f28f9c6c61047c6c15fcc41cc6316a,2024-11-18T22:03:27.367000
|
||||
CVE-2024-49051,0,0,b5a7ec15db6a9c105974c2d72fbba373184798bf7c3998c1e724145818180e27,2024-11-18T22:23:46.893000
|
||||
CVE-2024-49052,1,1,9bae9acd5c7b02cefbf1d308e6bd581bb9af23e899d9352bff32b09f0a766b2e,2024-11-26T20:15:32.723000
|
||||
CVE-2024-49053,1,1,2179c6b6568292f26d81b3fa8ba6b662e6a320c3040ff5d15e31aa2b4e7d89f1,2024-11-26T20:15:32.890000
|
||||
CVE-2024-49052,0,0,9bae9acd5c7b02cefbf1d308e6bd581bb9af23e899d9352bff32b09f0a766b2e,2024-11-26T20:15:32.723000
|
||||
CVE-2024-49053,0,0,2179c6b6568292f26d81b3fa8ba6b662e6a320c3040ff5d15e31aa2b4e7d89f1,2024-11-26T20:15:32.890000
|
||||
CVE-2024-49054,0,0,84397423f2138e5969b76a6c83810f4b99a1391260a93f325d00d80352009e27,2024-11-22T16:15:32.150000
|
||||
CVE-2024-49056,0,0,45909acaf00cd3c64a19d5557ee0abf98abf49c50825d0cd6a263c45cc01e6bc,2024-11-13T17:01:58.603000
|
||||
CVE-2024-4906,0,0,dcabb97348a8cb55b860a9e76b2d4e839fce25f207d8f1f73aadb53eff678110,2024-06-04T19:20:52.587000
|
||||
@ -266043,8 +266047,8 @@ CVE-2024-50265,0,0,1ed54aa12c79a7972b036d17c50c47230e289206d961c2c7dfd6207d0d05a
|
||||
CVE-2024-50266,0,0,95ff9b5066460be3989c53a7c341f648bc40b827c04067e2d54d1f7f8ab5ab65,2024-11-22T19:24:43.233000
|
||||
CVE-2024-50267,0,0,b18e823f7987bf2f207dbb94811263ba2f7cb694e3871f48c8cc2bf39fe9084e,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50268,0,0,8df12e1c63e8f4b2fbb1daa84c5b9f22105342f2b53e103ba693f5c7f0487ea3,2024-11-22T22:13:47.450000
|
||||
CVE-2024-50269,0,0,8323c61faee56c737a05015f9966818c21459120aea52312f8615493d5c7a806,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50270,0,0,de0c2b74725d3f77184b45e8c2fa523ce8c0a04fd792aa6d38d15d8a888a31ef,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50269,0,1,08dd3f234bbe0775aed81c63daa40d32c7fc72d3655c4eeaed98c1d9c9e8608e,2024-11-26T22:30:27.420000
|
||||
CVE-2024-50270,0,1,e2cebf6c38789da2746318179b61d916a4b8eb21545b04b6001b05e81a6abdea,2024-11-26T22:38:18.377000
|
||||
CVE-2024-50271,0,0,25e67dcdcaac1d1b7766f5d181e3b7f2dd861ec4a4f0c7dfcaa0d08af0270a66,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50272,0,0,308e2da4adde7597f20b391b8c5161c237cb61dc78e90a205c48ca737c0c2ad9,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50273,0,0,c0854e2cf4d87869e4f316f0635539df34535f3fc01dcf1e2819418e82f4cf08,2024-11-19T21:57:32.967000
|
||||
@ -266447,6 +266451,7 @@ CVE-2024-50919,0,0,96d1e7e2a2cdcfccdf316daebad3dec822716a2de360210bf13a25ffa2c24
|
||||
CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133d2,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000
|
||||
CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000
|
||||
CVE-2024-50942,1,1,204950dd3d65127a6e64f67cbe6c2f94576ed783d99742deba5414ec8440fade,2024-11-26T21:15:07.470000
|
||||
CVE-2024-5095,0,0,1588c0abfc34bbd50f97e7721e8e7ba42bb279c7cb42725ee04b715e36b1b7b7,2024-06-04T19:20:58.577000
|
||||
CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50956,0,0,12124e11e67fab80bf49da8101d4c3d956d958942d16765a9a0238618204ee2c,2024-11-25T20:15:09.383000
|
||||
@ -266514,7 +266519,7 @@ CVE-2024-51051,0,0,c7ef0493c2d4276c9149b3e33eb7aaae108f5af12de2e7c1eeff57f053b88
|
||||
CVE-2024-51053,0,0,547f4234840a3a665d09dfe19ab7c8fa9aef98812f3309513b65d89d07e3a169,2024-11-19T21:57:32.967000
|
||||
CVE-2024-51054,0,0,5f7e39a7aaba6174905b6372920760418cc96f41e26463faa8167a7c26d82367,2024-11-12T20:35:17.823000
|
||||
CVE-2024-51055,0,0,01ccd52478b3519c5dabbf4568ac988a576ee058f14d536ab175a95478255e40,2024-11-13T16:35:25.810000
|
||||
CVE-2024-51058,0,1,1df57f040875030030553978f3e0f00b2e4a262a66f0c6db8aba769ebceb1ee7,2024-11-26T20:15:33.253000
|
||||
CVE-2024-51058,0,0,1df57f040875030030553978f3e0f00b2e4a262a66f0c6db8aba769ebceb1ee7,2024-11-26T20:15:33.253000
|
||||
CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000
|
||||
CVE-2024-51060,0,0,402a659a58502cf6652d1569d08a8e1bb7141b9ef84b5e613167d10864e0cd4d,2024-11-01T17:35:08.443000
|
||||
CVE-2024-51063,0,0,9e69a8a911d8071b54e4574d5d702b1952770d32179ac558a313a9f533d2704b,2024-11-01T17:35:09.657000
|
||||
@ -266710,11 +266715,11 @@ CVE-2024-51559,0,0,012cd01c05c4ba6e65b05159404b8b3d15c6c6a7e22ab8d7d9ecb17fdd288
|
||||
CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000
|
||||
CVE-2024-51560,0,0,5b2c84d8610ec2edb11a42487f6e0689a8de9b9ddfab441dd6ac7032ac0dbce7,2024-11-08T15:18:23.127000
|
||||
CVE-2024-51561,0,0,d71b2d828707663b98815777acaed98461639611e766153c60c99f137da7ec5c,2024-11-06T15:59:22.287000
|
||||
CVE-2024-51562,0,0,71ed64daeb3a48db6a35fe7cf1ef95eb53eaf4759050cb63fc6db64a8eb5f695,2024-11-12T15:48:59.103000
|
||||
CVE-2024-51563,0,0,40f8f4edfe6f9d5c478374a76b4301281ced3ce8e4d0f90ffe9379c2abd32e91,2024-11-12T15:48:59.103000
|
||||
CVE-2024-51562,0,1,c805d83a581bbf92ca293c39a99ead80934f3b3940853bb4516425db54b5dd70,2024-11-26T21:15:07.710000
|
||||
CVE-2024-51563,0,1,92c830aea9cc36746b8169d37dc695eacf2da6658783e5b3ef929aee9225b722,2024-11-26T21:15:07.900000
|
||||
CVE-2024-51564,0,0,7c4ec509387167c29e69789f39909461cadca0b333c474f6f6db353456a1e070,2024-11-12T15:48:59.103000
|
||||
CVE-2024-51565,0,0,8328dccc66875095c16fdc6e805e5ce0383a91c04e800f1484dfae6d2bbb94f7,2024-11-12T15:48:59.103000
|
||||
CVE-2024-51566,0,0,097d7503de9262fa6c32cea6fce0dd60f1cc86a10c695ba52753bd5f0d9774a4,2024-11-12T15:48:59.103000
|
||||
CVE-2024-51565,0,1,a7ddfdb609c02584d7a89c3915e0de70c86be13e9f8ef270589ef24614c5ec64,2024-11-26T21:15:08.097000
|
||||
CVE-2024-51566,0,1,1fd52d54ba2a2afa1bd706d74deb2afeee5b314d5e4c8525c97ce6b09c31f06c,2024-11-26T21:15:08.313000
|
||||
CVE-2024-51567,0,0,9629c1871377d5b3a8fc7e24f37cf5fff8c7d9ecc5af9890fa03e865aa78aead,2024-11-08T21:14:28.807000
|
||||
CVE-2024-51568,0,0,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000
|
||||
CVE-2024-51569,0,0,25f5c04208462c5819edea4108c99da299cae21458308b4c3fe693806aa641df,2024-11-26T17:15:25.053000
|
||||
@ -267103,7 +267108,7 @@ CVE-2024-52001,0,0,ee27726a1c73b7b7f6e5760fe3ce79bb84c8b16431699361ef4c426b16c2d
|
||||
CVE-2024-52002,0,0,c00913d7259c42a7cc8354350f7a82513ce9d83d7bd5962c00b4cf14c2a1047a,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52004,0,0,5fa07d0a35480bd23f86ea684f2a0f66c5e4b9b2bf1fbc1961b6e8f9dcc625fa,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52007,0,0,9b9844f37c4a4c3cef932fa358d8594e2305c52695217b7622048372b9ab612f,2024-11-12T13:56:54.483000
|
||||
CVE-2024-52008,1,1,262060a233ecffd7ebab469c10cac8fdefe6653fedfb294b7540834b512d5966,2024-11-26T19:15:29.583000
|
||||
CVE-2024-52008,0,0,262060a233ecffd7ebab469c10cac8fdefe6653fedfb294b7540834b512d5966,2024-11-26T19:15:29.583000
|
||||
CVE-2024-52009,0,0,8bbf25e6f645e131b823aafb60173e6af960fce613c6d8dadc55e928f3ee2540,2024-11-12T13:56:54.483000
|
||||
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
|
||||
CVE-2024-52010,0,0,d43a8e44911599c95a271d1e93a8f7a1d15acd8bcb02bd0dfd80bd825c1bb964,2024-11-13T17:01:58.603000
|
||||
@ -267186,8 +267191,8 @@ CVE-2024-52317,0,0,8dd9cf0b2675d0151da3af6e2ac3dfaef7e6c1fd135283d8e3e44d96c5be7
|
||||
CVE-2024-52318,0,0,2bba437e59239c6e36ab9227be3e173d0f3c7cc38d614e024ac840e507a6b100,2024-11-18T17:11:17.393000
|
||||
CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000
|
||||
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
|
||||
CVE-2024-52336,0,1,5ed253ebd2a82ef5ea3ab5a60ad11f0bdb76616e1b68538042da9f8c97f4e20a,2024-11-26T19:15:29.747000
|
||||
CVE-2024-52337,0,1,23b4775368bbdf0dec045a90c06cd1e5b3e2f47d3699f76ca9bfb7e9368b5326,2024-11-26T19:15:30.013000
|
||||
CVE-2024-52336,0,0,5ed253ebd2a82ef5ea3ab5a60ad11f0bdb76616e1b68538042da9f8c97f4e20a,2024-11-26T19:15:29.747000
|
||||
CVE-2024-52337,0,0,23b4775368bbdf0dec045a90c06cd1e5b3e2f47d3699f76ca9bfb7e9368b5326,2024-11-26T19:15:30.013000
|
||||
CVE-2024-52339,0,0,a92fd5f858dc2ec0979f9ef9252c34f43da704c1fe29995d6e8479e981a2460e,2024-11-19T21:57:32.967000
|
||||
CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000
|
||||
CVE-2024-52340,0,0,1ce8f72307b0aab768065c6e681deaa5810d8249edcdb0269dd2cfb07a2d1504,2024-11-19T21:57:32.967000
|
||||
@ -267386,7 +267391,7 @@ CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db
|
||||
CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000
|
||||
CVE-2024-5267,0,0,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000
|
||||
CVE-2024-52675,0,0,dc005f40e646c27e5740398c3f6fdf61120f8160379ed2d6a5fe11413db7e190,2024-11-19T21:57:32.967000
|
||||
CVE-2024-52677,0,1,a5c88ce47454194627be2f8f1fe3df00ebe0da52945fee61c5f68cd7449a9b4e,2024-11-26T19:15:30.253000
|
||||
CVE-2024-52677,0,0,a5c88ce47454194627be2f8f1fe3df00ebe0da52945fee61c5f68cd7449a9b4e,2024-11-26T19:15:30.253000
|
||||
CVE-2024-5268,0,0,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000
|
||||
CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000
|
||||
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
|
||||
@ -267508,7 +267513,7 @@ CVE-2024-53068,0,0,95394cfc5f32c3da29765a2447a20db757db3b341b809b278465ed9fe936d
|
||||
CVE-2024-53069,0,0,f5c3dc08dd85594810e2e234abca83c46f325a99c8b12681eaf3a88411c504ff,2024-11-22T22:26:20.310000
|
||||
CVE-2024-5307,0,0,9f60aac251e2e03d9552a0394a9c798214f03b8e43e7cbb0dd9de3359653dec5,2024-08-23T15:00:25.687000
|
||||
CVE-2024-53070,0,0,fec68d2ee6c35b8e612d089a8a6513f0b9928e3c7c2d12bf0612c0d406c52a1b,2024-11-25T20:53:55.200000
|
||||
CVE-2024-53071,0,0,33ad5da8002c3a0c9d64e8ddebfeae85f88c55b0cbce70c328e8d7bd3f2534af,2024-11-19T21:56:45.533000
|
||||
CVE-2024-53071,0,1,61d13bc8f92f88f7e3ac52f493723ee812ca0248ca4e46ef131b1ec58bff7ff2,2024-11-26T22:18:28.540000
|
||||
CVE-2024-53072,0,0,0332baeadbc05760f2eeadfce70cde9f66b50aa5c32702b265f2b2cdce0b46d5,2024-11-25T20:43:08.187000
|
||||
CVE-2024-53073,0,0,c4a124687f16864cea7121ca6ff88c5bd41d1180fe09dd3878043c78bba7a9b6,2024-11-25T20:43:59.833000
|
||||
CVE-2024-53074,0,0,a5befe099246b6e79e3ccd6574afa6c7cdf657f4d54fbf716c577f3e4ea9a0be,2024-11-25T13:51:28.137000
|
||||
@ -267552,7 +267557,7 @@ CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f1
|
||||
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
|
||||
CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000
|
||||
CVE-2024-53262,0,0,b58ac4cb966f18ebf91dd1e51ed9015ec986a3fab28fed8c4a716894290c935b,2024-11-25T20:15:10.423000
|
||||
CVE-2024-53267,1,1,435aaf06f363b16b0f43f95542795183cec3885e1b1b20e743e59c33950fcb0f,2024-11-26T19:15:30.473000
|
||||
CVE-2024-53267,0,0,435aaf06f363b16b0f43f95542795183cec3885e1b1b20e743e59c33950fcb0f,2024-11-26T19:15:30.473000
|
||||
CVE-2024-53268,0,0,007aa1474b5fa3204d1321367c5c9ffff4ab0370ad189bb72596a6cd01d88cfa,2024-11-25T20:15:10.583000
|
||||
CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000
|
||||
CVE-2024-53278,0,0,1edc5c251ee4bcfedd995bcbf8c129ae024665a932e08b92e99c76ae653deb38,2024-11-26T05:15:10.563000
|
||||
@ -267566,7 +267571,7 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e
|
||||
CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
|
||||
CVE-2024-5335,0,0,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000
|
||||
CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000
|
||||
CVE-2024-53365,0,1,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000
|
||||
CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000
|
||||
CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000
|
||||
CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000
|
||||
CVE-2024-5339,0,0,f1bbd379636cfad5e34ec0ced69571115fae96e9b2078934f8d5d54e609ed8df,2024-06-04T19:21:05.273000
|
||||
@ -267590,7 +267595,7 @@ CVE-2024-5353,0,0,525ae1f28e269a2f910a2998894d881f94e776efad76469271fac08c213e4c
|
||||
CVE-2024-5354,0,0,2705d9995a32176e712249b570d9e2fb33b0b6cf2235d27d22b60367c7562ece,2024-06-04T19:21:05.783000
|
||||
CVE-2024-5355,0,0,5f2e376ce579cedaa86f2a16497e6e751e8e7c9f0422d5f739a3fa31c20b6848,2024-06-04T19:21:05.883000
|
||||
CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8998,2024-11-26T16:15:18.520000
|
||||
CVE-2024-53555,0,0,b5d118cdc7dca72641ddfd6fdd7368e354ebcb7e5193906f7f9f9d850b7e7164,2024-11-26T17:15:26.300000
|
||||
CVE-2024-53555,0,1,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000
|
||||
CVE-2024-53556,0,0,48f17862e47add857cc3012444f5820a601a669e2f1886efc4926c973e3aada3,2024-11-25T21:15:21.693000
|
||||
CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000
|
||||
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
|
||||
@ -267600,14 +267605,17 @@ CVE-2024-53597,0,0,9a4c545b5865d03e7d82c6ef3ae0f046b57734eab4f58e2724c4e5178d1b9
|
||||
CVE-2024-53599,0,0,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387ef2,2024-11-25T21:15:21.993000
|
||||
CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000
|
||||
CVE-2024-53619,1,1,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000
|
||||
CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000
|
||||
CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000
|
||||
CVE-2024-53620,1,1,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000
|
||||
CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000
|
||||
CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000
|
||||
CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000
|
||||
CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000
|
||||
CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000
|
||||
CVE-2024-5367,0,0,e1fb712fa137b32c2cb97597a93996bde7ebc629cee38f14d6c04ed9e1154407,2024-06-04T19:21:06.783000
|
||||
CVE-2024-53673,1,1,8beca8b67477421c60196128b074c2322a0a5c6d19f2ec4656a63ce59f1acb00,2024-11-26T22:15:18.547000
|
||||
CVE-2024-53674,1,1,8a5c79f209c5cbb54f78c6e00b940dec235442e0d5729a2a400739bbcabd981c,2024-11-26T22:15:18.713000
|
||||
CVE-2024-53675,1,1,01989df42cc3673d2d670cddd166ccee1a501522f5e01720638d33a9f30efa8c,2024-11-26T22:15:18.990000
|
||||
CVE-2024-5368,0,0,769eef522c880c8dc2093ffee3167938a54b59c296f29ac57c1d46dc08bc9b95,2024-06-04T19:21:06.887000
|
||||
CVE-2024-5369,0,0,29d3079c2fa6a7da6972686f223f9055b777de966536d115ae3b502886660c79,2024-06-07T20:15:12.487000
|
||||
CVE-2024-5370,0,0,8d5901c25d38686248547e2a8832556411ad40480084c4770850db2b44d5a57a,2024-06-04T19:21:06.980000
|
||||
@ -267626,14 +267634,14 @@ CVE-2024-5382,0,0,89de52ac46497e2894cab1bab1dd4b0e93975c2cd2d4911a68fe0b848c20cc
|
||||
CVE-2024-5383,0,0,d150bf26fb35d2a14ee1eb4bf942c0bdbcc9199cee0de8b154db204bf6e2357b,2024-06-20T20:15:20.457000
|
||||
CVE-2024-5384,0,0,73e6d40ec5d3477f7ae6e5e9fbabb11a01cb879f05dde3e0d9f2c2760497516c,2024-06-04T19:21:07.913000
|
||||
CVE-2024-53843,0,0,fb790ea92e56bce04d8543f109eb747d943f316d3eeab0b48f576ddbb2ed9eb5,2024-11-26T00:15:07.430000
|
||||
CVE-2024-53844,1,1,f54d4575fccfa45cb1306e55e04ed154008d30b320d65227acd00b96c54e3472,2024-11-26T19:15:31.463000
|
||||
CVE-2024-53844,0,0,f54d4575fccfa45cb1306e55e04ed154008d30b320d65227acd00b96c54e3472,2024-11-26T19:15:31.463000
|
||||
CVE-2024-5385,0,0,5113296fe5b95e2ca5ffa573f35631b642d4f934e6e56cfebf21d51c8e50ce86,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
|
||||
CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000
|
||||
CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000
|
||||
CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada266a,2024-11-26T18:23:09.517000
|
||||
CVE-2024-5390,0,0,577e03013c579fd5ea5c07b95a092cd4d32be3fa4130d25da9e61ffe468007ab,2024-06-04T19:21:08.020000
|
||||
CVE-2024-53901,0,1,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000
|
||||
CVE-2024-53901,0,0,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000
|
||||
CVE-2024-53909,0,0,0cc1acc764218c2cb52cd0a51a4c5a586232eafd17e1fbcd3dd59fcbec94b8eb,2024-11-26T16:15:19.210000
|
||||
CVE-2024-5391,0,0,a7c29f93c1b76aed47351138468a6c5b251b9f9a4ad39cf688118719a36ed1c7,2024-06-07T20:15:12.687000
|
||||
CVE-2024-53910,0,0,8e680173798cf8aba57b99387a23b6a832549a64c0d41791ee255a5fdf770d81,2024-11-26T16:15:19.597000
|
||||
@ -269281,7 +269289,7 @@ CVE-2024-7249,0,0,73974231501387b12eacc736781f51c9d8ec8d78fa61d8eb72875d86090b0d
|
||||
CVE-2024-7250,0,0,2714d196410008034281d23fd2726bb5d251b721e04c2e3643d0ed11cf2d609a,2024-08-20T14:58:56.213000
|
||||
CVE-2024-7251,0,0,e880a7a9378bf8b927f40852329063562fbba4ad5a97a9957dc1093c25591f2f,2024-08-20T15:00:02.603000
|
||||
CVE-2024-7252,0,0,490536b1b267bc05e09f33c429c150806f5477f059597f5cad78d37cad62a66a,2024-08-20T15:00:39.470000
|
||||
CVE-2024-7253,0,1,7f91c8e02eeb95aaf9a2f323d5aa05bf761bf6c98ff5a15ee0990bf815671c2a,2024-11-26T20:00:48.783000
|
||||
CVE-2024-7253,0,0,7f91c8e02eeb95aaf9a2f323d5aa05bf761bf6c98ff5a15ee0990bf815671c2a,2024-11-26T20:00:48.783000
|
||||
CVE-2024-7254,0,0,8400894e8711410825184771bcde9b50c684e58b49dfe4878e8d0a79485e219d,2024-09-20T12:30:17.483000
|
||||
CVE-2024-7255,0,0,4863127059f6d450bc39bc659baa7b1b6efaf5c368e1eb2bd96d7a11061a9c5b,2024-10-29T20:35:42.023000
|
||||
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
|
||||
@ -269373,7 +269381,7 @@ CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a
|
||||
CVE-2024-7349,0,0,1654fb20b3d5b8111af7165700d7dd7fc184ee1783ff4e6ae92268a2f53d23f5,2024-09-12T12:43:32.957000
|
||||
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7351,0,0,a289bf4a77945a66ead7c1b1e012c68ef66822055b6831555c4ba82ee4eaeaa9,2024-09-27T12:48:20.803000
|
||||
CVE-2024-7352,0,1,e4d4ad955d3c59da3ab42aaef824ffffa4cb01499887857f6e439d6dd19ea14b,2024-11-26T20:58:09.063000
|
||||
CVE-2024-7352,0,0,e4d4ad955d3c59da3ab42aaef824ffffa4cb01499887857f6e439d6dd19ea14b,2024-11-26T20:58:09.063000
|
||||
CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7354,0,0,baf29f5d594addfb563186459988c59d993893f0abd2b75dc7cd193297531f7d,2024-10-04T17:16:20.943000
|
||||
CVE-2024-7355,0,0,071610fbf603e9022aa74d299a7d28ffd46303d85d85cb60c4b41df2eba6145e,2024-08-07T15:17:46.717000
|
||||
@ -270006,7 +270014,7 @@ CVE-2024-8108,0,0,8f1cde3e4e080de95c0957ccbabc0a49f644f40a04612484228affb54375e5
|
||||
CVE-2024-8110,0,0,35b29aa278bc186f939dacbb87981e7b3283cd41ccc0818c634be4d5c87818aa,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8112,0,0,68d19c324dfb08f42fbaae63f6c41217ad9d464e632ed1f450780261e0cb818a,2024-09-12T18:23:22.507000
|
||||
CVE-2024-8113,0,0,955ebfeb47657ee688d94f4a91bdebad900106533d62e5ae0eb920a40b616cec,2024-09-12T18:21:30.677000
|
||||
CVE-2024-8114,1,1,842d7dca5f80d67866352fe392ded687555e122151e3fdce1e16886df3ea06d1,2024-11-26T19:15:31.660000
|
||||
CVE-2024-8114,0,0,842d7dca5f80d67866352fe392ded687555e122151e3fdce1e16886df3ea06d1,2024-11-26T19:15:31.660000
|
||||
CVE-2024-8117,0,0,8911918cea1d80613ef158836fc25c8d180447229a308c8b8d66c79bd51e5356,2024-09-06T16:04:23.413000
|
||||
CVE-2024-8118,0,0,d03bd1088dd7cb21afc11db9cdab895da8448f1f18598e5ee7682cb773fed419,2024-09-30T12:46:20.237000
|
||||
CVE-2024-8119,0,0,209c67cb8bfc8afcb7a4732dcac7c96ef9caf231c5c5c990646aa6c9fa168084,2024-09-06T16:11:02.370000
|
||||
@ -270062,7 +270070,7 @@ CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da68
|
||||
CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000
|
||||
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
|
||||
CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e5b,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8177,1,1,1bf56cf2fe712b296ae6a153ef045603d87fba98dea3681a70b0a646bcca8e0b,2024-11-26T19:15:31.860000
|
||||
CVE-2024-8177,0,0,1bf56cf2fe712b296ae6a153ef045603d87fba98dea3681a70b0a646bcca8e0b,2024-11-26T19:15:31.860000
|
||||
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
|
||||
CVE-2024-8180,0,0,1ef4988ada0861011caab53fe9c701222028221d2bc6840b7e69f2f294674651,2024-11-15T13:58:08.913000
|
||||
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
|
||||
@ -270071,7 +270079,7 @@ CVE-2024-8184,0,0,92c1db6b8911f83c9668ff411c9a02657286363b11f9f1292cd97f0715f9d1
|
||||
CVE-2024-8185,0,0,7c65c4010b87d247d013a7115e4f59c211e092ad2fcd015ff54dfb6b049399b9,2024-11-01T12:57:03.417000
|
||||
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
|
||||
CVE-2024-8189,0,0,63668eb3e5fc8ff94f956bfec9b936178c3cdc9b685d09571c582433c179a1da,2024-10-07T15:44:45.110000
|
||||
CVE-2024-8190,0,1,bfacb7a033fdf44fb1cd3aaa6f103e4dd6f39d005302b69dfafb5be0d617d12c,2024-11-26T19:55:46.433000
|
||||
CVE-2024-8190,0,0,bfacb7a033fdf44fb1cd3aaa6f103e4dd6f39d005302b69dfafb5be0d617d12c,2024-11-26T19:55:46.433000
|
||||
CVE-2024-8191,0,0,af2edabb2340196237a0a5f2ba571c0c8b12c14869cbef7778e55b204fc2e4fe,2024-09-12T21:50:39.507000
|
||||
CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
|
||||
CVE-2024-8194,0,0,0e377807b4cb936d43f2e66a722c2d573026df321eb087fd34789423400e78c7,2024-08-30T16:34:53.210000
|
||||
@ -270109,7 +270117,7 @@ CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff52
|
||||
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8235,0,0,5e9780352477158854c36359d48e25d3513888b0f7edea2fdcc69371ba803fc8,2024-11-12T17:15:11.197000
|
||||
CVE-2024-8236,0,0,d83e37a4387f403c8ae4ac666687d5e283b479c871e524201e239ed19c71c686,2024-11-26T14:15:22.217000
|
||||
CVE-2024-8237,1,1,03e54608d6780e5e7733b67aa48eeae1943a6eeb7dadf7f290f1af977d272d28,2024-11-26T19:15:32.033000
|
||||
CVE-2024-8237,0,0,03e54608d6780e5e7733b67aa48eeae1943a6eeb7dadf7f290f1af977d272d28,2024-11-26T19:15:32.033000
|
||||
CVE-2024-8239,0,0,9ef6151772b4426305cdb3a97d7dc90da8f7e43d6a503c000880c7bb8166db9a,2024-10-07T15:48:35.887000
|
||||
CVE-2024-8241,0,0,a45702ddf12409bcabe5a92099c2b574d3c26b3fd7159f1bd1748fa16b9a5652,2024-09-26T22:03:42.123000
|
||||
CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000
|
||||
@ -270453,7 +270461,7 @@ CVE-2024-8668,0,0,90710183c7816e44ddec8f6349762659d94ce20b0ef640d6ca49967da8f415
|
||||
CVE-2024-8669,0,0,a540528fa4f0bbb5defe17259c589787942e6df5d18ff3bf79d91bf53c9aac43,2024-09-27T16:08:15.487000
|
||||
CVE-2024-8671,0,0,44eb9fc4ae83bda74c805da6c8f69132f0b0ddef607b7afc290779058022b5c0,2024-09-26T16:38:24.447000
|
||||
CVE-2024-8675,0,0,0a13cc68010596bf1c90ba4332bda0b184424e4f46fdbd60b8270080d14a1a03,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8676,1,1,008b8e88841e8e64c3780ae3f5bcff892325720d29977e289c60212a896ca60d,2024-11-26T20:15:34.260000
|
||||
CVE-2024-8676,0,0,008b8e88841e8e64c3780ae3f5bcff892325720d29977e289c60212a896ca60d,2024-11-26T20:15:34.260000
|
||||
CVE-2024-8678,0,0,4b823977a9ffc10932161c4fd2e6fd149c78199fa23b7389b49b67f658769603,2024-10-02T19:06:48.983000
|
||||
CVE-2024-8680,0,0,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000
|
||||
CVE-2024-8681,0,0,2f5ab49d51db3e33ab9c3efe71286523b819481cc474a692b523b490549daba9,2024-10-04T19:04:49.490000
|
||||
@ -270623,7 +270631,7 @@ CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488
|
||||
CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000
|
||||
CVE-2024-8881,0,0,2d20e71b96fa8b3ff7e773e40c239e05324f6f9dc9c26aafb144057fa3241e82,2024-11-14T13:51:11.257000
|
||||
CVE-2024-8882,0,0,0ecc0d0a24c3fe939832f637ffae4f224e113185d3895ca1cbc077cff072f3c6,2024-11-14T13:42:12.347000
|
||||
CVE-2024-8883,0,1,89208240f72f901f0cac891c6f9d1a4a0b6583540e9cbf645ea4351f1eaefaf4,2024-11-26T19:15:32.253000
|
||||
CVE-2024-8883,0,0,89208240f72f901f0cac891c6f9d1a4a0b6583540e9cbf645ea4351f1eaefaf4,2024-11-26T19:15:32.253000
|
||||
CVE-2024-8884,0,0,bbe657acd3b81809e4c38d289d4690d33ce15843f154a38b409847ce2483e4ec,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8885,0,0,3d17cd6b07f76e6b7b78ee39290572c27afe08953d025655a317633960052841,2024-10-04T13:50:43.727000
|
||||
CVE-2024-8887,0,0,0407ca62fcbad308289f29aa7a81815bcc03d59968582f8cfbf5cd23bcc12817,2024-10-01T17:30:07.597000
|
||||
@ -270792,7 +270800,7 @@ CVE-2024-9109,0,0,ec61dc2450c54fef95e338be24d5065a8347a8851153518ae87fc77bce29b5
|
||||
CVE-2024-9110,0,0,1a461867668dc133a20a6da6763cb89c61062d9d68bd15e880bd01b64cd8f13f,2024-11-01T12:57:03.417000
|
||||
CVE-2024-9112,0,0,041f9d8d2aa7bfe571ea970a704ea054d76c428b5f552b64ecde79917a13dbb5,2024-11-22T22:15:19.863000
|
||||
CVE-2024-9113,0,0,b641d4ef8968240d0cb231ef67682fbe186b33f65613a2a82e17d25e833dfb00,2024-11-22T22:15:19.990000
|
||||
CVE-2024-9114,0,1,60b906f8f44fae8fcea1f0caf335eaffc083e04aca4866ccfb4f1332dddcb290,2024-11-26T20:58:01.907000
|
||||
CVE-2024-9114,0,0,60b906f8f44fae8fcea1f0caf335eaffc083e04aca4866ccfb4f1332dddcb290,2024-11-26T20:58:01.907000
|
||||
CVE-2024-9115,0,0,1c4e70138ee9590ca65c2e328b29e5a87d064a3f49c7286913d14c3952d00fc4,2024-10-01T13:47:25.403000
|
||||
CVE-2024-9116,0,0,6ad6ee3b57ea62c4d5b3e8fc83d1f8a6dcbcd94ec854a42b3db11ddd2d087efb,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9117,0,0,77f0703e7ba19b3d087cb3250573807a507cc3ac6f6e62f26867d41b190dba74,2024-10-01T13:56:55.893000
|
||||
@ -270957,7 +270965,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
|
||||
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
||||
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
|
||||
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9341,0,1,cbf7f69d2aea7a1faff7e32bbf5a574cf2e73bf527a5d9f8009007a9cbb31be9,2024-11-26T19:15:32.637000
|
||||
CVE-2024-9341,0,0,cbf7f69d2aea7a1faff7e32bbf5a574cf2e73bf527a5d9f8009007a9cbb31be9,2024-11-26T19:15:32.637000
|
||||
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
||||
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
||||
CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000
|
||||
@ -271008,7 +271016,7 @@ CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f46
|
||||
CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b23,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9407,0,1,a2517df6e9a0be178be5a557e35b107637a1394eda6a65130a4a0982a34bdce7,2024-11-26T19:15:32.847000
|
||||
CVE-2024-9407,0,0,a2517df6e9a0be178be5a557e35b107637a1394eda6a65130a4a0982a34bdce7,2024-11-26T19:15:32.847000
|
||||
CVE-2024-9409,0,0,3e506ee5c668e864fe32d06ea4b7a74953a7f1e2f6b3e039755ec706eb3daca9,2024-11-19T15:59:21.690000
|
||||
CVE-2024-9410,0,0,5bec151d8e893e44b70a96e00c59b851f21a71304a48571095d7551a53538240,2024-11-22T19:57:28.770000
|
||||
CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000
|
||||
@ -271058,7 +271066,7 @@ CVE-2024-9470,0,0,13c3a583553fbf2e90723a5a0ed6f2354808c5a1753993b658aba04d0ed9b2
|
||||
CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000
|
||||
CVE-2024-9472,0,0,6dc75bb8c902376e1f062a26c7a99982f272de37330a03e0fbfe9796bed76fac,2024-11-15T13:58:08.913000
|
||||
CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000
|
||||
CVE-2024-9474,0,1,289b7014b673ee54a94f6f35e0f3d8595096fe993d8f61499f7625b54ec1bb22,2024-11-26T19:55:09.117000
|
||||
CVE-2024-9474,0,0,289b7014b673ee54a94f6f35e0f3d8595096fe993d8f61499f7625b54ec1bb22,2024-11-26T19:55:09.117000
|
||||
CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9476,0,0,e9d7dbd43229ebc9ea9972271d753666a58d144ea232688064d92b4b52fc9277,2024-11-15T14:00:09.720000
|
||||
CVE-2024-9477,0,0,cf43e95350fa7037b016e95ffdd76723a0091878a7d1f39dfbb116076ef07df2,2024-11-15T22:54:21.233000
|
||||
@ -271182,7 +271190,7 @@ CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615
|
||||
CVE-2024-9649,0,0,f2ab83afff02bfae827ac0ac8958125c0d2707e9b7d72806aa0e09daf73ca0d7,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9650,0,0,c785e5c8b40ec3a7d0b9a0e25f6978363c5dcc2fc6507b9c6a2c03a208ac34e9,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93b5,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9653,0,1,f158e4ac0dd55a24d4b3927fa7e93113f3b2a80fd6a1d97e078c1fc3c150282b,2024-11-26T20:37:07.913000
|
||||
CVE-2024-9653,0,0,f158e4ac0dd55a24d4b3927fa7e93113f3b2a80fd6a1d97e078c1fc3c150282b,2024-11-26T20:37:07.913000
|
||||
CVE-2024-9655,0,0,5f64b0ed215cc4c47eaa212ce6a6578c092759946c6128b0f32509f44691e359,2024-11-01T12:57:03.417000
|
||||
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9657,0,0,fb687953042b10eb922558cb840c65de9e3c4da22e7016c1d2e6ab79c6132615,2024-11-08T16:00:28.320000
|
||||
@ -271198,7 +271206,7 @@ CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d
|
||||
CVE-2024-9675,0,0,eca475b135003e7e06db8f69f6d2f142dd27c257379e7a0b16967a90dcf42a39,2024-11-13T08:15:03.170000
|
||||
CVE-2024-9676,0,0,f87bebf8f4fe552507220e4e3a39d7cfe81d27fa23e0e0624f2c2714aabd7dd0,2024-11-26T09:15:06.820000
|
||||
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
|
||||
CVE-2024-9680,0,1,b270ebb58405bce82b545a9823e949fa4790116b7a4834e574606834227d9216,2024-11-26T19:53:56.537000
|
||||
CVE-2024-9680,0,0,b270ebb58405bce82b545a9823e949fa4790116b7a4834e574606834227d9216,2024-11-26T19:53:56.537000
|
||||
CVE-2024-9681,0,0,8b924b450d4a6dbb27601fbb04f08d88c9285a0a1a67208f21518dfaaa0a72ba,2024-11-25T19:52:56.417000
|
||||
CVE-2024-9682,0,0,2122d85927443e1998d90f1dfaf0e30f87a59df9f9140f4f34d3cb7460150d67,2024-11-19T15:47:07.517000
|
||||
CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f185407,2024-10-18T12:52:33.507000
|
||||
@ -271254,22 +271262,22 @@ CVE-2024-9747,0,0,fc3d51dc8394edfbc7d16d5783941a46020e3f284171391bbe3e210537b65d
|
||||
CVE-2024-9748,0,0,f1e93b3eb60a7a8af523dfc1a78d2562ae57bb30b46f9d7831074773fc675812,2024-11-25T16:16:04.847000
|
||||
CVE-2024-9749,0,0,b4a4cb7a7e2ed29494903739f7dedc0d0b628bc8a0612acc9ffa95655d50faa7,2024-11-25T18:58:36.077000
|
||||
CVE-2024-9750,0,0,b9834307df005e23383f64807f9952be6f1581f4da2b061556c1b01793c8d0bc,2024-11-26T11:29:45.227000
|
||||
CVE-2024-9751,0,1,10aaedcd9679bdbe27e298fdf43197176e7bad9d15aa895478fabe765d9486d3,2024-11-26T20:57:50.440000
|
||||
CVE-2024-9752,0,1,19932aeceed280f17f75f54904af94400cfb19139e06595e8a2c62ce600f4e25,2024-11-26T20:57:56.567000
|
||||
CVE-2024-9753,0,1,547fe84dbc9a776d9680bee95abcc80bf49f9dd54557481b00719544c663691e,2024-11-26T20:58:47.057000
|
||||
CVE-2024-9754,0,1,9f3e12a1e561ea0784c4cd833d62f6802d20f60828a325243796091201d1a790,2024-11-26T20:55:13.947000
|
||||
CVE-2024-9755,0,1,24e038adfb46b922e533701928c866826e861132bf403a6eb358b06cee518262,2024-11-26T20:53:47.730000
|
||||
CVE-2024-9751,0,0,10aaedcd9679bdbe27e298fdf43197176e7bad9d15aa895478fabe765d9486d3,2024-11-26T20:57:50.440000
|
||||
CVE-2024-9752,0,0,19932aeceed280f17f75f54904af94400cfb19139e06595e8a2c62ce600f4e25,2024-11-26T20:57:56.567000
|
||||
CVE-2024-9753,0,0,547fe84dbc9a776d9680bee95abcc80bf49f9dd54557481b00719544c663691e,2024-11-26T20:58:47.057000
|
||||
CVE-2024-9754,0,0,9f3e12a1e561ea0784c4cd833d62f6802d20f60828a325243796091201d1a790,2024-11-26T20:55:13.947000
|
||||
CVE-2024-9755,0,0,24e038adfb46b922e533701928c866826e861132bf403a6eb358b06cee518262,2024-11-26T20:53:47.730000
|
||||
CVE-2024-9756,0,0,9148e76585a16c910e97a54325b51f8747273a547943c29c001cb0cc296240e9,2024-11-25T20:49:23.220000
|
||||
CVE-2024-9757,0,1,34122ba71eb2981a92b4c13928c0a3327909071af6c2b1956bc8ab93f391c8ec,2024-11-26T20:53:19.560000
|
||||
CVE-2024-9758,0,1,ec8d0a77bd28e88fbf6c54993123b2135cbce2cd133a87e8acbf579d9bc463d3,2024-11-26T20:41:51.187000
|
||||
CVE-2024-9759,0,1,10fefaf19e1f85c2845b971df45d1db31a4a6e054105f6c73e98e35c6908849c,2024-11-26T20:57:23.673000
|
||||
CVE-2024-9757,0,0,34122ba71eb2981a92b4c13928c0a3327909071af6c2b1956bc8ab93f391c8ec,2024-11-26T20:53:19.560000
|
||||
CVE-2024-9758,0,0,ec8d0a77bd28e88fbf6c54993123b2135cbce2cd133a87e8acbf579d9bc463d3,2024-11-26T20:41:51.187000
|
||||
CVE-2024-9759,0,0,10fefaf19e1f85c2845b971df45d1db31a4a6e054105f6c73e98e35c6908849c,2024-11-26T20:57:23.673000
|
||||
CVE-2024-9760,0,0,aa01c828c1d3b49b761ec3f545ef583aa282f8735c2dc21b19b0e05a61a2ca4b,2024-11-22T21:15:30.040000
|
||||
CVE-2024-9761,0,0,d2512f64c45793f73d1e20c8ddda7ef83f5025df5cbdd0602f8eaedc25a949ca,2024-11-22T21:15:30.160000
|
||||
CVE-2024-9762,0,0,137ce8e38ce809e5b89f7e56334ef2f813429eef86208bf3924e76e0dd499450,2024-11-22T21:15:30.277000
|
||||
CVE-2024-9763,0,0,773a0cffd511db6422d452dc98b5722990978885d04c21ac7b68dcdff9ecc30f,2024-11-22T21:15:30.390000
|
||||
CVE-2024-9764,0,1,4be58d530095ebbcafcf00aa99a1173dba0d7e35762e0c5d28cb5cc2f8777b1d,2024-11-26T20:58:05.673000
|
||||
CVE-2024-9764,0,0,4be58d530095ebbcafcf00aa99a1173dba0d7e35762e0c5d28cb5cc2f8777b1d,2024-11-26T20:58:05.673000
|
||||
CVE-2024-9766,0,0,aa66736d1aeec3fffcc76a5f37d23ae872ad3f7840ea99138bc3fe34e230cd86,2024-11-26T15:10:00.193000
|
||||
CVE-2024-9767,0,1,3d175e3ba02a23000ec8b1bdae9aa7548e49e410977d95948238e9a5d9107530,2024-11-26T20:57:03.197000
|
||||
CVE-2024-9767,0,0,3d175e3ba02a23000ec8b1bdae9aa7548e49e410977d95948238e9a5d9107530,2024-11-26T20:57:03.197000
|
||||
CVE-2024-9768,0,0,904cffc60d5e826fadde1f9279bf1637d0038b817b76c6a013f678cc172cfc96,2024-11-26T17:14:14.327000
|
||||
CVE-2024-9772,0,0,043bc7caa6859562432d521f3501fd215394ad297fe3470375010095d76d8604,2024-11-25T20:03:01.613000
|
||||
CVE-2024-9775,0,0,2266a7b7c620bc11662bc20c96e5d18079c0f9f6e1ea844a74a70c443b303718,2024-11-26T01:45:57.317000
|
||||
@ -271405,8 +271413,8 @@ CVE-2024-9936,0,0,e24713274a06b54c6fb1a28ab183fd20a2323a432a191511c12e0c56155c7d
|
||||
CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9938,0,0,6d537cf2be13384f825f1d7433911745cb0151af95c01ffe257651ffb963013d,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000
|
||||
CVE-2024-9941,0,1,d633ffffc2f4c25faee0db82c023ae55165f28a8b2f6bf87d32b3fb39f9e149f,2024-11-26T19:37:15.283000
|
||||
CVE-2024-9942,0,1,128447087f45f7ac6081cfd7229d7be978532373122af878963b5f544cd226e7,2024-11-26T19:33:35.843000
|
||||
CVE-2024-9941,0,0,d633ffffc2f4c25faee0db82c023ae55165f28a8b2f6bf87d32b3fb39f9e149f,2024-11-26T19:37:15.283000
|
||||
CVE-2024-9942,0,0,128447087f45f7ac6081cfd7229d7be978532373122af878963b5f544cd226e7,2024-11-26T19:33:35.843000
|
||||
CVE-2024-9943,0,0,2b1bd0bf17ad8265b1c648445115c5e7c1a49eb398158e5a8ef4b45ea9c6d38b,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000
|
||||
CVE-2024-9946,0,0,65ddbb5091a555b3d45b6435f0c0f970788d2fb0577e4d2af4202005a3cb21de,2024-11-08T20:38:07.557000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user