Auto-Update: 2024-12-04T03:00:37.209220+00:00

This commit is contained in:
cad-safe-bot 2024-12-04 03:03:46 +00:00
parent 4693c248e9
commit f8f8db1f17
21 changed files with 744 additions and 25 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45727",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-10-18T10:15:08.643",
"lastModified": "2024-12-02T19:15:08.390",
"lastModified": "2024-12-04T02:00:02.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
}
]
},
"cisaExploitAdd": "2024-12-03",
"cisaActionDue": "2024-12-24",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "North Grid Proself Improper Restriction of XML External Entity (XEE) Reference Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11079",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-12T00:15:15.543",
"lastModified": "2024-11-12T13:55:21.227",
"lastModified": "2024-12-04T02:15:04.100",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 3.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:10770",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-11079",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-11479",
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"published": "2024-12-04T01:15:04.650",
"lastModified": "2024-12-04T01:15:04.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A HTML Injection vulnerability was identified in Issuetrak version 17.1 that could be triggered by an authenticated user. HTML markup could be added to comments of tickets, which when submitted will render in the \nemails sent to all users on that ticket."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://helpcenter.issuetrak.com/home/2340-issuetrak-release-notes",
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11667",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-11-27T10:15:04.210",
"lastModified": "2024-11-28T03:15:14.943",
"vulnStatus": "Received",
"lastModified": "2024-12-04T02:00:02.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -39,6 +39,10 @@
}
]
},
"cisaExploitAdd": "2024-12-03",
"cisaActionDue": "2024-12-24",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Zyxel Multiple Firewalls Path Traversal Vulnerability",
"weaknesses": [
{
"source": "security@zyxel.com.tw",

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-11680",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-11-26T10:15:04.540",
"lastModified": "2024-11-26T10:15:04.540",
"vulnStatus": "Received",
"lastModified": "2024-12-04T02:00:02.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -38,6 +39,10 @@
}
]
},
"cisaExploitAdd": "2024-12-03",
"cisaActionDue": "2024-12-24",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "ProjectSend Improper Authentication Vulnerability",
"weaknesses": [
{
"source": "disclosure@vulncheck.com",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11985",
"sourceIdentifier": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
"published": "2024-12-04T02:15:04.237",
"lastModified": "2024-12-04T02:15:04.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper input validation vulnerability leads to device crashes in certain ASUS router models. \nRefer to the '12/03/2024 ASUS Router Improper Input Validation' section on the ASUS Security Advisory for more information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.asus.com/content/asus-product-security-advisory/",
"source": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-40717",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:04.410",
"lastModified": "2024-12-04T02:15:04.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Backup & Replication allows a low-privileged user with certain roles to perform remote code execution (RCE) by updating existing jobs. These jobs can be configured to run pre- and post-scripts, which can be located on a network share and are executed with elevated privileges by default. The user can update a job and schedule it to run almost immediately, allowing arbitrary code execution on the server."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42449",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:04.533",
"lastModified": "2024-12-04T02:15:04.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4679",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42451",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:04.643",
"lastModified": "2024-12-04T02:15:04.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Backup & Replication allows low-privileged users to leak all saved credentials in plaintext. This is achieved by calling a series of methods over an external protocol, ultimately retrieving the credentials using a malicious setup on the attacker's side. This exposes sensitive data, which could be used for further attacks, including unauthorized access to systems managed by the platform."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42452",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:04.747",
"lastModified": "2024-12-04T02:15:04.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42453",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:04.837",
"lastModified": "2024-12-04T02:15:04.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability Veeam Backup & Replication allows low-privileged users to control and modify configurations on connected virtual infrastructure hosts. This includes the ability to power off virtual machines, delete files in storage, and make configuration changes, potentially leading to Denial of Service (DoS) and data integrity issues. The vulnerability is caused by improper permission checks in methods accessed via management services."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42455",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:04.937",
"lastModified": "2024-12-04T02:15:04.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Backup & Replication allows a low-privileged user to connect to remoting services and exploit insecure deserialization by sending a serialized temporary file collection. This exploit allows the attacker to delete any file on the system with service account privileges. The vulnerability is caused by an insufficient blacklist during the deserialization process."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42456",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.033",
"lastModified": "2024-12-04T02:15:05.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Backup & Replication platform allows a low-privileged user with a specific role to exploit a method that updates critical configuration settings, such as modifying the trusted client certificate used for authentication on a specific port. This can result in unauthorized access, enabling the user to call privileged methods and initiate critical services. The issue arises due to insufficient permission requirements on the method, allowing users with low privileges to perform actions that should require higher-level permissions."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-42457",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.133",
"lastModified": "2024-12-04T02:15:05.133",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Backup & Replication allows users with certain operator roles to expose saved credentials by leveraging a combination of methods in a remote management interface. This can be achieved using a session object that allows for credential enumeration and exploitation, leading to the leak of plaintext credentials to a malicious host. The attack is facilitated by improper usage of a method that allows operators to add a new host with an attacker-controlled IP, enabling them to retrieve sensitive credentials in plaintext."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-45204",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.233",
"lastModified": "2024-12-04T02:15:05.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists where a low-privileged user can exploit insufficient permissions in credential handling to leak NTLM hashes of saved credentials. The exploitation involves using retrieved credentials to expose sensitive NTLM hashes, impacting systems beyond the initial target and potentially leading to broader security vulnerabilities."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-45205",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.323",
"lastModified": "2024-12-04T02:15:05.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Certificate Validation on the UniFi iOS App managing a standalone UniFi Access Point (not using UniFi Network Application) could allow a malicious actor with access to an adjacent network to take control of this UniFi Access Point.\n\n\nAffected Products:\nUniFi iOS App (Version 10.17.7 and earlier) \n \nMitigation:\nUniFi iOS App (Version 10.18.0 or later)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://community.ui.com/releases/UniFi-iOS-10-18-0/42f02428-544c-4626-b5b3-5ae40308edc7",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-45206",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.427",
"lastModified": "2024-12-04T02:15:05.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Service Provider Console has been identified, which allows to perform arbitrary HTTP requests to arbitrary hosts of the network and get information about internal resources."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4649",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-45207",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-12-04T02:15:05.520",
"lastModified": "2024-12-04T02:15:05.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DLL injection in Veeam Agent for Windows can occur if the system's PATH variable includes insecure locations. When the agent runs, it searches these directories for necessary DLLs. If an attacker places a malicious DLL in one of these directories, the Veeam Agent might load it inadvertently, allowing the attacker to execute harmful code. This could lead to unauthorized access, data theft, or disruption of services"
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4693",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53916",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-25T00:15:04.423",
"lastModified": "2024-11-27T17:15:15.127",
"lastModified": "2024-12-04T02:15:05.623",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -51,6 +51,10 @@
{
"url": "https://review.opendev.org/q/project:openstack/neutron",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/12/03/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-04T00:55:49.235388+00:00
2024-12-04T03:00:37.209220+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-03T23:15:04.627000+00:00
2024-12-04T02:15:05.623000+00:00
```
### Last Data Feed Release
@ -27,26 +27,44 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-12-03T01:00:10.059043+00:00
2024-12-04T01:00:10.096689+00:00
```
### Total Number of included CVEs
```plain
272032
272046
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `14`
- [CVE-2024-46624](CVE-2024/CVE-2024-466xx/CVE-2024-46624.json) (`2024-12-03T23:15:04.627`)
- [CVE-2024-11479](CVE-2024/CVE-2024-114xx/CVE-2024-11479.json) (`2024-12-04T01:15:04.650`)
- [CVE-2024-11985](CVE-2024/CVE-2024-119xx/CVE-2024-11985.json) (`2024-12-04T02:15:04.237`)
- [CVE-2024-40717](CVE-2024/CVE-2024-407xx/CVE-2024-40717.json) (`2024-12-04T02:15:04.410`)
- [CVE-2024-42449](CVE-2024/CVE-2024-424xx/CVE-2024-42449.json) (`2024-12-04T02:15:04.533`)
- [CVE-2024-42451](CVE-2024/CVE-2024-424xx/CVE-2024-42451.json) (`2024-12-04T02:15:04.643`)
- [CVE-2024-42452](CVE-2024/CVE-2024-424xx/CVE-2024-42452.json) (`2024-12-04T02:15:04.747`)
- [CVE-2024-42453](CVE-2024/CVE-2024-424xx/CVE-2024-42453.json) (`2024-12-04T02:15:04.837`)
- [CVE-2024-42455](CVE-2024/CVE-2024-424xx/CVE-2024-42455.json) (`2024-12-04T02:15:04.937`)
- [CVE-2024-42456](CVE-2024/CVE-2024-424xx/CVE-2024-42456.json) (`2024-12-04T02:15:05.033`)
- [CVE-2024-42457](CVE-2024/CVE-2024-424xx/CVE-2024-42457.json) (`2024-12-04T02:15:05.133`)
- [CVE-2024-45204](CVE-2024/CVE-2024-452xx/CVE-2024-45204.json) (`2024-12-04T02:15:05.233`)
- [CVE-2024-45205](CVE-2024/CVE-2024-452xx/CVE-2024-45205.json) (`2024-12-04T02:15:05.323`)
- [CVE-2024-45206](CVE-2024/CVE-2024-452xx/CVE-2024-45206.json) (`2024-12-04T02:15:05.427`)
- [CVE-2024-45207](CVE-2024/CVE-2024-452xx/CVE-2024-45207.json) (`2024-12-04T02:15:05.520`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `5`
- [CVE-2023-45727](CVE-2023/CVE-2023-457xx/CVE-2023-45727.json) (`2024-12-04T02:00:02.410`)
- [CVE-2024-11079](CVE-2024/CVE-2024-110xx/CVE-2024-11079.json) (`2024-12-04T02:15:04.100`)
- [CVE-2024-11667](CVE-2024/CVE-2024-116xx/CVE-2024-11667.json) (`2024-12-04T02:00:02.410`)
- [CVE-2024-11680](CVE-2024/CVE-2024-116xx/CVE-2024-11680.json) (`2024-12-04T02:00:02.410`)
- [CVE-2024-53916](CVE-2024/CVE-2024-539xx/CVE-2024-53916.json) (`2024-12-04T02:15:05.623`)
## Download and Usage

View File

@ -234704,7 +234704,7 @@ CVE-2023-45722,0,0,4240dd682886c768ab9b9a025ce52687e223d3b5bc66b3a8ef1362427eaf3
CVE-2023-45723,0,0,d75569efe29622a0fceee924d9f808ceeedc0897b5e709cd04faad485aeb7c09,2024-01-09T18:52:37.707000
CVE-2023-45724,0,0,d957afe86c592e8319388b49220462c05dc155b1c149c8e2b8f7290372cc8a41,2024-01-09T18:34:41.837000
CVE-2023-45725,0,0,4be92db793dd202daa1a3bc98875d9a583e5498eb2cacfe9e3765b156e332912,2023-12-20T18:32:15.360000
CVE-2023-45727,0,0,f1e978bfdbac20d70116743d7e239fd9d61802cf9fcce1a1bef0439bb8e689df,2024-12-02T19:15:08.390000
CVE-2023-45727,0,1,991a37c6085d2ca4438ad04bc42df3d6720bc6a7ce42792ad8991a36e1444693,2024-12-04T02:00:02.410000
CVE-2023-4573,0,0,8c2c56b4c0641002c802a71d0b3ecc92540f29cc9ee6db1aabe5f4a00eb5a7e0,2024-10-21T13:55:03.510000
CVE-2023-45733,0,0,b0aa2fba9e6a64d0852357607afb3a43fdbb4b3413ce5b91e26ae220829c70ff,2024-05-17T18:36:05.263000
CVE-2023-45734,0,0,bcdee8c11a0e8a4792b5d7f342842becf89dbf6ffedf6c74619e3ac3b10011b3,2024-09-09T12:21:53.383000
@ -243451,7 +243451,7 @@ CVE-2024-11075,0,0,bc3576f7cdab8a82d587bd89d8d1e420af0160b46c59231e96fc19bf4574d
CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000
CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000
CVE-2024-11078,0,0,abad9b33001ef60199c52815d5891e21a7644c7086b795500231800d403c0c98,2024-11-23T01:26:39.680000
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
CVE-2024-11079,0,1,87360400b05f65e57c76d4f1cf85630018b92cfd2e2d149a775a69b292e0c722,2024-12-04T02:15:04.100000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
CVE-2024-11082,0,0,f9fa5a63fbb16e18e205a5f1c4fad7a7bb7dee27246b1154c77f92ef456bebf4,2024-11-28T10:15:05.973000
@ -243653,6 +243653,7 @@ CVE-2024-11461,0,0,ddca8d6b2db926cfca3eee24bf3b6aa5eb08e9faad161d3c0076b0f9ecc87
CVE-2024-11463,0,0,ec04c7e81fa0a01468a3fa77b8e3ee0a2d478d739fbf8b7cd12d4c8bed3fd0d3,2024-11-23T04:15:08.893000
CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000
CVE-2024-11477,0,0,47ede4582a757f3d8a2482f5720bb8d1160cb660e47ba0cb5bbe4f95d03eaff1,2024-11-22T21:15:08.613000
CVE-2024-11479,1,1,982324963f23f6a4954523d0a7c470a8a11360056b0cba3cc1c659bab66e2dca,2024-12-04T01:15:04.650000
CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000
CVE-2024-11481,0,0,8e5e55bb376441c78c762a89cc49bf1f3b6da73e704a5c7ee9912cb90285c63f,2024-11-29T08:15:04.270000
CVE-2024-11482,0,0,ee8d4d41df373a65335b4ec1980ebf42416530fe89bbd321e8718f997fff25eb,2024-11-29T08:15:04.437000
@ -243797,7 +243798,7 @@ CVE-2024-11663,0,0,3626413ca3e66966b7d786a611d25e545ae4de59326fcb8c9442c9f727c44
CVE-2024-11664,0,0,f7e3e3893aefbf47475119b5cc15d35a6bf3fef30ce727b8b58d082d350666b1,2024-11-25T09:15:06.800000
CVE-2024-11665,0,0,432484acd0139af98341fd7fe90b0662197ea5956295af2989047d68fc0277cd,2024-11-25T00:15:03.957000
CVE-2024-11666,0,0,a7e124e4e7b7bca398eeda63d114e258fa78223da80e0f950915de9498ee814c,2024-12-03T15:40:14.907000
CVE-2024-11667,0,0,623b49dca2a1a534ffbd8f116339108bc3210c6b3403e4c93f0e00df5d59fcc7,2024-11-28T03:15:14.943000
CVE-2024-11667,0,1,de0c11a87d2ca2552722880f013198690865f3d7a4b8c44eb443085c54a28213,2024-12-04T02:00:02.410000
CVE-2024-11668,0,0,76595504dbd2b64d21bcff47f11c8e8cc91ab680fc6cee5f2ffc1737d953cc2b,2024-11-26T19:15:22.027000
CVE-2024-11669,0,0,a5de8e98bfb8b633c540619e4d481ef856cf620fef729b0da27716832b9fbae5,2024-11-26T19:15:22.367000
CVE-2024-1167,0,0,ed50fa0852f2fbdcdff47243517d528056863b720fcd10bdada66efed3504e8a,2024-02-09T20:20:51.900000
@ -243811,7 +243812,7 @@ CVE-2024-11676,0,0,f392dfd9826e93a448876b58c11dd57692e60ef66dea1497a579c04b0a862
CVE-2024-11677,0,0,bec0246a25d1d0f879cebd6a36394d0ed570224b28f9e2943efe30510e8f593e,2024-11-26T02:15:17.437000
CVE-2024-11678,0,0,e780942a86d65f83e2cb7cc5d04e0a3676e4919574029bbf616d3d9c8bbb8b98,2024-11-26T02:15:18.090000
CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000
CVE-2024-11680,0,0,e59e07fcd0f2caeb9f7525587364f8cd5a94ad91992448a2d5730a3a3fe6f61e,2024-11-26T10:15:04.540000
CVE-2024-11680,0,1,1415befe3c792193abfef469dafa7463a81c8604ddd2ae59420450f5f0258ce0,2024-12-04T02:00:02.410000
CVE-2024-11684,0,0,9f2fe09eb8e335ba8391a949cbf48c636db8bb7de80a47009590f5cdfa3e8218,2024-11-28T09:15:04.793000
CVE-2024-11685,0,0,2626aaa1c85fe00c7037f15a9af93889a5b226726b04ceaddbef8ece377d16ab,2024-11-28T09:15:04.950000
CVE-2024-1169,0,0,a43d6b50f47e310e039f1575550f9d1fe159a31a77f5a57027ebd3dc489ff540,2024-03-07T13:52:27.110000
@ -243922,6 +243923,7 @@ CVE-2024-11980,0,0,53030f13a902b0b9441afc123e93625bdc498bd33e263974c562a2dd80862
CVE-2024-11981,0,0,be6ee509d3f8872b5ca890261b250c30bf07582770ed0b1b95babded2d99f722,2024-11-29T07:15:05.760000
CVE-2024-11982,0,0,179284d056dff6c909d9fc5ba2e2b2097bba6ddfe2e4e1f84392ff9837f41426,2024-11-29T08:15:04.580000
CVE-2024-11983,0,0,1494cd6825cb1279c1c5cc1f6b3f60736092f3a2dc6c2ab58516f5286cd35a62,2024-11-29T08:15:04.733000
CVE-2024-11985,1,1,239fb5b0fc3eff87ce338f1355a3d7f02bbf3154ef26b14b09dcb67a7c0032ac,2024-12-04T02:15:04.237000
CVE-2024-1199,0,0,9a04e528b30ee4387e68bb38a7f1be0392a71f3796108477e123a7601c79c0fa,2024-05-17T02:35:18.570000
CVE-2024-11990,0,0,0ea61f760bb00d4ee0bb54c1c5f4898913a822219e93c4dad86c6424a909019a,2024-11-29T13:15:04.170000
CVE-2024-11992,0,0,dec6f82d309a9ca3d0c0e65e3be01067bf6c8b19cbafb67c3c3b2120ec9fbb36,2024-11-29T13:15:05.210000
@ -260038,6 +260040,7 @@ CVE-2024-40712,0,0,13e543cc686398f3c8419eccd56010fa5d852cb01dea206b96fd66d93750d
CVE-2024-40713,0,0,b0004a2bd5f30f1a9576b70810c52f5ea89a7a061fd80c3935d835b3783f9659,2024-09-09T15:35:08.970000
CVE-2024-40714,0,0,f897329e6d3274f2479b6f6e44dee56074d5f4a018723070ced09d6042c2b392,2024-09-09T14:35:02.980000
CVE-2024-40715,0,0,df61c6529849625d1f3a053a6cfc3e786903ff3512f65a3e3f287e8eb153e954,2024-11-08T19:01:03.880000
CVE-2024-40717,1,1,6f0d7609fa8436d259b5647d9897dcd743467f21693f0ebd601e76804e8fdb05,2024-12-04T02:15:04.410000
CVE-2024-40718,0,0,3ffebe0c7f372ce68857560a263d6a8e02c6da5dc3c7a565c55f85e729c7a3f1,2024-09-09T14:35:03.723000
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
@ -261349,8 +261352,15 @@ CVE-2024-42440,0,0,19ccc0e809e3e2bf1e830128a29110680f7fa87923d96851d116e1e89bcae
CVE-2024-42441,0,0,f25ce01d00bee15651b5d0ef3b027baaf54cad0dca0cb0ace6ef530480ea5aeb,2024-08-28T23:58:06.960000
CVE-2024-42442,0,0,53ea257a52f1903433f9fa480671838b425218e9c813ae379edc5d6477416529,2024-11-12T15:48:59.103000
CVE-2024-42447,0,0,68027c21ffcefe32f56a7a559d44cc2a1c6b0b32c4ec80fa56a1f1b8e20a917b,2024-08-30T17:35:29.533000
CVE-2024-42449,1,1,93ae5a9efbde414e281cd627ced690929dfd66984137b36a33df38cc4aac3741,2024-12-04T02:15:04.533000
CVE-2024-4245,0,0,bc150cb423e680075dcbfa7aff18f43429f7c6ca789bf05cb5f53de998c993ba,2024-06-04T19:20:33.693000
CVE-2024-42450,0,0,981cb721b54cc6e525f5390653a82c1324af59c4dd0c689fe15788d32ac5ed02,2024-11-19T21:56:45.533000
CVE-2024-42451,1,1,5cc178b0533ab2c99901354fffefd52769acc7b6da2ad0927712e394f26f20f5,2024-12-04T02:15:04.643000
CVE-2024-42452,1,1,bd5abb3e1bf1a6cb8ddc6659a0b7a3a899c24b6c779eb2549e4bc20f5d4fab5c,2024-12-04T02:15:04.747000
CVE-2024-42453,1,1,e34b2f875ec6432231f2212bdd6c7e46095819336c725ff2a8f59a3f5ee3ab26,2024-12-04T02:15:04.837000
CVE-2024-42455,1,1,77dae4b93ac08ab16863aad4ce532757f03ea91ca2fd4c4ac7a7ec904c2ab652,2024-12-04T02:15:04.937000
CVE-2024-42456,1,1,a1711ec365f39620d2a005ebf06b5c2487ef544eab12f3bedf18af36e31cff5c,2024-12-04T02:15:05.033000
CVE-2024-42457,1,1,58f1401d06041ccd3cbab6490c0fff284cbee17a085dd2ffd0c58b83b94df4f5,2024-12-04T02:15:05.133000
CVE-2024-42458,0,0,92fe6004383d793b0d5cb11f4d02a69450774ac5606c98f7e6de587e1b590522,2024-09-05T15:51:34.307000
CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff193,2024-08-02T15:35:44.213000
CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000
@ -263228,6 +263238,10 @@ CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e
CVE-2024-45200,0,0,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f2e5,2024-09-30T18:35:06.983000
CVE-2024-45201,0,0,92b8bd132a22a911d082c4796a5c2704cf98ba27382f9f8c2bc815a661909645,2024-11-25T19:15:10.473000
CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
CVE-2024-45204,1,1,48b569460e625badc45f40d0788f43dad19cb6139194ba9913a20c0d81e6f8ea,2024-12-04T02:15:05.233000
CVE-2024-45205,1,1,fc98dd2a96a1785dcb6d3c7f3c3037d971308d90a23c54f8b61c9a0695ed25a5,2024-12-04T02:15:05.323000
CVE-2024-45206,1,1,3c2daa001e3b568c09c6afd9c93d9e8a855292bcb89134693fe65e41abda9c5e,2024-12-04T02:15:05.427000
CVE-2024-45207,1,1,65d999695b1c7647b33a0638b75d52b26562a739fa3017bff8a8e4b328ea158a,2024-12-04T02:15:05.520000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
CVE-2024-45216,0,0,b5d4ad361df623d2747c2e3dcc354f4583c0440162a6f21fa826489a75df8c0b,2024-10-16T17:35:02.523000
CVE-2024-45217,0,0,7f4e0444e8d84a01765ba25b87443db3586a72a8f0d57ce2936fe2b23421574c,2024-10-16T16:38:14.557000
@ -263922,7 +263936,7 @@ CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
CVE-2024-46613,0,0,5ea77bcf17f248af3d069df5b88a849aa784044eebc39e95db23c0b984f956be,2024-11-19T21:35:06.937000
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
CVE-2024-46624,1,1,b14a1b7f49aa03ed9b92f78e29ddb94102b3bca27f8346746517afc6985a8b9f,2024-12-03T23:15:04.627000
CVE-2024-46624,0,0,b14a1b7f49aa03ed9b92f78e29ddb94102b3bca27f8346746517afc6985a8b9f,2024-12-03T23:15:04.627000
CVE-2024-46625,0,0,e036c2fb3ae85ba95e30ff971b52c755b42dd725f69d5dd7e4b6f064ac659acd,2024-12-03T22:15:04.860000
CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000
CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000
@ -268170,7 +268184,7 @@ CVE-2024-53912,0,0,1f4db0332861ddc3d21771f81e88e64303e6668de99899f3afc95f8e7d972
CVE-2024-53913,0,0,f29eb48b3cfa8a7826d6fe7adbaf2bce87f89a85e25f58c699946a9277a37df3,2024-11-29T20:55:25.543000
CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd2a8,2024-11-29T20:55:35.293000
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
CVE-2024-53916,0,1,f21538ed4e6eeed6e49c171fd6fc843bce46a63996dd26289c99e0a4465adcdb,2024-12-04T02:15:05.623000
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
CVE-2024-53921,0,0,eb41a4432b5a9d706840e3bfc01bd30d99edb3ace8a9178bddbd38b299a4035c,2024-12-03T20:15:16.153000

Can't render this file because it is too large.