mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-06-11T10:00:19.384593+00:00
This commit is contained in:
parent
a4a4575fd7
commit
0272b6bcc7
59
CVE-2020/CVE-2020-118xx/CVE-2020-11843.json
Normal file
59
CVE-2020/CVE-2020-118xx/CVE-2020-11843.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2020-11843",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-06-11T08:15:48.213",
|
||||
"lastModified": "2024-06-11T08:15:48.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This allows the information exposure to unauthorized users.\u00a0This issue affects NetIQ Access Manager using version 4.5 or before"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@opentext.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/access-manager-44/accessmanager444-hf3-release-notes/data/accessmanager444-hf3-release-notes.html",
|
||||
"source": "security@opentext.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/access-manager-45/accessmanager452-hf1-release-notes/data/accessmanager452-hf1-release-notes.html",
|
||||
"source": "security@opentext.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-28400",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2021-07-13T11:15:08.960",
|
||||
"lastModified": "2022-04-12T09:15:10.397",
|
||||
"lastModified": "2024-06-11T09:15:09.487",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -2256,6 +2276,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-25622",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2022-04-12T09:15:14.483",
|
||||
"lastModified": "2024-05-14T16:15:23.660",
|
||||
"lastModified": "2024-06-11T09:15:10.623",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200AL IM157-1 PN, SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments."
|
||||
"value": "A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-38773",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-01-10T12:15:23.103",
|
||||
"lastModified": "2023-01-13T20:33:20.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-11T09:15:11.087",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -1969,6 +1969,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-482757.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482757.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-43716",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-04-11T10:15:17.467",
|
||||
"lastModified": "2023-05-09T13:15:15.390",
|
||||
"lastModified": "2024-06-11T09:15:11.587",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation which leads to a restart of the webserver of the affected product."
|
||||
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation which leads to a restart of the webserver of the affected product."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -723,6 +723,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-43767",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-04-11T10:15:17.540",
|
||||
"lastModified": "2023-05-09T13:15:15.557",
|
||||
"lastModified": "2024-06-11T09:15:11.907",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
|
||||
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -713,6 +713,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-43768",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-04-11T10:15:17.617",
|
||||
"lastModified": "2023-05-09T13:15:15.713",
|
||||
"lastModified": "2024-06-11T09:15:12.230",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
|
||||
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -703,6 +703,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-46144",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2022-12-13T16:15:25.200",
|
||||
"lastModified": "2023-10-10T11:15:10.987",
|
||||
"lastModified": "2024-06-11T09:15:12.590",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= V2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive."
|
||||
"value": "A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -425,6 +425,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-413565.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38640",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-10-10T11:15:12.063",
|
||||
"lastModified": "2023-10-14T02:43:46.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-11T09:15:13.423",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -90,6 +90,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-035466.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44317",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-11-14T11:15:12.067",
|
||||
"lastModified": "2024-02-13T09:15:43.880",
|
||||
"lastModified": "2024-06-11T09:15:13.730",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -1924,6 +1924,10 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
|
||||
"source": "productcert@siemens.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44318",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-11-14T11:15:12.287",
|
||||
"lastModified": "2024-03-12T11:15:46.620",
|
||||
"lastModified": "2024-06-11T09:15:14.333",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -2069,6 +2069,10 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf",
|
||||
"source": "productcert@siemens.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44319",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-11-14T11:15:12.510",
|
||||
"lastModified": "2024-02-13T09:15:44.103",
|
||||
"lastModified": "2024-06-11T09:15:14.940",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -2069,6 +2069,10 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
|
||||
"source": "productcert@siemens.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44373",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-11-14T11:15:13.417",
|
||||
"lastModified": "2024-02-13T09:15:44.957",
|
||||
"lastModified": "2024-06-11T09:15:15.377",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -2049,6 +2049,10 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
|
||||
"source": "productcert@siemens.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44374",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-11-14T11:15:13.753",
|
||||
"lastModified": "2024-03-12T11:15:47.267",
|
||||
"lastModified": "2024-06-11T09:15:15.990",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -2065,6 +2065,10 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
|
||||
"source": "productcert@siemens.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45205",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-10-10T11:15:13.163",
|
||||
"lastModified": "2023-10-14T02:24:01.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-06-11T09:15:16.577",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -70,6 +70,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-035466.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-49691",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-12-12T12:15:15.990",
|
||||
"lastModified": "2024-02-13T09:15:46.373",
|
||||
"lastModified": "2024-06-11T09:15:16.840",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update."
|
||||
"value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -641,6 +641,10 @@
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
|
||||
"source": "productcert@siemens.com"
|
||||
},
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23251",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:49.430",
|
||||
"lastModified": "2024-06-10T21:15:49.430",
|
||||
"lastModified": "2024-06-11T08:15:48.553",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,22 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23282",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:49.503",
|
||||
"lastModified": "2024-06-10T21:15:49.503",
|
||||
"lastModified": "2024-06-11T08:15:48.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,22 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27796",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:03.243",
|
||||
"lastModified": "2024-06-10T18:15:28.577",
|
||||
"lastModified": "2024-06-11T08:15:48.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,13 +32,25 @@
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27798",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:03.593",
|
||||
"lastModified": "2024-06-10T18:15:28.640",
|
||||
"lastModified": "2024-06-11T08:15:48.807",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,9 +24,17 @@
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27799",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:49.607",
|
||||
"lastModified": "2024-06-10T21:15:49.607",
|
||||
"lastModified": "2024-06-11T08:15:48.860",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,22 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27800",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:49.683",
|
||||
"lastModified": "2024-06-10T21:15:49.683",
|
||||
"lastModified": "2024-06-11T08:15:48.930",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -44,6 +44,34 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27801",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:49.770",
|
||||
"lastModified": "2024-06-10T21:15:49.770",
|
||||
"lastModified": "2024-06-11T08:15:49.007",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,22 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27802",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:49.860",
|
||||
"lastModified": "2024-06-10T21:15:49.860",
|
||||
"lastModified": "2024-06-11T08:15:49.077",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,30 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27805",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:49.943",
|
||||
"lastModified": "2024-06-10T21:15:49.943",
|
||||
"lastModified": "2024-06-11T08:15:49.147",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,34 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27806",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.020",
|
||||
"lastModified": "2024-06-10T21:15:50.020",
|
||||
"lastModified": "2024-06-11T08:15:49.217",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,34 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27807",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.093",
|
||||
"lastModified": "2024-06-10T21:15:50.093",
|
||||
"lastModified": "2024-06-11T08:15:49.287",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,14 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27810",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:04.267",
|
||||
"lastModified": "2024-06-10T18:15:28.843",
|
||||
"lastModified": "2024-06-11T08:15:49.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -60,9 +60,17 @@
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27811",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.230",
|
||||
"lastModified": "2024-06-10T21:15:50.230",
|
||||
"lastModified": "2024-06-11T08:15:49.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,22 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27814",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.373",
|
||||
"lastModified": "2024-06-10T21:15:50.373",
|
||||
"lastModified": "2024-06-11T08:15:49.493",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,10 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27815",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.440",
|
||||
"lastModified": "2024-06-10T21:15:50.440",
|
||||
"lastModified": "2024-06-11T08:15:49.553",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,22 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27817",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.547",
|
||||
"lastModified": "2024-06-10T21:15:50.547",
|
||||
"lastModified": "2024-06-11T08:15:49.630",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,30 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27818",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:05.047",
|
||||
"lastModified": "2024-06-10T18:15:29.033",
|
||||
"lastModified": "2024-06-11T08:15:49.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,10 @@
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27819",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.623",
|
||||
"lastModified": "2024-06-10T21:15:50.623",
|
||||
"lastModified": "2024-06-11T08:15:49.770",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,10 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27824",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:05.807",
|
||||
"lastModified": "2024-06-10T18:15:29.213",
|
||||
"lastModified": "2024-06-11T08:15:49.830",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,9 +24,17 @@
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27827",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:06.363",
|
||||
"lastModified": "2024-06-10T18:15:29.320",
|
||||
"lastModified": "2024-06-11T08:15:49.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27828",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.773",
|
||||
"lastModified": "2024-06-10T21:15:50.773",
|
||||
"lastModified": "2024-06-11T08:15:49.950",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -28,6 +28,18 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27831",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:50.927",
|
||||
"lastModified": "2024-06-10T21:15:50.927",
|
||||
"lastModified": "2024-06-11T08:15:50.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,30 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27832",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.007",
|
||||
"lastModified": "2024-06-10T21:15:51.007",
|
||||
"lastModified": "2024-06-11T08:15:50.127",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,22 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27836",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.167",
|
||||
"lastModified": "2024-06-10T21:15:51.167",
|
||||
"lastModified": "2024-06-11T08:15:50.193",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,14 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27840",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.313",
|
||||
"lastModified": "2024-06-10T21:15:51.313",
|
||||
"lastModified": "2024-06-11T08:15:50.260",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,30 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214104",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27843",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:08.437",
|
||||
"lastModified": "2024-06-10T18:15:29.790",
|
||||
"lastModified": "2024-06-11T08:15:50.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,9 +24,17 @@
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27844",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.390",
|
||||
"lastModified": "2024-06-10T21:15:51.390",
|
||||
"lastModified": "2024-06-11T08:15:50.390",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,10 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27845",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.467",
|
||||
"lastModified": "2024-06-10T21:15:51.467",
|
||||
"lastModified": "2024-06-11T08:15:50.457",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,10 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27847",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:08.743",
|
||||
"lastModified": "2024-06-10T18:15:29.840",
|
||||
"lastModified": "2024-06-11T08:15:50.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,13 +32,25 @@
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27848",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.530",
|
||||
"lastModified": "2024-06-10T21:15:51.530",
|
||||
"lastModified": "2024-06-11T08:15:50.593",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,14 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27855",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.753",
|
||||
"lastModified": "2024-06-10T21:15:51.753",
|
||||
"lastModified": "2024-06-11T08:15:50.653",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,22 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214100",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27857",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.833",
|
||||
"lastModified": "2024-06-10T21:15:51.833",
|
||||
"lastModified": "2024-06-11T08:15:50.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -28,6 +28,18 @@
|
||||
"url": "https://support.apple.com/en-us/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214101",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214102",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214108",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27885",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-06-10T21:15:51.903",
|
||||
"lastModified": "2024-06-10T21:15:51.903",
|
||||
"lastModified": "2024-06-11T08:15:50.787",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,18 @@
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214105",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214106",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT214107",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-42xx/CVE-2024-4266.json
Normal file
51
CVE-2024/CVE-2024-42xx/CVE-2024-4266.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-4266",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T08:15:50.850",
|
||||
"lastModified": "2024-06-11T08:15:50.850",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MetForm \u2013 Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.8.8 via the 'handle_file' function. This can allow unauthenticated attackers to extract sensitive data, such as Personally Identifiable Information, from files uploaded by users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/metform/trunk/core/entries/action.php#L1019",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3099977/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8edb72f5-dda3-4c59-ba7a-7a460cb59c03?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-55xx/CVE-2024-5531.json
Normal file
47
CVE-2024/CVE-2024-55xx/CVE-2024-5531.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-5531",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-11T09:15:17.273",
|
||||
"lastModified": "2024-06-11T09:15:17.273",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Flickr widget in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.2.8/includes/widgets/flickr.php#L59",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b39e17c5-711f-4229-90f4-213ea65a190d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
46
README.md
46
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-11T08:00:25.665847+00:00
|
||||
2024-06-11T10:00:19.384593+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-11T07:15:41.017000+00:00
|
||||
2024-06-11T09:15:17.273000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
253385
|
||||
253388
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-31397](CVE-2024/CVE-2024-313xx/CVE-2024-31397.json) (`2024-06-11T06:15:10.057`)
|
||||
- [CVE-2024-31398](CVE-2024/CVE-2024-313xx/CVE-2024-31398.json) (`2024-06-11T06:15:10.347`)
|
||||
- [CVE-2024-31399](CVE-2024/CVE-2024-313xx/CVE-2024-31399.json) (`2024-06-11T06:15:10.490`)
|
||||
- [CVE-2024-31402](CVE-2024/CVE-2024-314xx/CVE-2024-31402.json) (`2024-06-11T06:15:10.650`)
|
||||
- [CVE-2024-3549](CVE-2024/CVE-2024-35xx/CVE-2024-3549.json) (`2024-06-11T07:15:41.017`)
|
||||
- [CVE-2024-3723](CVE-2024/CVE-2024-37xx/CVE-2024-3723.json) (`2024-06-11T06:15:10.793`)
|
||||
- [CVE-2024-4319](CVE-2024/CVE-2024-43xx/CVE-2024-4319.json) (`2024-06-11T06:15:11.407`)
|
||||
- [CVE-2020-11843](CVE-2020/CVE-2020-118xx/CVE-2020-11843.json) (`2024-06-11T08:15:48.213`)
|
||||
- [CVE-2024-4266](CVE-2024/CVE-2024-42xx/CVE-2024-4266.json) (`2024-06-11T08:15:50.850`)
|
||||
- [CVE-2024-5531](CVE-2024/CVE-2024-55xx/CVE-2024-5531.json) (`2024-06-11T09:15:17.273`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `48`
|
||||
|
||||
- [CVE-2014-0808](CVE-2014/CVE-2014-08xx/CVE-2014-0808.json) (`2024-06-11T06:15:08.923`)
|
||||
- [CVE-2024-27805](CVE-2024/CVE-2024-278xx/CVE-2024-27805.json) (`2024-06-11T08:15:49.147`)
|
||||
- [CVE-2024-27806](CVE-2024/CVE-2024-278xx/CVE-2024-27806.json) (`2024-06-11T08:15:49.217`)
|
||||
- [CVE-2024-27807](CVE-2024/CVE-2024-278xx/CVE-2024-27807.json) (`2024-06-11T08:15:49.287`)
|
||||
- [CVE-2024-27810](CVE-2024/CVE-2024-278xx/CVE-2024-27810.json) (`2024-06-11T08:15:49.350`)
|
||||
- [CVE-2024-27811](CVE-2024/CVE-2024-278xx/CVE-2024-27811.json) (`2024-06-11T08:15:49.427`)
|
||||
- [CVE-2024-27814](CVE-2024/CVE-2024-278xx/CVE-2024-27814.json) (`2024-06-11T08:15:49.493`)
|
||||
- [CVE-2024-27815](CVE-2024/CVE-2024-278xx/CVE-2024-27815.json) (`2024-06-11T08:15:49.553`)
|
||||
- [CVE-2024-27817](CVE-2024/CVE-2024-278xx/CVE-2024-27817.json) (`2024-06-11T08:15:49.630`)
|
||||
- [CVE-2024-27818](CVE-2024/CVE-2024-278xx/CVE-2024-27818.json) (`2024-06-11T08:15:49.700`)
|
||||
- [CVE-2024-27819](CVE-2024/CVE-2024-278xx/CVE-2024-27819.json) (`2024-06-11T08:15:49.770`)
|
||||
- [CVE-2024-27824](CVE-2024/CVE-2024-278xx/CVE-2024-27824.json) (`2024-06-11T08:15:49.830`)
|
||||
- [CVE-2024-27827](CVE-2024/CVE-2024-278xx/CVE-2024-27827.json) (`2024-06-11T08:15:49.890`)
|
||||
- [CVE-2024-27828](CVE-2024/CVE-2024-278xx/CVE-2024-27828.json) (`2024-06-11T08:15:49.950`)
|
||||
- [CVE-2024-27831](CVE-2024/CVE-2024-278xx/CVE-2024-27831.json) (`2024-06-11T08:15:50.017`)
|
||||
- [CVE-2024-27832](CVE-2024/CVE-2024-278xx/CVE-2024-27832.json) (`2024-06-11T08:15:50.127`)
|
||||
- [CVE-2024-27836](CVE-2024/CVE-2024-278xx/CVE-2024-27836.json) (`2024-06-11T08:15:50.193`)
|
||||
- [CVE-2024-27840](CVE-2024/CVE-2024-278xx/CVE-2024-27840.json) (`2024-06-11T08:15:50.260`)
|
||||
- [CVE-2024-27843](CVE-2024/CVE-2024-278xx/CVE-2024-27843.json) (`2024-06-11T08:15:50.327`)
|
||||
- [CVE-2024-27844](CVE-2024/CVE-2024-278xx/CVE-2024-27844.json) (`2024-06-11T08:15:50.390`)
|
||||
- [CVE-2024-27845](CVE-2024/CVE-2024-278xx/CVE-2024-27845.json) (`2024-06-11T08:15:50.457`)
|
||||
- [CVE-2024-27847](CVE-2024/CVE-2024-278xx/CVE-2024-27847.json) (`2024-06-11T08:15:50.523`)
|
||||
- [CVE-2024-27848](CVE-2024/CVE-2024-278xx/CVE-2024-27848.json) (`2024-06-11T08:15:50.593`)
|
||||
- [CVE-2024-27855](CVE-2024/CVE-2024-278xx/CVE-2024-27855.json) (`2024-06-11T08:15:50.653`)
|
||||
- [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-06-11T08:15:50.720`)
|
||||
- [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-06-11T08:15:50.787`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
115
_state.csv
115
_state.csv
@ -65251,7 +65251,7 @@ CVE-2014-0804,0,0,64f7bcd62c09feae210ed04317dd3c363bf64429ff0d6cc82e25aa05b441d8
|
||||
CVE-2014-0805,0,0,64ffdc7602e5834fa9b3519c18d42dd7b07d229d431db1ea7d9952fad9ee621e,2014-01-14T04:49:19.543000
|
||||
CVE-2014-0806,0,0,0f5d623ba97d2afe2377f45b01521ed33883dbba85dc359bb516719da4f3d8f9,2014-08-11T15:04:43.700000
|
||||
CVE-2014-0807,0,0,f009d972ec55433ad7f1cd0b29e7cbdba3753adab49339cad8b728a428899860,2014-01-23T18:10:13.500000
|
||||
CVE-2014-0808,0,1,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000
|
||||
CVE-2014-0808,0,0,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000
|
||||
CVE-2014-0809,0,0,ea31d36adc72e3733e28eeb6bfacf81b8f998d70f553d482caf7c863538e6e07,2017-08-29T01:34:15.467000
|
||||
CVE-2014-0810,0,0,45fb5c84f4f5cfdebd55044c843a5258a6f94a800107fdc85390866929ef99a4,2014-01-29T18:39:45.720000
|
||||
CVE-2014-0811,0,0,c0c381561c327e70759153bf230a2a174504949fe49060ef9f4430788889edad,2015-08-13T17:50:46.333000
|
||||
@ -146788,6 +146788,7 @@ CVE-2020-1184,0,0,2bc611a049543db6bf0bf6b96fb01e882395cf50149fc8430568f81ad02bb3
|
||||
CVE-2020-11840,0,0,f3a363f26a4f911ac51cb1707b94aa62c107f076a8e95eb031d6eb4904733f2d,2023-11-07T03:15:09.850000
|
||||
CVE-2020-11841,0,0,8ed95a170c9554b00d02309e64bcb52d542e966a9b063d6e4530481dd3a5aac4,2023-11-07T03:15:10.113000
|
||||
CVE-2020-11842,0,0,72986a84d6a13f089beb2b0b7979170abc0ca672832fd4005a2aa7168ec789ef,2023-11-07T03:15:10.373000
|
||||
CVE-2020-11843,1,1,a9698ab044740d81bbdb07ebecb737de7eaff6808aacccdc260ccb87fd4fa1b7,2024-06-11T08:15:48.213000
|
||||
CVE-2020-11844,0,0,2522e5538ec7480ee226b0b6b7f39f0a9c65066bf96b2574f3941300e05c8cb6,2023-11-07T03:15:10.640000
|
||||
CVE-2020-11845,0,0,248133b82b72daffe3c97edaa56bab2fb3dc4f4a3d2b02763eb41b58be878066,2023-11-07T03:15:10.940000
|
||||
CVE-2020-11848,0,0,fa9c8ea36c6832e28ebc6d0ff933981179cafe85deb16d55c96ce604549714e1,2023-11-07T03:15:11.227000
|
||||
@ -156799,7 +156800,7 @@ CVE-2020-28395,0,0,bf6970e5d86a5d3341e7e5a9e017673589cd780ee8d139ed41e40a0bd56c9
|
||||
CVE-2020-28396,0,0,4b8b9560196be43b294881c51a0b380c35f875f9a7f487f8bbb3792ea4489b92,2022-08-06T03:53:39.417000
|
||||
CVE-2020-28397,0,0,e16106c9ec02a7959bf2e08ae23f8ce25434d9b912ddaa06302608cb3837b077,2021-12-10T19:57:38.487000
|
||||
CVE-2020-2840,0,0,4c2f7977fe993cf5eae0640b19f693d0670ed59a101cda8990b81da6f52fa632,2020-04-16T15:04:15.507000
|
||||
CVE-2020-28400,0,0,0ac0ca5003bcb961cec3e5a71f2796c9610254e83a62276d8d20a28226cd560f,2022-04-12T09:15:10.397000
|
||||
CVE-2020-28400,0,1,44e48fcd1984e09e94e3816766c0a8a381a97641d8772c06c4b4244fcc37a65f,2024-06-11T09:15:09.487000
|
||||
CVE-2020-28401,0,0,6b7ac2bed4789ade3936183e46203e95f2c8d1218251a425bc12f3a2d16c511b,2021-07-21T11:39:23.747000
|
||||
CVE-2020-28402,0,0,ff1548c2d2cecd1ccd3eefdafddd80189d711f75d327b7ee849e8196cbc98609,2021-07-21T11:39:23.747000
|
||||
CVE-2020-28403,0,0,71c248a6d058491bec967509722e848af762d9caca5a00ae18e5842de83e9ac4,2021-02-01T14:14:32.147000
|
||||
@ -194383,7 +194384,7 @@ CVE-2022-25618,0,0,1f3a8ca8e036fd291b26ce5388418ac1728826c0e9d08b58010dfe34122a4
|
||||
CVE-2022-25619,0,0,26361509613cfcf315308898948e430abce5baed7495d48b763def148b21870b,2022-04-07T16:28:26.127000
|
||||
CVE-2022-25620,0,0,15d831c37121985148682e30d5a696db0ec3ddf5afb51bc183b13bda8f418817,2022-04-07T16:25:41.173000
|
||||
CVE-2022-25621,0,0,0ac0ec39de03543274d1cb6db5c55a310b0d92391145960bc53b5ccb8642cd70,2022-03-22T17:53:02.347000
|
||||
CVE-2022-25622,0,0,4db8ab8f3c4ec5425dd31970947784f6a9e8ddb46c2425aae8cdfc46eb3911b1,2024-05-14T16:15:23.660000
|
||||
CVE-2022-25622,0,1,e5fcc34526af5764fe60dbf0d6c3cd9c05316ba3ac3378f6debcd9d363cb2e2e,2024-06-11T09:15:10.623000
|
||||
CVE-2022-25623,0,0,1dd6be5e3e5a796b51e4d4440e3e1c4ff8505b9300f2c5e3ad4e41625fd9eed8,2023-08-08T14:22:24.967000
|
||||
CVE-2022-25625,0,0,6ab345f8b324c27f406bd9ee308869f36718f1c391dd3a10b73d5814fa8b4f63,2022-09-01T15:45:15.450000
|
||||
CVE-2022-25626,0,0,1916dc07d7f5e7cb2f4150889e0dbfab5ec7786293c3740bcad93e80788d9c67,2023-08-08T14:21:49.707000
|
||||
@ -204920,7 +204921,7 @@ CVE-2022-3877,0,0,d65e8a1f9affac4976bd5180163445a89b7661212631d7cf576af85548b054
|
||||
CVE-2022-38770,0,0,bd9c0e8e17b45f06af971695e320abb2384dfedcae8d6837468f38c2c5691991,2023-08-08T14:22:24.967000
|
||||
CVE-2022-38771,0,0,76dd818bb4c1ad151962d43e6df64bf4172052cf0668c8b9a38a1e85c2584372,2022-09-17T02:01:04.943000
|
||||
CVE-2022-38772,0,0,a4b0277f2a7d6d70e1ada097174bbf5352079655a1f2663c4a242ef1daf0df75,2022-09-02T19:47:50.700000
|
||||
CVE-2022-38773,0,0,c049b7245bfee58c356a28d9863f8194380106be9153fbc6419d9ed099f9730d,2023-01-13T20:33:20.213000
|
||||
CVE-2022-38773,0,1,8812a9864c0475ef35dc6c8a55dd451c901f29ce84d8a82ad0ae4a9fcd4e18aa,2024-06-11T09:15:11.087000
|
||||
CVE-2022-38774,0,0,de65ca0b4a9ddf6e32e5f34286b19068840e71c50caff19d783c63f38a87554b,2023-02-03T18:21:15.267000
|
||||
CVE-2022-38775,0,0,e75c1256533c7daad13049b00955d44cc8f43acb01643b91b8c284bdb345179d,2023-02-03T18:24:06.557000
|
||||
CVE-2022-38777,0,0,09801cfbe2f6708683f64c0e409f40a70dd8d7738870fa23b4b9dc79e9d6e451,2023-02-21T15:59:24.733000
|
||||
@ -208715,7 +208716,7 @@ CVE-2022-43710,0,0,e0cf8bd85031d3c1a813c0e782bf9366f4ec4c8d74a6425791b57de1608f2
|
||||
CVE-2022-43711,0,0,8acbf3db43baa9a9cdb4dbb0558bbc15a144fd59123ef84ac80195c32fc1ac4a,2023-08-04T15:37:18.857000
|
||||
CVE-2022-43712,0,0,f890b6c77a5af2e0f078c1fd1fd6ef0498129f9c34dbd9e8d521f43b9fd151cc,2023-08-04T19:39:49.167000
|
||||
CVE-2022-43713,0,0,7bede523d769d9903862c2f00e0386d3e90ecd7dd0dd7005e1776bfdd522c828,2023-08-04T15:49:03.637000
|
||||
CVE-2022-43716,0,0,f5ba55a2adf2d99b6155854978cfe9fa5898c8338a263dab43769eac31c2cdf2,2023-05-09T13:15:15.390000
|
||||
CVE-2022-43716,0,1,81ede852d360edf1dcc47980f26c3a6ed1751c7157f3f3ff31115c6e0fa8bc84,2024-06-11T09:15:11.587000
|
||||
CVE-2022-43717,0,0,0b1bdad6065ba4b5a4687bbe12958df7a43e76d577613164f7d2c60e35068dd0,2023-11-07T03:54:02.080000
|
||||
CVE-2022-43718,0,0,b327914e799d79a4e39e1c7e75a3c8876f615b40080f55667939a9d090ec5519,2023-11-07T03:54:02.147000
|
||||
CVE-2022-43719,0,0,c1a32c477b92d31ca146ff82c860530e572c1eb415c13a7d01e50d71fdcadb94,2023-11-07T03:54:02.217000
|
||||
@ -208750,8 +208751,8 @@ CVE-2022-43763,0,0,2819a0527f85f117af2be739fba5822854d595a43f54286f54e3cd97dd814
|
||||
CVE-2022-43764,0,0,2cb333eddc1790fa4d0a4c5e1c00f836f379d3bf0570dd365de5c4c3a1c01f4b,2023-11-07T03:54:03.047000
|
||||
CVE-2022-43765,0,0,07c2f3d94d9131f5d90904fe42711365ee29194ab4927a4307ab215a76ed6f71,2023-11-07T03:54:03.167000
|
||||
CVE-2022-43766,0,0,2eca4905d3c4104e0f60f5c7b952404cbe92b0bd333427cb69051843ce566240,2022-10-28T17:43:04.957000
|
||||
CVE-2022-43767,0,0,d81fbaa657c5bd3266e85e04ab3f13e41881ab654c6ceb0203d319b2315ccd35,2023-05-09T13:15:15.557000
|
||||
CVE-2022-43768,0,0,965ee1bf07e67a3114e034525c4f853534dd4760bdbfa21e8c19e22eb30bb406,2023-05-09T13:15:15.713000
|
||||
CVE-2022-43767,0,1,3d3ec72dcf504c485fb70768c983f8a61243177659a623eb61e366901d24c3fe,2024-06-11T09:15:11.907000
|
||||
CVE-2022-43768,0,1,ab30b6f76d5815d6fd266fc12ca2221697e084ee85a9caf1e7db58f67a88c8e9,2024-06-11T09:15:12.230000
|
||||
CVE-2022-43769,0,0,7f3c480211c1e7c9e46e3c85da1177d1b727f52750ee51087f4349b585556af6,2023-05-11T18:15:10.847000
|
||||
CVE-2022-4377,0,0,068b39f647ef8513d4837a4955b7179d563722e5feeb7420bcfdacaef8a5f70b,2023-11-07T03:57:41.830000
|
||||
CVE-2022-43770,0,0,2c7d822d2b39aa8db7d054c66044721e02aaf0af20f996ddd6ad9840e9e750e3,2023-04-20T19:47:28.430000
|
||||
@ -210261,7 +210262,7 @@ CVE-2022-46140,0,0,645741dfd6ba50ed1ab18334a6e7d7c06d2c69f2b8945110b586603b9e9fa
|
||||
CVE-2022-46141,0,0,e01d3d8a7133425736470630c9db6ec87069dcef7521c7b7f3a7336cf5697936,2023-12-15T15:25:08.557000
|
||||
CVE-2022-46142,0,0,076315d7ce7ace9ad3d082184a4fb7584cc27d952e90d963f508a0c544b9f024,2023-03-14T10:15:24.137000
|
||||
CVE-2022-46143,0,0,858449c4d7caf505498265655801b59aa6f34f06ec95b2b0eaa00c933fd49697,2023-12-12T12:15:10.230000
|
||||
CVE-2022-46144,0,0,ee62f5b783f442e005903fc32870a8c543457e86686ec664396a1d61fdcc38b7,2023-10-10T11:15:10.987000
|
||||
CVE-2022-46144,0,1,aa28bd70336cb9942b9ebb71749dca87d898b6d746b093e92a69844cc9a1c7e3,2024-06-11T09:15:12.590000
|
||||
CVE-2022-46145,0,0,f7a17de473415e11c551d16f15c5260c8ee64752eb46f684fb1404bda87ddf3e,2023-06-23T17:54:04.830000
|
||||
CVE-2022-46146,0,0,7a5ffe545d9cb4038f871132d597e9e5352f001f7c95aef9377b7e878b358280,2024-01-12T12:15:45.110000
|
||||
CVE-2022-46147,0,0,2ff856f5b41ff870879815c21b8d915e4f8a07316110cdf7163aa326244e2f46,2022-12-01T23:07:20.930000
|
||||
@ -228577,7 +228578,7 @@ CVE-2023-3863,0,0,b9398469eabeafe28d110e5ed08166075e260867358d34c16f6d758bda7974
|
||||
CVE-2023-38632,0,0,9511e39a9a065f69ef6590f4695bd395dc1f846685d263a342e66909b4d3385a,2023-08-01T13:50:50.473000
|
||||
CVE-2023-38633,0,0,93d522b98b95166863d6e1db822fb4bec8463aaedcdace73a72333b8179a6286,2024-01-24T16:41:49.187000
|
||||
CVE-2023-3864,0,0,c71fc322d0eadebb373f88174f8897111d3a73534afa2ec5aff424e84a74f576,2023-08-18T14:16:40.163000
|
||||
CVE-2023-38640,0,0,041a83ddb46a4f91360a072d76ac97645dfd3e9710efd3cde51ef26af8ecd6c2,2023-10-14T02:43:46.027000
|
||||
CVE-2023-38640,0,1,f74a239073eb454eeba2e7eb2624151cfae8e00fe96120ee4486e703c4b78cd1,2024-06-11T09:15:13.423000
|
||||
CVE-2023-38641,0,0,b60575b0d3d68fa6f4381a1a022575f08fd66d3ab2c0394a18e0afed821e12a9,2023-08-15T19:40:17.187000
|
||||
CVE-2023-38646,0,0,4bb5025d5c4986c981ce9b63274763bcc9fcd029e72d06f3979bd475f7bc0fc6,2024-02-15T16:15:45.380000
|
||||
CVE-2023-38647,0,0,b1798ac02686ab4440590c4462c5f4bb41f2d6ab8f482c447c92a4dd84485772,2023-08-03T15:10:55.947000
|
||||
@ -232715,9 +232716,9 @@ CVE-2023-44311,0,0,3b4b00ba8d688eaf03e44e6d9f4df7f84ca50bb2d53185d8873bb05e42aac
|
||||
CVE-2023-44312,0,0,ee8d773f5efbceb6f850ded169c146beea3bd8b91bc9e3c303a02273c4771831,2024-02-08T17:08:11.110000
|
||||
CVE-2023-44313,0,0,2ccff3d184596dd97720cea6b7babed4736fcb869a5a89940fe69fc4c9b8c613,2024-02-08T17:13:28.083000
|
||||
CVE-2023-44315,0,0,0474d89d9285949480273ea98d9b1bf4959fa5818eb5c7f76cff34da1fc2f13b,2023-10-12T00:43:38.827000
|
||||
CVE-2023-44317,0,0,5387b7dc0ff5b92662ae7ea69a2c003ac0c8d4fb73993639f6b2d67ba53051de,2024-02-13T09:15:43.880000
|
||||
CVE-2023-44318,0,0,2dbd1a50827db421fdc2c77ed3cc38f899410180b942c3c709f005a0dee8a8b4,2024-03-12T11:15:46.620000
|
||||
CVE-2023-44319,0,0,b8d3c5abe58f71d0a4f3dd8a91a3acdf30360e0e6a25d3f625c672af97e26aa1,2024-02-13T09:15:44.103000
|
||||
CVE-2023-44317,0,1,b56a158cebcf42d89e4d6901f5f3db2abc24725b5427dc8f59e4caad401ded6d,2024-06-11T09:15:13.730000
|
||||
CVE-2023-44318,0,1,124397ddc4bd28d20d0e815a4e5bc7d645755649711f0e671b73dbe68f5b4974,2024-06-11T09:15:14.333000
|
||||
CVE-2023-44319,0,1,d4ab95467abc686b0efd92bc5b303eec429d96421d44ba8a0c4b4c7e0a7432de,2024-06-11T09:15:14.940000
|
||||
CVE-2023-4432,0,0,0d778df627f1547cab2b9fd64ba34616922fa04b58f2edee97863ee606119c57,2023-08-23T16:58:29.763000
|
||||
CVE-2023-44320,0,0,d119006e47cce113b105ee2db4f38227825e3615f67d0fbdef4c97002aa08e68,2024-02-13T09:15:44.340000
|
||||
CVE-2023-44321,0,0,911037adf08df4ffa2ffbbc7aa8653046518fe8ac83fe6fade98cb8847d28d1d,2024-03-12T11:15:46.980000
|
||||
@ -232770,8 +232771,8 @@ CVE-2023-44367,0,0,d5d89a02dec9cfaca291a0cd5b5f30d363c109814afa4ba2b94bec8f42118
|
||||
CVE-2023-4437,0,0,b4cc863eb5ce47c4eb4268cc05a1191605221f95fca8656d56637b9502673d3e,2024-05-17T02:31:33.640000
|
||||
CVE-2023-44371,0,0,2297c6fdf2afd389ea703848ed5d6c6ded312e9e67b0a76d69f5cda9f1a630ea,2023-11-22T16:58:39.573000
|
||||
CVE-2023-44372,0,0,a86d107032e1559f3fd2ed4ee7f77c509710319a73a766e52fe64ffb44d5363d,2024-02-23T19:15:08.467000
|
||||
CVE-2023-44373,0,0,533dc92a5a8f084d62c03c48e789ce059c00552abdc3137692180affca5c571b,2024-02-13T09:15:44.957000
|
||||
CVE-2023-44374,0,0,0f4a17ac0b331ec6c4dac3f8af3d86a6479fc8368144856a4ac5600f3c153549,2024-03-12T11:15:47.267000
|
||||
CVE-2023-44373,0,1,e7f73e4a65821fb612f046bf847975072c678282df4ee59af12fc206c71283ac,2024-06-11T09:15:15.377000
|
||||
CVE-2023-44374,0,1,f8b8bce40b3e98d5a9f614bd74fe34bdc98e5151c1ec5d1c243152ccc4d26188,2024-06-11T09:15:15.990000
|
||||
CVE-2023-44375,0,0,593d447900de38b504b8288066dba2aca1c23ca9dc2b8ebba581f03f2af8dcd2,2024-01-02T19:15:10.480000
|
||||
CVE-2023-44376,0,0,bd7edf8426f6b9b5132878b896bbd83a87eb49b2089f52d618dfc7a966a2253c,2024-01-02T19:15:10.550000
|
||||
CVE-2023-44377,0,0,82bf954347778e7128ea732c92275efada968563ffe465bc093d8a5741bbae62,2024-01-02T19:15:10.630000
|
||||
@ -233177,7 +233178,7 @@ CVE-2023-45201,0,0,96bdcec1d537035c823229fceb88418f9c3a764bbde63a305c2b0cbff3648
|
||||
CVE-2023-45202,0,0,29317d3b7a63c177ae8a6e66af18ed7e8de578c5219fd14cc15471fc255f7962,2023-11-08T23:12:09.473000
|
||||
CVE-2023-45203,0,0,f8305c62c2a5f3365003f7473f2dbd3802533af547048a30d7e86118234bc365,2023-11-08T23:12:20.497000
|
||||
CVE-2023-45204,0,0,e27bb884505cc94f9fd049fb362f1443f0858ac07554f2d906a029439046e66e,2023-10-12T00:44:00.243000
|
||||
CVE-2023-45205,0,0,01ae041d020771a6f6713901ea60b3cb1f7174c5ec0ce9743705e5638d234132,2023-10-14T02:24:01.100000
|
||||
CVE-2023-45205,0,1,538ac842ceda74c0a4a47b684bb6eb451362d86539948b386d203a24f0acc2f3,2024-06-11T09:15:16.577000
|
||||
CVE-2023-45206,0,0,75321b27d5416502901be19297200a9974474b77410916565ba2dd2ebaec049d,2024-02-13T18:23:02.393000
|
||||
CVE-2023-45207,0,0,057c3e719ca21440d880e35b10a15238d3d7a6403a5bd988d596e65617eb7af1,2024-02-13T18:23:02.393000
|
||||
CVE-2023-45208,0,0,ff62badeb6459007decf020f49ed097a135e3c004ce7c6b74e1a14172980ba87,2023-10-16T18:48:47.807000
|
||||
@ -236350,7 +236351,7 @@ CVE-2023-49688,0,0,93d52581ab97f4c4a9518955faef7856c63e32e254de3eaa71e57824efb8d
|
||||
CVE-2023-49689,0,0,87395a2c8c107313cbc041f315fca3f89094793710d9f420c661f91319a8c529,2023-12-27T20:49:07.780000
|
||||
CVE-2023-4969,0,0,2c6655eaeb515e6f955488cf5c51d76ef097b0a3c7180e9f766cc6c3af3dbf92,2024-01-23T16:56:25.943000
|
||||
CVE-2023-49690,0,0,2faeb1f020693f40c665ecb7eba1ffca8452cf62dc2d2ee04e65f4b99aa266ff,2024-01-02T20:15:09.933000
|
||||
CVE-2023-49691,0,0,cf4bc5b6e26cd2d050abb3e7f2c790c34bc1f3d2e02d4c61ee1bc9996dbbeaf8,2024-02-13T09:15:46.373000
|
||||
CVE-2023-49691,0,1,f14631c670ecaa48714a1fac29e19124304235e69ec8ba39a392e35063f534ed,2024-06-11T09:15:16.840000
|
||||
CVE-2023-49692,0,0,dbcc49434d099080ae35750c4f056032c6b8a51c8987a0e4dc162d8e8804102a,2024-02-13T09:15:46.507000
|
||||
CVE-2023-49693,0,0,5e2914754dd1f28fa5a23b08c704fc3892fe0278ea02f222ff8211fe8bf4b7d2,2023-12-05T01:54:46.047000
|
||||
CVE-2023-49694,0,0,f3cad7b0aab60a0a0dd6b1a45bf578adab64adee5013001acf484fc03402cf40,2023-12-05T01:54:34.097000
|
||||
@ -243884,7 +243885,7 @@ CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175
|
||||
CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000
|
||||
CVE-2024-2325,0,0,23b75df513c3c155a2acfcf2e34574fcebd08fb3e2a0b9207d1fa3d021e99412,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000
|
||||
CVE-2024-23251,0,0,0d35cd5a6c9310bd8afa52edb1ccc0600713cce6e35aec824b38ab3bd3fe95cf,2024-06-10T21:15:49.430000
|
||||
CVE-2024-23251,0,1,ebbd652d9390e8e5e2956f69b6c82faa8898ae4a9db1fad5d807879b937d33ff,2024-06-11T08:15:48.553000
|
||||
CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000
|
||||
CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000
|
||||
CVE-2024-23254,0,0,f51bdaebdfa7043c82ce44968eb18a23393946054fa5c04d601cb0af5a7300fc,2024-05-07T06:15:07.777000
|
||||
@ -243917,7 +243918,7 @@ CVE-2024-23279,0,0,2f2a4da20a4912b04931b6c0ce417bc3b1be9e1a7b15c13f5c7903e852635
|
||||
CVE-2024-2328,0,0,cc711e7491762a1ee61375ce4ed11bcc6b5385ac1da7fe6c68d22fc72362eb3d,2024-05-02T18:00:37.360000
|
||||
CVE-2024-23280,0,0,c55716574063aa546cbe7741f1ce5061fce7685b12d62c9698138d2015ee1892,2024-05-07T06:15:08.307000
|
||||
CVE-2024-23281,0,0,674de30f69505c52d01e5fe7880d69cb7b5b61a38fa5019ea24d9b4fefc1ec80,2024-03-13T21:15:58.150000
|
||||
CVE-2024-23282,0,0,306fcb0b47a3ea59501078c1d3943bc8e46796f3bf158b648330c6ca0bdee7ae,2024-06-10T21:15:49.503000
|
||||
CVE-2024-23282,0,1,4698c3707e2b2c3f9d85949d1c0ba3589b4f1d95ffb336cfbece2384dc7d6ce3,2024-06-11T08:15:48.650000
|
||||
CVE-2024-23283,0,0,0202e856d9f25468386c96fd4038e5f441de45cb2a237c843486f3dc6e784c3a,2024-03-13T23:15:47.470000
|
||||
CVE-2024-23284,0,0,d09aa0bfe274606474c4572bafdbf18831f3c38a9e756039727b5339544024ad,2024-05-07T06:15:08.473000
|
||||
CVE-2024-23285,0,0,e5df014d4a83c708ed8a25bbbb190dde1bd7ec52fe6d53091bf0a994e268833e,2024-03-13T21:15:58.280000
|
||||
@ -246853,69 +246854,69 @@ CVE-2024-27791,0,0,44e295d56ae82c935e7837aa163b1c182c6b8efd5ceb84b892de3324ac969
|
||||
CVE-2024-27792,0,0,f4c93ffbcf0fa2b69a394e4f8043e5a055ca57351625146acb468cc524a0cb16,2024-06-10T20:54:18.443000
|
||||
CVE-2024-27793,0,0,353572505ffd41c49c8a655c8653c3aeaf93e2259f3ba926c49eca056984adca,2024-06-10T18:15:28.523000
|
||||
CVE-2024-27794,0,0,f83311c8ff012592a70730809fe5cac1d0e670b37674538bd8092c8ae8d69027,2024-04-16T13:24:07.103000
|
||||
CVE-2024-27796,0,0,992144573d1e92050b8d1a885c008f1e1dbb47eb40e4c3600f436a4e8737bc49,2024-06-10T18:15:28.577000
|
||||
CVE-2024-27798,0,0,d7e6a4f8d8f638eecc2f4b89832612b5d34631f3d78207810c824e98e4bcf449,2024-06-10T18:15:28.640000
|
||||
CVE-2024-27799,0,0,9ba63a0adf2c1c42c78ef215c5d2409cce159a4d63d7392b9ac8758c548dd0cc,2024-06-10T21:15:49.607000
|
||||
CVE-2024-27796,0,1,0f6294260561edcbf030914cbfc2e2f9112190409fca9765281ce7a127290cce,2024-06-11T08:15:48.723000
|
||||
CVE-2024-27798,0,1,96770d0ca7d69538b21522ed5c1df64fc164bf06c1fda12cf5ffe66287c823eb,2024-06-11T08:15:48.807000
|
||||
CVE-2024-27799,0,1,6370a58731e78a9a5fd4820834a372b803e0e08b53f662528346d6f6fc04f7e0,2024-06-11T08:15:48.860000
|
||||
CVE-2024-2780,0,0,ebb4d263bdb4979d90a73abab8050be4d34d6c520d6b3b8fff46d8c73490b44f,2024-05-17T02:38:30.160000
|
||||
CVE-2024-27800,0,0,c9023f2fc1a939c2b504d53cd7d0a6dcd64147c963504a98ec95d1c3930651a6,2024-06-10T21:15:49.683000
|
||||
CVE-2024-27801,0,0,22f4593a7f5fadd4f42d99784297ef76bc70f7586bcbfb3c48cb071ed073af81,2024-06-10T21:15:49.770000
|
||||
CVE-2024-27802,0,0,979361176e246fda5d4bbc54a25c1047c804c3066ef17e774011290fe55d2891,2024-06-10T21:15:49.860000
|
||||
CVE-2024-27800,0,1,3565476e7caa26b53ebc9a379a5107839c56a3599c85568f05ffd87486e8de9e,2024-06-11T08:15:48.930000
|
||||
CVE-2024-27801,0,1,d166120fb4ba1b6f905a86cb45d0a567fedc947c730fe9ae4e27dcc24c47d313,2024-06-11T08:15:49.007000
|
||||
CVE-2024-27802,0,1,d9f0f170303b1b115564771b5cc04b393ff158154b2540d185c00b349ac98951,2024-06-11T08:15:49.077000
|
||||
CVE-2024-27803,0,0,53706579cbd6412d2f61db763826287c31c4944b996a096fc5d655cd875e9fe8,2024-06-10T18:15:28.727000
|
||||
CVE-2024-27804,0,0,b62a48f9287009a5776ff73fff04f1a8014c48cf3784f3553bc30fd3fc9e5868,2024-06-10T18:15:28.780000
|
||||
CVE-2024-27805,0,0,f3e043f9edda28f318b570567bc863c6b8d38c40c7c886c279edbace9ebeea6e,2024-06-10T21:15:49.943000
|
||||
CVE-2024-27806,0,0,e676feeee72daeef2c626aae3ba8e890c1b971193584bc0ea4327d49167553d2,2024-06-10T21:15:50.020000
|
||||
CVE-2024-27807,0,0,38cab12dc4d1b20883788d28f72c3de7333331c9e5a04616d5a90a2425403886,2024-06-10T21:15:50.093000
|
||||
CVE-2024-27805,0,1,7d3d5392c3734bbb7ab3d1ddbe341bc7d3aef0cbee247c3e73f420a147ba42e3,2024-06-11T08:15:49.147000
|
||||
CVE-2024-27806,0,1,eee1f85b3b69863560b6c24b9b5f1bbcd80bd54fbc16bdef38dfe65ead269313,2024-06-11T08:15:49.217000
|
||||
CVE-2024-27807,0,1,8dc6b761352f08ba8ab4989a940b43ece8706688015ef9b5ecee22ef02a5775d,2024-06-11T08:15:49.287000
|
||||
CVE-2024-27808,0,0,c5d6ad2da90adef91ca34b1dfe39cad84bfdf1003557cd00d472f4add705d97b,2024-06-10T21:15:50.160000
|
||||
CVE-2024-2781,0,0,7440c381afc245ac61500f5670c7b774787526dc48ee470e168c2fa8882d9975,2024-03-27T12:29:30.307000
|
||||
CVE-2024-27810,0,0,16d32a3b215e9b0582e26e0a0c6f925a83804d78673849bf3b3aaacfe98ee515,2024-06-10T18:15:28.843000
|
||||
CVE-2024-27811,0,0,b76af7f791c9b967c1b99a366d75de5aa45bb642cb9d7bb0324b518b4e4514c5,2024-06-10T21:15:50.230000
|
||||
CVE-2024-27810,0,1,f36cf8877043b3c02a9350712f62c03fcb599625852fd9446ed0d3dcc7aa3a57,2024-06-11T08:15:49.350000
|
||||
CVE-2024-27811,0,1,6947c96cbb574595b4c8cbc58e2afce0f0eeeab7237cd40d0289795536ff0e21,2024-06-11T08:15:49.427000
|
||||
CVE-2024-27812,0,0,7c1594f8a376157e9d4a293e3066e7a40135f2bee1f63f6588c9b0afb89aeff4,2024-06-10T21:15:50.300000
|
||||
CVE-2024-27813,0,0,e5f2882c5f57de51fb8cbfdbe3d9f69786dda1b139d68761ff0d9306574aba8e,2024-06-10T18:15:28.920000
|
||||
CVE-2024-27814,0,0,0fff7cb9f482c678859fcb2e6ca8ec83aeca9aa6e9bb26ec7b2a039dff004630,2024-06-10T21:15:50.373000
|
||||
CVE-2024-27815,0,0,50ba975ebe503a983613f08758133d418519e46146afb2b007057bc519776db5,2024-06-10T21:15:50.440000
|
||||
CVE-2024-27814,0,1,eeaabcf0af43d2d2d437ac0c177d88ea91c177c69fd98cc72cde55b3a67c541b,2024-06-11T08:15:49.493000
|
||||
CVE-2024-27815,0,1,ca59586ae6c3ac36223850ab3941c64f95b81f012a5a3e198f89480616da55ab,2024-06-11T08:15:49.553000
|
||||
CVE-2024-27816,0,0,796a750f65ffb329e29033d8bba60513b21bc14881ed71a1b811a2e04501ae1b,2024-06-10T18:15:28.970000
|
||||
CVE-2024-27817,0,0,37abe8d93777a734d085bafc860a69da1e63516262e7e8d8f3d3c70dbcc7d3ce,2024-06-10T21:15:50.547000
|
||||
CVE-2024-27818,0,0,1614df26ae8bcb22fdc1bdb7edc5385e3ab6e2bbd6920be5d393a8a30fdbd930,2024-06-10T18:15:29.033000
|
||||
CVE-2024-27819,0,0,2fdaf9da2ba1f05fc545029836a61bfd56378797adf535bb5248688e0a8ffbb7,2024-06-10T21:15:50.623000
|
||||
CVE-2024-27817,0,1,8e11d15bcd1ed7dba693b6af0a32b354b5ccd59d958a6ceaa498de2f9b9b77a3,2024-06-11T08:15:49.630000
|
||||
CVE-2024-27818,0,1,53d578e3a0a5c74afcd3cfe2146b5bdd30d3ee9cca34913d6e2df31ef7d7a6a4,2024-06-11T08:15:49.700000
|
||||
CVE-2024-27819,0,1,d8f471c4c2313791f1824fa7ed00bf3dda3c9686920e98f22d480b69e8f5fd8b,2024-06-11T08:15:49.770000
|
||||
CVE-2024-2782,0,0,91d9b539aa31e7a5bf0be259f7ee77e02d3f24638d700db95962fd57c1db4b96,2024-05-20T13:00:34.807000
|
||||
CVE-2024-27820,0,0,0b7e745f316a152e549d15cfc15186618e9c36d6031e23d8a35d2a44a0018f43,2024-06-10T21:15:50.693000
|
||||
CVE-2024-27821,0,0,1de7b9a00e0f15ecd864890bdb004777a3be2018051ca91dd74315d450ee5849,2024-06-10T18:15:29.097000
|
||||
CVE-2024-27822,0,0,523a0187399a43dcbb08e6d44e81c3f2dbc8fa1f2bc5926aeab19b9c97bd93b4,2024-06-10T18:15:29.157000
|
||||
CVE-2024-27824,0,0,5baa488a9d673064b6e6f95d574180ba96aab554685e92b6132d6835e438d5ff,2024-06-10T18:15:29.213000
|
||||
CVE-2024-27824,0,1,bac18298cb87bbf4437c3c19802ecf7c192a4b0487eb1723234b03d4506aa7e9,2024-06-11T08:15:49.830000
|
||||
CVE-2024-27825,0,0,37ba7296b9e432dd36a2f579aa8aa6b1828ebb3ec4651f97514f9da1fedab657,2024-06-10T18:15:29.263000
|
||||
CVE-2024-27827,0,0,92b78016d4f01597714cf96e8c975248ece627f4697a35c55877f20dc7fafa53,2024-06-10T18:15:29.320000
|
||||
CVE-2024-27828,0,0,b950febc87bc7fd1bf4b29a498a41907a9e3780f3f0194e5d91555a9fdcfa7b7,2024-06-10T21:15:50.773000
|
||||
CVE-2024-27827,0,1,f606ee564bddcdd28f55aa4bba96bebbc2683729b049ba42feab41bc19daec3f,2024-06-11T08:15:49.890000
|
||||
CVE-2024-27828,0,1,0d2c594f1a6679da57e59e276ad50ba86d1e8db33161d1f5b6bc7419f4c3194a,2024-06-11T08:15:49.950000
|
||||
CVE-2024-27829,0,0,24825b1ab4796019403a414c0e4a694a721b0ade700a310f7fa91966f0664d24,2024-06-10T18:15:29.377000
|
||||
CVE-2024-2783,0,0,5e3d9294a74b759ac7450c1cf79e73d07c944f71ed4c195d3306f256a09a6879,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27830,0,0,643564c7c1a1b5c495e2090a8d9aa4d6159c1aa3fb2d2378c33917209433319e,2024-06-10T21:15:50.843000
|
||||
CVE-2024-27831,0,0,f779f3caaf9df9840f8886a4f61dce7cbc85c3ff532feee1ebb8228fe8ba57c6,2024-06-10T21:15:50.927000
|
||||
CVE-2024-27832,0,0,4f3ee586befd66c300bd0241ec0976b6f523dbc6756d9daa24f85e3cb4e21622,2024-06-10T21:15:51.007000
|
||||
CVE-2024-27831,0,1,bb8a237cc1f1f5a56ae007aea4b54664c00d0b6ef8f3f8e32a66b9e0bd37d563,2024-06-11T08:15:50.017000
|
||||
CVE-2024-27832,0,1,8a0f652705f4fb553dbbdc205b8b54cff9258ce9c187242762544beb74ae003d,2024-06-11T08:15:50.127000
|
||||
CVE-2024-27833,0,0,189d6e5dcb44802cb4a822a4304c72d38a56f9c07c67ca79ba6a88b7b2a7bf0d,2024-06-10T21:15:51.090000
|
||||
CVE-2024-27834,0,0,2d4186f2cb5cbe4f2f8f3e55a2545b1878bf5a77624083576b159f1d995ce82a,2024-06-10T18:15:29.430000
|
||||
CVE-2024-27835,0,0,c3d25dd6cfd2f797e5af53adbf0373a3dd203d6ad6e8d11af15dc203eb2402ab,2024-06-10T18:15:29.497000
|
||||
CVE-2024-27836,0,0,58be76f35b76eaa63b11d542f791ed557217824a955720e8a98311f782567e76,2024-06-10T21:15:51.167000
|
||||
CVE-2024-27836,0,1,5a1200baf3acfd07d33e45e3c4d5995280335cd8ce65576b156979ede325bec3,2024-06-11T08:15:50.193000
|
||||
CVE-2024-27837,0,0,901f3c3a397896b090baa01f5e16b0462e9f3677320c7d083f0561d63284135d,2024-06-10T18:15:29.550000
|
||||
CVE-2024-27838,0,0,57089a9eb08f45ade2765a0cb9666d92674eb67f3917ced8cfddd01950a9d9ed,2024-06-10T21:15:51.240000
|
||||
CVE-2024-27839,0,0,dc2551c161bade026d50a7722610913c7d6281d71628fa7705ad0b54f8ad144e,2024-06-10T18:15:29.607000
|
||||
CVE-2024-2784,0,0,ba1190a588b039c20289ccfefd73f048dc164c370109c9a0315fb7e323728a74,2024-05-24T13:03:11.993000
|
||||
CVE-2024-27840,0,0,73811411fe8568e94c8a58fdc8e4f6a5bb632664acf9c04146fedc22f1c147ec,2024-06-10T21:15:51.313000
|
||||
CVE-2024-27840,0,1,0a2090bd3ecc65a08c6a1db35bc5638d75d7e365ac7ace65deb9c99a3c8fd162,2024-06-11T08:15:50.260000
|
||||
CVE-2024-27841,0,0,160e608c0f194092a3d3fa2958525a7ea0dc3c80c71963835592dc22256a7e3a,2024-06-10T18:15:29.657000
|
||||
CVE-2024-27842,0,0,c2f4ad1e4648fa9ae5110e6bcc4b9d3a34413349e7ab03cdd6ea669b8d6af4f4,2024-06-10T18:15:29.733000
|
||||
CVE-2024-27843,0,0,f04a611287e4c37cea29b8fc6d491a577bfba9574b575f57111029725539f40c,2024-06-10T18:15:29.790000
|
||||
CVE-2024-27844,0,0,656395c1ffb59a368b5cdda145522c2eab15f70feb9d69926b92dd383ecb3e41,2024-06-10T21:15:51.390000
|
||||
CVE-2024-27845,0,0,68dfb03f19709b33f86d86b34d4d70a6e93fc14312095d72a322215222b649ea,2024-06-10T21:15:51.467000
|
||||
CVE-2024-27847,0,0,afb0c107691a812d0828b454c97dccbae70291ac03525fa2ae723faad45e31db,2024-06-10T18:15:29.840000
|
||||
CVE-2024-27848,0,0,14fb9de4af35c5cd7ee210411e85a979154da98a16baa3c219b68be3860d1c53,2024-06-10T21:15:51.530000
|
||||
CVE-2024-27843,0,1,caaa2b70673c0fd7a60807026442c43e55ad72502b0f967bc1cef9c19a74b1af,2024-06-11T08:15:50.327000
|
||||
CVE-2024-27844,0,1,2fe77bd0ec7fc4a752768e59949964f476238b5da61a6b9eefbb6d842c089af4,2024-06-11T08:15:50.390000
|
||||
CVE-2024-27845,0,1,e4e364c0de4d5c163620e93f45806a9488521cdc85c26abc56d2337b9c26f0a4,2024-06-11T08:15:50.457000
|
||||
CVE-2024-27847,0,1,5b46b94da4559b57e8ec553aeceab469e79f3b10d85d6cbba1ed5528322d1b03,2024-06-11T08:15:50.523000
|
||||
CVE-2024-27848,0,1,e7e14b2cff9994fe57037ebd90ba8b65f783c0e9cff8cfa3d5e01f8fe7e70318,2024-06-11T08:15:50.593000
|
||||
CVE-2024-2785,0,0,f421029e3ad60193115519ce84f2fb34a615c8431383b64062041ee6b872f244,2024-05-14T16:13:02.773000
|
||||
CVE-2024-27850,0,0,b05f8f0af68e74bd0947e7946fb110526f99ba0d9891673f450eff3d2255e925,2024-06-10T21:15:51.607000
|
||||
CVE-2024-27851,0,0,b7191311ac7712f457513c047ee5765686658cbbff76be1d645e02d5edd5b3a3,2024-06-10T21:15:51.680000
|
||||
CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000
|
||||
CVE-2024-27855,0,0,12948826eeab402c4e41686b446997191464ba8f13565e0cc3689bdc9910883e,2024-06-10T21:15:51.753000
|
||||
CVE-2024-27857,0,0,0a9e62fa2179edc33ac42f2faea2a0c4fdd8167f0c2cf54c68f7ad05d1c72cc3,2024-06-10T21:15:51.833000
|
||||
CVE-2024-27855,0,1,7404b31c96a3ea932f0a46bb5231457366939a39cf2ce33cc30f92b442b0c9f8,2024-06-11T08:15:50.653000
|
||||
CVE-2024-27857,0,1,dc3fb1b112a51d71fcff4b337dbb4f89a79ea2e2bcce46ef41e3ccdbb559becd,2024-06-11T08:15:50.720000
|
||||
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
|
||||
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27885,0,0,5369596a9513daaef11920142ecca9cad44fa3efda5fa33a70f7e19d6add0979,2024-06-10T21:15:51.903000
|
||||
CVE-2024-27885,0,1,919b2fa70f309158c80cef6f773433c035d64bc9a0f261cecbcc346fe38429a6,2024-06-11T08:15:50.787000
|
||||
CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000
|
||||
CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000
|
||||
@ -249093,13 +249094,13 @@ CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63
|
||||
CVE-2024-31394,0,0,37a6c6ef2bd7d41356078f2b3597ee7803c3d40e7ebe2f84759f8ace62500d88,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31395,0,0,b30f8ee229d1f4f2f6537c380ff54efa3e461a52badeb419e6445201c1a3b054,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31396,0,0,b9f3c7c1150f9fb33024855b15874b092964398220773ed5b63437613ca6402c,2024-05-22T12:46:53.887000
|
||||
CVE-2024-31397,1,1,fd410cefeafb68aee70c768f9a0fda48768a5c67d520d80a234ae6e9bcae192a,2024-06-11T06:15:10.057000
|
||||
CVE-2024-31398,1,1,0b7bcc6eac5b3d442ea96d7fbc07e94d4d970fa86b6bd5545a4f7457e770e669,2024-06-11T06:15:10.347000
|
||||
CVE-2024-31399,1,1,9676addf2a8b62136dd145546201de91c486a33b0acfad9893446c5d5b26efbe,2024-06-11T06:15:10.490000
|
||||
CVE-2024-31397,0,0,fd410cefeafb68aee70c768f9a0fda48768a5c67d520d80a234ae6e9bcae192a,2024-06-11T06:15:10.057000
|
||||
CVE-2024-31398,0,0,0b7bcc6eac5b3d442ea96d7fbc07e94d4d970fa86b6bd5545a4f7457e770e669,2024-06-11T06:15:10.347000
|
||||
CVE-2024-31399,0,0,9676addf2a8b62136dd145546201de91c486a33b0acfad9893446c5d5b26efbe,2024-06-11T06:15:10.490000
|
||||
CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000
|
||||
CVE-2024-31400,0,0,571e90c89c324436c61bfdc535dd35c740568bde75455a6e686590a23b323549,2024-06-11T05:15:53.130000
|
||||
CVE-2024-31401,0,0,3439f58a4c3513eb4eeaf76a66cc8317220b63b0282fd7e7c3c063bc877be93f,2024-06-11T05:15:53.320000
|
||||
CVE-2024-31402,1,1,df70ad92e4bf5b7acecb90dc4cc7f9c125f36816b1e13caf761f8e730e132965,2024-06-11T06:15:10.650000
|
||||
CVE-2024-31402,0,0,df70ad92e4bf5b7acecb90dc4cc7f9c125f36816b1e13caf761f8e730e132965,2024-06-11T06:15:10.650000
|
||||
CVE-2024-31403,0,0,92c5bd46e4ffc852724f2939861650a337e969f86fd5d8df93cf756dd6500f2f,2024-06-11T05:15:53.397000
|
||||
CVE-2024-31404,0,0,146d7af636a9d18ee51e0529992d414c931054e16425a0f9134f7d7bbef93cce,2024-06-11T05:15:53.463000
|
||||
CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000
|
||||
@ -251259,7 +251260,7 @@ CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c99
|
||||
CVE-2024-35474,0,0,7337b8e2371c2dae27b970b8112f0f83bae7631b3b28e88457636e9df18bc231,2024-06-10T18:06:22.600000
|
||||
CVE-2024-35475,0,0,53effa9dc5e8213551bbdbda32e2dfa4c153fd878258c89c9e91bb711c7a017e,2024-05-22T19:15:09.373000
|
||||
CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3549,1,1,9185676ce3b637fef9ff67fa9b3169f6a08a3458d42508cd676ea69204080879,2024-06-11T07:15:41.017000
|
||||
CVE-2024-3549,0,0,9185676ce3b637fef9ff67fa9b3169f6a08a3458d42508cd676ea69204080879,2024-06-11T07:15:41.017000
|
||||
CVE-2024-35492,0,0,a02d0a80cf6795bdd8349f855d15db1b17890353f3564619ef911d889417eed6,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35504,0,0,0960d865c9f0a37450856438a4637b3494eda5adde12ce8eee871eda221f0ce9,2024-05-30T18:19:11.743000
|
||||
@ -252074,7 +252075,7 @@ CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374a
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
|
||||
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3723,1,1,ed62ac93f26978a1b6bc84a25049cd22e212eaa7409abbff64eb926817290616,2024-06-11T06:15:10.793000
|
||||
CVE-2024-3723,0,0,ed62ac93f26978a1b6bc84a25049cd22e212eaa7409abbff64eb926817290616,2024-06-11T06:15:10.793000
|
||||
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
|
||||
@ -252482,6 +252483,7 @@ CVE-2024-4262,0,0,5dd4ebbaf190f9915875ef48f9c729e5248c1328b2e326ae4c2d79cba9dffd
|
||||
CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f16258,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4266,1,1,f2347437c79a02fc0944e43158b9e18e086ae2a7908c024eea47a01b4c7236af,2024-06-11T08:15:50.850000
|
||||
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000
|
||||
@ -252520,7 +252522,7 @@ CVE-2024-4314,0,0,917e44d69c76fb7381314145ce5012ff94d63258309b3ec3d14bdf6a76c85d
|
||||
CVE-2024-4316,0,0,5a945ac0a4e5139fc35505b0ad29ed6f4f78dc21cf82c5a713e2fc10353001af,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4317,0,0,1cfa82abc1d175e3780dda1cd435053fb9f133c668ec60968879d020da51382a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4318,0,0,239860e6603bb5bfa00e4ee1537bbc84372d89871f96aaff86d4c34891350e3a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4319,1,1,9e22a0eda79272a3e241790bf9bf980072ff35cf4cebe45f406786f622d30fc5,2024-06-11T06:15:11.407000
|
||||
CVE-2024-4319,0,0,9e22a0eda79272a3e241790bf9bf980072ff35cf4cebe45f406786f622d30fc5,2024-06-11T06:15:11.407000
|
||||
CVE-2024-4320,0,0,e47f6067fb0d170ab8dbc0733b163211a60f027ef1254b440e10fe81fe453718,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4321,0,0,52291df02a369d9bb947287933b2cb70cdba5b6bd48fddb1c2e0073aed4231c4,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4322,0,0,26c76f88e5d4d6383f99407dee54ae56585f3dcb15c99e63b32362e726df8b5e,2024-05-16T13:03:05.353000
|
||||
@ -253331,6 +253333,7 @@ CVE-2024-5524,0,0,e7e0fe13822be5d672aca31e1ee31e0f364bc62cac379db56dfa86e4e6649c
|
||||
CVE-2024-5525,0,0,27d51e0f90117d5f6e29d565f6efd293c83de249201cb9426e9c70697dbb918d,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5526,0,0,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5530,0,0,c88c71d0fc4a469ec001167841485a2cedfa66755e447a724b42beedce8d6868,2024-06-11T05:15:53.680000
|
||||
CVE-2024-5531,1,1,3a6fe62957d942440ddea7e1702427c2602def8435558d50911e6cece6a7b47d,2024-06-11T09:15:17.273000
|
||||
CVE-2024-5536,0,0,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
|
||||
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user