Auto-Update: 2024-06-11T10:00:19.384593+00:00

This commit is contained in:
cad-safe-bot 2024-06-11 10:03:11 +00:00
parent a4a4575fd7
commit 0272b6bcc7
53 changed files with 846 additions and 126 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2020-11843",
"sourceIdentifier": "security@opentext.com",
"published": "2024-06-11T08:15:48.213",
"lastModified": "2024-06-11T08:15:48.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "This allows the information exposure to unauthorized users.\u00a0This issue affects NetIQ Access Manager using version 4.5 or before"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/access-manager-44/accessmanager444-hf3-release-notes/data/accessmanager444-hf3-release-notes.html",
"source": "security@opentext.com"
},
{
"url": "https://www.netiq.com/documentation/access-manager-45/accessmanager452-hf1-release-notes/data/accessmanager452-hf1-release-notes.html",
"source": "security@opentext.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-28400",
"sourceIdentifier": "productcert@siemens.com",
"published": "2021-07-13T11:15:08.960",
"lastModified": "2022-04-12T09:15:10.397",
"lastModified": "2024-06-11T09:15:09.487",
"vulnStatus": "Modified",
"descriptions": [
{
@ -35,6 +35,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -2256,6 +2276,10 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf",
"source": "productcert@siemens.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-25622",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-04-12T09:15:14.483",
"lastModified": "2024-05-14T16:15:23.660",
"lastModified": "2024-06-11T09:15:10.623",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200AL IM157-1 PN, SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments."
"value": "A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38773",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-01-10T12:15:23.103",
"lastModified": "2023-01-13T20:33:20.213",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-11T09:15:11.087",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -1969,6 +1969,10 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-482757.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482757.pdf",
"source": "productcert@siemens.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-43716",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-04-11T10:15:17.467",
"lastModified": "2023-05-09T13:15:15.390",
"lastModified": "2024-06-11T09:15:11.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation which leads to a restart of the webserver of the affected product."
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation which leads to a restart of the webserver of the affected product."
}
],
"metrics": {
@ -723,6 +723,14 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf",
"source": "productcert@siemens.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-43767",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-04-11T10:15:17.540",
"lastModified": "2023-05-09T13:15:15.557",
"lastModified": "2024-06-11T09:15:11.907",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
}
],
"metrics": {
@ -713,6 +713,14 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf",
"source": "productcert@siemens.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-43768",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-04-11T10:15:17.617",
"lastModified": "2023-05-09T13:15:15.713",
"lastModified": "2024-06-11T09:15:12.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
"value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product."
}
],
"metrics": {
@ -703,6 +703,14 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf",
"source": "productcert@siemens.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-46144",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:25.200",
"lastModified": "2023-10-10T11:15:10.987",
"lastModified": "2024-06-11T09:15:12.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= V2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive."
"value": "A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive."
},
{
"lang": "es",
@ -425,6 +425,14 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-413565.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf",
"source": "productcert@siemens.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38640",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-10-10T11:15:12.063",
"lastModified": "2023-10-14T02:43:46.027",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-11T09:15:13.423",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -90,6 +90,10 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-035466.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf",
"source": "productcert@siemens.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44317",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-11-14T11:15:12.067",
"lastModified": "2024-02-13T09:15:43.880",
"lastModified": "2024-06-11T09:15:13.730",
"vulnStatus": "Modified",
"descriptions": [
{
@ -1924,6 +1924,10 @@
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
"source": "productcert@siemens.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44318",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-11-14T11:15:12.287",
"lastModified": "2024-03-12T11:15:46.620",
"lastModified": "2024-06-11T09:15:14.333",
"vulnStatus": "Modified",
"descriptions": [
{
@ -2069,6 +2069,10 @@
"url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf",
"source": "productcert@siemens.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44319",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-11-14T11:15:12.510",
"lastModified": "2024-02-13T09:15:44.103",
"lastModified": "2024-06-11T09:15:14.940",
"vulnStatus": "Modified",
"descriptions": [
{
@ -2069,6 +2069,10 @@
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
"source": "productcert@siemens.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44373",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-11-14T11:15:13.417",
"lastModified": "2024-02-13T09:15:44.957",
"lastModified": "2024-06-11T09:15:15.377",
"vulnStatus": "Modified",
"descriptions": [
{
@ -2049,6 +2049,10 @@
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
"source": "productcert@siemens.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44374",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-11-14T11:15:13.753",
"lastModified": "2024-03-12T11:15:47.267",
"lastModified": "2024-06-11T09:15:15.990",
"vulnStatus": "Modified",
"descriptions": [
{
@ -2065,6 +2065,10 @@
"url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html",
"source": "productcert@siemens.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45205",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-10-10T11:15:13.163",
"lastModified": "2023-10-14T02:24:01.100",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-11T09:15:16.577",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -70,6 +70,10 @@
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-035466.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf",
"source": "productcert@siemens.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-49691",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-12-12T12:15:15.990",
"lastModified": "2024-02-13T09:15:46.373",
"lastModified": "2024-06-11T09:15:16.840",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update."
"value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update."
},
{
"lang": "es",
@ -641,6 +641,10 @@
"url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html",
"source": "productcert@siemens.com"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf",
"source": "productcert@siemens.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23251",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.430",
"lastModified": "2024-06-10T21:15:49.430",
"lastModified": "2024-06-11T08:15:48.553",
"vulnStatus": "Received",
"descriptions": [
{
@ -27,6 +27,22 @@
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23282",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.503",
"lastModified": "2024-06-10T21:15:49.503",
"lastModified": "2024-06-11T08:15:48.650",
"vulnStatus": "Received",
"descriptions": [
{
@ -27,6 +27,22 @@
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27796",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:03.243",
"lastModified": "2024-06-10T18:15:28.577",
"lastModified": "2024-06-11T08:15:48.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -32,13 +32,25 @@
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27798",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:03.593",
"lastModified": "2024-06-10T18:15:28.640",
"lastModified": "2024-06-11T08:15:48.807",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -24,9 +24,17 @@
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27799",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.607",
"lastModified": "2024-06-10T21:15:49.607",
"lastModified": "2024-06-11T08:15:48.860",
"vulnStatus": "Received",
"descriptions": [
{
@ -27,6 +27,22 @@
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27800",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.683",
"lastModified": "2024-06-10T21:15:49.683",
"lastModified": "2024-06-11T08:15:48.930",
"vulnStatus": "Received",
"descriptions": [
{
@ -44,6 +44,34 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27801",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.770",
"lastModified": "2024-06-10T21:15:49.770",
"lastModified": "2024-06-11T08:15:49.007",
"vulnStatus": "Received",
"descriptions": [
{
@ -32,6 +32,22 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27802",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.860",
"lastModified": "2024-06-10T21:15:49.860",
"lastModified": "2024-06-11T08:15:49.077",
"vulnStatus": "Received",
"descriptions": [
{
@ -40,6 +40,30 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27805",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:49.943",
"lastModified": "2024-06-10T21:15:49.943",
"lastModified": "2024-06-11T08:15:49.147",
"vulnStatus": "Received",
"descriptions": [
{
@ -39,6 +39,34 @@
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27806",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.020",
"lastModified": "2024-06-10T21:15:50.020",
"lastModified": "2024-06-11T08:15:49.217",
"vulnStatus": "Received",
"descriptions": [
{
@ -39,6 +39,34 @@
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27807",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.093",
"lastModified": "2024-06-10T21:15:50.093",
"lastModified": "2024-06-11T08:15:49.287",
"vulnStatus": "Received",
"descriptions": [
{
@ -19,6 +19,14 @@
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27810",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:04.267",
"lastModified": "2024-06-10T18:15:28.843",
"lastModified": "2024-06-11T08:15:49.350",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -60,9 +60,17 @@
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27811",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.230",
"lastModified": "2024-06-10T21:15:50.230",
"lastModified": "2024-06-11T08:15:49.427",
"vulnStatus": "Received",
"descriptions": [
{
@ -32,6 +32,22 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27814",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.373",
"lastModified": "2024-06-10T21:15:50.373",
"lastModified": "2024-06-11T08:15:49.493",
"vulnStatus": "Received",
"descriptions": [
{
@ -15,6 +15,10 @@
{
"url": "https://support.apple.com/en-us/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27815",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.440",
"lastModified": "2024-06-10T21:15:50.440",
"lastModified": "2024-06-11T08:15:49.553",
"vulnStatus": "Received",
"descriptions": [
{
@ -32,6 +32,22 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27817",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.547",
"lastModified": "2024-06-10T21:15:50.547",
"lastModified": "2024-06-11T08:15:49.630",
"vulnStatus": "Received",
"descriptions": [
{
@ -40,6 +40,30 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27818",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:05.047",
"lastModified": "2024-06-10T18:15:29.033",
"lastModified": "2024-06-11T08:15:49.700",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -32,6 +32,10 @@
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27819",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.623",
"lastModified": "2024-06-10T21:15:50.623",
"lastModified": "2024-06-11T08:15:49.770",
"vulnStatus": "Received",
"descriptions": [
{
@ -15,6 +15,10 @@
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27824",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:05.807",
"lastModified": "2024-06-10T18:15:29.213",
"lastModified": "2024-06-11T08:15:49.830",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -24,9 +24,17 @@
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27827",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:06.363",
"lastModified": "2024-06-10T18:15:29.320",
"lastModified": "2024-06-11T08:15:49.890",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -27,6 +27,10 @@
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27828",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.773",
"lastModified": "2024-06-10T21:15:50.773",
"lastModified": "2024-06-11T08:15:49.950",
"vulnStatus": "Received",
"descriptions": [
{
@ -28,6 +28,18 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27831",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:50.927",
"lastModified": "2024-06-10T21:15:50.927",
"lastModified": "2024-06-11T08:15:50.017",
"vulnStatus": "Received",
"descriptions": [
{
@ -40,6 +40,30 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27832",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.007",
"lastModified": "2024-06-10T21:15:51.007",
"lastModified": "2024-06-11T08:15:50.127",
"vulnStatus": "Received",
"descriptions": [
{
@ -32,6 +32,22 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27836",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.167",
"lastModified": "2024-06-10T21:15:51.167",
"lastModified": "2024-06-11T08:15:50.193",
"vulnStatus": "Received",
"descriptions": [
{
@ -24,6 +24,14 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27840",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.313",
"lastModified": "2024-06-10T21:15:51.313",
"lastModified": "2024-06-11T08:15:50.260",
"vulnStatus": "Received",
"descriptions": [
{
@ -40,6 +40,30 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214104",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27843",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:08.437",
"lastModified": "2024-06-10T18:15:29.790",
"lastModified": "2024-06-11T08:15:50.327",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -24,9 +24,17 @@
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27844",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.390",
"lastModified": "2024-06-10T21:15:51.390",
"lastModified": "2024-06-11T08:15:50.390",
"vulnStatus": "Received",
"descriptions": [
{
@ -24,6 +24,10 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27845",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.467",
"lastModified": "2024-06-10T21:15:51.467",
"lastModified": "2024-06-11T08:15:50.457",
"vulnStatus": "Received",
"descriptions": [
{
@ -15,6 +15,10 @@
{
"url": "https://support.apple.com/en-us/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27847",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:08.743",
"lastModified": "2024-06-10T18:15:29.840",
"lastModified": "2024-06-11T08:15:50.523",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -32,13 +32,25 @@
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27848",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.530",
"lastModified": "2024-06-10T21:15:51.530",
"lastModified": "2024-06-11T08:15:50.593",
"vulnStatus": "Received",
"descriptions": [
{
@ -19,6 +19,14 @@
{
"url": "https://support.apple.com/en-us/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27855",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.753",
"lastModified": "2024-06-10T21:15:51.753",
"lastModified": "2024-06-11T08:15:50.653",
"vulnStatus": "Received",
"descriptions": [
{
@ -27,6 +27,22 @@
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214100",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27857",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.833",
"lastModified": "2024-06-10T21:15:51.833",
"lastModified": "2024-06-11T08:15:50.720",
"vulnStatus": "Received",
"descriptions": [
{
@ -28,6 +28,18 @@
"url": "https://support.apple.com/en-us/HT214108",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214101",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214102",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214108",
"source": "product-security@apple.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27885",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T21:15:51.903",
"lastModified": "2024-06-10T21:15:51.903",
"lastModified": "2024-06-11T08:15:50.787",
"vulnStatus": "Received",
"descriptions": [
{
@ -23,6 +23,18 @@
{
"url": "https://support.apple.com/en-us/HT214107",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214105",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214106",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT214107",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4266",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-11T08:15:50.850",
"lastModified": "2024-06-11T08:15:50.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The MetForm \u2013 Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.8.8 via the 'handle_file' function. This can allow unauthenticated attackers to extract sensitive data, such as Personally Identifiable Information, from files uploaded by users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/metform/trunk/core/entries/action.php#L1019",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3099977/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8edb72f5-dda3-4c59-ba7a-7a460cb59c03?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5531",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-11T09:15:17.273",
"lastModified": "2024-06-11T09:15:17.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Flickr widget in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.2.8/includes/widgets/flickr.php#L59",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b39e17c5-711f-4229-90f4-213ea65a190d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-11T08:00:25.665847+00:00
2024-06-11T10:00:19.384593+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-11T07:15:41.017000+00:00
2024-06-11T09:15:17.273000+00:00
```
### Last Data Feed Release
@ -33,27 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
253385
253388
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `3`
- [CVE-2024-31397](CVE-2024/CVE-2024-313xx/CVE-2024-31397.json) (`2024-06-11T06:15:10.057`)
- [CVE-2024-31398](CVE-2024/CVE-2024-313xx/CVE-2024-31398.json) (`2024-06-11T06:15:10.347`)
- [CVE-2024-31399](CVE-2024/CVE-2024-313xx/CVE-2024-31399.json) (`2024-06-11T06:15:10.490`)
- [CVE-2024-31402](CVE-2024/CVE-2024-314xx/CVE-2024-31402.json) (`2024-06-11T06:15:10.650`)
- [CVE-2024-3549](CVE-2024/CVE-2024-35xx/CVE-2024-3549.json) (`2024-06-11T07:15:41.017`)
- [CVE-2024-3723](CVE-2024/CVE-2024-37xx/CVE-2024-3723.json) (`2024-06-11T06:15:10.793`)
- [CVE-2024-4319](CVE-2024/CVE-2024-43xx/CVE-2024-4319.json) (`2024-06-11T06:15:11.407`)
- [CVE-2020-11843](CVE-2020/CVE-2020-118xx/CVE-2020-11843.json) (`2024-06-11T08:15:48.213`)
- [CVE-2024-4266](CVE-2024/CVE-2024-42xx/CVE-2024-4266.json) (`2024-06-11T08:15:50.850`)
- [CVE-2024-5531](CVE-2024/CVE-2024-55xx/CVE-2024-5531.json) (`2024-06-11T09:15:17.273`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `48`
- [CVE-2014-0808](CVE-2014/CVE-2014-08xx/CVE-2014-0808.json) (`2024-06-11T06:15:08.923`)
- [CVE-2024-27805](CVE-2024/CVE-2024-278xx/CVE-2024-27805.json) (`2024-06-11T08:15:49.147`)
- [CVE-2024-27806](CVE-2024/CVE-2024-278xx/CVE-2024-27806.json) (`2024-06-11T08:15:49.217`)
- [CVE-2024-27807](CVE-2024/CVE-2024-278xx/CVE-2024-27807.json) (`2024-06-11T08:15:49.287`)
- [CVE-2024-27810](CVE-2024/CVE-2024-278xx/CVE-2024-27810.json) (`2024-06-11T08:15:49.350`)
- [CVE-2024-27811](CVE-2024/CVE-2024-278xx/CVE-2024-27811.json) (`2024-06-11T08:15:49.427`)
- [CVE-2024-27814](CVE-2024/CVE-2024-278xx/CVE-2024-27814.json) (`2024-06-11T08:15:49.493`)
- [CVE-2024-27815](CVE-2024/CVE-2024-278xx/CVE-2024-27815.json) (`2024-06-11T08:15:49.553`)
- [CVE-2024-27817](CVE-2024/CVE-2024-278xx/CVE-2024-27817.json) (`2024-06-11T08:15:49.630`)
- [CVE-2024-27818](CVE-2024/CVE-2024-278xx/CVE-2024-27818.json) (`2024-06-11T08:15:49.700`)
- [CVE-2024-27819](CVE-2024/CVE-2024-278xx/CVE-2024-27819.json) (`2024-06-11T08:15:49.770`)
- [CVE-2024-27824](CVE-2024/CVE-2024-278xx/CVE-2024-27824.json) (`2024-06-11T08:15:49.830`)
- [CVE-2024-27827](CVE-2024/CVE-2024-278xx/CVE-2024-27827.json) (`2024-06-11T08:15:49.890`)
- [CVE-2024-27828](CVE-2024/CVE-2024-278xx/CVE-2024-27828.json) (`2024-06-11T08:15:49.950`)
- [CVE-2024-27831](CVE-2024/CVE-2024-278xx/CVE-2024-27831.json) (`2024-06-11T08:15:50.017`)
- [CVE-2024-27832](CVE-2024/CVE-2024-278xx/CVE-2024-27832.json) (`2024-06-11T08:15:50.127`)
- [CVE-2024-27836](CVE-2024/CVE-2024-278xx/CVE-2024-27836.json) (`2024-06-11T08:15:50.193`)
- [CVE-2024-27840](CVE-2024/CVE-2024-278xx/CVE-2024-27840.json) (`2024-06-11T08:15:50.260`)
- [CVE-2024-27843](CVE-2024/CVE-2024-278xx/CVE-2024-27843.json) (`2024-06-11T08:15:50.327`)
- [CVE-2024-27844](CVE-2024/CVE-2024-278xx/CVE-2024-27844.json) (`2024-06-11T08:15:50.390`)
- [CVE-2024-27845](CVE-2024/CVE-2024-278xx/CVE-2024-27845.json) (`2024-06-11T08:15:50.457`)
- [CVE-2024-27847](CVE-2024/CVE-2024-278xx/CVE-2024-27847.json) (`2024-06-11T08:15:50.523`)
- [CVE-2024-27848](CVE-2024/CVE-2024-278xx/CVE-2024-27848.json) (`2024-06-11T08:15:50.593`)
- [CVE-2024-27855](CVE-2024/CVE-2024-278xx/CVE-2024-27855.json) (`2024-06-11T08:15:50.653`)
- [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-06-11T08:15:50.720`)
- [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-06-11T08:15:50.787`)
## Download and Usage

View File

@ -65251,7 +65251,7 @@ CVE-2014-0804,0,0,64f7bcd62c09feae210ed04317dd3c363bf64429ff0d6cc82e25aa05b441d8
CVE-2014-0805,0,0,64ffdc7602e5834fa9b3519c18d42dd7b07d229d431db1ea7d9952fad9ee621e,2014-01-14T04:49:19.543000
CVE-2014-0806,0,0,0f5d623ba97d2afe2377f45b01521ed33883dbba85dc359bb516719da4f3d8f9,2014-08-11T15:04:43.700000
CVE-2014-0807,0,0,f009d972ec55433ad7f1cd0b29e7cbdba3753adab49339cad8b728a428899860,2014-01-23T18:10:13.500000
CVE-2014-0808,0,1,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000
CVE-2014-0808,0,0,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000
CVE-2014-0809,0,0,ea31d36adc72e3733e28eeb6bfacf81b8f998d70f553d482caf7c863538e6e07,2017-08-29T01:34:15.467000
CVE-2014-0810,0,0,45fb5c84f4f5cfdebd55044c843a5258a6f94a800107fdc85390866929ef99a4,2014-01-29T18:39:45.720000
CVE-2014-0811,0,0,c0c381561c327e70759153bf230a2a174504949fe49060ef9f4430788889edad,2015-08-13T17:50:46.333000
@ -146788,6 +146788,7 @@ CVE-2020-1184,0,0,2bc611a049543db6bf0bf6b96fb01e882395cf50149fc8430568f81ad02bb3
CVE-2020-11840,0,0,f3a363f26a4f911ac51cb1707b94aa62c107f076a8e95eb031d6eb4904733f2d,2023-11-07T03:15:09.850000
CVE-2020-11841,0,0,8ed95a170c9554b00d02309e64bcb52d542e966a9b063d6e4530481dd3a5aac4,2023-11-07T03:15:10.113000
CVE-2020-11842,0,0,72986a84d6a13f089beb2b0b7979170abc0ca672832fd4005a2aa7168ec789ef,2023-11-07T03:15:10.373000
CVE-2020-11843,1,1,a9698ab044740d81bbdb07ebecb737de7eaff6808aacccdc260ccb87fd4fa1b7,2024-06-11T08:15:48.213000
CVE-2020-11844,0,0,2522e5538ec7480ee226b0b6b7f39f0a9c65066bf96b2574f3941300e05c8cb6,2023-11-07T03:15:10.640000
CVE-2020-11845,0,0,248133b82b72daffe3c97edaa56bab2fb3dc4f4a3d2b02763eb41b58be878066,2023-11-07T03:15:10.940000
CVE-2020-11848,0,0,fa9c8ea36c6832e28ebc6d0ff933981179cafe85deb16d55c96ce604549714e1,2023-11-07T03:15:11.227000
@ -156799,7 +156800,7 @@ CVE-2020-28395,0,0,bf6970e5d86a5d3341e7e5a9e017673589cd780ee8d139ed41e40a0bd56c9
CVE-2020-28396,0,0,4b8b9560196be43b294881c51a0b380c35f875f9a7f487f8bbb3792ea4489b92,2022-08-06T03:53:39.417000
CVE-2020-28397,0,0,e16106c9ec02a7959bf2e08ae23f8ce25434d9b912ddaa06302608cb3837b077,2021-12-10T19:57:38.487000
CVE-2020-2840,0,0,4c2f7977fe993cf5eae0640b19f693d0670ed59a101cda8990b81da6f52fa632,2020-04-16T15:04:15.507000
CVE-2020-28400,0,0,0ac0ca5003bcb961cec3e5a71f2796c9610254e83a62276d8d20a28226cd560f,2022-04-12T09:15:10.397000
CVE-2020-28400,0,1,44e48fcd1984e09e94e3816766c0a8a381a97641d8772c06c4b4244fcc37a65f,2024-06-11T09:15:09.487000
CVE-2020-28401,0,0,6b7ac2bed4789ade3936183e46203e95f2c8d1218251a425bc12f3a2d16c511b,2021-07-21T11:39:23.747000
CVE-2020-28402,0,0,ff1548c2d2cecd1ccd3eefdafddd80189d711f75d327b7ee849e8196cbc98609,2021-07-21T11:39:23.747000
CVE-2020-28403,0,0,71c248a6d058491bec967509722e848af762d9caca5a00ae18e5842de83e9ac4,2021-02-01T14:14:32.147000
@ -194383,7 +194384,7 @@ CVE-2022-25618,0,0,1f3a8ca8e036fd291b26ce5388418ac1728826c0e9d08b58010dfe34122a4
CVE-2022-25619,0,0,26361509613cfcf315308898948e430abce5baed7495d48b763def148b21870b,2022-04-07T16:28:26.127000
CVE-2022-25620,0,0,15d831c37121985148682e30d5a696db0ec3ddf5afb51bc183b13bda8f418817,2022-04-07T16:25:41.173000
CVE-2022-25621,0,0,0ac0ec39de03543274d1cb6db5c55a310b0d92391145960bc53b5ccb8642cd70,2022-03-22T17:53:02.347000
CVE-2022-25622,0,0,4db8ab8f3c4ec5425dd31970947784f6a9e8ddb46c2425aae8cdfc46eb3911b1,2024-05-14T16:15:23.660000
CVE-2022-25622,0,1,e5fcc34526af5764fe60dbf0d6c3cd9c05316ba3ac3378f6debcd9d363cb2e2e,2024-06-11T09:15:10.623000
CVE-2022-25623,0,0,1dd6be5e3e5a796b51e4d4440e3e1c4ff8505b9300f2c5e3ad4e41625fd9eed8,2023-08-08T14:22:24.967000
CVE-2022-25625,0,0,6ab345f8b324c27f406bd9ee308869f36718f1c391dd3a10b73d5814fa8b4f63,2022-09-01T15:45:15.450000
CVE-2022-25626,0,0,1916dc07d7f5e7cb2f4150889e0dbfab5ec7786293c3740bcad93e80788d9c67,2023-08-08T14:21:49.707000
@ -204920,7 +204921,7 @@ CVE-2022-3877,0,0,d65e8a1f9affac4976bd5180163445a89b7661212631d7cf576af85548b054
CVE-2022-38770,0,0,bd9c0e8e17b45f06af971695e320abb2384dfedcae8d6837468f38c2c5691991,2023-08-08T14:22:24.967000
CVE-2022-38771,0,0,76dd818bb4c1ad151962d43e6df64bf4172052cf0668c8b9a38a1e85c2584372,2022-09-17T02:01:04.943000
CVE-2022-38772,0,0,a4b0277f2a7d6d70e1ada097174bbf5352079655a1f2663c4a242ef1daf0df75,2022-09-02T19:47:50.700000
CVE-2022-38773,0,0,c049b7245bfee58c356a28d9863f8194380106be9153fbc6419d9ed099f9730d,2023-01-13T20:33:20.213000
CVE-2022-38773,0,1,8812a9864c0475ef35dc6c8a55dd451c901f29ce84d8a82ad0ae4a9fcd4e18aa,2024-06-11T09:15:11.087000
CVE-2022-38774,0,0,de65ca0b4a9ddf6e32e5f34286b19068840e71c50caff19d783c63f38a87554b,2023-02-03T18:21:15.267000
CVE-2022-38775,0,0,e75c1256533c7daad13049b00955d44cc8f43acb01643b91b8c284bdb345179d,2023-02-03T18:24:06.557000
CVE-2022-38777,0,0,09801cfbe2f6708683f64c0e409f40a70dd8d7738870fa23b4b9dc79e9d6e451,2023-02-21T15:59:24.733000
@ -208715,7 +208716,7 @@ CVE-2022-43710,0,0,e0cf8bd85031d3c1a813c0e782bf9366f4ec4c8d74a6425791b57de1608f2
CVE-2022-43711,0,0,8acbf3db43baa9a9cdb4dbb0558bbc15a144fd59123ef84ac80195c32fc1ac4a,2023-08-04T15:37:18.857000
CVE-2022-43712,0,0,f890b6c77a5af2e0f078c1fd1fd6ef0498129f9c34dbd9e8d521f43b9fd151cc,2023-08-04T19:39:49.167000
CVE-2022-43713,0,0,7bede523d769d9903862c2f00e0386d3e90ecd7dd0dd7005e1776bfdd522c828,2023-08-04T15:49:03.637000
CVE-2022-43716,0,0,f5ba55a2adf2d99b6155854978cfe9fa5898c8338a263dab43769eac31c2cdf2,2023-05-09T13:15:15.390000
CVE-2022-43716,0,1,81ede852d360edf1dcc47980f26c3a6ed1751c7157f3f3ff31115c6e0fa8bc84,2024-06-11T09:15:11.587000
CVE-2022-43717,0,0,0b1bdad6065ba4b5a4687bbe12958df7a43e76d577613164f7d2c60e35068dd0,2023-11-07T03:54:02.080000
CVE-2022-43718,0,0,b327914e799d79a4e39e1c7e75a3c8876f615b40080f55667939a9d090ec5519,2023-11-07T03:54:02.147000
CVE-2022-43719,0,0,c1a32c477b92d31ca146ff82c860530e572c1eb415c13a7d01e50d71fdcadb94,2023-11-07T03:54:02.217000
@ -208750,8 +208751,8 @@ CVE-2022-43763,0,0,2819a0527f85f117af2be739fba5822854d595a43f54286f54e3cd97dd814
CVE-2022-43764,0,0,2cb333eddc1790fa4d0a4c5e1c00f836f379d3bf0570dd365de5c4c3a1c01f4b,2023-11-07T03:54:03.047000
CVE-2022-43765,0,0,07c2f3d94d9131f5d90904fe42711365ee29194ab4927a4307ab215a76ed6f71,2023-11-07T03:54:03.167000
CVE-2022-43766,0,0,2eca4905d3c4104e0f60f5c7b952404cbe92b0bd333427cb69051843ce566240,2022-10-28T17:43:04.957000
CVE-2022-43767,0,0,d81fbaa657c5bd3266e85e04ab3f13e41881ab654c6ceb0203d319b2315ccd35,2023-05-09T13:15:15.557000
CVE-2022-43768,0,0,965ee1bf07e67a3114e034525c4f853534dd4760bdbfa21e8c19e22eb30bb406,2023-05-09T13:15:15.713000
CVE-2022-43767,0,1,3d3ec72dcf504c485fb70768c983f8a61243177659a623eb61e366901d24c3fe,2024-06-11T09:15:11.907000
CVE-2022-43768,0,1,ab30b6f76d5815d6fd266fc12ca2221697e084ee85a9caf1e7db58f67a88c8e9,2024-06-11T09:15:12.230000
CVE-2022-43769,0,0,7f3c480211c1e7c9e46e3c85da1177d1b727f52750ee51087f4349b585556af6,2023-05-11T18:15:10.847000
CVE-2022-4377,0,0,068b39f647ef8513d4837a4955b7179d563722e5feeb7420bcfdacaef8a5f70b,2023-11-07T03:57:41.830000
CVE-2022-43770,0,0,2c7d822d2b39aa8db7d054c66044721e02aaf0af20f996ddd6ad9840e9e750e3,2023-04-20T19:47:28.430000
@ -210261,7 +210262,7 @@ CVE-2022-46140,0,0,645741dfd6ba50ed1ab18334a6e7d7c06d2c69f2b8945110b586603b9e9fa
CVE-2022-46141,0,0,e01d3d8a7133425736470630c9db6ec87069dcef7521c7b7f3a7336cf5697936,2023-12-15T15:25:08.557000
CVE-2022-46142,0,0,076315d7ce7ace9ad3d082184a4fb7584cc27d952e90d963f508a0c544b9f024,2023-03-14T10:15:24.137000
CVE-2022-46143,0,0,858449c4d7caf505498265655801b59aa6f34f06ec95b2b0eaa00c933fd49697,2023-12-12T12:15:10.230000
CVE-2022-46144,0,0,ee62f5b783f442e005903fc32870a8c543457e86686ec664396a1d61fdcc38b7,2023-10-10T11:15:10.987000
CVE-2022-46144,0,1,aa28bd70336cb9942b9ebb71749dca87d898b6d746b093e92a69844cc9a1c7e3,2024-06-11T09:15:12.590000
CVE-2022-46145,0,0,f7a17de473415e11c551d16f15c5260c8ee64752eb46f684fb1404bda87ddf3e,2023-06-23T17:54:04.830000
CVE-2022-46146,0,0,7a5ffe545d9cb4038f871132d597e9e5352f001f7c95aef9377b7e878b358280,2024-01-12T12:15:45.110000
CVE-2022-46147,0,0,2ff856f5b41ff870879815c21b8d915e4f8a07316110cdf7163aa326244e2f46,2022-12-01T23:07:20.930000
@ -228577,7 +228578,7 @@ CVE-2023-3863,0,0,b9398469eabeafe28d110e5ed08166075e260867358d34c16f6d758bda7974
CVE-2023-38632,0,0,9511e39a9a065f69ef6590f4695bd395dc1f846685d263a342e66909b4d3385a,2023-08-01T13:50:50.473000
CVE-2023-38633,0,0,93d522b98b95166863d6e1db822fb4bec8463aaedcdace73a72333b8179a6286,2024-01-24T16:41:49.187000
CVE-2023-3864,0,0,c71fc322d0eadebb373f88174f8897111d3a73534afa2ec5aff424e84a74f576,2023-08-18T14:16:40.163000
CVE-2023-38640,0,0,041a83ddb46a4f91360a072d76ac97645dfd3e9710efd3cde51ef26af8ecd6c2,2023-10-14T02:43:46.027000
CVE-2023-38640,0,1,f74a239073eb454eeba2e7eb2624151cfae8e00fe96120ee4486e703c4b78cd1,2024-06-11T09:15:13.423000
CVE-2023-38641,0,0,b60575b0d3d68fa6f4381a1a022575f08fd66d3ab2c0394a18e0afed821e12a9,2023-08-15T19:40:17.187000
CVE-2023-38646,0,0,4bb5025d5c4986c981ce9b63274763bcc9fcd029e72d06f3979bd475f7bc0fc6,2024-02-15T16:15:45.380000
CVE-2023-38647,0,0,b1798ac02686ab4440590c4462c5f4bb41f2d6ab8f482c447c92a4dd84485772,2023-08-03T15:10:55.947000
@ -232715,9 +232716,9 @@ CVE-2023-44311,0,0,3b4b00ba8d688eaf03e44e6d9f4df7f84ca50bb2d53185d8873bb05e42aac
CVE-2023-44312,0,0,ee8d773f5efbceb6f850ded169c146beea3bd8b91bc9e3c303a02273c4771831,2024-02-08T17:08:11.110000
CVE-2023-44313,0,0,2ccff3d184596dd97720cea6b7babed4736fcb869a5a89940fe69fc4c9b8c613,2024-02-08T17:13:28.083000
CVE-2023-44315,0,0,0474d89d9285949480273ea98d9b1bf4959fa5818eb5c7f76cff34da1fc2f13b,2023-10-12T00:43:38.827000
CVE-2023-44317,0,0,5387b7dc0ff5b92662ae7ea69a2c003ac0c8d4fb73993639f6b2d67ba53051de,2024-02-13T09:15:43.880000
CVE-2023-44318,0,0,2dbd1a50827db421fdc2c77ed3cc38f899410180b942c3c709f005a0dee8a8b4,2024-03-12T11:15:46.620000
CVE-2023-44319,0,0,b8d3c5abe58f71d0a4f3dd8a91a3acdf30360e0e6a25d3f625c672af97e26aa1,2024-02-13T09:15:44.103000
CVE-2023-44317,0,1,b56a158cebcf42d89e4d6901f5f3db2abc24725b5427dc8f59e4caad401ded6d,2024-06-11T09:15:13.730000
CVE-2023-44318,0,1,124397ddc4bd28d20d0e815a4e5bc7d645755649711f0e671b73dbe68f5b4974,2024-06-11T09:15:14.333000
CVE-2023-44319,0,1,d4ab95467abc686b0efd92bc5b303eec429d96421d44ba8a0c4b4c7e0a7432de,2024-06-11T09:15:14.940000
CVE-2023-4432,0,0,0d778df627f1547cab2b9fd64ba34616922fa04b58f2edee97863ee606119c57,2023-08-23T16:58:29.763000
CVE-2023-44320,0,0,d119006e47cce113b105ee2db4f38227825e3615f67d0fbdef4c97002aa08e68,2024-02-13T09:15:44.340000
CVE-2023-44321,0,0,911037adf08df4ffa2ffbbc7aa8653046518fe8ac83fe6fade98cb8847d28d1d,2024-03-12T11:15:46.980000
@ -232770,8 +232771,8 @@ CVE-2023-44367,0,0,d5d89a02dec9cfaca291a0cd5b5f30d363c109814afa4ba2b94bec8f42118
CVE-2023-4437,0,0,b4cc863eb5ce47c4eb4268cc05a1191605221f95fca8656d56637b9502673d3e,2024-05-17T02:31:33.640000
CVE-2023-44371,0,0,2297c6fdf2afd389ea703848ed5d6c6ded312e9e67b0a76d69f5cda9f1a630ea,2023-11-22T16:58:39.573000
CVE-2023-44372,0,0,a86d107032e1559f3fd2ed4ee7f77c509710319a73a766e52fe64ffb44d5363d,2024-02-23T19:15:08.467000
CVE-2023-44373,0,0,533dc92a5a8f084d62c03c48e789ce059c00552abdc3137692180affca5c571b,2024-02-13T09:15:44.957000
CVE-2023-44374,0,0,0f4a17ac0b331ec6c4dac3f8af3d86a6479fc8368144856a4ac5600f3c153549,2024-03-12T11:15:47.267000
CVE-2023-44373,0,1,e7f73e4a65821fb612f046bf847975072c678282df4ee59af12fc206c71283ac,2024-06-11T09:15:15.377000
CVE-2023-44374,0,1,f8b8bce40b3e98d5a9f614bd74fe34bdc98e5151c1ec5d1c243152ccc4d26188,2024-06-11T09:15:15.990000
CVE-2023-44375,0,0,593d447900de38b504b8288066dba2aca1c23ca9dc2b8ebba581f03f2af8dcd2,2024-01-02T19:15:10.480000
CVE-2023-44376,0,0,bd7edf8426f6b9b5132878b896bbd83a87eb49b2089f52d618dfc7a966a2253c,2024-01-02T19:15:10.550000
CVE-2023-44377,0,0,82bf954347778e7128ea732c92275efada968563ffe465bc093d8a5741bbae62,2024-01-02T19:15:10.630000
@ -233177,7 +233178,7 @@ CVE-2023-45201,0,0,96bdcec1d537035c823229fceb88418f9c3a764bbde63a305c2b0cbff3648
CVE-2023-45202,0,0,29317d3b7a63c177ae8a6e66af18ed7e8de578c5219fd14cc15471fc255f7962,2023-11-08T23:12:09.473000
CVE-2023-45203,0,0,f8305c62c2a5f3365003f7473f2dbd3802533af547048a30d7e86118234bc365,2023-11-08T23:12:20.497000
CVE-2023-45204,0,0,e27bb884505cc94f9fd049fb362f1443f0858ac07554f2d906a029439046e66e,2023-10-12T00:44:00.243000
CVE-2023-45205,0,0,01ae041d020771a6f6713901ea60b3cb1f7174c5ec0ce9743705e5638d234132,2023-10-14T02:24:01.100000
CVE-2023-45205,0,1,538ac842ceda74c0a4a47b684bb6eb451362d86539948b386d203a24f0acc2f3,2024-06-11T09:15:16.577000
CVE-2023-45206,0,0,75321b27d5416502901be19297200a9974474b77410916565ba2dd2ebaec049d,2024-02-13T18:23:02.393000
CVE-2023-45207,0,0,057c3e719ca21440d880e35b10a15238d3d7a6403a5bd988d596e65617eb7af1,2024-02-13T18:23:02.393000
CVE-2023-45208,0,0,ff62badeb6459007decf020f49ed097a135e3c004ce7c6b74e1a14172980ba87,2023-10-16T18:48:47.807000
@ -236350,7 +236351,7 @@ CVE-2023-49688,0,0,93d52581ab97f4c4a9518955faef7856c63e32e254de3eaa71e57824efb8d
CVE-2023-49689,0,0,87395a2c8c107313cbc041f315fca3f89094793710d9f420c661f91319a8c529,2023-12-27T20:49:07.780000
CVE-2023-4969,0,0,2c6655eaeb515e6f955488cf5c51d76ef097b0a3c7180e9f766cc6c3af3dbf92,2024-01-23T16:56:25.943000
CVE-2023-49690,0,0,2faeb1f020693f40c665ecb7eba1ffca8452cf62dc2d2ee04e65f4b99aa266ff,2024-01-02T20:15:09.933000
CVE-2023-49691,0,0,cf4bc5b6e26cd2d050abb3e7f2c790c34bc1f3d2e02d4c61ee1bc9996dbbeaf8,2024-02-13T09:15:46.373000
CVE-2023-49691,0,1,f14631c670ecaa48714a1fac29e19124304235e69ec8ba39a392e35063f534ed,2024-06-11T09:15:16.840000
CVE-2023-49692,0,0,dbcc49434d099080ae35750c4f056032c6b8a51c8987a0e4dc162d8e8804102a,2024-02-13T09:15:46.507000
CVE-2023-49693,0,0,5e2914754dd1f28fa5a23b08c704fc3892fe0278ea02f222ff8211fe8bf4b7d2,2023-12-05T01:54:46.047000
CVE-2023-49694,0,0,f3cad7b0aab60a0a0dd6b1a45bf578adab64adee5013001acf484fc03402cf40,2023-12-05T01:54:34.097000
@ -243884,7 +243885,7 @@ CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175
CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000
CVE-2024-2325,0,0,23b75df513c3c155a2acfcf2e34574fcebd08fb3e2a0b9207d1fa3d021e99412,2024-04-10T13:23:38.787000
CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000
CVE-2024-23251,0,0,0d35cd5a6c9310bd8afa52edb1ccc0600713cce6e35aec824b38ab3bd3fe95cf,2024-06-10T21:15:49.430000
CVE-2024-23251,0,1,ebbd652d9390e8e5e2956f69b6c82faa8898ae4a9db1fad5d807879b937d33ff,2024-06-11T08:15:48.553000
CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000
CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000
CVE-2024-23254,0,0,f51bdaebdfa7043c82ce44968eb18a23393946054fa5c04d601cb0af5a7300fc,2024-05-07T06:15:07.777000
@ -243917,7 +243918,7 @@ CVE-2024-23279,0,0,2f2a4da20a4912b04931b6c0ce417bc3b1be9e1a7b15c13f5c7903e852635
CVE-2024-2328,0,0,cc711e7491762a1ee61375ce4ed11bcc6b5385ac1da7fe6c68d22fc72362eb3d,2024-05-02T18:00:37.360000
CVE-2024-23280,0,0,c55716574063aa546cbe7741f1ce5061fce7685b12d62c9698138d2015ee1892,2024-05-07T06:15:08.307000
CVE-2024-23281,0,0,674de30f69505c52d01e5fe7880d69cb7b5b61a38fa5019ea24d9b4fefc1ec80,2024-03-13T21:15:58.150000
CVE-2024-23282,0,0,306fcb0b47a3ea59501078c1d3943bc8e46796f3bf158b648330c6ca0bdee7ae,2024-06-10T21:15:49.503000
CVE-2024-23282,0,1,4698c3707e2b2c3f9d85949d1c0ba3589b4f1d95ffb336cfbece2384dc7d6ce3,2024-06-11T08:15:48.650000
CVE-2024-23283,0,0,0202e856d9f25468386c96fd4038e5f441de45cb2a237c843486f3dc6e784c3a,2024-03-13T23:15:47.470000
CVE-2024-23284,0,0,d09aa0bfe274606474c4572bafdbf18831f3c38a9e756039727b5339544024ad,2024-05-07T06:15:08.473000
CVE-2024-23285,0,0,e5df014d4a83c708ed8a25bbbb190dde1bd7ec52fe6d53091bf0a994e268833e,2024-03-13T21:15:58.280000
@ -246853,69 +246854,69 @@ CVE-2024-27791,0,0,44e295d56ae82c935e7837aa163b1c182c6b8efd5ceb84b892de3324ac969
CVE-2024-27792,0,0,f4c93ffbcf0fa2b69a394e4f8043e5a055ca57351625146acb468cc524a0cb16,2024-06-10T20:54:18.443000
CVE-2024-27793,0,0,353572505ffd41c49c8a655c8653c3aeaf93e2259f3ba926c49eca056984adca,2024-06-10T18:15:28.523000
CVE-2024-27794,0,0,f83311c8ff012592a70730809fe5cac1d0e670b37674538bd8092c8ae8d69027,2024-04-16T13:24:07.103000
CVE-2024-27796,0,0,992144573d1e92050b8d1a885c008f1e1dbb47eb40e4c3600f436a4e8737bc49,2024-06-10T18:15:28.577000
CVE-2024-27798,0,0,d7e6a4f8d8f638eecc2f4b89832612b5d34631f3d78207810c824e98e4bcf449,2024-06-10T18:15:28.640000
CVE-2024-27799,0,0,9ba63a0adf2c1c42c78ef215c5d2409cce159a4d63d7392b9ac8758c548dd0cc,2024-06-10T21:15:49.607000
CVE-2024-27796,0,1,0f6294260561edcbf030914cbfc2e2f9112190409fca9765281ce7a127290cce,2024-06-11T08:15:48.723000
CVE-2024-27798,0,1,96770d0ca7d69538b21522ed5c1df64fc164bf06c1fda12cf5ffe66287c823eb,2024-06-11T08:15:48.807000
CVE-2024-27799,0,1,6370a58731e78a9a5fd4820834a372b803e0e08b53f662528346d6f6fc04f7e0,2024-06-11T08:15:48.860000
CVE-2024-2780,0,0,ebb4d263bdb4979d90a73abab8050be4d34d6c520d6b3b8fff46d8c73490b44f,2024-05-17T02:38:30.160000
CVE-2024-27800,0,0,c9023f2fc1a939c2b504d53cd7d0a6dcd64147c963504a98ec95d1c3930651a6,2024-06-10T21:15:49.683000
CVE-2024-27801,0,0,22f4593a7f5fadd4f42d99784297ef76bc70f7586bcbfb3c48cb071ed073af81,2024-06-10T21:15:49.770000
CVE-2024-27802,0,0,979361176e246fda5d4bbc54a25c1047c804c3066ef17e774011290fe55d2891,2024-06-10T21:15:49.860000
CVE-2024-27800,0,1,3565476e7caa26b53ebc9a379a5107839c56a3599c85568f05ffd87486e8de9e,2024-06-11T08:15:48.930000
CVE-2024-27801,0,1,d166120fb4ba1b6f905a86cb45d0a567fedc947c730fe9ae4e27dcc24c47d313,2024-06-11T08:15:49.007000
CVE-2024-27802,0,1,d9f0f170303b1b115564771b5cc04b393ff158154b2540d185c00b349ac98951,2024-06-11T08:15:49.077000
CVE-2024-27803,0,0,53706579cbd6412d2f61db763826287c31c4944b996a096fc5d655cd875e9fe8,2024-06-10T18:15:28.727000
CVE-2024-27804,0,0,b62a48f9287009a5776ff73fff04f1a8014c48cf3784f3553bc30fd3fc9e5868,2024-06-10T18:15:28.780000
CVE-2024-27805,0,0,f3e043f9edda28f318b570567bc863c6b8d38c40c7c886c279edbace9ebeea6e,2024-06-10T21:15:49.943000
CVE-2024-27806,0,0,e676feeee72daeef2c626aae3ba8e890c1b971193584bc0ea4327d49167553d2,2024-06-10T21:15:50.020000
CVE-2024-27807,0,0,38cab12dc4d1b20883788d28f72c3de7333331c9e5a04616d5a90a2425403886,2024-06-10T21:15:50.093000
CVE-2024-27805,0,1,7d3d5392c3734bbb7ab3d1ddbe341bc7d3aef0cbee247c3e73f420a147ba42e3,2024-06-11T08:15:49.147000
CVE-2024-27806,0,1,eee1f85b3b69863560b6c24b9b5f1bbcd80bd54fbc16bdef38dfe65ead269313,2024-06-11T08:15:49.217000
CVE-2024-27807,0,1,8dc6b761352f08ba8ab4989a940b43ece8706688015ef9b5ecee22ef02a5775d,2024-06-11T08:15:49.287000
CVE-2024-27808,0,0,c5d6ad2da90adef91ca34b1dfe39cad84bfdf1003557cd00d472f4add705d97b,2024-06-10T21:15:50.160000
CVE-2024-2781,0,0,7440c381afc245ac61500f5670c7b774787526dc48ee470e168c2fa8882d9975,2024-03-27T12:29:30.307000
CVE-2024-27810,0,0,16d32a3b215e9b0582e26e0a0c6f925a83804d78673849bf3b3aaacfe98ee515,2024-06-10T18:15:28.843000
CVE-2024-27811,0,0,b76af7f791c9b967c1b99a366d75de5aa45bb642cb9d7bb0324b518b4e4514c5,2024-06-10T21:15:50.230000
CVE-2024-27810,0,1,f36cf8877043b3c02a9350712f62c03fcb599625852fd9446ed0d3dcc7aa3a57,2024-06-11T08:15:49.350000
CVE-2024-27811,0,1,6947c96cbb574595b4c8cbc58e2afce0f0eeeab7237cd40d0289795536ff0e21,2024-06-11T08:15:49.427000
CVE-2024-27812,0,0,7c1594f8a376157e9d4a293e3066e7a40135f2bee1f63f6588c9b0afb89aeff4,2024-06-10T21:15:50.300000
CVE-2024-27813,0,0,e5f2882c5f57de51fb8cbfdbe3d9f69786dda1b139d68761ff0d9306574aba8e,2024-06-10T18:15:28.920000
CVE-2024-27814,0,0,0fff7cb9f482c678859fcb2e6ca8ec83aeca9aa6e9bb26ec7b2a039dff004630,2024-06-10T21:15:50.373000
CVE-2024-27815,0,0,50ba975ebe503a983613f08758133d418519e46146afb2b007057bc519776db5,2024-06-10T21:15:50.440000
CVE-2024-27814,0,1,eeaabcf0af43d2d2d437ac0c177d88ea91c177c69fd98cc72cde55b3a67c541b,2024-06-11T08:15:49.493000
CVE-2024-27815,0,1,ca59586ae6c3ac36223850ab3941c64f95b81f012a5a3e198f89480616da55ab,2024-06-11T08:15:49.553000
CVE-2024-27816,0,0,796a750f65ffb329e29033d8bba60513b21bc14881ed71a1b811a2e04501ae1b,2024-06-10T18:15:28.970000
CVE-2024-27817,0,0,37abe8d93777a734d085bafc860a69da1e63516262e7e8d8f3d3c70dbcc7d3ce,2024-06-10T21:15:50.547000
CVE-2024-27818,0,0,1614df26ae8bcb22fdc1bdb7edc5385e3ab6e2bbd6920be5d393a8a30fdbd930,2024-06-10T18:15:29.033000
CVE-2024-27819,0,0,2fdaf9da2ba1f05fc545029836a61bfd56378797adf535bb5248688e0a8ffbb7,2024-06-10T21:15:50.623000
CVE-2024-27817,0,1,8e11d15bcd1ed7dba693b6af0a32b354b5ccd59d958a6ceaa498de2f9b9b77a3,2024-06-11T08:15:49.630000
CVE-2024-27818,0,1,53d578e3a0a5c74afcd3cfe2146b5bdd30d3ee9cca34913d6e2df31ef7d7a6a4,2024-06-11T08:15:49.700000
CVE-2024-27819,0,1,d8f471c4c2313791f1824fa7ed00bf3dda3c9686920e98f22d480b69e8f5fd8b,2024-06-11T08:15:49.770000
CVE-2024-2782,0,0,91d9b539aa31e7a5bf0be259f7ee77e02d3f24638d700db95962fd57c1db4b96,2024-05-20T13:00:34.807000
CVE-2024-27820,0,0,0b7e745f316a152e549d15cfc15186618e9c36d6031e23d8a35d2a44a0018f43,2024-06-10T21:15:50.693000
CVE-2024-27821,0,0,1de7b9a00e0f15ecd864890bdb004777a3be2018051ca91dd74315d450ee5849,2024-06-10T18:15:29.097000
CVE-2024-27822,0,0,523a0187399a43dcbb08e6d44e81c3f2dbc8fa1f2bc5926aeab19b9c97bd93b4,2024-06-10T18:15:29.157000
CVE-2024-27824,0,0,5baa488a9d673064b6e6f95d574180ba96aab554685e92b6132d6835e438d5ff,2024-06-10T18:15:29.213000
CVE-2024-27824,0,1,bac18298cb87bbf4437c3c19802ecf7c192a4b0487eb1723234b03d4506aa7e9,2024-06-11T08:15:49.830000
CVE-2024-27825,0,0,37ba7296b9e432dd36a2f579aa8aa6b1828ebb3ec4651f97514f9da1fedab657,2024-06-10T18:15:29.263000
CVE-2024-27827,0,0,92b78016d4f01597714cf96e8c975248ece627f4697a35c55877f20dc7fafa53,2024-06-10T18:15:29.320000
CVE-2024-27828,0,0,b950febc87bc7fd1bf4b29a498a41907a9e3780f3f0194e5d91555a9fdcfa7b7,2024-06-10T21:15:50.773000
CVE-2024-27827,0,1,f606ee564bddcdd28f55aa4bba96bebbc2683729b049ba42feab41bc19daec3f,2024-06-11T08:15:49.890000
CVE-2024-27828,0,1,0d2c594f1a6679da57e59e276ad50ba86d1e8db33161d1f5b6bc7419f4c3194a,2024-06-11T08:15:49.950000
CVE-2024-27829,0,0,24825b1ab4796019403a414c0e4a694a721b0ade700a310f7fa91966f0664d24,2024-06-10T18:15:29.377000
CVE-2024-2783,0,0,5e3d9294a74b759ac7450c1cf79e73d07c944f71ed4c195d3306f256a09a6879,2024-04-10T13:23:38.787000
CVE-2024-27830,0,0,643564c7c1a1b5c495e2090a8d9aa4d6159c1aa3fb2d2378c33917209433319e,2024-06-10T21:15:50.843000
CVE-2024-27831,0,0,f779f3caaf9df9840f8886a4f61dce7cbc85c3ff532feee1ebb8228fe8ba57c6,2024-06-10T21:15:50.927000
CVE-2024-27832,0,0,4f3ee586befd66c300bd0241ec0976b6f523dbc6756d9daa24f85e3cb4e21622,2024-06-10T21:15:51.007000
CVE-2024-27831,0,1,bb8a237cc1f1f5a56ae007aea4b54664c00d0b6ef8f3f8e32a66b9e0bd37d563,2024-06-11T08:15:50.017000
CVE-2024-27832,0,1,8a0f652705f4fb553dbbdc205b8b54cff9258ce9c187242762544beb74ae003d,2024-06-11T08:15:50.127000
CVE-2024-27833,0,0,189d6e5dcb44802cb4a822a4304c72d38a56f9c07c67ca79ba6a88b7b2a7bf0d,2024-06-10T21:15:51.090000
CVE-2024-27834,0,0,2d4186f2cb5cbe4f2f8f3e55a2545b1878bf5a77624083576b159f1d995ce82a,2024-06-10T18:15:29.430000
CVE-2024-27835,0,0,c3d25dd6cfd2f797e5af53adbf0373a3dd203d6ad6e8d11af15dc203eb2402ab,2024-06-10T18:15:29.497000
CVE-2024-27836,0,0,58be76f35b76eaa63b11d542f791ed557217824a955720e8a98311f782567e76,2024-06-10T21:15:51.167000
CVE-2024-27836,0,1,5a1200baf3acfd07d33e45e3c4d5995280335cd8ce65576b156979ede325bec3,2024-06-11T08:15:50.193000
CVE-2024-27837,0,0,901f3c3a397896b090baa01f5e16b0462e9f3677320c7d083f0561d63284135d,2024-06-10T18:15:29.550000
CVE-2024-27838,0,0,57089a9eb08f45ade2765a0cb9666d92674eb67f3917ced8cfddd01950a9d9ed,2024-06-10T21:15:51.240000
CVE-2024-27839,0,0,dc2551c161bade026d50a7722610913c7d6281d71628fa7705ad0b54f8ad144e,2024-06-10T18:15:29.607000
CVE-2024-2784,0,0,ba1190a588b039c20289ccfefd73f048dc164c370109c9a0315fb7e323728a74,2024-05-24T13:03:11.993000
CVE-2024-27840,0,0,73811411fe8568e94c8a58fdc8e4f6a5bb632664acf9c04146fedc22f1c147ec,2024-06-10T21:15:51.313000
CVE-2024-27840,0,1,0a2090bd3ecc65a08c6a1db35bc5638d75d7e365ac7ace65deb9c99a3c8fd162,2024-06-11T08:15:50.260000
CVE-2024-27841,0,0,160e608c0f194092a3d3fa2958525a7ea0dc3c80c71963835592dc22256a7e3a,2024-06-10T18:15:29.657000
CVE-2024-27842,0,0,c2f4ad1e4648fa9ae5110e6bcc4b9d3a34413349e7ab03cdd6ea669b8d6af4f4,2024-06-10T18:15:29.733000
CVE-2024-27843,0,0,f04a611287e4c37cea29b8fc6d491a577bfba9574b575f57111029725539f40c,2024-06-10T18:15:29.790000
CVE-2024-27844,0,0,656395c1ffb59a368b5cdda145522c2eab15f70feb9d69926b92dd383ecb3e41,2024-06-10T21:15:51.390000
CVE-2024-27845,0,0,68dfb03f19709b33f86d86b34d4d70a6e93fc14312095d72a322215222b649ea,2024-06-10T21:15:51.467000
CVE-2024-27847,0,0,afb0c107691a812d0828b454c97dccbae70291ac03525fa2ae723faad45e31db,2024-06-10T18:15:29.840000
CVE-2024-27848,0,0,14fb9de4af35c5cd7ee210411e85a979154da98a16baa3c219b68be3860d1c53,2024-06-10T21:15:51.530000
CVE-2024-27843,0,1,caaa2b70673c0fd7a60807026442c43e55ad72502b0f967bc1cef9c19a74b1af,2024-06-11T08:15:50.327000
CVE-2024-27844,0,1,2fe77bd0ec7fc4a752768e59949964f476238b5da61a6b9eefbb6d842c089af4,2024-06-11T08:15:50.390000
CVE-2024-27845,0,1,e4e364c0de4d5c163620e93f45806a9488521cdc85c26abc56d2337b9c26f0a4,2024-06-11T08:15:50.457000
CVE-2024-27847,0,1,5b46b94da4559b57e8ec553aeceab469e79f3b10d85d6cbba1ed5528322d1b03,2024-06-11T08:15:50.523000
CVE-2024-27848,0,1,e7e14b2cff9994fe57037ebd90ba8b65f783c0e9cff8cfa3d5e01f8fe7e70318,2024-06-11T08:15:50.593000
CVE-2024-2785,0,0,f421029e3ad60193115519ce84f2fb34a615c8431383b64062041ee6b872f244,2024-05-14T16:13:02.773000
CVE-2024-27850,0,0,b05f8f0af68e74bd0947e7946fb110526f99ba0d9891673f450eff3d2255e925,2024-06-10T21:15:51.607000
CVE-2024-27851,0,0,b7191311ac7712f457513c047ee5765686658cbbff76be1d645e02d5edd5b3a3,2024-06-10T21:15:51.680000
CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000
CVE-2024-27855,0,0,12948826eeab402c4e41686b446997191464ba8f13565e0cc3689bdc9910883e,2024-06-10T21:15:51.753000
CVE-2024-27857,0,0,0a9e62fa2179edc33ac42f2faea2a0c4fdd8167f0c2cf54c68f7ad05d1c72cc3,2024-06-10T21:15:51.833000
CVE-2024-27855,0,1,7404b31c96a3ea932f0a46bb5231457366939a39cf2ce33cc30f92b442b0c9f8,2024-06-11T08:15:50.653000
CVE-2024-27857,0,1,dc3fb1b112a51d71fcff4b337dbb4f89a79ea2e2bcce46ef41e3ccdbb559becd,2024-06-11T08:15:50.720000
CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000
CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000
CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000
CVE-2024-27885,0,0,5369596a9513daaef11920142ecca9cad44fa3efda5fa33a70f7e19d6add0979,2024-06-10T21:15:51.903000
CVE-2024-27885,0,1,919b2fa70f309158c80cef6f773433c035d64bc9a0f261cecbcc346fe38429a6,2024-06-11T08:15:50.787000
CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000
CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000
CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000
@ -249093,13 +249094,13 @@ CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63
CVE-2024-31394,0,0,37a6c6ef2bd7d41356078f2b3597ee7803c3d40e7ebe2f84759f8ace62500d88,2024-05-22T12:46:53.887000
CVE-2024-31395,0,0,b30f8ee229d1f4f2f6537c380ff54efa3e461a52badeb419e6445201c1a3b054,2024-05-22T12:46:53.887000
CVE-2024-31396,0,0,b9f3c7c1150f9fb33024855b15874b092964398220773ed5b63437613ca6402c,2024-05-22T12:46:53.887000
CVE-2024-31397,1,1,fd410cefeafb68aee70c768f9a0fda48768a5c67d520d80a234ae6e9bcae192a,2024-06-11T06:15:10.057000
CVE-2024-31398,1,1,0b7bcc6eac5b3d442ea96d7fbc07e94d4d970fa86b6bd5545a4f7457e770e669,2024-06-11T06:15:10.347000
CVE-2024-31399,1,1,9676addf2a8b62136dd145546201de91c486a33b0acfad9893446c5d5b26efbe,2024-06-11T06:15:10.490000
CVE-2024-31397,0,0,fd410cefeafb68aee70c768f9a0fda48768a5c67d520d80a234ae6e9bcae192a,2024-06-11T06:15:10.057000
CVE-2024-31398,0,0,0b7bcc6eac5b3d442ea96d7fbc07e94d4d970fa86b6bd5545a4f7457e770e669,2024-06-11T06:15:10.347000
CVE-2024-31399,0,0,9676addf2a8b62136dd145546201de91c486a33b0acfad9893446c5d5b26efbe,2024-06-11T06:15:10.490000
CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000
CVE-2024-31400,0,0,571e90c89c324436c61bfdc535dd35c740568bde75455a6e686590a23b323549,2024-06-11T05:15:53.130000
CVE-2024-31401,0,0,3439f58a4c3513eb4eeaf76a66cc8317220b63b0282fd7e7c3c063bc877be93f,2024-06-11T05:15:53.320000
CVE-2024-31402,1,1,df70ad92e4bf5b7acecb90dc4cc7f9c125f36816b1e13caf761f8e730e132965,2024-06-11T06:15:10.650000
CVE-2024-31402,0,0,df70ad92e4bf5b7acecb90dc4cc7f9c125f36816b1e13caf761f8e730e132965,2024-06-11T06:15:10.650000
CVE-2024-31403,0,0,92c5bd46e4ffc852724f2939861650a337e969f86fd5d8df93cf756dd6500f2f,2024-06-11T05:15:53.397000
CVE-2024-31404,0,0,146d7af636a9d18ee51e0529992d414c931054e16425a0f9134f7d7bbef93cce,2024-06-11T05:15:53.463000
CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000
@ -251259,7 +251260,7 @@ CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c99
CVE-2024-35474,0,0,7337b8e2371c2dae27b970b8112f0f83bae7631b3b28e88457636e9df18bc231,2024-06-10T18:06:22.600000
CVE-2024-35475,0,0,53effa9dc5e8213551bbdbda32e2dfa4c153fd878258c89c9e91bb711c7a017e,2024-05-22T19:15:09.373000
CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000
CVE-2024-3549,1,1,9185676ce3b637fef9ff67fa9b3169f6a08a3458d42508cd676ea69204080879,2024-06-11T07:15:41.017000
CVE-2024-3549,0,0,9185676ce3b637fef9ff67fa9b3169f6a08a3458d42508cd676ea69204080879,2024-06-11T07:15:41.017000
CVE-2024-35492,0,0,a02d0a80cf6795bdd8349f855d15db1b17890353f3564619ef911d889417eed6,2024-05-30T13:15:41.297000
CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000
CVE-2024-35504,0,0,0960d865c9f0a37450856438a4637b3494eda5adde12ce8eee871eda221f0ce9,2024-05-30T18:19:11.743000
@ -252074,7 +252075,7 @@ CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374a
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
CVE-2024-3723,1,1,ed62ac93f26978a1b6bc84a25049cd22e212eaa7409abbff64eb926817290616,2024-06-11T06:15:10.793000
CVE-2024-3723,0,0,ed62ac93f26978a1b6bc84a25049cd22e212eaa7409abbff64eb926817290616,2024-06-11T06:15:10.793000
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
@ -252482,6 +252483,7 @@ CVE-2024-4262,0,0,5dd4ebbaf190f9915875ef48f9c729e5248c1328b2e326ae4c2d79cba9dffd
CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000
CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f16258,2024-05-20T13:00:34.807000
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
CVE-2024-4266,1,1,f2347437c79a02fc0944e43158b9e18e086ae2a7908c024eea47a01b4c7236af,2024-06-11T08:15:50.850000
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000
@ -252520,7 +252522,7 @@ CVE-2024-4314,0,0,917e44d69c76fb7381314145ce5012ff94d63258309b3ec3d14bdf6a76c85d
CVE-2024-4316,0,0,5a945ac0a4e5139fc35505b0ad29ed6f4f78dc21cf82c5a713e2fc10353001af,2024-05-14T16:11:39.510000
CVE-2024-4317,0,0,1cfa82abc1d175e3780dda1cd435053fb9f133c668ec60968879d020da51382a,2024-05-14T16:11:39.510000
CVE-2024-4318,0,0,239860e6603bb5bfa00e4ee1537bbc84372d89871f96aaff86d4c34891350e3a,2024-05-16T13:03:05.353000
CVE-2024-4319,1,1,9e22a0eda79272a3e241790bf9bf980072ff35cf4cebe45f406786f622d30fc5,2024-06-11T06:15:11.407000
CVE-2024-4319,0,0,9e22a0eda79272a3e241790bf9bf980072ff35cf4cebe45f406786f622d30fc5,2024-06-11T06:15:11.407000
CVE-2024-4320,0,0,e47f6067fb0d170ab8dbc0733b163211a60f027ef1254b440e10fe81fe453718,2024-06-07T14:56:05.647000
CVE-2024-4321,0,0,52291df02a369d9bb947287933b2cb70cdba5b6bd48fddb1c2e0073aed4231c4,2024-05-16T13:03:05.353000
CVE-2024-4322,0,0,26c76f88e5d4d6383f99407dee54ae56585f3dcb15c99e63b32362e726df8b5e,2024-05-16T13:03:05.353000
@ -253331,6 +253333,7 @@ CVE-2024-5524,0,0,e7e0fe13822be5d672aca31e1ee31e0f364bc62cac379db56dfa86e4e6649c
CVE-2024-5525,0,0,27d51e0f90117d5f6e29d565f6efd293c83de249201cb9426e9c70697dbb918d,2024-05-31T13:01:46.727000
CVE-2024-5526,0,0,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000
CVE-2024-5530,0,0,c88c71d0fc4a469ec001167841485a2cedfa66755e447a724b42beedce8d6868,2024-06-11T05:15:53.680000
CVE-2024-5531,1,1,3a6fe62957d942440ddea7e1702427c2602def8435558d50911e6cece6a7b47d,2024-06-11T09:15:17.273000
CVE-2024-5536,0,0,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000

Can't render this file because it is too large.