mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-10-22T18:00:41.619481+00:00
This commit is contained in:
parent
cbbccc4822
commit
047cf7199e
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2013-5919",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2014-05-30T14:55:08.397",
|
||||
"lastModified": "2018-10-30T16:27:53.280",
|
||||
"lastModified": "2024-10-22T17:11:30.463",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -61,6 +61,56 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FE08247-BC07-4968-BFE0-491D761BD438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E768D8A2-18A9-4CA7-96E2-FF3393A380A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3EE65908-798A-4872-BD17-F42CA1C33898"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BBFF0E62-6B39-4562-A261-1C3E3A587977"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BEFC8EC-9C9C-49D9-93DE-D5D091709E32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CD31DFD-F92C-4535-88AE-41E3AA402FD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AB6FA42-3CAF-4EAD-8A00-6CC1C41B91F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD7AAB17-29B5-4423-ACCB-6C8A06B0F641"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7068B8FB-5689-4A9D-ABFC-D7BE19A0BEFD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:1.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8396101C-CC57-4692-A505-47F30F12647C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:*:*:*:*:*:*:*:*",
|
||||
@ -106,56 +156,6 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openinfosecfoundation:suricata:1.4:rc_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB6535F9-8DB6-475A-AE93-65BDD9E3E9A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8FED9C4-46FA-4EA2-B7D3-2F28620AD8A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "701BED72-481E-45AE-A949-BF6C71C932AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C376E8F-783E-47E8-B078-251297C02964"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEA1821C-4DE1-4DBA-B557-8BF863EB2AFF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "14C3C311-C719-43EE-A1D6-C4B7A7D96156"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.3.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7824CF78-D5F7-4FC0-98FD-D639CAA2A7BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1448D780-F020-40C9-B3EC-D3DC909CC056"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C646DF6D-8EA3-4560-B220-F5A72EA37C3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16296DF4-8A23-4459-B98C-4A500573812B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:1.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18A20846-B612-4839-B693-6E8E7F632415"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-10242",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-04-04T15:29:00.377",
|
||||
"lastModified": "2019-05-06T17:00:24.877",
|
||||
"lastModified": "2024-10-22T17:11:30.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05DD0327-9366-44E6-A979-A62A8BD5CCDB"
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E70E3C16-A589-4B73-8B36-F3924DDF5F31"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-10244",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-04-04T16:29:00.273",
|
||||
"lastModified": "2019-04-07T01:24:48.190",
|
||||
"lastModified": "2024-10-22T17:11:30.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05DD0327-9366-44E6-A979-A62A8BD5CCDB"
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:4.0.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E70E3C16-A589-4B73-8B36-F3924DDF5F31"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-18625",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-06T21:15:11.427",
|
||||
"lastModified": "2023-02-01T19:24:01.150",
|
||||
"lastModified": "2024-10-22T17:11:30.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,8 +86,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:5.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E53901EA-04BF-41AB-BE28-841F040F2C2A"
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:5.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43F8D25A-DA90-4CD5-BC77-E0B151372D3F"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-18792",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-06T18:15:23.183",
|
||||
"lastModified": "2021-07-21T11:39:23.747",
|
||||
"lastModified": "2024-10-22T17:11:30.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,15 +85,15 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.1.5",
|
||||
"versionEndExcluding": "4.1.6",
|
||||
"matchCriteriaId": "E9F969C0-A5A7-47C5-ACF1-6A01D9CE0CE4"
|
||||
"matchCriteriaId": "FE67AEB2-4237-48F9-97F5-D80071AD27F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:suricata-ids:suricata:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E393ADB-16B5-4ED1-AB51-7D853FA8FD57"
|
||||
"criteria": "cpe:2.3:a:oisf:suricata:5.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91532ED8-EDCD-4220-9E0F-552B3D3C8AB4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
29
CVE-2022/CVE-2022-238xx/CVE-2022-23861.json
Normal file
29
CVE-2022/CVE-2022-238xx/CVE-2022-23861.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2022-23861",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:04.897",
|
||||
"lastModified": "2024-10-22T16:15:04.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mbadanoiu/CVE-2022-23861",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mbadanoiu/CVE-2022-23861/blob/main/SafeQ%20-%20CVE-2022-23861.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ysoft.com",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2022/CVE-2022-238xx/CVE-2022-23862.json
Normal file
29
CVE-2022/CVE-2022-238xx/CVE-2022-23862.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2022-23862",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:05.443",
|
||||
"lastModified": "2024-10-22T16:15:05.443",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the \"NT Authority\\System\" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mbadanoiu/CVE-2022-23862",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mbadanoiu/CVE-2022-23862/blob/main/SafeQ%20-%20CVE-2022-23862.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ysoft.com",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-2742",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-01-02T23:15:10.567",
|
||||
"lastModified": "2023-08-08T14:22:24.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T17:35:00.793",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-2743",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-01-02T23:15:10.620",
|
||||
"lastModified": "2023-01-09T19:15:51.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:01.157",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3842",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-01-02T23:15:10.677",
|
||||
"lastModified": "2023-01-09T19:15:21.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:03.307",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0471",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-01-30T09:15:08.790",
|
||||
"lastModified": "2023-02-06T21:42:57.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:06.327",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20803",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-08-07T04:15:13.867",
|
||||
"lastModified": "2023-08-09T17:50:30.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:07.320",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20804",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-08-07T04:15:13.930",
|
||||
"lastModified": "2023-08-09T17:53:15.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:08.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20805",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-08-07T04:15:13.993",
|
||||
"lastModified": "2023-08-09T17:53:38.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:08.963",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27602",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-10T08:15:06.967",
|
||||
"lastModified": "2023-04-19T12:15:08.170",
|
||||
"lastModified": "2024-10-22T16:35:09.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27603",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-10T08:15:07.133",
|
||||
"lastModified": "2023-04-14T19:45:47.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:10.000",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28706",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-07T15:15:08.017",
|
||||
"lastModified": "2023-04-14T14:23:05.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:10.210",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28710",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-07T15:15:08.113",
|
||||
"lastModified": "2023-05-22T14:27:01.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:10.403",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29215",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-10T08:15:07.237",
|
||||
"lastModified": "2023-04-13T18:16:08.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:10.597",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29216",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-10T08:15:07.290",
|
||||
"lastModified": "2023-04-13T18:16:11.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:10.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30465",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-11T15:15:10.673",
|
||||
"lastModified": "2023-04-18T19:30:08.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:10.960",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4046",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-08-01T15:15:09.847",
|
||||
"lastModified": "2024-10-21T19:24:02.230",
|
||||
"lastModified": "2024-10-22T16:35:14.267",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4047",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-08-01T15:15:09.903",
|
||||
"lastModified": "2024-10-21T19:24:02.230",
|
||||
"lastModified": "2024-10-22T16:35:15.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45230",
|
||||
"sourceIdentifier": "infosec@edk2.groups.io",
|
||||
"published": "2024-01-16T16:15:11.727",
|
||||
"lastModified": "2024-03-13T02:15:50.157",
|
||||
"lastModified": "2024-10-22T16:35:13.497",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -79,6 +79,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2023-49567",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-10-18T08:15:03.143",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T16:39:16.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in the Bitdefender Total Security HTTPS scanning functionality where the product incorrectly checks the site's certificate, which allows an attacker to make MITM SSL connections to an arbitrary site. The product trusts certificates that are issued using the MD5 and SHA1 collision hash functions which allow attackers to create rogue certificates that appear legitimate."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad en la funci\u00f3n de an\u00e1lisis HTTPS de Bitdefender Total Security, en la que el producto comprueba incorrectamente el certificado del sitio, lo que permite a un atacante realizar conexiones SSL MITM a un sitio arbitrario. El producto conf\u00eda en los certificados emitidos mediante las funciones hash de colisi\u00f3n MD5 y SHA1, lo que permite a los atacantes crear certificados falsos que parecen leg\u00edtimos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -55,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -69,10 +95,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "27.0.25.115",
|
||||
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-certificates-using-collision-hash-functions-in-bitdefender-total-security-https-scanning-va-11239/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49570",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-10-18T09:15:02.770",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:26:47.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "27.0.25.115",
|
||||
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-basic-constraints-certificate-in-bitdefender-total-security-https-scanning-va-11210/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6055",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-10-18T08:15:03.387",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T16:39:00.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "27.0.25.115",
|
||||
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bitdefender.com/support/security-advisories/improper-certificate-validation-in-bitdefender-total-security-https-scanning-va-11158/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6056",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-10-18T08:15:03.500",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T16:38:43.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -73,10 +95,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "27.0.25.115",
|
||||
"matchCriteriaId": "F49929DA-5848-4D43-BE46-910C13BEDA93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/insecure-trust-of-self-signed-certificates-in-bitdefender-total-security-https-scanning-va-11164/",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6057",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2024-10-18T08:15:03.627",
|
||||
"lastModified": "2024-10-22T16:00:07.397",
|
||||
"lastModified": "2024-10-22T16:38:29.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -66,19 +66,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6824",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-01-16T16:15:13.920",
|
||||
"lastModified": "2024-01-23T15:35:27.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-22T16:35:16.083",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10055",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-18T08:15:03.843",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:28:59.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,18 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ninjateam:click_to_chat:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3.4",
|
||||
"matchCriteriaId": "64C989BB-93E2-4412-B1EF-74FAEC7844A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3169768/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/support-chat/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b4c13600-0791-4ade-9c28-f43f164aedae?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10078",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-18T08:15:04.060",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:28:26.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -51,106 +71,199 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.4",
|
||||
"matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L111",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L112",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L113",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L114",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L115",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L116",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L117",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L118",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L119",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L120",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L121",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L122",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L123",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L124",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L125",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L126",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L127",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L128",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L129",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L130",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L131",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L132",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L133",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L134",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d12c4b1c-23d0-430f-a6ea-0a3ab487ed10?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10079",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-18T08:15:04.300",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:27:54.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.4",
|
||||
"matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L1318",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d038f1a2-4755-417f-965d-508b57c05738?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10080",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-18T08:15:04.507",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:27:38.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.4",
|
||||
"matchCriteriaId": "9EA8FEAA-01ED-4505-881A-745E04745C3B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L1622",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1bee1eeb-5354-47c9-9ae1-b1608d87d7bb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-10131",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-10-19T04:15:05.300",
|
||||
"lastModified": "2024-10-21T17:10:22.857",
|
||||
"lastModified": "2024-10-22T17:15:03.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,19 +22,19 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10173",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-20T05:15:02.830",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T17:05:13.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,26 +150,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:didiglobal:ddmq:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA66207A-D4D3-4B53-9922-7C3769E241F5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/didi/DDMQ/issues/37",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/didi/DDMQ/issues/37#issue-2577905007",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.280957",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.280957",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.421516",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20421",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-10-16T17:15:14.193",
|
||||
"lastModified": "2024-10-18T12:53:04.627",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T17:51:08.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.0.2",
|
||||
"matchCriteriaId": "E464918E-6409-4ACC-B27A-ECD7A5A5ABF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "2BBB1A29-ABF8-4F79-A436-A416FAF4E7A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "8FA479CC-10DC-4B3A-A869-7E0CCD02C959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "B0C232BB-005C-4E04-9B99-2B01AC8E8BA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.2.5",
|
||||
"matchCriteriaId": "7B66D888-565A-4EB1-B19B-594B302AAA72"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*",
|
||||
"matchCriteriaId": "00A3390F-594D-4DB2-96EC-04D0D73C9421"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multi-RDTEqRsy",
|
||||
"source": "ykramarz@cisco.com"
|
||||
"source": "ykramarz@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40083",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:05.703",
|
||||
"lastModified": "2024-10-21T21:15:05.703",
|
||||
"lastModified": "2024-10-22T17:35:03.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Buffer Overflow vulnerabilty in the local_app_set_router_token function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via sscanf reading the token and timezone JSON fields into a fixed-length buffer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40084",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:05.770",
|
||||
"lastModified": "2024-10-21T21:15:05.770",
|
||||
"lastModified": "2024-10-22T17:35:04.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Buffer Overflow in the Boa webserver of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via exceptionally long HTTP methods or paths."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40085",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:05.853",
|
||||
"lastModified": "2024-10-21T21:15:05.853",
|
||||
"lastModified": "2024-10-22T17:35:04.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Buffer Overflow vulnerability in the local_app_set_router_wan function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via pppoe_username and pppoe_password fields being larger than 128 bytes in length."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40086",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:05.923",
|
||||
"lastModified": "2024-10-21T21:15:05.923",
|
||||
"lastModified": "2024-10-22T17:35:05.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Buffer Overflow vulnerability in the local_app_set_router_wifi_SSID_PWD function of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to execute arbitrary code via a password field larger than 64 bytes in length."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40087",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:06.003",
|
||||
"lastModified": "2024-10-21T21:15:06.003",
|
||||
"lastModified": "2024-10-22T17:35:06.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Insecure Permissions. Lack of authentication in the custom TCP service on port 5432 allows remote, unauthenticated attackers to gain administrative access over the router."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40089",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:06.150",
|
||||
"lastModified": "2024-10-21T21:15:06.150",
|
||||
"lastModified": "2024-10-22T17:35:07.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A Command Injection vulnerability in Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, authenticated attackers to execute arbitrary code by injecting shell commands into the name of the Vilo device."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40090",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:06.223",
|
||||
"lastModified": "2024-10-21T21:15:06.223",
|
||||
"lastModified": "2024-10-22T17:35:07.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Information Disclosure. An information leak in the Boa webserver allows remote, unauthenticated attackers to leak memory addresses of uClibc and the stack via sending a GET request to the index page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40091",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:06.313",
|
||||
"lastModified": "2024-10-21T21:15:06.313",
|
||||
"lastModified": "2024-10-22T17:35:08.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Vilo 5 Mesh WiFi System <= 5.16.1.33 lacks authentication in the Boa webserver, which allows remote, unauthenticated attackers to retrieve logs with sensitive system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://vilo.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43611",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-10-08T18:15:29.240",
|
||||
"lastModified": "2024-10-10T12:56:30.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-22T16:01:19.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,10 +65,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7428",
|
||||
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6414",
|
||||
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2762",
|
||||
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1189",
|
||||
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43611",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
45
CVE-2024/CVE-2024-455xx/CVE-2024-45518.json
Normal file
45
CVE-2024/CVE-2024-455xx/CVE-2024-45518.json
Normal file
@ -0,0 +1,45 @@
|
||||
{
|
||||
"id": "CVE-2024-45518",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:03.837",
|
||||
"lastModified": "2024-10-22T17:15:03.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Security_Center",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-462xx/CVE-2024-46240.json
Normal file
21
CVE-2024/CVE-2024-462xx/CVE-2024-46240.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46240",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:07.407",
|
||||
"lastModified": "2024-10-22T16:15:07.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under action=system and the company/contact parameters under action=addcust within admin.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-465xx/CVE-2024-46538.json
Normal file
25
CVE-2024/CVE-2024-465xx/CVE-2024-46538.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46538",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:03.950",
|
||||
"lastModified": "2024-10-22T17:15:03.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in pfsense v2.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $pconfig variable at interfaces_groups_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/physicszq/web_issue/blob/main/pfsense/interfaces_groups_edit_file.md_xss.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://redmine.pfsense.org/issues/15778",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47485",
|
||||
"sourceIdentifier": "hsrc@hikvision.com",
|
||||
"published": "2024-10-18T09:15:03.093",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:23:22.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,12 +59,68 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1236"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hikvision:hikcentral_master:*:*:*:*:lite:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.3.0",
|
||||
"matchCriteriaId": "126DB70D-715D-4BC7-8038-0316BA2890DB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/",
|
||||
"source": "hsrc@hikvision.com"
|
||||
"source": "hsrc@hikvision.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47486",
|
||||
"sourceIdentifier": "hsrc@hikvision.com",
|
||||
"published": "2024-10-18T09:15:03.217",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:11:07.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,12 +59,67 @@
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hikvision:hikcentral_master:*:*:*:*:lite:*:*:*",
|
||||
"versionEndExcluding": "2.3.0",
|
||||
"matchCriteriaId": "9BC8FAE8-57D7-4D5C-A6CA-97AE26FCBC65"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/",
|
||||
"source": "hsrc@hikvision.com"
|
||||
"source": "hsrc@hikvision.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47487",
|
||||
"sourceIdentifier": "hsrc@hikvision.com",
|
||||
"published": "2024-10-18T09:15:03.400",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:10:08.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,12 +59,68 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hikvision:hikcentral_professional:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.6.1",
|
||||
"matchCriteriaId": "569288FC-D541-4CF0-AC58-30048842B620"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/",
|
||||
"source": "hsrc@hikvision.com"
|
||||
"source": "hsrc@hikvision.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47676",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T12:15:04.687",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:12:39.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,19 +11,89 @@
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb.c: fix UAF of vma in hugetlb fault pathway\n\nSyzbot reports a UAF in hugetlb_fault(). This happens because\nvmf_anon_prepare() could drop the per-VMA lock and allow the current VMA\nto be freed before hugetlb_vma_unlock_read() is called.\n\nWe can fix this by using a modified version of vmf_anon_prepare() that\ndoesn't release the VMA lock on failure, and then release it ourselves\nafter hugetlb_vma_unlock_read()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.10.13",
|
||||
"matchCriteriaId": "451C50ED-169E-4E8C-BFD9-95D0C8C3231C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.2",
|
||||
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/98b74bb4d7e96b4da5ef3126511febe55b76b807",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d59ebc99dee0a2687a26df94b901eb8216dbf876",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e897d184a8dd4a4e1f39c8c495598e4d9472776c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,28 +2,102 @@
|
||||
"id": "CVE-2024-47746",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:04.667",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:00:35.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set\n\nThis may be a typo. The comment has said shared locks are\nnot allowed when this bit is set. If using shared lock, the\nwait in `fuse_file_cached_io_open` may be forever."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fuse: use un bloqueo exclusivo cuando FUSE_I_CACHE_IO_MODE est\u00e1 configurado. Esto puede ser un error tipogr\u00e1fico. El comentario dec\u00eda que no se permiten bloqueos compartidos cuando este bit est\u00e1 configurado. Si se usa un bloqueo compartido, la espera en `fuse_file_cached_io_open` puede ser eterna."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.10.13",
|
||||
"matchCriteriaId": "451C50ED-169E-4E8C-BFD9-95D0C8C3231C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.2",
|
||||
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2f3d8ff457982f4055fe8f7bf19d3821ba22c376",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4e181761ffec67307157a7e8a78d58ee4130cf00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fa4890bd8237e5a1e7428acd7328729db2703b23",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47747",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:04.753",
|
||||
"lastModified": "2024-10-22T15:09:13.173",
|
||||
"lastModified": "2024-10-22T16:11:40.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47749",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:04.950",
|
||||
"lastModified": "2024-10-22T15:00:29.497",
|
||||
"lastModified": "2024-10-22T16:08:31.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47752",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:05.203",
|
||||
"lastModified": "2024-10-22T15:04:46.523",
|
||||
"lastModified": "2024-10-22T16:11:09.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47753",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:05.283",
|
||||
"lastModified": "2024-10-22T15:04:18.277",
|
||||
"lastModified": "2024-10-22T16:10:40.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47754",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:05.377",
|
||||
"lastModified": "2024-10-22T15:03:31.147",
|
||||
"lastModified": "2024-10-22T16:10:21.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47756",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:05.550",
|
||||
"lastModified": "2024-10-22T15:02:11.467",
|
||||
"lastModified": "2024-10-22T16:09:56.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
|
56
CVE-2024/CVE-2024-478xx/CVE-2024-47819.json
Normal file
56
CVE-2024/CVE-2024-478xx/CVE-2024-47819.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47819",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-22T16:15:07.500",
|
||||
"lastModified": "2024-10-22T16:15:07.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Umbraco, a free and open source .NET content management system, has a cross-site scripting vulnerability starting in version 14.0.0 and prior to versions 14.3.1 and 15.0.0. This can be leveraged to gain access to higher-privilege endpoints, e.g. if you get a user with admin privileges to run the code, you can potentially elevate all users and grant them admin privileges or access protected content. Versions 14.3.1 and 15.0.0 contain a patch. As a workaround, ensure that access to the Dictionary section is only granted to trusted users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-c5g6-6xf7-qxp3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-485xx/CVE-2024-48570.json
Normal file
21
CVE-2024/CVE-2024-485xx/CVE-2024-48570.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.087",
|
||||
"lastModified": "2024-10-22T17:15:04.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Client Management System 1.0 was discovered to contain a SQL injection vulnerability via the Between Dates Reports parameter at /admin/bwdates-reports-ds.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Luc1f3r066/Client-Management-System-v1.0-",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-486xx/CVE-2024-48605.json
Normal file
33
CVE-2024/CVE-2024-486xx/CVE-2024-48605.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-48605",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T16:15:07.757",
|
||||
"lastModified": "2024-10-22T16:15:07.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Helakuru Desktop Application v1.1 allows a local attacker to execute arbitrary code via the lack of proper validation of the wow64log.dll file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://clement.notin.org/blog/2020/09/12/CVE-2020-7315-McAfee-Agent-DLL-injection/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/surajhacx/HelakuruV.1.1-DLLHijack",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/%40xNEED/dll-hijacking-jagexlauncher-819599165822",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/51461",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-487xx/CVE-2024-48706.json
Normal file
21
CVE-2024/CVE-2024-487xx/CVE-2024-48706.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.180",
|
||||
"lastModified": "2024-10-22T17:15:04.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the title parameter with action=add or action=editform within the (a) managemessage.php file and (b) managetask.php file respectively."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-487xx/CVE-2024-48707.json
Normal file
21
CVE-2024/CVE-2024-487xx/CVE-2024-48707.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.273",
|
||||
"lastModified": "2024-10-22T17:15:04.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS3.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-487xx/CVE-2024-48708.json
Normal file
21
CVE-2024/CVE-2024-487xx/CVE-2024-48708.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-48708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.370",
|
||||
"lastModified": "2024-10-22T17:15:04.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Collabtive 3.1 is vulnerable to Cross-Site Scripting (XSS) via the name parameter in (a) file tasklist.php under action = add/edit and in (b) file admin.php under action = adduser/edituser."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS4.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-489xx/CVE-2024-48925.json
Normal file
60
CVE-2024/CVE-2024-489xx/CVE-2024-48925.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-48925",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-22T16:15:07.853",
|
||||
"lastModified": "2024-10-22T16:15:07.853",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Umbraco, a free and open source .NET content management system, has an improper access control issue starting in version 14.0.0 and prior to version 14.3.0. The issue allows low-privilege users to access the webhook API and retrieve information that should be restricted to users with access to the settings section. Version 14.3.0 contains a patch."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 0.0,
|
||||
"baseSeverity": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 0.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-4gp9-ff99-j6vj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-489xx/CVE-2024-48926.json
Normal file
56
CVE-2024/CVE-2024-489xx/CVE-2024-48926.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48926",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-22T16:15:08.090",
|
||||
"lastModified": "2024-10-22T16:15:08.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Umbraco, a free and open source .NET content management system, has an insufficient session expiration issue in versions on the 13.x branch prior to 13.5.2, 10.x prior to 10.8.7, and 8.x prior to 8.18.15. The Backoffice displays the logout page with a session timeout message before the server session has fully expired, causing users to believe they have been logged out approximately 30 seconds before they actually are. Versions 13.5.2, 10.8,7, and 8.18.15 contain a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-fp6q-gccw-7qqm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-489xx/CVE-2024-48927.json
Normal file
56
CVE-2024/CVE-2024-489xx/CVE-2024-48927.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48927",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-22T16:15:08.360",
|
||||
"lastModified": "2024-10-22T16:15:08.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Umbraco, a free and open source .NET content management system, has a remote code execution issue in versions on the 13.x branch prior to 13.5.2, 10.x prior to 10.8.7, and 8.x prior to 8.18.15. There is a potential risk of code execution for Backoffice users when they \u201cpreview\u201d SVG files in full screen mode. Versions 13.5.2, 10.8,7, and 8.18.15 contain a patch for the issue. As a workaround, derver-side file validation is available to strip script tags from file's content during the file upload process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-5955-cwv4-h7qh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-489xx/CVE-2024-48929.json
Normal file
56
CVE-2024/CVE-2024-489xx/CVE-2024-48929.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-48929",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-22T16:15:08.617",
|
||||
"lastModified": "2024-10-22T16:15:08.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Umbraco is a free and open source .NET content management system. In versions on the 13.x branch prior to 13.5.2 and versions on the 10.x branch prior to 10.8.7, during an explicit sign-out, the server session is not fully terminated. Versions 13.5.2 and 10.8.7 contain a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-384"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wxw9-6pv9-c3xc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-492xx/CVE-2024-49208.json
Normal file
48
CVE-2024/CVE-2024-492xx/CVE-2024-49208.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-49208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:04.503",
|
||||
"lastModified": "2024-10-22T17:15:04.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Archer Platform 2024.03 before version 2024.08 is affected by an authorization bypass vulnerability related to supporting application files. A remote unprivileged attacker could potentially exploit this vulnerability to elevate their privileges and delete system icons."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-492xx/CVE-2024-49209.json
Normal file
48
CVE-2024/CVE-2024-492xx/CVE-2024-49209.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-49209",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:05.763",
|
||||
"lastModified": "2024-10-22T17:15:05.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Archer Platform 2024.03 before version 2024.09 is affected by an API authorization bypass vulnerability related to supporting application files. A remote unprivileged attacker could potentially exploit this vulnerability to elevate their privileges and upload additional system icons."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-492xx/CVE-2024-49210.json
Normal file
48
CVE-2024/CVE-2024-492xx/CVE-2024-49210.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-49210",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:05.970",
|
||||
"lastModified": "2024-10-22T17:15:05.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reflected XSS was discovered in an iView List Archer Platform UX page in Archer Platform 6.x before version 2024.09. A remote unauthenticated attacker could potentially exploit this by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and executed by the web browser in the context of the vulnerable web application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-492xx/CVE-2024-49211.json
Normal file
48
CVE-2024/CVE-2024-492xx/CVE-2024-49211.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-49211",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-22T17:15:06.193",
|
||||
"lastModified": "2024-10-22T17:15:06.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reflected XSS was discovered in a Dashboard Listing Archer Platform UX page in Archer Platform 6.x before version 2024.08. A remote unauthenticated attacker could potentially exploit this by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and executed by the web browser in the context of the vulnerable web application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/747545",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/tkb-p/product-advisories-tkb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-493xx/CVE-2024-49373.json
Normal file
64
CVE-2024/CVE-2024-493xx/CVE-2024-49373.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-49373",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-22T16:15:08.860",
|
||||
"lastModified": "2024-10-22T16:15:08.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "No Fuss Computing Centurion ERP is open source enterprise resource planning (ERP) software. Prior to version 1.2.1, an authenticated user can view projects within organizations they are not apart of. Version 1.2.1 fixes the problem."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-653"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nofusscomputing/centurion_erp/commit/c3a4685200faa060167d4fde86e806dc91eddcae",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nofusscomputing/centurion_erp/pull/358",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nofusscomputing/centurion_erp/security/advisories/GHSA-5qmx-pr2f-qhj5",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49615",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T10:15:04.690",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:43:14.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:henriquerodrigues:safetyforms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.0",
|
||||
"matchCriteriaId": "B2B347EB-4A6A-4D4C-821E-18B688A74A5D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/safetymails-forms/wordpress-safetyforms-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49616",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T10:15:04.903",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:41:58.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nyasro:rate_own_post:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "25EB6F93-D409-49FF-B598-0CC78E15AAFD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/rate-own-post/wordpress-rate-own-post-plugin-1-0-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49617",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T10:15:05.130",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:51:35.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bhaskardhote:back_link_tracker:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.0",
|
||||
"matchCriteriaId": "DD111F5C-5BB5-4770-B263-3727C61EB314"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/back-link-tracker/wordpress-back-link-tracker-plugin-1-0-0-csrf-to-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-49618",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-20T10:15:05.347",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:50:18.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jordanlyall:mytweetlinks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.1",
|
||||
"matchCriteriaId": "748A3C09-C3A5-4B9B-8BDD-3AF5016A4905"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/mytweetlinks/wordpress-mytweetlinks-plugin-1-1-1-sql-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,36 +2,130 @@
|
||||
"id": "CVE-2024-49850",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:05.797",
|
||||
"lastModified": "2024-10-21T17:09:45.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:12:14.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos\n\nIn case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL\nreferencing a non-existing BTF type, function bpf_core_calc_relo_insn\nwould cause a null pointer deference.\n\nFix this by adding a proper check upper in call stack, as malformed\nrelocation records could be passed from user space.\n\nSimplest reproducer is a program:\n\n r0 = 0\n exit\n\nWith a single relocation record:\n\n .insn_off = 0, /* patch first instruction */\n .type_id = 100500, /* this type id does not exist */\n .access_str_off = 6, /* offset of string \"0\" */\n .kind = BPF_CORE_TYPE_ID_LOCAL,\n\nSee the link for original reproducer or next commit for a test case."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: maneja correctamente reubicaciones BPF_CORE_TYPE_ID_LOCAL malformadas En caso de un registro de reubicaci\u00f3n malformado del tipo BPF_CORE_TYPE_ID_LOCAL que haga referencia a un tipo BTF inexistente, la funci\u00f3n bpf_core_calc_relo_insn causar\u00eda una desreferencia de puntero nulo. Solucione esto agregando una verificaci\u00f3n superior adecuada en la pila de llamadas, ya que los registros de reubicaci\u00f3n malformados podr\u00edan pasarse desde el espacio de usuario. El reproductor m\u00e1s simple es un programa: r0 = 0 exit Con un solo registro de reubicaci\u00f3n: .insn_off = 0, /* parchear la primera instrucci\u00f3n */ .type_id = 100500, /* este id de tipo no existe */ .access_str_off = 6, /* desplazamiento de la cadena \"0\" */ .kind = BPF_CORE_TYPE_ID_LOCAL, Consulte el enlace para el reproductor original o la pr\u00f3xima confirmaci\u00f3n para un caso de prueba."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.17",
|
||||
"versionEndExcluding": "6.1.113",
|
||||
"matchCriteriaId": "09358D68-A717-469E-B900-8002A642E29A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.54",
|
||||
"matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.13",
|
||||
"matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.11.2",
|
||||
"matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2288b54b96dcb55bedebcef3572bb8821fc5e708",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3d2786d65aaa954ebd3fcc033ada433e10da21c4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/584cd3ff792e1edbea20b2a7df55897159b0be3e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc7ce14f00bcd50641f2110b7a32aa6552e0780f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e7e9c5b2dda29067332df2a85b0141a92b41f218",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-49855",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:06.270",
|
||||
"lastModified": "2024-10-22T15:17:29.283",
|
||||
"lastModified": "2024-10-22T16:12:27.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-49859",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-10-21T13:15:06.627",
|
||||
"lastModified": "2024-10-22T15:24:57.640",
|
||||
"lastModified": "2024-10-22T16:13:03.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,8 +22,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -31,10 +31,10 @@
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9050",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-10-22T13:15:02.410",
|
||||
"lastModified": "2024-10-22T13:15:02.410",
|
||||
"lastModified": "2024-10-22T17:15:06.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:8312",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-9050",
|
||||
"source": "secalert@redhat.com"
|
||||
|
78
CVE-2024/CVE-2024-91xx/CVE-2024-9129.json
Normal file
78
CVE-2024/CVE-2024-91xx/CVE-2024-9129.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-9129",
|
||||
"sourceIdentifier": "security@puppet.com",
|
||||
"published": "2024-10-22T17:15:06.557",
|
||||
"lastModified": "2024-10-22T17:15:06.557",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In versions of Zend Server 8.5 and prior to version 9.2 a format string injection was discovered. \n\nReported by Dylan Marino"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@puppet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@puppet.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-134"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.perforce.com/s/detail/a91PA000001SYZFYA4",
|
||||
"source": "security@puppet.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-92xx/CVE-2024-9287.json
Normal file
86
CVE-2024/CVE-2024-92xx/CVE-2024-9287.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-9287",
|
||||
"sourceIdentifier": "cna@python.org",
|
||||
"published": "2024-10-22T17:15:06.697",
|
||||
"lastModified": "2024-10-22T17:15:06.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie \"./venv/bin/python\") are not affected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@python.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "GREEN",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@python.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-428"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/python/cpython/issues/124651",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/python/cpython/pull/124712",
|
||||
"source": "cna@python.org"
|
||||
},
|
||||
{
|
||||
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/",
|
||||
"source": "cna@python.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9355",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-10-01T19:15:09.793",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"lastModified": "2024-10-22T17:15:06.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,6 +60,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:7550",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:8327",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-9355",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-9452",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-18T05:15:07.607",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:23:59.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Branding para WordPress es vulnerable a Cross-Site Scripting almacenado mediante cargas de archivos SVG en todas las versiones hasta la 1.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -47,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gurieveugen\\&vitaliyshebela:branding:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "F579BE43-2D93-4F36-A54D-3D8EE16054AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/branding/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8736cf81-3fb8-4c81-a878-7d73a3e68fc2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9537",
|
||||
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"published": "2024-10-18T15:15:04.170",
|
||||
"lastModified": "2024-10-22T01:00:02.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T17:33:23.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-10-21",
|
||||
"cisaActionDue": "2024-11-11",
|
||||
@ -65,6 +65,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"type": "Secondary",
|
||||
@ -87,42 +107,108 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.1.0",
|
||||
"versionEndExcluding": "12.1.3",
|
||||
"matchCriteriaId": "4BFE7072-C420-4186-8441-AD5A531382EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.2.0",
|
||||
"versionEndExcluding": "12.2.3",
|
||||
"matchCriteriaId": "BE089841-BC12-4DF6-86A3-71AF46CC2345"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://arcticwolf.com/resources/blog/rackspace-breach-linked-to-zero-day-vulnerability-sciencelogic-sl1s-third-party-utility/",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Press/Media Coverage"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://community.sciencelogic.com/blog/latest-kb-articles-and-known-issues-blog-board/week-of-september-30-2024---latest-kb-articles-and-known-issues-part-1-of-2/1690",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://rackspace.service-now.com/system_status?id=detailed_status&service=4dafca5a87f41610568b206f8bbb35a6",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.sciencelogic.com/s/article/15465",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.sciencelogic.com/s/article/15527",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/ynezzor/status/1839931641172467907",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.bleepingcomputer.com/news/security/rackspace-monitoring-data-stolen-in-sciencelogic-zero-day-attack/",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Press/Media Coverage"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9537",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.theregister.com/2024/09/30/rackspace_zero_day_attack/",
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
||||
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
||||
"tags": [
|
||||
"Press/Media Coverage"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,44 @@
|
||||
"id": "CVE-2024-9848",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-18T05:15:07.807",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-22T16:42:25.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Product Customizer Light plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Product Customizer Light para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de cargas de archivos SVG en todas las versiones hasta la 1.0.0 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -47,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:k2-service:product_customizer_light:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.0",
|
||||
"matchCriteriaId": "6D4CD46E-314B-44E3-AEB7-C4489853D8A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/product-customizer-light/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18d1feee-347c-4f43-a01b-67b3d0a5b2d6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
92
README.md
92
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-22T16:00:52.758050+00:00
|
||||
2024-10-22T18:00:41.619481+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-22T16:00:07.397000+00:00
|
||||
2024-10-22T17:51:08.113000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,54 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
266711
|
||||
266733
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `22`
|
||||
|
||||
- [CVE-2024-10234](CVE-2024/CVE-2024-102xx/CVE-2024-10234.json) (`2024-10-22T14:15:14.573`)
|
||||
- [CVE-2024-26271](CVE-2024/CVE-2024-262xx/CVE-2024-26271.json) (`2024-10-22T15:15:05.523`)
|
||||
- [CVE-2024-26272](CVE-2024/CVE-2024-262xx/CVE-2024-26272.json) (`2024-10-22T15:15:05.740`)
|
||||
- [CVE-2024-26273](CVE-2024/CVE-2024-262xx/CVE-2024-26273.json) (`2024-10-22T15:15:05.937`)
|
||||
- [CVE-2024-38002](CVE-2024/CVE-2024-380xx/CVE-2024-38002.json) (`2024-10-22T15:15:06.277`)
|
||||
- [CVE-2024-43173](CVE-2024/CVE-2024-431xx/CVE-2024-43173.json) (`2024-10-22T15:15:06.800`)
|
||||
- [CVE-2024-43177](CVE-2024/CVE-2024-431xx/CVE-2024-43177.json) (`2024-10-22T15:15:07.020`)
|
||||
- [CVE-2024-50311](CVE-2024/CVE-2024-503xx/CVE-2024-50311.json) (`2024-10-22T14:15:19.450`)
|
||||
- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2024-10-22T14:15:19.973`)
|
||||
- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-10-22T15:15:07.337`)
|
||||
- [CVE-2022-23861](CVE-2022/CVE-2022-238xx/CVE-2022-23861.json) (`2024-10-22T16:15:04.897`)
|
||||
- [CVE-2022-23862](CVE-2022/CVE-2022-238xx/CVE-2022-23862.json) (`2024-10-22T16:15:05.443`)
|
||||
- [CVE-2024-45518](CVE-2024/CVE-2024-455xx/CVE-2024-45518.json) (`2024-10-22T17:15:03.837`)
|
||||
- [CVE-2024-46240](CVE-2024/CVE-2024-462xx/CVE-2024-46240.json) (`2024-10-22T16:15:07.407`)
|
||||
- [CVE-2024-46538](CVE-2024/CVE-2024-465xx/CVE-2024-46538.json) (`2024-10-22T17:15:03.950`)
|
||||
- [CVE-2024-47819](CVE-2024/CVE-2024-478xx/CVE-2024-47819.json) (`2024-10-22T16:15:07.500`)
|
||||
- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-22T17:15:04.087`)
|
||||
- [CVE-2024-48605](CVE-2024/CVE-2024-486xx/CVE-2024-48605.json) (`2024-10-22T16:15:07.757`)
|
||||
- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-22T17:15:04.180`)
|
||||
- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-22T17:15:04.273`)
|
||||
- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-22T17:15:04.370`)
|
||||
- [CVE-2024-48925](CVE-2024/CVE-2024-489xx/CVE-2024-48925.json) (`2024-10-22T16:15:07.853`)
|
||||
- [CVE-2024-48926](CVE-2024/CVE-2024-489xx/CVE-2024-48926.json) (`2024-10-22T16:15:08.090`)
|
||||
- [CVE-2024-48927](CVE-2024/CVE-2024-489xx/CVE-2024-48927.json) (`2024-10-22T16:15:08.360`)
|
||||
- [CVE-2024-48929](CVE-2024/CVE-2024-489xx/CVE-2024-48929.json) (`2024-10-22T16:15:08.617`)
|
||||
- [CVE-2024-49208](CVE-2024/CVE-2024-492xx/CVE-2024-49208.json) (`2024-10-22T17:15:04.503`)
|
||||
- [CVE-2024-49209](CVE-2024/CVE-2024-492xx/CVE-2024-49209.json) (`2024-10-22T17:15:05.763`)
|
||||
- [CVE-2024-49210](CVE-2024/CVE-2024-492xx/CVE-2024-49210.json) (`2024-10-22T17:15:05.970`)
|
||||
- [CVE-2024-49211](CVE-2024/CVE-2024-492xx/CVE-2024-49211.json) (`2024-10-22T17:15:06.193`)
|
||||
- [CVE-2024-49373](CVE-2024/CVE-2024-493xx/CVE-2024-49373.json) (`2024-10-22T16:15:08.860`)
|
||||
- [CVE-2024-9129](CVE-2024/CVE-2024-91xx/CVE-2024-9129.json) (`2024-10-22T17:15:06.557`)
|
||||
- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-22T17:15:06.697`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `82`
|
||||
Recently modified CVEs: `67`
|
||||
|
||||
- [CVE-2024-47747](CVE-2024/CVE-2024-477xx/CVE-2024-47747.json) (`2024-10-22T15:09:13.173`)
|
||||
- [CVE-2024-47749](CVE-2024/CVE-2024-477xx/CVE-2024-47749.json) (`2024-10-22T15:00:29.497`)
|
||||
- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-22T15:04:46.523`)
|
||||
- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-22T15:04:18.277`)
|
||||
- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-22T15:03:31.147`)
|
||||
- [CVE-2024-47755](CVE-2024/CVE-2024-477xx/CVE-2024-47755.json) (`2024-10-22T15:46:38.027`)
|
||||
- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-22T15:02:11.467`)
|
||||
- [CVE-2024-47757](CVE-2024/CVE-2024-477xx/CVE-2024-47757.json) (`2024-10-22T15:54:48.830`)
|
||||
- [CVE-2024-49613](CVE-2024/CVE-2024-496xx/CVE-2024-49613.json) (`2024-10-22T15:29:55.203`)
|
||||
- [CVE-2024-49614](CVE-2024/CVE-2024-496xx/CVE-2024-49614.json) (`2024-10-22T15:34:09.190`)
|
||||
- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-22T15:17:29.283`)
|
||||
- [CVE-2024-49857](CVE-2024/CVE-2024-498xx/CVE-2024-49857.json) (`2024-10-22T15:48:42.347`)
|
||||
- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-22T15:24:57.640`)
|
||||
- [CVE-2024-6959](CVE-2024/CVE-2024-69xx/CVE-2024-6959.json) (`2024-10-22T14:02:57.660`)
|
||||
- [CVE-2024-7889](CVE-2024/CVE-2024-78xx/CVE-2024-7889.json) (`2024-10-22T14:50:55.187`)
|
||||
- [CVE-2024-7890](CVE-2024/CVE-2024-78xx/CVE-2024-7890.json) (`2024-10-22T14:53:32.763`)
|
||||
- [CVE-2024-9206](CVE-2024/CVE-2024-92xx/CVE-2024-9206.json) (`2024-10-22T15:27:08.847`)
|
||||
- [CVE-2024-9364](CVE-2024/CVE-2024-93xx/CVE-2024-9364.json) (`2024-10-22T15:26:10.673`)
|
||||
- [CVE-2024-9366](CVE-2024/CVE-2024-93xx/CVE-2024-9366.json) (`2024-10-22T15:09:48.177`)
|
||||
- [CVE-2024-9373](CVE-2024/CVE-2024-93xx/CVE-2024-9373.json) (`2024-10-22T15:07:23.907`)
|
||||
- [CVE-2024-9382](CVE-2024/CVE-2024-93xx/CVE-2024-9382.json) (`2024-10-22T14:31:49.097`)
|
||||
- [CVE-2024-9383](CVE-2024/CVE-2024-93xx/CVE-2024-9383.json) (`2024-10-22T14:27:13.377`)
|
||||
- [CVE-2024-9674](CVE-2024/CVE-2024-96xx/CVE-2024-9674.json) (`2024-10-22T14:02:50.473`)
|
||||
- [CVE-2024-9703](CVE-2024/CVE-2024-97xx/CVE-2024-9703.json) (`2024-10-22T15:25:27.887`)
|
||||
- [CVE-2024-9892](CVE-2024/CVE-2024-98xx/CVE-2024-9892.json) (`2024-10-22T15:46:17.880`)
|
||||
- [CVE-2024-40091](CVE-2024/CVE-2024-400xx/CVE-2024-40091.json) (`2024-10-22T17:35:08.760`)
|
||||
- [CVE-2024-43611](CVE-2024/CVE-2024-436xx/CVE-2024-43611.json) (`2024-10-22T16:01:19.373`)
|
||||
- [CVE-2024-47485](CVE-2024/CVE-2024-474xx/CVE-2024-47485.json) (`2024-10-22T16:23:22.890`)
|
||||
- [CVE-2024-47486](CVE-2024/CVE-2024-474xx/CVE-2024-47486.json) (`2024-10-22T16:11:07.547`)
|
||||
- [CVE-2024-47487](CVE-2024/CVE-2024-474xx/CVE-2024-47487.json) (`2024-10-22T16:10:08.027`)
|
||||
- [CVE-2024-47676](CVE-2024/CVE-2024-476xx/CVE-2024-47676.json) (`2024-10-22T16:12:39.830`)
|
||||
- [CVE-2024-47746](CVE-2024/CVE-2024-477xx/CVE-2024-47746.json) (`2024-10-22T16:00:35.703`)
|
||||
- [CVE-2024-47747](CVE-2024/CVE-2024-477xx/CVE-2024-47747.json) (`2024-10-22T16:11:40.627`)
|
||||
- [CVE-2024-47749](CVE-2024/CVE-2024-477xx/CVE-2024-47749.json) (`2024-10-22T16:08:31.637`)
|
||||
- [CVE-2024-47752](CVE-2024/CVE-2024-477xx/CVE-2024-47752.json) (`2024-10-22T16:11:09.037`)
|
||||
- [CVE-2024-47753](CVE-2024/CVE-2024-477xx/CVE-2024-47753.json) (`2024-10-22T16:10:40.380`)
|
||||
- [CVE-2024-47754](CVE-2024/CVE-2024-477xx/CVE-2024-47754.json) (`2024-10-22T16:10:21.907`)
|
||||
- [CVE-2024-47756](CVE-2024/CVE-2024-477xx/CVE-2024-47756.json) (`2024-10-22T16:09:56.570`)
|
||||
- [CVE-2024-49615](CVE-2024/CVE-2024-496xx/CVE-2024-49615.json) (`2024-10-22T16:43:14.190`)
|
||||
- [CVE-2024-49616](CVE-2024/CVE-2024-496xx/CVE-2024-49616.json) (`2024-10-22T16:41:58.513`)
|
||||
- [CVE-2024-49617](CVE-2024/CVE-2024-496xx/CVE-2024-49617.json) (`2024-10-22T16:51:35.353`)
|
||||
- [CVE-2024-49618](CVE-2024/CVE-2024-496xx/CVE-2024-49618.json) (`2024-10-22T16:50:18.527`)
|
||||
- [CVE-2024-49850](CVE-2024/CVE-2024-498xx/CVE-2024-49850.json) (`2024-10-22T16:12:14.193`)
|
||||
- [CVE-2024-49855](CVE-2024/CVE-2024-498xx/CVE-2024-49855.json) (`2024-10-22T16:12:27.030`)
|
||||
- [CVE-2024-49859](CVE-2024/CVE-2024-498xx/CVE-2024-49859.json) (`2024-10-22T16:13:03.267`)
|
||||
- [CVE-2024-9050](CVE-2024/CVE-2024-90xx/CVE-2024-9050.json) (`2024-10-22T17:15:06.420`)
|
||||
- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-10-22T17:15:06.853`)
|
||||
- [CVE-2024-9452](CVE-2024/CVE-2024-94xx/CVE-2024-9452.json) (`2024-10-22T16:23:59.420`)
|
||||
- [CVE-2024-9537](CVE-2024/CVE-2024-95xx/CVE-2024-9537.json) (`2024-10-22T17:33:23.837`)
|
||||
- [CVE-2024-9848](CVE-2024/CVE-2024-98xx/CVE-2024-9848.json) (`2024-10-22T16:42:25.867`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
322
_state.csv
322
_state.csv
@ -63138,7 +63138,7 @@ CVE-2013-5915,0,0,368d20521458dfd67f96a5930cda6772edd7252de200104ef31ef51939f90d
|
||||
CVE-2013-5916,0,0,b0d284bafa3ac6246187547ee2d43684ad1236bff154114e61e3a3cf31f28810,2014-05-09T17:42:40.380000
|
||||
CVE-2013-5917,0,0,638bc89fbb16450da932db01256312e62affb65f570814a57e05659a3af11b92,2013-09-23T19:23:45.877000
|
||||
CVE-2013-5918,0,0,6126663f639f7e21c569c9ea85ac23b75cd9e059660132fae7fd8284aef28e2b,2013-09-23T22:29:07.197000
|
||||
CVE-2013-5919,0,0,30699efb71c093b0e58f24544bf6df97538bcae149af62bf024902b9dff43824,2018-10-30T16:27:53.280000
|
||||
CVE-2013-5919,0,1,0adc17bb11f2ed9913c73cca5c613c7fea4d3c599f1f6f5eb6d738930fd51ded,2024-10-22T17:11:30.463000
|
||||
CVE-2013-5930,0,0,58f14391c3ad819c611b2142260d6a3525ec3ab4e3dcd27e90aedb68e5c54d13,2017-08-29T01:33:53.340000
|
||||
CVE-2013-5931,0,0,7e3f79c8d8dbe38950577fa1ce89a252dd9f139e65131fb691e22345ef4f0c31,2013-10-15T18:03:40.417000
|
||||
CVE-2013-5932,0,0,c7fa0da30fdd1df0a4bb0e5d331120001e0abaab1eb852698805535985dd763f,2013-10-03T18:35:43.510000
|
||||
@ -111407,9 +111407,9 @@ CVE-2018-10238,0,0,5ce73cfdf6c911ff33f92d929345a4f196b913aa547a8ce47a1937c167cf2
|
||||
CVE-2018-10239,0,0,b413a71aadf645ae4e886f0aa705ec52a2de7806a1f09a861d8dce143f02edad,2019-06-20T17:17:33.690000
|
||||
CVE-2018-10240,0,0,502d71f1fe0738d6cd63f255ca904d3701317895a3d0d52edad3a0c6d08616be,2018-06-25T17:04:30.363000
|
||||
CVE-2018-10241,0,0,e96a43e60e432a1531f502eabdd83306afa8aa26926945ca2aaa1a6a36637314,2018-06-20T14:17:18.543000
|
||||
CVE-2018-10242,0,0,f39e96444e074913df132f95302e1e4da40b4d31a29c66625f2e557da5245295,2019-05-06T17:00:24.877000
|
||||
CVE-2018-10242,0,1,6239bb33c05dfa81a63f17b2e9a1fdc8e16d715b4d7e738f2a88de6db03f5eff,2024-10-22T17:11:30.463000
|
||||
CVE-2018-10243,0,0,b53749bcaaacf564e23f6a7a8d50a34723505f0b1455fd458f02a46a1fc4083c,2019-04-08T23:29:00.323000
|
||||
CVE-2018-10244,0,0,87b877f1834f7e6e54019a805d6b5dc0c4f4374021737fa7ae57be5e904d4fef,2019-04-07T01:24:48.190000
|
||||
CVE-2018-10244,0,1,4bb60ec008f032343bd62792cf96edfdce93226bbd029d819e1e37d8d0b2850f,2024-10-22T17:11:30.463000
|
||||
CVE-2018-10245,0,0,8bae6774155e92f5cb720f0e2f763f381e2a1565088ccfec93c7ee7b948fd8e6,2018-05-18T17:06:54.793000
|
||||
CVE-2018-10248,0,0,d20f22e2cafcc987233870942fc0f94f1531ddf23af0119f749ea3fa2683e488,2018-05-21T16:40:00.863000
|
||||
CVE-2018-10249,0,0,b29ed9b3250171b089061b1f6a968f53655a0949f17ffaf296a30927c193d744,2018-05-22T15:00:55.567000
|
||||
@ -135737,7 +135737,7 @@ CVE-2019-1862,0,0,73be23ed6169d16a07019413510f2ff1d6d9d5b23423727dad7c525ab7de7b
|
||||
CVE-2019-18622,0,0,1df28778183d6abbb1e44ad7d65ccd139dbfd35d9b86ceb6618f6fa7cbf94666,2023-11-07T03:06:52.997000
|
||||
CVE-2019-18623,0,0,2d88c594bd920a45844903bf885464713b1665aba2a35a43a772a8a355951563,2019-11-12T18:34:11.033000
|
||||
CVE-2019-18624,0,0,96b8c4a6d8d884d1986dee07622e67462b6f07d15de4bee67bd69ed2ef6303d4,2023-11-07T03:06:53.063000
|
||||
CVE-2019-18625,0,0,37126c8a682671b0ee96b0d7b511e31af3fab89b6d78665f184d4f9a2851de8e,2023-02-01T19:24:01.150000
|
||||
CVE-2019-18625,0,1,2602f7b35c60fc7154aef534c6cf964c071202fef48802bb5fcae6f9f3c77eb1,2024-10-22T17:11:30.463000
|
||||
CVE-2019-18626,0,0,2bcdd33e07732415d4f8d9d13f77081c7fae106c686a2a9db5ec78003bd95c89,2021-07-21T11:39:23.747000
|
||||
CVE-2019-18628,0,0,0a6571bdb0039cb6bb9b503480f5259e0aae045b719f98155f82586e98649463,2021-03-05T19:25:03.187000
|
||||
CVE-2019-18629,0,0,979ee48d22f2a4d7bf8f765069349736f6d5e8195e1cb3f2fca8dd5f2767917e,2021-03-11T16:21:42.453000
|
||||
@ -135904,7 +135904,7 @@ CVE-2019-18786,0,0,f7b30acdbe06e41ba214eef680ff681b69fd3c81ecd62d74c7d2e45107f6b
|
||||
CVE-2019-1879,0,0,b69bf614f656b8f53aaf6933887d8ce9a93223b5fcdc56f559ea8db64c4607f8,2019-10-09T23:48:25.037000
|
||||
CVE-2019-18790,0,0,f3ae15afe951af3264c1f39856a167edc0b0d5f4bfd44be838869db02c5b4617,2022-05-13T20:56:27.693000
|
||||
CVE-2019-18791,0,0,55a8db09b5493780b14bfe0dfd0cd0d7df9ca2af1963058224ac92556a1e1ee6,2020-02-20T21:24:25.883000
|
||||
CVE-2019-18792,0,0,46f32578340cee54d6fe0b51c16149b3e6bb38c788ae10f87a59b61256799f01,2021-07-21T11:39:23.747000
|
||||
CVE-2019-18792,0,1,b197a0f768336ae7cef9f470042e0204d0d7eb61a7e5ae1a80b5cefbb7b0ff06,2024-10-22T17:11:30.463000
|
||||
CVE-2019-18793,0,0,388e575fd403449ea4ad2c57a93e31debdd0488e80101e71fbd65a8206a1cdae,2019-11-14T21:14:09.950000
|
||||
CVE-2019-18794,0,0,ec2d73b58d3f046e284f4910595f05dff351ee3caddd343e457f2053f0491b1d,2020-10-27T15:28:24.953000
|
||||
CVE-2019-18795,0,0,27f7ec1fb5dab54447ec2b6b844407921f47e51c0d432d565a938f6792e32e2b,2020-10-27T15:28:09.483000
|
||||
@ -193038,6 +193038,8 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521
|
||||
CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000
|
||||
CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000
|
||||
CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000
|
||||
CVE-2022-23861,1,1,749026e9e7284e0036f11dafc4b8939d74e8bac8ff9ef70ec728150a0c070436,2024-10-22T16:15:04.897000
|
||||
CVE-2022-23862,1,1,474bfd48b6baee74958d3f1c9028db1fb9db25971396e5181791000be4d0e6c6,2024-10-22T16:15:05.443000
|
||||
CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000
|
||||
CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000
|
||||
CVE-2022-23868,0,0,c4621856d933568f66278364ad9aeb56e74477fa3255560a959f3a6c8b310a91,2022-04-04T19:47:02.100000
|
||||
@ -196004,7 +196006,7 @@ CVE-2022-27413,0,0,1bf73e093b8cb62f8a3eea7413c4a9e4840f866988d4a524423fac3db666a
|
||||
CVE-2022-27416,0,0,a4cd74f6cc29d3b41356401ea2184243259ce93cf3d00d4f6aa912918b191dca,2022-10-28T20:41:07.257000
|
||||
CVE-2022-27418,0,0,0a070b71ad967ccfd186c4717efb3bff18a60fdc9c3ecc5dfda25532c46f2106,2022-10-28T20:41:04.007000
|
||||
CVE-2022-27419,0,0,994eb171df1c6d10a249b0df989544ffdff3f15dd8299ac39a5cf0580d7a49a5,2022-04-20T16:56:24.287000
|
||||
CVE-2022-2742,0,0,5fc39a3c7ce5b2f7a59724905065558dbd2c69828d2049d6cc525aedf20b8654,2023-08-08T14:22:24.967000
|
||||
CVE-2022-2742,0,1,a932d6570b56bf449a11204706597e2b66019b2ee9d75e8e490fdabf3af66f97,2024-10-22T17:35:00.793000
|
||||
CVE-2022-27420,0,0,a1aa723fc92f893c24e887fab41dfbb10b8f11940622b8f050ec7bc1279b9153,2022-05-11T17:21:57.457000
|
||||
CVE-2022-27421,0,0,5b85d8359fc7d6211c1b9d8e72de55fe6685172d0646d9efa4d2e51f1d2107f5,2023-08-08T14:21:49.707000
|
||||
CVE-2022-27422,0,0,fa18bf8ab1e0503ba3808aee3c3c27897296bc3ab8ac65353ffe66abaf3b7c2a,2022-04-25T13:47:36.867000
|
||||
@ -196014,7 +196016,7 @@ CVE-2022-27426,0,0,0548985f0e764d200b000bacf7f46d2ba299dcbe47c9accfe9547c1a94db5
|
||||
CVE-2022-27427,0,0,1414131cea9dc91f1d4275356915d7d04ce3229fc70cc9f37ee59bf12dd491f0,2023-11-07T03:45:19.823000
|
||||
CVE-2022-27428,0,0,58081a02131b8ff72388ea2009b53ad9b1621e4927caed88d3d8c075db01789e,2022-05-05T15:57:55.750000
|
||||
CVE-2022-27429,0,0,8526d66670571e284e4a1ab73cb4843dc69fcc0a9e7bcf356fa0c52ba68e1100,2022-05-05T16:27:20.627000
|
||||
CVE-2022-2743,0,0,9142752b0c96fb10fbd0217ec3245362a5754f1b937e032c6bd20f233ad63a00,2023-01-09T19:15:51.240000
|
||||
CVE-2022-2743,0,1,f5d5bbfe8868cb1452d5eb9dfc018b36b4b74554517421c5f361102aaa4892c1,2024-10-22T16:35:01.157000
|
||||
CVE-2022-27431,0,0,154579f7591d92b17349e90e315fc1122ad1d1b36589287fbb93e13fad5c6a63,2022-05-11T17:22:52.137000
|
||||
CVE-2022-27432,0,0,de8f1f5eca7a6676948cac20e35002ea53b59e39eda02c7765812169c7289366,2022-04-05T18:43:08.160000
|
||||
CVE-2022-27434,0,0,f1d1791ccc358d257a78bfdc203bf6b4bfe96782793f84a355baa0d8ef9023f9,2022-07-25T17:03:12.943000
|
||||
@ -204861,7 +204863,7 @@ CVE-2022-38416,0,0,4c73e953a11225a24c20f9776a984ed42b961ec60234b6e4a0cb1561e867d
|
||||
CVE-2022-38417,0,0,840176ac21c9c444344f0342ce4bc4e880d17c981d0888310d9f150288c84d6b,2022-09-20T15:19:48.157000
|
||||
CVE-2022-38418,0,0,00a17c017bdd87d314e60d0fc7e4c3f09124f453fe2417884ba9ba87f933ac97,2022-10-20T05:43:31.677000
|
||||
CVE-2022-38419,0,0,5d77f6aa3cf64d420eb5281a0bc12c700e77e20f5118a72ec200f5f1b12fe8d0,2022-10-28T21:14:10.887000
|
||||
CVE-2022-3842,0,0,7221468ae704f176204bc6cc11d92b87502254766612140d84194e7f10e672b1,2023-01-09T19:15:21.247000
|
||||
CVE-2022-3842,0,1,7cbdb47dde7d69e968b83b2503f5bf65e4910ebe701998b5c810f3de325814c8,2024-10-22T16:35:03.307000
|
||||
CVE-2022-38420,0,0,e5b829242cd03b9e2375aa26fea21efef5cec261d214c56c088be68999ef45ee,2022-10-20T05:43:52.483000
|
||||
CVE-2022-38421,0,0,60078496dba3efc7b43c73646ee5f2777a706c1b4add7f448c40a16f0de2ea4a,2022-10-20T05:45:56.967000
|
||||
CVE-2022-38422,0,0,89736a3c0b28118a69c809c62461820ed3ead456f40b0d4ad535e58644bdbe7c,2022-10-18T19:33:02.870000
|
||||
@ -213176,7 +213178,7 @@ CVE-2023-0467,0,0,5293db8836d5f1db0e1f5096a27bcb1433113df02b237566a0e27a20f867bb
|
||||
CVE-2023-0468,0,0,fc23fe7b9211a11b623bdbb98704e621a86f8b2f0533ceb11cc727e0c4cd8436,2023-02-01T15:59:27.927000
|
||||
CVE-2023-0469,0,0,6431f6fc7e2739ba25419615ad75c75cd9e98861472093ca20181b196405f1eb,2023-02-01T15:58:49.477000
|
||||
CVE-2023-0470,0,0,4372e365da241629623031d052bfbee0d3928a26394a28ee205196dbe80cd25b,2023-02-02T15:06:12.383000
|
||||
CVE-2023-0471,0,0,60f2b40b3a409315e7e46b9dd1e93710adbb9ede6612853879ddbaa4345228fb,2023-02-06T21:42:57.417000
|
||||
CVE-2023-0471,0,1,fe31042cd7a9895782885b55eee589dbac971a3346d8dd56bff42e357601f821,2024-10-22T16:35:06.327000
|
||||
CVE-2023-0472,0,0,64dd50a5ea2446fcb9d9189b51a3c00d794a4e789c557bb0b545792ee3e7c83c,2024-10-17T18:35:03.323000
|
||||
CVE-2023-0473,0,0,5d1af04a31dd707260ecab2c9353768ceb21646123f7b3879cf47f75e1e91417,2024-10-17T18:35:04.293000
|
||||
CVE-2023-0474,0,0,ece696f628e220dfc0baf179fd456c53afb38a72b986a7e64878b873cda652ab,2024-10-17T19:35:08.023000
|
||||
@ -214966,7 +214968,7 @@ CVE-2023-2056,0,0,54b0ae4fc04ec0efd7229c103683c2930ff5f831061e8f8ceca8837fbf3791
|
||||
CVE-2023-20560,0,0,4456c42604e8d84ae78603bf586789653bea0524ed4db66bcab5e10c02482283,2023-08-23T16:40:28.757000
|
||||
CVE-2023-20561,0,0,adb2c260938b34a6cde8cee152fee169eecac2ba79dc3b9a71cd7b36e9d93e73,2023-11-07T04:06:30.730000
|
||||
CVE-2023-20562,0,0,9eeee6d306bcb80d680502ad0784b113531a741c9dcccd30c407f3009c019e87,2023-08-14T13:34:06.770000
|
||||
CVE-2023-20563,0,1,dd4b2ef80961e24e6e0c52afc98605747bd7c93c54acc4af6034289012a21d6f,2024-10-22T14:35:09.970000
|
||||
CVE-2023-20563,0,0,dd4b2ef80961e24e6e0c52afc98605747bd7c93c54acc4af6034289012a21d6f,2024-10-22T14:35:09.970000
|
||||
CVE-2023-20564,0,0,f0eed53fdd20fbad0905e108323c57455e9bb8366a13da5465965e9996efc536,2023-08-23T16:40:10.780000
|
||||
CVE-2023-20565,0,0,38e6dc11684c0b87d9a62fcc76a2d2c6c5d432536160483f1306ce67c812cd5e,2024-02-13T20:15:52.367000
|
||||
CVE-2023-20566,0,0,3515285bb0a69e8d7ec99825e5edd97b207c54e2b670ad7975fd3e59b6698a90,2024-06-18T19:15:58.623000
|
||||
@ -215188,9 +215190,9 @@ CVE-2023-2080,0,0,e157d4e828722bb0499442360051b052d8336e3a66b9f3d98184689a9dd2e7
|
||||
CVE-2023-20800,0,0,84eb76953561aeedc870a53eb3e5c810f161a8e2002a06a8689cb690bddbdd65,2023-08-09T13:25:26.837000
|
||||
CVE-2023-20801,0,0,3f54217e44d01e396e4e56936d1401bc5570f2f6ab2c31efd20c7ef5f222325f,2023-08-09T15:07:45.820000
|
||||
CVE-2023-20802,0,0,b9dc75b05e578e1b1fdb4b7c06bf0ae88c71275a533562261263d991ebf95f25,2023-08-09T18:07:36.453000
|
||||
CVE-2023-20803,0,0,0d39bcd6be5dabad2e56697a68c7e3070efd2b462171a0fedaa711175489ec24,2023-08-09T17:50:30.643000
|
||||
CVE-2023-20804,0,0,695c81708d8ae757e2a5e603924e196473f450b47752bba9743fd3f220501f7f,2023-08-09T17:53:15.283000
|
||||
CVE-2023-20805,0,0,0441a9b963b7630e6da3ad5f9177fe7390a9c99a0ddd358f8735bc89d884b020,2023-08-09T17:53:38.957000
|
||||
CVE-2023-20803,0,1,812495a0c33694b1008949aaef6370c3b57e0d58b87accd7edcbbc20ee96ee97,2024-10-22T16:35:07.320000
|
||||
CVE-2023-20804,0,1,8bba2d0119db4a30a7fc0cb32c01afb7e3897eb94df51aab93d98f3fc4e9468e,2024-10-22T16:35:08.190000
|
||||
CVE-2023-20805,0,1,35002f2ad8a808fe8601a014ab5af840658aebf9423d776d785e03736f3a6eec,2024-10-22T16:35:08.963000
|
||||
CVE-2023-20806,0,0,e1212d18c0511e7e8cfd4291bfa0ef21149391f80e70fb9ff2e09af2eb5b38b9,2023-08-09T17:37:27.713000
|
||||
CVE-2023-20807,0,0,8fa020bbbe74f0a7562bc7d504b6ca273b75d7a6cfd0136f67da777af0db86d9,2023-08-09T17:27:57.637000
|
||||
CVE-2023-20808,0,0,d3374bef82c5ae7d3411ac49d0b7398ed2ad5002fed4b42ae83978aa59a91864,2023-08-09T17:28:11.923000
|
||||
@ -215199,9 +215201,9 @@ CVE-2023-20810,0,0,9014ffac7457887b984cb3fe9f4c15f8a4e5a4854f58d2ea4ec512300d59c
|
||||
CVE-2023-20811,0,0,b7903ce0824ce66840540ea530849a85a5feb909ed92ce382f939556ece9d056,2023-08-09T17:51:24.253000
|
||||
CVE-2023-20812,0,0,997b0dfa377e83e293eb8d659991d33a06fcae812808f0542463b5c449f0fe56,2023-08-09T17:50:43.650000
|
||||
CVE-2023-20813,0,0,c2ea6a3a70781d7dbccf1526412ecec6c8f2b8be302634f666f379539f3700d6,2023-08-09T17:50:12.463000
|
||||
CVE-2023-20814,0,1,6dcd7add0dff59884de8d97fc80f79cc2b080d1067c869103b251bdb5c0dd602,2024-10-22T15:35:01.240000
|
||||
CVE-2023-20815,0,1,6d692414e91394080b5680d8d86c875846bd3ff0b72992a007a21ff563cf950d,2024-10-22T15:35:03.147000
|
||||
CVE-2023-20816,0,1,1131530cf748ec967a8d5cafdb57ba7a8ec9f43133a3b610c26506688bc02973,2024-10-22T15:35:04.463000
|
||||
CVE-2023-20814,0,0,6dcd7add0dff59884de8d97fc80f79cc2b080d1067c869103b251bdb5c0dd602,2024-10-22T15:35:01.240000
|
||||
CVE-2023-20815,0,0,6d692414e91394080b5680d8d86c875846bd3ff0b72992a007a21ff563cf950d,2024-10-22T15:35:03.147000
|
||||
CVE-2023-20816,0,0,1131530cf748ec967a8d5cafdb57ba7a8ec9f43133a3b610c26506688bc02973,2024-10-22T15:35:04.463000
|
||||
CVE-2023-20817,0,0,58f94f12dbbd27ecff4c9c45f02bb5c66ca030778a1e43a6c1041583e7476d0a,2024-10-16T21:35:01.640000
|
||||
CVE-2023-20818,0,0,45ae32b47377e91ea351a73468b41994cd1d3b4ec51c18c8865d863ed741c606,2023-08-09T17:49:30.607000
|
||||
CVE-2023-20819,0,0,c056b87b2ebed256b5107aaf5ce311d220de95b3b3db7b11c4effe7a4eed0352,2024-09-21T16:35:01.573000
|
||||
@ -220850,8 +220852,8 @@ CVE-2023-27599,0,0,a6d493ce8131b697a60ae09913019e12914de5421c806a4015a87c94c254e
|
||||
CVE-2023-2760,0,0,6c074bf21b2267cd8b569941c67b08360124783f809d3989660a823d47cbf8cc,2023-08-09T11:15:10.280000
|
||||
CVE-2023-27600,0,0,87e67c606dcb11cbbd6ceba8eb248743b1a9a333ff1372c202bb946110f83bab,2023-11-07T04:10:01.763000
|
||||
CVE-2023-27601,0,0,3159e0a53214d6adf345915c747947d8090757989992077eaa4e4c5257b56321,2023-11-07T04:10:01.887000
|
||||
CVE-2023-27602,0,0,a80eb5b45c9f4866e932d81fc2716a823c094986ad855f7d67ed615e5137a95d,2023-04-19T12:15:08.170000
|
||||
CVE-2023-27603,0,0,377363bd944721b07ea3da5dcb27d355b62defd8ba2523bcd4d0bea48c169f2a,2023-04-14T19:45:47.010000
|
||||
CVE-2023-27602,0,1,7f58c60ee3e1d01b2a0a080305043c4d403e5bc65d7e63a6526fb0172f83382f,2024-10-22T16:35:09.767000
|
||||
CVE-2023-27603,0,1,4f0435dc38032ab417293eac3e5fff2c23f0739a53b3285705d573a4f3084368,2024-10-22T16:35:10
|
||||
CVE-2023-27604,0,0,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000
|
||||
CVE-2023-27605,0,0,3c9bd67e7bbc5a970176fa36f2ef3e0bf73a6762632ef035cc42d3a510e378f7,2023-11-10T04:20:00.893000
|
||||
CVE-2023-27606,0,0,df5a64e8dccf8b9593928c54f55b0be768a1ad798eb4d0e828b503915ddf62a6,2023-07-26T01:18:52.087000
|
||||
@ -221852,12 +221854,12 @@ CVE-2023-28702,0,0,322458dc5ce1af990637dfdbb194b4657a53e64709918a6959ad0e26b5d90
|
||||
CVE-2023-28703,0,0,0f0cebf3a82254d0f256f8ee7ad05786e89f280679305fc77b9a10a202724da0,2024-10-14T04:15:03.210000
|
||||
CVE-2023-28704,0,0,0ea96abeac4099eb6f8aeff445b717c3ff853eb5b66e71b0c3097300ad8383c5,2024-10-14T04:15:04.400000
|
||||
CVE-2023-28705,0,0,875ee5eeedcbaf87184e53272462439379c1e8baf901ebbbb714e99fd79f0ba9,2023-06-09T18:14:13.487000
|
||||
CVE-2023-28706,0,0,dc130697d6700e0efa045bdf171c1153dcc9ec2ee4acf2311f07dc982e547c07,2023-04-14T14:23:05.247000
|
||||
CVE-2023-28706,0,1,50e6020734b1331e0a1f6818c44fa8ed0422882143ec83bad7c87bb811eda5e9,2024-10-22T16:35:10.210000
|
||||
CVE-2023-28707,0,0,32d4d4aa6f7aca5e473a1393c06496a21c3a1ef5446c39d4c4403f8b4eeb5898,2023-05-22T14:25:13.693000
|
||||
CVE-2023-28708,0,0,3676b37bd572d293623b1d4d6062d80511a32f4ec94735432036b13d40cac96c,2023-11-07T04:10:49.370000
|
||||
CVE-2023-28709,0,0,4a374603268a75183fc4d8867975e646438b75b17cc4c5fec221f049409c16f9,2024-02-16T18:20:07.610000
|
||||
CVE-2023-2871,0,0,c547a7e85685136989871db883e9d8714fc66f889d110c2bfa95d6061d7e85d5,2024-05-17T02:23:19.727000
|
||||
CVE-2023-28710,0,0,2f4b323b169897caec0db40f0c6a1cf0096b492a8b3486a44a95ac5973ca18ef,2023-05-22T14:27:01.200000
|
||||
CVE-2023-28710,0,1,dcae631d3021e39c45fade16b16079aaa2ed37dd596cab7edaa89a5e7ae291a1,2024-10-22T16:35:10.403000
|
||||
CVE-2023-28711,0,0,9a7e4692df4128407920abfd535c6e1e6ea2e2404eb6b544486446f8035d5a81,2023-11-07T04:10:49.447000
|
||||
CVE-2023-28712,0,0,48cede95267e940bcf25c0c4d4718d225f1a658760a29a9cf30284758c8924a6,2023-11-07T04:10:49.617000
|
||||
CVE-2023-28713,0,0,2fb09d63fae7527d1926c34ea4251376e037b7841aef4deb35a0f81acbe0ed9f,2023-06-08T13:48:05.117000
|
||||
@ -222299,8 +222301,8 @@ CVE-2023-29211,0,0,2f68aae87949c796385b01b5a1828d70058a84385271f8341622722895713
|
||||
CVE-2023-29212,0,0,d1d948d2138c9038dd86dcfdab359a9afdc8b5b5d4ffdcdddb4e37c09c70c30a,2023-04-26T17:12:14.490000
|
||||
CVE-2023-29213,0,0,a25e4927a17f1e3b6df251fc7f8769e82929bf598e6fcab652dcd30076d4cdee,2023-05-01T14:02:43.807000
|
||||
CVE-2023-29214,0,0,aa2db31df8e86921819cb9df437c39aa49cc88918aafea9d75db6fa572adfc11,2023-04-26T17:15:26.733000
|
||||
CVE-2023-29215,0,0,113754a56d453439fcebbf0d0595ee494fc1b07e85a146a8ee877fb1d01314af,2023-04-13T18:16:08.277000
|
||||
CVE-2023-29216,0,0,f5704f274fc731df73cbc78eafa55d0050624eea034d6f99ba0964a551f20424,2023-04-13T18:16:11.797000
|
||||
CVE-2023-29215,0,1,5590d54e81ae1c83de926af549ae4ac3ee0f39fa9770392675cd5db1fda940c1,2024-10-22T16:35:10.597000
|
||||
CVE-2023-29216,0,1,ad17386fe196604182cfbf47617270a55c1cd069baf7ebbbdd2007698983ae9f,2024-10-22T16:35:10.780000
|
||||
CVE-2023-29218,0,0,f0282ad8b79cf1bdf860a3575a9a1f598b5604e413bb0608665168800ec76fcc,2024-08-02T14:15:36.417000
|
||||
CVE-2023-2922,0,0,dc553e71f409f86d2a4e6ca968907fb5462b18e5250b3d03aaf8c3ecb44348a3,2024-05-17T02:23:21.983000
|
||||
CVE-2023-2923,0,0,55b078298b1195eec01fa938b8be7af85cb16ffb5c08d0c140893148b20a51e4,2024-05-17T02:23:22.090000
|
||||
@ -223068,7 +223070,7 @@ CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05
|
||||
CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000
|
||||
CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31
|
||||
CVE-2023-30464,0,0,2219fe2a351a90ed5b4baf0c5b582d478e2ecc8c75596249eb60867c38157102,2024-09-20T12:30:17.483000
|
||||
CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000
|
||||
CVE-2023-30465,0,1,bbb66a417528962547f13dd5a5d32638f3c72abdeaabce4152de7f7162625c60,2024-10-22T16:35:10.960000
|
||||
CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000
|
||||
CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000
|
||||
CVE-2023-30469,0,0,fa32fed5bcf318ec6dc93737679b329fee275c0b22116985f699a53971c9b865,2023-05-30T16:56:04.817000
|
||||
@ -230767,7 +230769,7 @@ CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de
|
||||
CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000
|
||||
CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000
|
||||
CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000
|
||||
CVE-2023-4046,0,0,64889660c90ed96dffb36b392dad990b52f684e74bc2a30c683852e7a3354c73,2024-10-21T19:24:02.230000
|
||||
CVE-2023-4046,0,1,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000
|
||||
CVE-2023-40460,0,0,cb8d4a4b518509c4362ccb8f0afbc3d4ba81059d0c319d00ce1a78f314f5df45,2023-12-08T15:47:41.403000
|
||||
CVE-2023-40461,0,0,2ca71e2d74941f7db08d3ae15972c35f65a7a1c0b913d4173afa994ddac5a43a,2023-12-08T15:47:23.163000
|
||||
CVE-2023-40462,0,0,ffd7cbc54880373ae62e24016d5dd35693f5e2718a1f76f9f7406aa53c66dcee,2024-02-02T03:12:25.617000
|
||||
@ -230776,7 +230778,7 @@ CVE-2023-40464,0,0,8231b0c451d5b4c35d027e1b67bba80c7df83e1e1ad17ab04a2494355e768
|
||||
CVE-2023-40465,0,0,c70021b90b2721ff443a40c1111bf31fef348ab6ba2a7cf6bbcd8bc7822299fa,2023-12-08T15:44:51.933000
|
||||
CVE-2023-40468,0,0,7d84164a8bc2564940a981b796397726ff721c6aa0efdcb2152db15cd7184661,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40469,0,0,0ed69cdce8225d95cfae6682abc1ebaf65719f0b970e047791ac57fa9c47f189,2024-05-03T12:50:12.213000
|
||||
CVE-2023-4047,0,0,53121fc9835c528f43f4e27d812b5d6ec5056bccf0b3eefdb432f2299f21732b,2024-10-21T19:24:02.230000
|
||||
CVE-2023-4047,0,1,f5052efbca7ab9c1a8858a3fd8dd92e74171735df43efce1d062d82505d9c615,2024-10-22T16:35:15.043000
|
||||
CVE-2023-40470,0,0,afada78b6007b2ba33bbf78e11be4d28f3cd22e160c8e61f962a7cebd7f52155,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40471,0,0,becbb43c9e1a564fe69963a88bb1087ad0f2669a388b9f3e94466c56f3f010c0,2024-05-03T12:50:12.213000
|
||||
CVE-2023-40472,0,0,63bad795c4e37646c5a06e5ac3ca24cbaa679ad10a3550f3f51a2397791e5a38,2024-05-03T12:50:12.213000
|
||||
@ -230855,7 +230857,7 @@ CVE-2023-40546,0,0,6ddbdc19841f6cb290ec2b905e60bc26911fc88c11de04bc8a7d662cb4831
|
||||
CVE-2023-40547,0,0,aa8c5d2793a75f3ad9a6a915b845d7aafd35608216f0b3f68592a1e5df2bf1b7,2024-09-16T19:16:05.947000
|
||||
CVE-2023-40548,0,0,dac643ade65c1a191d65ee168a845e302723e7116b47e0d5a4611a62d6447ec0,2024-10-01T14:15:04.700000
|
||||
CVE-2023-40549,0,0,409bbcdd4cb8887d85ad6922d10081d4ffe6d9a4dd03532a76d9c9a92dc5fdfe,2024-09-16T19:16:06.287000
|
||||
CVE-2023-4055,0,1,b9a4e2db898bc031a0ef53e359c900d9555e4306b85b3b351cd9251ac09e8ea9,2024-10-22T15:35:10.980000
|
||||
CVE-2023-4055,0,0,b9a4e2db898bc031a0ef53e359c900d9555e4306b85b3b351cd9251ac09e8ea9,2024-10-22T15:35:10.980000
|
||||
CVE-2023-40550,0,0,7e315e619d697d87543604bbff3ef14f7418177adad4c5f0a7f3c6da81e8e2d8,2024-09-16T19:16:06.450000
|
||||
CVE-2023-40551,0,0,6015c82d4677150430822f1faf7d1f0c96ba6952a50dbabd6ada6225e4354973,2024-09-16T19:16:06.617000
|
||||
CVE-2023-40552,0,0,7fe5ec65193750dbc75f8e72724337bc87d791c5b7214d5dca88292f9d38f754,2023-09-08T21:27:56.877000
|
||||
@ -234067,7 +234069,7 @@ CVE-2023-45227,0,0,7c7fed76f5d6f3f983df94e726ce31f0b6abeb62d3e6e5afe70912aaeb076
|
||||
CVE-2023-45228,0,0,f02fdcfce96931a7d3db28875f2dc518b6b7078552506dc86bdb01d18b405427,2023-11-07T19:55:08.333000
|
||||
CVE-2023-45229,0,0,cfaecc5ce62d696bb446e9b9bba91809f04e1c9f10c9dafb0c3a45094e4067fc,2024-03-07T17:15:10
|
||||
CVE-2023-4523,0,0,fee4617c65a2bd08463915b79320fa3a3d5417de90db274caa3a49dbf29f46ee,2023-09-29T15:39:05.767000
|
||||
CVE-2023-45230,0,0,a73057134b61994748454c25fbd687353eb456bbb28ed90a55327c6e09f91765,2024-03-13T02:15:50.157000
|
||||
CVE-2023-45230,0,1,bbc1e53c454be3b8c6530fef54817baece3c9aa241f0307f93c1b246c2ce29d7,2024-10-22T16:35:13.497000
|
||||
CVE-2023-45231,0,0,c61d6f99e6b778ffd053ed865b56d4aa4b5f162b3b6cc8b456aa5c715886fd2f,2024-03-13T02:15:50.267000
|
||||
CVE-2023-45232,0,0,ba5e4efd7c8898ba0a2188a57de8bee02b9050addc3e17693fe94e84c3cdd92c,2024-03-13T02:15:50.347000
|
||||
CVE-2023-45233,0,0,5568807a60c17e2c0ea160a468109a8a204b479c5ab85e97fd6742059d0f249a,2024-03-13T02:15:50.430000
|
||||
@ -237206,11 +237208,11 @@ CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d
|
||||
CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000
|
||||
CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000
|
||||
CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000
|
||||
CVE-2023-49567,0,0,ff5ffedfcb0ff47ec9991291d86d1977abfb466c3e4224ac1c244bb7fa00587b,2024-10-18T12:52:33.507000
|
||||
CVE-2023-49567,0,1,193003fcd251d5cde9b049285c29ecf9c4d7248fd85a0cdba0232bb4efc2a37b,2024-10-22T16:39:16.370000
|
||||
CVE-2023-49568,0,0,e295bf606e29529c11cbbb43abed02bc4423081c2a4c69be87e7b9161aed1898,2024-01-22T17:57:41.193000
|
||||
CVE-2023-49569,0,0,d61d891c4a84c41eb74d9a85c11d68d30d185ae64e4fcddc4c6e7a3912a15d45,2024-01-22T18:57:03.500000
|
||||
CVE-2023-4957,0,0,78bb0460b3b0f290da79e035e030dce6be4d514bdd0094dcadf90329259b779e,2023-10-16T14:08:22.900000
|
||||
CVE-2023-49570,0,0,fea19fe915958a084bac97051d0a9ebf8bdcfca1a5036a510423c9e45bb2b03a,2024-10-18T12:52:33.507000
|
||||
CVE-2023-49570,0,1,f9c7afa434c2b7ac368bce0c36b013ee7d74936062ec20ef84b72c339b1cff41,2024-10-22T16:26:47.317000
|
||||
CVE-2023-49572,0,0,887de86a687a05ec36d54a2019258a2d8d5e1fc1dbf8ea3bc3a57b5c0467ed12,2024-05-24T18:09:20.027000
|
||||
CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb7a7,2024-05-24T18:09:20.027000
|
||||
CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000
|
||||
@ -239195,7 +239197,7 @@ CVE-2023-52527,0,0,69feac5279ad296f8c62382461ed563ed5c37ec9a4e9995105c7b03fe18dc
|
||||
CVE-2023-52528,0,0,939a0919c11a416fb09ccd94fbb4242c3c2cc2c0f74810e24bf07ad99dd62190,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52529,0,0,6fb710ab675e24c4b60b90f8d390bdf0e7583f3fe7abc5ad6111bd5320ab77c9,2024-03-04T13:58:23.447000
|
||||
CVE-2023-5253,0,0,c4802b58efe25a55292e2d6161746d1a3fe4c3cf13d24e9ae30c1e6051f46d20,2024-09-20T12:15:04.893000
|
||||
CVE-2023-52530,0,1,5dfdd9ed8b100e234def8ab6e010dd78e03325be3a4ad9ebc534334c0163f6c2,2024-10-22T15:15:04.720000
|
||||
CVE-2023-52530,0,0,5dfdd9ed8b100e234def8ab6e010dd78e03325be3a4ad9ebc534334c0163f6c2,2024-10-22T15:15:04.720000
|
||||
CVE-2023-52531,0,0,139c545d33ba10eb3343fe2ebed8bb6f85f222cd821926b67d690a1cf30ff498,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbfcfe,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52533,0,0,87288d9acffdcc3f04e0528abc716d93f9a78d72735b2ac13e2dfefa20c9889c,2024-08-26T18:35:02.780000
|
||||
@ -239838,7 +239840,7 @@ CVE-2023-5512,0,0,8f255f7600c876ac3f257539ecd63ba70ffd31d409fa952e6e1e6acca138ee
|
||||
CVE-2023-5514,0,0,10af8b6b0b626b561055de6189ef81fc4a75e29fab24339af80cb860ca2be855,2023-11-08T19:36:35.017000
|
||||
CVE-2023-5515,0,0,91a527d8a3473e517c634177c09d7c6152b47b2cca5db6d0f913eaea36a318d5,2023-11-08T19:28:26.543000
|
||||
CVE-2023-5516,0,0,ae73e4c23390248a1b340b12bd6e20a04e577dbe67f7bc8cbdc1d9c665aad45e,2023-11-08T19:40:16.980000
|
||||
CVE-2023-5517,0,1,07678d2620e60845134465e7e5fab8c3a80cca0b955caa42a72c363e07e4029c,2024-10-22T14:09:02.430000
|
||||
CVE-2023-5517,0,0,07678d2620e60845134465e7e5fab8c3a80cca0b955caa42a72c363e07e4029c,2024-10-22T14:09:02.430000
|
||||
CVE-2023-5519,0,0,37aee9a1129923dc93077477efa909f5ba6fdcb7802f73bac61f5648f04e8d65,2023-11-08T18:43:21.643000
|
||||
CVE-2023-5520,0,0,844f3dfeec17b0f2ef7eb23244c5ae362e4682ab16bd653f8e0d489e8a8f6789,2023-10-13T15:13:36.757000
|
||||
CVE-2023-5521,0,0,b63acfc129aa3310a98a296c6b047b557f6d4d113cf2debba604fa2d54e6d526,2023-10-13T18:07:46.757000
|
||||
@ -240341,10 +240343,10 @@ CVE-2023-6051,0,0,65166b01dd71515312d91f9d8071d445b248393f92fbfdc73dd7007d9755f5
|
||||
CVE-2023-6052,0,0,aade2b22db5b4363b4735382f3bc2b9b7b67324ff9b0a0e43ebe15be0d76ef4d,2024-05-17T02:33:29.807000
|
||||
CVE-2023-6053,0,0,884dd7c884b65418d1acc2ea8b654cbf552035c51290cebacf8d437558597e99,2024-05-17T02:33:29.920000
|
||||
CVE-2023-6054,0,0,7c33b8bac31ea414624bbc9ce8995053ec355ffc65ef3213af66e1a1cc5d7096,2024-05-17T02:33:30.020000
|
||||
CVE-2023-6055,0,0,503fb1072d5a69bee0e88b6ae09189645d07260e6713968dc7d0b8a2bcedf0e4,2024-10-18T12:52:33.507000
|
||||
CVE-2023-6056,0,0,35d839e4b514b3336d1caecfe0eacb81ca28eb93db0edbbeacdf9c775d9824ca,2024-10-18T12:52:33.507000
|
||||
CVE-2023-6057,0,1,1aba22158a7c27687aeda258fc29ab23338195d15e7a82e758cfc8a4d5d0deed,2024-10-22T16:00:07.397000
|
||||
CVE-2023-6058,0,1,80b121b51cef55262f44ff47427075372eaef5bede566f19f4a29d78d39ee80e,2024-10-22T16:00:05.110000
|
||||
CVE-2023-6055,0,1,6970d6e1cef11b5752b3c4584db2d30f4d434e7f6ccb260e2dbefee021b56d87,2024-10-22T16:39:00.817000
|
||||
CVE-2023-6056,0,1,5d12957ae6e26dc96870feff725dddb10442b06c2d23031fc39cc9503665774e,2024-10-22T16:38:43.993000
|
||||
CVE-2023-6057,0,1,bbbddfe2749236535590b210661fb2a64529bd853ca807d86fb37af1e80984cf,2024-10-22T16:38:29.767000
|
||||
CVE-2023-6058,0,0,80b121b51cef55262f44ff47427075372eaef5bede566f19f4a29d78d39ee80e,2024-10-22T16:00:05.110000
|
||||
CVE-2023-6061,0,0,3668adbae0969cfab0fed96f2f0cd588b0f30acaede83213c351da7fed813869,2023-12-12T22:24:14.313000
|
||||
CVE-2023-6062,0,0,9acfdc2e379d5c765b916ddaf4e9e4b9e3e002ce20adb1082d4167d6fe0776c5,2023-11-29T18:01:56.163000
|
||||
CVE-2023-6063,0,0,6829cec6327e2b0ca6394f26a21b2458a09f31b0b2f6c2afeecc6087b47b68d1,2023-12-08T14:39:22.200000
|
||||
@ -241001,7 +241003,7 @@ CVE-2023-6815,0,0,fc9ec2453f06f961274a47b9ea9b7407d5368b76455379c9e0fea030732b21
|
||||
CVE-2023-6816,0,0,c3a19bc55b4b85fddd22fe1085c1d2a08de0931d91570a7c34012695db8c4bb7,2024-09-16T16:15:11.937000
|
||||
CVE-2023-6817,0,0,cc201b8683c94f706ae74ea5adc28642e020b44ac49d90e4b25ea49578f8bc79,2024-02-08T16:15:47.270000
|
||||
CVE-2023-6821,0,0,1ecc3c576162236f32f9f64a56f7295ad830704c5fedf9bc87d6ba759b1f7e3e,2024-08-30T08:15:04.520000
|
||||
CVE-2023-6824,0,0,317fcb7097041988b3396911807cb287d8657125154b4a375fa0829093889531,2024-01-23T15:35:27.123000
|
||||
CVE-2023-6824,0,1,76df22784ddc4346f4c678b2af0f6a7ab56f1620c7e41a3d47c4be80e64c0eb6,2024-10-22T16:35:16.083000
|
||||
CVE-2023-6825,0,0,5f2a6b8900d2ecb14567d0b430ce60a11b72adf0d920af3176450139cc927b08,2024-03-13T18:16:18.563000
|
||||
CVE-2023-6826,0,0,0b04535adf04b35ffa25089a607bb4494dc5795922b9225750066cd0ade8775d,2023-12-21T04:49:03.117000
|
||||
CVE-2023-6827,0,0,4fbb204335c244872e27df049bcd8cac30f890d15a7027d76fef2150fca5baaf,2023-12-21T04:48:37.823000
|
||||
@ -242333,20 +242335,20 @@ CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02
|
||||
CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000
|
||||
CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
|
||||
CVE-2024-10055,0,0,6d434f327f323d1d4e7933b0f8db3edb29a6b4c6a11d2f352406cae112cfb5b5,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10055,0,1,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000
|
||||
CVE-2024-10057,0,0,d8a525e53057703eafafe41b97e25f6595177cb8b862a21217c338a0239a3d3c,2024-10-21T20:53:22.813000
|
||||
CVE-2024-1006,0,0,fe82f3d0065ffa9f2a59eb5b63e144d9442dc24b73dc23626043d548cf903e88,2024-05-17T02:35:09.467000
|
||||
CVE-2024-10068,0,0,d30a41a047eea99fec87733a3e9cf71e01923d623f7bff84eb08ba80a39dc81d,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10069,0,1,5308eb4b652321f9c21627eaa2c30eba36d3e9bdb3c6dfdf40bec48a4f82c2f3,2024-10-22T14:19:58.970000
|
||||
CVE-2024-10069,0,0,5308eb4b652321f9c21627eaa2c30eba36d3e9bdb3c6dfdf40bec48a4f82c2f3,2024-10-22T14:19:58.970000
|
||||
CVE-2024-1007,0,0,bb97efced7fb486712fbb95488bae5086c8742bff2dc7feb7593b966188b1cd7,2024-05-17T02:35:09.577000
|
||||
CVE-2024-10070,0,1,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000
|
||||
CVE-2024-10071,0,1,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000
|
||||
CVE-2024-10072,0,1,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000
|
||||
CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000
|
||||
CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000
|
||||
CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000
|
||||
CVE-2024-10073,0,0,36e7a75e8440250867ac4ab2920540c9c319ac3650023a2029f396b9acec7ea2,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10078,0,0,0aa7dd836d17776d3cafdf2b21a76b868a43535c39ebfa97d22b166c12681f1e,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10079,0,0,16baef55e86d7a7bb7c75a8d8bda456345b338a1ddd8fc352492983721ca02a2,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10078,0,1,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000
|
||||
CVE-2024-10079,0,1,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000
|
||||
CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000
|
||||
CVE-2024-10080,0,0,7dee1bdb0654db1839e6846f51c6c9699dc09bcdb5e7141706a72d57a008f278,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10080,0,1,e70a3cc8d8ca25d9e3db818c04f9b2eeee833bf342884de7579048a734fce30e,2024-10-22T16:27:38.840000
|
||||
CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e3b,2024-05-17T02:35:09.780000
|
||||
CVE-2024-10093,0,0,655dbc008c9c21b76c775eaa92108777c983716e956bf10f0085a4f9c49fc737,2024-10-18T12:52:33.507000
|
||||
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
|
||||
@ -242367,31 +242369,31 @@ CVE-2024-10128,0,0,88b9e310a7215917b3c3eb4a7cebbad5131b0eb240c8e3b152a59db372aef
|
||||
CVE-2024-10129,0,0,ec801a1f21eba257d935123cd915f870568d53f742fe5aad47c455a4df207feb,2024-10-21T17:10:22.857000
|
||||
CVE-2024-1013,0,0,0ecf415fc1e3c9674ce36da20d6e67872f02747822a72b780ad0899083ff5765,2024-03-18T12:38:25.490000
|
||||
CVE-2024-10130,0,0,f6abde51c0a658ac0c1fc5543e76399ba5cf9030b2bf4a0d9258eaf9b51a8cfc,2024-10-21T17:10:22.857000
|
||||
CVE-2024-10131,0,0,cb9bf9653b1a7751e7f0fa889c2a9d1f6f68f80fbc6fe883721d1af8aab5c345,2024-10-21T17:10:22.857000
|
||||
CVE-2024-10131,0,1,f20c36c39f167240341b3ceff4ad8596e0ac95c8a6ba4794f233acebd21cebe5,2024-10-22T17:15:03.203000
|
||||
CVE-2024-10133,0,0,6ac712da64da44a34e6fd349fcf3c834370a70c72d69b9a548fcaa7d1fe57ffa,2024-10-21T17:10:22.857000
|
||||
CVE-2024-10134,0,0,6267065d9c293b3c2366b6219e1002e933ab90f824c948f3e215158bad3a34cd,2024-10-21T17:10:22.857000
|
||||
CVE-2024-10135,0,0,51210d7ceeda6ad57adce141fb0fe5d97f34f2c51cfc509b6b738e19f13616dc,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10136,0,1,17790ffc426ba3f464e327ab05c0c6d36879047b0c8e0a5cf0c1c4a40c857210,2024-10-22T14:15:48.770000
|
||||
CVE-2024-10137,0,1,bf8dc737c8c1bd8d279f07a2951d8a27fe63f941562664fe26ac2d8ba987f2ed,2024-10-22T14:17:31.527000
|
||||
CVE-2024-10138,0,1,96b8afb0bc9d868623cd6816cbcb5468c3586235a65dd6af646eb37bb10ccc7b,2024-10-22T14:16:51.547000
|
||||
CVE-2024-10139,0,1,11c32ddb1edfb399f29c4753543b82ea66d92ffc686e3d29b4d68af5ac18b5a1,2024-10-22T14:18:12.087000
|
||||
CVE-2024-10136,0,0,17790ffc426ba3f464e327ab05c0c6d36879047b0c8e0a5cf0c1c4a40c857210,2024-10-22T14:15:48.770000
|
||||
CVE-2024-10137,0,0,bf8dc737c8c1bd8d279f07a2951d8a27fe63f941562664fe26ac2d8ba987f2ed,2024-10-22T14:17:31.527000
|
||||
CVE-2024-10138,0,0,96b8afb0bc9d868623cd6816cbcb5468c3586235a65dd6af646eb37bb10ccc7b,2024-10-22T14:16:51.547000
|
||||
CVE-2024-10139,0,0,11c32ddb1edfb399f29c4753543b82ea66d92ffc686e3d29b4d68af5ac18b5a1,2024-10-22T14:18:12.087000
|
||||
CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f3d,2024-02-02T02:05:39.277000
|
||||
CVE-2024-10140,0,1,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000
|
||||
CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000
|
||||
CVE-2024-10141,0,0,17ce1823f9e1032ce4106436ffa20ca67724ebc3ab8b7874ba66330fada06176,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10142,0,0,20f3ea99900130160c805394b66019c49272761905b5ea7376caa328a388d2ce,2024-10-21T17:09:45.417000
|
||||
CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000
|
||||
CVE-2024-10153,0,1,d622b7ea723b18e6ddfc603f2d4acbb1cff3ff02ebe01257835c2e3461165bac,2024-10-22T14:45:04.670000
|
||||
CVE-2024-10154,0,1,616a267b44cd60e0ee1735747cba3df9611277c523e780e0ba795002232a909b,2024-10-22T14:44:47.807000
|
||||
CVE-2024-10155,0,1,d9565565ebd915b9f68cad2dcd8279d89c17488c917f6907534ebb29d04e2fbe,2024-10-22T14:43:42.607000
|
||||
CVE-2024-10156,0,1,e7f7dbdd558e322e118e7fbce1ba5a75a62d9fa9230b1cef9eb640b274347653,2024-10-22T14:43:00.543000
|
||||
CVE-2024-10157,0,1,41d9478b3d49e83e6a480f35d8b281656c1266c3ead7379556d3206c6aee4532,2024-10-22T14:42:50.303000
|
||||
CVE-2024-10158,0,1,4420764b4d9615ea34b62e6a53bef5880d7c140640aa851325cc7eb63df30b43,2024-10-22T14:42:26.727000
|
||||
CVE-2024-10159,0,1,915dc857f17f9d43c3b78ff8b89ebd3822f1a0e5595f8c164f6b910ba78894d6,2024-10-22T14:41:34.370000
|
||||
CVE-2024-10153,0,0,d622b7ea723b18e6ddfc603f2d4acbb1cff3ff02ebe01257835c2e3461165bac,2024-10-22T14:45:04.670000
|
||||
CVE-2024-10154,0,0,616a267b44cd60e0ee1735747cba3df9611277c523e780e0ba795002232a909b,2024-10-22T14:44:47.807000
|
||||
CVE-2024-10155,0,0,d9565565ebd915b9f68cad2dcd8279d89c17488c917f6907534ebb29d04e2fbe,2024-10-22T14:43:42.607000
|
||||
CVE-2024-10156,0,0,e7f7dbdd558e322e118e7fbce1ba5a75a62d9fa9230b1cef9eb640b274347653,2024-10-22T14:43:00.543000
|
||||
CVE-2024-10157,0,0,41d9478b3d49e83e6a480f35d8b281656c1266c3ead7379556d3206c6aee4532,2024-10-22T14:42:50.303000
|
||||
CVE-2024-10158,0,0,4420764b4d9615ea34b62e6a53bef5880d7c140640aa851325cc7eb63df30b43,2024-10-22T14:42:26.727000
|
||||
CVE-2024-10159,0,0,915dc857f17f9d43c3b78ff8b89ebd3822f1a0e5595f8c164f6b910ba78894d6,2024-10-22T14:41:34.370000
|
||||
CVE-2024-1016,0,0,71cf76ab1a6b276906d8ecf764cf0be1d15a9c7c60543569d9e172588701616f,2024-05-17T02:35:10.520000
|
||||
CVE-2024-10160,0,1,4bd6666e6debc93b42554314b916c7e4a6c32f93acbe48afa502cc48d2414808,2024-10-22T14:40:46.790000
|
||||
CVE-2024-10160,0,0,4bd6666e6debc93b42554314b916c7e4a6c32f93acbe48afa502cc48d2414808,2024-10-22T14:40:46.790000
|
||||
CVE-2024-10161,0,0,84bc31c1f8b9c1424a33f38beb007afd12cef556097f836456e7db6854141f50,2024-10-21T21:35:33.377000
|
||||
CVE-2024-10162,0,0,9586e193571470cd409c779979783fe30cf8798f29cade742d2c6e6b9b66240c,2024-10-21T21:36:10.470000
|
||||
CVE-2024-10163,0,1,26289a38ca28d6fbf3697cebc7b8e78d717fbaa250d69c3062759b06a1925c3b,2024-10-22T14:28:06.173000
|
||||
CVE-2024-10163,0,0,26289a38ca28d6fbf3697cebc7b8e78d717fbaa250d69c3062759b06a1925c3b,2024-10-22T14:28:06.173000
|
||||
CVE-2024-10165,0,0,5e96b8bac045d76007a8a1ccaf66b23094bbe577806718f5c39b95850bfcb648,2024-10-21T21:35:06.987000
|
||||
CVE-2024-10166,0,0,d38e0eaedffd343f532bd4c1abf13dec4f7eece79809104c00c35d23c5bd77f6,2024-10-21T21:34:52.430000
|
||||
CVE-2024-10167,0,0,e7ee4350c0d87b98f4009c350ce488d1222a8473f5eed0163be4fcf02375526f,2024-10-21T21:34:25.810000
|
||||
@ -242399,19 +242401,19 @@ CVE-2024-10169,0,0,e8e6c9fb9383945c3d410fc4f008280f899970c875613eff84d409b4d2eaf
|
||||
CVE-2024-1017,0,0,50b68641acb97d381e6a65107328f0dab0fccf027bea27ef0f379cc058119760,2024-05-17T02:35:10.627000
|
||||
CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289e84,2024-10-21T21:33:49.663000
|
||||
CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000
|
||||
CVE-2024-10173,0,0,f6c48dfe45f526ea19e91b20ef708b171d9e0a76591dad105e56c584bb12efdc,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10173,0,1,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000
|
||||
CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000
|
||||
CVE-2024-10189,0,0,ffc755e96982501f804ab166cd12d0605832a17249527107c82c3cd65a58ebf1,2024-10-22T10:15:03.610000
|
||||
CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000
|
||||
CVE-2024-10191,0,1,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000
|
||||
CVE-2024-10192,0,1,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000
|
||||
CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000
|
||||
CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000
|
||||
CVE-2024-10193,0,0,1edc42ac3209c75585ec8c6b26eafba6b0b9f2d61f9e6b3760f20c0ded29aa99,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10194,0,0,2306506683b8321312c529c12d5538fdae946fec3d958eb6a86af3539ec3be4d,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10195,0,0,433002dc4be76148bf0f1e8e85e5de7bd9f18de30e21fefcd1f30061067a4930,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10196,0,0,0b052761dda527c9d578bdd237c16d6bdaa0a843794729a716c520574b82f796,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10197,0,0,6fe37138acc52d09938e9bcb1e310dbdb2ac9977a35ddc0fec14852ea89360e5,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10198,0,1,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000
|
||||
CVE-2024-10199,0,1,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000
|
||||
CVE-2024-10198,0,0,58468dbe56a875fce487b2c24efa66d706cd94ef799a0ad9490149b003e5442b,2024-10-22T15:39:37.217000
|
||||
CVE-2024-10199,0,0,18eedf0aaa14f9eae78c4d887bc668d26c7f01ea3ac2e8913ea363a18a98b2b0,2024-10-22T15:40:56.637000
|
||||
CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000
|
||||
CVE-2024-10200,0,0,490aa25fdf12ccb46c8a818662c15261aecf127ca00516740d200e5fc0c849a5,2024-10-21T17:09:45.417000
|
||||
CVE-2024-10201,0,0,fdd706f65f7aa0e194f575c5a7304653f1f8e37bb0097e52a009edadbfcb9ca7,2024-10-21T17:09:45.417000
|
||||
@ -242419,7 +242421,7 @@ CVE-2024-10202,0,0,3a01bc3efcbe4e17c6fdc2e9102f4cbe8dd4afeaccd594b0d2eceea29302f
|
||||
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
|
||||
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
|
||||
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
|
||||
CVE-2024-10234,1,1,d8689a914e8d9ea543ec1d317c32c7c59c868d4764bd7aca5d600362d697f0db,2024-10-22T14:15:14.573000
|
||||
CVE-2024-10234,0,0,d8689a914e8d9ea543ec1d317c32c7c59c868d4764bd7aca5d600362d697f0db,2024-10-22T14:15:14.573000
|
||||
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
|
||||
CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000
|
||||
CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000
|
||||
@ -243488,8 +243490,8 @@ CVE-2024-20281,0,0,70f852907bc1bd5fcb581ca3147fb954d228d92f21dde79d0c952efed558f
|
||||
CVE-2024-20282,0,0,f6e711a9a9efd85ad7bd0b3c7c022b317810618a7b30ebfdd488c3c43efc8cbb,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20283,0,0,89838f66dfd213c04e8273f1b3b892c92b85a1c5cc369285f3f9a454f716823b,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20284,0,0,9b3b99721324d4818410a9544df663e05957416b29cfc7a893b6407ac8b10f3b,2024-10-17T15:03:07.253000
|
||||
CVE-2024-20285,0,1,f3155d3c8a00277d376702ed52a6bc6aca121da6e27a6fa17f8e7224f2a87919,2024-10-22T14:37:01.363000
|
||||
CVE-2024-20286,0,1,bdf0757c01bcb457b976c7541d58d87497b7ceecaac7964112fd5b04260633e6,2024-10-22T14:44:16.063000
|
||||
CVE-2024-20285,0,0,f3155d3c8a00277d376702ed52a6bc6aca121da6e27a6fa17f8e7224f2a87919,2024-10-22T14:37:01.363000
|
||||
CVE-2024-20286,0,0,bdf0757c01bcb457b976c7541d58d87497b7ceecaac7964112fd5b04260633e6,2024-10-22T14:44:16.063000
|
||||
CVE-2024-20287,0,0,a744ff6c1bd94e5b436bea194b1f93eaa24b8e47ada607591c8d284066172138,2024-02-02T16:15:54.887000
|
||||
CVE-2024-20289,0,0,67b207e27b4f7addc83d99ce2a16d9a68d81f19bcf8b318a5e667a8a27d96ef2,2024-08-29T13:25:27.537000
|
||||
CVE-2024-2029,0,0,a382b56e2d9764efda4b6d7c3b8e20dd18832e26c02b52a8a572702baca53793,2024-04-10T19:49:51.183000
|
||||
@ -243598,8 +243600,8 @@ CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750
|
||||
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
|
||||
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
|
||||
CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f74,2024-03-17T22:38:29.433000
|
||||
CVE-2024-20420,0,1,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000
|
||||
CVE-2024-20421,0,0,aebc346e8d223b2a92de579f5e301f997bbd63d2963e092f52511786b8a1dbc2,2024-10-18T12:53:04.627000
|
||||
CVE-2024-20420,0,0,1b6307b08ac5336375cc3664c71d09f27461a9a614efe41992a97e5a892448ec,2024-10-22T15:12:47.983000
|
||||
CVE-2024-20421,0,1,b8d90bf4638dbe0c37023b3ff1bd11c5ac7ded44281786691979af6c9dbb0983,2024-10-22T17:51:08.113000
|
||||
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
|
||||
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
|
||||
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
|
||||
@ -247876,9 +247878,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c
|
||||
CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000
|
||||
CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000
|
||||
CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26271,1,1,24083e398b43cc7550a39a9a20e629649df704da96b50eed5b54764533cdffb2,2024-10-22T15:15:05.523000
|
||||
CVE-2024-26272,1,1,c1800722847a57902614b956d55e36f898d5c7885aaf7183308a4058cb973641,2024-10-22T15:15:05.740000
|
||||
CVE-2024-26273,1,1,bc1bde3b4567b7a81ccdd3b768fac87158cd8e39fba32ce35cfb2d7facaa2765,2024-10-22T15:15:05.937000
|
||||
CVE-2024-26271,0,0,24083e398b43cc7550a39a9a20e629649df704da96b50eed5b54764533cdffb2,2024-10-22T15:15:05.523000
|
||||
CVE-2024-26272,0,0,c1800722847a57902614b956d55e36f898d5c7885aaf7183308a4058cb973641,2024-10-22T15:15:05.740000
|
||||
CVE-2024-26273,0,0,bc1bde3b4567b7a81ccdd3b768fac87158cd8e39fba32ce35cfb2d7facaa2765,2024-10-22T15:15:05.937000
|
||||
CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000
|
||||
CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000
|
||||
CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000
|
||||
@ -248155,7 +248157,7 @@ CVE-2024-26714,0,0,faa331038fc0a5fbf6f72afaa0a7a8bc95357cfb4083cadd79fcc35354838
|
||||
CVE-2024-26715,0,0,d743b3d21d5816879e3fd96c31c716696399c03e5a1820cc912de3208fbdf6bb,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26716,0,0,8caf2f33da96957d0a51361dc6c5b07c63980f425a5f489233e62c63611c86e1,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26717,0,0,9387e326266c2102c4397017c366213925cfb5b5dbbd15b59d1dedfc41a59a9f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26718,0,1,c1fb45de7431b250ab2c14c243fdd27efba040a79388a9c5b41104be96d26eb8,2024-10-22T15:15:06.130000
|
||||
CVE-2024-26718,0,0,c1fb45de7431b250ab2c14c243fdd27efba040a79388a9c5b41104be96d26eb8,2024-10-22T15:15:06.130000
|
||||
CVE-2024-26719,0,0,bf095c5ec40e5021963ef58a4045186e372261f83c48e13510021b065ebea2f2,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2672,0,0,c8d64f7b93993488ba5215c3b2eb1c5f7ca0e18711968330934c30769d9d1de3,2024-06-05T20:15:12.810000
|
||||
CVE-2024-26720,0,0,0796d3f03354db4b881b215435b033867db943942fb95ad422104cdb227db34a,2024-07-18T12:15:02.847000
|
||||
@ -250714,7 +250716,7 @@ CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3
|
||||
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
|
||||
CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000
|
||||
CVE-2024-30157,0,0,b4413e2e5263fd764d22ffa6255e560222ce447dceec65fcb4225e2b11135a83,2024-10-21T21:15:04.620000
|
||||
CVE-2024-30158,0,1,7aa2072367c304ef15068853d42c7cfc42d686d1c6236aed0361c418da255cee,2024-10-22T14:35:11.397000
|
||||
CVE-2024-30158,0,0,7aa2072367c304ef15068853d42c7cfc42d686d1c6236aed0361c418da255cee,2024-10-22T14:35:11.397000
|
||||
CVE-2024-30159,0,0,b905413140e33de6a3d93be87dd7cad7a2e92a94fa8fca3348535d1caf49c569,2024-10-21T21:15:05.073000
|
||||
CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000
|
||||
CVE-2024-30160,0,0,47aa9aaeaf0d9d3169383db35f7389cfd4e3ae26d2060339142e175448806635,2024-10-21T21:15:05.190000
|
||||
@ -251368,7 +251370,7 @@ CVE-2024-31010,0,0,50d72a628a998ce24996b17a1abb2ea140f353a3cac2e0be5c534b2a597a6
|
||||
CVE-2024-31011,0,0,0c33284f804930c14c50cb008bf7c23c7b47af354b75abc23cf3e146495b5db3,2024-08-20T15:35:06.517000
|
||||
CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c08f,2024-07-03T01:54:33.790000
|
||||
CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000
|
||||
CVE-2024-3102,0,1,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000
|
||||
CVE-2024-3102,0,0,9ab659046e55d9ecd56e44281bca18746bc15afba53539e701a3b46145b5c936,2024-10-22T14:26:30.447000
|
||||
CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000
|
||||
CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000
|
||||
CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000
|
||||
@ -254424,9 +254426,9 @@ CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7d
|
||||
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
|
||||
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35285,0,1,03b080751de6ba1e65ad3cd896c5321e5c4a73a43e7091a7187257683278015d,2024-10-22T14:35:12.820000
|
||||
CVE-2024-35286,0,1,35410cd3d18af675e9066896bb72f344aeed35a82c0887bbcc42ece7bdbf8fbc,2024-10-22T14:35:13.583000
|
||||
CVE-2024-35287,0,1,38643b7462a0d947033f7b2ca609231321a2a14371b7b37b5f4c9c752052cce9,2024-10-22T14:35:14.367000
|
||||
CVE-2024-35285,0,0,03b080751de6ba1e65ad3cd896c5321e5c4a73a43e7091a7187257683278015d,2024-10-22T14:35:12.820000
|
||||
CVE-2024-35286,0,0,35410cd3d18af675e9066896bb72f344aeed35a82c0887bbcc42ece7bdbf8fbc,2024-10-22T14:35:13.583000
|
||||
CVE-2024-35287,0,0,38643b7462a0d947033f7b2ca609231321a2a14371b7b37b5f4c9c752052cce9,2024-10-22T14:35:14.367000
|
||||
CVE-2024-35288,0,0,5a7e419c5723f5855a10246582e4e92910b876efa85bd2048c10c45e071584c8,2024-10-10T12:51:56.987000
|
||||
CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000
|
||||
CVE-2024-35291,0,0,5225c2a0abe81b64c53a235e59e3157e49cd9481d5912145de7f4fa19255770a,2024-05-28T12:39:28.377000
|
||||
@ -254451,7 +254453,7 @@ CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb0711
|
||||
CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b3e3,2024-05-20T13:00:34.807000
|
||||
CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000
|
||||
CVE-2024-35314,0,1,8b00fc627c3e1c6ff34cbb4708c278713efd499b74ad54064c188a8a66c45f52,2024-10-22T14:35:15.233000
|
||||
CVE-2024-35314,0,0,8b00fc627c3e1c6ff34cbb4708c278713efd499b74ad54064c188a8a66c45f52,2024-10-22T14:35:15.233000
|
||||
CVE-2024-35315,0,0,84efd35bd289a945021a9c7dd1849ff64be9b144534b4418f264cb0672980105,2024-10-21T21:15:05.613000
|
||||
CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000
|
||||
CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000
|
||||
@ -256336,7 +256338,7 @@ CVE-2024-37997,0,0,10214765491aa29b8c34faf22f5e8238fda623005890c9342516743753b6c
|
||||
CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000
|
||||
CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000
|
||||
CVE-2024-38002,1,1,4428864e3adf5d2b2e1699accfaeac253b1059be29e13e1cad19ffb714fdfcb2,2024-10-22T15:15:06.277000
|
||||
CVE-2024-38002,0,0,4428864e3adf5d2b2e1699accfaeac253b1059be29e13e1cad19ffb714fdfcb2,2024-10-22T15:15:06.277000
|
||||
CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000
|
||||
CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000
|
||||
CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000
|
||||
@ -257045,7 +257047,7 @@ CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269
|
||||
CVE-2024-38817,0,0,09723b24db0d6a084c268e07b58c10ca202cbe9290f0f8fec2db45f626cd7af3,2024-10-10T12:51:56.987000
|
||||
CVE-2024-38818,0,0,622849f8ff4dfc75febef96b69e498222845497635b94ea6c1bb47520700e61d,2024-10-10T12:51:56.987000
|
||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||
CVE-2024-38820,0,1,a5b616e0d9bc58c5d9f58ca8cd3d5a01be45dc2cf2e2573532c8a51afcf4ca4c,2024-10-22T15:42:22.633000
|
||||
CVE-2024-38820,0,0,a5b616e0d9bc58c5d9f58ca8cd3d5a01be45dc2cf2e2573532c8a51afcf4ca4c,2024-10-22T15:42:22.633000
|
||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
|
||||
@ -257422,7 +257424,7 @@ CVE-2024-39493,0,0,1e9db7e81ec34cee90fac11925a12057887fa787e4909a68e8233bca0ebf8
|
||||
CVE-2024-39494,0,0,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210e13,2024-07-24T19:17:25.057000
|
||||
CVE-2024-39495,0,0,882ab91a71cdaa0b14beca48f2b2546ecf350f5bc761609487e97f811c1f052c,2024-08-20T15:35:19.527000
|
||||
CVE-2024-39496,0,0,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000
|
||||
CVE-2024-39497,0,1,d605ece57edd8c1924d68da30a47dcb5e1db73bc0b73e7007642bc3b1bb2dae6,2024-10-22T15:15:06.630000
|
||||
CVE-2024-39497,0,0,d605ece57edd8c1924d68da30a47dcb5e1db73bc0b73e7007642bc3b1bb2dae6,2024-10-22T15:15:06.630000
|
||||
CVE-2024-39498,0,0,14a6d793247b2ee05821018f575bc21320caee8b173fc03ad4272ca85bad135d,2024-09-09T17:47:58.640000
|
||||
CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39500,0,0,32e48803900f332ecd0b386dfab340711259f55424109f63b42ef311f1aa9d94,2024-07-12T16:34:58.687000
|
||||
@ -257807,16 +257809,16 @@ CVE-2024-40060,0,0,8684e047d9ba2e6cc4bcc7c4afd5cb58b4b20c732a4bb0dd43020155d17e1
|
||||
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
|
||||
CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
|
||||
CVE-2024-40083,0,0,11e680e8bf1517e2634a64aa49a46d6caf49581be97998a9d9f77cf3267fbcc9,2024-10-21T21:15:05.703000
|
||||
CVE-2024-40084,0,0,534d11aef460ce9b34eb113477df41417197fd033d77d213100aad9c356df749,2024-10-21T21:15:05.770000
|
||||
CVE-2024-40085,0,0,5e26333c4ab2860e64b8bbaca881d20b70f9d1931f87426da705490dd3f5755b,2024-10-21T21:15:05.853000
|
||||
CVE-2024-40086,0,0,c921105c5ce57300119e18e8e6cfd8c24b8606d1f2e73bc08ab08f658ee80221,2024-10-21T21:15:05.923000
|
||||
CVE-2024-40087,0,0,6ee4107522c5969a2a517f5043d2f6b349c6a2286a5705254f08c3d25d87672b,2024-10-21T21:15:06.003000
|
||||
CVE-2024-40088,0,1,f7759b011e80db767fd1dbd212bf4323a92520bb9be3957ba923eab16655ce61,2024-10-22T14:35:16.010000
|
||||
CVE-2024-40089,0,0,fe50fd0a5e7736656c8bd604a9e5fad05ea85bca29858fe641bda85bc04f9a4a,2024-10-21T21:15:06.150000
|
||||
CVE-2024-40083,0,1,6214757a38a28413207a0d4d3bf59a87ad21f64a445a6477f90c9814d96e64d5,2024-10-22T17:35:03.297000
|
||||
CVE-2024-40084,0,1,e5a48869dc57daf978e93f4d404b40d8cd7575a004e2e23910e1636b2fbf4ba2,2024-10-22T17:35:04.057000
|
||||
CVE-2024-40085,0,1,7cc1b970ba005bdf1c26ff25b3a180cbc5e09f7dbecaeac58ab4095d9a54f531,2024-10-22T17:35:04.843000
|
||||
CVE-2024-40086,0,1,d477aa9a9d381f98d54e41fcc40bef402826f6575f7a4d21e22aed5f418bbdb5,2024-10-22T17:35:05.600000
|
||||
CVE-2024-40087,0,1,be7927f3488a0d370038975baafb448110d1c8fb340e9ed7e5d0faed3d81a193,2024-10-22T17:35:06.420000
|
||||
CVE-2024-40088,0,0,f7759b011e80db767fd1dbd212bf4323a92520bb9be3957ba923eab16655ce61,2024-10-22T14:35:16.010000
|
||||
CVE-2024-40089,0,1,ed4eb5a53b2cd859e53f91fb6a09f58a08f10b728994f90f9ffa170b92bfb777,2024-10-22T17:35:07.167000
|
||||
CVE-2024-4009,0,0,26a6ec4a10b164e2f280e8681d4c21dd6301b3a45dfa2578f28e720f7416c2f5,2024-06-18T17:01:19.897000
|
||||
CVE-2024-40090,0,0,71c1d9398c5476b3448760d412c55985d17dac30c14dfff9be3cec0e88b95dcf,2024-10-21T21:15:06.223000
|
||||
CVE-2024-40091,0,0,77588eb2eb6db1704cc9e7edc29d724d334c5e0f77077e1081bebdfa0e3119b6,2024-10-21T21:15:06.313000
|
||||
CVE-2024-40090,0,1,1d8565eba1bbb89f12f02c55fd6cc2d4a5a146a6b0b6272e27409baab823c846,2024-10-22T17:35:07.957000
|
||||
CVE-2024-40091,0,1,d7ceb5c1a6a6f5dd1f114159610592371d05efa53ae448a2bdee1e5d98966d98,2024-10-22T17:35:08.760000
|
||||
CVE-2024-40094,0,0,5d1ab4fa5a1484beb0714ef3fcebe3147b446e4d722942df6d84c0a1bd2dd7f2,2024-07-30T13:32:45.943000
|
||||
CVE-2024-40096,0,0,7067973a4296a7a70beea7b209cd71d2a86d44a9bdfd60035b86d8848d99631b,2024-08-30T16:14:41.957000
|
||||
CVE-2024-4010,0,0,6f96a951ba4d658f2d216c10726beef3ec3f9c518875bc1c492ed89999ff3fc2,2024-05-15T16:40:19.330000
|
||||
@ -258235,7 +258237,7 @@ CVE-2024-4095,0,0,e2a40f44bdf8e372a41806afdce4161562b7b4bb2bcba8f3987036690d2e81
|
||||
CVE-2024-40950,0,0,b6979d5e6c063eb00970b540ceafda0becb430ff51009e9e1c48a7255ff5f822,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40951,0,0,15aa8df4b78f7514f02ec97aa813adcc5685b7b49e8bf3041732ce8e88b84a54,2024-08-06T13:29:07.827000
|
||||
CVE-2024-40952,0,0,0e259c5b64d27b28a64029bae66b9c49f91a589d68389fee91a3e779c87dcc5c,2024-08-21T16:50:34.377000
|
||||
CVE-2024-40953,0,1,e65ed296f4076fd3edc9aaa9905f7ecd5e00c5e8a9ee2fde440fe5cbe0a29245,2024-10-22T15:15:06.720000
|
||||
CVE-2024-40953,0,0,e65ed296f4076fd3edc9aaa9905f7ecd5e00c5e8a9ee2fde440fe5cbe0a29245,2024-10-22T15:15:06.720000
|
||||
CVE-2024-40954,0,0,78f0e309af3fbd1c7a3f44fe20c2a180906cb9fb2c93280aadfa346fd4829390,2024-08-28T19:43:58.273000
|
||||
CVE-2024-40955,0,0,944ef62a2af0db3b5c2b157398d008c072a9239350e5ae4417455b3911010b14,2024-08-28T19:45:37.080000
|
||||
CVE-2024-40956,0,0,b38583adc04d97ec9d688f8f059ebfc65c5239ed7aba58f834e95c4bc80bb3b7,2024-08-28T18:58:48.433000
|
||||
@ -258709,8 +258711,8 @@ CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107
|
||||
CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000
|
||||
CVE-2024-41711,0,0,a7d50100784e2b53720ec9203abd546adbf9c7f45f11894e83b991465b2f1919,2024-08-14T16:35:15.033000
|
||||
CVE-2024-41712,0,0,fda1df8096c7e740d7c1e5b76ebc20ad4db1e4b92172ce54a6c2dabadb93a134,2024-10-21T21:15:06.387000
|
||||
CVE-2024-41713,0,1,db1b71817a5ce0b697df043f8e1585f7943defebfef472347a986524d193ee8f,2024-10-22T14:35:16.817000
|
||||
CVE-2024-41714,0,1,b7e979e6a2ada11f31a276f8770fe1bb150c75726a0f17380180742b9a2f6160,2024-10-22T14:35:17.650000
|
||||
CVE-2024-41713,0,0,db1b71817a5ce0b697df043f8e1585f7943defebfef472347a986524d193ee8f,2024-10-22T14:35:16.817000
|
||||
CVE-2024-41714,0,0,b7e979e6a2ada11f31a276f8770fe1bb150c75726a0f17380180742b9a2f6160,2024-10-22T14:35:17.650000
|
||||
CVE-2024-41715,0,0,35d1e19982d6029b0a8b7671c2382ff20d85aa479fa52b1ecc90bc4ca8088cf0,2024-10-17T17:15:11.530000
|
||||
CVE-2024-41716,0,0,add00a3b8bb5c856cb11efe54462b72e0907045ad71076c98ae404e938cc3293,2024-09-13T19:53:47.723000
|
||||
CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79a72,2024-09-03T11:15:15.050000
|
||||
@ -259668,8 +259670,8 @@ CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9
|
||||
CVE-2024-43167,0,0,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980273,2024-10-21T12:15:03.837000
|
||||
CVE-2024-43168,0,0,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000
|
||||
CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43173,1,1,5c8f90b9861a166e104ffcc99d3b578724b942af6f62a199be390ecf1a3fb743,2024-10-22T15:15:06.800000
|
||||
CVE-2024-43177,1,1,8b0b35d5d6991691783cdf8a0eab90dfd9795fad78b616442a1d6b5530beee1e,2024-10-22T15:15:07.020000
|
||||
CVE-2024-43173,0,0,5c8f90b9861a166e104ffcc99d3b578724b942af6f62a199be390ecf1a3fb743,2024-10-22T15:15:06.800000
|
||||
CVE-2024-43177,0,0,8b0b35d5d6991691783cdf8a0eab90dfd9795fad78b616442a1d6b5530beee1e,2024-10-22T15:15:07.020000
|
||||
CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000
|
||||
CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000
|
||||
CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000
|
||||
@ -259755,7 +259757,7 @@ CVE-2024-43294,0,0,115da993f44036adfff3784c8efce939e5d53bb4f7ab07ebab66e86a98521
|
||||
CVE-2024-43295,0,0,4c992084e199b514575e8ec2d873a4ef1cccca3f4f5df0b2e67e418aab98a634,2024-09-12T21:20:43.847000
|
||||
CVE-2024-43299,0,0,519d081700ab3294f398a4287727657f1b1d3ae45286cab56afe1bc9702f1fca,2024-09-12T21:23:30.647000
|
||||
CVE-2024-4330,0,0,fc15b5e6e8f2f0c0d6f88562ddea62a293dcb49ee86f17536355ec11fc8680c3,2024-05-30T18:19:11.743000
|
||||
CVE-2024-43300,0,1,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000
|
||||
CVE-2024-43300,0,0,0e255468708543d303383e85dfb9e37cc538bb4005cde3896a7b317de3630d96,2024-10-22T15:35:24.050000
|
||||
CVE-2024-43301,0,0,36517c64264e25162f6a8960592c6f8ac4f28ee2609d1e9f07cf9e006ea49e2a,2024-09-12T21:24:20.563000
|
||||
CVE-2024-43303,0,0,11d9501682f62a268ea8fd6f03971205e43f433af8e58b9f115735076a0f4308,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43304,0,0,0198c9c448bd60be5feef590d21005c81d3809f24efdc4b5ed5165051bdc5338,2024-08-19T12:59:59.177000
|
||||
@ -260015,7 +260017,7 @@ CVE-2024-43608,0,0,d778a741c452756f08141283b44511b35f848f925ff9e901d81fdc04d7ed6
|
||||
CVE-2024-43609,0,0,b51bc951febae72cfbab824fd5dae1956187d25f6e42e962d7d237590a3266d0,2024-10-17T21:18:58.113000
|
||||
CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88ea,2024-05-21T12:37:59.687000
|
||||
CVE-2024-43610,0,0,e05bc7d7fba9921ddb28639aa2d807e02a712368195686314d74c31cc0c1b1bd,2024-10-10T12:51:56.987000
|
||||
CVE-2024-43611,0,0,e71bb37110cf57f4ebc98f5c779227b1c5e9d69f96a05916c17f38187ef51de9,2024-10-10T12:56:30.817000
|
||||
CVE-2024-43611,0,1,4cc7faddbc4a0042c9b0d18e623cdb2e65033905714d4e2435ea5507fb9866e2,2024-10-22T16:01:19.373000
|
||||
CVE-2024-43612,0,0,2d63857a7410863939630233bd3c57b8a869ef6d82a1dc4e625bbf528ee43c0a,2024-10-21T20:48:02.050000
|
||||
CVE-2024-43614,0,0,37f86979c4c4ec96d0dd61c1d9daa59ec511d8fd5452834efe232d695cc74469,2024-10-21T20:50:38.370000
|
||||
CVE-2024-43615,0,0,841e5833e1934c639d3a9a11a43505704ba14c449fb8c86b43a2c5341378c86b,2024-10-21T21:00:34.967000
|
||||
@ -260130,7 +260132,7 @@ CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd
|
||||
CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000
|
||||
CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43845,0,1,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000
|
||||
CVE-2024-43845,0,0,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000
|
||||
CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216525,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43848,0,0,f1a2b4dd4e81d797bfb09af1eb3c38201e05560605d293e2d1b82a973cb40d73,2024-08-19T12:59:59.177000
|
||||
@ -261076,6 +261078,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
|
||||
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
|
||||
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
|
||||
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
|
||||
CVE-2024-45518,1,1,85e0e8d0490ef458e34c3cb4cab880d0e6443a5b3376eb82b1a1170ed808b4e1,2024-10-22T17:15:03.837000
|
||||
CVE-2024-45519,0,0,1314fc46f1c0fd544c41bcc772f8e9adc71c225c5b1014a689dc2f992c782655,2024-10-15T14:32:13.520000
|
||||
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
|
||||
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
|
||||
@ -261340,6 +261343,7 @@ CVE-2024-46237,0,0,e9a03598fb64b05ba8882f6b5b526c713a555a3e7fdae15963deddf3bd8ce
|
||||
CVE-2024-46238,0,0,e04df7a8502d302f172444f965d1fa00612ca87792c631612b16a6e649750ad1,2024-10-21T21:35:03.580000
|
||||
CVE-2024-46239,0,0,926566aaeaac1cf6bfa054ea714a4093c287c3bf6826d025bfc5db3fb3092da4,2024-10-21T21:35:04.510000
|
||||
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
|
||||
CVE-2024-46240,1,1,7095785d06ffd789b291cf674b04480cc2015e975f36b62912f4d71adb122b9a,2024-10-22T16:15:07.407000
|
||||
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000
|
||||
CVE-2024-46257,0,0,9ea0ad0f2e6865da2b0362a090cb21ce2a440cd52edf95f9a53e87e2d7fb967d,2024-10-03T16:35:05.240000
|
||||
@ -261429,6 +261433,7 @@ CVE-2024-46528,0,0,a31b8dad674e1792ba2e3480eb54bd9167b5430c2cf6a9cfdcaa08814b4f5
|
||||
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
|
||||
CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000
|
||||
CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000
|
||||
CVE-2024-46538,1,1,cefa2e21b5bd2ee89cbf40d952628918d4a31d55c6fbe92a038df0e0a23ebcbc,2024-10-22T17:15:03.950000
|
||||
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
|
||||
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
|
||||
@ -261730,7 +261735,7 @@ CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257
|
||||
CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000
|
||||
CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-46897,0,1,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000
|
||||
CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000
|
||||
CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000
|
||||
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
|
||||
CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000
|
||||
@ -261897,7 +261902,7 @@ CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c8
|
||||
CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000
|
||||
CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000
|
||||
CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb63,2024-06-04T19:20:47.830000
|
||||
CVE-2024-47240,0,1,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
|
||||
CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
|
||||
CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000
|
||||
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
|
||||
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
|
||||
@ -262001,7 +262006,7 @@ CVE-2024-47386,0,0,8cb1861aa24862dc38fce1bb1f3d0d3efef1813cc377d83faa4f21f06229f
|
||||
CVE-2024-47387,0,0,08a3b98e23e8185d509837019c1ef3a9c139ede5ad875ee88b25d1df1e39d80b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47388,0,0,dc31869c2fc889c08896c96961f94aea423bc557ea63d4c8cae8b1b120c02193,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47389,0,0,1d36b4f30f3636f2e5fbc982d1d69e8709dc3961752cb7621f1d6a2dcf8cb49d,2024-10-07T17:47:48.410000
|
||||
CVE-2024-4739,0,1,b1786ca24e141f44a22c18ecb9dbd095560a71bf7433b97a19b051761dc105de,2024-10-22T14:07:02.023000
|
||||
CVE-2024-4739,0,0,b1786ca24e141f44a22c18ecb9dbd095560a71bf7433b97a19b051761dc105de,2024-10-22T14:07:02.023000
|
||||
CVE-2024-47390,0,0,609899d039b2d1f3f491074ef439bed613cbd5e5aeb5a6390f43ce3caca59f92,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47391,0,0,0ec9a4f4449faf31f9cfbe6055bdfe88e4acf6b8a151d36abdb7471992d61099,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47392,0,0,c1e57d415365b830226dbe3f308a9b5009db4e502bc21e205a9f212a29a477c4,2024-10-07T17:47:48.410000
|
||||
@ -262034,9 +262039,9 @@ CVE-2024-47459,0,0,0b1d286cc18504287dd532d658d2383a7255013ccc216b35a3e0d03bccac4
|
||||
CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000
|
||||
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
|
||||
CVE-2024-47485,0,0,ad983ecf2d27a8882140a86c2b8f76909d923038932c9e4c487291a554eaf4cc,2024-10-18T12:52:33.507000
|
||||
CVE-2024-47486,0,0,ebb52a6e58b7502e54c2d96f1f22f907d8d887fc6268cf25a428f304ce5cdeb2,2024-10-18T12:52:33.507000
|
||||
CVE-2024-47487,0,0,ce7934a5efbdf258c84a38c313f294ce5a0f986aa218002120ff84beedef1ca9,2024-10-18T12:52:33.507000
|
||||
CVE-2024-47485,0,1,70c31bc26651c666f1f81bb314c02989bd53a835a51d6fdce38b5fab47a41c05,2024-10-22T16:23:22.890000
|
||||
CVE-2024-47486,0,1,d0e2cdb063c29469a8d3896035823ed37b083b056a6c7ff12d1a7f59bad20ea5,2024-10-22T16:11:07.547000
|
||||
CVE-2024-47487,0,1,89e5f946b42ae69712fe53b468ea8b777288a7068d88dd6a3031473d76e487d6,2024-10-22T16:10:08.027000
|
||||
CVE-2024-47489,0,0,b60e5447ef49080d8bcb541a004c5061338369ecebcb53ef8b0c02387b615511,2024-10-15T12:58:51.050000
|
||||
CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000
|
||||
CVE-2024-47490,0,0,e3601f25126ea5528355c875251d16d0b06252aacf2c95cdc691bd121e53f290,2024-10-15T12:58:51.050000
|
||||
@ -262164,16 +262169,16 @@ CVE-2024-47672,0,0,208c9363d63200a0f87e54b2ecaa4588cdcb8ebe0fa60448ea15f5f621cd4
|
||||
CVE-2024-47673,0,0,2317135deeb5a2ba1be6a2e702cd3dee3239bc7e08807d40785f15a0d93329d9,2024-10-17T14:15:13.853000
|
||||
CVE-2024-47674,0,0,9273dcf5991b9b8c8433130a4938740f9721051fe1fcb6d45b5c4bc4625153d6,2024-10-21T18:15:05.993000
|
||||
CVE-2024-47675,0,0,fff2226e2e91403974930f662f226a29696936c529972a0662f08267575cdd8e,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47676,0,0,647f2a3a1d3c30594b68c3c4e4b627dfaf40a57c2604da0b88353cfb7110d574,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47677,0,1,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000
|
||||
CVE-2024-47676,0,1,d31d6f56ccab7b160561fa0b3c682aa5c75e9dbbe155592bcb66f3a4628abbed,2024-10-22T16:12:39.830000
|
||||
CVE-2024-47677,0,0,e6b5dc6058dd7bfb77cd62ce948de0b274ef953046c0e021bc136fd28c5143ad,2024-10-22T14:55:45.950000
|
||||
CVE-2024-47678,0,0,0599171199c0933ac90dc22e0c718002df8dc875ff64d0f6cfd466c664eca6eb,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47679,0,0,307939d2ecd8d5c95d936c71f851827dbf3076f2cbcbbaee79f0d0403d820535,2024-10-21T17:09:45.417000
|
||||
CVE-2024-4768,0,0,eca965b33b3bb965dbc6e4fa576e2b459dc24fb57cb15a91596443aba7e291e4,2024-06-10T17:16:33.883000
|
||||
CVE-2024-47680,0,0,779185d87101541924dc45d047ca1b9e685cb152836bf7742a8884724035e45e,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47681,0,1,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000
|
||||
CVE-2024-47681,0,0,bcb480aef1983b0991a4a45d2e94e32a59322fc6073af2e0d422ea34ecd87573,2024-10-22T14:57:47.973000
|
||||
CVE-2024-47682,0,0,6c96643a2a20d61e5631dad60147e65d29328d6a7f713c97d1e3e384bd3d2097,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47683,0,0,29df637f255ef6790fa4d5a6cef4a640ffa0c80b3f317910e368f8552b5ce5c0,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47684,0,1,c39612721e855a6bfd73c21cef099cc4455986cccfb2ea78b2c09a72e7deb582,2024-10-22T14:59:31.340000
|
||||
CVE-2024-47684,0,0,c39612721e855a6bfd73c21cef099cc4455986cccfb2ea78b2c09a72e7deb582,2024-10-22T14:59:31.340000
|
||||
CVE-2024-47685,0,0,45dca83ceec4838c760fe3a933b300812ff7df633870d5c25a6d36368c1c1374,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47686,0,0,002328641bf73f5c7fdd0cb5a2e29f6ab710bee941d944f9154eb587c6d547fc,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47687,0,0,94419916fe94ff70fceea8c9848ea1313fd4f7e2844cd750b51c3c2895ce18a2,2024-10-21T17:09:45.417000
|
||||
@ -262238,22 +262243,22 @@ CVE-2024-4774,0,0,a30e3c0a9681e5745664b5a7d21e43f4931cba5ae0f7ac5d13f7a53db899f7
|
||||
CVE-2024-47740,0,0,768c60cc2aa6353990ba6be4a715ba73240d08f7aa920e59da8dba820cceb126,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47741,0,0,16de1929b973495fab2b76c1e0c3aec13d1144f771036e4c19ce75034196e012,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47742,0,0,d4bdf050ad676b843a45f07aa46808bebd66cb4930bdf4a3846418b0470ff5e9,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47743,0,1,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000
|
||||
CVE-2024-47744,0,1,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000
|
||||
CVE-2024-47743,0,0,6b4acbe7a7043ae54c1f28957f686ffc42acda1a8ed60d34df4a0d291938201c,2024-10-22T15:45:15.463000
|
||||
CVE-2024-47744,0,0,99166239884b034553d12d8945cc60c036dfa495284cc2c4bfa4dd05b603e080,2024-10-22T15:44:40.393000
|
||||
CVE-2024-47745,0,0,bf9d70a37cd5327dcc2d07c3fdd8b5c36de5c72622dd6659e050773378799961,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47746,0,0,a9cdeb753844bd87216637cd741d47b47d4ce9e70871099d1588c10e4fb363bf,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47747,0,1,9d5a586f218eaaf78bda9441d4b5d07240456a6b32924dfbcbb0b265d0d3292b,2024-10-22T15:09:13.173000
|
||||
CVE-2024-47746,0,1,bd1d3998772b7b97367eddbd4c0f1f3e8c206783f1078083a98d6f055ddbde21,2024-10-22T16:00:35.703000
|
||||
CVE-2024-47747,0,1,bf426d12e6fede872474432e7d03578fd050f7aed12c854ab7dc6720315913fd,2024-10-22T16:11:40.627000
|
||||
CVE-2024-47748,0,0,647817335e913f39ba0f188b7f0dda0acdc5eefa8874404f39f4072aced2a2c5,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47749,0,1,c9441faf5e1defc6bde7c31bc17b95faf99e99f284f50e4f6ca541b2e00c5472,2024-10-22T15:00:29.497000
|
||||
CVE-2024-47749,0,1,6fb6c09686d727b440ebbd021d0a7a92d2bb1c2a12c6f5547a255465abc8b3b4,2024-10-22T16:08:31.637000
|
||||
CVE-2024-4775,0,0,e28694f3b8983e1ffd74471dfd44709d0dccce69f1a573f2d66ebeb202246c51,2024-07-03T02:08:07.390000
|
||||
CVE-2024-47750,0,0,fcb30e866c3d64f885fc63b0fbe18064c59e15239984a0057b4922de3e3cda47,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47751,0,0,dbbb46f679c8ef6d582034b10e0fc5133e1862d2b7e7523462d867f3e651a7ba,2024-10-21T17:09:45.417000
|
||||
CVE-2024-47752,0,1,240161d7fe703e400c9d3fcfe3ca9a9a5bc29b42b931a326328c832bd997b559,2024-10-22T15:04:46.523000
|
||||
CVE-2024-47753,0,1,1dddd12c73af43ebb0904de1dc5d29129f502d57bab82119fa1cf293a4ba7b53,2024-10-22T15:04:18.277000
|
||||
CVE-2024-47754,0,1,8fefecc35f5ee5d8b148978b8b468c4a0826a3164fbc5c07c8ceec41094f8e9b,2024-10-22T15:03:31.147000
|
||||
CVE-2024-47755,0,1,6cb13a363c1927340d57e298ac76078d7c78d1527e04987bda7bb702169c10cb,2024-10-22T15:46:38.027000
|
||||
CVE-2024-47756,0,1,234d0c24ccb56a3602dbfe56e1b7f8eb887c075685f95cde9baebc46ad5cc3a2,2024-10-22T15:02:11.467000
|
||||
CVE-2024-47757,0,1,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000
|
||||
CVE-2024-47752,0,1,65039c78bb19b3ece8928a956e9db0ee7719b3f114bcfd57c0c3ced74f237a1e,2024-10-22T16:11:09.037000
|
||||
CVE-2024-47753,0,1,b4bdc9a1d337353d37d865ac5f0c508d5e95f57a71156b3e1f6703729b56c2ad,2024-10-22T16:10:40.380000
|
||||
CVE-2024-47754,0,1,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdcd47,2024-10-22T16:10:21.907000
|
||||
CVE-2024-47755,0,0,6cb13a363c1927340d57e298ac76078d7c78d1527e04987bda7bb702169c10cb,2024-10-22T15:46:38.027000
|
||||
CVE-2024-47756,0,1,eb155bc0ec662a964b2c66ddbb8cf663bac19d4776af4da61c75acb4f1c74b8d,2024-10-22T16:09:56.570000
|
||||
CVE-2024-47757,0,0,500f4ed7f4cebe77f095eabe903396578ed13baff1d5a05afdbb14496b4b2006,2024-10-22T15:54:48.830000
|
||||
CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000
|
||||
CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000
|
||||
CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000
|
||||
@ -262290,6 +262295,7 @@ CVE-2024-47815,0,0,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670
|
||||
CVE-2024-47816,0,0,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47819,1,1,c727e536f3a624a59e67b95481c62382de08269a5f55f9d425d3effd214f1eb2,2024-10-22T16:15:07.500000
|
||||
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
|
||||
CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
|
||||
@ -262467,10 +262473,12 @@ CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d
|
||||
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
|
||||
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-48570,1,1,e565422dfa55e4b25b9efb30e59633745c3fab275e41215e02468494293003fa,2024-10-22T17:15:04.087000
|
||||
CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000
|
||||
CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000
|
||||
CVE-2024-48597,0,0,d418873f3e9303c59419cda288a50538e497ca866e7b1cfaef7313951a15ddbe,2024-10-21T20:35:13.860000
|
||||
CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000
|
||||
CVE-2024-48605,1,1,f360f36ad27e8b971ca3313a232e92dc65547d1905cd6f8b04ad824f27bf2cf1,2024-10-22T16:15:07.757000
|
||||
CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000
|
||||
CVE-2024-48622,0,0,4cd7a4b67551e1c7266b414b834e1956aa3a51a75d895e45be98bc89b06ddf81,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48623,0,0,d049076f927dcf309023eb7c4a1c5680d5c48a2a4bd2097c596ebfe8af0f8628,2024-10-16T16:38:43.170000
|
||||
@ -262493,6 +262501,9 @@ CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e
|
||||
CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000
|
||||
CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
|
||||
CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
|
||||
CVE-2024-48706,1,1,f6ed33b88a2a4cf79c6d1eae635780005dc95575e969d386a62204c211cae31c,2024-10-22T17:15:04.180000
|
||||
CVE-2024-48707,1,1,597fa9e5ec0742c8ccc62ed6d8aa1a1f509191f27a5d9d00c7621c443fe434b2,2024-10-22T17:15:04.273000
|
||||
CVE-2024-48708,1,1,82b37b547a43c5d13832cda6a763b6b0d073da2c9cedfa21cb674f5a350bfaa3,2024-10-22T17:15:04.370000
|
||||
CVE-2024-48709,0,0,a2f1048f43a5ff6c83482412ed457499b4f82b0c444a20075955708fd04c880e,2024-10-21T19:35:07.443000
|
||||
CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
|
||||
CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000
|
||||
@ -262563,6 +262574,10 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923
|
||||
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
|
||||
CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48925,1,1,17ad6fa4547f2ce7b16f4da89e9b101cb04c2294b06cc702cb3983c1e1a94ab1,2024-10-22T16:15:07.853000
|
||||
CVE-2024-48926,1,1,85b04bcd589f9426bacb388b76883147a3307f836fd8fd417156eccdaeb86ba1,2024-10-22T16:15:08.090000
|
||||
CVE-2024-48927,1,1,703fccd925f1f3af0bb4d7bdb71de5226e00f5f5ac4de4592eb47b115aedc481,2024-10-22T16:15:08.360000
|
||||
CVE-2024-48929,1,1,66787fd57ce09c453329b762aeb961f8826f0e3b696b20681b1d74930ccbbfca,2024-10-22T16:15:08.617000
|
||||
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000
|
||||
CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000
|
||||
@ -262605,7 +262620,11 @@ CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d8
|
||||
CVE-2024-49193,0,0,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000
|
||||
CVE-2024-49195,0,0,ebe503b8e48bc1eb234bda5829019875beb46e6f81279b5b20d7be3e70714d45,2024-10-17T18:35:13.253000
|
||||
CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000
|
||||
CVE-2024-49208,1,1,8f2e6c1e86f64af5e9881e3f7358f063e855448026ab47a0489d80c8a2fe32b3,2024-10-22T17:15:04.503000
|
||||
CVE-2024-49209,1,1,63bc036493de6c1ed83f722bcd4747b3b03d632c72fe17005e827b6f6284d1e9,2024-10-22T17:15:05.763000
|
||||
CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000
|
||||
CVE-2024-49210,1,1,6e53b8aa574f1a38b7aa78fd56066f3a919773a1d515d8c8b36c1cf9f646d98b,2024-10-22T17:15:05.970000
|
||||
CVE-2024-49211,1,1,639835fa2342b8dba7122e14997d5aa1fec6ab36565dab9c04b435fe88b7768d,2024-10-22T17:15:06.193000
|
||||
CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000
|
||||
CVE-2024-49215,0,0,9d23e97fd9538d4ddaefdbee98c9f991902afb90430384e62ea6427018c87235,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
|
||||
@ -262739,6 +262758,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810
|
||||
CVE-2024-49366,0,0,dba23a6a5d899dfc1dd93480431c60e66516ce3fea9b6f89406c417953de1770,2024-10-21T17:15:03.567000
|
||||
CVE-2024-49367,0,0,9cdea4233abdf31e5711ba3faae763fba0a540ae42a436f6b5d5034f60f32d59,2024-10-21T17:15:03.783000
|
||||
CVE-2024-49368,0,0,4323388038598adba9c2e6f2533f5d2b25d45af0a630786c844ee55a0bab465d,2024-10-21T17:15:03.960000
|
||||
CVE-2024-49373,1,1,0572794ffa0a562b1feec1afbfc4282a4c956dbda0b30d27fc085e44ad9f38f6,2024-10-22T16:15:08.860000
|
||||
CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
|
||||
CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
|
||||
CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
|
||||
@ -262784,12 +262804,12 @@ CVE-2024-4961,0,0,fcb73b246c680abaae254870453939d7dbf5d8c46c3dbb2f7ab747d994c3a1
|
||||
CVE-2024-49610,0,0,4f883c779c7b80912a16a7cdc0e52ccc8dd24129efdfa293f6a1ccc1bf1526fe,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49611,0,0,c7f7e09d8f83b62743396c3bd4904fddaab94d00a5cf5a5c7129906b3bdbdafc,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49612,0,0,acd6c0707ff81a9cd91d7e43f1e50373957b69b17c638b1ca230b26e66d303b8,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49613,0,1,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000
|
||||
CVE-2024-49614,0,1,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000
|
||||
CVE-2024-49615,0,0,ba81ea33ad44e9028a5a08fbc9b26c419164367943e113f8f0ddf78b9b8c69b0,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49616,0,0,9a594ac2e99bd2ea3d04b4336df6a62b74a73cba884d04e5a4c50b731f2c0fcc,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49617,0,0,fc3bc12b8230aeed8fe5e270ffff12b76ff2c45b03602b48cb05ca2b01bcb351,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49618,0,0,b259022a82a9786efc0f4b97a99bb745863f5ea5c29985d8c38260ee2752bd41,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49613,0,0,20f17e03932ce1d22e25d4f6728446a601ccc4501b4f23acdcb8336cbf93e2ba,2024-10-22T15:29:55.203000
|
||||
CVE-2024-49614,0,0,7dd3537b0ff1f3de2fff68f2c1a6b2ab47880b5af077ec967e05dcc4fdcd0d9d,2024-10-22T15:34:09.190000
|
||||
CVE-2024-49615,0,1,130d0356784581205e5e46cf3362c72fc7aa63cdf23c2209a80a7b2698730ac0,2024-10-22T16:43:14.190000
|
||||
CVE-2024-49616,0,1,5b88766e762e6343817ed4b072fa559035aa10e15052258529a01845d89d6e9d,2024-10-22T16:41:58.513000
|
||||
CVE-2024-49617,0,1,273326047d3e6de5c637f9bb2298d7d33d462172d179296cb89214e45a7a6ea1,2024-10-22T16:51:35.353000
|
||||
CVE-2024-49618,0,1,4bf989c333be7a79b8e837d5c1bc3d3690e7ab118b29552d86d9a2559ce5377c,2024-10-22T16:50:18.527000
|
||||
CVE-2024-49619,0,0,e8500ad2f662c42eb5cefcb54e6583c1e771076814e70ad1ad1341515be5295a,2024-10-21T17:09:45.417000
|
||||
CVE-2024-4962,0,0,b9e851b58a3c7e382510249caa4fcb1d6185432495cf3586b8784f0d9e4becfd,2024-08-01T21:15:54
|
||||
CVE-2024-49620,0,0,03cc08ebcdb9c3da220e8f96b59d9d80dae0359c2d758e8d050a48cf9a60b6aa,2024-10-21T17:09:45.417000
|
||||
@ -262824,16 +262844,16 @@ CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506
|
||||
CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000
|
||||
CVE-2024-4984,0,0,9f2b9cbe42298dc633fd7a95b66e0d4fdcec1b53d37f19261bcfa2f1a75e3637,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4985,0,0,df226dda87642aeec36f0fe802a8cb1e52b5f8e667dcfe00ff42a5cc0d642f7f,2024-05-21T12:37:59.687000
|
||||
CVE-2024-49850,0,0,8fb2208ed48bdb26222d1dc252f610fc96b2529a3c2127408e4890cb805ccb01,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49850,0,1,2b33649e908446d8844acedbede0997555f012b73f46f17eddbc04e11a5ff156,2024-10-22T16:12:14.193000
|
||||
CVE-2024-49851,0,0,3d484e6abda4a4ce29d99f10316c857626eb63bf2eefc7621c465c7b13c23949,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49852,0,0,262ffe2d9e462bcad9f414c5114ff048fe0027922ed23ed53a0208a484284b67,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49853,0,0,c217dd9272b2cd4fab6ae4f4c0fffed7f5095340c59c640aa7cae9145dfe0c13,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49854,0,0,94138472b5f74b096a6e54fd3e7d9e10ac0cdb3bdf0c5b3ece24fbd6184cc9bd,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49855,0,1,b08dc86ebf2d1773422e8bece84884893e7c26fc05c4bac9762abe3418e3e42d,2024-10-22T15:17:29.283000
|
||||
CVE-2024-49855,0,1,1c10554d37ca1638fe05ddaa09d6ac939fe9e21d5da77a220a4fa3ba8205886d,2024-10-22T16:12:27.030000
|
||||
CVE-2024-49856,0,0,69c6d5b77115b2740f272ad46ab48ff11264f8cb25014c56c24110ee5f0eca13,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49857,0,1,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000
|
||||
CVE-2024-49857,0,0,08301cc7463b3b282481d026cad759adf55112806c61a30b7af36430f6a5bfab,2024-10-22T15:48:42.347000
|
||||
CVE-2024-49858,0,0,189a38e2e1729e4f650f5ed2d9949d8780bddccdc0a5c8eca5c522d45db87500,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49859,0,1,5d84e21d84afa869d2d12c89058663c672035a9c51324863a468cd9ea096c485,2024-10-22T15:24:57.640000
|
||||
CVE-2024-49859,0,1,d128ad3420c66b03d628db278329ad6a0d637911116441391f7baa845a99aaa1,2024-10-22T16:13:03.267000
|
||||
CVE-2024-49860,0,0,f5150f7cf3bb2d2d0ca50e9d424c876fd9c84254fcf7bd6f2627024294f5ef2f,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49861,0,0,f8d823d453896bd63aeb95297d35b7ca2209aad13429ece51e5e583706dfbad3,2024-10-21T17:09:45.417000
|
||||
CVE-2024-49862,0,0,0c94aa307fd6d2aeab9692641051191e71a94c4443ed0051d87097b98891acf2,2024-10-21T17:09:45.417000
|
||||
@ -263068,8 +263088,8 @@ CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76
|
||||
CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
|
||||
CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000
|
||||
CVE-2024-50311,1,1,673baaa29832ec29e40ef2e3d47df34dc1d10d7389d03beb5f8c46a2e87a0ff0,2024-10-22T14:15:19.450000
|
||||
CVE-2024-50312,1,1,c64596e697a11e7fbe1b0878c7d8da7e4a1b9ec94a567221a61a57e09b010e21,2024-10-22T14:15:19.973000
|
||||
CVE-2024-50311,0,0,673baaa29832ec29e40ef2e3d47df34dc1d10d7389d03beb5f8c46a2e87a0ff0,2024-10-22T14:15:19.450000
|
||||
CVE-2024-50312,0,0,c64596e697a11e7fbe1b0878c7d8da7e4a1b9ec94a567221a61a57e09b010e21,2024-10-22T14:15:19.973000
|
||||
CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000
|
||||
CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000
|
||||
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
|
||||
@ -264737,7 +264757,7 @@ CVE-2024-6955,0,0,a26f625ecf124adff42bb43bc9f1e0c8d32b78d7fbf99f165aa453f32a4235
|
||||
CVE-2024-6956,0,0,402b3b90bc0ef6eea6fea2da2c73e896560064f50f2a4d52cad793cf96bb3277,2024-08-21T17:35:59.550000
|
||||
CVE-2024-6957,0,0,b4f44e4de7831c46c7995591b032592b6aa63f3442f007561464731699c5213c,2024-08-21T17:33:42.753000
|
||||
CVE-2024-6958,0,0,815ebcc0d5fc84aab6c67001f06fe76ce9152d116a343e60ea5524ee95f4434e,2024-08-21T17:42:29.697000
|
||||
CVE-2024-6959,0,1,2979894cb6a452e0b42932dad0034ff9396cd2b285ee4d2288644288267536cd,2024-10-22T14:02:57.660000
|
||||
CVE-2024-6959,0,0,2979894cb6a452e0b42932dad0034ff9396cd2b285ee4d2288644288267536cd,2024-10-22T14:02:57.660000
|
||||
CVE-2024-6960,0,0,932ef4036cbd886ee22297597ffd985e884d3c0cad50613ff0bd32ecdcd39a17,2024-08-01T14:00:50.973000
|
||||
CVE-2024-6961,0,0,c26f41db6b5c6e22104567980ea901ebcdc3d0c6ac8c59905ee37ac020ae3afe,2024-08-01T14:00:51.710000
|
||||
CVE-2024-6962,0,0,b8054e2d59ceccdcd4628c1dbc900d3f0c22ab58e2eaf33700d9d63f648dd237,2024-07-25T15:47:18.363000
|
||||
@ -265473,8 +265493,8 @@ CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70
|
||||
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000
|
||||
CVE-2024-7888,0,0,57ff3b28678f008c2bdd72bf81b6e5b1bbb449b0748e8292d87b9d1342b8d17e,2024-09-27T13:45:33.030000
|
||||
CVE-2024-7889,0,1,8f4cdef609827730a9cb2f8ad45b312addf6698f361e0182fcc41d26379da297,2024-10-22T14:50:55.187000
|
||||
CVE-2024-7890,0,1,a6a2cdaf8fa24b7c70bfeed12ed4dadb214245a77f1cdad93eee0ad6e9de59e7,2024-10-22T14:53:32.763000
|
||||
CVE-2024-7889,0,0,8f4cdef609827730a9cb2f8ad45b312addf6698f361e0182fcc41d26379da297,2024-10-22T14:50:55.187000
|
||||
CVE-2024-7890,0,0,a6a2cdaf8fa24b7c70bfeed12ed4dadb214245a77f1cdad93eee0ad6e9de59e7,2024-10-22T14:53:32.763000
|
||||
CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000
|
||||
CVE-2024-7892,0,0,2c771bb8577e200bacd6c43e315ff1bcb3900b37f1489eacc31e5f9c96a3f146,2024-10-07T17:26:49.607000
|
||||
CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000
|
||||
@ -266195,7 +266215,7 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4
|
||||
CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000
|
||||
CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
|
||||
CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000
|
||||
CVE-2024-8980,1,1,ab8ec6030d8159f710ee21cdfc696408d9afd11cf59f459033246e03d1a15983,2024-10-22T15:15:07.337000
|
||||
CVE-2024-8980,0,0,ab8ec6030d8159f710ee21cdfc696408d9afd11cf59f459033246e03d1a15983,2024-10-22T15:15:07.337000
|
||||
CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000
|
||||
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
|
||||
@ -266242,7 +266262,7 @@ CVE-2024-9046,0,0,8656f1201ca0039377fd822b96252cedb47d7d532a98f822fda06fa6ad4421
|
||||
CVE-2024-9047,0,0,4ea7d0b1b11f6de8ec31e11947f5e76892006c92ffae382a37fca981e56bba3b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
|
||||
CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000
|
||||
CVE-2024-9050,0,0,14129a5f05505d4e465f96c2bc8c9664e1202efe095f7995c49d65466ad68f7d,2024-10-22T13:15:02.410000
|
||||
CVE-2024-9050,0,1,60723fac2bf439bb1adcc7283747d4d8d7e0afa3e6de58e8a91bfd3f499e46a9,2024-10-22T17:15:06.420000
|
||||
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
|
||||
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
|
||||
@ -266295,6 +266315,7 @@ CVE-2024-9123,0,0,cd45c56b30b54bc08d10b45e423a2871895647b4b30e564898eb326d52a5c6
|
||||
CVE-2024-9124,0,0,ed784b79f60c57333454c5582ccee1e6855416a99a054b161105f40c65181fb5,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9125,0,0,178fee32dc964661b9c65fa72adfd723833bc712092eacf5141ac942799ac520,2024-10-01T14:00:52.460000
|
||||
CVE-2024-9127,0,0,2a57398f5cef1966c50482248e5fdb86e0eae0bed7d0a3c554fbb9c182ab0a8a,2024-10-01T14:09:26.017000
|
||||
CVE-2024-9129,1,1,134f7ece5b3cefa919b3f6de8c2759de84aa703b1114c3e9b5f02710bae06ae5,2024-10-22T17:15:06.557000
|
||||
CVE-2024-9130,0,0,c55ec493e0918bdc6346df7de1c7b50119b1912e830881716d5b60020f91e1cd,2024-10-04T17:18:59.130000
|
||||
CVE-2024-9136,0,0,9b9746749b73403d8dc2b7a33b5935315a467feb0aa3698e70e44d08c2289a1f,2024-10-01T14:28:31.027000
|
||||
CVE-2024-9137,0,0,264d67370ab0f50b8c3f1048814084fcd11d0d542a946dd3f8623532739c7355,2024-10-15T12:57:46.880000
|
||||
@ -266331,7 +266352,7 @@ CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab2191
|
||||
CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9204,0,0,f5f991f4ad7621e1bd7fe1b28f2260110bc4f49be8b0fb440d3c802fe287a27c,2024-10-16T14:26:41.423000
|
||||
CVE-2024-9205,0,0,f51eb73f6ff5e878b874b1fc87e2002dcbff618e0eb4a751eb85e6ba7e0830aa,2024-10-15T14:16:53.337000
|
||||
CVE-2024-9206,0,1,f2744d9088cb2b46074d22abdd833bb28847b84eac15877357583dce73a10136,2024-10-22T15:27:08.847000
|
||||
CVE-2024-9206,0,0,f2744d9088cb2b46074d22abdd833bb28847b84eac15877357583dce73a10136,2024-10-22T15:27:08.847000
|
||||
CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000
|
||||
CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000
|
||||
@ -266375,6 +266396,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f
|
||||
CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9287,1,1,3de2c43f5b9341b2c2d4d558e92dd45b9e29b5a5149d5bb65c4e8390fe8f56dd,2024-10-22T17:15:06.697000
|
||||
CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000
|
||||
CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000
|
||||
CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000
|
||||
@ -266420,24 +266442,24 @@ CVE-2024-9350,0,0,290e64557c531b1051792213fe1cd034817a07f758e3a220c124933ec4bc84
|
||||
CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000
|
||||
CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
|
||||
CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9355,0,1,9fd824909ba068088861a875cafcc5135d14a5e660ace6b963f9d0d130917184,2024-10-22T17:15:06.853000
|
||||
CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000
|
||||
CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000
|
||||
CVE-2024-9361,0,0,4693288d6f9b770f354b271d3230619579a50994dbc41bcafd3fa00ed196033b,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9364,0,1,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000
|
||||
CVE-2024-9366,0,1,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000
|
||||
CVE-2024-9364,0,0,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000
|
||||
CVE-2024-9366,0,0,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000
|
||||
CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000
|
||||
CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000
|
||||
CVE-2024-9373,0,1,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000
|
||||
CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000
|
||||
CVE-2024-9375,0,0,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000
|
||||
CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5eaf,2024-10-15T14:18:12.483000
|
||||
CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000
|
||||
CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000
|
||||
CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000
|
||||
CVE-2024-9381,0,0,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000
|
||||
CVE-2024-9382,0,1,9974cbae3b65aba95d0b7e51ea5485cc9f96ba1c03eee8eb0122ba4567d68e55,2024-10-22T14:31:49.097000
|
||||
CVE-2024-9383,0,1,bcbb779641918c0449c8c1e715b100b70d4ebd612997069770f4fe494807a125,2024-10-22T14:27:13.377000
|
||||
CVE-2024-9382,0,0,9974cbae3b65aba95d0b7e51ea5485cc9f96ba1c03eee8eb0122ba4567d68e55,2024-10-22T14:31:49.097000
|
||||
CVE-2024-9383,0,0,bcbb779641918c0449c8c1e715b100b70d4ebd612997069770f4fe494807a125,2024-10-22T14:27:13.377000
|
||||
CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000
|
||||
CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000
|
||||
@ -266472,7 +266494,7 @@ CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836
|
||||
CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000
|
||||
CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9452,0,0,611328d50c3715494f831c5942738c614750e5d97f90d9d50fc04089aa82bed2,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9452,0,1,7eb2217e5eb4f5560cd9b75a09c78b5c11eea85f09a819264a7f744adf0ba17a,2024-10-22T16:23:59.420000
|
||||
CVE-2024-9455,0,0,70bc73495623b6fab8931499505a6be70a8937392cffccc260a57663b280a262,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8eeb,2024-10-15T14:23:57.307000
|
||||
CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000
|
||||
@ -266508,7 +266530,7 @@ CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca7
|
||||
CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
|
||||
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
|
||||
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9537,0,0,452190c6664f6422cc10e3635c7e8aae7087139e3819c6b70da7292d35f00d48,2024-10-22T01:00:02.043000
|
||||
CVE-2024-9537,0,1,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794abf,2024-10-22T17:33:23.837000
|
||||
CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9540,0,0,155792833f2c3d33a8c6cc679a0bdb6a5ac3f76d67aede19f5592875c2f877b6,2024-10-16T16:38:14.557000
|
||||
@ -266574,7 +266596,7 @@ CVE-2024-9652,0,0,096af9c07df6f24ff5a9459bed95d6ce45b4a430b6f907d5bc85c0d2be3b93
|
||||
CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb7761035b,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9674,0,1,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
||||
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
|
||||
CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9676,0,0,d31717e3bcb8586d94edf5a821882c847af5c510cf5d1e8e5ea8ab53ee1286ab,2024-10-16T16:38:43.170000
|
||||
CVE-2024-9677,0,0,7cf8d43d57c2900d9443e482797783848d861069497504cccb5159525ba63cae,2024-10-22T02:15:04.380000
|
||||
@ -266583,7 +266605,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854
|
||||
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
|
||||
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
|
||||
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9703,0,1,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000
|
||||
CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000
|
||||
CVE-2024-9704,0,0,44ebf677ae69495b92126e2eb8d9d17c07544c8235e40f4412f83b24b48e2f3a,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9707,0,0,cde0816a76e7682ea9f7dc3a69f12238a4d95599cfec418d205198361a6879cf,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da6473,2024-10-15T12:57:46.880000
|
||||
@ -266630,7 +266652,7 @@ CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c
|
||||
CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9848,0,0,c9c868f8b4dfcb8a16c343ca24b48f00207606de4438d4f715e98402b24e1592,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9848,0,1,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000
|
||||
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9858,0,0,bef02c0d9ed07a4afa527340189d49e60d5c238f08809a01d4eade734c583a54,2024-10-16T17:35:08.130000
|
||||
@ -266644,7 +266666,7 @@ CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c4
|
||||
CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c18433f,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9889,0,0,ae2d8b3ae5ea45b7bf6ef4fc45ab8d1cf63876d506d81aa02cc186300793ec67,2024-10-21T17:10:22.857000
|
||||
CVE-2024-9891,0,0,53ec4da3ba927732190105b9993cdfaefd46788f3c82dc582d229482b0eb1fcc,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9892,0,1,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714ba,2024-10-22T15:46:17.880000
|
||||
CVE-2024-9892,0,0,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714ba,2024-10-22T15:46:17.880000
|
||||
CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000
|
||||
CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user