mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-08-08T22:00:17.982700+00:00
This commit is contained in:
parent
bf4cccd2b1
commit
069f56edff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28074",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-07-31T08:15:02.243",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T21:14:12.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update",
|
||||
"source": "security_alert@emc.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndIncluding": "4.1.5",
|
||||
"matchCriteriaId": "016B6D4C-062E-4D93-B3EA-CF5FFCB34ED4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.0.0",
|
||||
"versionEndExcluding": "4.6.2",
|
||||
"matchCriteriaId": "C631A71E-7BA9-4375-ADA3-6AB91A737A30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21C6A56D-8CAF-45D5-A1E1-FE70F2584DF5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000212325/dsa-2023-120-dell-bsafe-micro-edition-suite-security-update",
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28865",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-08T18:15:09.533",
|
||||
"lastModified": "2024-08-08T18:55:19.180",
|
||||
"lastModified": "2024-08-08T20:35:00.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR15, 4.0.0 SR05, 4.1.0 SR03, and 4.2.0 SR02 fails to validate the directory contents of certain directories (e.g., ensuring the expected hash sum) during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-353"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49548",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T00:15:52.203",
|
||||
"lastModified": "2024-03-05T13:41:01.900",
|
||||
"lastModified": "2024-08-08T20:35:02.323",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que Customer Support System v1 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro apellido en /customer_support/ajax.php?action=save_user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49548",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0365",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-03-18T19:15:06.253",
|
||||
"lastModified": "2024-03-18T19:40:00.173",
|
||||
"lastModified": "2024-08-08T21:35:01.163",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Fancy Product Designer de WordPress anterior a 6.1.5 no sanitiza ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n de SQL explotable por los administradores."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0855",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-02-27T09:15:37.497",
|
||||
"lastModified": "2024-02-27T14:20:06.637",
|
||||
"lastModified": "2024-08-08T21:35:01.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Spiffy Calendar de WordPress anterior a 4.9.9 no verifica el par\u00e1metro event_author y permite a cualquier usuario modificarlo al crear un evento, lo que lleva a enga\u00f1ar a los usuarios/administradores de que una p\u00e1gina fue creada por un Contributor+."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/5d5da91e-3f34-46b0-8db2-354a88bdf934/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1936",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-03-04T22:15:46.733",
|
||||
"lastModified": "2024-03-23T12:15:08.453",
|
||||
"lastModified": "2024-08-08T21:35:03.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El asunto cifrado de un mensaje de correo electr\u00f3nico podr\u00eda asignarse de forma incorrecta y permanente a otro mensaje de correo electr\u00f3nico arbitrario en la cach\u00e9 local de Thunderbird. En consecuencia, al responder al mensaje de correo electr\u00f3nico contaminado, el usuario podr\u00eda filtrar accidentalmente el asunto confidencial a un tercero. Si bien esta actualizaci\u00f3n corrige el error y evita la contaminaci\u00f3n futura de mensajes, no repara autom\u00e1ticamente las contaminaciones existentes. Se recomienda a los usuarios que utilicen la funci\u00f3n de reparaci\u00f3n de carpetas, que est\u00e1 disponible en el men\u00fa contextual de las carpetas de correo electr\u00f3nico, que borrar\u00e1 las asignaciones de asuntos incorrectas. Esta vulnerabilidad afecta a Thunderbird < 115.8.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1860977",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2176",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-06T19:15:09.090",
|
||||
"lastModified": "2024-03-23T03:15:12.287",
|
||||
"lastModified": "2024-08-08T21:35:08.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Use after free en FedCM en Google Chrome anterior a 122.0.6261.111 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24098",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T16:15:49.290",
|
||||
"lastModified": "2024-03-05T18:50:18.333",
|
||||
"lastModified": "2024-08-08T21:35:04.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Code-projects Scholars Tracking System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de News Feed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/scholars-tracking-system-in-php-with-source-code/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2444",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-04-06T05:15:07.500",
|
||||
"lastModified": "2024-04-08T18:49:25.863",
|
||||
"lastModified": "2024-08-08T21:35:09.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Related Posts de WordPress en l\u00ednea anterior a 3.5.0 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de cross-site scripting incluso cuando unfiltered_html no est\u00e1 permitido."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25817",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-06T00:15:52.703",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-08-08T21:35:05.550",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en eza anterior a la versi\u00f3n 0.18.2, permite a atacantes locales ejecutar c\u00f3digo arbitrario a trav\u00e9s de los componentes .git/HEAD, .git/refs y .git/objects."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-3qx3-6hxr-j2ch",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25846",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-27T17:15:12.287",
|
||||
"lastModified": "2024-02-28T14:06:45.783",
|
||||
"lastModified": "2024-08-08T20:35:05.147",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En el m\u00f3dulo \"Importaci\u00f3n de cat\u00e1logo de productos (CSV, Excel)\" (simpleimportproduct) <= 6.7.0 de MyPrestaModules para PrestaShop, un invitado puede cargar archivos con extensiones .php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://addons.prestashop.com/fr/import-export-de-donnees/19091-catalogue-de-produits-csv-excel-dimportation.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2627",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-03-20T17:15:07.527",
|
||||
"lastModified": "2024-04-01T15:22:56.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-08T21:35:10.330",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27689",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T17:15:07.573",
|
||||
"lastModified": "2024-03-01T22:22:25.913",
|
||||
"lastModified": "2024-08-08T21:35:06.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que Stupid Simple CMS v1.2.4 conten\u00eda un Cross-Site Request Forgery (CSRF) a trav\u00e9s de /update-article.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xin246/cms/blob/main/2.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28099",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-15T11:15:08.397",
|
||||
"lastModified": "2024-04-15T13:15:31.997",
|
||||
"lastModified": "2024-08-08T20:35:06.277",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "VT STUDIO Ver.8.32 y anteriores contienen un problema con la ruta de b\u00fasqueda de DLL, lo que puede provocar que se carguen bibliotecas de v\u00ednculos din\u00e1micos de forma insegura. Como resultado, se puede ejecutar c\u00f3digo arbitrario con los privilegios de la aplicaci\u00f3n en ejecuci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92825069/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30163",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-07T17:15:50.267",
|
||||
"lastModified": "2024-06-07T19:24:09.243",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T21:25:19.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,77 @@
|
||||
"value": "Invision Community antes de 4.7.16 permite la inyecci\u00f3n de SQL a trav\u00e9s del m\u00e9todo apps/nexus/modules/front/store/store.php IPS\\nexus\\modules\\front\\store\\_store::_categoryView(), donde la entrada del usuario pasaba a trav\u00e9s de la solicitud de filtro el par\u00e1metro no se sanitiza adecuadamente antes de usarse para ejecutar consultas SQL. Esto puede ser aprovechado por atacantes no autenticados para llevar a cabo ataques de inyecci\u00f3n SQL ciega."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Apr/20",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://invisioncommunity.com/release-notes/4716-r128/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:invisioncommunity:invisioncommunity:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndExcluding": "4.7.16",
|
||||
"matchCriteriaId": "F612BBD3-CA37-4707-B0B0-E25CF25694FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Apr/20",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://invisioncommunity.com/release-notes/4716-r128/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31585",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T19:15:08.007",
|
||||
"lastModified": "2024-06-10T18:15:31.457",
|
||||
"lastModified": "2024-08-08T21:35:12.477",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que FFmpeg versi\u00f3n n5.1 a n6.1 conten\u00eda una vulnerabilidad de error uno por uno en libavfilter/avf_showspectrum.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una entrada manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-193"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/dc2c64ffe0c3934a6176bcd2c5cf5656",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-32317",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T16:15:09.073",
|
||||
"lastModified": "2024-04-17T16:51:07.347",
|
||||
"lastModified": "2024-08-08T21:35:13.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El firmware Tenda AC10 v4.0 V16.03.10.13 y V16.03.10.20 tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro adslPwd en la funci\u00f3n formWanParameterSetting."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32857",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-07-31T09:15:03.297",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T21:10:04.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
|
||||
"source": "security_alert@emc.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:peripheral_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.7.6",
|
||||
"matchCriteriaId": "99B6BBE4-2845-44DA-BC9D-C80FB9537457"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-33959",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-08-06T11:16:05.133",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T21:02:25.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following\u00a0'categ' in '/admin/mod_reports/printreport.php' parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en PayPal, Credit Card and Debit Card Payment que afecta a la versi\u00f3n 1.0. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una consulta especialmente manipulada al servidor y recuperando toda la informaci\u00f3n almacenada en \u00e9l a trav\u00e9s del siguiente 'categ' en el par\u00e1metro '/admin/mod_reports/printreport.php'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +71,50 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10CC4BF0-06E7-433F-9902-A807B816240D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EAEEFF8B-8B26-4A87-8337-845D03FBEBCF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DF7E11E-26AF-4E84-AD88-110350D9D25C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E6B8938-87CD-4605-98EF-F9830FE8EC3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7C436FF2-199A-4964-9C5A-600289DC83C3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janobe-products",
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34219",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:38:35.857",
|
||||
"lastModified": "2024-05-14T16:12:23.490",
|
||||
"lastModified": "2024-08-08T21:35:14.163",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que TOTOLINK CP450 V4.1.0cu.747_B20191224 contiene una vulnerabilidad en la funci\u00f3n SetTelnetCfg, que permite a los atacantes iniciar sesi\u00f3n a trav\u00e9s de telnet."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36130",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2024-08-07T04:17:17.967",
|
||||
"lastModified": "2024-08-07T15:17:46.717",
|
||||
"lastModified": "2024-08-08T21:35:14.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-for-Mobile-EPMM-July-2024",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36678",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-19T21:15:57.363",
|
||||
"lastModified": "2024-07-03T02:03:29.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:59:28.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:promokit:pk_themesettings:*:*:*:*:*:prestashop:*:*",
|
||||
"versionEndIncluding": "1.8.8",
|
||||
"matchCriteriaId": "CF2EF7AB-7378-44D0-A485-274204C39D1A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37142",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-07-31T09:15:04.700",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T21:17:18.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
|
||||
"source": "security_alert@emc.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:peripheral_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.7.6",
|
||||
"matchCriteriaId": "99B6BBE4-2845-44DA-BC9D-C80FB9537457"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242",
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37382",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-08T18:15:10.317",
|
||||
"lastModified": "2024-08-08T18:55:19.180",
|
||||
"lastModified": "2024-08-08T20:35:08.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue discovered in import host feature in Ab Initio Metadata Hub and Authorization Gateway before 4.3.1.1 allows attackers to run arbitrary code via crafted modification of server configuration."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.abinitio.com/en/security-advisories/ab-2024-003/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T19:15:48.033",
|
||||
"lastModified": "2024-08-08T14:35:07.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T20:53:45.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Teacher.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02775C53-3AA5-4707-A166-D1FE5B1288EF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Responsive%20School%20Management%20System%20v3.2.0/SQL%20Injection%20-%20Teacher.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12362/responsive-school-management-system-php-project-source-code",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41250",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T17:15:51.837",
|
||||
"lastModified": "2024-08-08T15:21:18.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-08T21:35:16.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41251",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T16:15:45.850",
|
||||
"lastModified": "2024-08-08T15:05:36.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-08T20:35:09.980",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41702",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2024-07-30T10:15:02.550",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:31:10.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@cyber.gov.il",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
|
||||
"source": "cna@cyber.gov.il"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siberiancms:siberiancms:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.0.11",
|
||||
"matchCriteriaId": "6F353DA4-956C-408C-8B64-95E3BFB2FDC0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
|
||||
"source": "cna@cyber.gov.il",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-41989",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T15:15:56.030",
|
||||
"lastModified": "2024-08-07T20:50:04.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-08T20:35:11.140",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Django 5.0 anterior a 5.0.8 y 4.2 anterior a 4.2.15. El filtro de plantilla de formato flotante est\u00e1 sujeto a un consumo de memoria significativo cuando se le proporciona una representaci\u00f3n de cadena de un n\u00famero en notaci\u00f3n cient\u00edfica con un exponente grande."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,28 +2,102 @@
|
||||
"id": "CVE-2024-42248",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-07T16:15:47.440",
|
||||
"lastModified": "2024-08-07T19:09:46.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:55:35.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: serial: ma35d1: Add a NULL check for of_node\n\nThe pdev->dev.of_node can be NULL if the \"serial\" node is absent.\nAdd a NULL check to return an error in such cases."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: serial: ma35d1: agregue una verificaci\u00f3n NULL para of_node El pdev->dev.of_node puede ser NULL si el nodo \"serial\" est\u00e1 ausente. Agregue una verificaci\u00f3n NULL para devolver un error en tales casos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0e0e15ab2d3a094a38525d23c03d78ec7d14a40e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23efa74cfe6eb923abb5b9bc51b2a04879013c67",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/acd09ac253b5de8fd79fc61a482ee19154914c7a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.5",
|
||||
"versionEndExcluding": "6.6.41",
|
||||
"matchCriteriaId": "F8F0E46F-AE23-4E3C-94C2-982292314C2D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.10",
|
||||
"matchCriteriaId": "AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0e0e15ab2d3a094a38525d23c03d78ec7d14a40e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23efa74cfe6eb923abb5b9bc51b2a04879013c67",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/acd09ac253b5de8fd79fc61a482ee19154914c7a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,88 @@
|
||||
"id": "CVE-2024-42249",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-07T16:15:47.510",
|
||||
"lastModified": "2024-08-07T19:09:46.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:55:25.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: don't unoptimize message in spi_async()\n\nCalling spi_maybe_unoptimize_message() in spi_async() is wrong because\nthe message is likely to be in the queue and not transferred yet. This\ncan corrupt the message while it is being used by the controller driver.\n\nspi_maybe_unoptimize_message() is already called in the correct place\nin spi_finalize_current_message() to balance the call to\nspi_maybe_optimize_message() in spi_async()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8b9af6d67517ce4a0015928b3cf35bfd2b1bc1c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c86a918b1bdba78fb155184f8d88dfba1e63335d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: spi: no desoptimizar el mensaje en spi_async() Llamar a spi_maybe_unoptimize_message() en spi_async() es incorrecto porque es probable que el mensaje est\u00e9 en la cola y a\u00fan no se haya transferido. Esto puede da\u00f1ar el mensaje mientras lo utiliza el controlador del controlador. spi_maybe_unoptimize_message() ya se llama en el lugar correcto en spi_finalize_current_message() para equilibrar la llamada a spi_maybe_optimize_message() en spi_async()."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.10",
|
||||
"matchCriteriaId": "0F5C3789-472B-40EC-9D2A-48169EDB592B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8b9af6d67517ce4a0015928b3cf35bfd2b1bc1c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c86a918b1bdba78fb155184f8d88dfba1e63335d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,32 +2,102 @@
|
||||
"id": "CVE-2024-42250",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-07T16:15:47.567",
|
||||
"lastModified": "2024-08-07T19:09:46.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:55:19.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: add missing lock protection when polling\n\nAdd missing lock protection in poll routine when iterating xarray,\notherwise:\n\nEven with RCU read lock held, only the slot of the radix tree is\nensured to be pinned there, while the data structure (e.g. struct\ncachefiles_req) stored in the slot has no such guarantee. The poll\nroutine will iterate the radix tree and dereference cachefiles_req\naccordingly. Thus RCU read lock is not adequate in this case and\nspinlock is needed here."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: archivos de cach\u00e9: agregue protecci\u00f3n de bloqueo faltante al sondear. Agregue protecci\u00f3n de bloqueo faltante en la rutina de sondeo al iterar xarray; de lo contrario: incluso con el bloqueo de lectura de RCU mantenido, solo se garantiza que la ranura del \u00e1rbol de base ser anclado all\u00ed, mientras que la estructura de datos (por ejemplo, struct cachefiles_req) almacenada en la ranura no tiene tal garant\u00eda. La rutina de sondeo iterar\u00e1 el \u00e1rbol de base y eliminar\u00e1 la referencia a cachefiles_req en consecuencia. Por lo tanto, el bloqueo de lectura de la RCU no es adecuado en este caso y aqu\u00ed se necesita el bloqueo de giro."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6bb6bd3dd6f382dfd36220d4b210a0c77c066651",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8eadcab7f3dd809edbe5ae20533ff843dfea3a07",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97cfd5e20ddc2e33e16ce369626ce76c9a475fd7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf5bb09e742a9cf6349127e868329a8f69b7a014",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.9.10",
|
||||
"matchCriteriaId": "6FAC1A24-181A-4DB7-801D-4BDF1B4E4116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6bb6bd3dd6f382dfd36220d4b210a0c77c066651",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8eadcab7f3dd809edbe5ae20533ff843dfea3a07",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97cfd5e20ddc2e33e16ce369626ce76c9a475fd7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf5bb09e742a9cf6349127e868329a8f69b7a014",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6124",
|
||||
"sourceIdentifier": "security@m-files.com",
|
||||
"published": "2024-07-29T13:15:10.810",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:24:32.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@m-files.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-6124/",
|
||||
"source": "security@m-files.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:m-files:hubshare:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.0.6.0",
|
||||
"matchCriteriaId": "CF69DBD6-AB20-497F-AA46-9881B022C0EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-6124/",
|
||||
"source": "security@m-files.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6707",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-07T23:15:41.457",
|
||||
"lastModified": "2024-08-08T14:35:14.743",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T20:55:55.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +85,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-006.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openwebui:open_webui:0.1.105:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33127669-DDB0-4B45-9D9D-D3B85CEC7180"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-006.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6881",
|
||||
"sourceIdentifier": "security@m-files.com",
|
||||
"published": "2024-07-29T13:15:10.990",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:24:41.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@m-files.com",
|
||||
"type": "Secondary",
|
||||
@ -73,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-6881/",
|
||||
"source": "security@m-files.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:m-files:hubshare:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.0.6.0",
|
||||
"matchCriteriaId": "CF69DBD6-AB20-497F-AA46-9881B022C0EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-6881/",
|
||||
"source": "security@m-files.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6890",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-07T23:15:41.543",
|
||||
"lastModified": "2024-08-08T14:35:15.090",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T20:53:15.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"type": "Secondary",
|
||||
@ -59,10 +89,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*",
|
||||
"matchCriteriaId": "16D9FF52-C135-4C0E-B182-65D575879BEA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6891",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-08T00:15:40.603",
|
||||
"lastModified": "2024-08-08T14:35:15.340",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T20:53:26.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"type": "Secondary",
|
||||
@ -55,10 +85,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-008.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*",
|
||||
"matchCriteriaId": "16D9FF52-C135-4C0E-B182-65D575879BEA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-008.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6893",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2024-08-08T00:15:40.793",
|
||||
"lastModified": "2024-08-08T14:35:15.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T20:53:37.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*",
|
||||
"matchCriteriaId": "16D9FF52-C135-4C0E-B182-65D575879BEA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6896",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-24T11:15:11.653",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T20:06:25.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +81,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/accelerated-mobile-pages/tags/1.0.96.1/templates/features.php#L7159",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3123278/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/accelerated-mobile-pages/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0a5fdb9-4e36-43ce-88ce-cd75bb1d1e25?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ampforwp:accelerated_mobile_pages:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.97",
|
||||
"matchCriteriaId": "5A2D023D-F0C4-4D95-93D1-E26AC9F3FE60"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/accelerated-mobile-pages/tags/1.0.96.1/templates/features.php#L7159",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3123278/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/accelerated-mobile-pages/#developers",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0a5fdb9-4e36-43ce-88ce-cd75bb1d1e25?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6930",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-24T08:15:03.477",
|
||||
"lastModified": "2024-07-24T12:55:13.223",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-08T20:06:49.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +81,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/booking/trunk/core/lib/wpdev-booking-class.php#L849",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3123628/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/booking/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaca776-03ce-43bb-9553-f455f57124a3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "10.2.2",
|
||||
"matchCriteriaId": "F1BC7743-3A60-4983-9221-37B9176C03CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/booking/trunk/core/lib/wpdev-booking-class.php#L849",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3123628/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/booking/#developers",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaca776-03ce-43bb-9553-f455f57124a3?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7276",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T23:15:03.573",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:25:32.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273145",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273145",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381094",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:alton_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98B59A1A-0B87-48CC-9623-3B2F9836C217"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-4.md",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273145",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273145",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381094",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7277",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T00:15:01.730",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:07:38.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273146",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273146",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381095",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:alton_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98B59A1A-0B87-48CC-9623-3B2F9836C217"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-5.md",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273146",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273146",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381095",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7278",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T01:15:10.130",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:07:50.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-6.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273147",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273147",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381096",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:itsourcecode:alton_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "98B59A1A-0B87-48CC-9623-3B2F9836C217"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE8-6.md",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273147",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273147",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381096",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7535",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2024-08-06T21:16:04.140",
|
||||
"lastModified": "2024-08-07T15:17:46.717",
|
||||
"lastModified": "2024-08-08T20:35:12.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La implementaci\u00f3n inadecuada en V8 en Google Chrome anterior a 127.0.6533.99 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7582",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-07T16:15:47.873",
|
||||
"lastModified": "2024-08-07T19:09:46.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:55:07.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Tenda i22 1.0.0.3(4687). This vulnerability affects the function formApPortalAccessCodeAuth of the file /goform/apPortalAccessCodeAuth. The manipulation of the argument accessCode/data/acceInfo leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Tenda i22 1.0.0.3(4687) y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formApPortalAccessCodeAuth del archivo /goform/apPortalAccessCodeAuth. La manipulaci\u00f3n del argumento c\u00f3digo de acceso/datos/acceInfo provoca un desbordamiento del b\u00fafer. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -105,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -116,22 +150,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/i22/ApPortalAccessCodeAuth",
|
||||
"source": "cna@vuldb.com"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:i22_firmware:1.0.0.3\\(4687\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F879BB6-4F6E-4E81-A24A-3037DBD1A5B2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273862",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273862",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382834",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52D94207-DFC8-478C-BA6B-F0A64BBB3E67"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/i22/ApPortalAccessCodeAuth",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273862",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273862",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382834",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7583",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-07T16:15:48.273",
|
||||
"lastModified": "2024-08-07T19:09:46.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-08T20:54:35.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Tenda i22 1.0.0.3(4687). This issue affects the function formApPortalOneKeyAuth of the file /goform/apPortalOneKeyAuth. The manipulation of the argument data leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en Tenda i22 1.0.0.3(4687) y clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n formApPortalOneKeyAuth del archivo /goform/apPortalOneKeyAuth. La manipulaci\u00f3n de los datos del argumento provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -106,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -116,22 +150,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/i22/ApPortalOneKeyAuth",
|
||||
"source": "cna@vuldb.com"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:i22_firmware:1.0.0.3\\(4687\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F879BB6-4F6E-4E81-A24A-3037DBD1A5B2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273863",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273863",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382835",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52D94207-DFC8-478C-BA6B-F0A64BBB3E67"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BeaCox/IoT_vuln/tree/main/tenda/i22/ApPortalOneKeyAuth",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273863",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273863",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382835",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
70
README.md
70
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-08T20:00:17.133533+00:00
|
||||
2024-08-08T22:00:17.982700+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-08T19:35:22.760000+00:00
|
||||
2024-08-08T21:35:16.680000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -38,51 +38,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
- [CVE-2023-24062](CVE-2023/CVE-2023-240xx/CVE-2023-24062.json) (`2024-08-08T18:15:09.317`)
|
||||
- [CVE-2023-24063](CVE-2023/CVE-2023-240xx/CVE-2023-24063.json) (`2024-08-08T18:15:09.410`)
|
||||
- [CVE-2023-24064](CVE-2023/CVE-2023-240xx/CVE-2023-24064.json) (`2024-08-08T18:15:09.467`)
|
||||
- [CVE-2023-28865](CVE-2023/CVE-2023-288xx/CVE-2023-28865.json) (`2024-08-08T18:15:09.533`)
|
||||
- [CVE-2023-33206](CVE-2023/CVE-2023-332xx/CVE-2023-33206.json) (`2024-08-08T18:15:09.597`)
|
||||
- [CVE-2023-40261](CVE-2023/CVE-2023-402xx/CVE-2023-40261.json) (`2024-08-08T18:15:09.670`)
|
||||
- [CVE-2024-0104](CVE-2024/CVE-2024-01xx/CVE-2024-0104.json) (`2024-08-08T18:15:09.800`)
|
||||
- [CVE-2024-37382](CVE-2024/CVE-2024-373xx/CVE-2024-37382.json) (`2024-08-08T18:15:10.317`)
|
||||
- [CVE-2024-39287](CVE-2024/CVE-2024-392xx/CVE-2024-39287.json) (`2024-08-08T18:15:10.380`)
|
||||
- [CVE-2024-41161](CVE-2024/CVE-2024-411xx/CVE-2024-41161.json) (`2024-08-08T18:15:10.640`)
|
||||
- [CVE-2024-42408](CVE-2024/CVE-2024-424xx/CVE-2024-42408.json) (`2024-08-08T18:15:10.953`)
|
||||
- [CVE-2024-42493](CVE-2024/CVE-2024-424xx/CVE-2024-42493.json) (`2024-08-08T18:15:11.207`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `65`
|
||||
Recently modified CVEs: `46`
|
||||
|
||||
- [CVE-2024-38087](CVE-2024/CVE-2024-380xx/CVE-2024-38087.json) (`2024-08-08T18:45:56.203`)
|
||||
- [CVE-2024-38088](CVE-2024/CVE-2024-380xx/CVE-2024-38088.json) (`2024-08-08T18:31:54.827`)
|
||||
- [CVE-2024-41238](CVE-2024/CVE-2024-412xx/CVE-2024-41238.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-41239](CVE-2024/CVE-2024-412xx/CVE-2024-41239.json) (`2024-08-08T19:04:43.380`)
|
||||
- [CVE-2024-41910](CVE-2024/CVE-2024-419xx/CVE-2024-41910.json) (`2024-08-08T18:15:10.897`)
|
||||
- [CVE-2024-41942](CVE-2024/CVE-2024-419xx/CVE-2024-41942.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-42354](CVE-2024/CVE-2024-423xx/CVE-2024-42354.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-42355](CVE-2024/CVE-2024-423xx/CVE-2024-42355.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-42356](CVE-2024/CVE-2024-423xx/CVE-2024-42356.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-42357](CVE-2024/CVE-2024-423xx/CVE-2024-42357.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-42365](CVE-2024/CVE-2024-423xx/CVE-2024-42365.json) (`2024-08-08T18:55:19.180`)
|
||||
- [CVE-2024-42366](CVE-2024/CVE-2024-423xx/CVE-2024-42366.json) (`2024-08-08T18:55:19.180`)
|
||||
- [CVE-2024-6706](CVE-2024/CVE-2024-67xx/CVE-2024-6706.json) (`2024-08-08T19:05:03.057`)
|
||||
- [CVE-2024-6884](CVE-2024/CVE-2024-68xx/CVE-2024-6884.json) (`2024-08-08T19:35:22.760`)
|
||||
- [CVE-2024-7115](CVE-2024/CVE-2024-71xx/CVE-2024-7115.json) (`2024-08-08T19:06:00.017`)
|
||||
- [CVE-2024-7116](CVE-2024/CVE-2024-71xx/CVE-2024-7116.json) (`2024-08-08T19:08:18.813`)
|
||||
- [CVE-2024-7117](CVE-2024/CVE-2024-71xx/CVE-2024-7117.json) (`2024-08-08T19:11:30.467`)
|
||||
- [CVE-2024-7118](CVE-2024/CVE-2024-71xx/CVE-2024-7118.json) (`2024-08-08T19:02:12.083`)
|
||||
- [CVE-2024-7119](CVE-2024/CVE-2024-71xx/CVE-2024-7119.json) (`2024-08-08T19:01:17.340`)
|
||||
- [CVE-2024-7348](CVE-2024/CVE-2024-73xx/CVE-2024-7348.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-7394](CVE-2024/CVE-2024-73xx/CVE-2024-7394.json) (`2024-08-08T18:55:19.180`)
|
||||
- [CVE-2024-7477](CVE-2024/CVE-2024-74xx/CVE-2024-7477.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-7480](CVE-2024/CVE-2024-74xx/CVE-2024-7480.json) (`2024-08-08T18:55:19.180`)
|
||||
- [CVE-2024-7490](CVE-2024/CVE-2024-74xx/CVE-2024-7490.json) (`2024-08-08T18:55:28.493`)
|
||||
- [CVE-2024-7530](CVE-2024/CVE-2024-75xx/CVE-2024-7530.json) (`2024-08-08T18:35:06.897`)
|
||||
- [CVE-2024-36678](CVE-2024/CVE-2024-366xx/CVE-2024-36678.json) (`2024-08-08T20:59:28.103`)
|
||||
- [CVE-2024-37142](CVE-2024/CVE-2024-371xx/CVE-2024-37142.json) (`2024-08-08T21:17:18.647`)
|
||||
- [CVE-2024-37382](CVE-2024/CVE-2024-373xx/CVE-2024-37382.json) (`2024-08-08T20:35:08.353`)
|
||||
- [CVE-2024-41237](CVE-2024/CVE-2024-412xx/CVE-2024-41237.json) (`2024-08-08T20:53:45.827`)
|
||||
- [CVE-2024-41250](CVE-2024/CVE-2024-412xx/CVE-2024-41250.json) (`2024-08-08T21:35:16.680`)
|
||||
- [CVE-2024-41251](CVE-2024/CVE-2024-412xx/CVE-2024-41251.json) (`2024-08-08T20:35:09.980`)
|
||||
- [CVE-2024-41702](CVE-2024/CVE-2024-417xx/CVE-2024-41702.json) (`2024-08-08T20:31:10.510`)
|
||||
- [CVE-2024-41989](CVE-2024/CVE-2024-419xx/CVE-2024-41989.json) (`2024-08-08T20:35:11.140`)
|
||||
- [CVE-2024-42248](CVE-2024/CVE-2024-422xx/CVE-2024-42248.json) (`2024-08-08T20:55:35.180`)
|
||||
- [CVE-2024-42249](CVE-2024/CVE-2024-422xx/CVE-2024-42249.json) (`2024-08-08T20:55:25.943`)
|
||||
- [CVE-2024-42250](CVE-2024/CVE-2024-422xx/CVE-2024-42250.json) (`2024-08-08T20:55:19.780`)
|
||||
- [CVE-2024-6124](CVE-2024/CVE-2024-61xx/CVE-2024-6124.json) (`2024-08-08T20:24:32.483`)
|
||||
- [CVE-2024-6707](CVE-2024/CVE-2024-67xx/CVE-2024-6707.json) (`2024-08-08T20:55:55.453`)
|
||||
- [CVE-2024-6881](CVE-2024/CVE-2024-68xx/CVE-2024-6881.json) (`2024-08-08T20:24:41.957`)
|
||||
- [CVE-2024-6890](CVE-2024/CVE-2024-68xx/CVE-2024-6890.json) (`2024-08-08T20:53:15.917`)
|
||||
- [CVE-2024-6891](CVE-2024/CVE-2024-68xx/CVE-2024-6891.json) (`2024-08-08T20:53:26.090`)
|
||||
- [CVE-2024-6893](CVE-2024/CVE-2024-68xx/CVE-2024-6893.json) (`2024-08-08T20:53:37.443`)
|
||||
- [CVE-2024-6896](CVE-2024/CVE-2024-68xx/CVE-2024-6896.json) (`2024-08-08T20:06:25.957`)
|
||||
- [CVE-2024-6930](CVE-2024/CVE-2024-69xx/CVE-2024-6930.json) (`2024-08-08T20:06:49.207`)
|
||||
- [CVE-2024-7276](CVE-2024/CVE-2024-72xx/CVE-2024-7276.json) (`2024-08-08T20:25:32.643`)
|
||||
- [CVE-2024-7277](CVE-2024/CVE-2024-72xx/CVE-2024-7277.json) (`2024-08-08T20:07:38.717`)
|
||||
- [CVE-2024-7278](CVE-2024/CVE-2024-72xx/CVE-2024-7278.json) (`2024-08-08T20:07:50.303`)
|
||||
- [CVE-2024-7535](CVE-2024/CVE-2024-75xx/CVE-2024-7535.json) (`2024-08-08T20:35:12.890`)
|
||||
- [CVE-2024-7582](CVE-2024/CVE-2024-75xx/CVE-2024-7582.json) (`2024-08-08T20:55:07.530`)
|
||||
- [CVE-2024-7583](CVE-2024/CVE-2024-75xx/CVE-2024-7583.json) (`2024-08-08T20:54:35.117`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
242
_state.csv
242
_state.csv
@ -102522,7 +102522,7 @@ CVE-2017-20187,0,0,439daba23cb231bf9a3a05cf84608ee08920e004d7fa3d5d3a05b0063643f
|
||||
CVE-2017-20188,0,0,329272b92a1630954b6e2d9259a2b0f82ef555ab5ce6524e8e685ef56f14514b,2024-05-17T01:17:26.920000
|
||||
CVE-2017-20189,0,0,dce97d2fac31f8ad5a1ef7790c7ca57d8c8e31ae0f291f1158d33fc1a1e4dbdb,2024-01-30T23:01:53.763000
|
||||
CVE-2017-2019,0,0,0503760b9e3a588a1928b34508ca8410ada27b38d1650c235dca432cc0f673d6,2023-11-07T02:43:30.710000
|
||||
CVE-2017-20190,0,1,ab9ad5d427f26f97e2dff21ada3d7b6e713ef510acb60c8447bdbfe0a1feac80,2024-08-08T19:35:01.580000
|
||||
CVE-2017-20190,0,0,ab9ad5d427f26f97e2dff21ada3d7b6e713ef510acb60c8447bdbfe0a1feac80,2024-08-08T19:35:01.580000
|
||||
CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353360,2024-05-17T01:17:27.427000
|
||||
CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000
|
||||
CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000
|
||||
@ -137362,7 +137362,7 @@ CVE-2019-20467,0,0,a262a0da4323f751e5d424d90d285d640c26baf67cd9492208f20dcec2dfc
|
||||
CVE-2019-20468,0,0,81a3f4066c0e84ff04bb0b3f5d44c494876099fcd7f5f9297dd99b26595d1c66,2024-07-30T01:15:11.007000
|
||||
CVE-2019-2047,0,0,39d6e243b2ff476db07be9e4ffba0368a9d218b4b325be13c9a06ebb9014f3f9,2021-07-21T11:39:23.747000
|
||||
CVE-2019-20470,0,0,2ad6e14fc14d0d07898b470e5757da49945753375935430bd6841ab8e0d5cf44,2024-08-01T13:41:55.777000
|
||||
CVE-2019-20471,0,1,fde34218ba841754bf23da4de58005edc9af4877a76211d340d30c961207f95e,2024-08-08T18:35:00.500000
|
||||
CVE-2019-20471,0,0,fde34218ba841754bf23da4de58005edc9af4877a76211d340d30c961207f95e,2024-08-08T18:35:00.500000
|
||||
CVE-2019-20473,0,0,e481ac0c66e05ab3e1b4fe31fd83e18f1a11bac975a85144bc7bb11874c7bc9c,2024-08-01T13:41:56.617000
|
||||
CVE-2019-20474,0,0,57e2b48ce5d539e18ac2d72bce93e92561ab9a40d2accc1b68949e376410c01b,2022-01-01T19:54:56.077000
|
||||
CVE-2019-20477,0,0,980075eba63e1b6dba87305a73c4446e3d265aa1cc0ce387abc09a4c8d026438,2023-11-07T03:09:10.187000
|
||||
@ -217762,9 +217762,9 @@ CVE-2023-24058,0,0,16a1b8d2c8f6e9521afc5ad7d9e751bc2a2f51cc265db69a156ca23c3660b
|
||||
CVE-2023-24059,0,0,85c8b3c7e51d4493812abc1130db36e5e554ca89f20febe06dc7c3c22cd7b3bb,2023-02-07T14:19:00.787000
|
||||
CVE-2023-2406,0,0,93360eeb7d23c99f5e3d8592b06b8d380a992d1764480465d68abc46a85ae39a,2023-11-07T04:12:36.890000
|
||||
CVE-2023-24060,0,0,237020e686b9d1fc77a983ae9b232c7b16e133620015d99d897981c2e94f39f4,2023-02-07T19:13:09.287000
|
||||
CVE-2023-24062,1,1,b16090863b472492372cda3ae7019b52dfc5904f2b44c6c14a1599575befa353,2024-08-08T18:55:19.180000
|
||||
CVE-2023-24063,1,1,4986cda0d209054631e4bccd3328891392bae09870f133621a7fd030be12ff42,2024-08-08T18:55:19.180000
|
||||
CVE-2023-24064,1,1,4b8ebaa7b5be0eaddc0d5fd65ac0188284654ea2367d024767f3154a9f52f1dd,2024-08-08T18:55:19.180000
|
||||
CVE-2023-24062,0,0,b16090863b472492372cda3ae7019b52dfc5904f2b44c6c14a1599575befa353,2024-08-08T18:55:19.180000
|
||||
CVE-2023-24063,0,0,4986cda0d209054631e4bccd3328891392bae09870f133621a7fd030be12ff42,2024-08-08T18:55:19.180000
|
||||
CVE-2023-24064,0,0,4b8ebaa7b5be0eaddc0d5fd65ac0188284654ea2367d024767f3154a9f52f1dd,2024-08-08T18:55:19.180000
|
||||
CVE-2023-24065,0,0,c4f145c06edbdba1ae8818e2c25911e6f07b1fec3941d787d994c67eb91e4a9b,2023-02-07T17:29:25.500000
|
||||
CVE-2023-24068,0,0,b2dd8c07d421160046d625a68ed657194371f600a0afa0ab50e87ec10b29f09d,2024-08-02T11:16:10.173000
|
||||
CVE-2023-24069,0,0,31c87c9ec1a1f4e0e7ca7308f0b22f9d6b11a20fcdca63dde72ea3afa1217817,2024-08-02T11:16:10.287000
|
||||
@ -220903,7 +220903,7 @@ CVE-2023-28070,0,0,6b06dac3e6645bdcdf2daa8669376f0eb71633f1db849c20838f9de3974a9
|
||||
CVE-2023-28071,0,0,ac8ad066b4568a2740ef70c8b83380502d2da7385bb0318b9932a819e6b4c283,2023-06-30T21:17:54.033000
|
||||
CVE-2023-28072,0,0,890c8c3e435d94e75601ba5f3f01cc951f80d11c3fba8ba23584cdbf9590ee73,2023-09-08T13:58:40.990000
|
||||
CVE-2023-28073,0,0,c0805fe755dae08afe34203444849dc743ef82b285490ed67a8b997664d73c67,2023-06-30T21:17:26.547000
|
||||
CVE-2023-28074,0,0,d519b22ca8dce85f07cae30100aef96e070a92674e934608d318c9f5a4496762,2024-07-31T12:57:02.300000
|
||||
CVE-2023-28074,0,1,fb916d5c720bb63452b933abdb318f183ce9654f08dc928dceaa476158bdcf30,2024-08-08T21:14:12.313000
|
||||
CVE-2023-28075,0,0,263fb4056eae49bf0d178dd7eda3048b6eedb73f77bd02c9854e350cf9c199f0,2023-08-22T22:11:00.903000
|
||||
CVE-2023-28076,0,0,49f73a0b782d30b42b8832cdfd6102bec5b80abbc6c6645b8949d1e69a2e7e37,2023-05-25T18:55:37.740000
|
||||
CVE-2023-28077,0,0,864f1d99379daf3c5d006eb293792bffe251fd714ed14e7eec5fb2504cc09dd7,2024-02-15T18:40:41.303000
|
||||
@ -221671,7 +221671,7 @@ CVE-2023-2886,0,0,477489445a6f471cd3651b117fbf09416c16a3d7a4e7e46e8dd7486e10c87d
|
||||
CVE-2023-28862,0,0,1af0d4a2a1f54e0c65748ae11dcf6c8d306e7ce5050f714cb8bd21304ffd2ff4,2023-07-14T13:15:09.167000
|
||||
CVE-2023-28863,0,0,47766741f1006ac4798c9ff9c0198c57e84673376f14da345580715999ec1335,2024-07-03T01:39:52.190000
|
||||
CVE-2023-28864,0,0,324e76b8a1dbbfe673722acba31555a0a11e3e449df86950e1771c91d26b1827,2023-07-27T03:47:50.647000
|
||||
CVE-2023-28865,1,1,a690f96d4d055e488f88d43d5f0e459124e94286062b0ad973c4e339764814fa,2024-08-08T18:55:19.180000
|
||||
CVE-2023-28865,0,1,443490698e50f8055a614407ce75b775567b108409a252296d899886b81d1390,2024-08-08T20:35:00.890000
|
||||
CVE-2023-28866,0,0,943391c7b240adde0202bacb48afef5edfa2b7d2d32f1761a9ddbf651b944ce4,2023-11-07T04:10:55.740000
|
||||
CVE-2023-28867,0,0,318a66eaa8452f89942f53703d11d40849d2cc65087bebb0348dcf4f3572c7cb,2023-04-03T14:01:07.433000
|
||||
CVE-2023-28868,0,0,e275a03d8640a97b2d96fd845bc40f2c87b07888c0c512aa8d3aec81f7c1a577,2023-12-12T22:35:26.717000
|
||||
@ -224966,7 +224966,7 @@ CVE-2023-33201,0,0,2597fe221e1f761d6b3e6cbfd030eadf4704e1547f552dc061c463420a08a
|
||||
CVE-2023-33202,0,0,e7e7f7c9ba650dcbf0171405662b00bcdfd5e41c4d322835f858a2d745b8a7ec,2024-01-25T14:15:25.783000
|
||||
CVE-2023-33203,0,0,cf97be42175c0d354e6941d64dd260b17cae783a76d09f7b56e470976d97a999,2023-05-26T16:52:01.157000
|
||||
CVE-2023-33204,0,0,6e4260f72baf73d6ea1ccb7950395df7ee85b3280176ec814ba5c18c1ed8d5f6,2023-11-07T04:14:46.243000
|
||||
CVE-2023-33206,1,1,8012d772113aa4efeb69b677c5c4507cd8b12aafc03328abda41a85d63486c43,2024-08-08T18:55:19.180000
|
||||
CVE-2023-33206,0,0,8012d772113aa4efeb69b677c5c4507cd8b12aafc03328abda41a85d63486c43,2024-08-08T18:55:19.180000
|
||||
CVE-2023-33207,0,0,db833585ca058f88a52ecdd20945cb37b2537bb7bd89e56de798e340453ba00b,2023-11-16T23:42:11.750000
|
||||
CVE-2023-33208,0,0,452d00abc7c8385efc2c332f0818f4d3115f3a0e717b56374cce97c1d1eaf069,2023-08-31T18:40:52.317000
|
||||
CVE-2023-33209,0,0,d8369996175c8373d5bfa6cb0ed4b69f08c78793d48f6b2cda42411d5f915879,2023-12-26T21:36:15.107000
|
||||
@ -230179,7 +230179,7 @@ CVE-2023-40254,0,0,27efb0368168d79caa00b4133031d8fb68b34ecfd132b042a5961f412575e
|
||||
CVE-2023-40256,0,0,b582804fa33a295156ceb4267c834e483bb86e84c99d0ec7c8c39444912512fe,2023-08-18T18:40:02.253000
|
||||
CVE-2023-4026,0,0,3212945c551dc5c1719d7d6137de0348751110a933425a5bf5f780d8b6cb15ce,2023-11-07T04:22:03.850000
|
||||
CVE-2023-40260,0,0,05bb0576fb08380ea903522d60f06a904bc360b72ae4772cbb05cfc33464fa32,2023-09-20T21:15:11.697000
|
||||
CVE-2023-40261,1,1,d8ec471e8c2b753f37616258061af933cdc1f0280e07e09bd8a2fae39bb2c84d,2024-08-08T18:55:19.180000
|
||||
CVE-2023-40261,0,0,d8ec471e8c2b753f37616258061af933cdc1f0280e07e09bd8a2fae39bb2c84d,2024-08-08T18:55:19.180000
|
||||
CVE-2023-40262,0,0,d58d63bce35087dda362e1111aeac9b1b75c4bd8ea1442d999e9a4301c6860b7,2024-02-15T04:33:52.467000
|
||||
CVE-2023-40263,0,0,5624dd31a999eb07813388b5a3ed101dece0ae7506f50c2ff15d5500eaaece55,2024-02-15T04:33:23.013000
|
||||
CVE-2023-40264,0,0,f7a83c86b7c4bdbb55bbbd88d882459ecf055d59ca4c58a5bc50d5b8349b6af0,2024-02-16T20:56:44.780000
|
||||
@ -236327,7 +236327,7 @@ CVE-2023-48893,0,0,5043ec8dc2f1768fadeb39d099a00fdee7291c475c685e34a7d4cf80fe0e4
|
||||
CVE-2023-48894,0,0,a8ac6b0e77117c087418b4211860ce42b56dfbcebdd512bfef2c5168662c0ee4,2023-12-06T18:48:22.700000
|
||||
CVE-2023-4890,0,0,a20402f4d56a9a3e121227aa9e4a1781edc3cee12ae92ab661db6592110635ab,2023-11-07T04:23:08.510000
|
||||
CVE-2023-48901,0,0,531f6d3614843d157a3c9dc6e101bfcf96a5f8efa37d961dda35dcbf99be2006,2024-08-06T17:35:02.180000
|
||||
CVE-2023-48902,0,1,e66dc38bb79946c160d1da0897afd2ba808308e6cfda5fb4cfee782308be2c46,2024-08-08T19:35:03.727000
|
||||
CVE-2023-48902,0,0,e66dc38bb79946c160d1da0897afd2ba808308e6cfda5fb4cfee782308be2c46,2024-08-08T19:35:03.727000
|
||||
CVE-2023-48903,0,0,c36eea55d7ebb58b6550658aa069864d729af997931b2f0f1cd8f0bd7c2c2e23,2024-08-05T14:35:02.280000
|
||||
CVE-2023-48906,0,0,dcf61e4baeea39a70a46cf16ef25f7d94c12ff2d2949997b5a61f61056a26263,2024-04-02T12:50:42.233000
|
||||
CVE-2023-48909,0,0,6e26fded8220754411f0b0c0969e60ad89d13528c1e447cb4c30f373b2f2fd1f,2024-01-22T16:33:28.663000
|
||||
@ -236743,7 +236743,7 @@ CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39
|
||||
CVE-2023-49545,0,0,2026852fe298b5835ad85e1eea0f18e4689a742c4986c111d1c98765d7287b86,2024-03-01T22:22:25.913000
|
||||
CVE-2023-49546,0,0,42c4c73e286dbbc54bb4d1edee710426f74da9660183ef38c8db0ddb322c4c0d,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49547,0,0,0d72f4b66aa616990dce257fb750379ef931b2acf59d9d176a6ef0cb0371efa7,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49548,0,0,a5babf6cfe0f4495a0403c5e873aa9de10bd174fa5a7dce561b73f9ae2fa5fce,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49548,0,1,34b77376d27ee723d3ac14898631fa76b657dfe4cf5b3276c3299d37e41dd1fc,2024-08-08T20:35:02.323000
|
||||
CVE-2023-49549,0,0,2421b127f456be0fc67abfad0a3b1f8926786d5d65fc8c1f3d22621b1f55fe3e,2024-01-09T16:18:48.520000
|
||||
CVE-2023-49550,0,0,7ae937633cac81d402082fd3accd1e23add1012de733df462c7764bee6d5f1af,2024-01-05T23:53:00.187000
|
||||
CVE-2023-49551,0,0,c39928dbbcafcc495be1d779471454ab022468143dcd2570ffe92db6608ec687,2024-01-05T23:53:48.113000
|
||||
@ -240971,12 +240971,12 @@ CVE-2024-0097,0,0,828e0d6edaac74d80e85e7cd248c4487f7d9ed2e02d8d361934a62f860a855
|
||||
CVE-2024-0098,0,0,069a5c23019341513ba5e45eb7cd80085fa3c5305327bc38e3233b2410f520d3,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0099,0,0,a353a072382bc9c8f100deeb43f065f1ec38735a442f0652f39ff4a5b9a341a3,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0100,0,0,f536814b5676db735894c02187696008c7cf1b3d39286954ee01bd7aaee5fdca,2024-05-14T16:13:02.773000
|
||||
CVE-2024-0101,0,1,e05385cc33ee9826ecfb9b850d6c047d48e9cbc40731cddfee9987a45953dd02,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0102,0,1,9281c0dd21fa4a6ba10451d2ce8db4dc465e5b0d2d5ede46729e28d1c30e2d60,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0101,0,0,e05385cc33ee9826ecfb9b850d6c047d48e9cbc40731cddfee9987a45953dd02,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0102,0,0,9281c0dd21fa4a6ba10451d2ce8db4dc465e5b0d2d5ede46729e28d1c30e2d60,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0103,0,0,eebac6a0b28b06a0ab4b619fce7f6cf8faf596bcdcd276c9218b76333b76bf05,2024-06-17T12:43:31.090000
|
||||
CVE-2024-0104,1,1,d8bcd6e809d941165bede9e7513dc9cd703b11fdc2885a0daf273de4ae59c1c4,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0107,0,1,04e059eed29d1073bf6cbd89ce6e56260688f648aed9825b306f4fe58b9fe238,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0108,0,1,cca1e739954a9a1fd809df6166e99578c9bee5616f50180f0b07bead1a8c898a,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0104,0,0,d8bcd6e809d941165bede9e7513dc9cd703b11fdc2885a0daf273de4ae59c1c4,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0107,0,0,04e059eed29d1073bf6cbd89ce6e56260688f648aed9825b306f4fe58b9fe238,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0108,0,0,cca1e739954a9a1fd809df6166e99578c9bee5616f50180f0b07bead1a8c898a,2024-08-08T18:55:19.180000
|
||||
CVE-2024-0151,0,0,76f8e609c18c3e1a4007c23b03249fd06e27f5de1d5adec60540b40f497459b7,2024-04-25T08:15:07.420000
|
||||
CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000
|
||||
CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000
|
||||
@ -241168,7 +241168,7 @@ CVE-2024-0361,0,0,099f63dfe6ef6f045795d1c1f261ce3442f12eb2a9bc4fc8d1a0c0a4910340
|
||||
CVE-2024-0362,0,0,b4244f5075182d36857a3d31f46901793e11476ad07b4e06f8aa7550902287ca,2024-05-17T02:34:34.077000
|
||||
CVE-2024-0363,0,0,dc140b84d2b93f6d9fdb2135224ba7c6f1b0866e706ccd94a1520e115fe4f69e,2024-05-17T02:34:34.177000
|
||||
CVE-2024-0364,0,0,89e81c51b97b3fa4977f0ceaa750e44461eb89bdab95c05a0962bfc35bfa9a80,2024-05-17T02:34:34.293000
|
||||
CVE-2024-0365,0,0,be5db27a60990b71ca41a71ffa3ace09ff439529674023f370d970a475bf4320,2024-03-18T19:40:00.173000
|
||||
CVE-2024-0365,0,1,90be84835231633c01fdbdc876383664ba6ce46c7c856e07d298328ab29391a3,2024-08-08T21:35:01.163000
|
||||
CVE-2024-0366,0,0,9291345e89d8d8b05bbeff5e5d3ebc279878f08bb5528e59c3e3169a28037632,2024-02-13T17:05:59.177000
|
||||
CVE-2024-0367,0,0,072086e2f5c88d722f88e09d99efa680e87c902d14e82a03ad0dc0bb1177679a,2024-04-01T01:12:59.077000
|
||||
CVE-2024-0368,0,0,7857fb18cfdffa3549d28d2c09e616003fba3c5a7bd3e57424dbda35ce87f07d,2024-03-13T18:16:18.563000
|
||||
@ -241629,7 +241629,7 @@ CVE-2024-0849,0,0,ce52f8a887fecf568efe799909be263408438f15742acffd08ea3233d3bef3
|
||||
CVE-2024-0851,0,0,f71017226a428253d7e6f7557fb0ae0457b9beec038f9e66758c71c8032e7938,2024-05-28T12:39:28.377000
|
||||
CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b72,2024-05-03T13:15:21.320000
|
||||
CVE-2024-0854,0,0,078c838d6b39f270536d9d77e44ca7ffaa60bd2fba9534d52e2f6ab03b587b3d,2024-01-30T17:01:37.127000
|
||||
CVE-2024-0855,0,0,d6a852138d81a2f1a5b951678ed9f076f0450cdd1094ad4d8554eefd8ccce592,2024-02-27T14:20:06.637000
|
||||
CVE-2024-0855,0,1,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
|
||||
CVE-2024-0856,0,0,57dcbb77f49261c559595393dec7218c8ffe17fa18f8a7a2f49fba5a38e340b4,2024-08-05T19:35:01.477000
|
||||
CVE-2024-0857,0,0,eb17afdc7dc1bf92b321f990519fddd6b2895b42e203d3876b1bb54222e90b64,2024-07-22T09:15:04.457000
|
||||
CVE-2024-0858,0,0,0cac4e7a1bf81dbbbf49fb45b774f9b9d61dff98c8323a87e06b4f2eb2f216bd,2024-03-18T19:40:00.173000
|
||||
@ -242631,7 +242631,7 @@ CVE-2024-1932,0,0,2d36cde105fc296303955f0190d0c15735ef44ac96e1b6b85b1708703d6ff7
|
||||
CVE-2024-1933,0,0,7fbc0f24622f50a410caa37f8d4d0022d31f3ba694aaa208855480ee88f0fabb,2024-03-26T17:09:53.043000
|
||||
CVE-2024-1934,0,0,df6bc0820efaa227ff0593f2f377a2941dbe3870867c525b59689743a10c0b3a,2024-04-10T13:23:38.787000
|
||||
CVE-2024-1935,0,0,ca5903a177c0640c0e970926382a56ffbeaa4621c2c3291cf867a2ac2d3da56b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1936,0,0,b663fea20770354eab8754ae6925549962e39174687f5155b204d5fec65f6ae3,2024-03-23T12:15:08.453000
|
||||
CVE-2024-1936,0,1,3c4877f8a7a72f4b22538c5fabddaf31798256327c12415bddcc418bc5a6e33c,2024-08-08T21:35:03.480000
|
||||
CVE-2024-1937,0,0,7a30bc166390d821e1f1e23579a9b82c6e7a58933428574c00dfd39409fe3c39,2024-07-16T13:43:58.773000
|
||||
CVE-2024-1938,0,0,c00952c8fb5bee70009fa8cb4edae0ee23e0cf49f38d1396820ee571c21d4610,2024-03-07T23:15:07.177000
|
||||
CVE-2024-1939,0,0,bb8e8d14c3c98da37e63f3c0963deaed3de9feadfccc15528efb01aca2c53754,2024-03-07T23:15:07.250000
|
||||
@ -242991,7 +242991,7 @@ CVE-2024-20698,0,0,a60010c037f6b47d92f2aa100f7d8a53d79be2eb5769a2c8e9d02ceb6254a
|
||||
CVE-2024-20699,0,0,bbde4aa236aa5bd1aaf9161e47fb1a1aee0558a0b300c08e5e21499a50eacae3,2024-06-11T15:15:58.073000
|
||||
CVE-2024-2070,0,0,5d32ea05e6f2f66047d01700931546aa730f575dbd8fb6cf9e3d97d558acf9d7,2024-05-17T02:38:01.770000
|
||||
CVE-2024-20700,0,0,48c4885aac74f6e4a736d19a626247228a5eb1d7955c526892b2cec51e0346df,2024-05-29T00:15:16.493000
|
||||
CVE-2024-20701,0,1,80320ca61fab502542e730745151e818c2a19100ed46caffbb8a3cda6ff93522,2024-08-08T18:50:27.110000
|
||||
CVE-2024-20701,0,0,80320ca61fab502542e730745151e818c2a19100ed46caffbb8a3cda6ff93522,2024-08-08T18:50:27.110000
|
||||
CVE-2024-20709,0,0,cfe59cb3498fcb40cb3ff855c0f48bc1a0141b54054cb56a4ea6efd6294dc34c,2024-01-23T19:28:38.997000
|
||||
CVE-2024-2071,0,0,694e18ae25b2b51379d53ff5f9db1f2ed56a6e502a066bf83b179959b5ef82d4,2024-05-17T02:38:01.863000
|
||||
CVE-2024-20710,0,0,a31e0c272fde0903cb50f7f7397256d7cb7e241ae25eb1c9f7898bc928ac22b9,2024-01-12T19:14:08.107000
|
||||
@ -243662,7 +243662,7 @@ CVE-2024-21445,0,0,1e9644529a4c09a7e7b867fd24131ae695337874b20e05fc2c8f29a74f020
|
||||
CVE-2024-21446,0,0,d91af89ff77312fee55a3cb5f9839f37302d10ad728d89077b6cfd938f9718c3,2024-04-11T20:15:32.857000
|
||||
CVE-2024-21447,0,0,bcb33d59d4cc54b7944f70b43838b78d2de28c13052766332282f9f8eec5b1e5,2024-04-10T13:24:00.070000
|
||||
CVE-2024-21448,0,0,40142b83431d484ca38acbb788d7523f2721d5755a5a237be8e19334b7e92f0f,2024-05-29T00:15:36.470000
|
||||
CVE-2024-21449,0,1,fff61c3bafc8b68912dea981e752397a37789f3c781b7739d1962849387eb766,2024-08-08T18:50:39.357000
|
||||
CVE-2024-21449,0,0,fff61c3bafc8b68912dea981e752397a37789f3c781b7739d1962849387eb766,2024-08-08T18:50:39.357000
|
||||
CVE-2024-2145,0,0,827ab96169cf8c47e9ce401a991ae891b3ddee0c4e3c5089f0bba0550e86a7e8,2024-05-17T02:38:04.100000
|
||||
CVE-2024-21450,0,0,25401a86ed4cf6aee58f7dc7ff8bede6f2584b071ad1edcb27bf966a0a91c76a,2024-04-11T20:15:33.050000
|
||||
CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e67982f,2024-04-11T20:15:33.143000
|
||||
@ -243886,7 +243886,7 @@ CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fc
|
||||
CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000
|
||||
CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000
|
||||
CVE-2024-21759,0,0,6a61d7cb7523f60aeda71efe4ce4dc64f1500a7a1399f02108eff6d901e5e1da,2024-07-09T18:18:38.713000
|
||||
CVE-2024-2176,0,0,80131f1514b7a218cc14dd21be1865574c1fb2c805a5c149607a3b649fcc6e78,2024-03-23T03:15:12.287000
|
||||
CVE-2024-2176,0,1,2ba78cf020993deed98ae980ebb92c5b68a22bb08492374d068beaa29a78e2e2,2024-08-08T21:35:08.447000
|
||||
CVE-2024-21761,0,0,2f2a716518ed143d836c780b247de3ae3910c7d7d968185283e0e6563fd7349d,2024-03-21T21:04:27.653000
|
||||
CVE-2024-21762,0,0,84db6239690371b7c5c10ef720dbcf2d622d5440e87b70d1c21a79a857f8ea72,2024-02-13T18:21:14.607000
|
||||
CVE-2024-21763,0,0,d8d7d7a6603289e83c84acd8db83028421c70629bc8061b793ed05808f5d1ea3,2024-02-14T18:04:45.380000
|
||||
@ -245427,7 +245427,7 @@ CVE-2024-24093,0,0,14e5230c16c4af460c68647fa9203bde6e56c21bc1a3208cb017e8bb36864
|
||||
CVE-2024-24095,0,0,a293063a01db5092273515cc6c1fbe86e89299406200e6a2f03c1a4a2a21fbc6,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24096,0,0,be98bfd34c594b5bc2f148848abf51a12eec4301e64123b58bf793ff254827e3,2024-02-27T14:20:06.637000
|
||||
CVE-2024-24097,0,0,fac0898f527625e2c3336ba1bc4bf6bd2a8e244bb9d5499d446769299fde892b,2024-03-13T12:33:51.697000
|
||||
CVE-2024-24098,0,0,36510a74f62db63a0ffc70ed1efd3598f57e18ba47f3733d4bd46b587c041333,2024-03-05T18:50:18.333000
|
||||
CVE-2024-24098,0,1,e685e688e8d421091dd6b9de1a2931d14c9c45e1d20db0290f58fd035af8ce09,2024-08-08T21:35:04.617000
|
||||
CVE-2024-24099,0,0,106424d5dd252a8067092f196ee1623013d2ca7ff4d8cbd94321c3cf9db85cbc,2024-02-27T14:20:06.637000
|
||||
CVE-2024-2410,0,0,83127872af9993e0cf76f9668e41f5f9f61d019a9eb5dfde8649175f2ae3af10,2024-05-03T14:17:53.690000
|
||||
CVE-2024-24100,0,0,dd6222af6668a38ef11cef8691c924d234988a8adb5d83e51c4cd77b6952005e,2024-02-27T14:20:06.637000
|
||||
@ -245517,7 +245517,7 @@ CVE-2024-24301,0,0,09fef4ec6b3f7e08d0238c798debb077539e76e61034c99c0f3a3241209eb
|
||||
CVE-2024-24302,0,0,772bc3946fe7698710ee11197feaab740359b0c096b2ee136ddb7f1dcb856d06,2024-07-03T01:48:15.277000
|
||||
CVE-2024-24303,0,0,1b8ff87407101e3ade8b623ffad8ec7905f9dec8c0366ab6b55ba0460b0fea60,2024-02-14T19:38:18.727000
|
||||
CVE-2024-24304,0,0,da2049d6e037296a577319f7d1190adf56def2498ce12560f8feb099b85c1170,2024-02-14T19:54:48.247000
|
||||
CVE-2024-24307,0,1,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a16b,2024-08-08T19:35:10.177000
|
||||
CVE-2024-24307,0,0,2fcf14ca38bab8cba1cdf2b8a636d3012bd525398130d18348b221d8feb4a16b,2024-08-08T19:35:10.177000
|
||||
CVE-2024-24308,0,0,1c7b217f4d07f1cef0d4c8802d8e004cd219229214920fa463f6f25f09db8557,2024-02-15T19:34:49.943000
|
||||
CVE-2024-24309,0,0,74ad226e5a232da1142911f5bab25c55d444703b053d90d81df4ec63a1f3a3f6,2024-08-01T13:47:25.043000
|
||||
CVE-2024-2431,0,0,dd32a7ce0f7c35ba1e9622f905a1fe8fb75316c93f0f97412aef8e5b2aa9d804,2024-03-13T18:15:58.530000
|
||||
@ -245569,7 +245569,7 @@ CVE-2024-24407,0,0,544874ccd7bf190605b1eed09e8dcc374c7eae5526ea68f4038bca85f79c4
|
||||
CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf668f,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2444,0,0,e31eeadc09066c1dc3e9c8bff5535c580671ecbf75102f0d9cdc50af45578df2,2024-04-08T18:49:25.863000
|
||||
CVE-2024-2444,0,1,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000
|
||||
CVE-2024-2445,0,0,4580fbdabeda1a44cff89d119283db83c12561dfbbac9584647c19bac102f840,2024-03-15T12:53:06.423000
|
||||
CVE-2024-2446,0,0,ef51f957632ec98e360c50fa0db196c0f3cfe0183f1093005f40b796022ec810,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c74ac,2024-02-07T22:03:09.897000
|
||||
@ -246432,7 +246432,7 @@ CVE-2024-25807,0,0,842f9a5e9e10408e46e0a439e695cbb579bc0c4b444593c08bc5ab70315f1
|
||||
CVE-2024-25808,0,0,56823cb1538bf83b266e824a90333c1b7a15dc68defca54aafe7f2be4923b4ee,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000
|
||||
CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565764,2024-08-04T12:35:05.137000
|
||||
CVE-2024-25817,0,0,9751936b38e23682bc0a4e2248c7e3d318b471c4b00ba97b7b3e641f5178af1a,2024-03-06T15:18:08.093000
|
||||
CVE-2024-25817,0,1,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000
|
||||
CVE-2024-25828,0,0,b9208d07acefc5f8bb86b1c0a1d3e2fb74dd5ed4c91b559369b12aa7bea3504d,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000
|
||||
CVE-2024-25830,0,0,bac0044490e1e709c15b4ae97f78c483fec5c64b2ded09434a42484853de56a5,2024-02-29T13:49:29.390000
|
||||
@ -246447,7 +246447,7 @@ CVE-2024-25842,0,0,736e250418b11146265cf45361dced64a8491e4f350e928a460a06d6e9546
|
||||
CVE-2024-25843,0,0,b7ce35c602cb66544422a9541b1ca352e3e23db5766bb19933b8ddd232d2536b,2024-02-28T14:06:45.783000
|
||||
CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c127b,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25845,0,0,951e74ea3ea891e8023acd490009fca43f510ba7102419911edb4e33d96aa8f4,2024-03-08T14:02:57.420000
|
||||
CVE-2024-25846,0,0,f1629990334a4370d4e99576c944221d6f6d0ee63890f8ef9c099f5169b53262,2024-02-28T14:06:45.783000
|
||||
CVE-2024-25846,0,1,1b01ded1319f85d0e1b31b4bad3147fa711a456779b7a8a2cc484b2fe23c37c9,2024-08-08T20:35:05.147000
|
||||
CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde784,2024-08-01T13:47:53.253000
|
||||
CVE-2024-25848,0,0,6c1bfa77711841ec03ded833f1894e9609b79f14cb4ec6bb43654b13a2cb7b3b,2024-03-08T14:02:57.420000
|
||||
CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000
|
||||
@ -246849,7 +246849,7 @@ CVE-2024-26266,0,0,cd4c3538fa5abe1895c4c4433d10b2216b10f5bef416f2e6936da725b6d98
|
||||
CVE-2024-26267,0,0,526b093bece853e53698efa67210e9eb2a6f80299ca5ca39b60b96f837bf6a69,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93cc1f,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000
|
||||
CVE-2024-2627,0,0,b690bc68352335233b064e5aa3eff2ebfe4278b3ba8da6585574ab5de091cbd9,2024-04-01T15:22:56.233000
|
||||
CVE-2024-2627,0,1,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000
|
||||
CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000
|
||||
CVE-2024-26275,0,0,21e67c06e24d408ad1a549f766b54f5dfd1b4842df576d827b739e2a28d49505,2024-06-11T12:15:14.017000
|
||||
CVE-2024-26276,0,0,7406f6551c3634363606a828a01f36a4203616ca4676532db244783183501388,2024-06-11T12:15:14.153000
|
||||
@ -247275,7 +247275,7 @@ CVE-2024-26849,0,0,25376421f8e268085706cb9a45ce988a2ed5db66e27372f0da148d22949e9
|
||||
CVE-2024-2685,0,0,f0d9422c947d37e56aa28ba2337c0cc54722ca03a7f38746070a195f54e41bf1,2024-05-17T02:38:25.380000
|
||||
CVE-2024-26850,0,0,00873ff9f8e756bee297702b0ccb8c4cb86947a18a9f440307dec32d2671e27c,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26851,0,0,db15a16c2aaa5df1966c0d1fc1201f533eed60aedce750b1fd551ab9bdc5ed3e,2024-06-27T13:15:56.800000
|
||||
CVE-2024-26852,0,1,f16b4b6a26c173280cdf4127a7f9df17c3c84e7730b4a7576c1fcabfce595e92,2024-08-08T19:35:11.773000
|
||||
CVE-2024-26852,0,0,f16b4b6a26c173280cdf4127a7f9df17c3c84e7730b4a7576c1fcabfce595e92,2024-08-08T19:35:11.773000
|
||||
CVE-2024-26853,0,0,827c2cb8caefeecde1c32072d63c4255951fe7e076c638214179f90ffb2959fb,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26854,0,0,71382c729dcbfb61122fea21c2172ded949fa87a0f12accbe08dbcfd7b75a577,2024-07-03T01:49:55.907000
|
||||
CVE-2024-26855,0,0,e888087f68858cd8e18a3fb9ad8ef9b69bd71878372dd5f633aa7569383e87f8,2024-06-25T22:15:24.110000
|
||||
@ -247300,7 +247300,7 @@ CVE-2024-26871,0,0,163b20ef3bcb237a106dee1f35f93c51d1f8bd86dcab5270708465faef3c0
|
||||
CVE-2024-26872,0,0,e1be30e0f1b63fecb16069be5a8c042987bcba62c1848ca23e7ab104e4ef6a99,2024-06-25T22:15:24.450000
|
||||
CVE-2024-26873,0,0,3a3877364dd5fcf82056d7626734c3d2cb4100f26dd0fb338b1cc2ce0a4b26cc,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26874,0,0,d4a2e66139b6c5571ffb5ddc01a62942368f4cbaf11ad33866910988dca15e98,2024-06-27T13:15:56.957000
|
||||
CVE-2024-26875,0,1,776f032242ac1e7add152fd2be17e01c5c12995fa4d824d950364492e82d131a,2024-08-08T19:35:13.037000
|
||||
CVE-2024-26875,0,0,776f032242ac1e7add152fd2be17e01c5c12995fa4d824d950364492e82d131a,2024-08-08T19:35:13.037000
|
||||
CVE-2024-26876,0,0,87a49be69760f9088fe2bba4db9cde6d323af69b323688fc0bb6fc1e935e16b5,2024-04-17T12:48:07.510000
|
||||
CVE-2024-26877,0,0,7b5237ee65908468f328c7475b98e7a4207eb826410a8157a34c13278e5cb653,2024-06-25T23:15:26.897000
|
||||
CVE-2024-26878,0,0,138eb74473aa6d1d3b5705c5c5f6c3f05d9798e9a389f668cd4f717014b9b6e0,2024-06-27T12:15:21.783000
|
||||
@ -247335,7 +247335,7 @@ CVE-2024-26903,0,0,02f8db8e283ea09bbfc4f021b4a46017f09af264e6504d48377e1408e0255
|
||||
CVE-2024-26904,0,0,465375d12896d369ba32f0f5a9c1b1a82fd461e229bd66d68713d6d3b21eb08e,2024-05-21T07:15:08.260000
|
||||
CVE-2024-26905,0,0,3a7eec9b90564e2a68e23468690a383dcd20d922935be237a30b806b26ccb711,2024-07-29T13:15:10.593000
|
||||
CVE-2024-26906,0,0,42532862975f8bdf6c218bb08e8c76f0bdeb5f292a8c20c2de1b8755512c9a2b,2024-06-25T22:15:25.877000
|
||||
CVE-2024-26907,0,1,446b7fe6bd3521bdad8e0df3b9aa51c6dd91773148f15c64fb12a798e319ec1b,2024-08-08T18:35:02.500000
|
||||
CVE-2024-26907,0,0,446b7fe6bd3521bdad8e0df3b9aa51c6dd91773148f15c64fb12a798e319ec1b,2024-08-08T18:35:02.500000
|
||||
CVE-2024-26908,0,0,5ecc683879bcc08f4a65e6b0675afebd2da7cfed4f9fada740f88a540c7f8b1e,2024-04-30T08:15:17.140000
|
||||
CVE-2024-26909,0,0,e3d7941f07403bc0745f4894278d17e22a07c87692715dac5395fbc71a84fef3,2024-04-29T19:45:21.680000
|
||||
CVE-2024-2691,0,0,1606e90bf9d34cf5f4f3495983392fa55577ead311870fa1dbee6afe3a0927f6,2024-08-07T22:20:28.833000
|
||||
@ -247959,7 +247959,7 @@ CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6a
|
||||
CVE-2024-27680,0,0,7dbacde6159cf116347148af7decce95acf3333fb08b589a9a3c4e3e2bf44c68,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27683,0,0,6945b3b4a0f16e3d60bedd1efd7fcebd9cc07ccdf5e7c69a6139d72e53300ecb,2024-04-11T12:47:44.137000
|
||||
CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27689,0,0,11845b441e345ffe2a02d29a5898e538521f40614419a365535fc9204302e936,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27689,0,1,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000
|
||||
CVE-2024-2769,0,0,4ce409110b7519da5af6e8ebe0cc3e53d83319a867f728e76ce04b1f4c62c385,2024-05-17T02:38:29.300000
|
||||
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
|
||||
CVE-2024-27694,0,0,ae7bf3b211028d282f997fe080b53d7dbd8277270cbb44dbcd90c920ce9d7df4,2024-08-01T13:48:43.923000
|
||||
@ -248285,7 +248285,7 @@ CVE-2024-28095,0,0,1b7acaa11106b6d74288d818dfca388e6351fd1c0dbffb28e0398973e1fb6
|
||||
CVE-2024-28096,0,0,679332b852b198a191524d7939debd10043967e93fcdf797223e7b95817f3c6f,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28097,0,0,1e714ff081f75be1b3ee22b5d36486d5d25c1e1c2a12f4c3670fc60e11795587,2024-03-07T13:52:27.110000
|
||||
CVE-2024-28098,0,0,a3390b45f79ac863f2a20b2c3ada499f63a8ad935bf5543c4181b41c5c888248,2024-05-01T17:15:30.747000
|
||||
CVE-2024-28099,0,0,2eeb676082f4a3c3e95bcb4d3b30606433f80b064cf3a29df975f2b8d61d4757,2024-04-15T13:15:31.997000
|
||||
CVE-2024-28099,0,1,8f1689aeaa10ea090718a334cb7e59baeb2881501c10cf07896051b5dcb601cc,2024-08-08T20:35:06.277000
|
||||
CVE-2024-2810,0,0,a6138bc48d0ad782bdb60e8557544808b5ef91a2fc4ce0cda3b3c53204635cd7,2024-05-17T02:38:31.447000
|
||||
CVE-2024-28101,0,0,a1f8d89ff6e2fe4f9ee7b88d676867a71496a3d21b3393b755ab9f1348fee98d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28102,0,0,2e25e475353b428725cda7fe0e916bc49ec4c129ea0b8f2f75fa8309f53bf0d3,2024-03-21T12:58:51.093000
|
||||
@ -249585,7 +249585,7 @@ CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f
|
||||
CVE-2024-3016,0,0,de2146827057d4173ad33d38353b5e127fb8228c688e81e98737f0f3b35e8a6f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000
|
||||
CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000
|
||||
CVE-2024-30163,0,0,39ca1a6132e6e2f204e77b2ff440d28a7ab8af49f5189024790e4d8e4bf99e0f,2024-06-07T19:24:09.243000
|
||||
CVE-2024-30163,0,1,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000
|
||||
CVE-2024-30164,0,0,3fa9289f0559618e7bad46ffe5b89aecd709c72c162900fb09331245f882a216,2024-07-03T01:53:52.840000
|
||||
CVE-2024-30165,0,0,516d72029cdecb5325a90c1123b764a62c24a7b3a4fe7fb9f30a6bc38aa2d8cb,2024-07-03T01:53:53.630000
|
||||
CVE-2024-30166,0,0,50687ad455f93a12b9f6c9dbf505813d14042f7054e41b037f825261eb3f0951,2024-08-01T15:35:09.177000
|
||||
@ -250648,7 +250648,7 @@ CVE-2024-31581,0,0,a8f654e30b255f2c44b72bd4501be7afaa5ed440cafc9227701cc50788da1
|
||||
CVE-2024-31582,0,0,fdfb7c4e9d820ba8ae8e65d5d2f5939d0226d0aa41883a69840636f401c88641,2024-08-01T13:50:58.913000
|
||||
CVE-2024-31583,0,0,5718d662ef0fc7a2030b838f396484569e04f36192be74d5dc7dbf12e0d69994,2024-07-03T01:55:12.663000
|
||||
CVE-2024-31584,0,0,b7635e33f3da4b67c08efe7ab25558c0ee24a2c8974cfc1133472b04b1184049,2024-07-03T01:55:13.417000
|
||||
CVE-2024-31585,0,0,6cb0e410fe678bb190acc80b7af7851c70055ef5ae189fefbfb679e0627f584d,2024-06-10T18:15:31.457000
|
||||
CVE-2024-31585,0,1,5643161144c73906727e2ac1f83070a25ed3d1bad45a88038a67c323fd906e8f,2024-08-08T21:35:12.477000
|
||||
CVE-2024-31586,0,0,cc046b8727829f9f83874539c422d0e794e65c7e2b07e31c08215bcda9684cd0,2024-07-03T01:55:14.213000
|
||||
CVE-2024-31587,0,0,e3e3d5f1d6645953ce4a8fb52a078b6a9a5bbeded18553c7535d616e20fdfaf1,2024-08-01T13:50:59.700000
|
||||
CVE-2024-3159,0,0,735e10f02a072f5f58961d071d622cba36c3062fe253c73fecebdca829a10483,2024-04-26T15:59:59.020000
|
||||
@ -250678,7 +250678,7 @@ CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5
|
||||
CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000
|
||||
CVE-2024-3164,0,0,38bea5ea29fb4ffa7766bbe0beb8807abf0c8d405294ac50c0e82ba1bd904579,2024-07-26T14:15:02.560000
|
||||
CVE-2024-31648,0,1,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000
|
||||
CVE-2024-31648,0,0,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000
|
||||
CVE-2024-31649,0,0,8b247291638ecff50896f2aca79dadb1b9c9aa19002fdb0afc961b73616ecbcc,2024-08-01T13:51:03.573000
|
||||
CVE-2024-3165,0,0,80972bb4e4cfe5922196180e44e15963a79521816e646014cac03ba5f7adab4e,2024-07-26T14:15:02.690000
|
||||
CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000
|
||||
@ -251066,7 +251066,7 @@ CVE-2024-32313,0,0,b116247e5c00d5184493232455f468609fa393d89b579971585285365b844
|
||||
CVE-2024-32314,0,0,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000
|
||||
CVE-2024-32315,0,0,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000
|
||||
CVE-2024-32316,0,0,ffea206eb35e029317458be59cb44b8fa7a1becdd91322b99748836c3f7db1d0,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32317,0,0,e88627744c10e0bd88f2e1a9f6219d66fa8db0e356bff9f0744b0ba14323e05f,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32317,0,1,650aa34fc080388d8f2bd6a4a88b6775736a0002394db3f799d9283eb4ac353f,2024-08-08T21:35:13.350000
|
||||
CVE-2024-32318,0,0,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000
|
||||
CVE-2024-3232,0,0,c59a906ca6c3b26e020d4b33cc77d57f43a342f5b3c4ac255f8439d838cfaba1,2024-07-16T18:00:02.110000
|
||||
CVE-2024-32320,0,0,ff00070c0799b87b8918f3636a7d891bdc3943256f60475437c9b0e24ed27cf0,2024-07-03T01:56:10.160000
|
||||
@ -251317,7 +251317,7 @@ CVE-2024-32620,0,0,85e9859841ce948d1529bf9265c5b199e10e1e938238ea78ce808ec9455f9
|
||||
CVE-2024-32621,0,0,806b79c7ca5f50b9fa1d18f42f83a60186d0b7d94afcd8c845a9bca37bec5584,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32622,0,0,cf9770a1b9df9f6f1a800e40872a5efcbb4c06250c59cadaf82c9c48d2e3b950,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32623,0,0,a94c23c0c8f9c3e6770fcdb3523a72ba3a6a1e1fcaadb35697fb50c3e33015a8,2024-07-03T01:56:51.853000
|
||||
CVE-2024-32624,0,1,86e096c2049d0b80094b488954ab97fce68d8a6249b2af872f018934e88b002d,2024-08-08T18:35:04.250000
|
||||
CVE-2024-32624,0,0,86e096c2049d0b80094b488954ab97fce68d8a6249b2af872f018934e88b002d,2024-08-08T18:35:04.250000
|
||||
CVE-2024-32625,0,0,3133aab50841c8a349d70e4488dcb72f990b76173b72979ba8d18b0c9cc689ee,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3263,0,0,1b4809d44673553ac5c413954bed873a76fa136867c6a54bcec9930ce55e0758,2024-05-14T16:11:39.510000
|
||||
CVE-2024-32631,0,0,976960b3233145908ee4314174d96ae9dd1a5e40ad826957114103ac5674a3f1,2024-04-16T13:24:07.103000
|
||||
@ -251525,7 +251525,7 @@ CVE-2024-32853,0,0,a1dca3d4bd42a909fb90bb63c4311872870004374a80c3f2c77a99712953a
|
||||
CVE-2024-32854,0,0,ca09015aea734c79d590c062091997f16b37e268e9b438da15806fb6d9439330,2024-07-03T17:59:14.203000
|
||||
CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a10592cf,2024-06-25T12:24:17.873000
|
||||
CVE-2024-32856,0,0,6d8137a0b9dec706e783082fa3a1037a7f0ce7ef4a6d1bed9d383583e1a8b038,2024-06-13T18:35:19.777000
|
||||
CVE-2024-32857,0,0,ed20271e55d433e86f607295e906a40f62fa167b1723ca128ef11690482d7b99,2024-07-31T12:57:02.300000
|
||||
CVE-2024-32857,0,1,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196183,2024-08-08T21:10:04.773000
|
||||
CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-32859,0,0,03cfa9128131e4e31b6c7a7857fb4f0bbd43d768e740100a365b65d50eaff363,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000
|
||||
@ -252059,7 +252059,7 @@ CVE-2024-33766,0,0,e85f175409d802a24c53d0d157ca20d583441fadf5b5134f3403f5dd4531c
|
||||
CVE-2024-33767,0,0,ff2f0e72bb758b0e28266cb8827bda2c95a9e95708f40257e627c79bc2afc50b,2024-05-01T13:02:20.750000
|
||||
CVE-2024-33768,0,0,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472142,2024-07-03T01:58:42.057000
|
||||
CVE-2024-3377,0,0,1510516d64045a935995422c6fdaee7a2e23965b26ec5e4515131d4dcc176720,2024-05-17T02:39:53.543000
|
||||
CVE-2024-33771,0,1,de5d2b98d044b2716ef74c05bc54a011b73685f9a10e074c8f5b2d8fa561dceb,2024-08-08T19:35:19.960000
|
||||
CVE-2024-33771,0,0,de5d2b98d044b2716ef74c05bc54a011b73685f9a10e074c8f5b2d8fa561dceb,2024-08-08T19:35:19.960000
|
||||
CVE-2024-33772,0,0,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000
|
||||
CVE-2024-33773,0,0,c7722b551c6505584361864d25c2fc2534d918de5122176041a5bccbc9806e89,2024-05-14T16:12:23.490000
|
||||
CVE-2024-33774,0,0,22679a5bc336af838f53ff0ea5722076310c1b6e9ebc2465523e59c3ae5cee65,2024-05-14T16:12:23.490000
|
||||
@ -252199,7 +252199,7 @@ CVE-2024-33955,0,0,74cb745cdb62a336c3f876a0fd00b4b23bbd1044d9dae83da460a24660cf3
|
||||
CVE-2024-33956,0,0,92ede81a948fcf5a2df4670aeb0def8a77bc1add850b4acbb2c9c5d6e0cc712f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-33957,0,0,09bedb02c8e3dd520e4eb895fb68ee9645dd7844e1b831a24ad6b897c0a3bec8,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33958,0,0,7a7168ec64302facb7ecafd694509fffebdd99590b2e576ad77919591906e0e2,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33959,0,0,be6fd7f670b1328bdfc37564b1ac34c10351de104e6269aff09617e3efa74d30,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33959,0,1,7c0cd3b349dca2c5025b80d137d364d4b069eb5d0a51d215a853a38c247c583c,2024-08-08T21:02:25.943000
|
||||
CVE-2024-33960,0,0,d17745e604717d53f9bd9a9910346900a87259f527ec070325bfb24c71beb81b,2024-08-06T16:30:24.547000
|
||||
CVE-2024-33961,0,0,187629ed99c5897491a2a921c1ade8963799907fad5e490c0d4f43b69dbfd91e,2024-08-08T15:28:36.957000
|
||||
CVE-2024-33962,0,0,e897407fdd17a9b2d16f278c5507ecaf565ac0a0fccce4b5a02e7684c73d8ccb,2024-08-08T15:29:37.537000
|
||||
@ -252386,9 +252386,9 @@ CVE-2024-34211,0,0,a5192c74d8099f66009f8c235170ce7402607dfeb9a20ecc84a2abd2966f6
|
||||
CVE-2024-34212,0,0,349c5ceaae711c6c258753506e7441916ed8a606582e8e23b3a895f6369c1db5,2024-07-03T01:59:37.463000
|
||||
CVE-2024-34213,0,0,53d3ba806aa46d773a8e337fee7142388687e212bee6517408c0857d401b6448,2024-07-03T01:59:38.230000
|
||||
CVE-2024-34215,0,0,88585b38adcdb11fabddf85123f183f044f14feba5e8e740334272a1fa850701,2024-07-03T01:59:38.987000
|
||||
CVE-2024-34217,0,1,cfbe2d9832ba74b5e1d2777893445ff1d8f4c83519f8611daa643bf8cd2ff987,2024-08-08T19:35:20.870000
|
||||
CVE-2024-34217,0,0,cfbe2d9832ba74b5e1d2777893445ff1d8f4c83519f8611daa643bf8cd2ff987,2024-08-08T19:35:20.870000
|
||||
CVE-2024-34218,0,0,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5c0d,2024-07-03T01:59:39.750000
|
||||
CVE-2024-34219,0,0,ea2eed625c87236c7b8d1af86ba0c138ca23a455600b33f7e7239f3921492efd,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34219,0,1,e4a328632092998fdaa790d0453e25d1d23aa6d18db916c9ed2e43dfb23e65b7,2024-08-08T21:35:14.163000
|
||||
CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c2e,2024-05-17T02:39:54.907000
|
||||
CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000
|
||||
CVE-2024-34221,0,0,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000
|
||||
@ -252639,7 +252639,7 @@ CVE-2024-34573,0,0,82ca0b9b260238fc8193bf82f5bea85dcdeb8c8fd722769c69f6849636d7f
|
||||
CVE-2024-34574,0,0,3e74c1beadff3fd890d2b5da4de2565dbad760d56326afd390946b5e96fda210,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34575,0,0,393b99ab99d08853751fd9680d36e14a49cd8e34f0aeacbb783a82d97ec9bda1,2024-05-17T18:36:05.263000
|
||||
CVE-2024-3458,0,0,87e528d305caa39d9a35bfd4c8efb11949cfac496f77400f61f34f91d68ca048,2024-05-17T02:39:57.243000
|
||||
CVE-2024-34580,0,1,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000
|
||||
CVE-2024-34580,0,0,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000
|
||||
CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000
|
||||
CVE-2024-34582,0,0,3575cd86cb0cd0d60c587b3ff4f175ef56fea26df4e10b66896d0161802b3d28,2024-07-03T02:00:41.190000
|
||||
CVE-2024-34583,0,0,99a59b61cd99e09dc04b437be3f2aa32c4c55f1e65c2d9d3fcc5d15f08b7b745,2024-07-05T17:12:21.677000
|
||||
@ -253029,7 +253029,7 @@ CVE-2024-35252,0,0,abc4118fdb4313c77e0013cc66829f0782a05e427a95a903d7de17d02f4f0
|
||||
CVE-2024-35253,0,0,4860462cf567d507b35b85f1b338fbe5c52fffbd9f14118ce4fe8c63db46011a,2024-06-20T17:13:17.437000
|
||||
CVE-2024-35254,0,0,45ef78e7aab61785b60639ab749398d66c1fb5a7b87988e5d821011437a5eefa,2024-06-20T16:16:47.070000
|
||||
CVE-2024-35255,0,0,dd2820217033d300b334ae05889b3c3f413c0da4e96707fa039fcafe96b24ff2,2024-06-20T16:31:46.127000
|
||||
CVE-2024-35256,0,1,d5a6ae58fc78f0ff4992cb812a54fe658aa14b0129af650e09b305e064058e54,2024-08-08T18:50:56.197000
|
||||
CVE-2024-35256,0,0,d5a6ae58fc78f0ff4992cb812a54fe658aa14b0129af650e09b305e064058e54,2024-08-08T18:50:56.197000
|
||||
CVE-2024-3526,0,0,3b86e48cdd64c94b1957dd961f1ea8a5609328c0a5fd236d499daf2f49d2a875,2024-05-17T02:39:59.067000
|
||||
CVE-2024-35260,0,0,ade48aea1e03059f4c6e4bf7d0aa3b52cede73bf846ea05896b4e57d53575ded,2024-08-02T03:15:50.793000
|
||||
CVE-2024-35261,0,0,9d9063b6e7979be3a79ef13bd9cc70b3fb0340950dd44d60d9d3d687415ebbe0,2024-07-17T15:48:39.097000
|
||||
@ -253039,8 +253039,8 @@ CVE-2024-35265,0,0,66f306784b0cec4cac480e0b04ab07434b85a607c811d4eded9bc25afd0a6
|
||||
CVE-2024-35266,0,0,72f85b66607ed3ec09a2f90bfb8b5421fbcbe1083bf3c8d31d5232091779c5c4,2024-07-17T15:03:10.610000
|
||||
CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252ec9d,2024-07-17T15:02:22.937000
|
||||
CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000
|
||||
CVE-2024-35271,0,1,cdbfc4395a8e92fe3a40b1fd22607b93e804de72bc708206a369eda6febd9bdc,2024-08-08T18:51:09.090000
|
||||
CVE-2024-35272,0,1,21cbcac35a76cf2546e4b5eabe4cf122629a8c90c7e6d4aea0ac66e3d7194dea,2024-08-08T18:33:14.440000
|
||||
CVE-2024-35271,0,0,cdbfc4395a8e92fe3a40b1fd22607b93e804de72bc708206a369eda6febd9bdc,2024-08-08T18:51:09.090000
|
||||
CVE-2024-35272,0,0,21cbcac35a76cf2546e4b5eabe4cf122629a8c90c7e6d4aea0ac66e3d7194dea,2024-08-08T18:33:14.440000
|
||||
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
|
||||
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000
|
||||
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
|
||||
@ -253690,7 +253690,7 @@ CVE-2024-36127,0,0,f67ed99c9205750d87408264109b0b2da12607ef1d07ca1d5849393d1955e
|
||||
CVE-2024-36128,0,0,9da468fd538eee45c49c6b3a5b681c0b3c17cde174e2675cb22d4e1b048d5007,2024-06-03T19:23:17.807000
|
||||
CVE-2024-36129,0,0,e8b8667180ad871a39015931b777fa59fb290eb036737b8e789f39cbc635a5fb,2024-06-18T17:34:11.873000
|
||||
CVE-2024-3613,0,0,26f9ac2543805748959db0b5d9b33039cf66eba7396fc9c5a9d8ce8ca1f82b38,2024-05-17T02:40:01.607000
|
||||
CVE-2024-36130,0,0,cec210c004cf679cee4b0e6d9b1e0dcb013d95f34b445ff9ceb4c89ae0c1a99a,2024-08-07T15:17:46.717000
|
||||
CVE-2024-36130,0,1,5daafc9b00fcf3187b969d628b25e46bf723690d823cf338032886578aaf0fe7,2024-08-08T21:35:14.980000
|
||||
CVE-2024-36131,0,0,7cbae0360b3625678d44e0c6f79a930cd4bdf2f15198db73385be60dd97ec04f,2024-08-07T15:17:46.717000
|
||||
CVE-2024-36132,0,0,9fe921c383acfb5b9af18eb69a64ef9c79510768f7b6e88506065e82747a5fdc,2024-08-07T15:17:46.717000
|
||||
CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000
|
||||
@ -253997,7 +253997,7 @@ CVE-2024-36586,0,0,4099f0afde3003a22e36cee4a4d1bf00ae6ce9b2ce9c60b9b6a1b88a3ec1a
|
||||
CVE-2024-36587,0,0,bf71d7e5e004f256f035927236d4ac896369318476be83b9c18caf685fe047c0,2024-08-01T13:53:10.050000
|
||||
CVE-2024-36588,0,0,c219e8a7875d89e66958dab0789f7691c4be3c0c05f3a68bfc6f3a9b60c1ba97,2024-06-17T12:43:31.090000
|
||||
CVE-2024-36589,0,0,7d8241af3cf4fd123efae48d04ebf204edc6e9689a6c5e93ab29d83bac6ea2c1,2024-06-17T12:43:31.090000
|
||||
CVE-2024-3659,0,1,2ed718ae28ceb8e4f7d52b0a060fbe45e212746a041da98ae407c89904905fc5,2024-08-08T18:55:28.493000
|
||||
CVE-2024-3659,0,0,2ed718ae28ceb8e4f7d52b0a060fbe45e212746a041da98ae407c89904905fc5,2024-08-08T18:55:28.493000
|
||||
CVE-2024-36597,0,0,6aec838c376f6e37a5f2bf5469ea0204e7e013359b5405a70579bc69e9d4d528,2024-08-08T15:49:26.397000
|
||||
CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a6a8,2024-07-03T02:03:23.817000
|
||||
CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000
|
||||
@ -254023,7 +254023,7 @@ CVE-2024-36674,0,0,596db0f4764134086c028a91606ddd737131283bc4cd84cec3a5aabc9728f
|
||||
CVE-2024-36675,0,0,0db5fa1ab82b2e97328c6f2032396d4de5a6bce3bed4d1bccdefe8e0a70ae3fb,2024-06-11T16:49:10.457000
|
||||
CVE-2024-36676,0,0,a6f2730c67158cf77e7177475d528da2c111a9270c55f8edde3fbb0f8476e94d,2024-07-11T15:05:49.017000
|
||||
CVE-2024-36677,0,0,37e2fcc4931a46171864bd8fa8a49d4adfcd7e64692130c14ffe6332f9c6da02,2024-07-03T02:03:28.667000
|
||||
CVE-2024-36678,0,0,c0825943f1d5219c9624193357755cc06a7e20f8bcb4f135a8b3456b8cac03b6,2024-07-03T02:03:29.450000
|
||||
CVE-2024-36678,0,1,3c00488a43e07b1b9b55530969e379e8c0bdd1c8ec7a2e239ab88f3e29b8f83f,2024-08-08T20:59:28.103000
|
||||
CVE-2024-36679,0,0,9fb435ed750a69ba9d61d741b1b9ae3031a1114fcc5a6ebd4804673d1f8b0c1d,2024-07-03T02:03:30.273000
|
||||
CVE-2024-3668,0,0,760723957a03bd3e6e8f8da9bf14a37cb962a55f21654d65bee4d6a13a6bb613,2024-07-23T19:39:25.253000
|
||||
CVE-2024-36680,0,0,12a9cd305d4b5b8b70c51b6cca94004d4c8d12385813b2e0157ea675419f28d2,2024-07-03T02:03:31.083000
|
||||
@ -254320,7 +254320,7 @@ CVE-2024-37139,0,0,8bcc51f0578107c550f57eda3e8f8169088ed87cca1e5fda916b143e22a12
|
||||
CVE-2024-3714,0,0,4bcb0bea6568f5dfd8667c7519e5c32cf286da2de79c4bdf6bef9437b54c8d03,2024-05-20T13:00:34.807000
|
||||
CVE-2024-37140,0,0,c0e59e0c3820f0b4a910e5eed0fb2eac2eba5c793659c906795da47f31c33278,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37141,0,0,4138154ff13405362c4f0fa9b34cca08a172e0f83625a1ab272957b9a58f67e5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37142,0,0,47d31bb71216f43e1772f3350bb70569945e37eca3562554c3b5cc26beccac57,2024-07-31T12:57:02.300000
|
||||
CVE-2024-37142,0,1,91ad6786bfe324031c2c492b047239c16136d081e58dc0c4b209abb161c2ca89,2024-08-08T21:17:18.647000
|
||||
CVE-2024-37145,0,0,1222762eaa12a0e0a49c86b792d6f13bb19acede2c9bc472eb8e6da85dd8abda,2024-07-02T12:09:16.907000
|
||||
CVE-2024-37146,0,0,c0ed63c770ec79d5a3ba66c3386d10a89c2cf22e01c61def1bf7a85931426fdf,2024-07-02T12:09:16.907000
|
||||
CVE-2024-37147,0,0,ba8c50fbc8db39821634ae7e204809a5bbf05c4c8996a3abdce4e3ee027f0fca,2024-07-11T13:05:54.930000
|
||||
@ -254453,26 +254453,26 @@ CVE-2024-37314,0,0,2a8bc61fa93764cb0fb07c24d5bac1ea60f00f829a9b504f8438b7c40cefc
|
||||
CVE-2024-37315,0,0,78d1052b31ae41f56b435a7566552773a5c40ebb59f83a745739357048c084e1,2024-08-08T16:35:23.750000
|
||||
CVE-2024-37316,0,0,23efa33580c16c198846d8cbc540c3b959c8c6cc5d8e7e643aacce595c39ab53,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37317,0,0,39b0b4317a6651cb59a140f8d7c551e6209dd76ddab831aefab29483d97c356d,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37318,0,1,82690cfe11e6e50a30476df05f4f79df9c950fc779c797746222a6d5488f788f,2024-08-08T18:36:54.347000
|
||||
CVE-2024-37319,0,1,3686b9b3e7ab1d2d1ae743a102fa0469b7c5ebec5d9019efe44c141c29c0c334,2024-08-08T18:39:41.537000
|
||||
CVE-2024-37318,0,0,82690cfe11e6e50a30476df05f4f79df9c950fc779c797746222a6d5488f788f,2024-08-08T18:36:54.347000
|
||||
CVE-2024-37319,0,0,3686b9b3e7ab1d2d1ae743a102fa0469b7c5ebec5d9019efe44c141c29c0c334,2024-08-08T18:39:41.537000
|
||||
CVE-2024-3732,0,0,1e5e3029c64a5f725486d32a5d97f2bbd597392012dab477d1543e258f8bb4ef,2024-04-23T12:52:09.397000
|
||||
CVE-2024-37320,0,1,52cd5355310316c3c1d8ff3bfc1866f0c347a376cdcf040d922cb358cfc3c899,2024-08-08T18:40:08.887000
|
||||
CVE-2024-37321,0,1,3a191e9479e5b6b71ab06432cc1bba0fed6c761564675196ff63873f3627dcd5,2024-08-08T18:40:27.350000
|
||||
CVE-2024-37322,0,1,7890c12be3fc7ae6a0de8c762fd62014d3b44321fc99235fe85b2912fa1528d3,2024-08-08T18:41:20.253000
|
||||
CVE-2024-37323,0,1,3d88d918c2c47bc73a6a00947073f9fb66d566f56aa316d54e38c00b62ca69fc,2024-08-08T18:41:44.730000
|
||||
CVE-2024-37324,0,1,308640419ddff319167bcd6bae859950697f66511d4cb578be7f78476e67f053,2024-08-08T18:42:10.850000
|
||||
CVE-2024-37320,0,0,52cd5355310316c3c1d8ff3bfc1866f0c347a376cdcf040d922cb358cfc3c899,2024-08-08T18:40:08.887000
|
||||
CVE-2024-37321,0,0,3a191e9479e5b6b71ab06432cc1bba0fed6c761564675196ff63873f3627dcd5,2024-08-08T18:40:27.350000
|
||||
CVE-2024-37322,0,0,7890c12be3fc7ae6a0de8c762fd62014d3b44321fc99235fe85b2912fa1528d3,2024-08-08T18:41:20.253000
|
||||
CVE-2024-37323,0,0,3d88d918c2c47bc73a6a00947073f9fb66d566f56aa316d54e38c00b62ca69fc,2024-08-08T18:41:44.730000
|
||||
CVE-2024-37324,0,0,308640419ddff319167bcd6bae859950697f66511d4cb578be7f78476e67f053,2024-08-08T18:42:10.850000
|
||||
CVE-2024-37325,0,0,1d87585535a572046f3269d4a6e53e39d113df4fc37e43ad494b3059408daa64,2024-06-13T18:36:09.013000
|
||||
CVE-2024-37326,0,1,9773c953cba0c27a0b048f1b26ec2c714fe23b316770567e128d392682f706a8,2024-08-08T18:42:31.443000
|
||||
CVE-2024-37327,0,1,4e41c0148a719afc92c9ab685c007c508f37245b341e1c36c572de2d60cfe4ff,2024-08-08T18:42:50.373000
|
||||
CVE-2024-37328,0,1,66b0ddf99d4267d2ddf5b3d9432cf694c4efbd6ffd867ca686aa9fee93d4f03d,2024-08-08T18:43:07.557000
|
||||
CVE-2024-37329,0,1,da1d1e1082bcbf5e1b9ff358dc5e13de5addd1dfba2a9ae1e82a265419b97fc9,2024-08-08T18:43:34.633000
|
||||
CVE-2024-37326,0,0,9773c953cba0c27a0b048f1b26ec2c714fe23b316770567e128d392682f706a8,2024-08-08T18:42:31.443000
|
||||
CVE-2024-37327,0,0,4e41c0148a719afc92c9ab685c007c508f37245b341e1c36c572de2d60cfe4ff,2024-08-08T18:42:50.373000
|
||||
CVE-2024-37328,0,0,66b0ddf99d4267d2ddf5b3d9432cf694c4efbd6ffd867ca686aa9fee93d4f03d,2024-08-08T18:43:07.557000
|
||||
CVE-2024-37329,0,0,da1d1e1082bcbf5e1b9ff358dc5e13de5addd1dfba2a9ae1e82a265419b97fc9,2024-08-08T18:43:34.633000
|
||||
CVE-2024-3733,0,0,f46a385e0f079b92b4bf82f6537b2845f94de0d4fb1f51bc91c30d173674e880,2024-04-25T13:18:13.537000
|
||||
CVE-2024-37330,0,1,43ad8b020e1e2e7b836653135e5107ad1d0f4a4422f58044f21423488370fde0,2024-08-08T18:43:52.897000
|
||||
CVE-2024-37331,0,1,9acb6285e6150f47119d04fb2b425d99c3b0a44d48638f0dc5531dfd938d127c,2024-08-08T18:44:18.053000
|
||||
CVE-2024-37332,0,1,dfaca3f139be3bf36b4d761904308c7fabbd1ce73099f361a0efe436652e8d13,2024-08-08T18:44:37.320000
|
||||
CVE-2024-37333,0,1,709816ae2e1d3bfc31eeaf82e258fdd783bc74b18447a1f705ce3e32db349c74,2024-08-08T18:44:55.343000
|
||||
CVE-2024-37334,0,1,563aef6e59d9745d29b9695dc6399e28c0dd7d331b805dd1482225a5b250d3ef,2024-08-08T18:51:42.747000
|
||||
CVE-2024-37336,0,1,410dea8adcf769dbf6c99783ee79e4122996ff2be4f030bf685fe648f50e8121,2024-08-08T18:45:37.537000
|
||||
CVE-2024-37330,0,0,43ad8b020e1e2e7b836653135e5107ad1d0f4a4422f58044f21423488370fde0,2024-08-08T18:43:52.897000
|
||||
CVE-2024-37331,0,0,9acb6285e6150f47119d04fb2b425d99c3b0a44d48638f0dc5531dfd938d127c,2024-08-08T18:44:18.053000
|
||||
CVE-2024-37332,0,0,dfaca3f139be3bf36b4d761904308c7fabbd1ce73099f361a0efe436652e8d13,2024-08-08T18:44:37.320000
|
||||
CVE-2024-37333,0,0,709816ae2e1d3bfc31eeaf82e258fdd783bc74b18447a1f705ce3e32db349c74,2024-08-08T18:44:55.343000
|
||||
CVE-2024-37334,0,0,563aef6e59d9745d29b9695dc6399e28c0dd7d331b805dd1482225a5b250d3ef,2024-08-08T18:51:42.747000
|
||||
CVE-2024-37336,0,0,410dea8adcf769dbf6c99783ee79e4122996ff2be4f030bf685fe648f50e8121,2024-08-08T18:45:37.537000
|
||||
CVE-2024-3734,0,0,1fa8bbb57ad3bce01ae853c22daddc26dfe02917c61007dac4955ee2123008cc,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37343,0,0,9822edef5552dcf3d43fa2bee27bf9a4a8f63ea4d7138b0de867a8810cd5a703,2024-08-06T13:48:32.297000
|
||||
CVE-2024-37344,0,0,aabf0e402dbd52c1aa2993f072213b9b1a8b4d49253f8eb436c6f5af2aa88369,2024-08-06T13:49:14.817000
|
||||
@ -254499,7 +254499,7 @@ CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c
|
||||
CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000
|
||||
CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000
|
||||
CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000
|
||||
CVE-2024-37382,1,1,4fb35da60d5c84677f2ea0ba29f938ae1e309782d7366c3b4fe2f8096dd387ae,2024-08-08T18:55:19.180000
|
||||
CVE-2024-37382,0,1,6a2a13134b448ae91abd9e9ff5ba85547b30e77ee93bc2eef8a89467e8827b8d,2024-08-08T20:35:08.353000
|
||||
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
|
||||
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
|
||||
CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000
|
||||
@ -254759,7 +254759,7 @@ CVE-2024-37884,0,0,4e6fff0a6361455ad7e37911dc54427d765d3f4a4c4bb46beeffcddf37eec
|
||||
CVE-2024-37885,0,0,17f5559a85e6e9db6ebd185b566af3c7ce60a0f396cf403a1166b89dd6d49182,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37886,0,0,37a2c4f4d6005992267e24a61cfd186fd6016e8e0dba151502269eb8999be1da,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37887,0,0,dd1db8e47a04efe406ac991a9022a48114c0903c568235a94787de1fe87758b4,2024-08-08T16:33:31.063000
|
||||
CVE-2024-37888,0,1,85802cd547dfbbe611f91638c3cc445da6232c116464d4f183fc32c96cfddf76,2024-08-08T18:01:19.233000
|
||||
CVE-2024-37888,0,0,85802cd547dfbbe611f91638c3cc445da6232c116464d4f183fc32c96cfddf76,2024-08-08T18:01:19.233000
|
||||
CVE-2024-37889,0,0,ee014bfb18a496c8142601928a13908bee5aa40300b8bda82e59b1c0a2e0b1e3,2024-08-08T15:31:53.683000
|
||||
CVE-2024-3789,0,0,2bd1998a949e0866cad7ea41db064c445677b92506394ffb5a3d7ae99f99848d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37890,0,0,d8e638c3d74286b0169c02eca757908ace16d60e933c94acfab66b9500a67b5c,2024-06-20T12:44:22.977000
|
||||
@ -254908,8 +254908,8 @@ CVE-2024-38082,0,0,23c6f123e64a1a12cf5b02d5d58cddce4aac695b84d4f46ea5b094849b0d1
|
||||
CVE-2024-38083,0,0,3c2469ed2c873a64c64841f8f046f5b40612bd2c08b8213d90aa91d1b11e6c5b,2024-08-07T16:39:28.940000
|
||||
CVE-2024-38085,0,0,9b225805c27fe0d0f49cd4b33e0b85b6db3f312de1c827973638cc83fbf3b27e,2024-07-12T15:46:00.290000
|
||||
CVE-2024-38086,0,0,4f4a5b4f26b1b47848469ccfcb494665e77622145d878e8bcca629184e833a43,2024-07-12T15:45:05.137000
|
||||
CVE-2024-38087,0,1,e9389c577c197af0a86410125a64446456d804142f17e0af9a55d82f41522df2,2024-08-08T18:45:56.203000
|
||||
CVE-2024-38088,0,1,75112efcb71a9f477730c0c9a37a767c54ff44dcc9d07440920c4abad9f3faa6,2024-08-08T18:31:54.827000
|
||||
CVE-2024-38087,0,0,e9389c577c197af0a86410125a64446456d804142f17e0af9a55d82f41522df2,2024-08-08T18:45:56.203000
|
||||
CVE-2024-38088,0,0,75112efcb71a9f477730c0c9a37a767c54ff44dcc9d07440920c4abad9f3faa6,2024-08-08T18:31:54.827000
|
||||
CVE-2024-38089,0,0,f43516e20a67775fdb300c6589bec8c27ea499a370a6240ad0d19a7cb49660e2,2024-07-12T15:42:39.127000
|
||||
CVE-2024-3809,0,0,e9699ccf97d1a77cdd5a51c26652206ae829b76e33be88373519642da681c26d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38091,0,0,a9751e3868c0a113eedbccdcd34b91f06a8adaf90dbd1405bbcc8c2a2900f94c,2024-07-12T15:35:41.100000
|
||||
@ -255511,7 +255511,7 @@ CVE-2024-39274,0,0,e6293a55fc2e07d4badaf0b6ab097c48e8ef50320910d51d55d3f365db2ff
|
||||
CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39277,0,0,da44e9f6b14f33e5d22339f98a1af8621d431ecd39b0e0bcdb259c56dded4baa,2024-06-24T19:17:48.380000
|
||||
CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000
|
||||
CVE-2024-39287,1,1,5f35ee0c388ca5e0e49a970ea379523932f8098bd51482abd25c3f315609fea4,2024-08-08T18:55:19.180000
|
||||
CVE-2024-39287,0,0,5f35ee0c388ca5e0e49a970ea379523932f8098bd51482abd25c3f315609fea4,2024-08-08T18:55:19.180000
|
||||
CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000
|
||||
CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000
|
||||
CVE-2024-39292,0,0,1e56ccb176115700ab782778ca3caad0c0ce72d927e8ec4deb0eae57f1b32cc4,2024-07-15T07:15:14.940000
|
||||
@ -256444,7 +256444,7 @@ CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a
|
||||
CVE-2024-41144,0,0,beef6d47444f75a70cc53f4dcdee75e777176599a5e18a0e5bf9ea36f35cb6ca,2024-08-01T16:45:25.400000
|
||||
CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000
|
||||
CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000
|
||||
CVE-2024-41161,1,1,d93295a8e71669d3253a3da3085d39953cfdb029c39c49fe6d49270829646664,2024-08-08T18:55:19.180000
|
||||
CVE-2024-41161,0,0,d93295a8e71669d3253a3da3085d39953cfdb029c39c49fe6d49270829646664,2024-08-08T18:55:19.180000
|
||||
CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000
|
||||
CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000
|
||||
CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000
|
||||
@ -256458,9 +256458,9 @@ CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd9
|
||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||
CVE-2024-41226,0,0,f5381931de23c5c05f7ee8bfe76927ab8a3b6cc5523ba53e93ac6154cb968434,2024-08-08T14:35:06.727000
|
||||
CVE-2024-4123,0,0,b9879b7d0937c162f61c7aeebe9319c3ee0d2290b23cb569d74c82da57c569d5,2024-06-04T19:20:30.660000
|
||||
CVE-2024-41237,0,0,6c3bbfd67a2c38c6147b8483ba279472257fc740c0d1572c5fa4e63c27c892fc,2024-08-08T14:35:07.647000
|
||||
CVE-2024-41238,0,1,68ce49440a6a78d81a154e0f36122f89b41ebddb213355e43d24480236625afc,2024-08-08T18:55:28.493000
|
||||
CVE-2024-41239,0,1,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
|
||||
CVE-2024-41237,0,1,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458af2,2024-08-08T20:53:45.827000
|
||||
CVE-2024-41238,0,0,68ce49440a6a78d81a154e0f36122f89b41ebddb213355e43d24480236625afc,2024-08-08T18:55:28.493000
|
||||
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
|
||||
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
|
||||
CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
|
||||
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
|
||||
@ -256473,8 +256473,8 @@ CVE-2024-41247,0,0,b1879234dbb5e4e51537003eb14b996f7ad3d024ec805dab5d73eb6a361d1
|
||||
CVE-2024-41248,0,0,2e3eb92d4ddb9fb73a0d6cd2e0e99894b028d705fe4f5641721da8bf80a9bf4d,2024-08-08T15:07:27.853000
|
||||
CVE-2024-41249,0,0,b36adc3976bd0fd4b1a986a438ce356cce08547870c88e153dfb2ebcd8a73b86,2024-08-08T15:06:48.843000
|
||||
CVE-2024-4125,0,0,16553edd1211e1aa2542535f3455b94ede37886029935c5af09bcd7638ededbf,2024-05-17T02:40:16.937000
|
||||
CVE-2024-41250,0,0,bc95c78a7efc0365fead4119be635c241b3ddedc1c42b75d136374203f86efd4,2024-08-08T15:21:18.130000
|
||||
CVE-2024-41251,0,0,5ba1e81e82ce502a72a5f7e5c5f8e1fac5b8153b5b88fdafbb8f664b9b159757,2024-08-08T15:05:36.537000
|
||||
CVE-2024-41250,0,1,ed2ec7774a8ec7b69d0fb8bbb5a6282e439116063707acc8ce2b97cfaf8b3d0e,2024-08-08T21:35:16.680000
|
||||
CVE-2024-41251,0,1,da008bc6dc7814b48f867f21af4633a6806e17edefa70e303dbf35845dd6cab0,2024-08-08T20:35:09.980000
|
||||
CVE-2024-41252,0,0,6f7260587fe3d806095bb900d28d021360c8fa8615ba7755fc4b11adcc410d82,2024-08-08T15:04:56.287000
|
||||
CVE-2024-41253,0,0,1d15e693bee8ec7e0d17946828828bb61ca6ab7c564466339f09f66ca369a555,2024-08-01T13:58:25.153000
|
||||
CVE-2024-41254,0,0,27d7c2f374106e64ca875d8bdf9e26785b8da013fe899595d0b402d9e5d8a252,2024-08-01T12:42:36.933000
|
||||
@ -256617,7 +256617,7 @@ CVE-2024-41695,0,0,cfeced4f0e3fb4495c4233c92c745e7bccce82ccc90ae4a6ab56dbb48fdfc
|
||||
CVE-2024-41696,0,0,35f7b98c6839466c4d2a4eebac08206f0700aa8aa3101c5b590c4468fe7a3828,2024-07-30T13:32:45.943000
|
||||
CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000
|
||||
CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000
|
||||
CVE-2024-41702,0,0,cdaf376956d976cad8d3300425370c07ba735cd90e9544051b990f59715bdf4d,2024-07-30T13:32:45.943000
|
||||
CVE-2024-41702,0,1,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000
|
||||
CVE-2024-41703,0,0,41c5e0de4e6f71abb99bf65b9b9d8795b6450a23d530f3b9308a194d3b5a310a,2024-08-01T13:59:05.890000
|
||||
CVE-2024-41704,0,0,859a0932f984f671cffc12a925924b508ad9d462f16bdea412375c597ddcb036,2024-08-01T13:59:06.900000
|
||||
CVE-2024-41705,0,0,1186e60c4c15e6e9e0b15aecd586260e87327f5da15827cf4d98592a0e7276c8,2024-08-01T13:59:07.983000
|
||||
@ -256674,7 +256674,7 @@ CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f
|
||||
CVE-2024-41881,0,0,649cc07cf7de21549ce70eef1f2f35714a84b1ff95e773c0e75090d3c6d27c2e,2024-08-01T13:59:13.313000
|
||||
CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41910,0,1,05e8a8305f60931af1e7f6df78a4476b8482c489e829a2c9df8e95a89a5ad19c,2024-08-08T18:15:10.897000
|
||||
CVE-2024-41910,0,0,05e8a8305f60931af1e7f6df78a4476b8482c489e829a2c9df8e95a89a5ad19c,2024-08-08T18:15:10.897000
|
||||
CVE-2024-41911,0,0,ea799ed6f6f9ce65028cdbe045f892be03084ec1245d47535ccbe7b5bf6048c3,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000
|
||||
CVE-2024-41913,0,0,c5a05750f27b10355d3f766241d60c814ca86a61249995cbd8064da18910e8f7,2024-08-06T16:30:24.547000
|
||||
@ -256686,7 +256686,7 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
|
||||
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
|
||||
CVE-2024-41942,0,1,8ed58986637e5db506e212c5a75f4c8c5072af189b8a9bd438a4287ea1fa84e4,2024-08-08T18:55:28.493000
|
||||
CVE-2024-41942,0,0,8ed58986637e5db506e212c5a75f4c8c5072af189b8a9bd438a4287ea1fa84e4,2024-08-08T18:55:28.493000
|
||||
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000
|
||||
@ -256712,7 +256712,7 @@ CVE-2024-41962,0,0,a42e5c6a5a1b3aff5b6cba30b7dbafa96411265920aa021d515ff4195ac31
|
||||
CVE-2024-41965,0,0,744da138649373c91e2d5048d78adcc6a9461c3a3df3b2d3193826fb19936838,2024-08-02T12:59:43.990000
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41989,0,0,e3d9366e4944ee70a1f644e0f033f90114030bc238c696989145584abb2fcfe0,2024-08-07T20:50:04.107000
|
||||
CVE-2024-41989,0,1,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000
|
||||
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-41990,0,0,b1b4d08b70c5ed0ddf71c17c3d353aa9b03b8bfde25019ce9872a054dc1a3d07,2024-08-07T20:49:50.480000
|
||||
CVE-2024-41991,0,0,23cc70ebabb699bae580234461359f8b2840f2b3097752fd221a0b6184a1fd49,2024-08-07T20:48:22.403000
|
||||
@ -256891,10 +256891,10 @@ CVE-2024-42244,0,0,64f9bf8b856af87969559561804111262192afa37aa42ad347e05b54753c2
|
||||
CVE-2024-42245,0,0,fcb264c29551cd3e5d6115618e13535ac0249a42a696c4e8493e8f7d1f5c12ef,2024-08-08T14:53:19.530000
|
||||
CVE-2024-42246,0,0,da0158313668d0853864dbfeb7b41dd897a00dbf2d1500f2de975e9a95c1bed0,2024-08-08T14:52:35.353000
|
||||
CVE-2024-42247,0,0,3e8b3f558d251c3978924ee255c30e74df6492b1da5085ab4e636b80775e9831,2024-08-08T14:52:25.213000
|
||||
CVE-2024-42248,0,0,9daba88013a62f39f5836d2ca2738ebe99311dc207e5be6d1a23f2affcf30263,2024-08-07T19:09:46.290000
|
||||
CVE-2024-42249,0,0,bf365edc2c96a4876083f80ea351bf6e74bd1f39215b48e95af26a5324f39b9e,2024-08-07T19:09:46.290000
|
||||
CVE-2024-42248,0,1,a4c871a843ec4ebaf7266331bbf45bb853808d9d58017b146752d4bde19f2c1f,2024-08-08T20:55:35.180000
|
||||
CVE-2024-42249,0,1,273d2e61a1b49951ffbd8c20389c9c76559ac159ab90b5fda4da3c7651f4a6a8,2024-08-08T20:55:25.943000
|
||||
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
|
||||
CVE-2024-42250,0,0,dfd6a9d9259f9bcb46737f53714c27140f6ba7141f4054a83b1176fd288dd5ec,2024-08-07T19:09:46.290000
|
||||
CVE-2024-42250,0,1,7d78385b950f6f638c0eea124fbfec17d170acdf08ae1ee68e3b5c1e1327945f,2024-08-08T20:55:19.780000
|
||||
CVE-2024-42251,0,0,9b1443129a58369f223ce9211fcacb89bca25929ae14228a775106359b13b990,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42252,0,0,b821d07b5bf5bee048c28561a74457d556fd9d0ceebeb99bfd9b5a58471abeef,2024-08-08T13:04:18.753000
|
||||
CVE-2024-42253,0,0,acfac192925c972e021028901ef1846e104d7f7f457e000983c2cb6592d3dfe9,2024-08-08T13:04:18.753000
|
||||
@ -256914,14 +256914,14 @@ CVE-2024-42349,0,0,d97bc517c9e69f035ec995db0492468328dd387e0dc6614b4ad8bd471c06d
|
||||
CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000
|
||||
CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000
|
||||
CVE-2024-42354,0,1,3f1bfba047fb141567757046bdb6192ec422b00b04118c65ab3125dd3402be23,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42355,0,1,d5381f7fc2dc7c5986b9752ad69f035ea726ee2baf03e319c68a54f11a9d63ce,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42356,0,1,c2e242be1d6748bf4f15cbfb551102f73c9cacaee1889c01c74d636ae8073ac7,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42357,0,1,44c59f521ab962bdb1c0d177d9946b9376c594c5c4074d3cc84883e0698a3e7e,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42354,0,0,3f1bfba047fb141567757046bdb6192ec422b00b04118c65ab3125dd3402be23,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42355,0,0,d5381f7fc2dc7c5986b9752ad69f035ea726ee2baf03e319c68a54f11a9d63ce,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42356,0,0,c2e242be1d6748bf4f15cbfb551102f73c9cacaee1889c01c74d636ae8073ac7,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42357,0,0,44c59f521ab962bdb1c0d177d9946b9376c594c5c4074d3cc84883e0698a3e7e,2024-08-08T18:55:28.493000
|
||||
CVE-2024-42358,0,0,bfdfea3765abe743074eccf4e4988e900f51d95c87e996dc4c204d5e5db7c300,2024-08-07T15:17:46.717000
|
||||
CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000
|
||||
CVE-2024-42365,0,1,2e54df0fe9685a274eda5184f59e86b5df98f2e7c76b4e62d4a2c6ed6be068ba,2024-08-08T18:55:19.180000
|
||||
CVE-2024-42366,0,1,2466463b7f9cca1a29b76bc206fe3dc33faa11a0127772beee97a730e70608c2,2024-08-08T18:55:19.180000
|
||||
CVE-2024-42365,0,0,2e54df0fe9685a274eda5184f59e86b5df98f2e7c76b4e62d4a2c6ed6be068ba,2024-08-08T18:55:19.180000
|
||||
CVE-2024-42366,0,0,2466463b7f9cca1a29b76bc206fe3dc33faa11a0127772beee97a730e70608c2,2024-08-08T18:55:19.180000
|
||||
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
|
||||
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
|
||||
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
|
||||
@ -256935,7 +256935,7 @@ CVE-2024-42398,0,0,1bd47f35d1750f7fdf43bf764c0abf3e2c80a4806a8e0014d8bb69479613f
|
||||
CVE-2024-42399,0,0,a3b1a8c12625bf78004309ad3c67c4b2399a3faf9af89f47117356fbe01bf659,2024-08-07T15:17:46.717000
|
||||
CVE-2024-4240,0,0,c278b752586c1bf53091999087140c7ddb924945ab9e2c19f82d090171b2b4e6,2024-06-04T19:20:33.263000
|
||||
CVE-2024-42400,0,0,92a8d348f7d91e4aa17062b372e7ee2acb9c68b6a9eda447b8043cdc6c95df6b,2024-08-07T15:17:46.717000
|
||||
CVE-2024-42408,1,1,e5d2c20e9880f479571f79feaba8cbd48087331a874716bf56571e7ba2932fca,2024-08-08T18:55:19.180000
|
||||
CVE-2024-42408,0,0,e5d2c20e9880f479571f79feaba8cbd48087331a874716bf56571e7ba2932fca,2024-08-08T18:55:19.180000
|
||||
CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000
|
||||
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
|
||||
CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000
|
||||
@ -256950,7 +256950,7 @@ CVE-2024-42461,0,0,ccfc4466bb15f077fb8e5d551bb285d827a249febd58170e6accc3c96449b
|
||||
CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000
|
||||
CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
CVE-2024-42493,1,1,0b24cb1deed3a57898c8f3524a80c98e86eb3779aa3ca96d4b3513ecdc687514,2024-08-08T18:55:19.180000
|
||||
CVE-2024-42493,0,0,0b24cb1deed3a57898c8f3524a80c98e86eb3779aa3ca96d4b3513ecdc687514,2024-08-08T18:55:19.180000
|
||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
@ -258507,7 +258507,7 @@ CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187
|
||||
CVE-2024-6121,0,0,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6122,0,0,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6123,0,0,75695c59d88081a795c134128ddb6cd1415db185318a55dfce97b139d1d4e40d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6124,0,0,8d25c090cf235b06f2ec76e8f8f482e95e4fdaaa46ccea623efcb0d2a9b85e78,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6124,0,1,19e2ca9a37dcb7444fec6fae03733cf2ad39cdd8bf297b38eab9aa9eaf4e1590,2024-08-08T20:24:32.483000
|
||||
CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000
|
||||
@ -258898,8 +258898,8 @@ CVE-2024-6699,0,0,9d9db768b9c88d760728ad43f917f22b5e5ff8a9965264fbc4d242d1015fef
|
||||
CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000
|
||||
CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000
|
||||
CVE-2024-6706,0,1,368fe1c3fab739e74a8a813ffbef4887e8ddb48011a739592f2aed7de5e469c4,2024-08-08T19:05:03.057000
|
||||
CVE-2024-6707,0,0,c792dc80f91b7e4b45ea7a1b1487bfed6fdc5bec0250d28885774ca401b7c4d5,2024-08-08T14:35:14.743000
|
||||
CVE-2024-6706,0,0,368fe1c3fab739e74a8a813ffbef4887e8ddb48011a739592f2aed7de5e469c4,2024-08-08T19:05:03.057000
|
||||
CVE-2024-6707,0,1,0dfe7a21a9f5f3f2c918856e8a22bd010b2f6875b837d373eb17e1778a3c8459,2024-08-08T20:55:55.453000
|
||||
CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6710,0,0,4e918da09846cceb474e5a8b11ef31c34f74c44e6fb5c62544fbedf363b9f5e1,2024-08-07T21:35:11.673000
|
||||
CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000
|
||||
@ -258976,16 +258976,16 @@ CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9b
|
||||
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
|
||||
CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000
|
||||
CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000
|
||||
CVE-2024-6881,0,0,c7a593beeaed093fd14dcd15598a09b93989985caddc31a572979478e4fff1ed,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6884,0,1,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
|
||||
CVE-2024-6881,0,1,520f7716290babc1617560777d62fc095cd252de40f50f3ed54fb0f967edb111,2024-08-08T20:24:41.957000
|
||||
CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000
|
||||
CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6890,0,0,b493f7bd70bdeb873cbdf2524979e878cc1ca0743f8358dd3fc37c7addf41719,2024-08-08T14:35:15.090000
|
||||
CVE-2024-6891,0,0,4430753a26635e6503a6d16441a998be7c3931a4c0419d868885b0693fc5d654,2024-08-08T14:35:15.340000
|
||||
CVE-2024-6890,0,1,a4b61d6d84db517405e5620d04c7a39034adaee98aaff7a0c1a327ff7affb43d,2024-08-08T20:53:15.917000
|
||||
CVE-2024-6891,0,1,0319d5fe5c9f95304d92792a4ec9eb62a36bb2ecf00a0444185d206c61336dba,2024-08-08T20:53:26.090000
|
||||
CVE-2024-6892,0,0,bc0d9068ca32a5801c1d63fe6f4795dc5c08dc9fc9ea0bef7783b53d20a45087,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6893,0,0,285cb73a7cc1c1a41688e25537ed90b263914746d47ad30eeac40ecdfa9e70f5,2024-08-08T14:35:15.587000
|
||||
CVE-2024-6893,0,1,07759fcd96135a135ba512fb22253857e5bc78dc38f1fd228c0dfc24706d33b4,2024-08-08T20:53:37.443000
|
||||
CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf9262,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6896,0,1,5408a7e80aa3e88cd45cfede99bb9ef131493e304d3dbf46fdd9905f82d27439,2024-08-08T20:06:25.957000
|
||||
CVE-2024-6897,0,0,0bc0c3c85d38c464186c16b9bc40451a421eb7b428d66cf1c3a2509fdf188e66,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6899,0,0,397359020457c655f416abd05bdc982e2cbc9cd703cb46d21be66b71a5df8e91,2024-07-19T13:01:44.567000
|
||||
@ -259005,7 +259005,7 @@ CVE-2024-6915,0,0,414f9ee927dc9f475151b863854f151879a129420ab26b169b33952223f767
|
||||
CVE-2024-6916,0,0,07530be58a74756ca63b407a63f3e63926b78ec1f0980442182c2c4ab60c9be4,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6922,0,0,06f94107ca0d2a59d9bc293905aa46a216c7a8ead08ee7b0b3a0f5d8d9c7d0a8,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6923,0,0,5f80c19d7aba57d9ca3502e05808684f0f6d62047a1b2b6de15ae6be51d0a228,2024-08-07T15:15:56.337000
|
||||
CVE-2024-6930,0,0,de9484f0df1ac338aa3b09c73b4d890cbda7e2129d6e265be8ed1831a07d234d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6930,0,1,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000
|
||||
CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6934,0,0,2773a2900bf573ac6cdadde3da52af842db87181b62c4a3816dd0aac8b92139a,2024-07-22T13:00:31.330000
|
||||
@ -259099,11 +259099,11 @@ CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d5
|
||||
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7106,0,0,4f79551bb831c41c367c51b2f81bdf75eb9c94a2549b6a3ae035069141d77523,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7115,0,1,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
|
||||
CVE-2024-7116,0,1,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000
|
||||
CVE-2024-7117,0,1,0370972c92aa7f9872300d9752d76cebd60622a0fa3aff5d2fb9461dacdb7e43,2024-08-08T19:11:30.467000
|
||||
CVE-2024-7118,0,1,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201aa2,2024-08-08T19:02:12.083000
|
||||
CVE-2024-7119,0,1,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
|
||||
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
|
||||
CVE-2024-7116,0,0,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000
|
||||
CVE-2024-7117,0,0,0370972c92aa7f9872300d9752d76cebd60622a0fa3aff5d2fb9461dacdb7e43,2024-08-08T19:11:30.467000
|
||||
CVE-2024-7118,0,0,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201aa2,2024-08-08T19:02:12.083000
|
||||
CVE-2024-7119,0,0,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
|
||||
CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
|
||||
CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
|
||||
@ -259200,9 +259200,9 @@ CVE-2024-7267,0,0,6e1f5892f7c4e286f75fc26af918a704fab9776a05a707e81dd3145cf47508
|
||||
CVE-2024-7273,0,0,08b55eeeed04c0bbb7f14e00803b2981c3933c2f80c54832a95f5208a289acec,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7274,0,0,6788201314420897e4c9c6ba6deacc95e7d9a0fa193d6b8ed0518ed687cbc19f,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7275,0,0,73b728508a2e1fb139a6a6d96a6d39cb0fa47f6c3f9b9fdd8e3fc0433fa4a3e5,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7276,0,0,47e0b22a39db4f3b96cb4674341816fecd6f82abeb59da97b1db22588166f635,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7277,0,0,5e0b2075ce51543b4c24a0811908a6d5869c5676c5475ad8483a70814ea56a50,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7278,0,0,9b390c5e32596c3a3cae5987d14eb37eb25956fed0fc10ed4854ba30802f1826,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7276,0,1,a277960bca5d831a928fa683ca27cd5e0f80dfef07b8475eaf01f736e513b6db,2024-08-08T20:25:32.643000
|
||||
CVE-2024-7277,0,1,d07c1eb268c7c274994ec109c99051eb3a213fccffe945d0053bb23d3584d464,2024-08-08T20:07:38.717000
|
||||
CVE-2024-7278,0,1,5267f7cc9b490f8ce43fbd3c5c727548e8d87d921907a5839886258517fd2c0e,2024-08-08T20:07:50.303000
|
||||
CVE-2024-7279,0,0,0669689475561d3aca3e4342518c7c69803b8b0cff0c068ccf405f54015dec07,2024-08-08T13:57:09.313000
|
||||
CVE-2024-7280,0,0,48c575b4cf6652b58b84c63bbac6d4cc21fdeb7bed014958b4338538c7c0bccc,2024-08-08T13:56:04.987000
|
||||
CVE-2024-7281,0,0,878e786a4e433c6961a4936be4f0b9e2a9c535f1f3ea5308fabfdd12b567700f,2024-08-08T13:55:33.463000
|
||||
@ -259252,7 +259252,7 @@ CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16
|
||||
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
|
||||
CVE-2024-7342,0,0,b2aae5a9033c72e024dcd6167950e24730a1a54d1040d58948e1e0708313f38d,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7343,0,0,81acd094d4fc0681dfbdfb7143ed5e48e10c433b5dcce0c0a370d97e4141e1d6,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7348,0,1,5e8f627012fccd63e6afc5ceec0844305a80767b52005b87e6aec1f57eda5a6f,2024-08-08T18:55:28.493000
|
||||
CVE-2024-7348,0,0,5e8f627012fccd63e6afc5ceec0844305a80767b52005b87e6aec1f57eda5a6f,2024-08-08T18:55:28.493000
|
||||
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7353,0,0,3261e094ba804f70c4c538de9d35bf008a53b0271751e64c6aecf340751dd360,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7355,0,0,77eb32dc1810199d8dfd56b790a0cc073bb577f44b08cc26474823d677f5cfc6,2024-08-07T15:17:46.717000
|
||||
@ -259281,7 +259281,7 @@ CVE-2024-7377,0,0,893275c8bb4a238cbfa8084a52310ea354a964d2355f34b461a91167cae84e
|
||||
CVE-2024-7378,0,0,e031589c928455427b120173a422978fb12eba7655a2c6ad16165b36bee1f758,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7394,0,1,e251d76b1d6cc83c1cfdea51bdbc268e0da61a740aadd1fc89615c49cceeae2c,2024-08-08T18:55:19.180000
|
||||
CVE-2024-7394,0,0,e251d76b1d6cc83c1cfdea51bdbc268e0da61a740aadd1fc89615c49cceeae2c,2024-08-08T18:55:19.180000
|
||||
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
|
||||
@ -259317,12 +259317,12 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56
|
||||
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
|
||||
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
|
||||
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
|
||||
CVE-2024-7477,0,1,5c2470fac7ebadf2ae3cf56b0fe88a8a814b9834bce7545ba252021bfdc4655d,2024-08-08T18:55:28.493000
|
||||
CVE-2024-7480,0,1,64d465ba825549caaac1f5f0831794e9226d53a768fa9ec822023f1af28e7934,2024-08-08T18:55:19.180000
|
||||
CVE-2024-7477,0,0,5c2470fac7ebadf2ae3cf56b0fe88a8a814b9834bce7545ba252021bfdc4655d,2024-08-08T18:55:28.493000
|
||||
CVE-2024-7480,0,0,64d465ba825549caaac1f5f0831794e9226d53a768fa9ec822023f1af28e7934,2024-08-08T18:55:19.180000
|
||||
CVE-2024-7484,0,0,922e65f90a754867bdae2807b60c4750519990bf6adcc62fb148334df21e54c7,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f97e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7490,0,1,aa59d4ffe54d5b669323c4183f09d592d26845d8e726a2862796ad13803cf019,2024-08-08T18:55:28.493000
|
||||
CVE-2024-7490,0,0,aa59d4ffe54d5b669323c4183f09d592d26845d8e726a2862796ad13803cf019,2024-08-08T18:55:28.493000
|
||||
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7494,0,0,03118698edd12e94cf1110a03a023e325330cda1b40488ab50e531b2e6ace73f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7495,0,0,1d4e0bc3bd3cd1f2a04f242134024d84adf5fd40eab5c711a130f9e16780f0f1,2024-08-06T16:30:24.547000
|
||||
@ -259346,12 +259346,12 @@ CVE-2024-7526,0,0,b7dc1769424faeb68068ce309d6d3523a91a1d4fb4a85465f17d0f1c4d8fc8
|
||||
CVE-2024-7527,0,0,5726c5c54faa1bf1781147fed2e22e549db6ab22b4878ce6040da6bad2504c69,2024-08-06T23:16:00.177000
|
||||
CVE-2024-7528,0,0,b6e9413f9a86c458f79f2237a9adb5674eec1ad41e68eb793e2d9ec404600ca8,2024-08-06T23:16:00.250000
|
||||
CVE-2024-7529,0,0,b88dacd4622bcc7a40dd32b4177b18e58f7bcd9368595fc01c5e421f17f8855a,2024-08-06T23:16:00.317000
|
||||
CVE-2024-7530,0,1,b8218ebe8f8f7d0c60c64f6951f7d0958715ecc66bafe38a6940afb55d245bb6,2024-08-08T18:35:06.897000
|
||||
CVE-2024-7530,0,0,b8218ebe8f8f7d0c60c64f6951f7d0958715ecc66bafe38a6940afb55d245bb6,2024-08-08T18:35:06.897000
|
||||
CVE-2024-7531,0,0,a6ff05a5a66ff77c501f3337329e6ee8c78879bff77c09716ca0c6a78826c209,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7532,0,0,e1061fe3725daaf1e213ad4672dbc9d62732c1e415da1ada3444386388111f36,2024-08-07T16:35:22.457000
|
||||
CVE-2024-7533,0,0,8fd2495ed682530a29e2fedc5921e8f1169344af7cbdf7157b07c88a7eb69c64,2024-08-07T20:35:27.510000
|
||||
CVE-2024-7534,0,0,4fda5d1222e684ca2e49ae25a0f374e2c205c066e85946c4673aebb5b89307f2,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7535,0,0,87878000c4ed6f791be8d351206391b96514cac50e852455bc493668d99eb432,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7535,0,1,2351e7ddc7f13709dab587b8406a687256390bcd7293b813090d4b0443589817,2024-08-08T20:35:12.890000
|
||||
CVE-2024-7536,0,0,b1e72db76516458b78a23dcc13ae3aa1015ac038b5c21bad5fd095c748a00e4f,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7537,0,0,cac12a6937ce18481e876031006fbab26ca4b7876c502da0485cb83b4f4bb24d,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7538,0,0,54464c6cea77354c9f1160315b73ea1ed8ffcd06176d127a8c8becba6ed2b81d,2024-08-06T16:30:24.547000
|
||||
@ -259377,8 +259377,8 @@ CVE-2024-7578,0,0,b6bbbe6806d90851e9605226b169eb3886b74a9a004ee0ed2d1a7a6c6021a1
|
||||
CVE-2024-7579,0,0,817d773679e171b3efe6c6fcafc252202771d29e88541ab785b97216648f2295,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7580,0,0,a04c1980d28f072cd3c5cf5e54bd904877b87e16975e0f75e13ad6ba1d25c144,2024-08-07T20:47:00.277000
|
||||
CVE-2024-7581,0,0,af990567650f3ec82d6a107cfddeff613ee326cc545e2b210702be1eca876f77,2024-08-07T19:59:00.853000
|
||||
CVE-2024-7582,0,0,b2d3b66c4626672326cfa5879fd1bb0c567c41ab2acaf7c209fbd5f365a390bb,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7583,0,0,bc6ffa2c62b37fdf56f2749a782cbb82d0821bb8b7c19b37f044ef4c72e8c76b,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7582,0,1,b5d30de3379d4f1314d865a318bcbb3d58683288c246ed462b10743522033514,2024-08-08T20:55:07.530000
|
||||
CVE-2024-7583,0,1,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cda6,2024-08-08T20:54:35.117000
|
||||
CVE-2024-7584,0,0,4fcdc2a13c9feca59db2e84c5a59d4157b22ea97693367754e992172fea915a0,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7585,0,0,f430436cbc2d07d02eb06f2560db059a8be4c4fc5fe45b044f21a316cfb5ecfc,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user