mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-27T20:00:17.700902+00:00
This commit is contained in:
parent
c6c9b14fcd
commit
06d0f4f5c5
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27604",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-28T08:15:14.697",
|
||||
"lastModified": "2023-09-01T17:11:03.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T19:35:34.593",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36535",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T18:15:14.207",
|
||||
"lastModified": "2023-08-11T14:01:17.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T19:15:08.747",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-602"
|
||||
"value": "CWE-449"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39203",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-11-14T23:15:08.493",
|
||||
"lastModified": "2023-11-21T00:56:35.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T19:15:08.977",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "CWE-789"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39208",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-09-12T20:15:09.007",
|
||||
"lastModified": "2023-09-15T19:11:19.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T19:15:09.143",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-39209",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T22:15:09.517",
|
||||
"lastModified": "2023-08-15T15:24:19.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T19:15:09.267",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nImproper input validation in Zoom Desktop Client for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via network access.\n\n"
|
||||
"value": "Improper input validation in Zoom Desktop Client for Windows before 5.15.5 may allow an authenticated user to enable an information disclosure via network access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-449"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39211",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-08-08T22:15:10.473",
|
||||
"lastModified": "2023-08-15T14:46:49.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T19:15:09.387",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,7 +72,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-4481",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2023-09-01T00:15:08.703",
|
||||
"lastModified": "2023-09-07T19:11:15.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T18:15:03.837",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\n\nWhen certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPDATE message error, or the issue may propagate beyond the local system which will remain non-impacted, but may affect one or more remote systems. This issue is exploitable remotely as the crafted UPDATE message can propagate through unaffected systems and intermediate BGP speakers.\nContinuous receipt of the crafted BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices.\n\nThis issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session.\n"
|
||||
"value": "An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\n\nWhen certain specific crafted BGP UPDATE messages are received over an established BGP session, one BGP session may be torn down with an UPDATE message error, or the issue may propagate beyond the local system which will remain non-impacted, but may affect one or more remote systems. This issue is exploitable remotely as the crafted UPDATE message can propagate through unaffected systems and intermediate BGP speakers.\nContinuous receipt of the crafted BGP UPDATE messages will create a sustained Denial of Service (DoS) condition for impacted devices.\n\nThis issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session.\n Improper Input Validation, Denial of Service vulnerability in Juniper Networks, Inc. Junos OS (BGP, rpd modules), Juniper Networks, Inc. Junos OS Evolved (BGP, rpd modules) allows Fuzzing.This issue affects\u00a0\n\nJunos OS:\u00a0\n\n\n\n * All versions before 20.4R3-S10,\n * from 21.1R1 through 21.*,\n * from 21.2 before 21.2R3-S5,\n * from 21.3 before 21.3R3-S5,\n * from 21.4 before 21.4R3-S7 (unaffected from 21.4R3-S5, affected from 21.4R3-S6)\n * from 22.1 before 22.1R3-S4,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S1,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2.\n\n\nJunos OS Evolved:\n\n\n\n * All versions before 20.4R3-S10-EVO,\n * from 21.2-EVO before 21.2R3-S7-EVO,\n * from 21.3-EVO before 21.3R3-S5-EVO,\n * from 21.4-EVO before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S4-EVO,\n * from 22.2-EVO before 22.2R3-S3-EVO,\n * from 22.3-EVO before 22.3R3-S1-EVO,\n * from 22.4-EVO before 22.4R3-EVO,\n * from 23.2-EVO before 23.2R2-EVO."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50782",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-05T21:15:11.183",
|
||||
"lastModified": "2024-09-05T16:43:20.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-27T19:15:09.603",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -184,13 +184,6 @@
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-254xx/CVE-2024-25411.json
Normal file
29
CVE-2024/CVE-2024-254xx/CVE-2024-25411.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-25411",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T18:15:04.000",
|
||||
"lastModified": "2024-09-27T18:15:04.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1GBL-iY5ZRaxRqLVqpBe1w6dVgEfywAG7/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/flatpressblog/flatpress/pull/261",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/paragbagul111/CVE-2024-25411",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-254xx/CVE-2024-25412.json
Normal file
25
CVE-2024/CVE-2024-254xx/CVE-2024-25412.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-25412",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T18:15:04.100",
|
||||
"lastModified": "2024-09-27T18:15:04.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email field."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1GBL-iY5ZRaxRqLVqpBe1w6dVgEfywAG7/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/paragbagul111/CVE-2024-25412",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-289xx/CVE-2024-28948.json
Normal file
100
CVE-2024/CVE-2024-289xx/CVE-2024-28948.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-28948",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-27T18:15:04.197",
|
||||
"lastModified": "2024-09-27T18:15:04.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacker to partly circumvent the same \norigin policy, which is designed to prevent different websites from \ninterfering with each other."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-333xx/CVE-2024-33368.json
Normal file
60
CVE-2024/CVE-2024-333xx/CVE-2024-33368.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33368",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T19:15:09.830",
|
||||
"lastModified": "2024-09-27T19:35:38.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Plasmoapp RPShare Fabric mod v.1.0.0 allows a remote attacker to execute arbitrary code via the build method in DonwloadPromptScreen"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/apple502j/54e0f80bfe082fd934e33970394adbb8",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/plasmoapp/RPShare",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-333xx/CVE-2024-33369.json
Normal file
60
CVE-2024/CVE-2024-333xx/CVE-2024-33369.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-33369",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T19:15:10.040",
|
||||
"lastModified": "2024-09-27T19:35:39.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in Plasmoapp RPShare Fabric mod v.1.0.0 allows a remote attacker to execute arbitrary code via the getFileNameFromConnection method in DownloadTask"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/apple502j/54e0f80bfe082fd934e33970394adbb8",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/plasmoapp/RPShare",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-345xx/CVE-2024-34542.json
Normal file
100
CVE-2024/CVE-2024-345xx/CVE-2024-34542.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-34542",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-27T18:15:04.453",
|
||||
"lastModified": "2024-09-27T18:15:04.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-261"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
107
CVE-2024/CVE-2024-371xx/CVE-2024-37187.json
Normal file
107
CVE-2024/CVE-2024-371xx/CVE-2024-37187.json
Normal file
@ -0,0 +1,107 @@
|
||||
{
|
||||
"id": "CVE-2024-37187",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-27T18:15:04.690",
|
||||
"lastModified": "2024-09-27T18:15:04.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-261"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
107
CVE-2024/CVE-2024-383xx/CVE-2024-38308.json
Normal file
107
CVE-2024/CVE-2024-383xx/CVE-2024-38308.json
Normal file
@ -0,0 +1,107 @@
|
||||
{
|
||||
"id": "CVE-2024-38308",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-27T18:15:04.933",
|
||||
"lastModified": "2024-09-27T18:15:04.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Advantech ADAM 5550's web application includes a \"logs\" page where all \nthe HTTP requests received are displayed to the user. The device doesn't\n correctly neutralize malicious code when parsing HTTP requests to \ngenerate page output."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-392xx/CVE-2024-39275.json
Normal file
100
CVE-2024/CVE-2024-392xx/CVE-2024-39275.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-39275",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-27T18:15:05.173",
|
||||
"lastModified": "2024-09-27T18:15:05.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a \nsession is closed. Forging requests with a legitimate cookie, even if \nthe session was terminated, allows an unauthorized attacker to act with \nthe same level of privileges of the legitimate user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-539"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-393xx/CVE-2024-39364.json
Normal file
100
CVE-2024/CVE-2024-393xx/CVE-2024-39364.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-39364",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-27T18:15:05.417",
|
||||
"lastModified": "2024-09-27T18:15:05.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Advantech ADAM-5630 \nhas built-in commands that can be executed without authenticating the \nuser. These commands allow for restarting the operating system, \nrebooting the hardware, and stopping the execution. The commands can be \nsent to a simple HTTP request and are executed by the device \nautomatically, without discrimination of origin or level of privileges \nof the user sending the commands."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-270-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-40506",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-26T22:15:03.770",
|
||||
"lastModified": "2024-09-26T22:15:03.770",
|
||||
"lastModified": "2024-09-27T19:35:41.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMHospitality.asmx function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de Cross-Site Scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMHospitality.asmx."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jansen-C-Moreira/CVE-2024-40506",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-40507",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-26T22:15:03.880",
|
||||
"lastModified": "2024-09-26T22:15:03.880",
|
||||
"lastModified": "2024-09-27T19:35:42.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMPersonnel.asmx function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de Cross-Site Scripting en openPetra v.2023.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n serverMPersonnel.asmx."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Jansen-C-Moreira/CVE-2024-40507",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42488",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-15T21:15:17.270",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:49:05.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.14.14",
|
||||
"matchCriteriaId": "4BE0B7D1-49C5-4604-AE7D-4E809E169BE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.15.0",
|
||||
"versionEndExcluding": "1.15.8",
|
||||
"matchCriteriaId": "A0C8F90D-07B3-4666-8C22-089A2DA27A03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/commit/aa44dd148a9be95e07782e4f990e61678ef0abf8",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/pull/33511",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-q7w8-72mr-vpgw",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43366",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-15T21:15:17.520",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:08:11.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:matter-labs:zkvyper:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.3.12",
|
||||
"versionEndExcluding": "1.5.3",
|
||||
"matchCriteriaId": "8FA3840E-F6C9-4B35-B377-79A1ACF032E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/matter-labs/era-compiler-vyper/security/advisories/GHSA-8j77-7rrv-6pxx",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43392",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-09-10T09:15:06.100",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T19:04:26.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,855 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "CD02CC05-860D-442A-B973-643B51E13613"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D624EC2-7CEE-4ADC-A1D2-B0688AE23873"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "0702823F-52B6-40D3-B598-AA6F8745DB85"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0910CB6C-8716-4A79-B43C-EB02B22AB632"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "FDEE0407-9473-4810-BC8D-F9AC44C69219"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA0DA3D1-0599-4364-AF1A-2DAD50382A15"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "053DB989-17D5-49E1-BF0A-814F80D0FF62"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8861227-5A7F-49CA-B0E6-5806C746B5B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "6DB61681-FE91-4EA7-A431-446579A511C1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FD37990-FF75-4323-A8B1-7BEF9A0001D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "234CD8A4-BA72-47A5-8BAF-B449315A2202"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56CE797B-2D4B-41CC-888E-467F64BDB19C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "428076C7-97EC-47C9-B409-C1C9379A6E29"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40F4219D-1822-471E-88C0-7B6F5FB56A00"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "0D64F7DC-B719-46CF-8D6D-0E9CE24E5F31"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F287F24-13AD-4628-B724-E58A9F44E48B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "74CBDC4F-31FE-430A-BD2B-95985E2B8959"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37A2DC0B-6B50-4E38-9585-B131DBCB9F51"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "1E3AAE8C-4A1C-4DA7-B710-F1458E9E472E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50690731-FA99-45B3-AF4C-C1DAD881CAEE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "FF284D31-EA9B-48F3-A261-78672D3A8BF3"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E62C758-015E-4178-BA37-D463F95BD468"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "5E7D20EC-CBAA-48C2-91A9-7964A64C5F51"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA35CCC1-2FE0-4FA7-A360-C2F9849476B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "EC86EA88-023D-477B-9138-6F16DC173EB0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1726B1D9-3CAF-4C11-BB25-C7677B2CEE33"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "CADDBA01-FB75-4B02-B100-28E7BE105C80"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F88246FF-5453-4473-992B-AEEFE88ED41D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "732BF960-A8C6-4BF3-B58E-A142D1349560"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A87B204-19D0-4E12-B462-EB4BB25D196E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "9BA76759-0346-4978-B865-4C11D733A381"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0EEEC9DE-5CF5-4596-B64C-6CAA32110FA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "4DDAE7BE-54B1-472F-80D6-A5B3BC4F9035"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9887CEB-57EA-49A0-9CFD-910DAFE4A09D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "7F1794B6-B631-488C-B7DC-7D3E79C0D9CA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3051DBA5-8D2B-4630-8FA7-602AC7CB4576"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "ABBD929B-2E97-48F6-835E-9B217C846DE8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "428D6C77-0592-4031-933E-2CFE0AB58BA7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "DD719D49-5D66-4E3F-896C-97D0BCF0C2C6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A698B47-3DF4-4FAB-9AA6-425FF823F303"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "B4A8A58D-90BC-4E6B-9CAD-7B8A72ACE990"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADB6EF67-BB61-4661-977B-A4968641E9BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "D8775CE8-282C-498C-9EA2-542338025F1B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FFEEEAD-22B2-49FC-8B2B-583D9DFFB291"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "2B608EB3-6BA1-4D4F-B3E4-31B984CD0B0F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24EB7394-6BE3-44F4-A184-BA438200F532"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "72335756-555D-413F-955B-02F57C6B8C01"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8C3B0286-BD27-4032-B4FF-0A7481356039"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "6CF8B1A6-81B0-4A50-A340-2BA68922F614"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_gt\\/gt:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12FBC961-F834-4334-948A-9FC9E613301D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "EAC710BB-60A5-4F43-AEF3-4BFCA13846F5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA9CB765-BEE4-4318-ADBD-EE241CA9FA31"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "E28ED34B-2510-48B6-A2A8-55EB0937ABCE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FBF005C-9157-49E2-820F-C75B3828EDA1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "050BE7DC-F22E-4022-A113-8A951170617A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "577E14AD-C198-4E8B-AC31-FF89F3EB97C2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "A091DE68-F0CE-480D-BD5E-90BD582ED1AE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B549B2C1-42A9-4D05-B32D-6E08A2BECBEF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.9.3",
|
||||
"matchCriteriaId": "29581AAB-05BC-43F2-9527-1377413529E4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20459672-988A-403E-9073-37F3B38F972E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.vde.com/en/advisories/VDE-2024-039",
|
||||
"source": "info@cert.vde.com"
|
||||
"source": "info@cert.vde.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45682",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-09-17T18:15:04.893",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:54:51.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:millbeck:proroute_h685t-w_firmware:3.2.334:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD91EC69-913E-4A3E-980C-04919D8DEF84"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:millbeck:proroute_h685t-w:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "72373695-D76F-461C-85C8-E3EE2ABC6FFB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-261-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-460xx/CVE-2024-46097.json
Normal file
21
CVE-2024/CVE-2024-460xx/CVE-2024-46097.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46097",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T18:15:05.687",
|
||||
"lastModified": "2024-09-27T18:15:05.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-46097.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-462xx/CVE-2024-46256.json
Normal file
29
CVE-2024/CVE-2024-462xx/CVE-2024-46256.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-46256",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T18:15:05.787",
|
||||
"lastModified": "2024-09-27T18:15:05.787",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Command injection vulnerability in requestLetsEncryptSsl in NginxProxyManager 2.11.3 allows an attacker to RCE via Add Let's Encrypt Certificate."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/blob/v2.11.3/backend/internal/certificate.js#L830",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc466",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/barttran2k/POC_CVE-2024-46256",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-462xx/CVE-2024-46257.json
Normal file
29
CVE-2024/CVE-2024-462xx/CVE-2024-46257.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-46257",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-27T18:15:05.870",
|
||||
"lastModified": "2024-09-27T18:15:05.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Command injection vulnerability in requestLetsEncryptSslWithDnsChallenge in NginxProxyManager 2.11.3 allows an attacker to achieve remote code execution via Add Let's Encrypt Certificate. NOTE: this is not part of any NGINX software shipped by F5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/blob/v2.11.3/backend/internal/certificate.js#L870",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc466",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/barttran2k/POC_CVE-2024-46256",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5170",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-17T06:15:02.310",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:23:43.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-master:logo_manager_for_enamad:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.7.1",
|
||||
"matchCriteriaId": "F90D026C-554E-45FD-9ED4-2382AD67945C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/37b5ed06-0633-49e0-b47d-8aa2f4510179/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6723",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.353",
|
||||
"lastModified": "2024-09-13T16:35:19.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:50:00.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.4.8",
|
||||
"matchCriteriaId": "8ACB959C-9C30-4D30-A6A2-F7792139BFB7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/fbd2152e-0aa1-4b56-a6a3-2e6ec78e08a5/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6785",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2024-09-21T05:15:11.860",
|
||||
"lastModified": "2024-09-26T13:32:55.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:59:25.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
@ -84,6 +104,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@moxa.com",
|
||||
"type": "Secondary",
|
||||
@ -95,14 +125,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moxa:mxview_one:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.1",
|
||||
"matchCriteriaId": "24690651-4F3A-431A-845A-B7CCBD1D24D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moxa:mxview_one_central_manager:1.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33EAC644-D402-43FA-BC54-E193F34C0A1F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05",
|
||||
"source": "psirt@moxa.com"
|
||||
"source": "psirt@moxa.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series",
|
||||
"source": "psirt@moxa.com"
|
||||
"source": "psirt@moxa.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6850",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.437",
|
||||
"lastModified": "2024-09-13T16:35:19.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:30:30.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:majeedraza:carousel_slider:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.2.14",
|
||||
"matchCriteriaId": "4424BA23-8DC8-469D-8F8F-ECA48B538BA2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/c06995cb-1685-4751-811f-aead52a597a7/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7129",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-13T06:15:15.507",
|
||||
"lastModified": "2024-09-13T14:35:07.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:26:27.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nsqua:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.7.43",
|
||||
"matchCriteriaId": "D1C877E3-52DA-428B-8F78-5DAD3B812B36"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/00ad9b1a-97a5-425f-841e-ea48f72ecda4/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7711",
|
||||
"sourceIdentifier": "product-cna@github.com",
|
||||
"published": "2024-08-20T20:15:10.173",
|
||||
"lastModified": "2024-08-21T12:30:33.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:17:05.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "product-cna@github.com",
|
||||
"type": "Secondary",
|
||||
@ -73,18 +105,63 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.11.0",
|
||||
"versionEndExcluding": "3.11.14",
|
||||
"matchCriteriaId": "6ECADA51-1495-4D35-B7C0-6ADED7EDD26D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.12.0",
|
||||
"versionEndExcluding": "3.12.8",
|
||||
"matchCriteriaId": "2C305C7E-C6A2-42F2-A910-203B74C71128"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.13.0",
|
||||
"versionEndExcluding": "3.13.3",
|
||||
"matchCriteriaId": "3A51D9A9-389E-469F-B17C-F5B7CCEEC498"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.14",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.8",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.3",
|
||||
"source": "product-cna@github.com"
|
||||
"source": "product-cna@github.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7817",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:24.503",
|
||||
"lastModified": "2024-09-12T14:35:16.087",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:26:21.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:michalaugustyniak:misiek_photo_album:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.3",
|
||||
"matchCriteriaId": "7E1C6F38-2221-4C85-B84E-F44025A9E13C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/ab09e5a3-f5ea-479f-be2d-366f8707775e/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7818",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:24.570",
|
||||
"lastModified": "2024-09-12T14:35:16.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:18:55.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:michalaugustyniak:misiek_photo_album:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.3",
|
||||
"matchCriteriaId": "7E1C6F38-2221-4C85-B84E-F44025A9E13C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3d2263b9-e1e7-4e86-8475-5e468eef1826/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7820",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:24.633",
|
||||
"lastModified": "2024-09-12T14:35:17.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:08:48.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elliot:ilc_thickbox:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "1924B0D0-1222-4AD8-A1EB-CFDC8B5EA0E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/31b2c97b-2458-43ee-93db-e57968ac8455/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7822",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:24.713",
|
||||
"lastModified": "2024-09-12T14:35:18.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:06:41.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gwycon:quick_code:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "16BE3FC6-16C1-44B1-A1E6-C263F6912020"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3a5bdd7e-7dd5-4749-9fad-ff4d7df20273/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7859",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-12T06:15:24.783",
|
||||
"lastModified": "2024-09-12T14:35:19.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:00:53.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:visual_sound_project:visual_sound:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.03",
|
||||
"matchCriteriaId": "41F38361-06E8-4AE1-B245-2964678C5934"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/88cacd47-d900-478c-b833-c6c55fd4b082/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8043",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-17T06:15:02.467",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:22:43.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:seanschulte:vikinghammer_tweet:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.2.4",
|
||||
"matchCriteriaId": "A1CAEB38-232D-4987-9C8C-1D6F145612A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/2ba27715-add4-4e2c-ad0d-83ebdc26aec1/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8051",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-17T06:15:02.690",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:19:41.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:moc:special_feed_items:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.1",
|
||||
"matchCriteriaId": "820BB7B7-347E-4B9A-8041-898565DED9EC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d5edf7ed-207c-48bb-9226-8647ad4348e4/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8091",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-17T06:15:02.850",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:17:59.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jakesnyder:enhanced_search_box:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.6.1",
|
||||
"matchCriteriaId": "7BE05E47-53B8-4358-958E-332F9B437789"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1ca90b81-7539-4a15-8c5a-39a8d96a74a2/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8092",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-17T06:15:02.920",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:17:24.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:alaingonzalez:accordion_image_menu:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.1.3",
|
||||
"matchCriteriaId": "12FAE228-E9D3-4576-97BF-B4E13EA6999D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d5a91ceb-8a92-4f99-b7b7-1c4e0a587022/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8093",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-09-17T06:15:02.977",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:16:01.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -39,10 +59,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lucasgarcia:posts_reminder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.20",
|
||||
"matchCriteriaId": "4A2F9A65-6861-49AB-B15D-6C34BA5A7769"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/c7fd690a-5f02-491c-a3fb-6eac9ffffe96/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8258",
|
||||
"sourceIdentifier": "cve-coordination@logitech.com",
|
||||
"published": "2024-09-10T09:15:07.497",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:56:41.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@logitech.com",
|
||||
"type": "Secondary",
|
||||
@ -73,22 +105,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:logitech:logi_options\\+:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.60.496306",
|
||||
"versionEndExcluding": "1.70.551909",
|
||||
"matchCriteriaId": "3AB31CA5-5B26-4E90-BEB6-CDC73D0E7648"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/r3ggi/electroniz3r",
|
||||
"source": "cve-coordination@logitech.com"
|
||||
"source": "cve-coordination@logitech.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49314",
|
||||
"source": "cve-coordination@logitech.com"
|
||||
"source": "cve-coordination@logitech.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-50643",
|
||||
"source": "cve-coordination@logitech.com"
|
||||
"source": "cve-coordination@logitech.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.electronjs.org/docs/latest/tutorial/fuses",
|
||||
"source": "cve-coordination@logitech.com"
|
||||
"source": "cve-coordination@logitech.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8490",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-17T08:15:02.227",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:36:00.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
@ -51,22 +71,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.20",
|
||||
"matchCriteriaId": "665A7DB4-D62F-4520-9D35-BF12B833E120"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/propertyhive/tags/2.0.19/includes/class-ph-ajax.php#L1089",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/propertyhive/tags/2.0.19/includes/class-ph-ajax.php#L976",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3152548/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17c06c83-6707-4233-a1c3-ef4cdcf93982?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8761",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-17T09:15:03.060",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-27T18:41:43.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,30 +71,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-unit:share_this_image:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.04",
|
||||
"matchCriteriaId": "E35D8BEE-6E33-4613-8011-3D14170C4F91"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.03/assets/js/sti.js#L693",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.03/includes/class-sti-shortlink.php#L64",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/share-this-image/tags/2.03/includes/class-sti-shortlink.php#L74",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3152564/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/share-this-image/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e72d5c7-c601-4775-a825-4786bbd1b5f0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-91xx/CVE-2024-9160.json
Normal file
78
CVE-2024/CVE-2024-91xx/CVE-2024-9160.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-9160",
|
||||
"sourceIdentifier": "security@puppet.com",
|
||||
"published": "2024-09-27T19:15:10.733",
|
||||
"lastModified": "2024-09-27T19:15:10.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In versions of the PEADM Forge Module prior to 3.24.0 a security misconfiguration was discovered."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@puppet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@puppet.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.perforce.com/s/detail/a91PA000001SXN3YAO",
|
||||
"source": "security@puppet.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-93xx/CVE-2024-9301.json
Normal file
78
CVE-2024/CVE-2024-93xx/CVE-2024-9301.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-9301",
|
||||
"sourceIdentifier": "security-report@netflix.com",
|
||||
"published": "2024-09-27T18:15:06.163",
|
||||
"lastModified": "2024-09-27T18:15:06.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path traversal issue in E2Nest prior to commit 8a41948e553c89c56b14410c6ed395e9cfb9250a"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-report@netflix.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-report@netflix.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2024-004.md",
|
||||
"source": "security-report@netflix.com"
|
||||
}
|
||||
]
|
||||
}
|
91
README.md
91
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-27T18:00:17.858694+00:00
|
||||
2024-09-27T20:00:17.700902+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-27T17:54:52.130000+00:00
|
||||
2024-09-27T19:39:43.350000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,60 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264048
|
||||
264063
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2024-22170](CVE-2024/CVE-2024-221xx/CVE-2024-22170.json) (`2024-09-27T17:15:12.143`)
|
||||
- [CVE-2024-38809](CVE-2024/CVE-2024-388xx/CVE-2024-38809.json) (`2024-09-27T17:15:12.393`)
|
||||
- [CVE-2024-45744](CVE-2024/CVE-2024-457xx/CVE-2024-45744.json) (`2024-09-27T16:15:04.940`)
|
||||
- [CVE-2024-45745](CVE-2024/CVE-2024-457xx/CVE-2024-45745.json) (`2024-09-27T16:15:05.037`)
|
||||
- [CVE-2024-46366](CVE-2024/CVE-2024-463xx/CVE-2024-46366.json) (`2024-09-27T17:15:13.400`)
|
||||
- [CVE-2024-46367](CVE-2024/CVE-2024-463xx/CVE-2024-46367.json) (`2024-09-27T17:15:13.487`)
|
||||
- [CVE-2024-47070](CVE-2024/CVE-2024-470xx/CVE-2024-47070.json) (`2024-09-27T16:15:05.413`)
|
||||
- [CVE-2024-47077](CVE-2024/CVE-2024-470xx/CVE-2024-47077.json) (`2024-09-27T16:15:06.043`)
|
||||
- [CVE-2024-6981](CVE-2024/CVE-2024-69xx/CVE-2024-6981.json) (`2024-09-27T17:15:13.653`)
|
||||
- [CVE-2024-6983](CVE-2024/CVE-2024-69xx/CVE-2024-6983.json) (`2024-09-27T16:15:06.533`)
|
||||
- [CVE-2024-8310](CVE-2024/CVE-2024-83xx/CVE-2024-8310.json) (`2024-09-27T17:15:13.970`)
|
||||
- [CVE-2024-8630](CVE-2024/CVE-2024-86xx/CVE-2024-8630.json) (`2024-09-27T17:15:14.180`)
|
||||
- [CVE-2024-9171](CVE-2024/CVE-2024-91xx/CVE-2024-9171.json) (`2024-09-27T17:15:14.437`)
|
||||
- [CVE-2024-9268](CVE-2024/CVE-2024-92xx/CVE-2024-9268.json) (`2024-09-27T17:15:14.497`)
|
||||
- [CVE-2024-9273](CVE-2024/CVE-2024-92xx/CVE-2024-9273.json) (`2024-09-27T17:15:14.550`)
|
||||
- [CVE-2024-9284](CVE-2024/CVE-2024-92xx/CVE-2024-9284.json) (`2024-09-27T17:15:14.600`)
|
||||
- [CVE-2024-25411](CVE-2024/CVE-2024-254xx/CVE-2024-25411.json) (`2024-09-27T18:15:04.000`)
|
||||
- [CVE-2024-25412](CVE-2024/CVE-2024-254xx/CVE-2024-25412.json) (`2024-09-27T18:15:04.100`)
|
||||
- [CVE-2024-28948](CVE-2024/CVE-2024-289xx/CVE-2024-28948.json) (`2024-09-27T18:15:04.197`)
|
||||
- [CVE-2024-33368](CVE-2024/CVE-2024-333xx/CVE-2024-33368.json) (`2024-09-27T19:15:09.830`)
|
||||
- [CVE-2024-33369](CVE-2024/CVE-2024-333xx/CVE-2024-33369.json) (`2024-09-27T19:15:10.040`)
|
||||
- [CVE-2024-34542](CVE-2024/CVE-2024-345xx/CVE-2024-34542.json) (`2024-09-27T18:15:04.453`)
|
||||
- [CVE-2024-37187](CVE-2024/CVE-2024-371xx/CVE-2024-37187.json) (`2024-09-27T18:15:04.690`)
|
||||
- [CVE-2024-38308](CVE-2024/CVE-2024-383xx/CVE-2024-38308.json) (`2024-09-27T18:15:04.933`)
|
||||
- [CVE-2024-39275](CVE-2024/CVE-2024-392xx/CVE-2024-39275.json) (`2024-09-27T18:15:05.173`)
|
||||
- [CVE-2024-39364](CVE-2024/CVE-2024-393xx/CVE-2024-39364.json) (`2024-09-27T18:15:05.417`)
|
||||
- [CVE-2024-46097](CVE-2024/CVE-2024-460xx/CVE-2024-46097.json) (`2024-09-27T18:15:05.687`)
|
||||
- [CVE-2024-46256](CVE-2024/CVE-2024-462xx/CVE-2024-46256.json) (`2024-09-27T18:15:05.787`)
|
||||
- [CVE-2024-46257](CVE-2024/CVE-2024-462xx/CVE-2024-46257.json) (`2024-09-27T18:15:05.870`)
|
||||
- [CVE-2024-9160](CVE-2024/CVE-2024-91xx/CVE-2024-9160.json) (`2024-09-27T19:15:10.733`)
|
||||
- [CVE-2024-9301](CVE-2024/CVE-2024-93xx/CVE-2024-9301.json) (`2024-09-27T18:15:06.163`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `57`
|
||||
Recently modified CVEs: `43`
|
||||
|
||||
- [CVE-2024-7629](CVE-2024/CVE-2024-76xx/CVE-2024-7629.json) (`2024-09-27T17:32:43.853`)
|
||||
- [CVE-2024-7647](CVE-2024/CVE-2024-76xx/CVE-2024-7647.json) (`2024-09-27T17:31:49.517`)
|
||||
- [CVE-2024-7714](CVE-2024/CVE-2024-77xx/CVE-2024-7714.json) (`2024-09-27T17:35:15.420`)
|
||||
- [CVE-2024-7854](CVE-2024/CVE-2024-78xx/CVE-2024-7854.json) (`2024-09-27T17:27:56.723`)
|
||||
- [CVE-2024-7906](CVE-2024/CVE-2024-79xx/CVE-2024-7906.json) (`2024-09-27T17:54:51.877`)
|
||||
- [CVE-2024-8052](CVE-2024/CVE-2024-80xx/CVE-2024-8052.json) (`2024-09-27T16:55:57.383`)
|
||||
- [CVE-2024-8271](CVE-2024/CVE-2024-82xx/CVE-2024-8271.json) (`2024-09-27T16:21:38.463`)
|
||||
- [CVE-2024-8479](CVE-2024/CVE-2024-84xx/CVE-2024-8479.json) (`2024-09-27T16:12:10.427`)
|
||||
- [CVE-2024-8543](CVE-2024/CVE-2024-85xx/CVE-2024-8543.json) (`2024-09-27T16:46:26.243`)
|
||||
- [CVE-2024-8663](CVE-2024/CVE-2024-86xx/CVE-2024-8663.json) (`2024-09-27T16:35:46.740`)
|
||||
- [CVE-2024-8665](CVE-2024/CVE-2024-86xx/CVE-2024-8665.json) (`2024-09-27T16:59:28.437`)
|
||||
- [CVE-2024-8669](CVE-2024/CVE-2024-86xx/CVE-2024-8669.json) (`2024-09-27T16:08:15.487`)
|
||||
- [CVE-2024-8742](CVE-2024/CVE-2024-87xx/CVE-2024-8742.json) (`2024-09-27T16:28:07.827`)
|
||||
- [CVE-2024-9038](CVE-2024/CVE-2024-90xx/CVE-2024-9038.json) (`2024-09-27T16:11:37.710`)
|
||||
- [CVE-2024-9076](CVE-2024/CVE-2024-90xx/CVE-2024-9076.json) (`2024-09-27T16:14:04.977`)
|
||||
- [CVE-2024-9077](CVE-2024/CVE-2024-90xx/CVE-2024-9077.json) (`2024-09-27T16:31:52.923`)
|
||||
- [CVE-2024-9081](CVE-2024/CVE-2024-90xx/CVE-2024-9081.json) (`2024-09-27T16:17:51.300`)
|
||||
- [CVE-2024-9082](CVE-2024/CVE-2024-90xx/CVE-2024-9082.json) (`2024-09-27T16:18:55.797`)
|
||||
- [CVE-2024-9083](CVE-2024/CVE-2024-90xx/CVE-2024-9083.json) (`2024-09-27T16:20:11.190`)
|
||||
- [CVE-2024-9085](CVE-2024/CVE-2024-90xx/CVE-2024-9085.json) (`2024-09-27T16:19:21.317`)
|
||||
- [CVE-2024-9089](CVE-2024/CVE-2024-90xx/CVE-2024-9089.json) (`2024-09-27T16:21:28.540`)
|
||||
- [CVE-2024-9090](CVE-2024/CVE-2024-90xx/CVE-2024-9090.json) (`2024-09-27T16:22:23.870`)
|
||||
- [CVE-2024-9091](CVE-2024/CVE-2024-90xx/CVE-2024-9091.json) (`2024-09-27T16:22:48.877`)
|
||||
- [CVE-2024-9092](CVE-2024/CVE-2024-90xx/CVE-2024-9092.json) (`2024-09-27T16:23:56.710`)
|
||||
- [CVE-2024-9093](CVE-2024/CVE-2024-90xx/CVE-2024-9093.json) (`2024-09-27T16:26:27.163`)
|
||||
- [CVE-2024-43391](CVE-2024/CVE-2024-433xx/CVE-2024-43391.json) (`2024-09-27T19:38:10.193`)
|
||||
- [CVE-2024-43392](CVE-2024/CVE-2024-433xx/CVE-2024-43392.json) (`2024-09-27T19:04:26.060`)
|
||||
- [CVE-2024-43393](CVE-2024/CVE-2024-433xx/CVE-2024-43393.json) (`2024-09-27T19:36:03.473`)
|
||||
- [CVE-2024-45682](CVE-2024/CVE-2024-456xx/CVE-2024-45682.json) (`2024-09-27T18:54:51.820`)
|
||||
- [CVE-2024-5170](CVE-2024/CVE-2024-51xx/CVE-2024-5170.json) (`2024-09-27T18:23:43.833`)
|
||||
- [CVE-2024-6723](CVE-2024/CVE-2024-67xx/CVE-2024-6723.json) (`2024-09-27T18:50:00.913`)
|
||||
- [CVE-2024-6785](CVE-2024/CVE-2024-67xx/CVE-2024-6785.json) (`2024-09-27T18:59:25.253`)
|
||||
- [CVE-2024-6850](CVE-2024/CVE-2024-68xx/CVE-2024-6850.json) (`2024-09-27T18:30:30.930`)
|
||||
- [CVE-2024-7129](CVE-2024/CVE-2024-71xx/CVE-2024-7129.json) (`2024-09-27T18:26:27.560`)
|
||||
- [CVE-2024-7698](CVE-2024/CVE-2024-76xx/CVE-2024-7698.json) (`2024-09-27T19:39:43.350`)
|
||||
- [CVE-2024-7699](CVE-2024/CVE-2024-76xx/CVE-2024-7699.json) (`2024-09-27T18:59:31.277`)
|
||||
- [CVE-2024-7711](CVE-2024/CVE-2024-77xx/CVE-2024-7711.json) (`2024-09-27T18:17:05.577`)
|
||||
- [CVE-2024-7817](CVE-2024/CVE-2024-78xx/CVE-2024-7817.json) (`2024-09-27T18:26:21.653`)
|
||||
- [CVE-2024-7818](CVE-2024/CVE-2024-78xx/CVE-2024-7818.json) (`2024-09-27T18:18:55.510`)
|
||||
- [CVE-2024-7820](CVE-2024/CVE-2024-78xx/CVE-2024-7820.json) (`2024-09-27T18:08:48.757`)
|
||||
- [CVE-2024-7822](CVE-2024/CVE-2024-78xx/CVE-2024-7822.json) (`2024-09-27T18:06:41.287`)
|
||||
- [CVE-2024-7859](CVE-2024/CVE-2024-78xx/CVE-2024-7859.json) (`2024-09-27T18:00:53.567`)
|
||||
- [CVE-2024-8043](CVE-2024/CVE-2024-80xx/CVE-2024-8043.json) (`2024-09-27T18:22:43.967`)
|
||||
- [CVE-2024-8051](CVE-2024/CVE-2024-80xx/CVE-2024-8051.json) (`2024-09-27T18:19:41.863`)
|
||||
- [CVE-2024-8091](CVE-2024/CVE-2024-80xx/CVE-2024-8091.json) (`2024-09-27T18:17:59.267`)
|
||||
- [CVE-2024-8092](CVE-2024/CVE-2024-80xx/CVE-2024-8092.json) (`2024-09-27T18:17:24.387`)
|
||||
- [CVE-2024-8093](CVE-2024/CVE-2024-80xx/CVE-2024-8093.json) (`2024-09-27T18:16:01.683`)
|
||||
- [CVE-2024-8258](CVE-2024/CVE-2024-82xx/CVE-2024-8258.json) (`2024-09-27T18:56:41.140`)
|
||||
- [CVE-2024-8490](CVE-2024/CVE-2024-84xx/CVE-2024-8490.json) (`2024-09-27T18:36:00.053`)
|
||||
- [CVE-2024-8761](CVE-2024/CVE-2024-87xx/CVE-2024-8761.json) (`2024-09-27T18:41:43.043`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
247
_state.csv
247
_state.csv
@ -201708,7 +201708,7 @@ CVE-2022-3458,0,0,834446b0b464109915b4b499bcb648e2d2c701525e05ff89129f7d9fe10106
|
||||
CVE-2022-34580,0,0,3bc493ad0e7a0b4170568437f86af4c3c964701c1bd5abd9bfc45a505c7b51d1,2022-08-04T17:15:01.383000
|
||||
CVE-2022-34586,0,0,a011579053ff27f86e6a88cc003457abbf5ee9d851589f7bfe3e86ae3f13ca6a,2022-07-26T11:53:37.197000
|
||||
CVE-2022-34588,0,0,cbb99e45e15a33c631198f107a59981a56fc2f86de13eb744bfca0b900846a6b,2022-07-26T11:53:11.643000
|
||||
CVE-2022-3459,0,1,616f6bdd64138246c906b2ed3470e88b891f7a75f55c1e0b5ca9159712d1f297,2024-09-27T16:43:48.243000
|
||||
CVE-2022-3459,0,0,616f6bdd64138246c906b2ed3470e88b891f7a75f55c1e0b5ca9159712d1f297,2024-09-27T16:43:48.243000
|
||||
CVE-2022-34590,0,0,c8d44270c11381c2331bf6e1dc899e03a4a3498d1b44f02101242c3cfd3f9af4,2022-07-26T11:52:00.287000
|
||||
CVE-2022-34592,0,0,a74e2dc297296157bdc0c6e09ba85ba1c5bd50b0c3f22b27833690d3cc3b2da0,2023-08-01T21:15:10.193000
|
||||
CVE-2022-34593,0,0,b5d1f52496cf0925fd1c45183671a1ec1c74868575dbcc8a48a75bb69d63b20a,2022-08-04T03:06:17.717000
|
||||
@ -213523,7 +213523,7 @@ CVE-2023-0967,0,0,32992b9773623ae1c67a0f75211aca2f84f7fc06c270510c579b6ee175bb9a
|
||||
CVE-2023-0968,0,0,95b0762f374679c0942698e686febcb31a83eacf7a4dfe16c37d1d71500ebc4f,2023-11-07T04:02:03.980000
|
||||
CVE-2023-0969,0,0,53f811df46d4459a3e48a262078a5d43a264922b54dbc03a90b194ae71a024a5,2024-09-25T16:15:06.440000
|
||||
CVE-2023-0970,0,0,f747e3e636628f0354bd3e65bfda63dc0e744c4c96d16a00cf4b0ba4cea468db,2024-09-25T16:15:06.567000
|
||||
CVE-2023-0971,0,1,313bda3c02d67ddef87b768f78dc771143b32f10ebac5b45343347a6b32fa8dc,2024-09-27T17:15:11.557000
|
||||
CVE-2023-0971,0,0,313bda3c02d67ddef87b768f78dc771143b32f10ebac5b45343347a6b32fa8dc,2024-09-27T17:15:11.557000
|
||||
CVE-2023-0972,0,0,d0b2b25e0a2f8add4d1141b54103ab37fb60eff064595e1927041740e47ca91d,2024-09-25T16:15:06.663000
|
||||
CVE-2023-0973,0,0,2ae6508976684d5694e7c37733743e9656bed6b11e24aeac1658f73c6b31bcc7,2023-11-07T04:02:04.333000
|
||||
CVE-2023-0975,0,0,f4e4c201aa7b5b4d85cf487eb41a658d8e5e408adcd4b74bf689cf72a5ab65ff,2023-11-07T04:02:04.430000
|
||||
@ -220590,7 +220590,7 @@ CVE-2023-27463,0,0,5943e2fc48ff892ad71fc7b2f68c64e8ae8a5867ea7b63bf1dae97a0d0d7a
|
||||
CVE-2023-27464,0,0,56b82478fb14d5060be9c73115275113bef172136621e4ada9c230821adfd7ff,2023-04-19T19:59:34.863000
|
||||
CVE-2023-27465,0,0,6381cec8f1230a4497dd1b138bd04078a15d6b3870ec5ecb9400d8892f94175b,2023-07-05T17:48:25.550000
|
||||
CVE-2023-27469,0,0,59bf592e1341f715fc637d340eeed491ee1fcb3fc6167fe549de61808bbb16b7,2023-07-07T23:55:51.067000
|
||||
CVE-2023-2747,0,1,e90894efddc01c892fb00706ab06f5bd0ce40f70e660fc4d4d110f3724f3285f,2024-09-27T17:15:11.707000
|
||||
CVE-2023-2747,0,0,e90894efddc01c892fb00706ab06f5bd0ce40f70e660fc4d4d110f3724f3285f,2024-09-27T17:15:11.707000
|
||||
CVE-2023-27470,0,0,76aae6223b89f2c3b44e264ca3a64d3a33684db6f927f63fa7d5dd0334487ea2,2023-09-13T17:04:11.437000
|
||||
CVE-2023-27471,0,0,0b3452a32a36f29e53e40277a667eea0e023b5a7234ce58c2095a06cee372f5f,2023-08-24T16:14:42.057000
|
||||
CVE-2023-27472,0,0,99cc70eb61ac8cb8e71b1d47ce2f1d441b483af3e0049bc18722bc42ce00698e,2023-11-07T04:09:56.857000
|
||||
@ -220714,7 +220714,7 @@ CVE-2023-27600,0,0,87e67c606dcb11cbbd6ceba8eb248743b1a9a333ff1372c202bb946110f83
|
||||
CVE-2023-27601,0,0,3159e0a53214d6adf345915c747947d8090757989992077eaa4e4c5257b56321,2023-11-07T04:10:01.887000
|
||||
CVE-2023-27602,0,0,a80eb5b45c9f4866e932d81fc2716a823c094986ad855f7d67ed615e5137a95d,2023-04-19T12:15:08.170000
|
||||
CVE-2023-27603,0,0,377363bd944721b07ea3da5dcb27d355b62defd8ba2523bcd4d0bea48c169f2a,2023-04-14T19:45:47.010000
|
||||
CVE-2023-27604,0,0,536fb6ad31da764e119f7d2281e40a7e57ddbc2dde44f78c0c532c223ea42ac8,2023-09-01T17:11:03.007000
|
||||
CVE-2023-27604,0,1,264a6a3b17b8dc069b4c6cd1ae570dc6192c2177f9276257c4cc8f282359d2ac,2024-09-27T19:35:34.593000
|
||||
CVE-2023-27605,0,0,3c9bd67e7bbc5a970176fa36f2ef3e0bf73a6762632ef035cc42d3a510e378f7,2023-11-10T04:20:00.893000
|
||||
CVE-2023-27606,0,0,df5a64e8dccf8b9593928c54f55b0be768a1ad798eb4d0e828b503915ddf62a6,2023-07-26T01:18:52.087000
|
||||
CVE-2023-27607,0,0,e059482f5e66445b3b6dfa901c43f1665d8e6eb57a74d73e31d4f554c8f501e3,2024-04-11T12:47:44.137000
|
||||
@ -227452,7 +227452,7 @@ CVE-2023-36530,0,0,39b6e7f1f65c17d756a12a67ff7ab49bb930555b16f3c7f0c3a9a9b08631f
|
||||
CVE-2023-36532,0,0,346de183093708445d572201d1b91beba125a9edfa821a742e9c84556edc5810,2023-08-11T13:51:15.367000
|
||||
CVE-2023-36533,0,0,7a3aa9a0281f92da6ec858b130bc8c49aff9e43e106a9e5252f45615815adb18,2024-09-19T20:15:05.733000
|
||||
CVE-2023-36534,0,0,6cbc71eb840a2042045eac9a1bed117b4c7c1b6f49d16fba7e1aef9691ba09df,2023-08-11T13:55:20.393000
|
||||
CVE-2023-36535,0,0,67b7dcf82c19974a887af94e14d304d1126dc66b1a6c22bfc06e1f0fb59ab96f,2023-08-11T14:01:17.010000
|
||||
CVE-2023-36535,0,1,cd09745af0e826e75dff130b90aa767c8b56c74aa677bae7dfe79bb50dc3089b,2024-09-27T19:15:08.747000
|
||||
CVE-2023-36536,0,0,0ee1547dcb523dc14ed9ebc847b60fd04a4995159e536e4c1d07969953d80c80,2023-07-19T00:27:45.237000
|
||||
CVE-2023-36537,0,0,394843175e0ad188622ad56ec5745a099e29bc47411e8a302f9292eb043883c1,2024-09-19T20:15:05.913000
|
||||
CVE-2023-36538,0,0,b1971037704c1983129273d695aaa947b2c9ac7e5959308db7e26dd28cd25646,2024-09-20T14:15:11.530000
|
||||
@ -229606,14 +229606,14 @@ CVE-2023-39199,0,0,3e8a082b2dd162b2ac05fe4edce56092a0758dead6f488c6360a451ae93da
|
||||
CVE-2023-3920,0,0,1f9f72a3bd9c37be24e0dea36a1658cf630b3ff4aab5704130fc3282b0cd5e1f,2023-10-03T15:30:56.607000
|
||||
CVE-2023-39201,0,0,995881803a821ad39954737de99fb7ca3c826593aae69f660739b193ed06fb75,2023-09-16T03:30:00.390000
|
||||
CVE-2023-39202,0,0,d4a579f8db9ad04cff2e4ef93d9f1e8720c97b926a12d5500bdafe35323a16f2,2023-11-21T00:56:45.663000
|
||||
CVE-2023-39203,0,0,927ef80eed729f168b04440160fe39a1f0f617cfe4d22333f92cc5e2b6f362b6,2023-11-21T00:56:35.877000
|
||||
CVE-2023-39203,0,1,a06dab058cba203b24011e3aa872b96a152a5e6567e21a5b4486d6dcd28a9e51,2024-09-27T19:15:08.977000
|
||||
CVE-2023-39204,0,0,c8d09ec7350a3f76af462b805e5a6565ed8832c18c7e06d46c30284639ad5db3,2023-11-21T00:47:04.810000
|
||||
CVE-2023-39205,0,0,fc8a247514204b686ea06b6e69f09b4837631de9ab06c362c325fc076faa9298,2023-11-21T00:46:21.403000
|
||||
CVE-2023-39206,0,0,cdf8d53f81a764d6980bc2226a8f1e25b0050b8318c9020e0d15d156f379d2ac,2023-11-21T00:46:02.800000
|
||||
CVE-2023-39208,0,0,d5d55cdb504a6886a2603cd22759259bfcb58167bb0eced63a003ca20dc52580,2023-09-15T19:11:19.887000
|
||||
CVE-2023-39209,0,0,e9015813d16b6d3ce71edeab4fa4b8fde1e7f530a9e723f4c6cea1a8ee0cb2d3,2023-08-15T15:24:19.347000
|
||||
CVE-2023-39208,0,1,5b1e8be08469cf8d154214f7b569e47ded95901e036a16258bfdbcfc0bd23d01,2024-09-27T19:15:09.143000
|
||||
CVE-2023-39209,0,1,864d3cb1d84e301b176edde462a70357090fb8fd191e46d02fa5b6d87863dc40,2024-09-27T19:15:09.267000
|
||||
CVE-2023-39210,0,0,c6ab589e9d628bc1a2fe813bf005cf32e4719139f61279ea1902fa8f6ab1d647,2023-08-15T13:51:04.393000
|
||||
CVE-2023-39211,0,0,258e904485dc72a8bc99f39b2a0db807845c54abda311e3042d295e566b1a20c,2023-08-15T14:46:49.503000
|
||||
CVE-2023-39211,0,1,24b18e10c6ff2beac445a15948d6c81adfa8546a2d6217a39abaefb59ed450b7,2024-09-27T19:15:09.387000
|
||||
CVE-2023-39212,0,0,d6550b94a6602f89228a733e0a67b15cc207049f2c634a000f3ede01c5ff1907,2023-08-15T15:24:10.840000
|
||||
CVE-2023-39213,0,0,540b0d5a1d6a82e33f18cb8e49a5af4ac8938b983c4e6b3a9d5f085f5c23a939,2023-08-15T15:30:15.040000
|
||||
CVE-2023-39214,0,0,a7ededc2e23b13e6373dda97aa0084d008ece1af9a7db43614f3e747766a0ef3,2023-12-14T16:48:23.877000
|
||||
@ -233643,7 +233643,7 @@ CVE-2023-4480,0,0,8f720a32700f0dcf88298f81723ae2c513370bf9c361e1a327c21e8404982f
|
||||
CVE-2023-44807,0,0,cc9fa087fd498d5c0142310406c2f8e5ac715823650cae019eedc78dd30884f7,2023-10-10T20:16:41.627000
|
||||
CVE-2023-44808,0,0,c21fe1fd44aeea6fd1f5d97f8e40c85ef4c9aad99cada000af1d2e25b8ea1a26,2023-10-19T11:11:35.753000
|
||||
CVE-2023-44809,0,0,106ef081b5af79dc53d4bc479d0aa2e275e4760b3cc08b2cab3264d7a797d158,2024-09-17T02:35:28.503000
|
||||
CVE-2023-4481,0,0,76a5ae5ad991c5d2e4a74e675d56d39475bd470341b86f35d27c267ec172d198,2023-09-07T19:11:15.643000
|
||||
CVE-2023-4481,0,1,fd9cff3497a9fececf4bdfc2570c042517e46a8526db5fbaafef06ca9455d872,2024-09-27T18:15:03.837000
|
||||
CVE-2023-44811,0,0,0fdedc6bc111ea9a02c62f8daaeff83c589b5ca14424d7f2de79dccf9ac38af2,2023-10-11T20:06:27.410000
|
||||
CVE-2023-44812,0,0,54d24d8a8649398546bc69de6f53c9b08c93a76ddc19c43fa225b2d394f3bb24,2023-10-11T20:00:04.033000
|
||||
CVE-2023-44813,0,0,e4aa38d88de0406751f5d82932d7709b2c42f855dfd3b491016e37100dc99415,2023-10-11T19:58:17.857000
|
||||
@ -233678,7 +233678,7 @@ CVE-2023-4486,0,0,a8f8d8a9e43c17d4d331dc7091e0f90261622ff32f1355021d3c32aa04c584
|
||||
CVE-2023-44860,0,0,ef17a66fc534d546aa3526aa1673fbf9d1d6daa6183df531f4944cf94b447a33,2023-11-07T04:21:40.847000
|
||||
CVE-2023-4487,0,0,c157049078c2225025d68c060933968904d2e28266cb3ee25106349b4d026350,2023-09-09T03:52:35.157000
|
||||
CVE-2023-4488,0,0,2db95f5d4826053bbbd56ca79a44e352c13aa36214bdfcdb3abfab3a0c706f04,2023-11-07T04:22:39.783000
|
||||
CVE-2023-4489,0,1,107d614dd8ca3af050aca35bbd6e65fcabb64fd3b9a7eddc8ad6729f2345430e,2024-09-27T17:15:12.003000
|
||||
CVE-2023-4489,0,0,107d614dd8ca3af050aca35bbd6e65fcabb64fd3b9a7eddc8ad6729f2345430e,2024-09-27T17:15:12.003000
|
||||
CVE-2023-4490,0,0,63c036ac68ad93cbb4dc12a11efed5563ca46b11c6fedd07e9fbd4caf3a1e255,2023-11-07T04:22:39.943000
|
||||
CVE-2023-4491,0,0,a5240a2c109f34730e7360295f6fcd733fc71012b63afe36f757da5d1ee3b83b,2023-10-06T16:23:29.137000
|
||||
CVE-2023-4492,0,0,3577c6ca644d2e9f6f382fbe30507a51e43ef0deb44300926658bd35f89915dd,2023-10-06T16:21:08.080000
|
||||
@ -234570,7 +234570,7 @@ CVE-2023-46159,0,0,24785529f70b524859aa14fdae00c8465a35987fbf092be6dd6cfd888eb2f
|
||||
CVE-2023-4616,0,0,781bb4b84cb534a022410420ad635ee55472b129395b767eb2c3311a26a0a1ea,2023-09-08T14:14:22.880000
|
||||
CVE-2023-46167,0,0,3dc769d5463c4423dee8bec5cef273bcf3da36e3143dc076405dbb5fc04ebdd3,2024-01-12T14:15:48.413000
|
||||
CVE-2023-46169,0,0,69716fe4ea1361d37d403ad016e241dbc2fa33af7742903ffa8cb3ec08125121,2024-03-08T14:02:57.420000
|
||||
CVE-2023-46170,0,1,b897e9040bc030afe42cc5ad50415f5b2a52be10b387946ecb760ebb83cc98fa,2024-09-27T17:15:11.843000
|
||||
CVE-2023-46170,0,0,b897e9040bc030afe42cc5ad50415f5b2a52be10b387946ecb760ebb83cc98fa,2024-09-27T17:15:11.843000
|
||||
CVE-2023-46171,0,0,067eb3c906679b90befba2ebbb666473745b4c0ddb0eb72710945cfefe553217,2024-03-08T14:02:57.420000
|
||||
CVE-2023-46172,0,0,092a5bc4707e81a78df1953ec9ce275dfb73bf37fd52d1a82132649756bfbb84,2024-03-08T14:02:57.420000
|
||||
CVE-2023-46174,0,0,e8a730db2f9b95cd824eb3fd6260ec3880f9f6206b85cad568934b876c5895fa,2023-12-04T18:31:04.347000
|
||||
@ -237780,7 +237780,7 @@ CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edb
|
||||
CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000
|
||||
CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000
|
||||
CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000
|
||||
CVE-2023-50782,0,0,75e4b5549217f027f3387947d4db2096cb79eedec4a878f9b0a87ffba322d82a,2024-09-05T16:43:20.083000
|
||||
CVE-2023-50782,0,1,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000
|
||||
CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000
|
||||
CVE-2023-50784,0,0,310bd016f72a55e87952759915b2328751f88f7e5a355286cf6eeaceebb855b6,2023-12-26T03:15:08.927000
|
||||
CVE-2023-50785,0,0,95069a7af58cd3ada76ed23cb42a6b26c34f9d8527e1cd720c0edc9a0997e9b2,2024-01-31T19:16:46.520000
|
||||
@ -238104,7 +238104,7 @@ CVE-2023-51376,0,0,1bb4a2ca7d072fc741c0ecf8c1abe1f75aabaed2e63aa856486f51a7d3937
|
||||
CVE-2023-51377,0,0,3bd8fefeca6991ad30c069bcd2c4fb6f46957c942972b07b8edbffffd7018a6c,2024-08-07T18:59:35.350000
|
||||
CVE-2023-51378,0,0,bc61ac31693e559c3785fc54392f4f8d6399496e56bc69c35e92f68329132f82,2024-01-05T16:20:35.933000
|
||||
CVE-2023-51379,0,0,010b1f03c9a19258efaeef9630896684fe588212231af6d37a6a4061a1176a5d,2023-12-29T15:30:21.787000
|
||||
CVE-2023-5138,0,1,7246ceef2cc7d4cf4c9864b42dbf7529be4154e675bf141708e91c102ba01e97,2024-09-27T16:15:04.143000
|
||||
CVE-2023-5138,0,0,7246ceef2cc7d4cf4c9864b42dbf7529be4154e675bf141708e91c102ba01e97,2024-09-27T16:15:04.143000
|
||||
CVE-2023-51380,0,0,cbd07d7f62610e18852d2ac8cd9602ac2db1566bdc62a98f7a2bdefe438a4237,2024-06-11T19:16:05.437000
|
||||
CVE-2023-51381,0,0,dae38e2969db35298f7bb53595e944e9233b54858e286dfa2789b9cc647273ba,2024-01-17T21:15:11.290000
|
||||
CVE-2023-51384,0,0,ec284ced8a028c80f45570d0f48e893a628f0d7f6a64a78835100e3773167767,2024-05-16T20:05:04.420000
|
||||
@ -238116,7 +238116,7 @@ CVE-2023-51389,0,0,c8183e674f9d5219872a33e92b5a1fdc0eae3b4f316b3eb093c7a493c5e16
|
||||
CVE-2023-5139,0,0,1703630468285261ed8fc04774841fb8122f0aa2e090a95b0549614dd0a159a8,2024-01-21T01:44:13.437000
|
||||
CVE-2023-51390,0,0,1ec52342e74e0a9387acccc87ff54c51a5029a59bad7e42ad3f15fa93e7d2252,2024-01-02T16:25:35.387000
|
||||
CVE-2023-51391,0,0,e894166f0bc1eaf044d8a1533d447b6903e43c193dc6bd758ce18ed7fccf5afa,2024-04-18T09:15:11.370000
|
||||
CVE-2023-51392,0,1,7d194856ac2b797286c3058e7f10449d4b03306c119b81a3995d64b572fe5f9d,2024-09-27T16:15:03.790000
|
||||
CVE-2023-51392,0,0,7d194856ac2b797286c3058e7f10449d4b03306c119b81a3995d64b572fe5f9d,2024-09-27T16:15:03.790000
|
||||
CVE-2023-51393,0,0,139abfb803e26ef22b2ba7e67e5ea6e3ad9dc2dee8a035bb241ec16edd4c052b,2024-09-25T16:15:09.297000
|
||||
CVE-2023-51394,0,0,d27eeec344a886820a200dad161b001cfca532d09ac4c989e0efe8db665013af,2024-02-26T13:42:22.567000
|
||||
CVE-2023-51395,0,0,a996b0a26c06b74dbdfa8bb23c3c0eb6ccaa9b3ec5296b12351477fcfac45c9a,2024-09-25T16:15:09.650000
|
||||
@ -239478,7 +239478,7 @@ CVE-2023-5306,0,0,476b3821b61b469afa7b1ea84617d24f0cc2f50c242f49afe4eefd5e4bb959
|
||||
CVE-2023-5307,0,0,e55559523960fc6bd06ca53e18dcee28c92b1b485868f1ef2252a5819e3c96be,2023-11-08T18:41:12.960000
|
||||
CVE-2023-5308,0,0,e89e6723800280930aeed0e6c43f57ffdeee233d5ccb3d0839e7c2a35caaebe9,2023-11-07T04:23:52.597000
|
||||
CVE-2023-5309,0,0,f27dd4b80ceee68a27f6ba86904bd53ea5dcad4342d146a749fc6993b8f63edc,2023-11-15T15:46:11.740000
|
||||
CVE-2023-5310,0,1,e2b0e1d19711e17e116ca356bb5b12bb7b75a295919f0525f7881444da052757,2024-09-27T16:15:04.293000
|
||||
CVE-2023-5310,0,0,e2b0e1d19711e17e116ca356bb5b12bb7b75a295919f0525f7881444da052757,2024-09-27T16:15:04.293000
|
||||
CVE-2023-5311,0,0,21648f840f93dc9e61f7041085b0c569f47e66fa0f095de3e4b197f824d1578c,2023-11-07T04:23:52.753000
|
||||
CVE-2023-5312,0,0,1415bfd069705ff55f79f6d249de3b45d246fa9bee5d6271b902326ea749ba1b,2023-11-07T04:23:52.920000
|
||||
CVE-2023-5313,0,0,6261a7a51041dde22f00bbab1d825ee5f322cba42d4584ee4d72f99cd8c1f049,2024-05-17T02:33:00.353000
|
||||
@ -240588,7 +240588,7 @@ CVE-2023-6529,0,0,72d8c2d0dacbac74682455f0ff47ccb4b14150aa40632faef1eac144303bc4
|
||||
CVE-2023-6530,0,0,e97d02709e493818576d008554317095bd12443aa526c5fc75ad777fe8cdce6a,2024-02-02T23:50:49.170000
|
||||
CVE-2023-6531,0,0,e8e255dd1935dc1ef5c4948fb68c51fef95a88952f5cbe73bcb1a6974886a5db,2024-09-06T18:15:06.233000
|
||||
CVE-2023-6532,0,0,44972a9aaa8b97e5656a7157ac74bde56edc9712f5f8e7cc323b7f605c6b8ba6,2024-01-11T20:04:00.773000
|
||||
CVE-2023-6533,0,1,1f85668df09b9bcd756316ac7790d963bfd8ad484adef61094d30f31fc35bfb4,2024-09-27T16:15:04.440000
|
||||
CVE-2023-6533,0,0,1f85668df09b9bcd756316ac7790d963bfd8ad484adef61094d30f31fc35bfb4,2024-09-27T16:15:04.440000
|
||||
CVE-2023-6534,0,0,5f0dfdcb9f929ff0b7520043a1c55ae53709253c1bc046f2dcce650d8a570305,2024-01-12T14:15:49
|
||||
CVE-2023-6535,0,0,06fb83c615be6d2e0c5772c4bc5ded7117ac480a39b5ebe6fdabfa27dccd6d29,2024-09-14T00:15:12.977000
|
||||
CVE-2023-6536,0,0,2cc2da9bb333d3719b7ac551418627c5877a227f25c54a5c0f9935d52fe3a235,2024-09-14T00:15:13.203000
|
||||
@ -240679,7 +240679,7 @@ CVE-2023-6635,0,0,1cfac67c9e941e0be965abb212c257f1cad3b920f9c5d4a9a8646251aa16d0
|
||||
CVE-2023-6636,0,0,f98d3fb04e7a0e4b824858258dacaa1301ba32bf0b8144beb771463b43018179,2024-01-17T21:20:04.423000
|
||||
CVE-2023-6637,0,0,17387f6f6246b431fb825f4bc52b9eb549c9f0a04df1348c966828f6ff6de8c1,2024-01-18T17:09:32.967000
|
||||
CVE-2023-6638,0,0,6ae8e1dafc2e1ff97a5ffbea4250e4c3e266446659c6cf6ab9c41a4012946b70,2024-01-18T17:16:43.880000
|
||||
CVE-2023-6640,0,1,7ee1d41bfaa3e175c30ec07884dd98389500757dd5d10a30926aa8abbc2a0002,2024-09-27T16:15:04.577000
|
||||
CVE-2023-6640,0,0,7ee1d41bfaa3e175c30ec07884dd98389500757dd5d10a30926aa8abbc2a0002,2024-09-27T16:15:04.577000
|
||||
CVE-2023-6645,0,0,cdeabc9d7f42ccd9ef732ecc48c5f072e7e6da69aa7ee097cf4888b54547eba2,2024-01-17T20:40:42.557000
|
||||
CVE-2023-6646,0,0,bd7c510d82b5c75772d0ef9737894072c633a095ca095e39c5e6ce0c87e25276,2024-05-17T02:33:49.910000
|
||||
CVE-2023-6647,0,0,6b6b8fde59878a80bdb3129f26afae1713708d85c28edcc633bb9dd0aa2bebdd,2024-05-17T02:33:50.020000
|
||||
@ -244629,7 +244629,7 @@ CVE-2024-22167,0,0,367edc9595b541e4583166fe3269c3fdadf1e07d471b986f4ba4d420acaf6
|
||||
CVE-2024-22168,0,0,ab8c917977cb7b1cade1e73907721ac451b3aa4a33c57dc23ff6bbd6f3f3086f,2024-06-25T12:24:17.873000
|
||||
CVE-2024-22169,0,0,df69a5503ace20ebb25a47d219de9dc0cec7f2ae535ba8ef865dbc8e1b1de7a7,2024-08-05T12:41:45.957000
|
||||
CVE-2024-2217,0,0,daa69536e84eb4d43fbe3db8c0399425dbbf0cb0bbf2749fa7af96ac22f4de99,2024-04-10T19:49:51.183000
|
||||
CVE-2024-22170,1,1,8e3f6f25685a59a117e38321d789a9d91520edbca4f2236217e515624bbe910f,2024-09-27T17:15:12.143000
|
||||
CVE-2024-22170,0,0,8e3f6f25685a59a117e38321d789a9d91520edbca4f2236217e515624bbe910f,2024-09-27T17:15:12.143000
|
||||
CVE-2024-22177,0,0,ca235268cabc0c584ac292f2ee16730b9c91a0111cc9efc05a4e3318a8d8189e,2024-04-02T12:50:42.233000
|
||||
CVE-2024-22178,0,0,87d543ccce174b767e9afe9e4bdb9faba8753c7ebe4e7d346f4e431254aec6b3,2024-04-03T17:24:18.150000
|
||||
CVE-2024-22179,0,0,4d9fb82bea52992d0d70df248ed55546a9ddf3350aae061363433dabea01060d,2024-05-28T17:15:09.547000
|
||||
@ -244905,7 +244905,7 @@ CVE-2024-22463,0,0,70d7339a7b0a3e29462590040ceee7f39ed0dd964fa50bab976fa041a23c3
|
||||
CVE-2024-22464,0,0,92e35e254ed19612ab368994e54d396472c5cc9b65977b7fab3d0ccdb9d49ea9,2024-02-15T05:03:27.617000
|
||||
CVE-2024-2247,0,0,8ba3568ba79c6c274645f445e00f4e5a8dbb789c4110c2ab0dcbf67cd1acbc79,2024-03-14T10:15:07.027000
|
||||
CVE-2024-22472,0,0,439f0d8ec46fad6a2da2c43e81aa65a928e9696bbdea402abe6024aba22384ec,2024-05-07T13:39:32.710000
|
||||
CVE-2024-22473,0,1,aa5e9b7022702f910d8f3fa697c3bdce0304146a6569d4780e0431d2bd7539a2,2024-09-27T17:15:12.270000
|
||||
CVE-2024-22473,0,0,aa5e9b7022702f910d8f3fa697c3bdce0304146a6569d4780e0431d2bd7539a2,2024-09-27T17:15:12.270000
|
||||
CVE-2024-22475,0,0,1446b1b7f920d6be06711fb5b360ef454e396071cdf97bf24654c850586307d2,2024-03-18T12:38:25.490000
|
||||
CVE-2024-22476,0,0,8b3385ed3d79582ab2f6f9a3a5502a58f8ae3dc8c6c7d5742513c4528d840500,2024-05-17T18:36:05.263000
|
||||
CVE-2024-22477,0,0,e4b73b97b79d11c5154c2a9649d95e72e6ebe22c465840b42dfe5be227688960,2024-08-19T14:21:51.203000
|
||||
@ -246728,6 +246728,8 @@ CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234
|
||||
CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000
|
||||
CVE-2024-2541,0,0,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000
|
||||
CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
|
||||
CVE-2024-25411,1,1,7de5576fd307c585f61060f5768eb881de1d39b9f982cce92760f7dc361da668,2024-09-27T18:15:04
|
||||
CVE-2024-25412,1,1,874abf180c098ce0160e736f3fd25db3ae69414d9e1283db4e9277a2dad487d5,2024-09-27T18:15:04.100000
|
||||
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
|
||||
CVE-2024-25414,0,0,adf1d11bdd5b149561578133c2144fc86b074e6ead373a55ead3bdaa0f1ac127,2024-08-29T20:36:20.677000
|
||||
CVE-2024-25415,0,0,43d479f30c3959db40e37d85a2a1b1d045a277956526655bc82aa0e8d248892a,2024-08-28T20:35:08.127000
|
||||
@ -249381,6 +249383,7 @@ CVE-2024-28943,0,0,0d7428b497ed4dc685ee859cada5a22616e64d89dbcd3a147111832c09c51
|
||||
CVE-2024-28944,0,0,f3888aca11035410ad0fed8d85bb5091b862626240ff24765e70f6000a58dc46,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28945,0,0,04d2a9af526ca30e4ffc0ffa8edb0df1250eaa963fca5ac37255b03b4c8723e7,2024-04-10T13:24:00.070000
|
||||
CVE-2024-28947,0,0,9d3506b7ac0d8414d56f005d3db3860beb6359f3ca23ee696b9b26b32dc4d488,2024-09-12T18:52:38.433000
|
||||
CVE-2024-28948,1,1,3c3e854e1a117f04755f1fc2737376d472ac7ee2a45da7e9cc509c72ae582dda,2024-09-27T18:15:04.197000
|
||||
CVE-2024-28949,0,0,d5e48bc4aa20c39f513a0582c3f637deca3b5b6936a689a13ce9af3ad1e7d8d0,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2895,0,0,b446221d46d418d396cd9d883702efdf5b2797ce3a0ab257ce4f7a9b35ffa891,2024-06-05T20:15:13.023000
|
||||
CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000
|
||||
@ -250560,7 +250563,7 @@ CVE-2024-30506,0,0,41ad5220a510aa05ad91de3792e95d90bb83cc19a8d41a522d0e12c9037c2
|
||||
CVE-2024-30507,0,0,0a2fa3dd46c0eee27c27a7bb00a423f0b6a3fad1de883792925dcfdf8d29e9aa,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30508,0,0,e848c942f6b5cceb6709748625cf82d04e65c89bf1c716a447b66749f77987df,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30509,0,0,01b80bcadb5eed5e2e5be48f5828df1c042b0a87c72833c73e3c04d29eeb0f15,2024-05-17T18:36:05.263000
|
||||
CVE-2024-3051,0,1,3ddd49864688bc57a8565ffafaf5d768043717128ff04aee660184e3bb95105f,2024-09-27T17:15:12.577000
|
||||
CVE-2024-3051,0,0,3ddd49864688bc57a8565ffafaf5d768043717128ff04aee660184e3bb95105f,2024-09-27T17:15:12.577000
|
||||
CVE-2024-30510,0,0,860f1c459215a36c6b57213b32d713f2bf3a2971e01d618172791841f519aab7,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30511,0,0,12147d1dab8ebceb545ee7f747d2da323ed17c2e0a8e80dc8aba8e26e4b68c0f,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30512,0,0,fdd8f6194c4545b5b2efca657536b9a60486092b4ad67568a3cf47004349a5d4,2024-06-10T02:52:08.267000
|
||||
@ -250570,7 +250573,7 @@ CVE-2024-30515,0,0,cd9da07a38b9af793d23d2c40e2bc7f0d9be2046dd657dc87438655763c1c
|
||||
CVE-2024-30517,0,0,77f26b081ca850a645a9f3fc91169caee1ee9b8b4e3c21fce11be8bfc09931d8,2024-06-10T02:52:08.267000
|
||||
CVE-2024-30518,0,0,d6e5f70b7d06d372c70f5ea767dec2ffdc41421d4ee7d6be87e9b111c80b2f02,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30519,0,0,4564e7eea3c3ce1164e5aab9db11dad39e43643cc0244e005733c6a6b6139453,2024-03-29T13:28:22.880000
|
||||
CVE-2024-3052,0,1,8638efe157cdd714e9b04273eebb815f2eacf18a4a5bcff9e90e6ec9fb1d66c5,2024-09-27T17:15:12.680000
|
||||
CVE-2024-3052,0,0,8638efe157cdd714e9b04273eebb815f2eacf18a4a5bcff9e90e6ec9fb1d66c5,2024-09-27T17:15:12.680000
|
||||
CVE-2024-30520,0,0,cd1d290a7151334083f17faee4e79b677ad26efb85cf5746e76a0c462d090a8d,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30521,0,0,77ee6bbe15254288cfe79985afe3a4c54623d5ab3fcdf7299e8590fbd500d582,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30522,0,0,d14dee6e5d91b09398d2d5e3b95a888860d7e4c71ba31f4987d293c750d8a441,2024-05-17T18:36:05.263000
|
||||
@ -250880,7 +250883,7 @@ CVE-2024-31064,0,0,09fc7c8df13203efb1ca9057b678e29517d4a825c266b7d99eb7440ce2a3e
|
||||
CVE-2024-31065,0,0,937ed835ef092f0b01f28500bfeb9fa9746544f25976e145c8c22dad96d9bed1,2024-08-01T13:50:44.083000
|
||||
CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd82687004ae,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000
|
||||
CVE-2024-31070,0,1,6d92bf7f941ba8b0a97929fd581428fe88083485ec4febaa08ecbb4f73e2d00c,2024-09-27T17:54:52.130000
|
||||
CVE-2024-31070,0,0,6d92bf7f941ba8b0a97929fd581428fe88083485ec4febaa08ecbb4f73e2d00c,2024-09-27T17:54:52.130000
|
||||
CVE-2024-31071,0,0,5282cdb502099fd214901289f849e21cb27e95440fad17b9c6193e904f64fc7f,2024-09-09T12:21:53.383000
|
||||
CVE-2024-31076,0,0,b516579659528296f384d5fc2847472b67a1e9cb8089efce1b81514ba7455edc,2024-07-15T07:15:03.810000
|
||||
CVE-2024-31077,0,0,4ee4934fb388f0c6aecae8ff57d029bcb5098c8db84cc409e7cf47f67893eb97,2024-08-01T13:50:46.110000
|
||||
@ -252532,6 +252535,8 @@ CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e
|
||||
CVE-2024-33345,0,0,5fb5f74cbe8d9322d0f3b29fb4588f6cf198e3debc3830c92870acdd420c4824,2024-07-03T01:57:56.393000
|
||||
CVE-2024-33350,0,0,4da55935e9588517cc2dba9e7ca9c451d32fef61d990ac2b7f8d39773dafe4a2,2024-07-03T01:57:57.207000
|
||||
CVE-2024-33365,0,0,753a357764251688c2c58169a412ba47dbb205dad7d51ffa0d9b46ec5f577645,2024-08-01T13:51:53.400000
|
||||
CVE-2024-33368,1,1,ced3fbed5b37a6fa351703c9cf22fcdd82c5bc9ab2bbebf55feac1ee46b043de,2024-09-27T19:35:38.347000
|
||||
CVE-2024-33369,1,1,e125b4b53bf8f30eab800b99fb1930c4542a7a8a1d8d9782e28c6e80dc67c7e0,2024-09-27T19:35:39.847000
|
||||
CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48f8,2024-05-02T18:00:37.360000
|
||||
CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000
|
||||
CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000
|
||||
@ -253381,6 +253386,7 @@ CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87
|
||||
CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000
|
||||
CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000
|
||||
CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000
|
||||
CVE-2024-34542,1,1,448bec67e5a9de69972bffb223f111a5ccd69a8038bd7509dd3b254bb012cc6b,2024-09-27T18:15:04.453000
|
||||
CVE-2024-34543,0,0,d1d082cf58fb09716352a1b771df34e1a1085cf8f4fe64f8d879c516dd412fbe,2024-09-23T14:17:42.957000
|
||||
CVE-2024-34545,0,0,30a1d58a5a9c49dffb8cec6e8682b29a77cba507757112fa783e98111c20a31c,2024-09-23T14:13:07.883000
|
||||
CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000
|
||||
@ -254787,7 +254793,7 @@ CVE-2024-36470,0,0,05049c8242b38f083734214f212efa24bf0b8e7684b3d943061a8cbb7c06a
|
||||
CVE-2024-36471,0,0,6e10c8a6f7211dd42a1163cc28818f3c443a2860a609ca58841954b595f68033,2024-07-03T02:03:13.647000
|
||||
CVE-2024-36472,0,0,2535bb51ccaa28f537e77e0ccd5fbdc4d19f82667f3e7465a3e9bc19e2a787a8,2024-05-28T17:11:47.007000
|
||||
CVE-2024-36473,0,0,aa04ebf30531a2d8b8fe44f55c5d2b24e6cb3b712da23e42c688962416c1c553,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36475,0,1,3bfe32e61fee0f325d0a0c42cbb21fe74c2f37d1a00be99f11a322ba582b65cf,2024-09-27T17:50:00.430000
|
||||
CVE-2024-36475,0,0,3bfe32e61fee0f325d0a0c42cbb21fe74c2f37d1a00be99f11a322ba582b65cf,2024-09-27T17:50:00.430000
|
||||
CVE-2024-36477,0,0,1d17ae62300b2d07c5941459ecfc6e574f91510a7910b453c64417a36e5b6766,2024-06-24T18:38:40.737000
|
||||
CVE-2024-36478,0,0,d3d3e31a448c89c876d8752dd3d0a5ed214ab436e75114c562c846a5ae1724e2,2024-09-09T13:30:12.647000
|
||||
CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c7c4,2024-06-24T19:26:47.037000
|
||||
@ -255237,6 +255243,7 @@ CVE-2024-37180,0,0,f3a43ec4e9faec19cb7f2862032e7f0ee3f281d5aaeb468ddfe4764507862
|
||||
CVE-2024-37182,0,0,2c3b8dc4ac8a4c58e16690b89b8b1d4e60a1d50b12c336b43ce7311fbfe9a142,2024-08-07T16:08:10.810000
|
||||
CVE-2024-37183,0,0,40759211984c4bbc303ff8d56740c06e4761a951d68b4235158aaff8607d5316,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37185,0,0,7506242f1ce72376b2b30a412cd4235ec1046d86e8f141e3c3ab3099b75bd0d2,2024-09-09T12:21:53.383000
|
||||
CVE-2024-37187,1,1,0c334888e3fcf27416a1e2144d76380d91baba943b26ddcbdbab63bc187e8f6f,2024-09-27T18:15:04.690000
|
||||
CVE-2024-3719,0,0,e1388f5d62a0fd4143182e88b2e1e453aac0737837b6c91a5acc29cfca670145,2024-06-04T19:20:23.553000
|
||||
CVE-2024-37198,0,0,bf34a330875867b427d853b7c401fbf1da6acf891d942b32d41eff0d38e81318,2024-06-24T18:55:25.417000
|
||||
CVE-2024-37199,0,0,e0bc94ff3ffb2d447b176c847adbfd46c016cf032811bab5a07d3d759b2c5626,2024-07-25T19:28:39.857000
|
||||
@ -256031,6 +256038,7 @@ CVE-2024-38303,0,0,028afe1755065337ff24d15854e1a09f4321a858b56f8ecffef2fc2440540
|
||||
CVE-2024-38304,0,0,c9c5e31995efec3c1031188bcbced9384b5bd23fcd1002d4307a7715d8d36271,2024-08-29T13:25:27.537000
|
||||
CVE-2024-38305,0,0,ee5caad84873fbd92352a0446fe4dbaa8294a3e8c08e38b564114b506da289eb,2024-08-21T12:30:33.697000
|
||||
CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888d26,2024-06-25T18:50:42.040000
|
||||
CVE-2024-38308,1,1,ede660bbdd3acded62256ac010e414c1e3400250af21c3fc60205062b6b984eb,2024-09-27T18:15:04.933000
|
||||
CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000
|
||||
CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000
|
||||
@ -256325,7 +256333,7 @@ CVE-2024-38670,0,0,d6d7f4b5a182e3647c0898f8ca9d2d3bda4d575e0843840aff165e03a4fc4
|
||||
CVE-2024-38671,0,0,f455e5cca7f8a128d540def121bf38b11c0bfdbb2d8dd5ffb02960b43e75ca9b,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38672,0,0,8fe41b1bf8d4f2f6f72ec757c4ea397e9e5b1795bb2ab3aa08ba69d4a26a5b24,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38673,0,0,5097cf89f737483286dc214348a1a490318b2382a9442c6052a767392100970e,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38674,0,1,08362ae4ade8099a86417736b4e9608a7af9a2df496d1f22af02e817a1d32824,2024-09-27T16:15:04.700000
|
||||
CVE-2024-38674,0,0,08362ae4ade8099a86417736b4e9608a7af9a2df496d1f22af02e817a1d32824,2024-09-27T16:15:04.700000
|
||||
CVE-2024-38675,0,0,faf0220c63799efb7e1243f96fba8d21e80f3dd904417c4ea1a8945bdce66f35,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38676,0,0,9284b2323c765deb99c8ef561eb6d731b10ee112ed02dd541fb4ee9c07b68c96,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38677,0,0,ffe9a7adacb7450cc1666e4dac561fa68f587c43be55007e7e5b05a5ab183b22,2024-07-22T13:00:53.287000
|
||||
@ -256424,7 +256432,7 @@ CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd3443
|
||||
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
|
||||
CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000
|
||||
CVE-2024-38808,0,0,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eeea3f,2024-08-20T15:44:20.567000
|
||||
CVE-2024-38809,1,1,fe0cdff1ac730d03b0835f4c4f18622f42435076867de5e5d8e37db3df24a93d,2024-09-27T17:15:12.393000
|
||||
CVE-2024-38809,0,0,fe0cdff1ac730d03b0835f4c4f18622f42435076867de5e5d8e37db3df24a93d,2024-09-27T17:15:12.393000
|
||||
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
|
||||
CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000
|
||||
CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000
|
||||
@ -256619,6 +256627,7 @@ CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb
|
||||
CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000
|
||||
CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000
|
||||
CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000
|
||||
CVE-2024-39275,1,1,ab9311e8c17c5cead5320c770d56f66a0814f9dc1363bdd82612f13758d50912,2024-09-27T18:15:05.173000
|
||||
CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000
|
||||
CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000
|
||||
CVE-2024-39278,0,0,58069499df62456724a7513c2a4610cfda6b008bc65dc970841f8e87808cbcaf,2024-09-06T12:08:04.550000
|
||||
@ -256684,6 +256693,7 @@ CVE-2024-39353,0,0,2167a4e696755ebb97fec80f167f71100aa107b125d2865a5fb1a76c1e17f
|
||||
CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882ba5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000
|
||||
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
|
||||
CVE-2024-39364,1,1,cddbdbf9385162913cdd829bcfd022489ed3440be471312e0e9ca4e079cfd82d,2024-09-27T18:15:05.417000
|
||||
CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000
|
||||
CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000
|
||||
CVE-2024-39373,0,0,49313ed17734e6debe931be9bab23ed5eb2e40aab9f298cb157f10a9804c26ee,2024-09-17T18:26:20.067000
|
||||
@ -257272,13 +257282,13 @@ CVE-2024-40500,0,0,9a99879dfd0dbe8b302a14079bbe558c6c55e4235f8be751f039f05b5f32d
|
||||
CVE-2024-40502,0,0,a7c6a31e5b7af110c861ba07a7795fbcc41db378deead021f902ae7acee4ed3f,2024-08-01T13:57:31.240000
|
||||
CVE-2024-40503,0,0,1b06db37464d646561a96f96e7332cfde7dc7941dce27a6167d21314639debe2,2024-08-01T13:57:32.010000
|
||||
CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16355,2024-08-01T13:57:32.800000
|
||||
CVE-2024-40506,0,0,50ff1b9d534c58546140d019d524853625251e6e08a2d14d7d8fc96e336df5ec,2024-09-26T22:15:03.770000
|
||||
CVE-2024-40507,0,0,613a1bd4f36a99780d11c648a9da0c130a6c3a3c4806b54e25f249d2a4df7639,2024-09-26T22:15:03.880000
|
||||
CVE-2024-40506,0,1,56d318dec543a258e8379a1056b94aea1892fa3bff6a76d94a32df617adb6a0a,2024-09-27T19:35:41.900000
|
||||
CVE-2024-40507,0,1,bac0094e397379a7a3429530e79371989beb903cb3ba3dcf6941846c376629fa,2024-09-27T19:35:42.957000
|
||||
CVE-2024-40508,0,0,875ef5f24d9ef2a983cc219f8e90c710f4d378b881c294f19d5c6ea699d3675f,2024-09-26T22:15:03.963000
|
||||
CVE-2024-40509,0,1,d1633f4b5cac1c7260d34a3e180cc3caa4c2c54ee32e532915a9d5bbdd1fd3f4,2024-09-27T17:35:02.243000
|
||||
CVE-2024-40509,0,0,d1633f4b5cac1c7260d34a3e180cc3caa4c2c54ee32e532915a9d5bbdd1fd3f4,2024-09-27T17:35:02.243000
|
||||
CVE-2024-40510,0,0,1cd8bae3c191b5c9c2bfb7f84e21a91a9f6f5b24548f0743b8a50e4f9c574a44,2024-09-27T15:15:14.820000
|
||||
CVE-2024-40511,0,1,f8d973732f909d09045739fe483e49a99cd19af67b105075b44a6edfd4a75026,2024-09-27T17:35:05.557000
|
||||
CVE-2024-40512,0,1,68c56f60e1b6a6fa9385d4b2eb4dab907a454571247a342f79e8aeac21ea4dd6,2024-09-27T17:35:06.970000
|
||||
CVE-2024-40511,0,0,f8d973732f909d09045739fe483e49a99cd19af67b105075b44a6edfd4a75026,2024-09-27T17:35:05.557000
|
||||
CVE-2024-40512,0,0,68c56f60e1b6a6fa9385d4b2eb4dab907a454571247a342f79e8aeac21ea4dd6,2024-09-27T17:35:06.970000
|
||||
CVE-2024-40515,0,0,d91b9531ef5ed5978894d52371df8275215aaf629121566b57a4e661954c33e9,2024-08-01T13:57:33.567000
|
||||
CVE-2024-40516,0,0,aed239a0d38ccfd87fd9b80e3f289cfeb35e1a0ac4b960ecd30c2aa738783f2c,2024-08-01T13:57:34.333000
|
||||
CVE-2024-40518,0,0,bbc8a85aaa975d14f5cd2cd0045fd3aa844f2bf8933730369940256a4cf29a05,2024-08-01T13:57:35.120000
|
||||
@ -257378,7 +257388,7 @@ CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08ed
|
||||
CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000
|
||||
CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000
|
||||
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
|
||||
CVE-2024-40703,0,1,c7bdea52d2b22e205d62154ebbe00df525e8e01e7a4b70c25a797f803fb17c50,2024-09-27T16:49:46.177000
|
||||
CVE-2024-40703,0,0,c7bdea52d2b22e205d62154ebbe00df525e8e01e7a4b70c25a797f803fb17c50,2024-09-27T16:49:46.177000
|
||||
CVE-2024-40704,0,0,3edc9bce3fb2efa51a5394090ae34392088b6a2e45c2b3fd2dca38dfa067bb31,2024-08-15T20:03:13.530000
|
||||
CVE-2024-40705,0,0,eaf406061f744f9b9d1df77f0e2bd923d25751eaa5d5e839a69fa1e668b20b9c,2024-08-15T19:57:34.780000
|
||||
CVE-2024-40709,0,0,b9cade7c7de2b7d37190896234716fcd464e3b6f075536b64a6ecace1ca81e79,2024-09-09T15:35:08.283000
|
||||
@ -258611,7 +258621,7 @@ CVE-2024-42484,0,0,a1d071a36aea45bef6715a21ed0f1766066470b11470c144bede3c9c755cd
|
||||
CVE-2024-42485,0,0,9c52a237d351fcf0752a53847291432cd122014665f3d16b6c4975bcf35af6a7,2024-09-18T18:31:40.427000
|
||||
CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b3d2,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca7655d,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42488,0,1,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000
|
||||
CVE-2024-42489,0,0,181648e804e837cda5bb13bcded826140342ba5660b47fc9ce10fe5b939de398,2024-09-16T19:46:18.913000
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000
|
||||
@ -259100,7 +259110,7 @@ CVE-2024-43358,0,0,f13bf774ce7b4c63763f4e38f0e32b38260bf7ed8ec364046e3e65c356bf2
|
||||
CVE-2024-43359,0,0,52133eb618029c9c6eb094064b83ba6c6a1a2658246d3d1db85edc0e06ef43d1,2024-09-04T21:43:09.613000
|
||||
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43360,0,0,7806cb26815467de093fc97bcea332d20fcda51f3ce248e59da2d3fe25d63fb1,2024-09-04T21:42:20.023000
|
||||
CVE-2024-43366,0,0,de6db1b3bc9ce504b8d633688260dcdea4ccbb17239ccaa495574500a051bc60,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43366,0,1,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000
|
||||
CVE-2024-43367,0,0,0f8409cf79e678cffdb4974928d567f1e40ad1650bdffb611ca3860d13e991c5,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83219,2024-08-15T13:01:10.150000
|
||||
CVE-2024-43369,0,0,3f715b9274c2b9674573124fd01c9f3a8a848640345dd0ef56c5a08f4595beba,2024-08-19T13:00:23.117000
|
||||
@ -259116,16 +259126,16 @@ CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202
|
||||
CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000
|
||||
CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000
|
||||
CVE-2024-43381,0,0,cadf370b69704b630cecfb0fbe8ba07b198197e9a1164f2a1cf1bce7367f0908,2024-09-11T13:02:26.053000
|
||||
CVE-2024-43385,0,0,f44d651a29aed8a2344806b9cc38f842d74cc8c9f1e466f0715c1be293cc4ac4,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43386,0,0,91576e0237baa758243bbb240f99fbb47043ee2aeca088ec84fa1c90c5bc94b5,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43387,0,0,a4da21130575cf31000ee0520fabd5e6581c9b0f1ed097b7050ada0508069518,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43388,0,0,cd8579a0d23003ba7916b304be433d28b78ffd04f4ba2c3fdf5ae23ccf0ab82b,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43389,0,0,e5b9041b8b43357fd7d5962c0f0f5e0df9172086ccc704b87c0e14af763db5f7,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43385,0,1,9f5d38d74a52e4aff95c66a9fe01102de802f5b76b33bec488a6c4b7e7096244,2024-09-27T19:33:08.770000
|
||||
CVE-2024-43386,0,1,bc2a848fad787eef345813d2c4720d9d2393c8e1df983aa7b4f1b2025bcec15b,2024-09-27T19:33:22.077000
|
||||
CVE-2024-43387,0,1,4ccf94a52793dd24dc0376add620cfdf8d8ec8b86efb2e3a9e2719aaace5a025,2024-09-27T19:33:37.497000
|
||||
CVE-2024-43388,0,1,3a919f125f0d033e58d76594811e5e9eda62fdacecf5b54a65461d36b7a50c81,2024-09-27T19:32:48.683000
|
||||
CVE-2024-43389,0,1,3f9f9cdc5886b7ecf33bb8f06aa9b373429577236913585bc5184f4c4e9d7283,2024-09-27T19:36:56.583000
|
||||
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43390,0,0,2918e060d0b1f4999190dc6da30d3c9ecea2dd943dc26f54c3a910cfd1f6bd5c,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43391,0,0,c8b82cc732101adab9a24cfc0ac4fb152b73d46d1795ca6deb817a5ae5109788,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43392,0,0,328ac81d778f6fc05fb77953922af4c887b8862a212ea694bd8bc0bb666fa060,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43393,0,0,21884049d6623ec6e8e353bb47da9fa07d81807b7aff078c759819bdf232e9c9,2024-09-10T12:09:50.377000
|
||||
CVE-2024-43390,0,1,23109d4525f6a9ca75d5d95186487af542b1184dea674403bc4a04a2882d389c,2024-09-27T19:37:28.887000
|
||||
CVE-2024-43391,0,1,e1b273922d974fb29084f2b4521133382c186185b99241fb223dbcc2186fc12f,2024-09-27T19:38:10.193000
|
||||
CVE-2024-43392,0,1,7a4ce8d1a077129e5a7ed7aa98f6ebb17ef4e5a287579f03daecd5e4e224d1cc,2024-09-27T19:04:26.060000
|
||||
CVE-2024-43393,0,1,9baf436015d55676fde0405cfe036d7154d0537886ad51cff547297f2e54588a,2024-09-27T19:36:03.473000
|
||||
CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000
|
||||
CVE-2024-43396,0,0,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000
|
||||
CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000
|
||||
@ -260135,7 +260145,7 @@ CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc1
|
||||
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
|
||||
CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000
|
||||
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45682,0,0,1a6d7f712942fb2e7ae12dd4695c3805806dea3833b9fd61b2e3bc34f67a3180,2024-09-20T12:30:51.220000
|
||||
CVE-2024-45682,0,1,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
|
||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
|
||||
@ -260148,8 +260158,8 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
|
||||
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
|
||||
CVE-2024-45723,0,0,ce867dd46d1e839d722c68090d3fbfdbc763c98fc31a5e88aad392490b0b3859,2024-09-26T18:15:07.927000
|
||||
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45744,1,1,12cdd282bbeb6dcaae97e5625f3c388f0a743cf0d2b647f5666841d51cb6d2e6,2024-09-27T17:15:12.993000
|
||||
CVE-2024-45745,1,1,228ac34cebbbf1dbb6f2db7f96e496ca39885acc6830fe3dadc9b25f7c8420ef,2024-09-27T17:15:13.167000
|
||||
CVE-2024-45744,0,0,12cdd282bbeb6dcaae97e5625f3c388f0a743cf0d2b647f5666841d51cb6d2e6,2024-09-27T17:15:12.993000
|
||||
CVE-2024-45745,0,0,228ac34cebbbf1dbb6f2db7f96e496ca39885acc6830fe3dadc9b25f7c8420ef,2024-09-27T17:15:13.167000
|
||||
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
|
||||
CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000
|
||||
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
|
||||
@ -260259,6 +260269,7 @@ CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca963
|
||||
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-46097,1,1,a2aa4eb3f3510d099c585de53942ae579fa3e3e4e4659ef29bcc8e9d212699b3,2024-09-27T18:15:05.687000
|
||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||
CVE-2024-46101,0,0,a18b9da5d1e727101239ea9a87c2c4486b3562ecdcf33f11510119792a28bbeb,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46103,0,0,b2f06763cf5ad1bb9c9824f579431b62a9daa95bd664b0f57e87a402f9838181,2024-09-26T13:32:55.343000
|
||||
@ -260276,6 +260287,8 @@ CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d
|
||||
CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000
|
||||
CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
|
||||
CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46256,1,1,dba316197e905e3b34748116deb503c053e35ccafe66da2ac53cf681697b8db5,2024-09-27T18:15:05.787000
|
||||
CVE-2024-46257,1,1,d2db966c8ceff75ace32702d7ee24ee8dfca463e199814f65b0905374cef38a2,2024-09-27T18:15:05.870000
|
||||
CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000
|
||||
CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000
|
||||
CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000
|
||||
@ -260286,14 +260299,14 @@ CVE-2024-46327,0,0,1109f4d5733337c522b43c688073dbf042a675894632702e5e62b9816340d
|
||||
CVE-2024-46328,0,0,6d725cf49973d0547b531dffd10544f7db3c88f49071ede40d544ac8d4e71635,2024-09-26T15:35:25.783000
|
||||
CVE-2024-46329,0,0,67c3a6b863dc93eeddc6458cdb7ed37a92f231ba9522b51de613709b565f065a,2024-09-26T15:35:27.397000
|
||||
CVE-2024-46330,0,0,5f5561b584280ec21bb45f30f74e33818f7bd5bdd6c0f77a96022667b1fd499f,2024-09-26T15:35:28.713000
|
||||
CVE-2024-46331,0,1,22938aafdadbf7022de7390605aae86613d7f1d9bb1d3857d6ec9f21a3624baf,2024-09-27T17:35:09.747000
|
||||
CVE-2024-46333,0,1,992c78f88d887bc986be2e0a520e5ea7469626b0dc2226548b9127039487360e,2024-09-27T17:35:11.090000
|
||||
CVE-2024-46331,0,0,22938aafdadbf7022de7390605aae86613d7f1d9bb1d3857d6ec9f21a3624baf,2024-09-27T17:35:09.747000
|
||||
CVE-2024-46333,0,0,992c78f88d887bc986be2e0a520e5ea7469626b0dc2226548b9127039487360e,2024-09-27T17:35:11.090000
|
||||
CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000
|
||||
CVE-2024-46362,0,0,8cdb883bb64f25e58b7c696699971ee36778fa528121237250c7da4497ad58d6,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46366,1,1,32fee941e3477f38496426c9dfbd23043f6b9230cc739cb2341cf527b2eb24d1,2024-09-27T17:15:13.400000
|
||||
CVE-2024-46367,1,1,58f85c2ee5f0f9ac2c557834d0c3dd066e268662e4efaed2e72a41696b171252,2024-09-27T17:15:13.487000
|
||||
CVE-2024-46366,0,0,32fee941e3477f38496426c9dfbd23043f6b9230cc739cb2341cf527b2eb24d1,2024-09-27T17:15:13.400000
|
||||
CVE-2024-46367,0,0,58f85c2ee5f0f9ac2c557834d0c3dd066e268662e4efaed2e72a41696b171252,2024-09-27T17:15:13.487000
|
||||
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46372,0,0,e3b69cc491c1ce73557c9fae2d89432e3f39b15e7ad51da831599618ee55991e,2024-09-24T15:40:12.980000
|
||||
CVE-2024-46373,0,0,364353f8eed746e65cf065bb51dddf6fa9b6298b578b96d8db4d43f0b16ff53a,2024-09-20T12:30:17.483000
|
||||
@ -260318,9 +260331,9 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188
|
||||
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
|
||||
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
|
||||
CVE-2024-46470,0,1,3ad4aad17d452edf94f38b5d839ce49d9b50a73f0481564a12ffe427a0924e17,2024-09-27T17:35:12.203000
|
||||
CVE-2024-46471,0,1,67ec8948185820878b939e5160fdc8fc3ee9ad846fe6cd648eb35b97ff25955a,2024-09-27T17:35:13.333000
|
||||
CVE-2024-46472,0,1,87b04d7053b57545ffb357ee31072a5c84eea10b695d4541748c5e6a56882f8a,2024-09-27T16:35:02.850000
|
||||
CVE-2024-46470,0,0,3ad4aad17d452edf94f38b5d839ce49d9b50a73f0481564a12ffe427a0924e17,2024-09-27T17:35:12.203000
|
||||
CVE-2024-46471,0,0,67ec8948185820878b939e5160fdc8fc3ee9ad846fe6cd648eb35b97ff25955a,2024-09-27T17:35:13.333000
|
||||
CVE-2024-46472,0,0,87b04d7053b57545ffb357ee31072a5c84eea10b695d4541748c5e6a56882f8a,2024-09-27T16:35:02.850000
|
||||
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
|
||||
CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000
|
||||
@ -260374,7 +260387,7 @@ CVE-2024-46598,0,0,3f997be93c6377cc697c394dfc90ddad6cd8938191b35fea7934308cfcf43
|
||||
CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000
|
||||
CVE-2024-46600,0,0,cae524fca9cb69012594d951fa8090d3fe8d1cfa0f217e7dac4acb986038e2d7,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46609,0,1,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000
|
||||
CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000
|
||||
CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000
|
||||
CVE-2024-46610,0,0,d922b4261099847096d8c683fe0eb8434b2ccb3c0c33dd549b34f19d2b943e06,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
|
||||
@ -260640,7 +260653,7 @@ CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae
|
||||
CVE-2024-46982,0,0,3d9f669d24afb928408eff7284c81bba148f4b4b0d8de4608d668ca1c9286073,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46983,0,0,ec8817c062e2bbc441fd890e19bc6c98486be5ca90653148f7abcab9b4d72f76,2024-09-25T17:46:48.927000
|
||||
CVE-2024-46984,0,0,8ed08a9f75ebb534fe57273695d27a9994db3769e0e07c54bfc9165453c74828,2024-09-25T17:49:17.007000
|
||||
CVE-2024-46985,0,1,f289d0c2db76b1e0a673c959417469497f1df2bc55eed06198e333b29817e22e,2024-09-27T16:35:25.473000
|
||||
CVE-2024-46985,0,0,f289d0c2db76b1e0a673c959417469497f1df2bc55eed06198e333b29817e22e,2024-09-27T16:35:25.473000
|
||||
CVE-2024-46986,0,0,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000
|
||||
CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000
|
||||
CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000
|
||||
@ -260658,9 +260671,9 @@ CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a257803
|
||||
CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
|
||||
CVE-2024-47044,0,0,404ff692afa802efbbfdf62c405c61d201fe4f2cebfdc0d42fd19c3d33c10bab,2024-09-26T19:35:23.043000
|
||||
CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000
|
||||
CVE-2024-47047,0,1,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000
|
||||
CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000
|
||||
CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000
|
||||
CVE-2024-47049,0,1,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000
|
||||
CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000
|
||||
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000
|
||||
CVE-2024-47050,0,0,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000
|
||||
CVE-2024-47058,0,0,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000
|
||||
@ -260673,10 +260686,10 @@ CVE-2024-47066,0,0,848d3503003b0beb68b0a32471fae028cff02d347e9daec18cdf8b7197aa5
|
||||
CVE-2024-47068,0,0,9fa18205ed6db75eac8827f604c295b45fb5105b39b9b04ec6642eaaaf0df04e,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47069,0,0,de213caeb9a769191162a97261070a3d98c902d6acfdcac434afd1818328a8ff,2024-09-26T13:32:55.343000
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-47070,1,1,4ea115eca8debbd7f8407d6153d3e721624d09ee0302b5e6b473ba0a4b62d9df,2024-09-27T16:15:05.413000
|
||||
CVE-2024-47070,0,0,4ea115eca8debbd7f8407d6153d3e721624d09ee0302b5e6b473ba0a4b62d9df,2024-09-27T16:15:05.413000
|
||||
CVE-2024-47075,0,0,a4c707482ed9ed15f197cc08f0fd770eba503eb24d934030135a9caa3e32073c,2024-09-26T18:15:08.757000
|
||||
CVE-2024-47076,0,0,4303df594e4b2557b464094d9194eb22d685492e61c9a7849614bf245ae949d0,2024-09-26T22:15:04.063000
|
||||
CVE-2024-47077,1,1,0283963e39ed592e425ac7ebe5b36c330cbd285fa06d3f973d91b681dd5b6580,2024-09-27T16:15:06.043000
|
||||
CVE-2024-47077,0,0,0283963e39ed592e425ac7ebe5b36c330cbd285fa06d3f973d91b681dd5b6580,2024-09-27T16:15:06.043000
|
||||
CVE-2024-47078,0,0,64213b6a5c750c509872d49c1274178c839b92046b4e8257c5790cb7b4a5d616,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
|
||||
CVE-2024-47082,0,0,863bd134b5e2e2c07206cfa4641c79a7f77a6df89fcd648b7374dfe92c23c92f,2024-09-26T13:32:02.803000
|
||||
@ -260733,7 +260746,7 @@ CVE-2024-47220,0,0,ec1088c10a16b1d5d48c36f52f549a9f66295221614c4c2acd2563482d5ed
|
||||
CVE-2024-47221,0,0,9945326a63a4f22056aa693bc302be5627c81a203ca389984e5641561e32c74d,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47222,0,0,c9d91390c6fc5cc28c9595e327041e2003c4b786ecc4a4fccc3e7dcd2477488e,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47226,0,0,67acd1dda98161941683c1ecdf3fb2829a8afb2cdb12d796e19b0a64631c82e3,2024-09-26T13:32:55.343000
|
||||
CVE-2024-47227,0,1,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000
|
||||
CVE-2024-47227,0,0,411c02c14211cd5d3ec12de94c1c6b5b491382d24a6716c2e035097b7090e042,2024-09-27T16:37:44.143000
|
||||
CVE-2024-4723,0,0,7af98ecd367a90ef8c416c400db7bb1bdf630fc1c111a3c8e6b7b48b9bb15bbe,2024-06-04T19:20:47.717000
|
||||
CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb63,2024-06-04T19:20:47.830000
|
||||
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
|
||||
@ -261135,7 +261148,7 @@ CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2
|
||||
CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000
|
||||
CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000
|
||||
CVE-2024-5170,0,0,391a03e8162665a6158987d43ca861d0d66830b727cfe85b8d6847ec08923be8,2024-09-20T12:31:20.110000
|
||||
CVE-2024-5170,0,1,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000
|
||||
CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000
|
||||
CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000
|
||||
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
|
||||
@ -262153,7 +262166,7 @@ CVE-2024-6331,0,0,52c1c6ef5119330812f0b8f9d4c8f908510020273352e90ad354980012c782
|
||||
CVE-2024-6332,0,0,6a11035168ec675eca4317d3a76c369854aee1404a3dbc4eab434b7b1210d36b,2024-09-12T12:45:37.917000
|
||||
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6336,0,0,d15a7371f14974a83964ccd43d827dda2013bed4e54e361d69b27a97f9fa2a0d,2024-09-17T15:23:02.077000
|
||||
CVE-2024-6337,0,1,11b01bdc310a03dbc48a13087ed0270063ad6dc927c6c67c79cfa387d3f39f5d,2024-09-27T17:48:00.977000
|
||||
CVE-2024-6337,0,0,11b01bdc310a03dbc48a13087ed0270063ad6dc927c6c67c79cfa387d3f39f5d,2024-09-27T17:48:00.977000
|
||||
CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000
|
||||
CVE-2024-6339,0,0,3df67bcf844ce237505ce6d6f4a1b23415ac19dce852377f3625a08647b9b177,2024-09-27T14:04:31.700000
|
||||
CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000
|
||||
@ -262463,7 +262476,7 @@ CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75b
|
||||
CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000
|
||||
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6722,0,0,703a21dd5b88a7779498c521e3d50e4d788d54c0da4855e87bfa30931015fa08,2024-09-04T15:35:25.590000
|
||||
CVE-2024-6723,0,0,481a8a1a36d866eec83227ce3938c3be3470338a3b07b50f96fdff34081346f6,2024-09-13T16:35:19.120000
|
||||
CVE-2024-6723,0,1,89ebec83340ae368fccf6f870b3378a75d74772673809cf534be51c70b5921e8,2024-09-27T18:50:00.913000
|
||||
CVE-2024-6724,0,0,4c62a72c14d0d54a44bd529f2e1e2cb1bbf7b4dd7ab83d5409a9b7e23529f22d,2024-08-13T15:35:30.033000
|
||||
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
|
||||
@ -262517,7 +262530,7 @@ CVE-2024-6780,0,0,ad87716761d57bba157b9bc6302fd56c93db87ccc83552a263372092cb4e84
|
||||
CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0cec,2024-08-19T17:15:34.797000
|
||||
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000
|
||||
CVE-2024-6785,0,0,fabc33ddb3a3c0772782f6d1c42e54b13bc3848cba3eb91d89929353543f239a,2024-09-26T13:32:55.343000
|
||||
CVE-2024-6785,0,1,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000
|
||||
CVE-2024-6786,0,0,6597b7dd569386c901be03b7245eaafe138b67af6e27e8cdf77a3a0b8ca4cea0,2024-09-26T13:32:55.343000
|
||||
CVE-2024-6787,0,0,e0b77d2378b8922074bb9dd2f1bdf4b4b3c5d5d4b21b5875d179c9f9f1a98777,2024-09-26T13:32:55.343000
|
||||
CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000
|
||||
@ -262557,7 +262570,7 @@ CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3b
|
||||
CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000
|
||||
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6849,0,0,07092c81deee0f13cbc863d08f18b6ad24a98e3f6832c77e93da65ee89b7a746,2024-09-26T16:36:13.207000
|
||||
CVE-2024-6850,0,0,82d7490f4413e8876b1b90ac23de86cbdb102477e0c7a414241be8b5b565f037,2024-09-13T16:35:19.313000
|
||||
CVE-2024-6850,0,1,b532166a73b931a8e6589cac5f39582da12c7cd2ba07fbd5ded704f1eec5891d,2024-09-27T18:30:30.930000
|
||||
CVE-2024-6852,0,0,cd867431022b85ee5515b69c46ab068b7525885927be7fa9cfc4c875a9f47878,2024-09-11T16:23:02.500000
|
||||
CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c118,2024-09-11T16:22:18.850000
|
||||
CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000
|
||||
@ -262670,8 +262683,8 @@ CVE-2024-6977,0,0,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdf
|
||||
CVE-2024-6978,0,0,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000
|
||||
CVE-2024-6979,0,0,c462ab441dc6fef278b8d322b06d9bbe90e009e07f8beeb96cea48ccdc45139d,2024-09-10T12:09:50.377000
|
||||
CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6981,1,1,8048b57105d4b6d8dd7d83d7e2217a3c5e7600ba0d800660465d27661f89b230,2024-09-27T17:15:13.653000
|
||||
CVE-2024-6983,1,1,5235a8757eb971eb238703857266679240cb5146acb8e0f374f6dd5e0ef3718b,2024-09-27T16:15:06.533000
|
||||
CVE-2024-6981,0,0,8048b57105d4b6d8dd7d83d7e2217a3c5e7600ba0d800660465d27661f89b230,2024-09-27T17:15:13.653000
|
||||
CVE-2024-6983,0,0,5235a8757eb971eb238703857266679240cb5146acb8e0f374f6dd5e0ef3718b,2024-09-27T16:15:06.533000
|
||||
CVE-2024-6984,0,0,923e45bdbdeb390a80e72f79f52c794d2a4658d69ca6fdf4fb6edad3e12c000f,2024-09-11T16:39:37.253000
|
||||
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
|
||||
@ -262763,7 +262776,7 @@ CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072a
|
||||
CVE-2024-7125,0,0,eeabb5486a5ad2f2094206d4f0142bb635fc7a57bcd2279354b026b1e44628c1,2024-08-27T13:01:37.913000
|
||||
CVE-2024-7127,0,0,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000
|
||||
CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7129,0,0,88c7eeb16d6bdfe4ed3e1123eba78af911e80193521479fee84abe44d29c44a7,2024-09-13T14:35:07.500000
|
||||
CVE-2024-7129,0,1,7be2af5cd46444dfa860a3986fbc878686c2d44c992fb72236870ca711446d78,2024-09-27T18:26:27.560000
|
||||
CVE-2024-7132,0,0,3deac5f1e9f8ee84791f2e4d6b9257b8de66af7b06b212663d3e71b6260e8de4,2024-08-29T20:37:07.980000
|
||||
CVE-2024-7133,0,0,4e98e3b561cf958bf35a6721b4cbee642ee930a0b0430e16ecd022d881c6c890,2024-09-13T16:35:19.507000
|
||||
CVE-2024-7134,0,0,c5170ada8be1ea583d3dc92d1c0c20ff0ddcfa0f860d82c947cda0aff2380786,2024-08-21T12:30:33.697000
|
||||
@ -262978,7 +262991,7 @@ CVE-2024-7386,0,0,73853b6e40a3b4b4a94fcf4c59609f559f6495383ceafa0a1df8f3191c7411
|
||||
CVE-2024-7387,0,0,de7380b259c5cde0120b2e8a809f8a10a35a7d4a44cb8d5f57cbb1470484b8a0,2024-09-20T12:31:20.110000
|
||||
CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7390,0,1,c78997aaf26baecb9ee1facf6fff2e2cee58e21d2495850b79570450be19582c,2024-09-27T17:45:05.590000
|
||||
CVE-2024-7390,0,0,c78997aaf26baecb9ee1facf6fff2e2cee58e21d2495850b79570450be19582c,2024-09-27T17:45:05.590000
|
||||
CVE-2024-7394,0,0,311dd8d09f289dca72e294063b3121b4c7fd832b8fb4e9134c8457f94c79d21d,2024-08-29T13:41:24.487000
|
||||
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
|
||||
@ -263157,7 +263170,7 @@ CVE-2024-7625,0,0,4f5f0ea453f9f08d3ef494db1594d491ac8f8c4407ed3e3b9397d9300e56df
|
||||
CVE-2024-7626,0,0,4f760cb584c0e3070ddc17926b6e9d6d673032bb5d5eadcfb5446753d53ca4e8,2024-09-25T19:32:57.807000
|
||||
CVE-2024-7627,0,0,6ac6d3af060539e387faae82d1ad555da11f32786c0cb712e03cd669f141c08f,2024-09-11T16:31:21.893000
|
||||
CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472cd,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7629,0,1,e36f49442396cfbeabe5cb5e6742e6ab9bd71bdafdbbf19c9d96f41e87c3a17b,2024-09-27T17:32:43.853000
|
||||
CVE-2024-7629,0,0,e36f49442396cfbeabe5cb5e6742e6ab9bd71bdafdbbf19c9d96f41e87c3a17b,2024-09-27T17:32:43.853000
|
||||
CVE-2024-7630,0,0,418e383b03350a1fa5d21be50b8eebc36b3c165fb7c794a3b77aa7313e9af0aa,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
|
||||
CVE-2024-7634,0,0,4dd527529f9a56c919574759618ccb2ce269642e54da32ff8c65cd32bfe0a65f,2024-08-23T16:18:28.547000
|
||||
@ -263173,7 +263186,7 @@ CVE-2024-7643,0,0,561f361e340de6652f3552e8a31740bd4d6ceba659a82983fde2458aeab94c
|
||||
CVE-2024-7644,0,0,e63d0a9dda91ba6db40f6f1d421591ac281d9566d29d32a71e7615a7e1c58496,2024-09-09T15:15:12.197000
|
||||
CVE-2024-7645,0,0,96cf494c675c38f631be8ab24881ec75b542e3b7a70aa5d3b002279709a08889,2024-08-19T17:48:06.303000
|
||||
CVE-2024-7646,0,0,0e47e4757200b360ac0ac2cd875beb2809de05dd15d4a2274662b759af795194,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7647,0,1,43a3e75626e9e17229bf7a254eb7339c5da6e172cffc0b2f527fcfcce5297646,2024-09-27T17:31:49.517000
|
||||
CVE-2024-7647,0,0,43a3e75626e9e17229bf7a254eb7339c5da6e172cffc0b2f527fcfcce5297646,2024-09-27T17:31:49.517000
|
||||
CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
|
||||
@ -263214,8 +263227,8 @@ CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b4
|
||||
CVE-2024-7693,0,0,8f49e917567dbf3d83b8fab0c0f87defce06a4391222113e25ab3be3d08b6e06,2024-09-06T16:51:35.647000
|
||||
CVE-2024-7694,0,0,915a620e49de11e538187b87ae1859b4dd8b81a9c117898d10d07c783b69fb2e,2024-09-06T17:24:42.573000
|
||||
CVE-2024-7697,0,0,56fc87c2b950fc0d4b7d08c76bcec1377c688ea98c921a8e581bb6c082412bb3,2024-09-06T18:04:28.030000
|
||||
CVE-2024-7698,0,0,f3712135d1df79d7e27fa4c4c6104096ee019b8d2b0cd61845488f2835ff9eeb,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7699,0,0,72b06587f38ad074e1e172a76007dca55e0aae951fcc370c220f50ce7ab480fe,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7698,0,1,8d09c845ea30b5a1b14332868681fb099784f66e3bda73378a3a159a0b6b09bd,2024-09-27T19:39:43.350000
|
||||
CVE-2024-7699,0,1,ed5dc56e694e06cefce7f4b6728302d59b16d08df75052ff1f1aef59a8ce1489,2024-09-27T18:59:31.277000
|
||||
CVE-2024-7700,0,0,35ccbcc6c9987f858b077e015d668845c4772768b7fa013291f6195b76e0abe5,2024-09-16T14:20:21.087000
|
||||
CVE-2024-7702,0,0,35104b2d835bcff771d3508b754ac4f00b960fb6fd0cdfa84ab47a794def21ca,2024-08-26T18:15:46.870000
|
||||
CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000
|
||||
@ -263224,10 +263237,10 @@ CVE-2024-7705,0,0,8729f8bc3ceb5c5f01c7dd391e96850b57511177f9d82b06cbc0e989f2466c
|
||||
CVE-2024-7706,0,0,f82d2763755e9a5f550b3d32288a2fafc9a32d9b764dc49c7c067ba5792a16b6,2024-08-22T13:26:21.843000
|
||||
CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb01,2024-08-22T13:23:20.327000
|
||||
CVE-2024-7709,0,0,4ea4e71ad8cd2325399b6f32c817fafe76ecfe7c20ad1838061c8bb44a136e96,2024-08-17T10:15:10.957000
|
||||
CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000
|
||||
CVE-2024-7711,0,1,5f68b281cfe401fc4184ff1613ff12ae79d70995453a2a2aa130ad5c1bee1478,2024-09-27T18:17:05.577000
|
||||
CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000
|
||||
CVE-2024-7713,0,0,087ec51e88c8fe30f0c34d44b176229232ed6289fc8aa5ebb9431dfe92cfcd5e,2024-09-27T06:15:11.327000
|
||||
CVE-2024-7714,0,1,705d8fa26395ef610bad264ffef178490d23a61ef3ede9b9fe5bf2e0a9ab5182,2024-09-27T17:35:15.420000
|
||||
CVE-2024-7714,0,0,705d8fa26395ef610bad264ffef178490d23a61ef3ede9b9fe5bf2e0a9ab5182,2024-09-27T17:35:15.420000
|
||||
CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000
|
||||
CVE-2024-7716,0,0,6e32ca8fc3d9f498e4c95945e19f3ae22dd503780e7b0ea7d794bef53d1a899a,2024-09-25T19:35:32.990000
|
||||
CVE-2024-7717,0,0,e5222da2115bd620271297bf5411cb792a41b0c4403b5c6c14bafe7da668a41a,2024-09-20T00:08:55.973000
|
||||
@ -263298,11 +263311,11 @@ CVE-2024-7813,0,0,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f
|
||||
CVE-2024-7814,0,0,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000
|
||||
CVE-2024-7815,0,0,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000
|
||||
CVE-2024-7816,0,0,1b2db663d31365ee9da148e02f7fee6f7353ee5fdc15036a02dd578f17770d3c,2024-09-26T20:23:28.730000
|
||||
CVE-2024-7817,0,0,05db7239cf0d9449e8a908421caed43ff0a27fd4a5864d6e460eaeeafce59522,2024-09-12T14:35:16.087000
|
||||
CVE-2024-7818,0,0,3d9e002b3cacb59291792ccb3901427c448dbca6f4632cfbe55bd76f7812334f,2024-09-12T14:35:16.877000
|
||||
CVE-2024-7820,0,0,edc132d96b3e34e547f2b473b9f16032278da6025751b3ece4954d1d1dab7e87,2024-09-12T14:35:17.657000
|
||||
CVE-2024-7817,0,1,7f26ae977b6327d2a59614ba3ea301244dcc145b21edee3156a2c2d963536ef9,2024-09-27T18:26:21.653000
|
||||
CVE-2024-7818,0,1,a8a60252768c6bfc8071e3d171ec5ea550be85793d142018d723cdcbb9fdc29f,2024-09-27T18:18:55.510000
|
||||
CVE-2024-7820,0,1,c0453860ab9b7e75523d5974f7f62d77644e4cfdd4c296287f5b328e58fa219d,2024-09-27T18:08:48.757000
|
||||
CVE-2024-7821,0,0,a6cbf4229b3ac9caad2c13358d94e9d25b2f946f0353199ff2ed2717953ff2a4,2024-09-04T10:15:03.553000
|
||||
CVE-2024-7822,0,0,86171139f93ec13a09ebceea06c77303b50df913b56e35d49321070793f7d6c6,2024-09-12T14:35:18.437000
|
||||
CVE-2024-7822,0,1,3e66fd0a5154ef0743417ad63783b1476c2b8be2ef3918498eb762e4c9c4ec06,2024-09-27T18:06:41.287000
|
||||
CVE-2024-7827,0,0,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000
|
||||
CVE-2024-7829,0,0,3634da4931045efa2221e4dd20ed9805c5f347e47423b6602d3467d4b2db62e9,2024-08-19T18:34:00.040000
|
||||
@ -263327,11 +263340,11 @@ CVE-2024-7850,0,0,eac62d06d40978b154610fb0b8829f684d203615f4f5ebfcbc586877034ad0
|
||||
CVE-2024-7851,0,0,59aa43af6902d4a788d7da1730827e642c78bd3a9a790eb7c6cdc9cf8851f000,2024-08-29T15:22:08.227000
|
||||
CVE-2024-7852,0,0,cfaf6efee3831acfddb66b2453fc175105bb415bea9978d14cd59ad6f5b30e0e,2024-08-29T15:23:16.160000
|
||||
CVE-2024-7853,0,0,90e064ba16388d2c255ea61f6d50069bab92e333b7116c2e5b296230c0d5372d,2024-08-29T15:22:52.710000
|
||||
CVE-2024-7854,0,1,aba539cc6b053a0969fb9c545d61b200c22ae8ea4b03c24dce9c6e90a428e01f,2024-09-27T17:27:56.723000
|
||||
CVE-2024-7854,0,0,aba539cc6b053a0969fb9c545d61b200c22ae8ea4b03c24dce9c6e90a428e01f,2024-09-27T17:27:56.723000
|
||||
CVE-2024-7856,0,0,0b05d57dab8dba6cdf2a128a5ea955132a0df5f7068b3f603d90db91d8053f54,2024-09-13T18:14:47.280000
|
||||
CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7858,0,0,dbe22e1f02da632a108fdb9c096b7008488e7f6cd1024c2ca6a33d2456cc067c,2024-09-03T14:34:09.017000
|
||||
CVE-2024-7859,0,0,2e9efdc14165216e115d44a68371c6f167a605d4d7db791f71b61c4268679b75,2024-09-12T14:35:19.213000
|
||||
CVE-2024-7859,0,1,226a85a1690e60d5c312a7296dfa4fc4fa943380666900b35d25ad4eaf87137f,2024-09-27T18:00:53.567000
|
||||
CVE-2024-7860,0,0,6478691d52b931fe14a87d864f1defb31ceb3c959fc542786a5c247463eccd66,2024-09-12T14:35:19.980000
|
||||
CVE-2024-7861,0,0,7dc841d67f7cbf14766a683bac9706b93075a04167273c804ada991b965813f0,2024-09-12T14:35:20.767000
|
||||
CVE-2024-7862,0,0,ab3213803d3b49b6ac19aa8c58cc004e989e60ff7f240b01de14d09685981992,2024-09-12T14:35:21.530000
|
||||
@ -263364,7 +263377,7 @@ CVE-2024-7902,0,0,537f874944fd44dbd760afb73c0425b644f69432ba31f47b8ba9eca8a9438f
|
||||
CVE-2024-7903,0,0,12aa6ad28e505019654eb774a3a7a79a5562f385f77f53bfd8ac4c5c637acf1a,2024-08-20T19:34:47.273000
|
||||
CVE-2024-7904,0,0,30588079f739f4e3de0560b4d43fe27db077484cfa4bc857ad835b8d84f0020d,2024-08-20T19:35:21.707000
|
||||
CVE-2024-7905,0,0,21f9c7e0a38dacbbd12a6dfd1c594b7e02a0285538c8d01b6b02b4c01004d287,2024-08-20T19:35:43.340000
|
||||
CVE-2024-7906,0,1,32f49f0cf2b8622b6d77387537df1cbf27d14a62982177ef61520f02858b577f,2024-09-27T17:54:51.877000
|
||||
CVE-2024-7906,0,0,32f49f0cf2b8622b6d77387537df1cbf27d14a62982177ef61520f02858b577f,2024-09-27T17:54:51.877000
|
||||
CVE-2024-7907,0,0,827448a6d782832b90e0dd3114804655fe12e38aa269495431146155f04a25e9,2024-08-19T18:53:05.753000
|
||||
CVE-2024-7908,0,0,1704b05a8eab2513be21f00da86f5d343c3177e7c40e6732dc94cca77c757036,2024-08-19T18:51:45.210000
|
||||
CVE-2024-7909,0,0,40f7aff5d4e7669f2f16671b680f3fd5a01c5b2e923d87f6df868e1cdd6fdef1,2024-08-21T19:15:13.487000
|
||||
@ -263453,13 +263466,13 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad
|
||||
CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000
|
||||
CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000
|
||||
CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000
|
||||
CVE-2024-8043,0,0,72068f1b94ed25675f4b4c3a0c59b47266d4077ab704f6b2bc67e237c033a67c,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8043,0,1,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000
|
||||
CVE-2024-8044,0,0,66a840b3b744914aeb912493a88172b219c2bc4688dd089a25891a08edff7e40,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8045,0,0,4f33bec2129e516f0590350db62def0ffeb2e64cb03de1e46d8b3d52953002f0,2024-09-25T19:22:03.157000
|
||||
CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000
|
||||
CVE-2024-8047,0,0,451c9202eb5241e7fe3b1625d48b44a3fdd0de8dfb43ec8dea1780c6029fedaf,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8051,0,0,ade2868d9ae58e3ed9fdbe86321a68577a09272a7aaa4d41ebc01d4d6d38b883,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8052,0,1,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000
|
||||
CVE-2024-8051,0,1,b71bf2ca4f8ce5e1c295954092599db477d1b1f3bcba16081ac3f611e48934c5,2024-09-27T18:19:41.863000
|
||||
CVE-2024-8052,0,0,d36ff2157e56024767ea82c9c1b8c76ab39601d237dbfd50c7fb1e6eeba7daeb,2024-09-27T16:55:57.383000
|
||||
CVE-2024-8054,0,0,cd3f21fbab232193f2e1023cd4fdcf2e5fe80aa9a017de7b992adfbc243b258d,2024-09-12T14:35:22.300000
|
||||
CVE-2024-8056,0,0,5fb88a6ca250e6ff67f8a1ef0c841abbb4c8f2529c05613c2143403e703e96cb,2024-09-12T13:35:23.340000
|
||||
CVE-2024-8059,0,0,bdae740e9708e98c12d1deb7f7b4958a4e9e21cc3d70a47ecc6f19d9246061d0,2024-09-14T11:47:14.677000
|
||||
@ -263481,9 +263494,9 @@ CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800d
|
||||
CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000
|
||||
CVE-2024-8088,0,0,8ddda94d9e5d462484d35576871f82a931bed67f85a71db29ea75a996b1d19a4,2024-09-04T23:15:13.100000
|
||||
CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000
|
||||
CVE-2024-8091,0,0,09118f3c00589f8d4c1997eff955d12cd62b8543f8682345521aa77586cd7711,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8092,0,0,7c06444c0d58d3fdefef665a7cbb5d71888475a88d5edbe48a2567ad9f1bc27e,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8093,0,0,28168b8d33552be411d6e6218304fae6f161324fc2f917deb7b7e8f539cabfb7,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8091,0,1,06172e44aed678336443c20950f76caa42dd2c2e908885cff9a8110617689662,2024-09-27T18:17:59.267000
|
||||
CVE-2024-8092,0,1,065d7728a5c27093389a465996d8f4f342cb2cfe4c5f3383890730cf2cd938fc,2024-09-27T18:17:24.387000
|
||||
CVE-2024-8093,0,1,98e0c7040cf9105cb1c3055778b4c0e7f9f1a20fe40737d282c5bab0fdcb3801,2024-09-27T18:16:01.683000
|
||||
CVE-2024-8096,0,0,33268897f7f8b2273839db6d4e75fbc8fdf5f760a220b507e80b08e690a9edf4,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8097,0,0,9eb75255abcd069d744af59bd7e8120e62794401b3e1be4e7c495de1066a7b41,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8102,0,0,59b268e27a6763219f51e9e55e73ae4276fd3b992bf79726ec1ccd845c10f5f9,2024-09-05T13:28:54.747000
|
||||
@ -263593,13 +263606,13 @@ CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b
|
||||
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
|
||||
CVE-2024-8253,0,0,538885466f07c28468f1d184c3fb77b594dc3a7e7631ea6be509e963086ff9ce,2024-09-25T19:42:31.943000
|
||||
CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
|
||||
CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8258,0,1,acf33ae8a1adec0534fb0ef526f8343ca036563113e584df48e051347d7f4bae,2024-09-27T18:56:41.140000
|
||||
CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
|
||||
CVE-2024-8263,0,0,ad65448f4ef9e6d39f00279a5a8db0ec57a6e502dd6ab5aa12fd95772e708ca5,2024-09-26T13:32:55.343000
|
||||
CVE-2024-8267,0,0,a2c757f79a1be4af3dcdbc6f7c080b05c84634b9f014df0bba5d8d956f6b81cf,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8268,0,0,5be7ed43bc13c42d107f9505f0e50c5c3da78418e570e46eb634a6a34dba57c1,2024-09-26T16:15:31.053000
|
||||
CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
|
||||
CVE-2024-8271,0,1,5caaf7c53ddd5d3d02088dc4ed54b782a6f9790a592df3b53ca1243988b016f0,2024-09-27T16:21:38.463000
|
||||
CVE-2024-8271,0,0,5caaf7c53ddd5d3d02088dc4ed54b782a6f9790a592df3b53ca1243988b016f0,2024-09-27T16:21:38.463000
|
||||
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
|
||||
CVE-2024-8275,0,0,856bcae8d74336b69c8630aeab4ae878894e05c9744b5e73a333105cc8b5556a,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000
|
||||
@ -263624,7 +263637,7 @@ CVE-2024-8302,0,0,e8302268b823029df660336594addee00302ff9a5d73561baeea3f2fb742c2
|
||||
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
|
||||
CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000
|
||||
CVE-2024-8310,1,1,4b4d09bbae7dc3c7636d9c5d157a7a2629566e4bc2921727c3269659425cdb4b,2024-09-27T17:15:13.970000
|
||||
CVE-2024-8310,0,0,4b4d09bbae7dc3c7636d9c5d157a7a2629566e4bc2921727c3269659425cdb4b,2024-09-27T17:15:13.970000
|
||||
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
|
||||
CVE-2024-8316,0,0,409e129101724ecd66dc3c7769b7215f176e0924920c809a0b56df28be8af585,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
|
||||
@ -263728,13 +263741,13 @@ CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918c
|
||||
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
|
||||
CVE-2024-8476,0,0,be59b11c1279f7ecf320b80a6c3e28b451b362fed6870ef30fbe31812ac167ae,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8478,0,0,175c7b9f94662d755813fa2228cd0539f44691d1180c4633af22a35129eb9a32,2024-09-26T15:53:44.297000
|
||||
CVE-2024-8479,0,1,895a7d94fd595e323b99eff6522688473ca450b242af8c3d5ea382e2a282a9b2,2024-09-27T16:12:10.427000
|
||||
CVE-2024-8479,0,0,895a7d94fd595e323b99eff6522688473ca450b242af8c3d5ea382e2a282a9b2,2024-09-27T16:12:10.427000
|
||||
CVE-2024-8480,0,0,73de76891190d432c360d36e1da93720f2abf11adbca08499bebf4ffb87eb2bd,2024-09-26T18:13:58.470000
|
||||
CVE-2024-8481,0,0,67325c0356d12406e49fab472e21b05bb6061508372f0502a0ce3d40d30f14ca,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8483,0,0,32ab224ff359b84d82ed4ce77aef264a7f492427c24d93140e77029461e7169c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8484,0,0,d0fccdedacf4dc6329ba9866ef74b74fbb5f8d079ba99b2fc034c60f4afe6c85,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8485,0,0,2d19876b7de8e9f56ec7e63c79b17d47547448dd4997ef0bac6df72b646b7654,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8490,0,0,6e5b07e5bb4afbbb49aeaadda950eceaa124fac4979667ae64ac88188fc2314b,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8490,0,1,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000
|
||||
CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
|
||||
@ -263749,7 +263762,7 @@ CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c2980
|
||||
CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38b9,2024-09-13T16:11:25.400000
|
||||
CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000
|
||||
CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000
|
||||
CVE-2024-8543,0,1,1827ebc325d7546f1e75a8e16ffad13bc42c9eac828d9fdcb95bbdde0c532bed,2024-09-27T16:46:26.243000
|
||||
CVE-2024-8543,0,0,1827ebc325d7546f1e75a8e16ffad13bc42c9eac828d9fdcb95bbdde0c532bed,2024-09-27T16:46:26.243000
|
||||
CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000
|
||||
CVE-2024-8546,0,0,21c437f0d9de25e8960a2d9fbc9927a015111c992509c4b53747f59b9615f4f7,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8549,0,0,26824bba4a7be5d3e1980cceb3f14676382c512f326742b207079a7edab4cb14,2024-09-26T13:32:02.803000
|
||||
@ -263800,7 +263813,7 @@ CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1
|
||||
CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000
|
||||
CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000
|
||||
CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000
|
||||
CVE-2024-8630,1,1,69a27a840e91c607a813416fcba4f9f4f6ef755929d1d9c70a9d24bb45f19f82,2024-09-27T17:15:14.180000
|
||||
CVE-2024-8630,0,0,69a27a840e91c607a813416fcba4f9f4f6ef755929d1d9c70a9d24bb45f19f82,2024-09-27T17:15:14.180000
|
||||
CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000
|
||||
CVE-2024-8633,0,0,6b6fa07493612adb207d4663a83235545ef325dab32fe9e233cf29d5468de603,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8635,0,0,7a33169aa1c56166fecdf7f4d906662353a5e22f1362c34800f026c91df08470,2024-09-14T15:24:45.657000
|
||||
@ -263826,11 +263839,11 @@ CVE-2024-8658,0,0,77ea359923f64bc8a9f672f9257b7ffc4a02979528e9de1aaca429a10565c2
|
||||
CVE-2024-8660,0,0,e1cfacda5ac49937121e76566dcec30a46275de6b23ffe4cf313c4cb8bedeacf,2024-09-23T23:00:00.437000
|
||||
CVE-2024-8661,0,0,5b5eb9186f84a6299e6266b90655b3635cbc98e54795da81756013706cf03752,2024-09-25T16:15:11.420000
|
||||
CVE-2024-8662,0,0,bdaf5d9d59461992195adcbbf3e9aa44ce17d187816fee0d428bb839e927e0fa,2024-09-27T12:54:36.160000
|
||||
CVE-2024-8663,0,1,64dc4dfe7e82f016d11c98a8fc5ae4162275012db52dec79b5dc2be6641db4d4,2024-09-27T16:35:46.740000
|
||||
CVE-2024-8663,0,0,64dc4dfe7e82f016d11c98a8fc5ae4162275012db52dec79b5dc2be6641db4d4,2024-09-27T16:35:46.740000
|
||||
CVE-2024-8664,0,0,3997b577f06fd6ade8df9705bd2720712ffc514d2a2a019b4c9d40380c5ebba1,2024-09-27T13:48:58.270000
|
||||
CVE-2024-8665,0,1,f6c99a5ec710565eecc74e7ed4fc9df52dc9e331e2cca577b8f47d511b3aa870,2024-09-27T16:59:28.437000
|
||||
CVE-2024-8665,0,0,f6c99a5ec710565eecc74e7ed4fc9df52dc9e331e2cca577b8f47d511b3aa870,2024-09-27T16:59:28.437000
|
||||
CVE-2024-8668,0,0,c353986416e0a4c46c78ecf60b727782bfce62870f6e122356299be7e7438e9c,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8669,0,1,a540528fa4f0bbb5defe17259c589787942e6df5d18ff3bf79d91bf53c9aac43,2024-09-27T16:08:15.487000
|
||||
CVE-2024-8669,0,0,a540528fa4f0bbb5defe17259c589787942e6df5d18ff3bf79d91bf53c9aac43,2024-09-27T16:08:15.487000
|
||||
CVE-2024-8671,0,0,44eb9fc4ae83bda74c805da6c8f69132f0b0ddef607b7afc290779058022b5c0,2024-09-26T16:38:24.447000
|
||||
CVE-2024-8678,0,0,889d21ef247546a6f2ba4419351284ba9f2f3727a17d89355bbfe7a36fdacaf2,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8680,0,0,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000
|
||||
@ -263868,7 +263881,7 @@ CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8
|
||||
CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000
|
||||
CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000
|
||||
CVE-2024-8741,0,0,ebfff4bd34d6f1e59ccb711fa16a5a762da7637ea4f4dc16823735f487b153a0,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8742,0,1,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000
|
||||
CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000
|
||||
CVE-2024-8747,0,0,c8071dd8d89406610db13dc6a04dbbb98461ebd7257641ae31a11de6b1ad5c9f,2024-09-26T19:23:12.477000
|
||||
CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000
|
||||
CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b5620,2024-09-18T20:38:42.123000
|
||||
@ -263876,7 +263889,7 @@ CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f99
|
||||
CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000
|
||||
CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000
|
||||
CVE-2024-8758,0,0,634aeeda8f9e91934f78e3b64172027c163c387830078a2c36c39ec180a63900,2024-09-27T14:29:23.157000
|
||||
CVE-2024-8761,0,0,3585691f416075376d018cf9f4fcfa97af66b09d60d17a08ef4151ff63a68129,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8761,0,1,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000
|
||||
CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000
|
||||
CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588dfe2,2024-09-20T12:31:20.110000
|
||||
CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000
|
||||
@ -263981,7 +263994,7 @@ CVE-2024-9034,0,0,3413fc4a84b9ff7c3619b4d0e0cc27a0a6e18fb3607100ba58325da27d6110
|
||||
CVE-2024-9035,0,0,ecdd08b9ce66f90d6292d7a1da978c23aae7a52839423bea89ea3accdab800d5,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9036,0,0,8f0f204961acb9a34d32ba51929ff8ed191020e5d897378afa05d39edaf4242d,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9037,0,0,9a12d1407f1a9b206c0d27c0dfa15addf768f061a25ed0110993d5cbf4244f12,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9038,0,1,9e79c4cd5c044d4cf96d5b29751fb075385f3d25ae3319702f52df3637a47b48,2024-09-27T16:11:37.710000
|
||||
CVE-2024-9038,0,0,9e79c4cd5c044d4cf96d5b29751fb075385f3d25ae3319702f52df3637a47b48,2024-09-27T16:11:37.710000
|
||||
CVE-2024-9039,0,0,2a46914eca39fc29da2da7edd5c8d5e2462d724fc7b13f9f758dbc7e741a3ad4,2024-09-27T15:58:22.493000
|
||||
CVE-2024-9040,0,0,0fb966ef41b73391708aea4bb41bcdf22035487df6b2f9dfc89d7d54ff500837,2024-09-27T15:53:28.333000
|
||||
CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b48,2024-09-27T15:57:55.073000
|
||||
@ -263993,24 +264006,24 @@ CVE-2024-9068,0,0,595a98d7de817a377ea8bab7638422f5e22adb9ec7bbec5ed5ab04456ef8d7
|
||||
CVE-2024-9069,0,0,288e488da0f8012f61662f009372321cf218ded299a5ebbf98a6261cf2fe518d,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9073,0,0,d760efb6ce0d5d4be652382e12d73083e7b14dfe21836f88aa22168f8a5841f0,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9075,0,0,561f08f3beae25688613319eafb887a3be6f9829868a49b648b14e7c001e951c,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9076,0,1,8c57021a64484b6edbf7ffabe5a971516c1732fccafbf97d4089a67e7015212f,2024-09-27T16:14:04.977000
|
||||
CVE-2024-9077,0,1,b59a81d09978bed17f369329899086dd9d16ca13d3114e4823b03c2ad7c75c03,2024-09-27T16:31:52.923000
|
||||
CVE-2024-9076,0,0,8c57021a64484b6edbf7ffabe5a971516c1732fccafbf97d4089a67e7015212f,2024-09-27T16:14:04.977000
|
||||
CVE-2024-9077,0,0,b59a81d09978bed17f369329899086dd9d16ca13d3114e4823b03c2ad7c75c03,2024-09-27T16:31:52.923000
|
||||
CVE-2024-9078,0,0,be3172dd4e65e7eeaa3d66d68e97344c6792d7c8b4c40a20e2e757753b59f979,2024-09-26T16:31:55.437000
|
||||
CVE-2024-9079,0,0,25ca6406c86368536fe0e9b4a059eb8068711d8aca15a35c51c558d3f8b216c6,2024-09-26T16:32:12.103000
|
||||
CVE-2024-9080,0,0,10c60ee13ed083e22913e875505d868ed3ad61c1349c51a535dd2d5350f20961,2024-09-26T16:32:24.083000
|
||||
CVE-2024-9081,0,1,cd31ac2955beff75987ab55f84affbefcf7a8f852445fdb0f15994c7585fa1fd,2024-09-27T16:17:51.300000
|
||||
CVE-2024-9082,0,1,28d43eb07da03dfbe2e21b80dcfa914354c18aefd8fd535a2d74aadf97042534,2024-09-27T16:18:55.797000
|
||||
CVE-2024-9083,0,1,67a84fab394181158144a0836e81995b23b9f58d31691f3f194e293ac1d2fe78,2024-09-27T16:20:11.190000
|
||||
CVE-2024-9081,0,0,cd31ac2955beff75987ab55f84affbefcf7a8f852445fdb0f15994c7585fa1fd,2024-09-27T16:17:51.300000
|
||||
CVE-2024-9082,0,0,28d43eb07da03dfbe2e21b80dcfa914354c18aefd8fd535a2d74aadf97042534,2024-09-27T16:18:55.797000
|
||||
CVE-2024-9083,0,0,67a84fab394181158144a0836e81995b23b9f58d31691f3f194e293ac1d2fe78,2024-09-27T16:20:11.190000
|
||||
CVE-2024-9084,0,0,b8bfdd527eb9d9c18e0ef2d58e4d3174bfbcd5247f01e04a08298e388d8221e2,2024-09-26T15:29:16.667000
|
||||
CVE-2024-9085,0,1,7efe88506a6c45ac35577d953498521507f72f7d900e856e38cf302351cb961c,2024-09-27T16:19:21.317000
|
||||
CVE-2024-9085,0,0,7efe88506a6c45ac35577d953498521507f72f7d900e856e38cf302351cb961c,2024-09-27T16:19:21.317000
|
||||
CVE-2024-9086,0,0,546b43681bf07c20cafc7409432de1c3e052b288702c9d1d5a02203e1f795a55,2024-09-26T15:26:10.337000
|
||||
CVE-2024-9087,0,0,2e1d3bba69ec21a54f07c53fefc0e8ef7365381256bdefd2529a316c315f438b,2024-09-26T15:16:41.557000
|
||||
CVE-2024-9088,0,0,e8e08f65c8861f2138cdcc24b4f430a0c212fe6d3cc0f5f435e6f5e759b78a83,2024-09-26T15:19:22.683000
|
||||
CVE-2024-9089,0,1,45a7777127517a8d7c1ab024e582af58ba4ea33ccdd9a5455a159e9341c5b7db,2024-09-27T16:21:28.540000
|
||||
CVE-2024-9090,0,1,8b48f3cc1a4f85ea53a5d19c200b577771b890b4e0dfd5ff781536702d0c205f,2024-09-27T16:22:23.870000
|
||||
CVE-2024-9091,0,1,3bfc998290a11bc8fab6cf9f3d600eed6ee69250246e343c9bb59fcaa6e75f53,2024-09-27T16:22:48.877000
|
||||
CVE-2024-9092,0,1,1c2c646de9ea2ba79bd5c01f3c6adbd97c309ff9880a784404443eb5dc670a7e,2024-09-27T16:23:56.710000
|
||||
CVE-2024-9093,0,1,9c381a723dcd5a5c3a6becb1e39558bfddcf6d2d39bab32327672c3bb7182479,2024-09-27T16:26:27.163000
|
||||
CVE-2024-9089,0,0,45a7777127517a8d7c1ab024e582af58ba4ea33ccdd9a5455a159e9341c5b7db,2024-09-27T16:21:28.540000
|
||||
CVE-2024-9090,0,0,8b48f3cc1a4f85ea53a5d19c200b577771b890b4e0dfd5ff781536702d0c205f,2024-09-27T16:22:23.870000
|
||||
CVE-2024-9091,0,0,3bfc998290a11bc8fab6cf9f3d600eed6ee69250246e343c9bb59fcaa6e75f53,2024-09-27T16:22:48.877000
|
||||
CVE-2024-9092,0,0,1c2c646de9ea2ba79bd5c01f3c6adbd97c309ff9880a784404443eb5dc670a7e,2024-09-27T16:23:56.710000
|
||||
CVE-2024-9093,0,0,9c381a723dcd5a5c3a6becb1e39558bfddcf6d2d39bab32327672c3bb7182479,2024-09-27T16:26:27.163000
|
||||
CVE-2024-9094,0,0,0e308d006c94a8d09d0a4caea6001ec02d11744a78c5f3fdfc5f94ed1a0ea22c,2024-09-27T15:54:09.463000
|
||||
CVE-2024-9115,0,0,677b007e44c6a6850476d54cab99d703d388e1f6185b1413799fecf3ba008a07,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9117,0,0,96ff801e5a2869848fd4e3dd25cc9a878f8aef2f8675658f7019828cd326dfe8,2024-09-26T13:32:02.803000
|
||||
@ -264026,17 +264039,18 @@ CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae5
|
||||
CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9148,0,0,67e1a8965ac157a49477c7b911dc2eab586d6712cddbbb8bebbaaf2d7b8d1009,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9155,0,0,3667cd6d9c617f3b4fff82f34cbe0acc0c5672d976fdd89baf4e1efb8fe50604,2024-09-26T15:15:18.060000
|
||||
CVE-2024-9160,1,1,715ee1443ce6e224602c969cbcd987ef5a27c7bcedffe295ef23dde41ba44f85,2024-09-27T19:15:10.733000
|
||||
CVE-2024-9166,0,0,f959a40ffb6dedc25519b3fb4ef712dde7361eac9f511d5aa4ad9abbf925f6d2,2024-09-26T17:15:04.460000
|
||||
CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9171,1,1,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000
|
||||
CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000
|
||||
CVE-2024-9173,0,0,2168d2731be3fe970ffc5ab950f08498fa3240b2ba08eefc5bcf00b7c10db164,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9177,0,0,6e2c009df0316a8da0dd2889808c0ffc99dc2f882d71b338c2c33d26f543ea1f,2024-09-26T14:15:09.697000
|
||||
CVE-2024-9198,0,0,a1f8f54995991f245b4109ccb51ed23023f74d143c0b4e7fa6f4e4802f3b1325,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9199,0,0,27e0a64b81e9357b76a0a39a250ac06701e94144499cdd254c52ef2844f97315,2024-09-26T13:32:02.803000
|
||||
CVE-2024-9202,0,0,5d3f2d6a33ba631f7d073198e169a0e32af3f18d36ba441e4605889790f358ed,2024-09-27T10:15:02.827000
|
||||
CVE-2024-9203,0,0,63881804792b3aed56f72465b329c59bdd2f8e79682e4feb93f16e7c9b49e7f2,2024-09-26T17:15:04.593000
|
||||
CVE-2024-9268,1,1,7e7771d589d5219f5f8e1d4b856d8a4ecc833e195b34661fddc76da01954ef5a,2024-09-27T17:15:14.497000
|
||||
CVE-2024-9273,1,1,d541667891e816199f828382e531f52a986321fd7f85b5856a4bc94c161620a8,2024-09-27T17:15:14.550000
|
||||
CVE-2024-9268,0,0,7e7771d589d5219f5f8e1d4b856d8a4ecc833e195b34661fddc76da01954ef5a,2024-09-27T17:15:14.497000
|
||||
CVE-2024-9273,0,0,d541667891e816199f828382e531f52a986321fd7f85b5856a4bc94c161620a8,2024-09-27T17:15:14.550000
|
||||
CVE-2024-9275,0,0,6bebcdc92872db9a9776b966b7829994144cd16473a7fe0a7c466b08b5f6ad63,2024-09-27T11:15:13.477000
|
||||
CVE-2024-9276,0,0,2cf75b1670ae2606d26d1435cd74bce525bf12e634f531162074c3a9fd3c7c76,2024-09-27T12:15:04.590000
|
||||
CVE-2024-9277,0,0,ec04fe753eee8ed7818abf01b73dcc860c29bf948c4c38797a452fce8113417c,2024-09-27T12:15:04.733000
|
||||
@ -264046,4 +264060,5 @@ CVE-2024-9280,0,0,fd07a0abd60c00c43ea242b9a30c0c6f1ba1b12d0f394c37d752db673f5c01
|
||||
CVE-2024-9281,0,0,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d720942176920,2024-09-27T13:15:18.153000
|
||||
CVE-2024-9282,0,0,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000
|
||||
CVE-2024-9283,0,0,0dc135be53023bca555d778c9a31c3d6f3a80278eb8a9232d8da6a70571f147e,2024-09-27T14:15:05.330000
|
||||
CVE-2024-9284,1,1,a3f6be1f322902c2dd706322ffd372bfbe9b47cbadedd7cc30aad50104d2b033,2024-09-27T17:15:14.600000
|
||||
CVE-2024-9284,0,0,a3f6be1f322902c2dd706322ffd372bfbe9b47cbadedd7cc30aad50104d2b033,2024-09-27T17:15:14.600000
|
||||
CVE-2024-9301,1,1,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user