mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-10-11T16:00:18.219746+00:00
This commit is contained in:
parent
fa9d13e714
commit
0880c8e799
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3538",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2021-06-02T14:15:09.993",
|
||||
"lastModified": "2021-06-14T13:37:17.353",
|
||||
"lastModified": "2024-10-11T15:23:06.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -95,9 +95,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:go.uuid_project:go.uuid:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2",
|
||||
"matchCriteriaId": "4585CCC5-D435-4978-86BA-6BE70BF425B5"
|
||||
"criteria": "cpe:2.3:a:satori:uuid:-:*:*:*:*:go:*:*",
|
||||
"matchCriteriaId": "AB02B571-6BC5-4D0E-AC19-46AEB20E5B0A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39363",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-07T19:15:11.873",
|
||||
"lastModified": "2023-09-18T21:15:55.163",
|
||||
"lastModified": "2024-10-11T14:15:05.430",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -12,6 +12,50 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "ATTACKED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -32,26 +76,6 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2032",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:53.060",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T14:22:36.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +83,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.55.5",
|
||||
"matchCriteriaId": "E8D29AD1-72A6-48F0-97BB-824EB4A40338"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zenml-io/zenml/commit/afcaf741ef9114c9b32f722f101b97de3d8d147b",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/6199cd5d-611f-4ea9-96c5-52a952ba5a56",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2035",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:53.313",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T14:20:05.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -40,6 +62,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +83,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.56.2",
|
||||
"matchCriteriaId": "B39C79D8-E418-4820-A799-CE4633861C93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zenml-io/zenml/commit/b95f083efffa56831cd41d8ed536aeb0b6038fa3",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/1cfc6493-082e-4229-9f2f-496801a6557c",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2171",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:53.647",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T14:15:32.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,14 +73,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.56.2",
|
||||
"matchCriteriaId": "B39C79D8-E418-4820-A799-CE4633861C93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zenml-io/zenml/commit/68bcb3ba60cba9729c9713a49c39502d40fb945e",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/cee06a28-7e3b-460b-b504-69add838ebe8",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2213",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:53.890",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T15:34:13.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +83,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.56.3",
|
||||
"matchCriteriaId": "0A24ABC9-62F4-4AAF-B7C3-C14F607AD79F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zenml-io/zenml/commit/58cb3d987372c91eb605853c35325701733337c2",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8f5534ac-fd08-4b8b-8c2e-35949aa36e48",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2383",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:54.970",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T15:11:36.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,14 +73,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.56.3",
|
||||
"matchCriteriaId": "0A24ABC9-62F4-4AAF-B7C3-C14F607AD79F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zenml-io/zenml/commit/f863fde1269bc355951f8cfc826c0244d88ad5e9",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/22d26f5a-c0ae-4344-aa7d-08ff5ada3963",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25092",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T11:15:49.720",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-11T14:01:36.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xlplugins:nextmove:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "2.18.0",
|
||||
"matchCriteriaId": "24709135-E5BD-4D11-A090-D6BD44DE1BA2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woo-thank-you-page-nextmove-lite/wordpress-nextmove-lite-plugin-2-17-0-subscriber-arbitrary-plugin-installation-activation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-256xx/CVE-2024-25622.json
Normal file
64
CVE-2024/CVE-2024-256xx/CVE-2024-25622.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-25622",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:03.947",
|
||||
"lastModified": "2024-10-11T15:15:03.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The configuration directives provided by the headers handler allows users to modify the response headers being sent by h2o. The configuration file of h2o has scopes, and the inner scopes (e.g., path level) are expected to inherit the configuration defined in outer scopes (e.g., global level). However, if a header directive is used in the inner scope, all the definition in outer scopes are ignored. This can lead to headers not being modified as expected. Depending on the headers being added or removed unexpectedly, this behavior could lead to unexpected client behavior. This vulnerability is fixed in commit 123f5e2b65dcdba8f7ef659a00d24bd1249141be."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/issues/3332",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-5m7v-cj65-h6pj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25929",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-09T11:15:49.947",
|
||||
"lastModified": "2024-06-10T02:52:08.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-11T14:14:03.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:multivendorx:product_catalog_mode_for_woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.0.6",
|
||||
"matchCriteriaId": "1CCC4D99-EC1C-4647-94A7-C10BF3B491A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-catalog-enquiry/wordpress-product-catalog-mode-for-woocommerce-plugin-5-0-5-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2928",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:55.680",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T15:28:03.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +83,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.11.3",
|
||||
"matchCriteriaId": "C3A84D8C-5A9A-481D-9EF8-55C0B3A03F4C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3099",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-06T19:15:59.393",
|
||||
"lastModified": "2024-06-07T14:56:05.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T15:07:16.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -41,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +83,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lfprojects:mlflow:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F18F1880-033C-4E18-913C-6C5356427ABB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/8d96374a-ce8d-480e-9cb0-0a7e5165c24a",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34122",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-07-02T14:15:13.000",
|
||||
"lastModified": "2024-07-02T17:44:45.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-11T15:01:24.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:acrobat:-:*:*:*:*:edge:*:*",
|
||||
"matchCriteriaId": "CC26933C-FE7E-45A1-938B-3CAF95E923F7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "126.0.2592.81",
|
||||
"matchCriteriaId": "0AC5F5EC-25BE-4162-BA1D-D19A40157148"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-34122",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41818",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-29T16:15:05.570",
|
||||
"lastModified": "2024-09-11T16:09:46.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-11T15:15:04.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,13 +36,43 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +106,10 @@
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/ba5f35e7680468acd7906eaabb2f69e28ed8b2aa",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/d0bfe8a3a2813a185f39591bbef222212d856164",
|
||||
"source": "security-advisories@github.com",
|
||||
|
60
CVE-2024/CVE-2024-453xx/CVE-2024-45396.json
Normal file
60
CVE-2024/CVE-2024-453xx/CVE-2024-45396.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45396",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:04.457",
|
||||
"lastModified": "2024-10-11T15:15:04.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Quicly is an IETF QUIC protocol implementation. Quicly up to commtit d720707 is susceptible to a denial-of-service attack. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using quicly. The vulnerability is addressed with commit 2a95896104901589c495bc41460262e64ffcad5c."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-617"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h2o/quicly/commit/2a95896104901589c495bc41460262e64ffcad5c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/quicly/security/advisories/GHSA-mp3c-h5gg-mm6p",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-453xx/CVE-2024-45397.json
Normal file
64
CVE-2024/CVE-2024-453xx/CVE-2024-45397.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-45397",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:04.690",
|
||||
"lastModified": "2024-10-11T15:15:04.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When an HTTP request using TLS/1.3 early data on top of TCP Fast Open or QUIC 0-RTT packets is received and the IP-address-based access control is used, the access control does not detect and prohibit HTTP requests conveyed by packets with a spoofed source address. This behavior allows attackers on the network to execute HTTP requests from addresses that are otherwise rejected by the address-based access control. The vulnerability has been addressed in commit 15ed15a. Users may disable the use of TCP FastOpen and QUIC to mitigate the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/commit/15ed15a2efb83a77bb4baaa5a119e639c2f6898a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-jf2c-xjcp-wg4c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://h2o.examp1e.net/configure/http3_directives.html",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-454xx/CVE-2024-45402.json
Normal file
60
CVE-2024/CVE-2024-454xx/CVE-2024-45402.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45402",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:04.903",
|
||||
"lastModified": "2024-10-11T15:15:04.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Picotls is a TLS protocol library that allows users select different crypto backends based on their use case. When parsing a spoofed TLS handshake message, picotls (specifically, bindings within picotls that call the crypto libraries) may attempt to free the same memory twice. This double free occurs during the disposal of multiple objects without any intervening calls to malloc Typically, this triggers the malloc implementation to detect the error and abort the process. However, depending on the internals of malloc and the crypto backend being used, the flaw could potentially lead to a use-after-free scenario, which might allow for arbitrary code execution. The vulnerability is addressed with commit 9b88159ce763d680e4a13b6e8f3171ae923a535d."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h2o/picotls/commit/9b88159ce763d680e4a13b6e8f3171ae923a535d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/picotls/security/advisories/GHSA-w7c8-wjx9-vvvv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-454xx/CVE-2024-45403.json
Normal file
68
CVE-2024/CVE-2024-454xx/CVE-2024-45403.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-45403",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:05.123",
|
||||
"lastModified": "2024-10-11T15:15:05.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. When h2o is configured as a reverse proxy and HTTP/3 requests are cancelled by the client, h2o might crash due to an assertion failure. The crash can be exploited by an attacker to mount a Denial-of-Service attack. By default, the h2o standalone server automatically restarts, minimizing the impact. However, HTTP requests that were served concurrently will still be disrupted. The vulnerability has been addressed in commit 1ed32b2. Users may disable the use of HTTP/3 to mitigate the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-617"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/commit/16b13eee8ad7895b4fe3fcbcabee53bd52782562",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/commit/1ed32b23f999acf0c5029f09c8525f93eb1d354c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/h2o/h2o/security/advisories/GHSA-4xp5-3jhc-3m92",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://h2o.examp1e.net/configure/http3_directives.html",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-470xx/CVE-2024-47074.json
Normal file
82
CVE-2024/CVE-2024-470xx/CVE-2024-47074.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-47074",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:05.353",
|
||||
"lastModified": "2024-10-11T15:15:05.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DataEase is an open source data visualization analysis tool. In Dataease, the PostgreSQL data source in the data source function can customize the JDBC connection parameters and the PG server target to be connected. In backend/src/main/java/io/dataease/provider/datasource/JdbcProvider.java, PgConfiguration class don't filter any parameters, directly concat user input. So, if the attacker adds some parameters in JDBC url, and connect to evil PG server, the attacker can trigger the PG jdbc deserialization vulnerability, and eventually the attacker can execute through the deserialization vulnerability system commands and obtain server privileges. The vulnerability has been fixed in v1.18.25."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dataease/dataease/commit/86eafc4d77f0bbc0eaa7fc58e5076a085257f259",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-jgg7-w629-wcpc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-47534",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T16:15:09.857",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"lastModified": "2024-10-11T15:15:05.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -100,6 +100,10 @@
|
||||
"url": "https://github.com/theupdateframework/go-tuf/blob/f95222bdd22d2ac4e5b8ed6fe912b645e213c3b5/metadata/metadata.go#L565-L580",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/theupdateframework/go-tuf/commit/edc30b474f5afd4cc603e17149704d5aa605151d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/theupdateframework/go-tuf/commit/f36420caba9edbfdfd64f95a9554c0836d9cf819",
|
||||
"source": "security-advisories@github.com"
|
||||
|
60
CVE-2024/CVE-2024-478xx/CVE-2024-47830.json
Normal file
60
CVE-2024/CVE-2024-478xx/CVE-2024-47830.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-47830",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:05.613",
|
||||
"lastModified": "2024-10-11T15:15:05.613",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Plane is an open-source project management tool. Plane uses the ** wildcard support to retrieve the image from any hostname as in /web/next.config.js. This may permit an attacker to induce the server side into performing requests to unintended locations. This vulnerability is fixed in 0.23.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/makeplane/plane/commit/b9f78ba42b70461c8c1d26638fa8b9beef6a96a1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/makeplane/plane/security/advisories/GHSA-39gx-38xf-c348",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-478xx/CVE-2024-47875.json
Normal file
68
CVE-2024/CVE-2024-478xx/CVE-2024-47875.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-47875",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-11T15:15:05.860",
|
||||
"lastModified": "2024-10-11T15:15:05.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cure53/DOMPurify/blob/0ef5e537a514f904b6aa1d7ad9e749e365d7185f/test/test-suite.js#L2098",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cure53/DOMPurify/commit/0ef5e537a514f904b6aa1d7ad9e749e365d7185f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cure53/DOMPurify/commit/6ea80cd8b47640c20f2f230c7920b1f4ce4fdf7a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cure53/DOMPurify/security/advisories/GHSA-gx9m-whjm-85jf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-66xx/CVE-2024-6657.json
Normal file
56
CVE-2024/CVE-2024-66xx/CVE-2024-6657.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6657",
|
||||
"sourceIdentifier": "product-security@silabs.com",
|
||||
"published": "2024-10-11T14:15:05.770",
|
||||
"lastModified": "2024-10-11T14:15:05.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A denial of service may be caused to a single peripheral device in a BLE network when multiple central \ndevices continuously connect and disconnect to the peripheral. A hard reset is required to recover the peripheral device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@silabs.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-821"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm00000E9IIbIAN?operationContext=S1",
|
||||
"source": "product-security@silabs.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7006",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-08-12T13:38:40.577",
|
||||
"lastModified": "2024-09-06T17:15:17.387",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-10-11T14:39:13.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,8 +90,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libtiff:libtiff:4.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8246A12-73A8-4171-847E-D894E0B17DAE"
|
||||
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.5.1",
|
||||
"versionEndIncluding": "4.6.0",
|
||||
"matchCriteriaId": "990756E5-66EA-41E0-8C61-0BF877443C50"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -112,6 +114,21 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D1E1C3E-0188-43C3-8911-858B5D7A2965"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71DDE212-1018-4554-9C06-4908442DE134"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -121,7 +138,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:6360",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-7006",
|
||||
|
56
CVE-2024/CVE-2024-85xx/CVE-2024-8530.json
Normal file
56
CVE-2024/CVE-2024-85xx/CVE-2024-8530.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8530",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-10-11T14:15:05.970",
|
||||
"lastModified": "2024-10-11T14:15:05.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306: Missing Authentication for Critical Function vulnerability exists that could\ncause exposure of private data when an already generated \u201clogcaptures\u201d archive is accessed\ndirectly by HTTPS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-282-01.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-85xx/CVE-2024-8531.json
Normal file
56
CVE-2024/CVE-2024-85xx/CVE-2024-8531.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8531",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-10-11T14:15:06.173",
|
||||
"lastModified": "2024-10-11T14:15:06.173",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that could\ncompromise the Data Center Expert software when an upgrade bundle is manipulated to\ninclude arbitrary bash scripts that are executed as root."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-282-01.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-87xx/CVE-2024-8755.json
Normal file
56
CVE-2024/CVE-2024-87xx/CVE-2024-8755.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8755",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-10-11T15:15:06.150",
|
||||
"lastModified": "2024-10-11T15:15:06.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:\n\n\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.kemptechnologies.com/hc/en-us/articles/30297374715661-LoadMaster-Security-Vulnerability-CVE-2024-8755",
|
||||
"source": "security@progress.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-90xx/CVE-2024-9002.json
Normal file
56
CVE-2024/CVE-2024-90xx/CVE-2024-9002.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-9002",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2024-10-11T14:15:06.397",
|
||||
"lastModified": "2024-10-11T14:15:06.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized\naccess, loss of confidentiality, integrity, and availability of the workstation when non-admin\nauthenticated user tries to perform privilege escalation by tampering with the binaries"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cybersecurity@se.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-282-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-282-03.pdf",
|
||||
"source": "cybersecurity@se.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-98xx/CVE-2024-9869.json
Normal file
16
CVE-2024/CVE-2024-98xx/CVE-2024-9869.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-9869",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-10-11T15:15:06.500",
|
||||
"lastModified": "2024-10-11T15:15:06.500",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-11T14:00:17.361688+00:00
|
||||
2024-10-11T16:00:18.219746+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-11T13:57:18.657000+00:00
|
||||
2024-10-11T15:34:13.917000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,54 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265318
|
||||
265332
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `30`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2024-48987](CVE-2024/CVE-2024-489xx/CVE-2024-48987.json) (`2024-10-11T13:15:16.197`)
|
||||
- [CVE-2024-5005](CVE-2024/CVE-2024-50xx/CVE-2024-5005.json) (`2024-10-11T13:15:16.317`)
|
||||
- [CVE-2024-6971](CVE-2024/CVE-2024-69xx/CVE-2024-6971.json) (`2024-10-11T13:15:16.537`)
|
||||
- [CVE-2024-7514](CVE-2024/CVE-2024-75xx/CVE-2024-7514.json) (`2024-10-11T13:15:16.800`)
|
||||
- [CVE-2024-8913](CVE-2024/CVE-2024-89xx/CVE-2024-8913.json) (`2024-10-11T13:15:17.040`)
|
||||
- [CVE-2024-8970](CVE-2024/CVE-2024-89xx/CVE-2024-8970.json) (`2024-10-11T13:15:17.270`)
|
||||
- [CVE-2024-9051](CVE-2024/CVE-2024-90xx/CVE-2024-9051.json) (`2024-10-11T13:15:17.477`)
|
||||
- [CVE-2024-9164](CVE-2024/CVE-2024-91xx/CVE-2024-9164.json) (`2024-10-11T13:15:17.700`)
|
||||
- [CVE-2024-9211](CVE-2024/CVE-2024-92xx/CVE-2024-9211.json) (`2024-10-11T13:15:17.883`)
|
||||
- [CVE-2024-9221](CVE-2024/CVE-2024-92xx/CVE-2024-9221.json) (`2024-10-11T13:15:18.100`)
|
||||
- [CVE-2024-9232](CVE-2024/CVE-2024-92xx/CVE-2024-9232.json) (`2024-10-11T13:15:18.313`)
|
||||
- [CVE-2024-9234](CVE-2024/CVE-2024-92xx/CVE-2024-9234.json) (`2024-10-11T13:15:18.530`)
|
||||
- [CVE-2024-9346](CVE-2024/CVE-2024-93xx/CVE-2024-9346.json) (`2024-10-11T13:15:18.740`)
|
||||
- [CVE-2024-9436](CVE-2024/CVE-2024-94xx/CVE-2024-9436.json) (`2024-10-11T13:15:18.947`)
|
||||
- [CVE-2024-9507](CVE-2024/CVE-2024-95xx/CVE-2024-9507.json) (`2024-10-11T13:15:19.160`)
|
||||
- [CVE-2024-9538](CVE-2024/CVE-2024-95xx/CVE-2024-9538.json) (`2024-10-11T13:15:19.373`)
|
||||
- [CVE-2024-9543](CVE-2024/CVE-2024-95xx/CVE-2024-9543.json) (`2024-10-11T13:15:19.577`)
|
||||
- [CVE-2024-9586](CVE-2024/CVE-2024-95xx/CVE-2024-9586.json) (`2024-10-11T13:15:19.823`)
|
||||
- [CVE-2024-9587](CVE-2024/CVE-2024-95xx/CVE-2024-9587.json) (`2024-10-11T13:15:20.043`)
|
||||
- [CVE-2024-9610](CVE-2024/CVE-2024-96xx/CVE-2024-9610.json) (`2024-10-11T13:15:20.257`)
|
||||
- [CVE-2024-9611](CVE-2024/CVE-2024-96xx/CVE-2024-9611.json) (`2024-10-11T13:15:20.487`)
|
||||
- [CVE-2024-9616](CVE-2024/CVE-2024-96xx/CVE-2024-9616.json) (`2024-10-11T13:15:20.703`)
|
||||
- [CVE-2024-9707](CVE-2024/CVE-2024-97xx/CVE-2024-9707.json) (`2024-10-11T13:15:21.233`)
|
||||
- [CVE-2024-9855](CVE-2024/CVE-2024-98xx/CVE-2024-9855.json) (`2024-10-11T13:15:21.460`)
|
||||
- [CVE-2024-9856](CVE-2024/CVE-2024-98xx/CVE-2024-9856.json) (`2024-10-11T13:15:21.883`)
|
||||
- [CVE-2024-25622](CVE-2024/CVE-2024-256xx/CVE-2024-25622.json) (`2024-10-11T15:15:03.947`)
|
||||
- [CVE-2024-45396](CVE-2024/CVE-2024-453xx/CVE-2024-45396.json) (`2024-10-11T15:15:04.457`)
|
||||
- [CVE-2024-45397](CVE-2024/CVE-2024-453xx/CVE-2024-45397.json) (`2024-10-11T15:15:04.690`)
|
||||
- [CVE-2024-45402](CVE-2024/CVE-2024-454xx/CVE-2024-45402.json) (`2024-10-11T15:15:04.903`)
|
||||
- [CVE-2024-45403](CVE-2024/CVE-2024-454xx/CVE-2024-45403.json) (`2024-10-11T15:15:05.123`)
|
||||
- [CVE-2024-47074](CVE-2024/CVE-2024-470xx/CVE-2024-47074.json) (`2024-10-11T15:15:05.353`)
|
||||
- [CVE-2024-47830](CVE-2024/CVE-2024-478xx/CVE-2024-47830.json) (`2024-10-11T15:15:05.613`)
|
||||
- [CVE-2024-47875](CVE-2024/CVE-2024-478xx/CVE-2024-47875.json) (`2024-10-11T15:15:05.860`)
|
||||
- [CVE-2024-6657](CVE-2024/CVE-2024-66xx/CVE-2024-6657.json) (`2024-10-11T14:15:05.770`)
|
||||
- [CVE-2024-8530](CVE-2024/CVE-2024-85xx/CVE-2024-8530.json) (`2024-10-11T14:15:05.970`)
|
||||
- [CVE-2024-8531](CVE-2024/CVE-2024-85xx/CVE-2024-8531.json) (`2024-10-11T14:15:06.173`)
|
||||
- [CVE-2024-8755](CVE-2024/CVE-2024-87xx/CVE-2024-8755.json) (`2024-10-11T15:15:06.150`)
|
||||
- [CVE-2024-9002](CVE-2024/CVE-2024-90xx/CVE-2024-9002.json) (`2024-10-11T14:15:06.397`)
|
||||
- [CVE-2024-9869](CVE-2024/CVE-2024-98xx/CVE-2024-9869.json) (`2024-10-11T15:15:06.500`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `15`
|
||||
|
||||
- [CVE-2023-31080](CVE-2023/CVE-2023-310xx/CVE-2023-31080.json) (`2024-10-11T13:47:12.113`)
|
||||
- [CVE-2023-34003](CVE-2023/CVE-2023-340xx/CVE-2023-34003.json) (`2024-10-11T13:52:06.707`)
|
||||
- [CVE-2024-0520](CVE-2024/CVE-2024-05xx/CVE-2024-0520.json) (`2024-10-11T13:30:31.167`)
|
||||
- [CVE-2024-1880](CVE-2024/CVE-2024-18xx/CVE-2024-1880.json) (`2024-10-11T13:23:56.230`)
|
||||
- [CVE-2024-24716](CVE-2024/CVE-2024-247xx/CVE-2024-24716.json) (`2024-10-11T13:57:18.657`)
|
||||
- [CVE-2024-42062](CVE-2024/CVE-2024-420xx/CVE-2024-42062.json) (`2024-10-11T13:26:48.907`)
|
||||
- [CVE-2024-45932](CVE-2024/CVE-2024-459xx/CVE-2024-45932.json) (`2024-10-11T13:21:12.003`)
|
||||
- [CVE-2024-46446](CVE-2024/CVE-2024-464xx/CVE-2024-46446.json) (`2024-10-11T13:04:46.337`)
|
||||
- [CVE-2024-5505](CVE-2024/CVE-2024-55xx/CVE-2024-5505.json) (`2024-10-11T13:33:54.853`)
|
||||
- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-10-11T13:15:21.013`)
|
||||
- [CVE-2021-3538](CVE-2021/CVE-2021-35xx/CVE-2021-3538.json) (`2024-10-11T15:23:06.737`)
|
||||
- [CVE-2023-39363](CVE-2023/CVE-2023-393xx/CVE-2023-39363.json) (`2024-10-11T14:15:05.430`)
|
||||
- [CVE-2024-2032](CVE-2024/CVE-2024-20xx/CVE-2024-2032.json) (`2024-10-11T14:22:36.100`)
|
||||
- [CVE-2024-2035](CVE-2024/CVE-2024-20xx/CVE-2024-2035.json) (`2024-10-11T14:20:05.590`)
|
||||
- [CVE-2024-2171](CVE-2024/CVE-2024-21xx/CVE-2024-2171.json) (`2024-10-11T14:15:32.983`)
|
||||
- [CVE-2024-2213](CVE-2024/CVE-2024-22xx/CVE-2024-2213.json) (`2024-10-11T15:34:13.917`)
|
||||
- [CVE-2024-2383](CVE-2024/CVE-2024-23xx/CVE-2024-2383.json) (`2024-10-11T15:11:36.580`)
|
||||
- [CVE-2024-25092](CVE-2024/CVE-2024-250xx/CVE-2024-25092.json) (`2024-10-11T14:01:36.157`)
|
||||
- [CVE-2024-25929](CVE-2024/CVE-2024-259xx/CVE-2024-25929.json) (`2024-10-11T14:14:03.307`)
|
||||
- [CVE-2024-2928](CVE-2024/CVE-2024-29xx/CVE-2024-2928.json) (`2024-10-11T15:28:03.530`)
|
||||
- [CVE-2024-3099](CVE-2024/CVE-2024-30xx/CVE-2024-3099.json) (`2024-10-11T15:07:16.690`)
|
||||
- [CVE-2024-34122](CVE-2024/CVE-2024-341xx/CVE-2024-34122.json) (`2024-10-11T15:01:24.393`)
|
||||
- [CVE-2024-41818](CVE-2024/CVE-2024-418xx/CVE-2024-41818.json) (`2024-10-11T15:15:04.190`)
|
||||
- [CVE-2024-47534](CVE-2024/CVE-2024-475xx/CVE-2024-47534.json) (`2024-10-11T15:15:05.490`)
|
||||
- [CVE-2024-7006](CVE-2024/CVE-2024-70xx/CVE-2024-7006.json) (`2024-10-11T14:39:13.093`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
124
_state.csv
124
_state.csv
@ -178432,7 +178432,7 @@ CVE-2021-35369,0,0,1aa0b1c1e665d6a983379b660edccedb64966fbb116db4522078f9b77de42
|
||||
CVE-2021-3537,0,0,87e695f9d46c903f76860906f0c50ff7e815e14dbc9752fc0913ffb6f759273a,2023-11-07T03:38:05.560000
|
||||
CVE-2021-35370,0,0,0a9a9fa52692fb7f577e94328f399f4246b05bf65a835d01457d945e9aa379d2,2023-03-07T02:54:41.090000
|
||||
CVE-2021-35377,0,0,85543550addbe3af8ad1c78ba6257c21d49294ea490f8b5695b691e2a50d40c3,2023-03-13T18:46:09.380000
|
||||
CVE-2021-3538,0,0,a73b3b30a515d7e004d2db8c1e34dd5c7c8561358ab808f9d937723ce96721b2,2021-06-14T13:37:17.353000
|
||||
CVE-2021-3538,0,1,9fcf8a8870a20060d6236de3bac55436ce6b203f97ed4ad02b176ddb1cace2e6,2024-10-11T15:23:06.737000
|
||||
CVE-2021-35380,0,0,8dd04051f10fe48a6eecbb9d493fa2f97d1bd38436fcede090d882c8da90a356,2022-04-25T14:10:01.120000
|
||||
CVE-2021-35387,0,0,64486451a891a8dbc088ec57fedc7ab51bd311d1f182e63a79e5e106efb5dd7d,2023-11-14T16:22:52.857000
|
||||
CVE-2021-35388,0,0,32ab42956e0d72f13ab01f0d287315414a29596ccb73227b505ee7a95b7d55ca,2023-11-14T16:22:52.857000
|
||||
@ -223488,7 +223488,7 @@ CVE-2023-31077,0,0,4668fc1d6f27794e62a31b7d385044567b1b34526c6150131ce1b8d9c1e11
|
||||
CVE-2023-31078,0,0,d477b2a0d1d7512bc944d11c939c16666f8944d055bf400150fd628339734a71,2023-11-15T18:54:15.437000
|
||||
CVE-2023-31079,0,0,a7d7220b6871bdb0c093fb44eef3bf42cda4a6a85ea300232160e7972f2f6f0b,2023-08-22T00:57:29.870000
|
||||
CVE-2023-3108,0,0,065368c6e6b13b2663cc13a29c28eb06fd9d507160d711de3867570b19d0b465,2023-07-20T01:56:37.593000
|
||||
CVE-2023-31080,0,1,1cd5dfab895a6eabff89bfcca1b027d82edf509322a5253933e58c9a821d44a3,2024-10-11T13:47:12.113000
|
||||
CVE-2023-31080,0,0,1cd5dfab895a6eabff89bfcca1b027d82edf509322a5253933e58c9a821d44a3,2024-10-11T13:47:12.113000
|
||||
CVE-2023-31081,0,0,09395963ade62990d50b9352440c5c46a40602c90f7d53b901c3fbe6b973525b,2024-03-25T01:15:53.953000
|
||||
CVE-2023-31082,0,0,dc03e713ed8f4ea8f933a310fab3cf2bcaf3002ea26d13546abb3f5dfdcaab54,2024-08-02T15:16:00.853000
|
||||
CVE-2023-31083,0,0,45f3b978206ba9e206b8ac089194e641ccfbe0361deb2f33d2c497f08508f91b,2024-03-25T01:15:54.100000
|
||||
@ -225751,7 +225751,7 @@ CVE-2023-33997,0,0,23029bc0a199d37580bdd783c305bf8857a9c030f70ff213bc693967a7518
|
||||
CVE-2023-34000,0,0,e78713cb93af9e8807d10a6226765c0ffb4131ac6c576e6f9bf5b718be3e738f,2023-06-21T21:06:14.600000
|
||||
CVE-2023-34001,0,0,899b016dace5dd55b02d2783a468aea32aeda2a6f910510d25bae7ea93e15f24,2024-06-04T16:57:41.053000
|
||||
CVE-2023-34002,0,0,01b02b0840bddbb8728afe94693e37d50c1d02cedae09524a28d1c5500979f97,2023-11-15T02:26:37.500000
|
||||
CVE-2023-34003,0,1,1957b5cd753d9b0acddfabf009b4e26acba58885b47af4fb498cdead309fd666,2024-10-11T13:52:06.707000
|
||||
CVE-2023-34003,0,0,1957b5cd753d9b0acddfabf009b4e26acba58885b47af4fb498cdead309fd666,2024-10-11T13:52:06.707000
|
||||
CVE-2023-34004,0,0,b8dd614e62887c7ad346a1138027f9fcaa1310bb84003ddc6de44b7748508361,2023-09-01T12:20:23.520000
|
||||
CVE-2023-34005,0,0,9da2c350ea033d78b4c6d01ba16825ba15dec740b0ecf882038702f26edb9169,2023-07-26T00:37:17.753000
|
||||
CVE-2023-34006,0,0,e127b9ef26a23f0afd5a58ecb97030896a46a4aa7de7b49f72279773941ab7bd,2023-06-28T07:21:30.410000
|
||||
@ -229759,7 +229759,7 @@ CVE-2023-3936,0,0,e339c49ee17f165e3cb8ed45182ad41c7e36f7e97fecd7d4447b10663f2038
|
||||
CVE-2023-39360,0,0,87e6492a0425ebb016d8564aa5e1d50c9cdb809bdd070d970e61626613170aeb,2024-03-18T20:15:07.390000
|
||||
CVE-2023-39361,0,0,04caaf8d8e77bc7b5b8a00ed313f7bdb09652628f5a728d6df8da8ba16e5255f,2024-03-18T20:15:07.513000
|
||||
CVE-2023-39362,0,0,60ffa7af0a4ef2b014e79fd7f0276e7809662d726d48b41034cba4043a526fa1,2024-03-18T20:15:07.610000
|
||||
CVE-2023-39363,0,0,cdafe04feceb7aef9d79da8f2d6251fc4ad9ee5e8118b7c062dd737781bd3da3,2023-09-18T21:15:55.163000
|
||||
CVE-2023-39363,0,1,11458520a1a6fbf4070cd7913c097b57717dfc60b84f06a01f4be49102ea3044,2024-10-11T14:15:05.430000
|
||||
CVE-2023-39364,0,0,8bd21e556c99c1e5dc5a521ac8fd9c74528a948dddf53984ff920a0fe035c0e9,2024-03-18T20:15:07.727000
|
||||
CVE-2023-39365,0,0,3d7e7e864e7dc4bbec36f0e9050414ccd03043634ef42b15757e6fc65313b280,2024-03-18T20:15:07.827000
|
||||
CVE-2023-39366,0,0,b6e399e516093f9b22303beb5d6e007a21d46ed194c2479afb380ce880781427,2023-11-09T05:15:10.317000
|
||||
@ -231956,7 +231956,7 @@ CVE-2023-4213,0,0,21c428add2eda2eb8d9843e8f25c420113e0faf0f2737e6835262686538173
|
||||
CVE-2023-42130,0,0,0241b38800c234ec8e4a2ff16f40e83d68c56ec86a9b4257cd78b46e40a43fab,2024-09-18T19:15:36.470000
|
||||
CVE-2023-42131,0,0,4e0f01a335565af1d2caffbcb3515b0a5bc3abdb5520eb1e67adabde374601fe,2024-09-18T19:15:36.553000
|
||||
CVE-2023-42132,0,0,b3614605e58c2ad6bb3381e3dd9a9ae21953bc0309c61010e3af35ddfe93114f,2023-10-03T20:56:24.067000
|
||||
CVE-2023-42133,1,1,af5e56659245d888956ffab722dc3e53b1277918d2fce2e5939ff12d4c40a42d,2024-10-11T13:15:15.190000
|
||||
CVE-2023-42133,0,0,af5e56659245d888956ffab722dc3e53b1277918d2fce2e5939ff12d4c40a42d,2024-10-11T13:15:15.190000
|
||||
CVE-2023-42134,0,0,4ee57071d16fbebb2fd73b2c73a537f320f9d80ad77a4c87162327571d527be7,2024-01-19T16:14:39.460000
|
||||
CVE-2023-42135,0,0,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000
|
||||
CVE-2023-42136,0,0,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000
|
||||
@ -241695,7 +241695,7 @@ CVE-2024-0516,0,0,76e96ba9ee813b87f0e64f73d14f08314088e66ef53cbaeb18e54d07017b5c
|
||||
CVE-2024-0517,0,0,9618523908eeb037c032acd1ead112d0f3103d9a7549c199a93df761ae93656b,2024-01-22T19:53:16.533000
|
||||
CVE-2024-0518,0,0,06cfe0138669d1b5b40a81316c7b8388ecfb6c3e22ceca04d1f26bac47601569,2024-07-03T01:44:45.150000
|
||||
CVE-2024-0519,0,0,6f6a6c52cbde63db862ed619fbe04bbbee4daea8ca4a6292cdcf0ce6eafddcc8,2024-08-14T19:40:57.177000
|
||||
CVE-2024-0520,0,1,b8a25be82a603a70c2e57673930ebfb29e6686c5b0cc11b1afd5d43d4b9e00bd,2024-10-11T13:30:31.167000
|
||||
CVE-2024-0520,0,0,b8a25be82a603a70c2e57673930ebfb29e6686c5b0cc11b1afd5d43d4b9e00bd,2024-10-11T13:30:31.167000
|
||||
CVE-2024-0521,0,0,e85b6964f0221325387cd519d13caf00b8f4ad2c55d80f6377a71c0ac9b1d7d2,2024-01-29T15:26:35.300000
|
||||
CVE-2024-0522,0,0,6b7010388e77d89349419d2819d60b201dda8336d2d142905f9025c623dec01a,2024-05-17T02:34:43.397000
|
||||
CVE-2024-0523,0,0,08a14d878b5428d89eb90376cecc1cd7daa715ec91e9ddafae1bbb46a6f1c328,2024-05-17T02:34:43.537000
|
||||
@ -242967,7 +242967,7 @@ CVE-2024-1876,0,0,e8e0571c659b0fa787427894c4b874422cd76362527c553c866da3c23dcf78
|
||||
CVE-2024-1877,0,0,09157f9013db70d521489400dd1dde0f5e6230674417516b655a173f324787df,2024-05-17T02:35:39.957000
|
||||
CVE-2024-1878,0,0,000003838e237dba5dd43a619ef99a4488543c4c7093fec65257742365e28ce9,2024-05-17T02:35:40.047000
|
||||
CVE-2024-1879,0,0,01f8ee5b9df6ab7642ee2bd3dfb26155544416292db09c2b712346021c0ed07c,2024-09-24T13:54:22.813000
|
||||
CVE-2024-1880,0,1,b1037510a41f7d21d3ee430904d50af4a089982759432138f7a1c232b9f255de,2024-10-11T13:23:56.230000
|
||||
CVE-2024-1880,0,0,b1037510a41f7d21d3ee430904d50af4a089982759432138f7a1c232b9f255de,2024-10-11T13:23:56.230000
|
||||
CVE-2024-1881,0,0,c3dc9cbb4f299764c6db7af9250664f63720297c862a9a0180254f189ca7f940,2024-10-08T21:38:34.493000
|
||||
CVE-2024-1882,0,0,260fd7f45d858edb6f067ba53f534293241a43fbd31baa88c2bd24a370e87eb7,2024-09-26T04:15:07.377000
|
||||
CVE-2024-1883,0,0,7d218b22e2f53c9af6f7c239b17390f5535af26fac5a27a6b90eb23c0d34d99e,2024-09-26T04:15:07.480000
|
||||
@ -243266,7 +243266,7 @@ CVE-2024-20316,0,0,1089bd3d53e5b2c49a8770723814eaf98c1e5899b4afab359e71b3645406a
|
||||
CVE-2024-20317,0,0,8b87f36589e7cdd5f7730f5c5346b2cb66a37c28f5a388ccb075cca1b9909da0,2024-10-03T17:58:40.703000
|
||||
CVE-2024-20318,0,0,41adde3fb857f9cea03517c6a4e2f4dbc032d61fb88e0a42b8543d819f5a2d70,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20319,0,0,0a1466563a9818d205ff8725c3cf2a5afe9d75f3720a76315e91f8e81770c747,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2032,0,0,6c9fab941a4b444e93407737c1e5c294d8f201f8109308d2a41aae9e970336f2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-2032,0,1,90e70481e24ddb603fe99e90934f16c2045c18d44a931f457f5614f379885675,2024-10-11T14:22:36.100000
|
||||
CVE-2024-20320,0,0,fd0786fa2f7ef51279d0c4fc73d926adfc689f7fdd27a0ba95adedfd6d2d5266,2024-03-13T18:15:58.530000
|
||||
CVE-2024-20321,0,0,9f164e85a915a5a4f862704d6bb8cef452f44797e3d6049905a588daf1644aa7,2024-03-04T22:45:23.647000
|
||||
CVE-2024-20322,0,0,5515197bc9b4076f0571c114c5eb66a73e81fb48b28f32d0ba7271f33bf23fb1,2024-03-13T18:15:58.530000
|
||||
@ -243290,7 +243290,7 @@ CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237ee
|
||||
CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657528,2024-03-06T21:42:54.697000
|
||||
CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5809,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2035,0,0,110d7e573a79ae4fed8a8a9d020094f1c8f635a8a07029ac6a9636d645716be8,2024-06-07T14:56:05.647000
|
||||
CVE-2024-2035,0,1,216279b16f620c2ff4b0a8961dd1dd14e0bafebc256a395c018effc533e0c28d,2024-10-11T14:20:05.590000
|
||||
CVE-2024-20350,0,0,ce1cacdaf13a845b8d98c0a6a0f4f6a156cfd7f19262d1a8cb538a5177cf3a48,2024-09-26T13:32:02.803000
|
||||
CVE-2024-20352,0,0,b6df069392724fdc834a80403afd09f590785680a76232df596c3f6fea90f0b6,2024-04-03T17:24:18.150000
|
||||
CVE-2024-20353,0,0,e2f72ffa3936c97cc6267050a0bce7d53259a8a25c98d8322d782dc399b18d7e,2024-04-26T15:22:27.803000
|
||||
@ -244248,7 +244248,7 @@ CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957
|
||||
CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000
|
||||
CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000
|
||||
CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000
|
||||
CVE-2024-21534,1,1,e9a2fb876451236a63c5658427831aeaad2a3c760a252645fbb31cc597f5996c,2024-10-11T13:15:15.667000
|
||||
CVE-2024-21534,0,0,e9a2fb876451236a63c5658427831aeaad2a3c760a252645fbb31cc597f5996c,2024-10-11T13:15:15.667000
|
||||
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
|
||||
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
|
||||
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
|
||||
@ -244359,7 +244359,7 @@ CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c3
|
||||
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
|
||||
CVE-2024-21690,0,0,63aa6e78c909be7fa5e5f93bbdaf8524fe66cd24db06ace89e57fd339e74e16d,2024-08-21T17:25:08.560000
|
||||
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2171,0,0,e9c79cd9676afcf55166b18cc4887c5a70983811183f36611429f962ee8d8a26,2024-06-07T14:56:05.647000
|
||||
CVE-2024-2171,0,1,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
|
||||
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
|
||||
CVE-2024-21722,0,0,d14653ceeea554498f54b290b2aca83cfb5fff4d83fdd9da44383d93a67c6521,2024-02-29T13:49:29.390000
|
||||
CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bce7b,2024-02-29T13:49:29.390000
|
||||
@ -244663,7 +244663,7 @@ CVE-2024-22126,0,0,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6
|
||||
CVE-2024-22127,0,0,a93c2036d31e75652d8f4eeafd412b70336432f9ad8255c87f034d5f74373945,2024-09-26T19:15:06.897000
|
||||
CVE-2024-22128,0,0,867f07a0106f89603e780ece7b7a835f530d6c4dbff3b43b95585dfd576bd64e,2024-02-13T14:01:40.577000
|
||||
CVE-2024-22129,0,0,f98c249f22037a19179779366a2c80b4076872a899c468771d964e4af4fceb0b,2024-02-13T14:01:40.577000
|
||||
CVE-2024-2213,0,0,7fd551058f046d77eb1a4cf2d0d948758135ebe94e3b98da926a348ec52ecf83,2024-06-07T14:56:05.647000
|
||||
CVE-2024-2213,0,1,f67e62c176cc50eea5691c81fd80a750d99ec2626a8cb82c5910f3ff3bb4b956,2024-10-11T15:34:13.917000
|
||||
CVE-2024-22130,0,0,5ed0ed7580c6b16e4b4d4465f7bd620f9bc720fd41b6a14f15023a4623d35141,2024-02-13T14:01:40.577000
|
||||
CVE-2024-22131,0,0,5d57fdc8574f410d9e8b9e92818f8dc89d84e4b8696d16ecf9571f3e333a1aa5,2024-02-13T14:01:40.577000
|
||||
CVE-2024-22132,0,0,54e54d90c1a6eccad4526c21ce60d5380b28635e494938ddcd8287edd9000207,2024-02-13T14:01:40.577000
|
||||
@ -245859,7 +245859,7 @@ CVE-2024-23826,0,0,0e19bb73496b56241ec1393e830256f0e651e66f2aeb56d305bbed867dcf5
|
||||
CVE-2024-23827,0,0,88cd36b23e4c9b06278751a6ce065ce9e9148c4ed002cd1a1018fa7cdb9d0f0d,2024-02-08T16:42:39.110000
|
||||
CVE-2024-23828,0,0,12c264e511fd276a0815fd8fa2c90d2715bd4b8a7c7e80a8971f8b69c2e16283,2024-02-08T01:52:59.010000
|
||||
CVE-2024-23829,0,0,d20e51dffa2680891d1f56892d162957e9eb02a78ee8014771cc2f205a6c1359,2024-02-09T03:15:09.727000
|
||||
CVE-2024-2383,0,0,5baaecb0a63919d5306bee01ae70faa1d7c0f2faffd66b4577bb26ae97e32397,2024-06-07T14:56:05.647000
|
||||
CVE-2024-2383,0,1,585ce3a48313228947e40f9e72b94221ce0a7d581a1242a34676aeed0a2812e6,2024-10-11T15:11:36.580000
|
||||
CVE-2024-23830,0,0,baf51b255b1d611a2691efce00c0d171805679867f73d6b48c17ea5c48d6f748,2024-02-22T19:07:37.840000
|
||||
CVE-2024-23831,0,0,85dc29d4c69ed89d07f94e734e98d7fea8d9a8dd87844133c4b3378b980f85af,2024-02-10T01:43:51.527000
|
||||
CVE-2024-23832,0,0,2c53e6677810065a49b3c27a486b6f9b7ab7331e27ed402ea99d5e5d9c4aaa28,2024-02-09T20:21:45.317000
|
||||
@ -246316,7 +246316,7 @@ CVE-2024-24712,0,0,3ce82ed3dbba4a1266ae48850a7e5d1eba1e2e33ca5bffdc98a0db24ee30e
|
||||
CVE-2024-24713,0,0,52afc21d6224568c6697d808bc9a47c19a481881c687daeca2410c820000a3c3,2024-02-16T15:48:04.237000
|
||||
CVE-2024-24714,0,0,9830caf628a09779e02281df3c0926b55f872fdfc96b7c09f63ab4c7aaa34ee8,2024-02-26T16:32:25.577000
|
||||
CVE-2024-24715,0,0,df613a0629c25698f31c95093d6a5baf856fd321ac48e0920cbbf12ecbcaf49a,2024-05-17T18:36:05.263000
|
||||
CVE-2024-24716,0,1,03218f90a32026e3929c445b132b8d6e3cf6f6f12e62ba420a78f461a5bb74f0,2024-10-11T13:57:18.657000
|
||||
CVE-2024-24716,0,0,03218f90a32026e3929c445b132b8d6e3cf6f6f12e62ba420a78f461a5bb74f0,2024-10-11T13:57:18.657000
|
||||
CVE-2024-24717,0,0,1e08cae8189f922d5322db91237b1bb9b993f8def8bb3809529f3fb6b7d2943a,2024-02-16T15:52:02.283000
|
||||
CVE-2024-24718,0,0,78df8cc0c25494eef903251158c69eb3ea4405c30df26d203bbb903d68a110cb,2024-03-26T12:55:05.010000
|
||||
CVE-2024-24719,0,0,128db11816302a7b9f59f8f63502e5f473a1559ee5ef8793bf52ae1d8f696645,2024-03-26T12:55:05.010000
|
||||
@ -246631,7 +246631,7 @@ CVE-2024-25089,0,0,e665d40e71849b52a984e51750a3ed30341c4f9c0766ccd2a466247b89c7c
|
||||
CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000
|
||||
CVE-2024-25090,0,0,f85b3bcd033b385efb1c9f266ce72e41f2e2d9369cf294e95ea532fc1e35d52c,2024-08-16T17:56:31.230000
|
||||
CVE-2024-25091,0,0,d822656b63074e0c8fc140e02cdc2082434684ada7eeff085f5eee9f7616d66b,2024-08-05T19:35:03.780000
|
||||
CVE-2024-25092,0,0,55e91ecfcb32027bf20dfb700d408bcea15ef7678965bccf4e36ec7f97531eb0,2024-06-10T02:52:08.267000
|
||||
CVE-2024-25092,0,1,56f6a1654ad546d6f817b6de3fa6c216c372bd5e8d2b8a33a240aba29f82d83b,2024-10-11T14:01:36.157000
|
||||
CVE-2024-25093,0,0,b8e6c12d6bc03129058956c6365ec4ac1bf71d6b0585045592f329dee7756d25,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25094,0,0,ad3e5b0466772b712a14a0bddac43dd4f4819c3d63cbd9b0815d48c9b0e7e172,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25095,0,0,bb6cc09068dcd9cfe15336a730699bbb76ab1600e21b01f93afff7d69f965730,2024-06-11T14:28:47.063000
|
||||
@ -246966,6 +246966,7 @@ CVE-2024-25618,0,0,521c40d6483be23c844eadaa045ad9d81526af9d0f0bb15136fa0c5a206a3
|
||||
CVE-2024-25619,0,0,8779b5460540f75c401ccd25f8dbe7701a4130884fad041c3d9ce354daffff0f,2024-02-15T06:23:39.303000
|
||||
CVE-2024-2562,0,0,19a87309d0aee720c095694c940b1c491bc221c82ab64cac6db44d1a3b485bf7,2024-05-17T02:38:19.323000
|
||||
CVE-2024-25620,0,0,300c4d5071efb47a78a0fb6f763869e8a3b4f9eb84a3a8b58578d91ae7032adc,2024-02-15T06:23:39.303000
|
||||
CVE-2024-25622,1,1,5b63bd8ab3671727fc4934263e53e235153dc89d47440a1ef7a84ade69598f31,2024-10-11T15:15:03.947000
|
||||
CVE-2024-25623,0,0,f8aa2dcefcad5cecc7d7e57a874064d3a0b27ee38334e8a58338063ed42280e1,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25624,0,0,f71711e300e3eaed808809e7a9b2c0205a6a35fe783a8ef447c3f23895a43c9c,2024-04-25T17:24:59.967000
|
||||
CVE-2024-25625,0,0,aeab25de3fe3426b54f1a4e56db1601e91367a113c3d5e8c5bad9b4b6dbc113e,2024-02-20T19:50:53.960000
|
||||
@ -247172,7 +247173,7 @@ CVE-2024-25925,0,0,22f9ec8621282e1a8a1afbc1eb92d4312535423b9dcf0bada4274d43ed2f2
|
||||
CVE-2024-25926,0,0,4391b0a06332370eae56811249ca3e41fbdb4ddd43556fe255f0310a21e6ff0c,2024-03-27T12:29:30.307000
|
||||
CVE-2024-25927,0,0,925620cd9b38dcdda82c5dc23471163f79f192ef57aac2bbe126924d650c3754,2024-02-28T14:06:45.783000
|
||||
CVE-2024-25928,0,0,fd24c28c5a2106d771e03de6727087950c7f1273f0c987997f5bb867af2abd16,2024-07-08T10:15:03.440000
|
||||
CVE-2024-25929,0,0,f2f0a86db6975c9fd3629b3f2bf48224559e3a6c49eb7650799828c64ae145e4,2024-06-10T02:52:08.267000
|
||||
CVE-2024-25929,0,1,480ee3dd4150dfd79792ad84012452e1d8bc7873232886fdf5f92a705e92d1a5,2024-10-11T14:14:03.307000
|
||||
CVE-2024-2593,0,0,48ef9ed3bc84639488e2982ab4982794cf82c836e8a371e79709a362c958dc80,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25930,0,0,7e8d22fed1f68607862d17657ef4ed84dea59def55af9cfaaea63955bf9a222a,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25931,0,0,f3d7891ece428c86c8c7b41314dd3c18ec196061975145f8b4d656b5f007d9dc,2024-02-29T13:49:29.390000
|
||||
@ -249798,7 +249799,7 @@ CVE-2024-29273,0,0,c5afb013b946ae2c73d92fcbdb0c49112c4146cc606c2998618843bfb65ff
|
||||
CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000
|
||||
CVE-2024-29276,0,0,3fe0ff3115a6de0b961257e7bc711a82773397cfe1f1f315880654f9d5c4ac13,2024-08-20T15:35:05.580000
|
||||
CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734adfd,2024-08-01T13:49:28.357000
|
||||
CVE-2024-2928,0,0,3c94f78fdc9693c8d4fbabf25517e239d8aeb55c719006a8f637d8f4c525f953,2024-06-07T14:56:05.647000
|
||||
CVE-2024-2928,0,1,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
|
||||
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
|
||||
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
|
||||
@ -250982,7 +250983,7 @@ CVE-2024-30986,0,0,50bf73db50b86d4c968284f5c4b0e8d0b6efe4fcd4367f443266d913e675f
|
||||
CVE-2024-30987,0,0,d1d62de096c2c3115b43f8fcf5757229f772e23999bb93b7a966e16e64b7f7a4,2024-08-01T13:50:36.050000
|
||||
CVE-2024-30988,0,0,01d0dacd03ce1e26e7a1a12da7c9a8997536bc1daebf62cfd5619e9d35194abd,2024-08-01T13:50:36.877000
|
||||
CVE-2024-30989,0,0,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa9369b,2024-07-03T01:54:32.110000
|
||||
CVE-2024-3099,0,0,df7fc1fafeab5e6abe2dc41108eea9b5e0baaaf382657013f126d487be466964,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3099,0,1,3517f63d25d45bf5a28b20d6bf1dc0c4cf25507da4eb6c081dba457e7fc36f40,2024-10-11T15:07:16.690000
|
||||
CVE-2024-30990,0,0,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000
|
||||
CVE-2024-30998,0,0,57a3e20b2db27a64aaab3601a5ceeb1ef9f704ed4059172be2576aa4d50b912e,2024-08-01T14:35:09.133000
|
||||
CVE-2024-3100,0,0,dd1299175bc3853ed90e594c5d6917a6ed69e47eea50894b7016f04c6daab02c,2024-09-14T11:47:14.677000
|
||||
@ -253249,7 +253250,7 @@ CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d1
|
||||
CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000
|
||||
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
|
||||
CVE-2024-34121,0,0,220da874534eda8c169c4a74cb0f772415521c8587102b4cac8aee70173073d0,2024-09-16T11:55:00.837000
|
||||
CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000
|
||||
CVE-2024-34122,0,1,1ec0410a2782988212e8d53b9aff3b950baab8772620259cd2192140e3a735de,2024-10-11T15:01:24.393000
|
||||
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
|
||||
CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000
|
||||
CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000
|
||||
@ -258331,7 +258332,7 @@ CVE-2024-41813,0,0,91e03e36b9e87581405a8dd69398040d61a14fc0a45ce589d6f6ebdb2f6ca
|
||||
CVE-2024-41815,0,0,fa3c6b5fdaad718b40db16c805a164fa7a9b4ae5ba2f85a17caaeb17fb76200d,2024-09-19T14:36:12.677000
|
||||
CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41817,0,0,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000
|
||||
CVE-2024-41818,0,0,34e8576dcb1a1bd2ef0841435c6e4eb9b22f044d76175d55bfedd30532739326,2024-09-11T16:09:46.303000
|
||||
CVE-2024-41818,0,1,f64eda9b558aaea8d52b8617c6abe39d371614ae2626fd147bbc82265e96d00b,2024-10-11T15:15:04.190000
|
||||
CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
|
||||
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41820,0,0,66761f44932ba996701075032b581c0ebc2041a25ba2c4f14ccc68178ac408dd,2024-08-06T16:30:24.547000
|
||||
@ -258521,7 +258522,7 @@ CVE-2024-42059,0,0,8bc741d7bdfaaf9d2da11c07689da148a970f0d71cd8bf616b239e5bbf7cc
|
||||
CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000
|
||||
CVE-2024-42060,0,0,ff15c22376c8dde36cedf61eeb3084b3bf28f3c70c1acd3697d4c1f3846960a2,2024-09-05T14:37:03.387000
|
||||
CVE-2024-42061,0,0,ac3d3c8fb09e0caaee82bc4a33d8dd91e2bd7a37069679b697256fa9ff42392a,2024-09-05T14:32:24.620000
|
||||
CVE-2024-42062,0,1,c09a77ed3aa77cb9e4fef5efc171ea522dd440c969579c3982e4eecaa9460cde,2024-10-11T13:26:48.907000
|
||||
CVE-2024-42062,0,0,c09a77ed3aa77cb9e4fef5efc171ea522dd440c969579c3982e4eecaa9460cde,2024-10-11T13:26:48.907000
|
||||
CVE-2024-42063,0,0,fb176955212cbbe386510b916a6cf2daadc2bf4a1d6f4bce61554db1fd1f0fc1,2024-09-05T17:42:12.670000
|
||||
CVE-2024-42064,0,0,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000
|
||||
CVE-2024-42065,0,0,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000
|
||||
@ -260478,9 +260479,9 @@ CVE-2024-45311,0,0,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2be
|
||||
CVE-2024-45312,0,0,ef764c6defa41a6edf70254d24eaf293afa21b3c3fa7a94ab70b620cdfc67947,2024-09-25T18:37:23.867000
|
||||
CVE-2024-45313,0,0,4968bb4eb1a02bcbcbe90803b30cccb5c26bf5a74af49d29e0350cd8e0738664,2024-09-25T18:12:53.543000
|
||||
CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ecee3c,2024-09-12T16:39:53.690000
|
||||
CVE-2024-45315,1,1,ba3d6bb772ee39d6bc5499016a92ac1f8c569adfb2fb030be2d2783f6d06e78e,2024-10-11T13:15:15.883000
|
||||
CVE-2024-45316,1,1,4e5892b82028d8fdbdd8305179407511ff3766332bf35730ff0ba8e888812f60,2024-10-11T13:15:16.010000
|
||||
CVE-2024-45317,1,1,275e9c03739456c391fe81ca5fee61b756e8c635c4f5a6c7e3a5dd1910911ac8,2024-10-11T13:15:16.103000
|
||||
CVE-2024-45315,0,0,ba3d6bb772ee39d6bc5499016a92ac1f8c569adfb2fb030be2d2783f6d06e78e,2024-10-11T13:15:15.883000
|
||||
CVE-2024-45316,0,0,4e5892b82028d8fdbdd8305179407511ff3766332bf35730ff0ba8e888812f60,2024-10-11T13:15:16.010000
|
||||
CVE-2024-45317,0,0,275e9c03739456c391fe81ca5fee61b756e8c635c4f5a6c7e3a5dd1910911ac8,2024-10-11T13:15:16.103000
|
||||
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
|
||||
CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f75b,2024-09-20T16:23:51.397000
|
||||
@ -260512,11 +260513,15 @@ CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb
|
||||
CVE-2024-45393,0,0,6f436bc32d420db4f8aef33efc64d5a86243ff621c73802c298c0db31d80b7a3,2024-09-10T15:50:47.237000
|
||||
CVE-2024-45394,0,0,087a53dae86480e9cc9b0f35c92b2e1955ad080485b753f37f05c38b033a4e79,2024-10-09T15:15:13.600000
|
||||
CVE-2024-45395,0,0,5d56a4af61ec059101686b1e7cb37e5e2b811fdef7d02e3f80cc3ab9c9de60ec,2024-09-24T16:50:07.930000
|
||||
CVE-2024-45396,1,1,abc3a56de497c3db1e9c719057589373f50ec3488667ad449d86758239d1ace7,2024-10-11T15:15:04.457000
|
||||
CVE-2024-45397,1,1,ba9520d135d5b299165373f021d4c7e18285bf6fe4c285c8a95f632fc301f1f5,2024-10-11T15:15:04.690000
|
||||
CVE-2024-45398,0,0,7d0ffef7297178b253d2c7dc1d3134ea1f5d20b5e1c2ba29b34a3e96958f60bb,2024-09-25T19:20:52.527000
|
||||
CVE-2024-45399,0,0,00e25ddf2914c9fa87aad2e5386f06040c0acda61d936c8ae5f89b710f3a24c9,2024-09-24T16:48:10.083000
|
||||
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
|
||||
CVE-2024-45400,0,0,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000
|
||||
CVE-2024-45401,0,0,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000
|
||||
CVE-2024-45402,1,1,5faab78cba4c9a6e607d0e81f8111307b37f2eedf4e571c4a57ad4c467db3e04,2024-10-11T15:15:04.903000
|
||||
CVE-2024-45403,1,1,39d857cd7bc12bdf5b626798796853ec2e5da6755b289b55edc31256410da729,2024-10-11T15:15:05.123000
|
||||
CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000
|
||||
CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000
|
||||
CVE-2024-45407,0,0,761b4924e4b46db1752cf42f388ca76c7e573211ea8b116cb02c0d2e460e33eb,2024-09-20T16:18:46.717000
|
||||
@ -260751,7 +260756,7 @@ CVE-2024-45919,0,0,a4f6c3aaae803704b42db170e95e39ee4fc8065aa544a81df40b13b36d1e1
|
||||
CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000
|
||||
CVE-2024-45920,0,0,ea56e67e89fba77fab53ce0c18965669797ee29dd0e8472343575caa10980571,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000
|
||||
CVE-2024-45932,0,1,2ed9f934b88b8715dee6d1403606d8675e56a0a52183b37f1e481d7c65afc5b2,2024-10-11T13:21:12.003000
|
||||
CVE-2024-45932,0,0,2ed9f934b88b8715dee6d1403606d8675e56a0a52183b37f1e481d7c65afc5b2,2024-10-11T13:21:12.003000
|
||||
CVE-2024-45933,0,0,5a4c436ed920625b31726987668deff1799338d95efdc881a4c3f3acc7baa01c,2024-10-08T19:35:19.013000
|
||||
CVE-2024-4594,0,0,6353480e983dfe68c6b174c583e75b67b6ebde5befefc4e80bf75a35aedb2302,2024-06-04T19:20:43.657000
|
||||
CVE-2024-4595,0,0,a34d956039b7343ba69c0066573aab0165928a92f89b42d7c5d672a51296492e,2024-06-17T19:15:59.063000
|
||||
@ -260882,7 +260887,7 @@ CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe25
|
||||
CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000
|
||||
CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000
|
||||
CVE-2024-46441,0,0,4b4be1d9027655599991c0b9ab932c1005548268b9b4c663bc49101f1899dc44,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46446,0,1,7f5ebc0973c576e460839166e88991df0085c970e43622beb014216e304658dd,2024-10-11T13:04:46.337000
|
||||
CVE-2024-46446,0,0,7f5ebc0973c576e460839166e88991df0085c970e43622beb014216e304658dd,2024-10-11T13:04:46.337000
|
||||
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
|
||||
CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000
|
||||
CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000
|
||||
@ -261274,6 +261279,7 @@ CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1b
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000
|
||||
CVE-2024-47071,0,0,2a2727cf2aa9f31ddc31166413e132f87e7e569f257fdb08eb6f77a7cd1bf2ac,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47074,1,1,6aee76412b8391ab2444040d9063f8b7e2e0a9e3d5a524462cecc27bf455c642,2024-10-11T15:15:05.353000
|
||||
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000
|
||||
@ -261497,7 +261503,7 @@ CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be1
|
||||
CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0c29,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47532,0,0,8782a61a2e6393b4eaa2920ce672fbaf71cd431530e5dbfab9dfea37a0c9da22,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47534,0,0,2c8638aa4776b453b12ca3480cb4741f7283b9b6a2cc41fc9eec726fcf451424,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47534,0,1,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a057,2024-10-11T15:15:05.490000
|
||||
CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
@ -261627,6 +261633,7 @@ CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e
|
||||
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47828,0,0,2a3f37a9071256a649791f70c6456109926a20b394ceabbba1acf5e3bcc75ff1,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
|
||||
CVE-2024-47830,1,1,078fd3f57c1e124fe25812fa092e081898b54bb5455f5ac15a9ac7b0028bfea1,2024-10-11T15:15:05.613000
|
||||
CVE-2024-47832,0,0,6eaf4cba1d0f1ac09d634a837b942c4a4d31fbca5ff514618ce9cde402d23db0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47833,0,0,780bba6686a13dc95d3fa2e5d0a56f764e3e264192219eb33ec68032f867f21c,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000
|
||||
@ -261649,6 +261656,7 @@ CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f
|
||||
CVE-2024-47870,0,0,67440b65a260801b69dd4b36e2659045709b26a62ba343a9258c4e21ff3805ba,2024-10-10T23:15:03.070000
|
||||
CVE-2024-47871,0,0,4598420fb90bc720fd4ef6c3c6d6760832c25f6aa06e45d621b9a1ef226d8d4c,2024-10-10T23:15:03.187000
|
||||
CVE-2024-47872,0,0,8471c34cf55992e157ff7eba332e41edd983c92bf011e2e751c8d26e7ec94000,2024-10-10T23:15:03.303000
|
||||
CVE-2024-47875,1,1,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0946,2024-10-11T15:15:05.860000
|
||||
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
|
||||
CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000
|
||||
CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000
|
||||
@ -261772,7 +261780,7 @@ CVE-2024-48958,0,0,a8ea5041853fb7fcb2158a179eb96f8aef37701d1e6738c4d3b90b08bd953
|
||||
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000
|
||||
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
|
||||
CVE-2024-48987,1,1,1b465c51a79913665e7786ff50ee27be5e1d6dd26e7dd86eff14b0f4535bc2bf,2024-10-11T13:15:16.197000
|
||||
CVE-2024-48987,0,0,1b465c51a79913665e7786ff50ee27be5e1d6dd26e7dd86eff14b0f4535bc2bf,2024-10-11T13:15:16.197000
|
||||
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
|
||||
CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000
|
||||
@ -261861,7 +261869,7 @@ CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be
|
||||
CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf875190207207,2024-08-01T13:59:37.720000
|
||||
CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000
|
||||
CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000
|
||||
CVE-2024-5005,1,1,e9dd73ffa50e0cdeafd34f8309b57c5a00750a217333583677cda9600bcf87a4,2024-10-11T13:15:16.317000
|
||||
CVE-2024-5005,0,0,e9dd73ffa50e0cdeafd34f8309b57c5a00750a217333583677cda9600bcf87a4,2024-10-11T13:15:16.317000
|
||||
CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24
|
||||
CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000
|
||||
CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000
|
||||
@ -262320,7 +262328,7 @@ CVE-2024-5501,0,0,26070cb64be69726a3e53d21c4a7b37433e6fc5848925edeefa1dca5b1a345
|
||||
CVE-2024-5502,0,0,f44f822caf8b5e7052917a73385fe306a6112aedf052b972c8897c4cfe3388bb,2024-09-12T21:05:37.880000
|
||||
CVE-2024-5503,0,0,1cb7ec9812df8ec09d21a8b50ab54c8421f9f9a3696399f8cf01057ff5629e64,2024-07-17T13:53:37.643000
|
||||
CVE-2024-5504,0,0,c9387f8cc727d3178a2e16ac3c8996c4ce5ec1145aa8a5124e81e8cb3cf535a8,2024-07-05T14:46:38.860000
|
||||
CVE-2024-5505,0,1,1ca65340d1028bce6c7b624817db2c877a4d7215737966ade735b74b7581f391,2024-10-11T13:33:54.853000
|
||||
CVE-2024-5505,0,0,1ca65340d1028bce6c7b624817db2c877a4d7215737966ade735b74b7581f391,2024-10-11T13:33:54.853000
|
||||
CVE-2024-5506,0,0,a39671e78235b40037509107b8c421fae2ab16362444587707c25560f1578156,2024-08-09T13:30:46.827000
|
||||
CVE-2024-5507,0,0,25b7ab5155252ca6c92d8fe7bfa1cedb021cca01f945599561ed2a09d85f7e8f,2024-08-09T13:30:39.467000
|
||||
CVE-2024-5508,0,0,2b850c2308fdad40eba67dafab3c18f5e4849c085d14c12319395964a2a53adc,2024-08-09T13:30:49.043000
|
||||
@ -263304,6 +263312,7 @@ CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c
|
||||
CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000
|
||||
CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000
|
||||
CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000
|
||||
CVE-2024-6657,1,1,f9f1eb8afc0fcee1648ff3b1592d9c7d58198951ffaa3d5eddbf57bf7a2d64a5,2024-10-11T14:15:05.770000
|
||||
CVE-2024-6658,0,0,7f941e970e0ddd88d17ac95cf96717b7dab27bb1b6ec72400c0fd64e8c2d71b4,2024-09-23T20:15:05.560000
|
||||
CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000
|
||||
CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000
|
||||
@ -263549,7 +263558,7 @@ CVE-2024-6967,0,0,57fa919e819063e047f2b3f1e91ca78ed8e25c795dd23e1130d79afda274d9
|
||||
CVE-2024-6968,0,0,dcf4fdd98b06a8e0045757b1e3508bd497797b584b272df840a344f24010b384,2024-08-19T17:49:54.017000
|
||||
CVE-2024-6969,0,0,a98e2b6f93f948b11fce949d5d2bf2ae38a52860637730f6865f49bf11e07542,2024-08-19T17:50:03.167000
|
||||
CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000
|
||||
CVE-2024-6971,1,1,cdd9ef25f6aa6f7b77c5d87fd6b384bb2995225b4dbdd54002171c4e418ac2ad,2024-10-11T13:15:16.537000
|
||||
CVE-2024-6971,0,0,cdd9ef25f6aa6f7b77c5d87fd6b384bb2995225b4dbdd54002171c4e418ac2ad,2024-10-11T13:15:16.537000
|
||||
CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000
|
||||
CVE-2024-6973,0,0,9bcac54b07f64371109cf6c17f16f57c8cc24336c737269dc5d4e2a7b649dbb8,2024-08-27T15:34:18.620000
|
||||
CVE-2024-6974,0,0,87e35dfa7758fb3e456f51ae7c2c1005342757b141d54c95c0eb015bf95a4e2c,2024-08-27T15:36:40.667000
|
||||
@ -263577,7 +263586,7 @@ CVE-2024-7001,0,0,c36cc44ed743aca43eac7951b6662bd893691f9a45d57142d09098c4fe318e
|
||||
CVE-2024-7003,0,0,c2f51c1b71164a15818ef9209a48a467e859077ffdde417023c4b7a222f91993,2024-08-07T19:52:18.500000
|
||||
CVE-2024-7004,0,0,579c7092925f522b24930d2f858d246e2f0e8b8814ade95b044da8929a9fa444,2024-08-07T21:32:44.190000
|
||||
CVE-2024-7005,0,0,50047c6e5a9aa1663d251a4f8d2f7feee05d4f308668b613173701adaf5c68b3,2024-08-07T19:56:48.777000
|
||||
CVE-2024-7006,0,0,407596314396364e4943bbca86287583cbccbfd5ef54346220152eb6a6a02378,2024-09-06T17:15:17.387000
|
||||
CVE-2024-7006,0,1,d510a15f87dd1c79e35f8009bc9e9e19d5574ea60c240c6e393b2fbd477adf6c,2024-10-11T14:39:13.093000
|
||||
CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000
|
||||
CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000
|
||||
CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000
|
||||
@ -263965,7 +263974,7 @@ CVE-2024-7506,0,0,8ce5e793bea3ef05c090588e0452278f00c3b03b884fc5816b50a2fc0825ed
|
||||
CVE-2024-7507,0,0,6bc1191146772bbaa999b0d6a827100d208121d95729ccca9fad3126c9340161,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7512,0,0,64969c8356c27f20386cdfa0c38d50ded85817d5026c9d96e7d342b04fbd9f28,2024-08-30T18:19:01.187000
|
||||
CVE-2024-7513,0,0,9e0dea33b007eccb273e626ffa6cce86e938d130dbfcfa937121ca05aa4099ce,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7514,1,1,69b1748af2de10381664303f051e51fd916f2db8bcda8cccf3fa904fe275ad04,2024-10-11T13:15:16.800000
|
||||
CVE-2024-7514,0,0,69b1748af2de10381664303f051e51fd916f2db8bcda8cccf3fa904fe275ad04,2024-10-11T13:15:16.800000
|
||||
CVE-2024-7515,0,0,3a174c853c7ff7ac11f06a078625d3fec604b25f74f3c9dd6a512b7295373686,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7518,0,0,3d74948c02d4c957921d5b67aab57df80b7795ebc72bd26ca456b0a500d24f9e,2024-08-19T17:52:53.887000
|
||||
CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da32737657,2024-08-12T16:04:20
|
||||
@ -264714,6 +264723,8 @@ CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cc
|
||||
CVE-2024-8522,0,0,2ab431c4f2cf5ab967664e41dd1dc524f59071081def8323632354294bee4f38,2024-09-13T16:12:30.497000
|
||||
CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000
|
||||
CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38b9,2024-09-13T16:11:25.400000
|
||||
CVE-2024-8530,1,1,6f70a04c33a47c6b2d9ca700997a218001fbbbbfcaad3aa47eccbbbdc529e1b7,2024-10-11T14:15:05.970000
|
||||
CVE-2024-8531,1,1,bde030e3249e7673e1400e4ea79ce391a49b7805603c284567aa0e282874b56a,2024-10-11T14:15:06.173000
|
||||
CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000
|
||||
CVE-2024-8536,0,0,a7b1e09acaf4ac1b8946f962d2bb0e6dee99d2fed00608df37ed579fb4435262,2024-10-03T18:16:17.740000
|
||||
CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000
|
||||
@ -264858,6 +264869,7 @@ CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b56
|
||||
CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000
|
||||
CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000
|
||||
CVE-2024-8755,1,1,d48cd781a066209d88f0be43bcbea7039d3c727125dd2ea2d4b21d6a406c14cf,2024-10-11T15:15:06.150000
|
||||
CVE-2024-8758,0,0,fea72da3ec447aa80df355b080e42aa6b936f28594d975635bc512eef8e85985,2024-10-07T21:35:03.193000
|
||||
CVE-2024-8761,0,0,848a595fd57d8370e05b835997d27866b56b6fe7dc68e418780d166762e6c8fc,2024-09-27T18:41:43.043000
|
||||
CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000
|
||||
@ -264927,7 +264939,7 @@ CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be63227
|
||||
CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000
|
||||
CVE-2024-8910,0,0,381e6285f77cbfcd68b12e9f3c36f92b4377fd4642413a4087debb4746eed093,2024-10-03T17:34:27.913000
|
||||
CVE-2024-8911,0,0,3e740b3cf92ecc1f17356bd7912ea5093c6c60b7cb91fb7bff5c155129d89dfe,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8913,1,1,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000
|
||||
CVE-2024-8913,0,0,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000
|
||||
CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000
|
||||
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
|
||||
CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000
|
||||
@ -264954,7 +264966,7 @@ CVE-2024-8964,0,0,c8fc4fc0d8f6e4149ea3cd0239ed4708c78c8d6f77eb0df4938d6649d94bf7
|
||||
CVE-2024-8965,0,0,fcd9a7faf9aba17ebbc93d83d1389f5891b9c0797caaf85615a1a91da1ce5a78,2024-10-04T19:04:03.157000
|
||||
CVE-2024-8967,0,0,0e61388d89e65d4552c8513d8ec8c307c7a4bc14fde1f860df9e7663ba49f28c,2024-10-08T18:47:12.110000
|
||||
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8970,1,1,01220d239772239c552efb8067c56a2081891e04faac8e9af54c0668dd9acf39,2024-10-11T13:15:17.270000
|
||||
CVE-2024-8970,0,0,01220d239772239c552efb8067c56a2081891e04faac8e9af54c0668dd9acf39,2024-10-11T13:15:17.270000
|
||||
CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000
|
||||
CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
|
||||
CVE-2024-8977,0,0,1854c355a879a1753be7595f13bc9f67fdb20e00c1bb5266672eb0282e59a99d,2024-10-10T12:51:56.987000
|
||||
@ -264967,6 +264979,7 @@ CVE-2024-8990,0,0,ebe58ed4a084d59384bf44303a373b31562e7163a1320c584d218212811f28
|
||||
CVE-2024-8991,0,0,36ea31132f642cce3da65bf6a2c52220b14f1ba567442136b19c870ca92cc82c,2024-10-04T18:56:30.583000
|
||||
CVE-2024-8996,0,0,b0907780bcace0477557b6ba9bb55a2aefa2e27bdc88e1eb50e40fe332316c17,2024-10-01T19:16:02.793000
|
||||
CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000
|
||||
CVE-2024-9002,1,1,0d06cbf5f4a846a907b6a2a43d11d3555b8d2bcf703850c328ef4cac300ffef6,2024-10-11T14:15:06.397000
|
||||
CVE-2024-9003,0,0,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000
|
||||
CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000
|
||||
CVE-2024-9005,0,0,61099b22866a74984f444f0a6d108911a7f5d019e3cfe0c7b08ac38e148f742f,2024-10-10T12:56:30.817000
|
||||
@ -265001,7 +265014,7 @@ CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b
|
||||
CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000
|
||||
CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
|
||||
CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000
|
||||
CVE-2024-9051,1,1,cd9f5066c63e39d4ce5479a5ea7f24fe1eed0d9db90cc0d316834afb0392bf0a,2024-10-11T13:15:17.477000
|
||||
CVE-2024-9051,0,0,cd9f5066c63e39d4ce5479a5ea7f24fe1eed0d9db90cc0d316834afb0392bf0a,2024-10-11T13:15:17.477000
|
||||
CVE-2024-9054,0,0,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000
|
||||
CVE-2024-9057,0,0,8f186945e14f31b85c7dab0f889179203746f07361926bd0e395e83df78388b0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
|
||||
@ -265062,7 +265075,7 @@ CVE-2024-9156,0,0,15471148679479d1c4996386b3c830796b4238e3e438030cfa3cd455d3b543
|
||||
CVE-2024-9158,0,0,4fc7d51e8c01309b5be37e99b987b450b97283230cd81ff5464aaed45b24a100,2024-10-07T16:13:49.027000
|
||||
CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9161,0,0,64c617d54e278f215ea553b63862cfa05f613731871770da9abd12448d8f4117,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9164,1,1,9992870700450aea4f4accfed1feb88e203e45183a15e0b94e4dc0ae91688c8d,2024-10-11T13:15:17.700000
|
||||
CVE-2024-9164,0,0,9992870700450aea4f4accfed1feb88e203e45183a15e0b94e4dc0ae91688c8d,2024-10-11T13:15:17.700000
|
||||
CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000
|
||||
CVE-2024-9167,0,0,c76cdd3c3965eaf83c5e43b4dbbb850b39e5a19995695c4b4450dc70c8263305,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000
|
||||
@ -265084,16 +265097,16 @@ CVE-2024-9205,0,0,b718d7a20230ca5535d4a92f87ab8371c72ac9b0f2e1a0dacf1f87ee0d6efe
|
||||
CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000
|
||||
CVE-2024-9210,0,0,3a96d77d31ae9d7d03fb36944bbc08403b6a23f29847ff9570c75435783fa55d,2024-10-08T15:34:42.060000
|
||||
CVE-2024-9211,1,1,b40f65a60be2c6015da846de87bd7d5129944a725366b63bfd4757957621ff10,2024-10-11T13:15:17.883000
|
||||
CVE-2024-9211,0,0,b40f65a60be2c6015da846de87bd7d5129944a725366b63bfd4757957621ff10,2024-10-11T13:15:17.883000
|
||||
CVE-2024-9218,0,0,1fe5a0dc5cbc5663db71bfb2b02fdc2baeca2012618f21fc2618b5a68d78cab6,2024-10-08T15:33:58.617000
|
||||
CVE-2024-9220,0,0,6bac7ddea6b917eb69cb1f74123e8b2dddc4799202193b6b6e16b0128e05e777,2024-10-07T19:19:59.487000
|
||||
CVE-2024-9221,1,1,096077e96e1fded3052ea04bb5a52b3671cedb20c32d84a0cd53af348fda881a,2024-10-11T13:15:18.100000
|
||||
CVE-2024-9221,0,0,096077e96e1fded3052ea04bb5a52b3671cedb20c32d84a0cd53af348fda881a,2024-10-11T13:15:18.100000
|
||||
CVE-2024-9222,0,0,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931ef,2024-10-08T15:34:13.250000
|
||||
CVE-2024-9224,0,0,1efb870d30ff5afb9078703fdeff1bc29463ebfa0c91ad435c25d902219ffec9,2024-10-07T19:19:38.157000
|
||||
CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409ea,2024-10-07T20:24:41.420000
|
||||
CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000
|
||||
CVE-2024-9232,1,1,addd3c21da65f2294fcd06790057fabd158db76d23e6e63a31e06745dd1630d7,2024-10-11T13:15:18.313000
|
||||
CVE-2024-9234,1,1,93ca479c6177293a6648dd18b24eccaa34af7d9740240888030f5df11e97e9ea,2024-10-11T13:15:18.530000
|
||||
CVE-2024-9232,0,0,addd3c21da65f2294fcd06790057fabd158db76d23e6e63a31e06745dd1630d7,2024-10-11T13:15:18.313000
|
||||
CVE-2024-9234,0,0,93ca479c6177293a6648dd18b24eccaa34af7d9740240888030f5df11e97e9ea,2024-10-11T13:15:18.530000
|
||||
CVE-2024-9237,0,0,6dd007338b51674bd9fefd8518a997a164b381519066f168810e8e196c9bbc64,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9241,0,0,6c5cc70c23164aeead7a2ffa985d7e69869a7cd0428a8503a9e9f624c0c87b24,2024-10-07T18:51:20.950000
|
||||
CVE-2024-9242,0,0,2931ce38d642cfa320383051a5a41609f3e037ff0fe51760f16b233825fad051,2024-10-08T16:26:06.147000
|
||||
@ -265153,7 +265166,7 @@ CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f
|
||||
CVE-2024-9341,0,0,6f06f8dbcaa27a536f49e7e7f0e59eeeae4e39f281abffa47a8e4056674c26ad,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
|
||||
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
|
||||
CVE-2024-9346,1,1,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000
|
||||
CVE-2024-9346,0,0,54562034e717f93a9c89f6030e73e47fb9b9d7abbbde9d33821c04e2f0a85d64,2024-10-11T13:15:18.740000
|
||||
CVE-2024-9349,0,0,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000
|
||||
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
|
||||
CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000
|
||||
@ -265193,7 +265206,7 @@ CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c1
|
||||
CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000
|
||||
CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000
|
||||
CVE-2024-9436,1,1,c614d641db09eb93f3fa9273339ad3a45d703acf00dc31c9fb2c75feea753153,2024-10-11T13:15:18.947000
|
||||
CVE-2024-9436,0,0,c614d641db09eb93f3fa9273339ad3a45d703acf00dc31c9fb2c75feea753153,2024-10-11T13:15:18.947000
|
||||
CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000
|
||||
@ -265217,7 +265230,7 @@ CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c
|
||||
CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c91,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9487,0,0,be00f607ab07459b01c7648dac82f3c2af8f672daa92e4c79a618b3482e9ac23,2024-10-10T22:15:11.357000
|
||||
CVE-2024-9507,1,1,8206bf7bacd235440b174401074873d20230c205313133d40f97129830221ccb,2024-10-11T13:15:19.160000
|
||||
CVE-2024-9507,0,0,8206bf7bacd235440b174401074873d20230c205313133d40f97129830221ccb,2024-10-11T13:15:19.160000
|
||||
CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000
|
||||
CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000
|
||||
CVE-2024-9515,0,0,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000
|
||||
@ -265231,8 +265244,8 @@ CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca7
|
||||
CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
|
||||
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
|
||||
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9538,1,1,09ff8d828136926273e234a7df0de9f7df3e277701497c2d4680e9ae80291314,2024-10-11T13:15:19.373000
|
||||
CVE-2024-9543,1,1,0c6f45a8dc106427c9aa4a27ce0a99c89f29e67e9019a384d028eb17f2682b51,2024-10-11T13:15:19.577000
|
||||
CVE-2024-9538,0,0,09ff8d828136926273e234a7df0de9f7df3e277701497c2d4680e9ae80291314,2024-10-11T13:15:19.373000
|
||||
CVE-2024-9543,0,0,0c6f45a8dc106427c9aa4a27ce0a99c89f29e67e9019a384d028eb17f2682b51,2024-10-11T13:15:19.577000
|
||||
CVE-2024-9549,0,0,de2015c0f448716988568c7b5dd774c121a80649e44094dfa56d887e4c1906a6,2024-10-10T13:14:51.793000
|
||||
CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000
|
||||
CVE-2024-9551,0,0,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000
|
||||
@ -265262,23 +265275,23 @@ CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df
|
||||
CVE-2024-9575,0,0,f6b14427489147da51632087d3ce5422a9383e0d7bccf4cb35592eda1a1d7d41,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000
|
||||
CVE-2024-9581,0,0,dcdedf39f55e8b175c72a20e72a1aed92038e920265594b4fc9925b7183ce1e6,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9586,1,1,4368833d576d2d29a3be207ba4d3db2b319533357ac5aa66b9912c07cc7722e0,2024-10-11T13:15:19.823000
|
||||
CVE-2024-9587,1,1,38b4a379414497cd2c9f8e85abebac51b195781f8244dd7e6f13a7498e2e9af2,2024-10-11T13:15:20.043000
|
||||
CVE-2024-9586,0,0,4368833d576d2d29a3be207ba4d3db2b319533357ac5aa66b9912c07cc7722e0,2024-10-11T13:15:19.823000
|
||||
CVE-2024-9587,0,0,38b4a379414497cd2c9f8e85abebac51b195781f8244dd7e6f13a7498e2e9af2,2024-10-11T13:15:20.043000
|
||||
CVE-2024-9596,0,0,41f14771e651cbc1c37017cbe5a91040128a2c351e859a7b312163502a24a950,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9603,0,0,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9610,1,1,86e6c47ecc50e652a252993dda4297709b0c2c74d4c2c73b4a97df11b17992ff,2024-10-11T13:15:20.257000
|
||||
CVE-2024-9611,1,1,4e24a5039fd5c970ef5777a01dadd4716b2307ab72d3f68640d9aef596a61e09,2024-10-11T13:15:20.487000
|
||||
CVE-2024-9616,1,1,427d25c8d45ea418bf8a87056898c397d29d771d358dfd779d3089cf093d9b7f,2024-10-11T13:15:20.703000
|
||||
CVE-2024-9610,0,0,86e6c47ecc50e652a252993dda4297709b0c2c74d4c2c73b4a97df11b17992ff,2024-10-11T13:15:20.257000
|
||||
CVE-2024-9611,0,0,4e24a5039fd5c970ef5777a01dadd4716b2307ab72d3f68640d9aef596a61e09,2024-10-11T13:15:20.487000
|
||||
CVE-2024-9616,0,0,427d25c8d45ea418bf8a87056898c397d29d771d358dfd779d3089cf093d9b7f,2024-10-11T13:15:20.703000
|
||||
CVE-2024-9620,0,0,6bab3b47a8124e2f6e45a39c3f1a067698db02be0764fadf48434470b2bdf728,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a6b,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9623,0,0,05eef687418519373d15ec19a86683cd7648219a76f4b58bf6e516098fb1b885,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9680,0,1,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000
|
||||
CVE-2024-9680,0,0,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000
|
||||
CVE-2024-9685,0,0,0533577bd5534b2238dda3fc39c720d3ca57598c0c892e8a746063784dfa2119,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9707,1,1,5022899338c6a36d44072ae7018b6a919d11834b1f5740a300f73a64606c0150,2024-10-11T13:15:21.233000
|
||||
CVE-2024-9707,0,0,5022899338c6a36d44072ae7018b6a919d11834b1f5740a300f73a64606c0150,2024-10-11T13:15:21.233000
|
||||
CVE-2024-9780,0,0,64cb4b42f9787f95c4bcb2f0ffb7a4034eca385e970ac2bedc9fcd69728d3075,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9782,0,0,f6fdadb6173e6b1d6cefc02344a50956f97519ff0da6213ed752274ca4260d60,2024-10-10T12:51:56.987000
|
||||
@ -265315,5 +265328,6 @@ CVE-2024-9816,0,0,b558749b310662e562a03139cd743ab5e13638cae5288ab2349400fc9e4a8f
|
||||
CVE-2024-9817,0,0,64961e55de2aecac95e692e2205c7e393510ae0087bb3b78e5af557801c488ea,2024-10-10T23:15:03.410000
|
||||
CVE-2024-9818,0,0,4a540b8f9903a9b9420b63ef2490b163dd3b5219ef38e22237dcd7875973e6a1,2024-10-10T23:15:03.680000
|
||||
CVE-2024-9822,0,0,d08d61a8f285dedd6e0156668251bfed17abd9d34a7fc326c5d7b2d904c03ab9,2024-10-11T03:15:10.967000
|
||||
CVE-2024-9855,1,1,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
|
||||
CVE-2024-9856,1,1,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000
|
||||
CVE-2024-9855,0,0,74811d4bb31eb0ad4289dbfb3b216d12eb73ec4e1a7f9bf880a5813c9b568440,2024-10-11T13:15:21.460000
|
||||
CVE-2024-9856,0,0,b5fbe1e11cd8120594b10c6f2c9ff297b13257bca69885420fdeff5341bb84c9,2024-10-11T13:15:21.883000
|
||||
CVE-2024-9869,1,1,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user