mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2024-08-13T16:00:17.073818+00:00
This commit is contained in:
parent
7cb35bc388
commit
0f5750209f
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-3772",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-07-31T21:15:12.063",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:05:53.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.6.40.3154",
|
||||
"matchCriteriaId": "A650CC4E-DCBC-4A77-9601-A0E672F7A8C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/171959",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-6197",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-07-31T21:15:12.340",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:06:57.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.8.90.11211",
|
||||
"matchCriteriaId": "AEF33AB8-198F-41E7-B39F-09CD01633072"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/186945.html",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-6198",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-07-31T21:15:12.557",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:07:36.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,7 +18,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -36,10 +36,40 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.8.90.11211",
|
||||
"matchCriteriaId": "AEF33AB8-198F-41E7-B39F-09CD01633072"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/186945.html",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33167",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-30T17:15:10.020",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:29:30.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65A1A95C-1687-4304-88C5-1BEB58BBC8DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:security_verify_directory_integrator:10.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76B2C187-CEC8-4991-94E2-058B6584A40A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228587",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7161469",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4002",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-07-31T21:15:14.627",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:23:51.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:motorola:q14_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.5.0.16",
|
||||
"matchCriteriaId": "183CFCDE-690B-4784-B961-529EE4458035"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:motorola:q14:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4670A32D-FCA7-40E5-8EB3-18D4835A5C7F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en-us.support.motorola.com/app/answers/detail/a_id/176952/~/motorola-q14-mesh-router-vulnerabilities",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4003",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-07-31T21:15:14.850",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:23:48.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:motorola:q14_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.5.0.16",
|
||||
"matchCriteriaId": "183CFCDE-690B-4784-B961-529EE4458035"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:motorola:q14:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4670A32D-FCA7-40E5-8EB3-18D4835A5C7F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en-us.support.motorola.com/app/answers/detail/a_id/176952/~/motorola-q14-mesh-router-vulnerabilities",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1577",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2024-07-31T21:15:15.423",
|
||||
"lastModified": "2024-08-01T12:42:36.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:12:55.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lenovo:drivers_management:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.1.1307.1308",
|
||||
"matchCriteriaId": "BD64B313-2EEC-4659-8D81-26CDB5C770FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://iknow.lenovo.com.cn/detail/dc_415202.html",
|
||||
"source": "psirt@lenovo.com"
|
||||
"source": "psirt@lenovo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26288",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-30T17:15:11.720",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:23:53.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248477",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7161538",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26289",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-30T17:15:12.740",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:26:52.933",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248478",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7161537",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38001",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-30T17:15:13.000",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:24:53.523",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260206",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7161538",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2023-50809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:11.923",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T14:35:00.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In certain Sonos products before S1 Release 11.12 and S2 release 15.9, the mt_7615.ko wireless driver does not properly validate an information element during negotiation of a WPA2 four-way handshake. This lack of validation leads to a stack buffer overflow. This can result in remote code execution within the kernel. This affects Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL, and Five."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En ciertos productos Sonos anteriores a la versi\u00f3n S1 11.12 y S2 versi\u00f3n 15.9, el controlador inal\u00e1mbrico mt_7615.ko no valida correctamente un elemento de informaci\u00f3n durante la negociaci\u00f3n de un protocolo de enlace de cuatro v\u00edas WPA2. Esta falta de validaci\u00f3n provoca un desbordamiento del b\u00fafer de pila. Esto puede resultar en la ejecuci\u00f3n remota de c\u00f3digo dentro del kernel. Esto afecta a Amp, Arc, Arc SL, Beam, Beam Gen 2, Beam SL y Five."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.sonos.com/en-us/security-advisory-2024-0001",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23787",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-02-14T10:15:08.780",
|
||||
"lastModified": "2024-02-14T13:59:35.580",
|
||||
"lastModified": "2024-08-13T14:35:10.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de path traversal en Energy Management Controller con servicios en la nube JH-RVB1 /JH-RV11 Ver.B0.1.9.1 y anteriores permite que un atacante no autenticado adyacente a la red obtenga un archivo arbitrario en el producto afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jp.sharp/support/taiyo/info/JVNVU94591337_en.pdf",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27355",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T23:15:08.553",
|
||||
"lastModified": "2024-03-21T02:52:19.970",
|
||||
"lastModified": "2024-08-13T14:35:13.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en phpseclib 1.x anterior a 1.0.23, 2.x anterior a 2.0.47 y 3.x anterior a 3.0.36. Al procesar el identificador de objeto ASN.1 de un certificado, se puede proporcionar un subidentificador que conduzca a una denegaci\u00f3n de servicio (consumo de CPU para decodeOID)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/katzj/ee72f3c2a00590812b2ea3c0c8890e0b",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-27442",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T15:15:20.193",
|
||||
"lastModified": "2024-08-12T18:57:29.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T15:35:02.263",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The zmmailboxdmgr binary, a component of ZCS, is intended to be executed by the zimbra user with root privileges for specific mailbox operations. However, an attacker can escalate privileges from the zimbra user to root, because of improper handling of input arguments. An attacker can execute arbitrary commands with elevated privileges, leading to local privilege escalation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en Zimbra Collaboration (ZCS) 9.0 y 10.0. El binario zmmailboxdmgr, un componente de ZCS, est\u00e1 manipulado para que lo ejecute el usuario de zimbra con privilegios de root para operaciones espec\u00edficas del buz\u00f3n. Sin embargo, un atacante puede escalar privilegios del usuario de zimbra al root debido al manejo inadecuado de los argumentos de entrada. Un atacante puede ejecutar comandos arbitrarios con privilegios elevados, lo que lleva a una escalada de privilegios locales."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.7#Security_Fixes",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29151",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T06:15:05.913",
|
||||
"lastModified": "2024-03-18T12:38:25.490",
|
||||
"lastModified": "2024-08-13T15:35:06.993",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Rocket.Chat.Audit hasta 5ad78e8 depende de filecachetools, que no existe en PyPI."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RocketChat/Rocket.Chat.Audit/blob/5ad78e8017a9e190602e8257c22500ded0d931a9/requirements.txt#L3",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30622",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-29T13:15:15.870",
|
||||
"lastModified": "2024-03-29T13:28:22.880",
|
||||
"lastModified": "2024-08-13T15:35:09.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro mitInterface de la funci\u00f3n fromAddressNat."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_mitInterface.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T13:15:08.603",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-08-13T15:35:10.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro hostTime en la funci\u00f3n NTPSyncWithHost."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_2_NTPSyncWithHost/CI.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37129",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-07-31T09:15:04.290",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:26:46.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:inventory_collector:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "12.3.0.6",
|
||||
"matchCriteriaId": "5D19C8C4-B9B1-46A9-8858-E690A76D86D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225779/dsa-2024-263",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37635",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-13T19:15:52.630",
|
||||
"lastModified": "2024-08-07T16:47:25.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-13T15:35:11.883",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-38688",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-08-13T10:15:06.677",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T15:15:17.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Igor Beni? Recipe Maker For Your Food Blog from Zip Recipes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.2.6."
|
||||
"value": "Missing Authorization vulnerability in Igor Beni\u0107 Recipe Maker For Your Food Blog from Zip Recipes allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.2.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-38989",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:24.333",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T14:35:23.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "izatop bunt v0.29.19 was discovered to contain a prototype pollution via the component /esm/qs.js. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que izatop bunt v0.29.19 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s del componente /esm/qs.js. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/5e9830fb180a34d65f04fafb52d2b94b",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3938",
|
||||
"sourceIdentifier": "security@dotcms.com",
|
||||
"published": "2024-07-25T22:15:08.903",
|
||||
"lastModified": "2024-07-26T14:15:02.773",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:09:14.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@dotcms.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@dotcms.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,133 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.1.5",
|
||||
"versionEndExcluding": "23.01.18",
|
||||
"matchCriteriaId": "5D8CDD8C-0F92-4218-ACDB-C3E691F928AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.02",
|
||||
"versionEndIncluding": "23.09.7",
|
||||
"matchCriteriaId": "E85B4224-34E8-47CD-8F08-8B129868AF1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.12.21",
|
||||
"versionEndIncluding": "24.04.23",
|
||||
"matchCriteriaId": "6A6601A2-B008-44C9-A7C4-1DB2D613BD14"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.05.13",
|
||||
"versionEndExcluding": "24.05.31",
|
||||
"matchCriteriaId": "379748A4-D76F-4402-9A4F-E509C6735285"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:1:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "33DBCA2A-D4E2-4AE6-B6E0-FD0A277266F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:10:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "DECC3919-5044-41AF-9AAA-A964027F51C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:2:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "342C11DD-7760-42AE-8670-4461ECB51E4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:3:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "90B73A81-7202-4B0B-822B-4F2EE4480663"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:4:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "0BFA7220-B846-451B-A7B2-C3DC87767575"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:5:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "258813CA-66A7-4DCA-883D-884FB88430DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:6:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "E69C8B72-A38C-4D97-83BB-DCE392D3ABD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:7:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "B5309F19-2D65-4E87-87FD-2A0294008FF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:8:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "CBAEE45C-234C-4E5C-86CF-4F71A457D6F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24:9:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "FD553D7C-158F-489D-8C4C-8E2E056D52BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:23.10.24.0:*:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "9692C9DB-6111-4EE6-8DE8-1614DF87F365"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB1AD7A4-1F60-493C-8BB2-E13F44F3CCD6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:0:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "EE62FB6F-DB41-47B4-B8F7-0B9C887781D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:1:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "395197BB-2613-43BA-9223-195461F993D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:2:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "72350E82-5B73-41A9-B3F1-8CA7BF389897"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dotcms:dotcms:24.04.24:3:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "478A668F-DD76-4C0C-A444-A760C1AA5623"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dotcms.com/security/SI-71",
|
||||
"source": "security@dotcms.com"
|
||||
"source": "security@dotcms.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41240",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-07T18:15:37.627",
|
||||
"lastModified": "2024-08-08T15:11:06.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-13T15:35:13.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41475",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T17:15:17.257",
|
||||
"lastModified": "2024-08-12T18:57:17.383",
|
||||
"lastModified": "2024-08-13T15:35:13.560",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Gnuboard g6 6.0.7 is vulnerable to Session hijacking due to a CORS misconfiguration."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Gnuboard g6 6.0.7 es vulnerable al secuestro de sesi\u00f3n debido a una mala configuraci\u00f3n de CORS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/AkiaCode/7c878b1699931314246d6589d86b1e89",
|
||||
|
@ -2,20 +2,80 @@
|
||||
"id": "CVE-2024-41481",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:30.733",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T14:51:33.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Typora before 1.9.3 Markdown editor has a cross-site scripting (XSS) vulnerability via the Mermaid component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Typora anterior a 1.9.3 Markdown editor tiene una vulnerabilidad de cross site scripting (XSS) a trav\u00e9s del componente Mermaid."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.9.3",
|
||||
"matchCriteriaId": "2D1EB795-93A4-4F48-8F3F-F1FEB48215A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.typora.io/What%27s-New-1.9/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,80 @@
|
||||
"id": "CVE-2024-41482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:31.000",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T14:51:43.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Typora before 1.9.3 Markdown editor has a cross-site scripting (XSS) vulnerability via the MathJax component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Typora anterior a 1.9.3 Markdown editor tiene una vulnerabilidad de cross site scripting (XSS) a trav\u00e9s del componente MathJax."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.9.3",
|
||||
"matchCriteriaId": "2D1EB795-93A4-4F48-8F3F-F1FEB48215A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.typora.io/What%27s-New-1.9/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-416xx/CVE-2024-41623.json
Normal file
25
CVE-2024/CVE-2024-416xx/CVE-2024-41623.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-41623",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-13T14:15:12.203",
|
||||
"lastModified": "2024-08-13T14:15:12.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in D3D Security D3D IP Camera (D8801) v.V9.1.17.1.4-20180428 allows a local attacker to execute arbitrary code via a crafted payload"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://d3d.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Anonymous120386/Anonymous",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42520",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T15:15:21.770",
|
||||
"lastModified": "2024-08-13T13:19:29.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-13T15:35:16.110",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42545",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T18:15:12.540",
|
||||
"lastModified": "2024-08-13T13:23:46.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-13T15:35:16.993",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42547",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T19:15:17.030",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T15:35:17.887",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "TOTOLINK A3100R V4.1.2cu.5050_B20200504 tiene una vulnerabilidad de desbordamiento del b\u00fafer en el par\u00e1metro http_host en la funci\u00f3n loginauth."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/noahze01/IoT-vulnerable/blob/main/TOTOLink/A3100R/loginauth.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42626",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T17:15:18.257",
|
||||
"lastModified": "2024-08-13T13:24:29.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-13T15:35:20.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42630",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T16:15:17.060",
|
||||
"lastModified": "2024-08-13T13:20:39.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-13T15:35:22.433",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42632",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T16:15:17.223",
|
||||
"lastModified": "2024-08-13T13:24:16.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-13T15:35:23.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
21
CVE-2024/CVE-2024-427xx/CVE-2024-42736.json
Normal file
21
CVE-2024/CVE-2024-427xx/CVE-2024-42736.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42736",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-13T14:15:13.160",
|
||||
"lastModified": "2024-08-13T14:15:13.160",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in addBlacklist. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/addBlacklist/addBlacklist.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-427xx/CVE-2024-42737.json
Normal file
21
CVE-2024/CVE-2024-427xx/CVE-2024-42737.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42737",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-13T14:15:13.437",
|
||||
"lastModified": "2024-08-13T14:15:13.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in delBlacklist. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/delBlacklist/delBlacklist.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-427xx/CVE-2024-42738.json
Normal file
21
CVE-2024/CVE-2024-427xx/CVE-2024-42738.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42738",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-13T14:15:13.710",
|
||||
"lastModified": "2024-08-13T14:15:13.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setDmzCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setDmzCfg/setDmzCfg.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-427xx/CVE-2024-42739.json
Normal file
21
CVE-2024/CVE-2024-427xx/CVE-2024-42739.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-13T14:15:13.940",
|
||||
"lastModified": "2024-08-13T14:15:13.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setAccessDeviceCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setAccessDeviceCfg/setAccessDeviceCfg.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-427xx/CVE-2024-42740.json
Normal file
56
CVE-2024/CVE-2024-427xx/CVE-2024-42740.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-42740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-13T14:15:14.203",
|
||||
"lastModified": "2024-08-13T15:35:24.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setLedCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setLedCfg/setLedCfg.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-42741",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T20:15:08.820",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T14:15:14.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setL2tpServerCfg. Authenicated Attackers can send malicious packet to execute arbitary commands."
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setL2tpServerCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-42742",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T20:15:08.917",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T14:15:14.990",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUrlFilterRules. Authenicated Attackers can send malicious packet to execute arbitary commands."
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUrlFilterRules. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-42743",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T20:15:09.027",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T14:15:15.247",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setSyslogCfg . Authenicated Attackers can send malicious packet to execute arbitary commands."
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setSyslogCfg . Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-42744",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T20:15:09.110",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T14:15:15.427",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setModifyVpnUser. Authenicated Attackers can send malicious packet to execute arbitary commands."
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setModifyVpnUser. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,20 +2,55 @@
|
||||
"id": "CVE-2024-42745",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T20:15:09.203",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T15:35:25.590",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUPnPCfg. Authenicated Attackers can send malicious packet to execute arbitary commands."
|
||||
"value": "In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUPnPCfg. Authenticated Attackers can send malicious packet to execute arbitrary commands."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En TOTOLINK X5000r v9.1.0cu.2350_b20230313, el archivo /cgi-bin/cstecgi.cgi contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en setUPnPCfg. Los atacantes autenticados pueden enviar paquetes maliciosos para ejecutar comandos arbitrarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setUPnPCfg/setUPnPCfg.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42748",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T20:15:09.367",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T15:35:27.100",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En TOTOLINK X5000r v9.1.0cu.2350_b20230313, el archivo /cgi-bin/cstecgi.cgi contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en setWiFiWpsCfg. Los atacantes autenticados pueden enviar paquetes maliciosos para ejecutar comandos arbitrarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setWiFiWpsCfg/setWiFiWpsCfg.md",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-6158",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-12T13:38:38.913",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-13T15:35:29.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Category Posts Widget WordPress plugin before 4.9.17, term-and-category-based-posts-widget WordPress plugin before 4.9.13 does not validate and escape some of its \"Category Posts\" widget settings before outputting them back in a page/post where the Widget is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Category Posts Widget de WordPress anterior a 4.9.17, el complemento term-and-category-based-posts-widget de WordPress anterior a 4.9.13 no valida ni escapa algunas de las configuraciones del widget de \"Publicaciones de categor\u00eda\" antes de devolverlas a una p\u00e1gina/ publicar donde est\u00e1 incrustado el widget, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8adb219f-f0a6-4e87-8626-db26e300c220/",
|
||||
|
56
CVE-2024/CVE-2024-63xx/CVE-2024-6384.json
Normal file
56
CVE-2024/CVE-2024-63xx/CVE-2024-6384.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6384",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-08-13T15:15:18.567",
|
||||
"lastModified": "2024-08-13T15:15:18.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\"Hot\" backup files may be downloaded by underprivileged users, if they are capable of acquiring a unique backup identifier. This issue affects MongoDB Enterprise Server v6.0 versions prior to 6.0.16, MongoDB Enterprise Server v7.0 versions prior to 7.0.11 and MongoDB Enterprise Server v7.3 versions prior to 7.3.3"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-93516",
|
||||
"source": "cna@mongodb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6724",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-13T06:15:04.083",
|
||||
"lastModified": "2024-08-13T12:58:25.437",
|
||||
"lastModified": "2024-08-13T15:35:30.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The Generate Images WordPress plugin before 5.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0cb3158a-263d-4c4a-8029-62b453c281cb/",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-6758",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-08-12T13:38:40.080",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T14:58:47.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Privilege Management\u00a0in\u00a0Sprecher Automation SPRECON-E below version 8.71j allows a remote attacker with low privileges to save unauthorized protection assignments."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Gesti\u00f3n inadecuada de privilegios en Sprecher Automation SPRECON-E inferior a la versi\u00f3n 8.71j permite a un atacante remoto con privilegios bajos guardar asignaciones de protecci\u00f3n no autorizadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,351 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_cp-2500_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "8250F623-0548-45E5-AEE9-0384AC8F84B9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_cp-2500:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D44AC0BE-34DD-44E9-AB95-BADAE1AB49EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dd6-2_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "2FE1C8C6-77EC-474F-BF82-5F4C780F0333"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dd6-2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "336E2DC6-FBAD-416B-81DD-C0AA0C3CF228"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "A1DC4DEC-D793-4BBC-A59D-7D0FEEA8E6EF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-c:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7DE018DD-422E-441D-8096-0AA6DC308A2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_ap-2200_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "577FFC12-47A2-46EB-A584-4E5E7C30A277"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_ap-2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E7598CCB-703B-4436-AA50-88BF881795E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_cp-2131_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "358B2FC2-7802-4546-A7A1-C6E14D3DC71F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_cp-2131:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E8F6819C-A6B1-4897-89E5-E4F6E9F2D600"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e_cp-2330_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "82736597-C68A-4391-9D75-DB2185805753"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e_cp-2330:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CEBC973-D8C2-4800-9049-C4CCA7EAF991"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dq6-1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "95F14A62-D1F3-47BB-A16B-262A0718CA88"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dq6-1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "664F4B0C-7EEE-4AAA-9C87-EA6FDAB9B10C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dl6-1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "9228D9BD-52C5-43F4-8DBC-F93806BB30FE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dl6-1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD753ACD-77BF-4F2D-AA06-5083082F9C00"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_ds6-0_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "D03B0660-8883-4998-AF11-E25F12773E80"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_ds6-0:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59815159-1AF0-4E23-94B1-040312259591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-edir_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "D9DFF2D1-60D8-40B8-8A56-9FB6B06798EF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-edir:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "898F8202-FE26-45C7-91DD-70422759058D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "7ADB2881-7413-48D8-ABC6-8D92B5DD676E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-t3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D74929-4546-441B-8D8D-3E9F0FA7EE7E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-t3_ax-3110_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "8.71j",
|
||||
"matchCriteriaId": "5309389C-66C7-4E7A-8EA1-3ED03FC59856"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-t3_ax-3110:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "244451FB-7A72-4732-A7CB-654430723B5F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2407171_de.pdf",
|
||||
"source": "info@cert.vde.com"
|
||||
"source": "info@cert.vde.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-6759",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2024-08-12T13:38:40.380",
|
||||
"lastModified": "2024-08-12T15:35:05.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T15:08:27.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, \"/\". This allows readdir(3) and related functions to return filesystem entries with names containing additional path components.\n\nThe lack of validation described above gives rise to a confused deputy problem. For example, a program copying files from an NFS mount could be tricked into copying from outside the intended source directory, and/or to a location outside the intended destination directory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Al montar un sistema de archivos remoto usando NFS, el kernel no desinfect\u00f3 los nombres de archivos proporcionados de forma remota para el car\u00e1cter separador de ruta, \"/\". Esto permite que readdir(3) y funciones relacionadas devuelvan entradas del sistema de archivos con nombres que contienen componentes de ruta adicionales. La falta de validaci\u00f3n descrita anteriormente da lugar a un confuso problema de diputados. Por ejemplo, se podr\u00eda enga\u00f1ar a un programa que copia archivos desde un montaje NFS para que los copie desde fuera del directorio de origen previsto y/o a una ubicaci\u00f3n fuera del directorio de destino previsto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,123 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.0",
|
||||
"matchCriteriaId": "18A4E85D-70A5-4382-AAB7-4A531615613D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1",
|
||||
"versionEndExcluding": "13.3",
|
||||
"matchCriteriaId": "FEC367A5-24D1-414E-BC77-07968E787D01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABEA48EC-24EA-4106-9465-CE66B938635F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DFB5BD0-E777-4CAA-B2E0-3F3357D06D01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC8C769C-A23E-4F61-AC42-4DA64421B096"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45B0589E-2E7D-4516-A8A0-88F30038EAB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB7B021E-F4AD-44AC-96AB-8ACAF8AB1B88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69A72B5A-2189-4700-8E8B-1E5E7CA86C40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5771F187-281B-4680-B562-EFC7441A8F88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A4437F5-9DDA-4769-974E-23BFA085E0DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9C3A3D4-C9F4-41EB-B532-821AF83470B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "878A1F0A-087F-47D7-9CA5-A54BB8D6676A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE73CDC3-B5A7-4921-89C6-8F9DC426CB3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50A5E650-31FB-45BE-8827-641B58A83E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D59CFDD3-AEC3-43F1-A620-0B1F0BAD9048"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "038E5B85-7F60-4D71-8D3F-EDBF6E036CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF309824-D379-4749-A1FA-BCB2987DD671"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA813990-8C8F-4EE8-9F2B-9F73C510A7B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4DFA201-27D5-4C01-B90F-E24778943C3B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:07.nfsclient.asc",
|
||||
"source": "secteam@freebsd.org"
|
||||
"source": "secteam@freebsd.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,172 @@
|
||||
"id": "CVE-2024-6760",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2024-08-12T13:38:40.447",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T15:08:51.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs.\n\nThe bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un error l\u00f3gico en el c\u00f3digo que deshabilita el rastreo del kernel para programas setuid signific\u00f3 que el rastreo no se deshabilit\u00f3 cuando deber\u00eda haberlo hecho, permitiendo a los usuarios sin privilegios rastrear e inspeccionar el comportamiento de los programas setuid. Un usuario sin privilegios puede utilizar el error para leer el contenido de archivos a los que de otro modo no tendr\u00eda acceso, como la base de datos de contrase\u00f1as local."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.0",
|
||||
"matchCriteriaId": "18A4E85D-70A5-4382-AAB7-4A531615613D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.1",
|
||||
"versionEndExcluding": "13.3",
|
||||
"matchCriteriaId": "FEC367A5-24D1-414E-BC77-07968E787D01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ABEA48EC-24EA-4106-9465-CE66B938635F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DFB5BD0-E777-4CAA-B2E0-3F3357D06D01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC8C769C-A23E-4F61-AC42-4DA64421B096"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45B0589E-2E7D-4516-A8A0-88F30038EAB0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB7B021E-F4AD-44AC-96AB-8ACAF8AB1B88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69A72B5A-2189-4700-8E8B-1E5E7CA86C40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5771F187-281B-4680-B562-EFC7441A8F88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A4437F5-9DDA-4769-974E-23BFA085E0DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9C3A3D4-C9F4-41EB-B532-821AF83470B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "878A1F0A-087F-47D7-9CA5-A54BB8D6676A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE73CDC3-B5A7-4921-89C6-8F9DC426CB3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "50A5E650-31FB-45BE-8827-641B58A83E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D59CFDD3-AEC3-43F1-A620-0B1F0BAD9048"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "038E5B85-7F60-4D71-8D3F-EDBF6E036CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF309824-D379-4749-A1FA-BCB2987DD671"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA813990-8C8F-4EE8-9F2B-9F73C510A7B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4DFA201-27D5-4C01-B90F-E24778943C3B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:06.ktrace.asc",
|
||||
"source": "secteam@freebsd.org"
|
||||
"source": "secteam@freebsd.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-67xx/CVE-2024-6788.json
Normal file
56
CVE-2024/CVE-2024-67xx/CVE-2024-6788.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6788",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2024-08-13T14:15:16.457",
|
||||
"lastModified": "2024-08-13T14:15:16.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user \u201cuser-app\u201d to the default password."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1188"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.vde.com/en/advisories/VDE-2024-022",
|
||||
"source": "info@cert.vde.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-7006",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-08-12T13:38:40.577",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T15:14:35.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla de desreferencia de puntero nulo en Libtiff a trav\u00e9s de `tif_dirinfo.c`. Este problema puede permitir que un atacante desencadene fallas de asignaci\u00f3n de memoria a trav\u00e9s de ciertos medios, como restringir el tama\u00f1o del espacio del mont\u00f3n o inyectar fallas, lo que provoca una falla de segmentaci\u00f3n. Esto puede provocar un fallo de la aplicaci\u00f3n y, en \u00faltima instancia, provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
@ -37,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,14 +81,57 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libtiff:libtiff:4.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8246A12-73A8-4171-847E-D894E0B17DAE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-7006",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302996",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7106",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-25T21:15:12.090",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:15:31.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:denkgroot:spina:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.18.0",
|
||||
"matchCriteriaId": "063D6292-761E-4CD0-8C84-B170DEBC4869"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/topsky979/Security-Collections/blob/main/cve3/README.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272431",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272431",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.376769",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7120",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-26T05:15:10.857",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:06:57.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,146 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3694F82E-0BB6-478B-B172-ADFCC42065EE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33BE02D1-DA11-4667-BAE6-576845174487"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E07731B-950C-4A1C-88B6-14009D839D96"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82FD4752-10DA-46CE-9EC4-C394AA1DABBE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ADA8A53-1B6A-40C4-A5CB-3FF4817BDD93"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E37A21A-A798-4C25-85DB-4E46FE02166A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E67FFD88-D668-403E-8F09-5D82A4F962BD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4A1542B-B66C-44FC-8512-2365333B1A3A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://netsecfish.notion.site/Command-Injection-Vulnerability-in-RAISECOM-Gateway-Devices-673bc7d2f8db499f9de7182d4706c707?pvs=4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272451",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272451",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.380167",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7225",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T09:15:05.287",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T14:17:10.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:munyweki:insurance_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "826B7388-F683-45AE-908E-A26D1D12CCAD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xu-Mingming/cve/blob/main/xss2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272805",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272805",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.380967",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7226",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-30T09:15:05.597",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T14:19:04.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:medicine_tracker_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44A35599-C92F-4A69-B7B1-C768223118FD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xu-Mingming/cve/blob/main/CSRF2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272806",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272806",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.380981",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-7272",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-12T13:38:40.850",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T15:16:23.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad fue encontrada en FFmpeg hasta 5.1.5 y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n fill_audiodata del archivo /libswresample/swresample.c. La manipulaci\u00f3n conduce a un desbordamiento del b\u00fafer basado en el mont\u00f3n. Es posible iniciar el ataque de forma remota. Este problema fue solucionado en la versi\u00f3n 6.0 por 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 pero se olvid\u00f3 un backport para 5.1. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a las versiones 5.1.6 y 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 puede solucionar este problema. Se recomienda actualizar el componente afectado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -106,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -116,26 +150,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.1.6",
|
||||
"matchCriteriaId": "FCB80EE7-6F12-4A81-93BD-EF05F94AC15B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ffmpeg.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc5",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CookedMelon/ReportCVE/tree/main/FFmpeg/poc6",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273945",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273945",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7289",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T06:15:06.313",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T14:53:09.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/7f65e9704b8650e6bee74190f96d21e3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273158",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273158",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381471",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7290",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T06:15:07.533",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T14:53:34.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/e40f691866138ea1abf3ca452c4ae3ac",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273159",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273159",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.381487",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7307",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T09:15:05.120",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:55:05.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/df642bf14cce32c58d4805b6f6cf44e0",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273199",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273199",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382328",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7308",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T09:15:05.690",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T14:57:18.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:establishment_billing_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96A414F4-B7EC-4972-8371-DFC8F9055C6D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/topsky979/c11fd2c1b9027831031de2e58cbf5ff3",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273200",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273200",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382329",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7309",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T10:15:02.893",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:00:09.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "457BEE12-29ED-48B8-8C96-E181F0E80B56"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zw-a11y/VUL/blob/main/Record-Management-System-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273201",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273201",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382506",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7310",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T10:15:03.550",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:01:01.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "457BEE12-29ED-48B8-8C96-E181F0E80B56"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zw-a11y/VUL/blob/main/Record-Management-System-2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273202",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273202",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.382507",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7311",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-31T11:15:11.233",
|
||||
"lastModified": "2024-07-31T12:57:02.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-13T15:03:33.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -109,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +150,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fabianros:online_bus_reservation_site:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6370AED9-FA1C-4C5C-94A3-8DC8497337DD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/23588hk/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.273203",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.273203",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.383201",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-7399",
|
||||
"sourceIdentifier": "PSIRT@samsung.com",
|
||||
"published": "2024-08-12T13:38:41.550",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-13T15:30:52.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido en la versi\u00f3n Samsung MagicINFO 9 Server anterior a la 21.1050 permite a los atacantes escribir archivos arbitrarios como autoridad del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "PSIRT@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +85,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:samsung:magicinfo_9_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.1050",
|
||||
"matchCriteriaId": "3FD91423-8065-4E70-B31A-7C1F5D00EAEE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungtv.com/securityUpdates",
|
||||
"source": "PSIRT@samsung.com"
|
||||
"source": "PSIRT@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-13T14:00:18.248461+00:00
|
||||
2024-08-13T16:00:17.073818+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-13T13:53:29.533000+00:00
|
||||
2024-08-13T15:35:30.033000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,56 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
259718
|
||||
259726
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-35124](CVE-2024/CVE-2024-351xx/CVE-2024-35124.json) (`2024-08-13T12:15:06.163`)
|
||||
- [CVE-2024-37287](CVE-2024/CVE-2024-372xx/CVE-2024-37287.json) (`2024-08-13T12:15:06.433`)
|
||||
- [CVE-2024-38501](CVE-2024/CVE-2024-385xx/CVE-2024-38501.json) (`2024-08-13T13:15:12.130`)
|
||||
- [CVE-2024-38502](CVE-2024/CVE-2024-385xx/CVE-2024-38502.json) (`2024-08-13T13:15:12.460`)
|
||||
- [CVE-2024-3913](CVE-2024/CVE-2024-39xx/CVE-2024-3913.json) (`2024-08-13T13:15:12.750`)
|
||||
- [CVE-2024-43138](CVE-2024/CVE-2024-431xx/CVE-2024-43138.json) (`2024-08-13T12:15:06.657`)
|
||||
- [CVE-2024-43140](CVE-2024/CVE-2024-431xx/CVE-2024-43140.json) (`2024-08-13T12:15:06.887`)
|
||||
- [CVE-2024-43141](CVE-2024/CVE-2024-431xx/CVE-2024-43141.json) (`2024-08-13T12:15:07.150`)
|
||||
- [CVE-2024-43153](CVE-2024/CVE-2024-431xx/CVE-2024-43153.json) (`2024-08-13T12:15:07.383`)
|
||||
- [CVE-2024-43160](CVE-2024/CVE-2024-431xx/CVE-2024-43160.json) (`2024-08-13T12:15:07.617`)
|
||||
- [CVE-2024-43165](CVE-2024/CVE-2024-431xx/CVE-2024-43165.json) (`2024-08-13T12:15:07.833`)
|
||||
- [CVE-2024-5849](CVE-2024/CVE-2024-58xx/CVE-2024-5849.json) (`2024-08-13T13:15:13.067`)
|
||||
- [CVE-2024-41623](CVE-2024/CVE-2024-416xx/CVE-2024-41623.json) (`2024-08-13T14:15:12.203`)
|
||||
- [CVE-2024-42736](CVE-2024/CVE-2024-427xx/CVE-2024-42736.json) (`2024-08-13T14:15:13.160`)
|
||||
- [CVE-2024-42737](CVE-2024/CVE-2024-427xx/CVE-2024-42737.json) (`2024-08-13T14:15:13.437`)
|
||||
- [CVE-2024-42738](CVE-2024/CVE-2024-427xx/CVE-2024-42738.json) (`2024-08-13T14:15:13.710`)
|
||||
- [CVE-2024-42739](CVE-2024/CVE-2024-427xx/CVE-2024-42739.json) (`2024-08-13T14:15:13.940`)
|
||||
- [CVE-2024-42740](CVE-2024/CVE-2024-427xx/CVE-2024-42740.json) (`2024-08-13T14:15:14.203`)
|
||||
- [CVE-2024-6384](CVE-2024/CVE-2024-63xx/CVE-2024-6384.json) (`2024-08-13T15:15:18.567`)
|
||||
- [CVE-2024-6788](CVE-2024/CVE-2024-67xx/CVE-2024-6788.json) (`2024-08-13T14:15:16.457`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `147`
|
||||
Recently modified CVEs: `57`
|
||||
|
||||
- [CVE-2024-43220](CVE-2024/CVE-2024-432xx/CVE-2024-43220.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43224](CVE-2024/CVE-2024-432xx/CVE-2024-43224.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43225](CVE-2024/CVE-2024-432xx/CVE-2024-43225.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43226](CVE-2024/CVE-2024-432xx/CVE-2024-43226.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43227](CVE-2024/CVE-2024-432xx/CVE-2024-43227.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43231](CVE-2024/CVE-2024-432xx/CVE-2024-43231.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43233](CVE-2024/CVE-2024-432xx/CVE-2024-43233.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43358](CVE-2024/CVE-2024-433xx/CVE-2024-43358.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43359](CVE-2024/CVE-2024-433xx/CVE-2024-43359.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-43360](CVE-2024/CVE-2024-433xx/CVE-2024-43360.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-6558](CVE-2024/CVE-2024-65xx/CVE-2024-6558.json) (`2024-08-13T13:53:29.533`)
|
||||
- [CVE-2024-6724](CVE-2024/CVE-2024-67xx/CVE-2024-6724.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-6768](CVE-2024/CVE-2024-67xx/CVE-2024-6768.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-6823](CVE-2024/CVE-2024-68xx/CVE-2024-6823.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7092](CVE-2024/CVE-2024-70xx/CVE-2024-7092.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7094](CVE-2024/CVE-2024-70xx/CVE-2024-7094.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7247](CVE-2024/CVE-2024-72xx/CVE-2024-7247.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7388](CVE-2024/CVE-2024-73xx/CVE-2024-7388.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7590](CVE-2024/CVE-2024-75xx/CVE-2024-7590.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7704](CVE-2024/CVE-2024-77xx/CVE-2024-7704.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7705](CVE-2024/CVE-2024-77xx/CVE-2024-7705.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7706](CVE-2024/CVE-2024-77xx/CVE-2024-7706.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7707](CVE-2024/CVE-2024-77xx/CVE-2024-7707.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7709](CVE-2024/CVE-2024-77xx/CVE-2024-7709.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-7715](CVE-2024/CVE-2024-77xx/CVE-2024-7715.json) (`2024-08-13T12:58:25.437`)
|
||||
- [CVE-2024-42741](CVE-2024/CVE-2024-427xx/CVE-2024-42741.json) (`2024-08-13T14:15:14.447`)
|
||||
- [CVE-2024-42742](CVE-2024/CVE-2024-427xx/CVE-2024-42742.json) (`2024-08-13T14:15:14.990`)
|
||||
- [CVE-2024-42743](CVE-2024/CVE-2024-427xx/CVE-2024-42743.json) (`2024-08-13T14:15:15.247`)
|
||||
- [CVE-2024-42744](CVE-2024/CVE-2024-427xx/CVE-2024-42744.json) (`2024-08-13T14:15:15.427`)
|
||||
- [CVE-2024-42745](CVE-2024/CVE-2024-427xx/CVE-2024-42745.json) (`2024-08-13T15:35:25.590`)
|
||||
- [CVE-2024-42748](CVE-2024/CVE-2024-427xx/CVE-2024-42748.json) (`2024-08-13T15:35:27.100`)
|
||||
- [CVE-2024-6158](CVE-2024/CVE-2024-61xx/CVE-2024-6158.json) (`2024-08-13T15:35:29.740`)
|
||||
- [CVE-2024-6724](CVE-2024/CVE-2024-67xx/CVE-2024-6724.json) (`2024-08-13T15:35:30.033`)
|
||||
- [CVE-2024-6758](CVE-2024/CVE-2024-67xx/CVE-2024-6758.json) (`2024-08-13T14:58:47.857`)
|
||||
- [CVE-2024-6759](CVE-2024/CVE-2024-67xx/CVE-2024-6759.json) (`2024-08-13T15:08:27.780`)
|
||||
- [CVE-2024-6760](CVE-2024/CVE-2024-67xx/CVE-2024-6760.json) (`2024-08-13T15:08:51.977`)
|
||||
- [CVE-2024-7006](CVE-2024/CVE-2024-70xx/CVE-2024-7006.json) (`2024-08-13T15:14:35.167`)
|
||||
- [CVE-2024-7106](CVE-2024/CVE-2024-71xx/CVE-2024-7106.json) (`2024-08-13T14:15:31.030`)
|
||||
- [CVE-2024-7120](CVE-2024/CVE-2024-71xx/CVE-2024-7120.json) (`2024-08-13T14:06:57.033`)
|
||||
- [CVE-2024-7225](CVE-2024/CVE-2024-72xx/CVE-2024-7225.json) (`2024-08-13T14:17:10.833`)
|
||||
- [CVE-2024-7226](CVE-2024/CVE-2024-72xx/CVE-2024-7226.json) (`2024-08-13T14:19:04.147`)
|
||||
- [CVE-2024-7272](CVE-2024/CVE-2024-72xx/CVE-2024-7272.json) (`2024-08-13T15:16:23.837`)
|
||||
- [CVE-2024-7289](CVE-2024/CVE-2024-72xx/CVE-2024-7289.json) (`2024-08-13T14:53:09.637`)
|
||||
- [CVE-2024-7290](CVE-2024/CVE-2024-72xx/CVE-2024-7290.json) (`2024-08-13T14:53:34.777`)
|
||||
- [CVE-2024-7307](CVE-2024/CVE-2024-73xx/CVE-2024-7307.json) (`2024-08-13T14:55:05.840`)
|
||||
- [CVE-2024-7308](CVE-2024/CVE-2024-73xx/CVE-2024-7308.json) (`2024-08-13T14:57:18.157`)
|
||||
- [CVE-2024-7309](CVE-2024/CVE-2024-73xx/CVE-2024-7309.json) (`2024-08-13T15:00:09.397`)
|
||||
- [CVE-2024-7310](CVE-2024/CVE-2024-73xx/CVE-2024-7310.json) (`2024-08-13T15:01:01.970`)
|
||||
- [CVE-2024-7311](CVE-2024/CVE-2024-73xx/CVE-2024-7311.json) (`2024-08-13T15:03:33.910`)
|
||||
- [CVE-2024-7399](CVE-2024/CVE-2024-73xx/CVE-2024-7399.json) (`2024-08-13T15:30:52.337`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
412
_state.csv
412
_state.csv
@ -104128,7 +104128,7 @@ CVE-2017-3768,0,0,a9d3cdbe35d4cbde354522677133c37182e14896a4a819ed3c4de775f8191c
|
||||
CVE-2017-3769,0,0,ee7156f2282f60586259b2c2663b47e1500fe186456c5cbb66a732b073afad8f,2024-07-29T21:15:11.107000
|
||||
CVE-2017-3770,0,0,50498b73d2e169a119c833acc8e6884b909fe57fd2f88c994b613d01d5b79a15,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3771,0,0,842fbd922aa5ab87bb1b786a79feb9336c4c27a9ebf45517f79af44ded7b2be3,2019-10-03T00:03:26.223000
|
||||
CVE-2017-3772,0,0,8b3462e912b704c8334102ca2f6146e34b45d67ff30aa1a649b18fe52c032d4f,2024-08-01T12:42:36.933000
|
||||
CVE-2017-3772,0,1,2e722b87e0f8ca305504dfde19929c74cc3c224944db4660b751bbedcd9d8d09,2024-08-13T15:05:53.983000
|
||||
CVE-2017-3773,0,0,4f1c640be58fc5f21d6a63a5a68a2536a425a7f8d15f531f4f700289ecfd7ff1,2023-11-07T02:44:13.170000
|
||||
CVE-2017-3774,0,0,d409d3f34db015c7daec361952a5a6d7fd1d6f73296ee3273429d749d1d764fa,2018-05-24T16:27:03.247000
|
||||
CVE-2017-3775,0,0,ab41f4023b00bda26c97ad0eb99ef0d3cb35ca29d6e3b05ce617672fe8d191ca,2018-06-13T15:58:17.390000
|
||||
@ -141081,8 +141081,8 @@ CVE-2019-6193,0,0,5252032daec5c50053e0084e41e72ddc126830441b5cd9f1bc5d3b51ad6fae
|
||||
CVE-2019-6194,0,0,c68604ccf954a52cb6716566256a77cd3db53ede5f3a06738e8986c8de4ff505,2020-02-21T20:35:11.513000
|
||||
CVE-2019-6195,0,0,b8ca041cf524a8af2c264b56ac34b349c13f470cc74fcc154488e5c74e7c9b20,2020-03-04T18:26:14.687000
|
||||
CVE-2019-6196,0,0,4e909cb41ad592ca4f9d4234fb8effc0e79b826acdde1c26c8be3b2a71ed819a,2020-06-22T15:12:23.177000
|
||||
CVE-2019-6197,0,0,109a6d05896ddd6e083690d3bbf9e6bceca5319b863a567dd16dc5646e4325d0,2024-08-01T12:42:36.933000
|
||||
CVE-2019-6198,0,0,8f2e90b247f49341e94f300e13cdc77413fbd473b1e691c6e70a8c99f0554408,2024-08-01T12:42:36.933000
|
||||
CVE-2019-6197,0,1,afd32a81bda2e4934b327ce773753165732cf7e314afca7ea45e7c3d6d90cd72,2024-08-13T15:06:57.167000
|
||||
CVE-2019-6198,0,1,9f56ac4c2fac6f22df9934bbbb003d0041fbd1cda6e7135e8772dc6f6ea840e9,2024-08-13T15:07:36.843000
|
||||
CVE-2019-6200,0,0,dc5aae0492d24fa91b4536b3552981c383b9d63f882441062844dbbfff411875,2019-03-06T13:28:02.637000
|
||||
CVE-2019-6201,0,0,6886bf3befefe8be6891d8a439f88c625009f9073fcc0b27ce550b3121034599,2020-08-24T17:37:01.140000
|
||||
CVE-2019-6202,0,0,657c4129d3c19fe26b6472cba4a044c11a1227aa706b62bc264b8678126b92c7,2019-03-06T14:10:11.387000
|
||||
@ -200698,7 +200698,7 @@ CVE-2022-33163,0,0,b61f3ea147baa21e6ebf2ff08a6d967daea38661c6a0960dc98920da3d5f2
|
||||
CVE-2022-33164,0,0,dbaf77514b572a2cfd8228382e6c957006b84e1d6ae63a3e84231dd2ca0b472b,2023-09-12T19:32:37.400000
|
||||
CVE-2022-33165,0,0,e7688469b7d6da31601d151e4c0adf399b51978b7602bb1f42ecf3e3278543da,2023-10-18T20:34:14.447000
|
||||
CVE-2022-33166,0,0,e85541c384b746b96b9d33eb0263e975b828602e7416a357919e72b62444ef10,2023-06-21T01:22:50.790000
|
||||
CVE-2022-33167,0,0,eaa382e0d0b569b110b838afbd019a38dc92fe0e3970d74e0dbd643e48303a41,2024-07-31T12:57:02.300000
|
||||
CVE-2022-33167,0,1,18d3940f4b3a033b2683470794a015707f9c8159d307d4487abd40d54dc300d2,2024-08-13T14:29:30.387000
|
||||
CVE-2022-33168,0,0,d8fdb94492ba6489154f8aca9c0eecd94de3711393c324c6e4d851bce05e2b6f,2023-06-21T01:21:46.097000
|
||||
CVE-2022-33169,0,0,cfc3df51be78adce6bbadea63b270a04fdd7dbca24937beb040dac0cf32cf08d,2022-08-05T03:33:42.300000
|
||||
CVE-2022-3317,0,0,88f73658b7867db677c6a97ed0d6c5ff67cd67599f695f80a21307846e2cb628,2023-08-08T14:22:24.967000
|
||||
@ -202793,7 +202793,7 @@ CVE-2022-35914,0,0,ab61ad9a74db4a971f1200a3bfc23914d0ddc6a81c657bdaba834c9abe706
|
||||
CVE-2022-35915,0,0,de4fbf25711d5342c0392442284193090edffe1a9795b37b9a2fd785fd305665,2023-07-21T20:48:55.340000
|
||||
CVE-2022-35916,0,0,a7838cfadb3188dc6c460073145cd175fa1116793ee15e870d7f1af0d849bfab,2022-12-06T19:51:44.790000
|
||||
CVE-2022-35917,0,0,354ffb13cf8a439f33efe96c96950ac12cfd8f2c5e41a170c4c5ec778449bbd1,2023-05-16T11:00:41.427000
|
||||
CVE-2022-35918,0,1,713b4659d5608c193c90ed812958f9b37deda3c80d133429f3108ef2974ebe8d,2024-08-13T12:51:00.147000
|
||||
CVE-2022-35918,0,0,713b4659d5608c193c90ed812958f9b37deda3c80d133429f3108ef2974ebe8d,2024-08-13T12:51:00.147000
|
||||
CVE-2022-35919,0,0,0f1e4dfb8fdb7245a36164cc98eb7a0ed7e8bd31fdaaa33e5ddfd80b96368be2,2023-10-10T17:15:10.940000
|
||||
CVE-2022-3592,0,0,81ba521d76b43e15e97007326d1f7873dd03af6bc8c822817c2f00d935df0582,2023-09-17T09:15:11.483000
|
||||
CVE-2022-35920,0,0,1c1813a9d0398a1fb5b4c49376e7476a058f5190680d2a7a0f16c0c336269989,2022-08-10T15:16:29.100000
|
||||
@ -204727,7 +204727,7 @@ CVE-2022-38379,0,0,9eb70de0c72565c49201ab1fc48e6de31cbb23bd0ef17c431d4cd96f5e78e
|
||||
CVE-2022-3838,0,0,b6c87f6371b3c42529104fa7683905834b7f4d26db23a4d8470e1e7da69bdcdb,2023-11-07T03:51:51.887000
|
||||
CVE-2022-38380,0,0,bd883f9c774317159de2534f7103c0f6276317266728ea8b96d8dc126654e307,2022-11-04T14:56:46.817000
|
||||
CVE-2022-38381,0,0,33ab62a56155391eb2d41b3ba9666f38dda60cd0a3cd9ef1e728baa24c1b8bac,2022-11-04T15:03:40.800000
|
||||
CVE-2022-38382,0,1,2785873c728d42d322e825bd3b8d8f7bf6954b65c86015ec9b67a8d6359b9015,2024-08-13T12:58:25.437000
|
||||
CVE-2022-38382,0,0,2785873c728d42d322e825bd3b8d8f7bf6954b65c86015ec9b67a8d6359b9015,2024-08-13T12:58:25.437000
|
||||
CVE-2022-38383,0,0,c6f707ee147e1c14c9059720db840b81389d2405c75180fb0f2c0e4d4d08569f,2024-08-01T17:57:30.093000
|
||||
CVE-2022-38385,0,0,e5ce73aa67e344471446b9267cebeab2bedbacce8ae377f39c844e85d6dedb4e,2023-11-07T03:50:07.243000
|
||||
CVE-2022-38386,0,0,cd5b6a6598df693531015e8583f683aad3b24e500fbcaa6ba22ce0152abd819c,2024-05-01T19:50:25.633000
|
||||
@ -205850,7 +205850,7 @@ CVE-2022-4001,0,0,39e00833890a7e901d0618677cbe7c015974d8ce8b3fdf8bf76b065f6484f8
|
||||
CVE-2022-40010,0,0,e4ca794be921efc2a54ccc228989c9f920859f75c1b81f110a445bfe4d43d096,2023-07-03T19:22:31.680000
|
||||
CVE-2022-40011,0,0,e0a7836f1f6caf5aaa0d1e732024ed4ec13801bc1a9feee6d639fca30c8c0a6d,2022-12-31T02:46:55.660000
|
||||
CVE-2022-40016,0,0,4293ce2e94fa998b63d2973615f26a794c4e99e338b5386d7fd92fabc930a9b4,2023-02-24T18:00:30.037000
|
||||
CVE-2022-4002,0,0,75c0f2013fec27b05b5b97b366f295720c9bf99041fd3477b78c9b67389d1f94,2024-08-01T12:42:36.933000
|
||||
CVE-2022-4002,0,1,0cae3894490719187d0709e5650029ea9e416e14cd234f99092e3211958c7cc5,2024-08-13T15:23:51.097000
|
||||
CVE-2022-40021,0,0,55495082a7e8fc42c46524fdc4cee33425e125ba7b8e79f799714cd824fe1e66,2023-03-01T13:25:18.070000
|
||||
CVE-2022-40022,0,0,359622a2487ae7d5c9d1eb92d527a2b82b1805cff5f50680a87e6c0cbf3db6c7,2023-06-14T07:15:08.870000
|
||||
CVE-2022-40023,0,0,317fae2e5472d2e61e852b0d952fabbaf592f8f971a366ffa8994d62e922648d,2023-08-08T14:22:24.967000
|
||||
@ -205858,7 +205858,7 @@ CVE-2022-40026,0,0,52559a29a375df8685cfac6399fe291a8d354c1ff8e84d0a4321b0a4e9fdf
|
||||
CVE-2022-40027,0,0,eff062cfff51df7f2d813d05e3dca5f0765df4a5be02cb57c50281f02478e582,2022-09-22T16:14:04.963000
|
||||
CVE-2022-40028,0,0,280b1f9db19790d0026a8471ba9b82c539c1fbe37ff9db98ad39fcc7de98c4ea,2022-09-22T16:13:20.320000
|
||||
CVE-2022-40029,0,0,f53cea960ac0734496cceb5b801cdeb46b65691454ac6da85ea7731bc20047c4,2022-09-22T16:12:30.937000
|
||||
CVE-2022-4003,0,0,f7964d7defcd3d42b2db8b58b9ef6856b9348b3c7bb8eac93323f0475dabdb49,2024-08-01T12:42:36.933000
|
||||
CVE-2022-4003,0,1,13e07d31a356e4db8560a7e4ca1d956b13545f5f4f6192f3350053f8fa104540,2024-08-13T15:23:48.580000
|
||||
CVE-2022-40030,0,0,aa0bde9d2db758f20e54811a13859d5076699b2a7600b82157dce996cc74adcb,2022-09-22T16:11:05.273000
|
||||
CVE-2022-40032,0,0,854b9692f1f37c61f06e3e33a5e50fef722063a372572d033a137af029be6682,2023-04-06T17:15:09.507000
|
||||
CVE-2022-40034,0,0,298fbec15b4b696efb3008c20dd71d86f5fe2e6ce3c5512bf5bea0d9eef6af57,2023-02-01T02:41:40.263000
|
||||
@ -213927,7 +213927,7 @@ CVE-2023-1573,0,0,7939398951a41cde776a82a2882d5d2fec4e3bcfafab8a6bab93479600d715
|
||||
CVE-2023-1574,0,0,bb4ada258e527262ec9c1e564ff1ea3eabd2509806f1a474326cc753548f7d1f,2023-11-07T04:04:10.400000
|
||||
CVE-2023-1575,0,0,f811fd520e2db6c6e57e3d4509f960ffa8a39e7841c7bdfcaeab3867649bffdd,2023-11-07T04:04:10.567000
|
||||
CVE-2023-1576,0,0,ef2f2d7ef5f003955027a9696c660724e0afac7b8354b8ee997b1c99faa02c4b,2023-11-07T04:04:10.800000
|
||||
CVE-2023-1577,0,0,360c95020e55b05c0f0a0fea18524acd8d08c610cbf7b565dc5ed8f6f29e2333,2024-08-01T12:42:36.933000
|
||||
CVE-2023-1577,0,1,85c1b7c3498bfa7e0f395c31ef5c2126a933641f5ab88940e096f1c40598bbf8,2024-08-13T15:12:55.303000
|
||||
CVE-2023-1578,0,0,6263cebcfb388a666b983b865652ac01e5982368805925e75cfd9baf8b0148b0,2023-03-24T20:59:40.380000
|
||||
CVE-2023-1579,0,0,8a5351cdb9caa5543c406229031bc98908bc9da8ce9c96b58cbfd6b128ff7404,2023-11-07T04:04:10.970000
|
||||
CVE-2023-1580,0,0,45d0177157acfe9e834e03f4bd4c6174aac525767ec0c54d75bffa92c7ddabcb,2023-11-07T04:04:11.487000
|
||||
@ -219545,8 +219545,8 @@ CVE-2023-26283,0,0,e2064453ef2858146e69fe81df96344f4104450fa7f97beea6cf1e61b0996
|
||||
CVE-2023-26284,0,0,073b510f28598cf859c51864d3d5cb28a2670fa73a47d6359231a92a2ad99632,2023-11-07T04:09:33.223000
|
||||
CVE-2023-26285,0,0,69e6dc88fcd70dc78045a5db1289708f9ca9a570c9301acb9ca5f4642eea2a04,2023-05-11T22:53:08.387000
|
||||
CVE-2023-26286,0,0,cab2929777eabe42a9ecf50972c3c56d1004ade86317ce69ed1a003338ca9299,2023-05-12T05:15:17.507000
|
||||
CVE-2023-26288,0,0,a7b8c27184f2e26e607c00aba540e6c90f49a1ccaab172702a8f86417ee1c514,2024-07-31T12:57:02.300000
|
||||
CVE-2023-26289,0,0,332bc3e1728fadbb6b7d31a33e639ece4a7b14ca5b346b8e7c9f2d688d20386d,2024-07-31T12:57:02.300000
|
||||
CVE-2023-26288,0,1,f2869e76227de564a0113af6c6ad87a6c5e6eaffb10694a55ca8f76ee4105c1c,2024-08-13T14:23:53.863000
|
||||
CVE-2023-26289,0,1,7ef812ddba8802c101d5db1dc9521b204d1beac1bd32c5c94cde45d729720d74,2024-08-13T14:26:52.933000
|
||||
CVE-2023-2629,0,0,21397e525ac41df26b8c18bc0045d1b7263f8621bfadf0b1224b0c2fbfedb9fb,2023-05-31T14:02:09.597000
|
||||
CVE-2023-26290,0,0,b45b134fbb8059d4d4a1ebae8fcfa511a842f92cfbbd7470a968c4d99358ab04,2023-11-07T04:09:33.393000
|
||||
CVE-2023-26291,0,0,06cc66dbb2bc40c140a9d706389f20fb4cb58bd9ff5dd353e4433818c6edbc38,2023-11-07T04:09:33.470000
|
||||
@ -220422,7 +220422,7 @@ CVE-2023-27490,0,0,ca3437415bf8331660796a9240085567a0fbaedc8c65bf8612e4bcba39c33
|
||||
CVE-2023-27491,0,0,2a7ea7473c4037abaf2a145188b4330526de548be6c26518e312c6e33f7810f0,2023-04-11T14:43:10.780000
|
||||
CVE-2023-27492,0,0,9eb542046bdb9290a0236a241103175e3e601c5cad76bec1cc2db619ff723480,2023-11-07T04:09:57.800000
|
||||
CVE-2023-27493,0,0,22df22e98decf2a70897ce04d49101ed3039857ce785a94a23c35ec2c4f361f2,2023-04-11T14:44:07.990000
|
||||
CVE-2023-27494,0,1,4d1866015ca21c59c2ba7808796573f73c1f9a3a96d7887fe610bc0fc9a71b92,2024-08-13T12:51:00.147000
|
||||
CVE-2023-27494,0,0,4d1866015ca21c59c2ba7808796573f73c1f9a3a96d7887fe610bc0fc9a71b92,2024-08-13T12:51:00.147000
|
||||
CVE-2023-27495,0,0,4b48503a1b9b56ebcb5f76464654f3a298ab17c3912749dc3298d91d4f6c8785,2023-05-02T02:07:27.720000
|
||||
CVE-2023-27496,0,0,9f364590cb1803b580beac3d290ff6dec8fe21acca1220eda420d89c4a075904,2023-11-07T04:09:58
|
||||
CVE-2023-27497,0,0,b358b18c9043c43bec925c3af04e8e9325635d280fb532bf26824eaa9dcc015c,2023-04-18T16:11:16.100000
|
||||
@ -228356,7 +228356,7 @@ CVE-2023-37998,0,0,b235ebc4dfb9ccf88c1ccca0a67b26b1e77751f80e2e1faaef2f3a2c5008f
|
||||
CVE-2023-37999,0,0,0ffe5370e8d38da9bb953723ad926e1f3493ef3ca0779b6a9480408ff8b47933,2024-05-17T18:36:05.263000
|
||||
CVE-2023-3800,0,0,9adb1d1466c7c08548f0b20099e401daef224cd81c97907d28a5225c2b6e13a0,2024-05-17T02:27:49.107000
|
||||
CVE-2023-38000,0,0,9ba3b6ec3d4ae6f319e5b267a1938b9242dfbd7353650738c1d9f78858e009da,2023-10-16T17:04:06.637000
|
||||
CVE-2023-38001,0,0,e4569a6f272b2d72f239fb54f7412fab5c0d6f490e2ae6f809788712aa166f86,2024-07-31T12:57:02.300000
|
||||
CVE-2023-38001,0,1,2e442ef5d1f9ada2569bffe28a8811d3833d9e464b2a836cb72bac6db743da80,2024-08-13T14:24:53.523000
|
||||
CVE-2023-38002,0,0,1540466a828ca09fbbbfd3a7d1fa6f341816e6e7a4b7eb520ebe82fd4c1ac11f,2024-04-30T17:52:35.057000
|
||||
CVE-2023-38003,0,0,4ddd805b10542d9494e91de28e072619549d2912a77654914b8456fbaea47381,2024-01-19T16:15:09.013000
|
||||
CVE-2023-3801,0,0,138ee77b03ceaffda7a612b3ad2047ee632ca7ad988ceac5a51bc864960549cf,2024-05-17T02:27:49.220000
|
||||
@ -231449,7 +231449,7 @@ CVE-2023-4188,0,0,02bdd9b28d14019797b80b4cc5df451386a82a80f733da8bea1956088fab9e
|
||||
CVE-2023-41880,0,0,7ed910c9d4f01b1902f35663b6042b31054ac64abf6c55d1b7e28837c12897a6,2023-09-21T16:17:54.780000
|
||||
CVE-2023-41881,0,0,0bdbb4f3531382d9a4a926ee8a16bf05d17c5e6a810b992f2ef95026448df259,2023-10-18T02:24:31.603000
|
||||
CVE-2023-41882,0,0,ca3e1ca4dc86a7e49b5a7bd3f247f3c0bf7f2e72ed3f12d8d793c605a48572c9,2023-10-18T02:27:00.507000
|
||||
CVE-2023-41884,0,1,d751620e0ef9d429211e58f54cbece96ef665f16e0a19f066b68e780d9e654d0,2024-08-13T12:58:25.437000
|
||||
CVE-2023-41884,0,0,d751620e0ef9d429211e58f54cbece96ef665f16e0a19f066b68e780d9e654d0,2024-08-13T12:58:25.437000
|
||||
CVE-2023-41885,0,0,be107ca196d4b0abaab8f683443a7a481225cf6a409999379cc95fd0cbdc426b,2023-09-15T19:45:09.877000
|
||||
CVE-2023-41886,0,0,9c4b962bb1496334638c310840b0c680755f73e99e64df07e0a31509d7e9d302,2023-09-20T19:18:08.340000
|
||||
CVE-2023-41887,0,0,3cc3e1f4502c4acc6094dc4d649ae81deed3e39e18e709776293574c7db7e9e9,2023-09-20T19:20:19.920000
|
||||
@ -235658,7 +235658,7 @@ CVE-2023-4816,0,0,90b20067076355462cea63668d7d1f70b5bce794b9c85a4b5247192748c982
|
||||
CVE-2023-48161,0,0,5f227f88224a25f0981451dc3f6576e18f3ab0aeb112343704f86ed43d2a330d,2023-11-29T18:48:53.683000
|
||||
CVE-2023-48166,0,0,64c113268e4ebd6cc8fb3ea7fc24c3bce04e60808f1e16bf9f7c84cc706bd030,2024-01-22T19:21:48.260000
|
||||
CVE-2023-4817,0,0,66b9317b8b341b3c6f85e7870e90748e4d6a86dfea30b64fc5b4019933f60d15,2023-10-05T00:55:56.257000
|
||||
CVE-2023-48171,0,1,3b90eeb3bfcb911a9d9481be5562efc21e8c49d6ff8c2937232d65d92b3663c2,2024-08-13T12:58:25.437000
|
||||
CVE-2023-48171,0,0,3b90eeb3bfcb911a9d9481be5562efc21e8c49d6ff8c2937232d65d92b3663c2,2024-08-13T12:58:25.437000
|
||||
CVE-2023-48172,0,0,0e78c6c737f4aa94c295f39e3b2f6c04b05dd97deb3b6a7475ffc20424f8ee86,2023-12-09T04:46:27.490000
|
||||
CVE-2023-48176,0,0,5229479ea70d793012d98b28f5832b18c29ca0585926ac2e2e1991c088531620,2023-11-30T20:21:54.850000
|
||||
CVE-2023-4818,0,0,c99fef0e43e54a7e397a1f19b3703f45e3876ee2d790b03b384938f06570625f,2024-01-19T16:35:49.683000
|
||||
@ -237505,7 +237505,7 @@ CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9
|
||||
CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000
|
||||
CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000
|
||||
CVE-2023-50808,0,0,fdda8b2a0cfebb77f7058e23eb97529dc58109b1d79d83d871b7079f7d6bdb52,2024-02-13T18:23:02.393000
|
||||
CVE-2023-50809,0,0,c22d5d6a64b0f7146b83bbce68d802394ff6fde1ce54f8bfa0f84597869fedfe,2024-08-12T13:41:36.517000
|
||||
CVE-2023-50809,0,1,7719a810705ea5c5a85faa78514d3a43be3a8cdc8a452351afdb2453caacced0,2024-08-13T14:35:00.967000
|
||||
CVE-2023-5081,0,0,7787e17d39eb5438b4b32a6bbefdad7b23a6aea7d5f6a904017d2dc838411573,2024-01-26T16:02:59.793000
|
||||
CVE-2023-50810,0,0,6492bdf75c2b301fa0f50100d35e9e142bc6ab9b4353ae99c6ec739a1c5fa54b,2024-08-12T13:41:36.517000
|
||||
CVE-2023-50811,0,0,094c840cf26fbf426edc4fdb20f1490465693445542cafd34c1943f1940efb84,2024-04-29T19:52:21.503000
|
||||
@ -240724,7 +240724,7 @@ CVE-2023-7062,0,0,3a1384a593cf152e366a728afe5a537e5564a111dceb33df09a757d554c48c
|
||||
CVE-2023-7063,0,0,a70eaf68fc7417ce794998ee774eb52a272a3335bd687053e59996226f95eaaa,2024-01-30T23:02:10.287000
|
||||
CVE-2023-7064,0,0,893764021ac36e56fb425978b9c0fe444e7d7382c4148ca0b308b12be70459a1,2024-05-02T18:00:37.360000
|
||||
CVE-2023-7065,0,0,56ad85a9f778da0dacae256a17e9f54a48bb66bb1d9f0de63c0c37a650069950,2024-05-06T12:44:56.377000
|
||||
CVE-2023-7066,0,1,181b0e2db4bef7040a5ad2177e3a4f250cd2ec237c266777a3a5b0286224d52b,2024-08-13T12:58:25.437000
|
||||
CVE-2023-7066,0,0,181b0e2db4bef7040a5ad2177e3a4f250cd2ec237c266777a3a5b0286224d52b,2024-08-13T12:58:25.437000
|
||||
CVE-2023-7067,0,0,d251fedac3953c556b2fae675b30174d6cef931689e18f0c7f5dabce8da9f8a8,2024-05-02T18:00:37.360000
|
||||
CVE-2023-7068,0,0,7cd804daabb13f07758b06c47cadf4e49acc509b298d07d52e072e7d9588adca,2024-01-09T20:19:48.597000
|
||||
CVE-2023-7069,0,0,348519c1ee085e4d109b6f90b6ff63f6d5a582ce97e3f91d1eb069ee9d1eaaa4,2024-02-07T16:28:40.250000
|
||||
@ -244498,7 +244498,7 @@ CVE-2024-2257,0,0,87856c3d2c0879cb041162bfc2d43d1a962975cb88c7d659c694453442f173
|
||||
CVE-2024-22570,0,0,ff1b02be80dc9b74eb41974349d357529a516d7a6b80d2e4f2e7a5ada4f115ed,2024-02-02T23:32:46.897000
|
||||
CVE-2024-2258,0,0,c494b8257d2f25d655eb6c978d87037350b24fb5e6a25d746bcf4e3ede80c89a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-22588,0,0,8bc5ffa2d82b0a2b5c7a4f7b05618c8edfe047109115070d834077f2cb63d9ca,2024-05-24T18:09:20.027000
|
||||
CVE-2024-2259,0,1,14d7a6b9721c26155e4e21edfbbb41ab963b75fcc50cc74d9ca4a181311a82a6,2024-08-13T12:58:25.437000
|
||||
CVE-2024-2259,0,0,14d7a6b9721c26155e4e21edfbbb41ab963b75fcc50cc74d9ca4a181311a82a6,2024-08-13T12:58:25.437000
|
||||
CVE-2024-22590,0,0,2265223fce93787a4f3c35c5166069376211edf7fda5f6fe38dcbb266d997cfa,2024-05-28T17:11:55.903000
|
||||
CVE-2024-22591,0,0,70771714261423b75efa32d9aeb9ee1dd7955f2ff659f39ff329504c4eb8516f,2024-01-20T18:49:47.907000
|
||||
CVE-2024-22592,0,0,268d0bb3e8d404d0087cf60d681467b452c81f0d7e52d485caa72c08138c2725,2024-01-20T18:49:41.750000
|
||||
@ -245251,7 +245251,7 @@ CVE-2024-23783,0,0,2c0409c271891c8b08fc0b86218ac68ee6ac63f922ef98f9f9226ccdf7685
|
||||
CVE-2024-23784,0,0,4ead0c5591846e9c87c142cd846bdd72001bf8674c58560c0ebdae712e566e4b,2024-02-14T13:59:35.580000
|
||||
CVE-2024-23785,0,0,b583a59740121c714014d2b1b574a387569e6a96d1cba1ed447b99f7aac2879a,2024-02-14T13:59:35.580000
|
||||
CVE-2024-23786,0,0,a4843821edc7301dc3896b1dc41942f9a7cad1c9811616d65b63499b1903e8f5,2024-02-14T13:59:35.580000
|
||||
CVE-2024-23787,0,0,1cebbe4231b42e35699eed5d7dba409232d884bafafb6cdea00ae172adf3e7de,2024-02-14T13:59:35.580000
|
||||
CVE-2024-23787,0,1,7a8ddce6195bf931c799fcf4083a75cf1b9842febd9c3da44a75515daf822e08,2024-08-13T14:35:10.747000
|
||||
CVE-2024-23788,0,0,64abbc30839e8d16e55707492265880e002ac43878f4aa04dd4b122fd59c9c73,2024-08-09T16:35:04.550000
|
||||
CVE-2024-23789,0,0,eb24c8fd06c4dc0c79533f62c1520b9bd32813c0e2c7e43d74bbd067c1f01e08,2024-02-14T13:59:35.580000
|
||||
CVE-2024-2379,0,0,0712844accba64ea814c5017a1af61ea7caadbf030deed7db72ba68c9fce60bc,2024-07-30T02:15:05.397000
|
||||
@ -247801,7 +247801,7 @@ CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e
|
||||
CVE-2024-27351,0,0,5a36bd6e7f8b98dc30dfca7d22b6d4573152d80044f0f10dfc41d8abe078fc7e,2024-07-03T01:50:33.137000
|
||||
CVE-2024-27353,0,0,cbcb4ed0cb0d6b5421bdc80855b33d7fe1407fb7f951e4769d290990900afec8,2024-07-03T01:50:33.967000
|
||||
CVE-2024-27354,0,0,d82002382bb8c882f81f7c5f3df1132e97e156b8b32d6b2112503b29eab24b21,2024-08-01T13:48:23.907000
|
||||
CVE-2024-27355,0,0,cbfd71f3fb28d8933e5fd0b89a2619127b39a508cc85ac5bc00d2b3fcc2d06dd,2024-03-21T02:52:19.970000
|
||||
CVE-2024-27355,0,1,8551a6434afc8c47e636ee231a79cbded85fb3c87c4c313040d69bae1c506157,2024-08-13T14:35:13.783000
|
||||
CVE-2024-27356,0,0,5e1e6b4a87a348e93c4f8d15c6264439e6f20147f41074ef597440f312cdad1d,2024-08-07T18:35:02.437000
|
||||
CVE-2024-27357,0,0,6ee89ff91325c350d71ee2f1e2989c0a7f53dc5f1e7749e13c0b8f7a99e8663e,2024-08-01T13:48:24.737000
|
||||
CVE-2024-27358,0,0,5e34f9802b6658af7911918b28409df8cc6ee23a8e8f5cc0b36cd181238f67f8,2024-07-29T14:12:08.783000
|
||||
@ -247886,7 +247886,7 @@ CVE-2024-27439,0,0,812b79355c05b1839f0b5adf30fc93a3b50c4e89eeb5494b84c7e9f25e1fc
|
||||
CVE-2024-2744,0,0,188126b761d1adc13d3573db2ecaebf3ad9dc6b00f329483cd98111bb221e3a5,2024-05-17T18:36:05.263000
|
||||
CVE-2024-27440,0,0,222fe401370c5e6b38f7e38b434f6e7cc6adedc4a2417abf87261721e80970d8,2024-08-05T14:35:06.543000
|
||||
CVE-2024-27441,0,0,8627ee176bbd8db9047f0ac2824f85227251736cca8356f59d7164883e7165ed,2024-03-13T15:15:52.083000
|
||||
CVE-2024-27442,0,0,b23a32a5b599bc15cd7e40b8740995435dcc9d36f43c74bd3b1c38fc6874bedc,2024-08-12T18:57:29.247000
|
||||
CVE-2024-27442,0,1,01ba9da507a8da6b3628686f94f9e3fbd5e9f8529984a07aae1809c4228953a9,2024-08-13T15:35:02.263000
|
||||
CVE-2024-27443,0,0,fd5ca632d2fae3363b8de30d4df2c7ed4a3d1ae6e0341dcce2b3340ad6a731c9,2024-08-12T18:57:29.247000
|
||||
CVE-2024-27444,0,0,54cb997d6d9cda9b1d04431678fffc2ca7174de8974a9b13ccc3a98ef52117ae,2024-08-06T16:35:07.500000
|
||||
CVE-2024-27447,0,0,3b7773fd2d03c5e4f17776fc3b7436eb3cc739bfd15835b19977b12318864384,2024-08-05T16:35:07.727000
|
||||
@ -248372,7 +248372,7 @@ CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bd
|
||||
CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000
|
||||
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
|
||||
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
|
||||
CVE-2024-28166,0,1,458f27950df8f0e0dd31b765d72deb518af919b2845725b404c07ee4a505eb2a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-28166,0,0,458f27950df8f0e0dd31b765d72deb518af919b2845725b404c07ee4a505eb2a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000
|
||||
CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000
|
||||
@ -248979,7 +248979,7 @@ CVE-2024-29143,0,0,ed69b2d9180032c6bcf01e4d99bd2a1b22e1518c20ff0cda172d21a651ffd
|
||||
CVE-2024-29149,0,0,3887e60eeb63bc9cafb3d652beff1219d97a4604919fa5ac1837a650a43ed85b,2024-07-03T01:52:06.800000
|
||||
CVE-2024-2915,0,0,808373913d708061ffb2844243b7a7451d06a7a71f2d96bab824bae64e6e845d,2024-08-06T16:35:11.173000
|
||||
CVE-2024-29150,0,0,4924bacfe5857f73b4ac7a824a3a849e6169771413a526f86b266258de89e147,2024-07-03T01:52:07.770000
|
||||
CVE-2024-29151,0,0,cdb128027413297a9064be468654de5e28115491fa3df0b557997bb5f608af6f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29151,0,1,41273283144e72ced9aa4305d0684c62c423c9d1765bb649f90e55578f8c6464,2024-08-13T15:35:06.993000
|
||||
CVE-2024-29152,0,0,6494eb520227446d6d245c5a4d673a99692904bc67e1a2221cdb6494798efeb7,2024-06-25T20:15:11.353000
|
||||
CVE-2024-29153,0,0,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000
|
||||
CVE-2024-29154,0,0,c24b7a65a861ab0fbc7efb2f7b0dd4677efe572e0b22b8bb6ebb0d687fe6c77b,2024-03-18T12:38:25.490000
|
||||
@ -250057,7 +250057,7 @@ CVE-2024-30613,0,0,ec7980af57ce21f0caa7be201315bcd79301675671829a9c0350efcb6a7c5
|
||||
CVE-2024-30614,0,0,70864962c71d46c273106725c973080a3fb9295eb2c95d98fdaa16c813277ea2,2024-04-12T12:43:46.210000
|
||||
CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69aab4,2024-08-01T13:50:20.133000
|
||||
CVE-2024-30621,0,0,f1fe1ced472b52b5106f4bb104d36eea881b5ba60acb8d11a8d4b770ef9cd4b9,2024-04-08T22:48:53.950000
|
||||
CVE-2024-30622,0,0,39f3e190be508e988271a0de2e47f955a00ce78f04194117f88d022070c82f32,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30622,0,1,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
|
||||
CVE-2024-30623,0,0,068ad85c64fcd7c5771be6968a3fe4899f42b182e4626cc9e0835726390d147d,2024-07-03T01:54:12.180000
|
||||
CVE-2024-30624,0,0,9f0b6bbb0cdd2fc5e8275cfdf473e348e809449e2b22ebe6778b91e551369404,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30625,0,0,c1d8544845866766a9c20cd1dd31dab57f6c7377e49b11e4618d24aa420ac546,2024-08-01T13:50:20.930000
|
||||
@ -250758,7 +250758,7 @@ CVE-2024-31803,0,0,c10736ae7840b016061b5af4491c529b00b1b223c27ecb8bbf60562274c0f
|
||||
CVE-2024-31804,0,0,98ebf6123ba640ba12fc884ba3b75b6a9171ce60bb03787ca27a89dc86a8de4b,2024-07-03T01:55:22.410000
|
||||
CVE-2024-31805,0,0,4b7b61f3abeb4068501d3afa621c8120c12d0bdb6f8c1629f0f6ba829ac02f8f,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31806,0,0,0d23d3a16c910921a17f301055f98f9b17ff477b46facd9fbf2663ed7a6ab3c1,2024-08-01T13:51:09.630000
|
||||
CVE-2024-31807,0,0,ea04fa5dc5969cf90a606fd0ba3180cd04c064ccb96f864a8d73af8533d6a049,2024-04-08T18:48:40.217000
|
||||
CVE-2024-31807,0,1,f1a9413060f21c220e1cb5e48db6f606b506243c0f13c9e1b8f8ac68e26c4bf4,2024-08-13T15:35:10.810000
|
||||
CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda829f7,2024-08-01T13:51:09.823000
|
||||
CVE-2024-31809,0,0,e4cdf5792005cb2f9dfbd37d300dd109766c0a4513cca5e9d46f263f8d455de2,2024-08-01T13:51:10.623000
|
||||
CVE-2024-3181,0,0,6b9f7aefd2f6d55b0cd7164186830f2507ec3f62ff8140326ea78f2d9a673378,2024-04-04T12:48:41.700000
|
||||
@ -251700,9 +251700,9 @@ CVE-2024-3300,0,0,5ed420ceec7dd67c7a8c90e2661f4216c9dcb91251ff120ca64b2c4babcfd8
|
||||
CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528578,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000
|
||||
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33003,0,1,dd32f9e2b017d1d2778c509fd270213d8b81db7f81f9b2a633e19aa3a7f490d2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-33003,0,0,dd32f9e2b017d1d2778c509fd270213d8b81db7f81f9b2a633e19aa3a7f490d2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
|
||||
CVE-2024-33005,0,1,45577f2751db7520286884c554d276bf239f32d659b0b85f5b8941be8dbdeea8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-33005,0,0,45577f2751db7520286884c554d276bf239f32d659b0b85f5b8941be8dbdeea8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
|
||||
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
|
||||
CVE-2024-33008,0,0,0bcdb3b7e19679fd6080e0c5f4ecdde63f1bf333ca492bd35c2d1bf34e5150a9,2024-05-14T19:17:55.627000
|
||||
@ -252968,7 +252968,7 @@ CVE-2024-35110,0,0,a7533a91a83d0fe952e3715e535df8909054daffc452227b1e477f75ac3a9
|
||||
CVE-2024-35116,0,0,7ab540c112b9010ca6d0b63139ef05bf7c8cdbd0e3d9c37e6db26ca5392b2ae4,2024-07-01T12:37:24.220000
|
||||
CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff155a,2024-07-31T19:13:41.383000
|
||||
CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000
|
||||
CVE-2024-35124,1,1,eebade4e344820896ada54a221712227782e55a7cb2e2d641368b18349f7b717,2024-08-13T12:58:25.437000
|
||||
CVE-2024-35124,0,0,eebade4e344820896ada54a221712227782e55a7cb2e2d641368b18349f7b717,2024-08-13T12:58:25.437000
|
||||
CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000
|
||||
CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000
|
||||
CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000
|
||||
@ -253385,7 +253385,7 @@ CVE-2024-35771,0,0,da094131a898160f7d7534ebd658d9f6c0a47dcb5974f75d3d7653ce22b76
|
||||
CVE-2024-35772,0,0,67c04a52c2580bba2b2143b8a9e3a147188afdddd51ee8f46047ed6b048599a3,2024-06-24T19:26:14.460000
|
||||
CVE-2024-35773,0,0,edf644c32dc0e69969a2e651ff67d0bafccf9621547e03428fff35ea895725bb,2024-07-12T16:34:58.687000
|
||||
CVE-2024-35774,0,0,eade8c8b3f01bcf230b9a96162b1334f062933da0f10549431055a0386eca873,2024-06-24T18:43:57.633000
|
||||
CVE-2024-35775,0,1,4461e177c0224a573cd5ada523e12d44b88d8d62e4ec7cdb59c46b6177e897e8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-35775,0,0,4461e177c0224a573cd5ada523e12d44b88d8d62e4ec7cdb59c46b6177e897e8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-35776,0,0,e4d3227671df814d3a4852e5c0b87fcdc40bc918afeafb90df6afc52f9dfd1c7,2024-06-24T18:49:09.500000
|
||||
CVE-2024-35777,0,0,7515dddc5351fc16fba23045723f9d79e6a247348fcb082c517c87296afa7e23,2024-07-09T18:19:14.047000
|
||||
CVE-2024-35778,0,0,a2dbf9dff5fc4d667e192112da54beac103433f06409a60ab480bcea7a5ac138,2024-07-08T10:15:03.573000
|
||||
@ -253919,7 +253919,7 @@ CVE-2024-36394,0,0,ce487e69c50908b259342c996fd749aeec003c1cc9ebc8d7c04cb76587e4b
|
||||
CVE-2024-36395,0,0,f89c2edf8412c7a856779bf7bdcd2dc639ea5537dbb90aaf5a59ca64c625227c,2024-07-19T18:34:58.837000
|
||||
CVE-2024-36396,0,0,6296e5e5abad58fd92610447f6d594c40593fdd339b1a18f1de671640ea0ec15,2024-08-07T17:40:12.830000
|
||||
CVE-2024-36397,0,0,397d32bfdb09c2d3f9db35c1f7589cf3773b581a432802ae94747ca8dbab95df,2024-08-08T14:52:17.297000
|
||||
CVE-2024-36398,0,1,27729f15935e4ab5e4407082ad0cce419a8fb386c8425bf4da258593e2893a14,2024-08-13T12:58:25.437000
|
||||
CVE-2024-36398,0,0,27729f15935e4ab5e4407082ad0cce419a8fb386c8425bf4da258593e2893a14,2024-08-13T12:58:25.437000
|
||||
CVE-2024-36399,0,0,343a0b337c47a08f8ef5da762844b89fa9f0783d7ae2cdee4dacb27b86b494cf,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3640,0,0,634a3a61b60e4b6447ed9849adb2e8bddc05031ce5f2169a17d54b538992fc1b,2024-05-17T18:36:31.297000
|
||||
CVE-2024-36400,0,0,47a38d468bfeafda14a4695dfbafb860220a66750f81a96f50551b5447b95aa6,2024-06-10T19:39:21.660000
|
||||
@ -254356,7 +254356,7 @@ CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec
|
||||
CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000
|
||||
CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000
|
||||
CVE-2024-37127,0,0,80266d7603ba84619cf83925e2bd696016d21affd2f6df9fc168f7e6704b5a73,2024-07-31T12:57:02.300000
|
||||
CVE-2024-37129,0,0,f8926f8685bed687aa68c5f4ce1ca396bdbbe48ef35c808c3281a64c9d77dd67,2024-07-31T12:57:02.300000
|
||||
CVE-2024-37129,0,1,1bda6b021f1f7698674c595a8a84e9d380a54f5551f6ad0383f5d9c8c50d327f,2024-08-13T15:26:46.890000
|
||||
CVE-2024-37130,0,0,cbd9dfc340def95265d907da6835c0ba032c0f95252bb398ce7a3b8c9a6f4189,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37131,0,0,1b53fe6698cfc8662ae4f6c0ed3f87f760fe2128440fb0619b7f2633753262fb,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37132,0,0,32a23a7a93e12576e3cef44acbc1e26d96ab3673ab3a48bd46dd4729adbaca95,2024-07-03T18:01:07.500000
|
||||
@ -254477,7 +254477,7 @@ CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e786480
|
||||
CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000
|
||||
CVE-2024-37283,0,0,43778d29654f3a784f1d881c1b776f9f47eb39a9a44700b37d8fb12a22882627,2024-08-12T13:41:36.517000
|
||||
CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14628,2024-08-05T12:41:45.957000
|
||||
CVE-2024-37287,1,1,896be1043c8d33126804ddfb1ca0ab5acdf6cf2b208c4e819b98503dc40cb8a4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37287,0,0,896be1043c8d33126804ddfb1ca0ab5acdf6cf2b208c4e819b98503dc40cb8a4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
|
||||
CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37293,0,0,efa095b0cfa3ac59ab9798514bc41970933da504bf684c09bb20230e55ad7e3a,2024-06-13T18:36:09.013000
|
||||
@ -254703,7 +254703,7 @@ CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74
|
||||
CVE-2024-37632,0,0,d01b52b8e66490156eb3a16ca33b4814211737a83815b462a53e59e26de8e387,2024-08-07T16:43:37.570000
|
||||
CVE-2024-37633,0,0,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000
|
||||
CVE-2024-37634,0,0,6e16f0f95dfcf255097e7dd652ce7848499c89be47e371aaa754251b1b9e9021,2024-07-03T02:04:25.770000
|
||||
CVE-2024-37635,0,0,94b9a9eaaf9f4f0430c4a088c9016123755d05c131d9f0e2d65bb40f9febfd91,2024-08-07T16:47:25.073000
|
||||
CVE-2024-37635,0,1,bc407e83f05b7c8f9bd8802eae4a82a8e6966063def27bcc1e49acc27f521f01,2024-08-13T15:35:11.883000
|
||||
CVE-2024-37637,0,0,4382c3c11477cb9c0c98c6b36d4d6a080861c8e7a12e5a542c24ab931706be1f,2024-07-03T02:04:26.567000
|
||||
CVE-2024-37639,0,0,faac05558a999374b477194ccded752579ad2da62ef52225a1808c93fa007076,2024-07-03T02:04:27.370000
|
||||
CVE-2024-3764,0,0,db341581177558129620666288ffbac018878c49ee9401bc4b7ea0ca7e6fd397,2024-08-01T21:15:32.793000
|
||||
@ -254838,15 +254838,15 @@ CVE-2024-3792,0,0,b2d7f7e579eff1bf3cc457c41f5782185342411a77aac1022f0e4393ef1fd1
|
||||
CVE-2024-37920,0,0,841ece9aa1ea243835cd263b19315e4e373408e20d05486ce82b531c5a2511e0,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37922,0,0,2f4d0819be87ffb0bb4af4138b7ceba5a758a2030a859f8658eef95358ab0782,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37923,0,0,0f277f016f5fbeb4c94053f1c3c5921e348aa14bf063918224f804db2fff94d1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37924,0,1,e05433fc709b37508e94a979863f088e86329405c0ba7992beb3eda7701321af,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37924,0,0,e05433fc709b37508e94a979863f088e86329405c0ba7992beb3eda7701321af,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37927,0,0,560584f6e7ef315723501d3c62881a4e0c9b3ad1204b52ebcac93863b05e014f,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37928,0,0,d7c23cfa28358062117e75a096fd1b2a1412e40b95d290b44dda94129c8901b3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-3793,0,0,45180ff35ea2c7285cdd371de1244c7a4424d1261f14c1bf7f3ac3169f3ba4b9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37930,0,1,cbe1ca2f4e81dccdfaf7fff22555d3553037284f1beae7ae93fad01af7748a5a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37930,0,0,cbe1ca2f4e81dccdfaf7fff22555d3553037284f1beae7ae93fad01af7748a5a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37932,0,0,a3ce9ecce9fdf6d7e055cae05e400292dfd3fd5ac50cdfaa9f84e0caa41c69f3,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37933,0,0,89aadc1bfbd864beebf6ce61583dd3e0e43426698e502bc5c6a9b9f602b29135,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37934,0,0,20d80f75e222e93cd8bf312483db42a7dd2efce13206dab8e3080dada5a4be9e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37935,0,1,87ab16224963b2ffcaa184d23b7129376f4f47dc7928afcf629f5debe7a0db5b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37935,0,0,87ab16224963b2ffcaa184d23b7129376f4f47dc7928afcf629f5debe7a0db5b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37936,0,0,70e5dbee812b290ecca86e6d5cbebf144efe57fbc385415862eb03c9a3bb1e50,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37938,0,0,7b3a6d6420f31bf37b355b942f855aefd8f1648c6acabb976e80a1736b113df5,2024-07-12T16:34:58.687000
|
||||
CVE-2024-37939,0,0,1e975f14d60abc3972d891d3881ac6dad4a79e9e4d07ca7d20f27c798e79422a,2024-07-12T16:34:58.687000
|
||||
@ -254996,7 +254996,7 @@ CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd
|
||||
CVE-2024-38182,0,0,b4d26c4f4cbe1c2272cffdb42dee316497d9ebef820b6332d9e510a850c3591f,2024-08-02T04:17:24.853000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38200,0,1,9c8cc66a1f50b75708742d46d8c50dc698049462a03889a12013758dd3bcaa00,2024-08-13T13:43:16.403000
|
||||
CVE-2024-38200,0,0,9c8cc66a1f50b75708742d46d8c50dc698049462a03889a12013758dd3bcaa00,2024-08-13T13:43:16.403000
|
||||
CVE-2024-38202,0,0,5f1ef47a3badff97031fb210a5df27c56cf4132700b07b21ac067d757e50d1a2,2024-08-08T13:04:18.753000
|
||||
CVE-2024-38206,0,0,cb12af303c16bd7b14ab90d82849698a892f6215e2a01ea7e92b5cbb9057d49d,2024-08-12T18:33:38.273000
|
||||
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
|
||||
@ -255024,9 +255024,9 @@ CVE-2024-38282,0,0,0b84325e8423ee1d927b510486c46be47f1c2c84d1f4cca17c487d6f5ea39
|
||||
CVE-2024-38283,0,0,797ece42e985c33b58c5d43ea734dda88927de464a1a03ca93cecae13e751b09,2024-06-13T18:35:19.777000
|
||||
CVE-2024-38284,0,0,165d8c293dff7206e2957622c811a8e8219577c81f47e9f75916b28f253c3103,2024-06-13T18:35:19.777000
|
||||
CVE-2024-38285,0,0,7e28442ebee8b34d71e5708e3d778f155bb5ea07375678fa14265f29cc1dda8d,2024-06-13T18:35:19.777000
|
||||
CVE-2024-38287,0,1,f05b7fe0906459cf21ff7b461dcdceaa70975d18e173be2ad9f797e07b4a35d2,2024-08-13T13:34:22.057000
|
||||
CVE-2024-38288,0,1,9625e03ff55ef3f55d7b160d3881cd5b2a0d9065388436159679245b127f8026,2024-08-13T13:25:45.940000
|
||||
CVE-2024-38289,0,1,7a51444ea1dff38d99c02380eda64a7954072700dbb55d2148136165d941abe0,2024-08-13T13:28:13.263000
|
||||
CVE-2024-38287,0,0,f05b7fe0906459cf21ff7b461dcdceaa70975d18e173be2ad9f797e07b4a35d2,2024-08-13T13:34:22.057000
|
||||
CVE-2024-38288,0,0,9625e03ff55ef3f55d7b160d3881cd5b2a0d9065388436159679245b127f8026,2024-08-13T13:25:45.940000
|
||||
CVE-2024-38289,0,0,7a51444ea1dff38d99c02380eda64a7954072700dbb55d2148136165d941abe0,2024-08-13T13:28:13.263000
|
||||
CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c981597,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38293,0,0,2af5660de21ea537f089380c69d608dd10ea2321053bca42c4352602d7ee9678,2024-08-01T13:54:46.393000
|
||||
CVE-2024-38294,0,0,f88948441f6418893f991fd0ef34dfd45f0e02ebcb8e39fd787f2f64385d53d8,2024-08-02T18:11:19.757000
|
||||
@ -255147,8 +255147,8 @@ CVE-2024-38494,0,0,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a3
|
||||
CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000
|
||||
CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000
|
||||
CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000
|
||||
CVE-2024-38501,1,1,5d05f0c312a291757c65cf104a7904891fb00cd19e32d000e69218e3766700c7,2024-08-13T13:15:12.130000
|
||||
CVE-2024-38502,1,1,4fcf7bba62489040cb0aca50a60ccaeb7b00087535338eb5bca48b7737f6821b,2024-08-13T13:15:12.460000
|
||||
CVE-2024-38501,0,0,5d05f0c312a291757c65cf104a7904891fb00cd19e32d000e69218e3766700c7,2024-08-13T13:15:12.130000
|
||||
CVE-2024-38502,0,0,4fcf7bba62489040cb0aca50a60ccaeb7b00087535338eb5bca48b7737f6821b,2024-08-13T13:15:12.460000
|
||||
CVE-2024-38503,0,0,57a42403e1de4dcbf683abc4eaadb7a1ac23c4ac22608d1c4298e8a1a0c607e4,2024-07-22T14:15:05.780000
|
||||
CVE-2024-38504,0,0,4c5e9d4e31ce363d990483052f136d892b9e9d476c16b9ba9ffe4f7ab7d68bdb,2024-06-20T12:44:01.637000
|
||||
CVE-2024-38505,0,0,b17f43381c815e52625008a26f98d511f617e1d606d0689fa471d4457a2ae811,2024-06-20T12:44:01.637000
|
||||
@ -255325,7 +255325,7 @@ CVE-2024-38684,0,0,de2604bb564cc434d07df81940a8260c4b3d699e13c5c4b0afa4745c84869
|
||||
CVE-2024-38685,0,0,59bac4b8404d77f8fc1c0cdc9fe4021b8e96d3d207cf1a68dc260c160fc894d5,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38686,0,0,ca8f4f25ca8d3ba06f67bdacb6029bd19890f07767fdf9ef77f98e4bafb70469,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38687,0,0,f0cff34686afd44d154a8ccd7570e1d62449845a805d2513aece2d14a15ffa23,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38688,0,1,b75089e930442ca5f1c1668b22bf60b59494df8ca4c258acf80924a542ea70e8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38688,0,1,c66cce34d5489d314265d72bde4b15a74e154f1f779489c1765f47a816617839,2024-08-13T15:15:17.783000
|
||||
CVE-2024-38689,0,0,0d7351b68eb1ca333a04fe4331d97d8f3d9e657db2a8d3347ae1c4f5a70fdfb8,2024-07-22T13:00:53.287000
|
||||
CVE-2024-3869,0,0,48f9071a6f5d125b2c43fec069da722b087f824997b9c50ca7b95aad4aebfb77,2024-04-16T13:24:07.103000
|
||||
CVE-2024-38692,0,0,fc33d68523c1b621e2e40da51c2b133dfc056e5efe69c93d78ca937f5e04fb48,2024-07-22T13:00:31.330000
|
||||
@ -255333,7 +255333,7 @@ CVE-2024-38694,0,0,1103efc1e9ce360d7ec82a8f19753cbf3cd40623925b6ee52c38a61d5ffa0
|
||||
CVE-2024-38696,0,0,35a6f879eecff675c7fba5d08cbcc5ee7b43f7f2731c3465b1a4e88bbc0e1ff7,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38697,0,0,a46892050e5f82faaa0e187700d3448b5b1a8ffbf648c825fc5ce00de9ddfef8,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38698,0,0,1edde839f5f793082457812b7b588da594d6a461cdc498477c0986a7fe004fb1,2024-07-22T13:00:53.287000
|
||||
CVE-2024-38699,0,1,2787d535945bc38e31ef9fac1487b68525e365e94e4cce66e3589caa09216e86,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38699,0,0,2787d535945bc38e31ef9fac1487b68525e365e94e4cce66e3589caa09216e86,2024-08-13T12:58:25.437000
|
||||
CVE-2024-3870,0,0,0a94fe58f68a2a55a9a615e303c503c3189a8068ab169c2fe45504536e49912a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38700,0,0,5e4bd50c4e7369161e2cd3ff2af0ba7e11eedddf0da3736808759ae69637e2f7,2024-07-12T16:34:58.687000
|
||||
CVE-2024-38701,0,0,b514886e191b9c90792a71620990b9cd4dface8ab97ed8527ed77f16347cfe3e,2024-07-22T13:00:31.330000
|
||||
@ -255356,7 +255356,7 @@ CVE-2024-3872,0,0,e0746b0ccf3c2bc5c1cf6b271b7bc58e10aa7c45ec1e77f360e4d291ead633
|
||||
CVE-2024-38720,0,0,f9b8c8ed2efe93225496b04ed9fba739cb8ba9d99b25a127d2bb4233a5d4753d,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38722,0,0,ac4063575d52a48f994e5dc466d71dd1e5a91f3a1145c47a0fe2a10e4850fe33,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38723,0,0,c163e156ec3ebbc80fa4644640c2ef22e9b0f04e4301b0d8bf8152e210ebd688,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38724,0,1,af5886f9a9eb5e88a27772842f77bd8104fd67a2ec47397c8961fd602aa4e617,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38724,0,0,af5886f9a9eb5e88a27772842f77bd8104fd67a2ec47397c8961fd602aa4e617,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38725,0,0,7ebdb10d062cd40a3fc7776e923871f38820bab7217d8965a48109a6cbce5191,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38728,0,0,6f2a2ec6a9158917795eaaf8412abd254d72d505e1d76ed823aaaaa26c24c1f5,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3873,0,0,9f41cb948a87fde9385789dcbf920beb2d5b41b44037ffd26229becab16e904c,2024-05-17T02:40:09.627000
|
||||
@ -255368,20 +255368,20 @@ CVE-2024-38738,0,0,bc587636026bafbf557ab7ba8ec07e058c1701d82e90dc0010a07705f8e61
|
||||
CVE-2024-38739,0,0,e943ba897b18a5e605971ababc29ec37d438434e3cdbca441e7fccf03f6560b8,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3874,0,0,f386620c295e4adf2d0e1bcb131bf4999519006b93485a0a9655b1dc65db42b9,2024-06-04T19:20:25.697000
|
||||
CVE-2024-38741,0,0,ba8ea7a8f0396a64e75e460984ae328b0142ace4ad761010bd9470b3238b8238,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38742,0,1,dcb886f7ad65925e302828cf2ab6eba5bcdcb5d7a6ec0c5c463665c7b2117dfb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38742,0,0,dcb886f7ad65925e302828cf2ab6eba5bcdcb5d7a6ec0c5c463665c7b2117dfb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38746,0,0,988faa32e10f00cdfc73197d6a4b5a9effdd55c479491e986d878e425b43dc75,2024-08-02T12:59:43.990000
|
||||
CVE-2024-38747,0,1,387e10e1227ced6dbe298dd74e1eb68f01b4bc57677f9cc77ec50032ae33c463,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38749,0,1,da8ea877f0e11f703cd19caeae95603f9f13a5a9592eab258b9f5c14a7c6d146,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38747,0,0,387e10e1227ced6dbe298dd74e1eb68f01b4bc57677f9cc77ec50032ae33c463,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38749,0,0,da8ea877f0e11f703cd19caeae95603f9f13a5a9592eab258b9f5c14a7c6d146,2024-08-13T12:58:25.437000
|
||||
CVE-2024-3875,0,0,089beeefeb959936719f61ddb82cb79408bd763795142eb9b4bb9ae3be3050ea,2024-06-04T19:20:25.807000
|
||||
CVE-2024-38750,0,0,222ab97d7171c5f5aa490a3c05e43069eeeb208df63406b1a04c82e08ae0bf5a,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38752,0,1,65b9b9b528cf7d93baa0ae852a80f46f0d0b074f8dc8ad6f6601b0be682e8f97,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38752,0,0,65b9b9b528cf7d93baa0ae852a80f46f0d0b074f8dc8ad6f6601b0be682e8f97,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38755,0,0,c1eb4fbc941f067570b6df47700dceae56b94124f3422699ef8660741d53e6d7,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38756,0,1,1811eb27f20d94e2d5e1196b57fe267d7059f56de6e325c9b2cd70d7eed832b2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38756,0,0,1811eb27f20d94e2d5e1196b57fe267d7059f56de6e325c9b2cd70d7eed832b2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38757,0,0,421e25aafaa8f24ca203f7704697e053a3b4c9c58e7bb7a0a06fc6226027ccb1,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38758,0,0,01ca07e85b1f1438d40acc21dae8bc4e8a4e622d1f60d60a02b659505eb185f9,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38759,0,0,b9fa7ce22eebb94e2617e669160f4e670eabfdcde229d0ec6de28ef0c8571a32,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3876,0,0,fa4ed7cd6030846f7b483928213b8739ce66b301252f810372f8be541fb30194,2024-06-17T19:15:58.763000
|
||||
CVE-2024-38760,0,1,dac50188f33dada03970bf025537a5a8d31ad50b678d6578763f501df6145fa3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38760,0,0,dac50188f33dada03970bf025537a5a8d31ad50b678d6578763f501df6145fa3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38761,0,0,163d643979adbf8920122e6726130a646970ec33787f98daf4f56c619ee9308f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-38767,0,0,a9b15a0ff3a2a53c65d6a5d7f54955d34e929127b2676eac528e66287825a41e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-38768,0,0,95304e2a98b024fab4e11f928777fafec4b510f27612acafcf61c70a99635beb,2024-08-02T12:59:43.990000
|
||||
@ -255398,7 +255398,7 @@ CVE-2024-38782,0,0,6a0be8e9b82da765a38c168f9379b39fb33153476e0513dd2ae6a8ab51f61
|
||||
CVE-2024-38784,0,0,68643de9ae936963f628fb861e48c54d8865838667917b2af37f3e4b54727ab7,2024-07-25T15:55:31.213000
|
||||
CVE-2024-38785,0,0,1449b2ac862365f3baee2eb77470d4db33740002d25748517f05870fff11903e,2024-07-25T15:54:37.577000
|
||||
CVE-2024-38786,0,0,23327703659ded3b4e2e8a097a9d1da3633ff8f92d32364fd6984503c0102bb5,2024-07-25T15:54:12.073000
|
||||
CVE-2024-38787,0,1,d4d55f16def567d86062490d92839c6f1ff0077b1d1aab515a1f48b31f8f77d4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38787,0,0,d4d55f16def567d86062490d92839c6f1ff0077b1d1aab515a1f48b31f8f77d4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-38788,0,0,d7426c90cb2d8e681f652bb3f7653d0e61fa19ddfa46c34abe44c6c5e4e37176,2024-08-02T05:15:30.283000
|
||||
CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8a8,2024-05-17T02:40:10.177000
|
||||
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
|
||||
@ -255466,7 +255466,7 @@ CVE-2024-38983,0,0,b4007717ba4ecdcb9f705c2dcea6a2ebbf6e393e28ab95db12566748e8954
|
||||
CVE-2024-38984,0,0,7c3f7dcbb9d8db747f3ca9e598aad133b9cb813297db2b8c281b7b8ebe0e4cd5,2024-08-08T14:20:15.617000
|
||||
CVE-2024-38986,0,0,f88f428c38525ddbc968d1794b1779fbac2144427d1465f154ce6924362299d1,2024-08-08T14:18:47.127000
|
||||
CVE-2024-38987,0,0,0c71f898711274c7ac1489fe714f2d31dbe2fc7f130139d062fe917d9ea47c74,2024-07-11T15:06:05.027000
|
||||
CVE-2024-38989,0,0,d752938c80deda5b171af5c6086cf96369e2425c421824e4ddf9e14cf0940e2a,2024-08-12T13:41:36.517000
|
||||
CVE-2024-38989,0,1,7001f996e8750f893c91dddad8450a9cd0a74e958414e4c24caf0d467ae89875,2024-08-13T14:35:23.670000
|
||||
CVE-2024-38990,0,0,501931c40b72ca4a3b10df5757210e9290217859750e859ab66984c960fc5bf4,2024-07-03T02:05:27.837000
|
||||
CVE-2024-38991,0,0,94e3c94b29575f02c48116cf5f4eea434bedd332518d74450337fdc7b51e049b,2024-07-03T02:05:28.670000
|
||||
CVE-2024-38992,0,0,b7cf9f54a7f4c2067eaf3603c2993c981c393feec4a45aee69ee69a0c7bda224,2024-07-03T02:05:29.473000
|
||||
@ -255523,7 +255523,7 @@ CVE-2024-39124,0,0,074b2440134f96fcb5e6403766335cbe851c245882b5084251dfb9a87ee9d
|
||||
CVE-2024-39125,0,0,ea222508082dda2f4140fd8cec40ec4cb568aeac21b16bf5850e5de1b8ed9df9,2024-08-02T19:45:07.057000
|
||||
CVE-2024-39126,0,0,02a0af5813c985b7ccaba2afbb0690bd72e15528f1d0e97017c88410c682ae2a,2024-08-02T19:45:17.417000
|
||||
CVE-2024-39129,0,0,e13cd843f644991726516520189fbff2f72df7163be6b1c91e840488eab8e98f,2024-06-28T10:27:00.920000
|
||||
CVE-2024-3913,1,1,3b1abc5a6b17d1ac7a04e5054f16f5e92d8424b6909d6c40dc1ae01c592f9bc4,2024-08-13T13:15:12.750000
|
||||
CVE-2024-3913,0,0,3b1abc5a6b17d1ac7a04e5054f16f5e92d8424b6909d6c40dc1ae01c592f9bc4,2024-08-13T13:15:12.750000
|
||||
CVE-2024-39130,0,0,df5f818c69686396dd3eb68339897ebffa1b11bf7906d37001b874abe3136d64,2024-07-03T02:05:38.450000
|
||||
CVE-2024-39132,0,0,f1e2ae8a4f82ac6b3eb2b1f084ee47ef357e0b4364889cfb0a92803ee3d26262,2024-08-12T18:35:40.733000
|
||||
CVE-2024-39133,0,0,c0b156e43b5b006fb8a1a63a92ff8df19a3b9334b5434845fe916818d8f721fc,2024-07-03T02:05:39.283000
|
||||
@ -255645,7 +255645,7 @@ CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef261
|
||||
CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000
|
||||
CVE-2024-39379,0,0,eea4124c5ea93e0750c53c7242ccfa255eb0eb94ed4c7c3ac1070e74f2655db4,2024-08-01T12:42:36.933000
|
||||
CVE-2024-3938,0,0,65ce7ff82c49f65d2634b6daf25e98c9672c7f84a53fd4675899c0451a398720,2024-07-26T14:15:02.773000
|
||||
CVE-2024-3938,0,1,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000
|
||||
CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000
|
||||
CVE-2024-39392,0,0,66cfce17bd8b1475fbe1823e0e269e958974fa5e662af0c38bd8aae43df2ebb5,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39396,0,0,35651f26387fec82c0dfb279ff129f06faad55e21497397f655b21318cdf6ddc,2024-08-02T12:59:43.990000
|
||||
@ -255774,7 +255774,7 @@ CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff
|
||||
CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000
|
||||
CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000
|
||||
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
|
||||
CVE-2024-39591,0,1,aa73d6aa3e6f1fd7945356d9037cdf653184a2a0d3e6ffe5084020e855fe2845,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39591,0,0,aa73d6aa3e6f1fd7945356d9037cdf653184a2a0d3e6ffe5084020e855fe2845,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39592,0,0,092a544949de7319ae89291bc739a96163c6c0d37a46e6cc9f12df6e56b452d2,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39593,0,0,51f4661ccbaba7452aac7223f24d0b1eb585ba800f6962a627249fa8658c86e6,2024-07-09T18:19:14.047000
|
||||
CVE-2024-39594,0,0,637cf3efe25f76e3f7049bdd8fb7c900c50753635b8417f794e35a21a4031116,2024-07-09T18:19:14.047000
|
||||
@ -255803,7 +255803,7 @@ CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c
|
||||
CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
|
||||
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
|
||||
CVE-2024-39642,0,1,77fe294d5b16a2b61249926534151028f491eb3bed8731298d02b17ea0bf385c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39642,0,0,77fe294d5b16a2b61249926534151028f491eb3bed8731298d02b17ea0bf385c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39643,0,0,ab690f644bd8107c9b6f111fea454f517942fa99d057356f81485b17fdbb7467,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39644,0,0,d3581da15e50573fdc66cccf372916528eaf253913bd99dd7ea69d512d0d7709,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39646,0,0,bb182e2388ee05be62a2bee46707e3cedd648df938bee18d71dc058292ae064e,2024-08-02T12:59:43.990000
|
||||
@ -255811,7 +255811,7 @@ CVE-2024-39647,0,0,6e1f994aff430711e600420bf7a77dd8b1f3e358bedde7107dd7e4563194f
|
||||
CVE-2024-39648,0,0,ab9faea09f5f33bcf9880e5ab21b0ae5b90092067a818bd60c5199b0cda605b7,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39649,0,0,fbd73aadfe0b4a459c28dd4d378a42dbf18f4c17162b2c287c459e7740d56ebe,2024-08-02T12:59:43.990000
|
||||
CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000
|
||||
CVE-2024-39651,0,1,8c87f55abc8672c9f439da2ca1b9ea17f383816e1e22e404169d5f0048ec96e1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39651,0,0,8c87f55abc8672c9f439da2ca1b9ea17f383816e1e22e404169d5f0048ec96e1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39652,0,0,f0c2e1305e128fc4254bcfdadc56a769f26cdafb9e9828cd6a3d3d5cb0f0b69f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39655,0,0,e8990ae109997ce183e7ec6503e4dae3b8dd97111e423903b7d9d645e6d064e4,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39656,0,0,41595071b9c98d363bce33f052284f93eb7b68d4fe24b85d68eae6cad1c3cf98,2024-08-02T12:59:43.990000
|
||||
@ -255969,7 +255969,7 @@ CVE-2024-39918,0,0,a01d13ae0b603735ac5bf07d7a2e68692283e08ddeecd7e6f7dcec848231b
|
||||
CVE-2024-39919,0,0,ef22e6bc228ea2cf3764fb5e5dab9f5aabfb0f60858f62004efb01879ab42cf0,2024-07-16T13:43:58.773000
|
||||
CVE-2024-3992,0,0,d59b458f7245a3919fa8340af270cf293071474241b7e0b0583fac012fe7336d,2024-08-07T19:08:22.713000
|
||||
CVE-2024-39920,0,0,6bef49e28b0964791fd5773db4da2a4c4749e9b59fc7a5ce56343d0a0b5eb623,2024-08-05T19:35:13.550000
|
||||
CVE-2024-39922,0,1,a11f540f7ae637eeb23d9dbe5f41e0a82295584884fed42d4d4682f877ddfeca,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39922,0,0,a11f540f7ae637eeb23d9dbe5f41e0a82295584884fed42d4d4682f877ddfeca,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39927,0,0,717dcd9b351ff5b040ab1ae7299ad64aae73108f68a03a8e01e420f58c1fcdd4,2024-08-01T13:56:03.057000
|
||||
CVE-2024-39929,0,0,a101bb24f7d63f090f20192946a102f9a39a1df49f06f499eb77157966db47ea,2024-07-09T16:22:58.760000
|
||||
CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000
|
||||
@ -256187,7 +256187,7 @@ CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f
|
||||
CVE-2024-40689,0,0,b737e3a1f88271d05934916a1e9611bb299eb972b578fcd1907e65284f8f8a13,2024-07-29T14:12:08.783000
|
||||
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
|
||||
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
|
||||
CVE-2024-40697,0,1,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000
|
||||
CVE-2024-40697,0,0,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
|
||||
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
|
||||
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
|
||||
@ -256287,8 +256287,8 @@ CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8
|
||||
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
|
||||
CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000
|
||||
CVE-2024-40883,0,0,dacd9a67232f6d97da8b548085eb71f69250fd3fec34bd945dc78c157c912274,2024-08-01T12:42:36.933000
|
||||
CVE-2024-40892,0,1,f4b3d30cee3dbead5f513a470d6b7589a9f6fca1880298ea9f624486c63e7014,2024-08-13T12:58:25.437000
|
||||
CVE-2024-40893,0,1,75c648235a6f1fcfb2addb5d3726647373dc511b9170f6c03d285bfcb70f1cd1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-40892,0,0,f4b3d30cee3dbead5f513a470d6b7589a9f6fca1880298ea9f624486c63e7014,2024-08-13T12:58:25.437000
|
||||
CVE-2024-40893,0,0,75c648235a6f1fcfb2addb5d3726647373dc511b9170f6c03d285bfcb70f1cd1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-40895,0,0,8c1e79c4f9b4c4aa0a454566e9355d762509535d530511413d5b712e02da1fc1,2024-08-01T13:58:15.617000
|
||||
CVE-2024-40897,0,0,961e760bbf75aa3c22f4f2524dda55f63ec78f0f1d7997b53bd7e0a1a9dddcac,2024-08-01T13:58:16.503000
|
||||
CVE-2024-40898,0,0,c6ad18799f7505669566d9c81fb73660e4e14c652ad1fc12f5c5f928e7c51636,2024-08-08T16:02:40.887000
|
||||
@ -256562,7 +256562,7 @@ CVE-2024-41237,0,0,8ccb4952f164337b681989e54cc147e9e164fc596c980ba694a928ee7e458
|
||||
CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce6db,2024-08-12T15:06:26.557000
|
||||
CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000
|
||||
CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000
|
||||
CVE-2024-41240,0,0,6bb42561fb73e1c8ed9afe6aa25e35f66b18836251b374c99ab90ce1ad770126,2024-08-08T15:11:06.067000
|
||||
CVE-2024-41240,0,1,d3e33d561272d83576d26975ab2c3d7593213b6e30b5373619538759272a67a5,2024-08-13T15:35:13.190000
|
||||
CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000
|
||||
CVE-2024-41242,0,0,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000
|
||||
CVE-2024-41243,0,0,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000
|
||||
@ -256644,11 +256644,11 @@ CVE-2024-41465,0,0,f323d3ff7dfebe22b9a686e1b54d79f6e139e7ff43c0da4ee794ccc9ea305
|
||||
CVE-2024-41466,0,0,cab2b0ce626d04e7a0d17b559b41b44cbb63464fd58881e5118e54554df587f2,2024-08-01T13:58:49.187000
|
||||
CVE-2024-41468,0,0,723917e91ffa0b2faf983099b56bc2d3f0cf2685feaca850f60e0aa2cedc4e5d,2024-08-02T21:09:28.420000
|
||||
CVE-2024-41473,0,0,425ac543ae035b27f256c6d74a172a9469ff894b2097490bb556616203f6fd87,2024-08-02T21:09:40.267000
|
||||
CVE-2024-41475,0,0,630e4caaf9a41fa6a3f534e91e7daf993f863aa16f310e9c2054a2f10349bf91,2024-08-12T18:57:17.383000
|
||||
CVE-2024-41475,0,1,8d4e76d5f6b9c6b2651f3cfd5d0066dacec1028bf396f99ea2880314b899072f,2024-08-13T15:35:13.560000
|
||||
CVE-2024-41476,0,0,11908f38d518fbcd5181831e3e003273cc2be1192f541645fa97092f97e6faf5,2024-08-12T14:35:13.627000
|
||||
CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-41481,0,0,8aba19ab3da8a482dd9dfabe052be8c2c112aa692f0117579e187673fe5172d6,2024-08-12T13:41:36.517000
|
||||
CVE-2024-41482,0,0,9ed803d4862cda019e0f1d7d5f2f187fc334f909a159ec38deb6a90beebfa038,2024-08-12T13:41:36.517000
|
||||
CVE-2024-41481,0,1,c147890df622632e17fb447f6a188c3cc30b5351b710684282e2b6d4b3a225db,2024-08-13T14:51:33.017000
|
||||
CVE-2024-41482,0,1,dfc93ec02e2f907ca19eab1b6c73eb7ff3ad5a41e0a2b82a7b3f2c2dda8c066e,2024-08-13T14:51:43.163000
|
||||
CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000
|
||||
CVE-2024-41492,0,0,b1335de0436b7c8900c341d1fdd3cf687e177ea6dd90614e9aac145917e5dee5,2024-08-01T13:58:52.487000
|
||||
CVE-2024-4150,0,0,6620986a45cd70dd6d417a583c6a5ddd7d1307e119d46c0f4cd76fea931ab7e8,2024-05-14T16:11:39.510000
|
||||
@ -256680,6 +256680,7 @@ CVE-2024-41610,0,0,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1a
|
||||
CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000
|
||||
CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000
|
||||
CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000
|
||||
CVE-2024-41623,1,1,61d2c73df6ab5313852a706ec00036c5ab1fed8f6dcd72c6ab9cbc478c6660de,2024-08-13T14:15:12.203000
|
||||
CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000
|
||||
CVE-2024-4163,0,0,69022c7df60536fa7bdfb20d2705efebe8d2d6c2c39bf59b2dcb5940921dba2c,2024-07-03T02:07:10.047000
|
||||
@ -256709,9 +256710,9 @@ CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbc
|
||||
CVE-2024-41676,0,0,61be418f160a9962fa96c6561684c479cc1e76f508200bb9c78cde88da1bdcd4,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41681,0,1,b2cd2fc2f90e1627c93dc847451357a090125aa4661a1c2fa242960aa02ca602,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41682,0,1,caccaed8762da030de3252454908de3b48a9309c8dd8ff6683fc054c4ae7b87e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41683,0,1,9f7506454096ec000c94121bd9786d23d57d25cf377074520243d95316573df8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41681,0,0,b2cd2fc2f90e1627c93dc847451357a090125aa4661a1c2fa242960aa02ca602,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41682,0,0,caccaed8762da030de3252454908de3b48a9309c8dd8ff6683fc054c4ae7b87e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41683,0,0,9f7506454096ec000c94121bd9786d23d57d25cf377074520243d95316573df8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41684,0,0,1b960d89046bc8e3eaa12e0c6287bde4affa573a56f4d64d5604ebe07482aab6,2024-08-06T13:25:49.640000
|
||||
CVE-2024-41685,0,0,a068970e4306540ce1cc9df2cfd1edb284bc63da7de6424b24a52ab81b1f3ec4,2024-08-06T12:51:23.760000
|
||||
CVE-2024-41686,0,0,0724427e4fba2566827e14754d55d09ae4da5068fe75928087f7f167ed7545e4,2024-08-06T13:20:05.540000
|
||||
@ -256736,24 +256737,24 @@ CVE-2024-41706,0,0,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f087
|
||||
CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000
|
||||
CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
|
||||
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
|
||||
CVE-2024-41710,0,1,f336d2f5d200a47c4471d9c080e2d6a49e0138bf18ad68bcd7b2f59c7c60e2a4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41710,0,0,f336d2f5d200a47c4471d9c080e2d6a49e0138bf18ad68bcd7b2f59c7c60e2a4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
|
||||
CVE-2024-41720,0,0,51d8d22362ddab17d5ebf589fc7956caae3f208813d6f6c5afe48ee9de7d866c,2024-08-05T12:41:45.957000
|
||||
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
|
||||
CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000
|
||||
CVE-2024-41730,0,1,7031676875d9605aa9320a41018bc13d9621aeef7d21298e6e06361ee723c9b7,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41731,0,1,02a91c833df63e6c564516dc52c189d6e6b8e457157a426dcd27b10bf6f81700,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41732,0,1,cfd988683c162ccaff500a181357f2cfd9b2ad883947c45fd383db56c6c7334f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41733,0,1,43d7ece2923afa067b97cc5b8856ad98fe23c3003f391f111b302eac94143d6b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41734,0,1,cf23317e467965fbcd7918bb01313aad782041e00274083b64d4e716c1b129e8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41735,0,1,ccb6bd2c9caf1993f5f6606b875293f47b1c0f4cb08b8a4d210808558d16d312,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41736,0,1,e5545754fc84bd96371d2b3ed28ca7ba052a1e51781753e0c72027f3bf7ab1f7,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41737,0,1,a408108dc5071d044be54a438ed3a867965aef83e49043fa4c85cce4946ad825,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41730,0,0,7031676875d9605aa9320a41018bc13d9621aeef7d21298e6e06361ee723c9b7,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41731,0,0,02a91c833df63e6c564516dc52c189d6e6b8e457157a426dcd27b10bf6f81700,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41732,0,0,cfd988683c162ccaff500a181357f2cfd9b2ad883947c45fd383db56c6c7334f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41733,0,0,43d7ece2923afa067b97cc5b8856ad98fe23c3003f391f111b302eac94143d6b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41734,0,0,cf23317e467965fbcd7918bb01313aad782041e00274083b64d4e716c1b129e8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41735,0,0,ccb6bd2c9caf1993f5f6606b875293f47b1c0f4cb08b8a4d210808558d16d312,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41736,0,0,e5545754fc84bd96371d2b3ed28ca7ba052a1e51781753e0c72027f3bf7ab1f7,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41737,0,0,a408108dc5071d044be54a438ed3a867965aef83e49043fa4c85cce4946ad825,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000
|
||||
CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000
|
||||
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
|
||||
CVE-2024-41774,0,1,c4a5c6e5643b743eec59a3fa13dc7f6056cb35865a4a11a40e9565620b2ebfcf,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41774,0,0,c4a5c6e5643b743eec59a3fa13dc7f6056cb35865a4a11a40e9565620b2ebfcf,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
|
||||
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
|
||||
CVE-2024-41800,0,0,f1f2ac0e2d794dd76a91b381bc2e1b73faaa97bde3397dc82b0d97bdf6379a58,2024-07-26T12:38:41.683000
|
||||
@ -256764,8 +256765,8 @@ CVE-2024-41804,0,0,1eb20b79a205e234d02bd19bc2ee6fc8b7a374c6f3282ae0ce6727f5dc603
|
||||
CVE-2024-41805,0,0,d25981eca346da6da343ee3e5d5d95b55972138683a74ea987fda864ae2895de,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41806,0,0,538c83928617c702a46380612d20226d3b25d01fddbfea7d5ac18a5a8a9114ce,2024-07-26T12:38:41.683000
|
||||
CVE-2024-41807,0,0,e86c4e0879be0f622b0de12c8fba430b974ce92b24702bd4e14aaf255cc07969,2024-07-26T16:15:03.593000
|
||||
CVE-2024-41808,0,1,86e573e10148db5aa9add6d5ace29d7cf6e53a0a7cc2061842040f4fa6f34f79,2024-08-13T13:40:02.497000
|
||||
CVE-2024-41809,0,1,70303d2e0413c949907cbf888f2f0a84d6dd93d023a162166c01e97f9b1b2afd,2024-08-13T13:43:51.613000
|
||||
CVE-2024-41808,0,0,86e573e10148db5aa9add6d5ace29d7cf6e53a0a7cc2061842040f4fa6f34f79,2024-08-13T13:40:02.497000
|
||||
CVE-2024-41809,0,0,70303d2e0413c949907cbf888f2f0a84d6dd93d023a162166c01e97f9b1b2afd,2024-08-13T13:43:51.613000
|
||||
CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000
|
||||
CVE-2024-41810,0,0,099a0ba0bd576293cb0ce77966a6fd680adec1ed22994792ed20d2deaa7afc28,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41811,0,0,9f58aea58828abbba8408114667ccf0c9b7ba580252558bb335b961e28e91b34,2024-08-06T16:30:24.547000
|
||||
@ -256797,17 +256798,17 @@ CVE-2024-41888,0,0,732035365d9dca966bbb01cf0554f084d6d5446f352b0bfbfd05d657e62c4
|
||||
CVE-2024-41889,0,0,afc718e09b38fea98bf4af598c03af33eb38888a59959d88ad94aa8810cd502c,2024-08-07T19:35:11.473000
|
||||
CVE-2024-41890,0,0,db9be7aaec3f0e305c1425d168e81c684e69b3cb2cbbd809f74a130e7ea87d73,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41903,0,1,1181475f4133d5ae08476a8215ef2fdf0be5ba7ee32414c4421b04469fee257b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41904,0,1,c24394fe38355d9c34795a3d211e1175ec964bebdd4143def11c99cb853500bf,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41905,0,1,6eb52eab9211992fb767f07636a6ac052b456047d6f5d6b400eb75bcb15fd5aa,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41906,0,1,2092a767a29071d6ecff32b45dcabde06ca0f5fdfbf41c8f42a8f1dc8f031510,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41907,0,1,b7efda31c122e0f8ec7b482eed688e8286a8b42c021fdb8c0dbd88296b6b37ac,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41908,0,1,c763b72a948957ca3795b5d513dd686bb6b7a643bd91162afafe756b69cc31f8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41903,0,0,1181475f4133d5ae08476a8215ef2fdf0be5ba7ee32414c4421b04469fee257b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41904,0,0,c24394fe38355d9c34795a3d211e1175ec964bebdd4143def11c99cb853500bf,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41905,0,0,6eb52eab9211992fb767f07636a6ac052b456047d6f5d6b400eb75bcb15fd5aa,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41906,0,0,2092a767a29071d6ecff32b45dcabde06ca0f5fdfbf41c8f42a8f1dc8f031510,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41907,0,0,b7efda31c122e0f8ec7b482eed688e8286a8b42c021fdb8c0dbd88296b6b37ac,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41908,0,0,c763b72a948957ca3795b5d513dd686bb6b7a643bd91162afafe756b69cc31f8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41909,0,0,337038a3b5c59abd8e55d975739739e11455537d62050bba02f94002d048f34d,2024-08-12T18:57:29.247000
|
||||
CVE-2024-41910,0,1,06fef1a1746e307a7b6963424f9e76401a3fb6190b3818fc37dc793d73a60b2e,2024-08-13T13:06:13.467000
|
||||
CVE-2024-41911,0,1,b542ab6549d1a6ba75d487319609cd34daa1d1d30a8cdf77ef05c27a0b475654,2024-08-13T13:06:50.707000
|
||||
CVE-2024-41910,0,0,06fef1a1746e307a7b6963424f9e76401a3fb6190b3818fc37dc793d73a60b2e,2024-08-13T13:06:13.467000
|
||||
CVE-2024-41911,0,0,b542ab6549d1a6ba75d487319609cd34daa1d1d30a8cdf77ef05c27a0b475654,2024-08-13T13:06:50.707000
|
||||
CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000
|
||||
CVE-2024-41913,0,1,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe42f,2024-08-13T13:06:48.547000
|
||||
CVE-2024-41913,0,0,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe42f,2024-08-13T13:06:48.547000
|
||||
CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000
|
||||
CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000
|
||||
CVE-2024-41916,0,0,a0fecd8d5dfc5244c3f03c29349b89d02348a331ee6a39e9fbc76610f4f83ad0,2024-07-31T12:57:02.300000
|
||||
@ -256816,11 +256817,11 @@ CVE-2024-41924,0,0,06cc2d8c551d8fd39f4e2ff31447bb4070ddde2d992cf8f0c8cb1b0035280
|
||||
CVE-2024-41926,0,0,13c43cd281b4a9b74f2496b8daab80f10df1e7e6bc024b50c3c661b49018ccc2,2024-08-01T16:45:25.400000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41936,0,0,3e7584de3119384718885fa91426c70960b6e9df5afd267fe806c0b221ea60dd,2024-08-12T13:41:36.517000
|
||||
CVE-2024-41938,0,1,f6ea7377f5903c94a26194e30cb8905d07a042f29023d1508032bafa602773a6,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41939,0,1,585554327560a9ef16dfd9d24386414dc61a036e9dba95784bceef03129a4266,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41938,0,0,f6ea7377f5903c94a26194e30cb8905d07a042f29023d1508032bafa602773a6,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41939,0,0,585554327560a9ef16dfd9d24386414dc61a036e9dba95784bceef03129a4266,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
|
||||
CVE-2024-41940,0,1,e9fda83096c561d3d7d08aabce8a9d61d1b32cdd895b9a6262b149545cdec550,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41941,0,1,dbc99c925e521a1ce47a9e78073d667c15b23967f067fde9e7fd9d2b993c8e34,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41940,0,0,e9fda83096c561d3d7d08aabce8a9d61d1b32cdd895b9a6262b149545cdec550,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41941,0,0,dbc99c925e521a1ce47a9e78073d667c15b23967f067fde9e7fd9d2b993c8e34,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41942,0,0,7923ac40921d31d0296434cafefbd05115f6a6de46c0d45a5dcdea9f8a32742f,2024-08-12T15:53:27.457000
|
||||
CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000
|
||||
CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000
|
||||
@ -256846,9 +256847,9 @@ CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9
|
||||
CVE-2024-41962,0,0,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000
|
||||
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-41976,0,1,1fe33f47a85db9ce981ff794d247895d57be7987d9b98a139ed18f9270505ef4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41977,0,1,0c2d5a9b940ac3b2f101a09039e3b3ffcc295821fbaba95911207e4f295d7a11,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41978,0,1,dc2ffcdc2a80435ea52331fe1c824316e83565d620c604a25748290cbc8e9e81,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41976,0,0,1fe33f47a85db9ce981ff794d247895d57be7987d9b98a139ed18f9270505ef4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41977,0,0,0c2d5a9b940ac3b2f101a09039e3b3ffcc295821fbaba95911207e4f295d7a11,2024-08-13T12:58:25.437000
|
||||
CVE-2024-41978,0,0,dc2ffcdc2a80435ea52331fe1c824316e83565d620c604a25748290cbc8e9e81,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4198,0,0,10694c0c68dfe4c7db6b33a26dfbe4eb44c2b4223bfed9be5285208f068f86b9,2024-04-26T12:58:17.720000
|
||||
CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bacb3c,2024-08-08T20:35:11.140000
|
||||
CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000
|
||||
@ -257070,11 +257071,11 @@ CVE-2024-42366,0,0,26d79ce86c657c865adda744afaa0f4e93052091893cacc16340b64f87dbe
|
||||
CVE-2024-42367,0,0,e076a02bf03f8a97e18817904e3d95718772a1dffa8b800d6df36352b8b88cb0,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
|
||||
CVE-2024-42370,0,0,bc0a8d588f536f34911e68724023599a65528bc23b4d4f6cda3f1a23005982af,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42373,0,1,18dd42961fa2d0b0505b48728396162fc09701384477634e9d1214826f63234e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42374,0,1,4f9e67fe0e45e6c22255a61426641b37923fca9c432c3f6d2f1761c49666faa8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42375,0,1,5654d76364f1af624f08ff190617240d425bd0d560f40d5a5a020d5ded54fef5,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42376,0,1,4a1c078dd7f4e49cb6f2d30be161ebed50d623bb17d120d6379cadfe3464d2fb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42377,0,1,5709b4c524ddcaa1e01bca83d0b065b42eef2f7ee6b9b35dafaad46ffbe2871d,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42373,0,0,18dd42961fa2d0b0505b48728396162fc09701384477634e9d1214826f63234e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42374,0,0,4f9e67fe0e45e6c22255a61426641b37923fca9c432c3f6d2f1761c49666faa8,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42375,0,0,5654d76364f1af624f08ff190617240d425bd0d560f40d5a5a020d5ded54fef5,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42376,0,0,4a1c078dd7f4e49cb6f2d30be161ebed50d623bb17d120d6379cadfe3464d2fb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42377,0,0,5709b4c524ddcaa1e01bca83d0b065b42eef2f7ee6b9b35dafaad46ffbe2871d,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000
|
||||
CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000
|
||||
CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000
|
||||
@ -257120,13 +257121,13 @@ CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0c
|
||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
CVE-2024-42520,0,1,d0245ce44a5eacd94c8e6fe6728d861f4f7562ca5d568b3c3ebae59531d80c70,2024-08-13T13:19:29.207000
|
||||
CVE-2024-42520,0,1,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
|
||||
CVE-2024-4253,0,0,c9c68d543bb45de2537aab443ac18ac0d0ac2996dd48a0a792630e0df378eb1e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4254,0,0,3b60c29b2fffc26e81ef054aaff64665b1e9fde72fa8de5968c25c437cecbbf1,2024-06-04T16:57:41.053000
|
||||
CVE-2024-42543,0,1,6ee50d274b8eef597024a9c9175c5d4c80a1fe2616bb4fe4bff27c10e0a6311a,2024-08-13T13:24:03.060000
|
||||
CVE-2024-42545,0,1,a61a98cc83a9b9cc50be66b12421da3fc485c23ec7e2674e0c6e2660afcd71b2,2024-08-13T13:23:46.510000
|
||||
CVE-2024-42546,0,1,11bda558fb35041b8e39b22c874ec7cc2b62af68322f94c532d558b8592d2887,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42547,0,1,898f132b4e115631f63c01e15eef580b903d25c9260242031968af619bed5733,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42543,0,0,6ee50d274b8eef597024a9c9175c5d4c80a1fe2616bb4fe4bff27c10e0a6311a,2024-08-13T13:24:03.060000
|
||||
CVE-2024-42545,0,1,f468a16273bd93e60bf7c85edbb037a37f95ddbef27d46e806b8081634956ff0,2024-08-13T15:35:16.993000
|
||||
CVE-2024-42546,0,0,11bda558fb35041b8e39b22c874ec7cc2b62af68322f94c532d558b8592d2887,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42547,0,1,a09c7bbfb50fa5c4f41d5a4ad41bec7851c53010a05ba8ae30901a6fe9fd0537,2024-08-13T15:35:17.887000
|
||||
CVE-2024-4255,0,0,35fd058a4cc0a80e19d25400a3e944345c636d8ef400085f905d7b019af7edbf,2024-06-04T19:20:34.420000
|
||||
CVE-2024-4256,0,0,2885dad709315de5112b738946979afcb06c4d717b1b754bf7bfd87477f08c3d,2024-06-04T19:20:34.517000
|
||||
CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000
|
||||
@ -257134,17 +257135,17 @@ CVE-2024-4258,0,0,cedc452cf08b1d582601f74b54055702e4527b179d19ae6d21e1fa7a35e392
|
||||
CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000
|
||||
CVE-2024-4261,0,0,cad163d5402c8383e323c083e324c4342bcfec07494a0960d776456fb2ab221b,2024-05-22T14:30:41.953000
|
||||
CVE-2024-4262,0,0,eb43fbaec8efb92a09683be8d89079c39bc088d0014f0d5047c7a435bf15c8e4,2024-05-22T12:46:53.887000
|
||||
CVE-2024-42623,0,1,99a6aaf6801397834ccadcfb03d3715137de2aa0dd38613e1baf274f894ff205,2024-08-13T13:24:59.710000
|
||||
CVE-2024-42624,0,1,ec841bafb7e9aeedb21c49859383b729fbe686d2ed7814525f5ad995afa66c4b,2024-08-13T13:24:48.877000
|
||||
CVE-2024-42623,0,0,99a6aaf6801397834ccadcfb03d3715137de2aa0dd38613e1baf274f894ff205,2024-08-13T13:24:59.710000
|
||||
CVE-2024-42624,0,0,ec841bafb7e9aeedb21c49859383b729fbe686d2ed7814525f5ad995afa66c4b,2024-08-13T13:24:48.877000
|
||||
CVE-2024-42625,0,0,3b45097890bb975ba779c5fd86f6aaf0249b0f933babd1e52b024372c2d87a71,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42626,0,1,a577a76a6e4251b5887ad0ebc30981fc2398ed5abda45bf6ba13715904b26032,2024-08-13T13:24:29.367000
|
||||
CVE-2024-42627,0,1,dc791f47059eb1d24e79dd8e86fcf1207e5c824c40b28dc7346c3e407b50043d,2024-08-13T13:24:39.387000
|
||||
CVE-2024-42628,0,1,ae77e6dbb0fb6b78416c59be322943b3e27d1177389d59cf5f49d0df9ff8842d,2024-08-13T13:18:32.317000
|
||||
CVE-2024-42626,0,1,2719b95cb2b2da8055e44b617f6bc8b518937c6439f02bf103b37b68507f4891,2024-08-13T15:35:20.987000
|
||||
CVE-2024-42627,0,0,dc791f47059eb1d24e79dd8e86fcf1207e5c824c40b28dc7346c3e407b50043d,2024-08-13T13:24:39.387000
|
||||
CVE-2024-42628,0,0,ae77e6dbb0fb6b78416c59be322943b3e27d1177389d59cf5f49d0df9ff8842d,2024-08-13T13:18:32.317000
|
||||
CVE-2024-42629,0,0,2543b79305ee45292e39f871306680657516f37d9201c47bebc007532a83578f,2024-08-12T18:57:17.383000
|
||||
CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb40c,2024-05-16T13:03:05.353000
|
||||
CVE-2024-42630,0,1,44c938f5989206eb919f1fe129636637015c7376addb4db91ae2928c1a35fd9c,2024-08-13T13:20:39.450000
|
||||
CVE-2024-42631,0,1,f1ea0c17046a6f6d297c1add3f27908219f87fa9c102984850c5a597fb24dc01,2024-08-13T13:20:29.147000
|
||||
CVE-2024-42632,0,1,31ba44503eacc768507b9bd230db43f1f68c96b37084afad29240526916597c0,2024-08-13T13:24:16.770000
|
||||
CVE-2024-42630,0,1,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000
|
||||
CVE-2024-42631,0,0,f1ea0c17046a6f6d297c1add3f27908219f87fa9c102984850c5a597fb24dc01,2024-08-13T13:20:29.147000
|
||||
CVE-2024-42632,0,1,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000
|
||||
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000
|
||||
@ -257155,14 +257156,19 @@ CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b1
|
||||
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
|
||||
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
|
||||
CVE-2024-4273,0,0,5b125871d487c3efbe3e6c153d4b19bf711348e838f76308254a9b0be85a18c9,2024-06-04T16:57:41.053000
|
||||
CVE-2024-42736,1,1,29ca2de21b4a1d8d6fe7bce41e20687c6b05f060b6ea1e88e3be410d1c9c42a0,2024-08-13T14:15:13.160000
|
||||
CVE-2024-42737,1,1,6c5dd559a94060758148a4054f6a5cba7ea1b8869c02a5ccc751f6d65f248a1b,2024-08-13T14:15:13.437000
|
||||
CVE-2024-42738,1,1,35aeb13766aaae2e35259e98665e3cea7216f50f37fca36244ab32a40fb9bea9,2024-08-13T14:15:13.710000
|
||||
CVE-2024-42739,1,1,3609281e01ebd9e500ec87dbb7960003e00b8544cfedd233ef8f1780464d1b45,2024-08-13T14:15:13.940000
|
||||
CVE-2024-4274,0,0,75b03607f21ad1e6106012193c68fc94ebbedd9ebdaa49b327f299429c0ef078,2024-06-04T16:57:41.053000
|
||||
CVE-2024-42741,0,1,66d076747a9a43d7cb0206ce7bbfcbae8b1365e7fbb7872f942e6649b2474a53,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42742,0,1,53a3fcdb3d98e5160ef45970e8fcba0fbaee4712de15f35507347f04587d01fc,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42743,0,1,125c2dee19a8b599a9ab0c088cd5312b29d2da5f07ff954b1261c9e56ab33970,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42744,0,1,3f5148aca917437cb3ff7455e4d19c3cb29bcbe48424e657fcbd0dd71b206ede,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42745,0,1,603fff72f6c87eead28d43aa1dc62b0df11a3ddee70aeaa93d35e7e86210fa78,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42747,0,1,df241a4f36be8ea34424cca08fabfd772d3b17ab30b84030301c5950899bf985,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42748,0,1,6ddbd35b3e6cf17440977ef366d574022c7e5e10e1b970b86b3cb394702d7a48,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42740,1,1,caaf409c27469d497c0ceda8a6e803745cd50ecf02c0e936a634534be1222f47,2024-08-13T15:35:24.410000
|
||||
CVE-2024-42741,0,1,d8b9de98e1c6a2db5e3071d14e4a8ec942b3e76e67e7bfa07141d542bae6e170,2024-08-13T14:15:14.447000
|
||||
CVE-2024-42742,0,1,e941f3ec0711b97c1b69beb8f51c9dd900a7e3acfaba3ad5f4f6ec8fbfe7b7f1,2024-08-13T14:15:14.990000
|
||||
CVE-2024-42743,0,1,f1e0d68ab6ea6c43a343a772918cbc335f367b54ddd9adc130987a5e721f8f48,2024-08-13T14:15:15.247000
|
||||
CVE-2024-42744,0,1,7fc132e5b0db5a24d1b9406297f00389cd2dc183033cebd51dacf934afedf6fa,2024-08-13T14:15:15.427000
|
||||
CVE-2024-42745,0,1,cc0e4661f5a8efada715b28f6b8666bc35246a4b1f4ae32ef64a88fc3847ac89,2024-08-13T15:35:25.590000
|
||||
CVE-2024-42747,0,0,df241a4f36be8ea34424cca08fabfd772d3b17ab30b84030301c5950899bf985,2024-08-13T12:58:25.437000
|
||||
CVE-2024-42748,0,1,3518863a220907d111c9e54afe7d2c4a3c5f0a1ecb4ad57cfefe00aefe6bd075,2024-08-13T15:35:27.100000
|
||||
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000
|
||||
@ -257201,41 +257207,41 @@ CVE-2024-43112,0,0,adba1dfd679ff5e6d46afc8c8dcdec70df81430cc85737d48e09fa02ef6ca
|
||||
CVE-2024-43113,0,0,6573240be25b6af3e51d92f2a835e3694315e36c10003c73af950ce730fbb885,2024-08-06T16:30:24.547000
|
||||
CVE-2024-43114,0,0,6c710d141dc94fd27ccf4c35d8ed8fed217c18d925335ce65015d178fb239e9f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-4312,0,0,82451935a132459ec3a52babe511fed0dc0447cacf13fc78eab91e8a5c0d303b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43121,0,1,306f70702e1cd11183b4ec663f2ed6fa3bf76a0f3da56b911e3dbd26bd0854a2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43123,0,1,56876666ae658c842a5d1b625514c422e9e2935c9269e6647bb2f5fab7a96ace,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43124,0,1,bffaadacf01084de40d35f1795f8918456957490e4d932616ab963af0dbb5cd0,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43125,0,1,498d2a254bf07e23d10fd0050fdac59e5bbcce170d143d572071cc8eb6c3d173,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43126,0,1,6fc85d5c5b6d858b5d04ee86ed23f67d88cbb8069cf0a7b625c4dbafc0d264c0,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43127,0,1,c0c1b171335edb4ceda4549b55da23ef10a53af989286f2323c7124e4f91d03e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43128,0,1,d787b2864eda3b9a77f3adb166e1445e7353c726dd4fbde56a2c310918ff07a3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43129,0,1,d25cac6f4730b8c5a4203d421ede1a3489c7c9b067066bd5165577d52fdd353b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43121,0,0,306f70702e1cd11183b4ec663f2ed6fa3bf76a0f3da56b911e3dbd26bd0854a2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43123,0,0,56876666ae658c842a5d1b625514c422e9e2935c9269e6647bb2f5fab7a96ace,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43124,0,0,bffaadacf01084de40d35f1795f8918456957490e4d932616ab963af0dbb5cd0,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43125,0,0,498d2a254bf07e23d10fd0050fdac59e5bbcce170d143d572071cc8eb6c3d173,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43126,0,0,6fc85d5c5b6d858b5d04ee86ed23f67d88cbb8069cf0a7b625c4dbafc0d264c0,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43127,0,0,c0c1b171335edb4ceda4549b55da23ef10a53af989286f2323c7124e4f91d03e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43128,0,0,d787b2864eda3b9a77f3adb166e1445e7353c726dd4fbde56a2c310918ff07a3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43129,0,0,d25cac6f4730b8c5a4203d421ede1a3489c7c9b067066bd5165577d52fdd353b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4313,0,0,04786fcee0b11c58facf347077c0fb8e17faddbc064f2c4dc547a3be70193e4e,2024-06-24T20:01:09.330000
|
||||
CVE-2024-43130,0,1,7b12332a5a5c57afcdf5a03a426b617961b993f5344d40ab80fe628ff1a12ff9,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43131,0,1,cb5a314bde629cf8085400badd8863535f98d6eb19e88234f6b2550e391e687b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43133,0,1,42feabd3bfceaa0db2dad0f9322fc7e062b45d9844706ba726898920c7cb4fdc,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43135,0,1,64afa730595b83905683e46a96ea8bcf2626010bd2f8ab810f81e027b8457e40,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43137,0,1,ce4f7094db1d08dea639b8b61d7a0df170b78007284ce26ecaf2a9081b9a9b9c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43138,1,1,918b3eb5fec9200a8e09c897046b118343977ea029a0ad48abf2861738614a18,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43139,0,1,240da60a6ff20c5f01060fb025f0d963adc1cde384a92ed8e365d2b34aed2472,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43130,0,0,7b12332a5a5c57afcdf5a03a426b617961b993f5344d40ab80fe628ff1a12ff9,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43131,0,0,cb5a314bde629cf8085400badd8863535f98d6eb19e88234f6b2550e391e687b,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43133,0,0,42feabd3bfceaa0db2dad0f9322fc7e062b45d9844706ba726898920c7cb4fdc,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43135,0,0,64afa730595b83905683e46a96ea8bcf2626010bd2f8ab810f81e027b8457e40,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43137,0,0,ce4f7094db1d08dea639b8b61d7a0df170b78007284ce26ecaf2a9081b9a9b9c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43138,0,0,918b3eb5fec9200a8e09c897046b118343977ea029a0ad48abf2861738614a18,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43139,0,0,240da60a6ff20c5f01060fb025f0d963adc1cde384a92ed8e365d2b34aed2472,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43140,1,1,5e2c7e9ca68ff144a082c07be5cf1050df81c79a2cfb8eb4aea90f60cd6c5f00,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43141,1,1,07cf91a6f6b03ac407a5ff227a66d02d63745b41bdda3ec79dd8f269cab58d42,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43147,0,1,c590bf89cf6a5202fe89338056290cf01662a1b1b6ac4de852c04263e46b87d4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43148,0,1,367042c20a60328d9d239172f6df937e1376a3a36734970e2537ff52eb859952,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43149,0,1,4a12e51a055bbca031f7aa3201c71436e594dbf795e44424d2192e4062f7955a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43140,0,0,5e2c7e9ca68ff144a082c07be5cf1050df81c79a2cfb8eb4aea90f60cd6c5f00,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43141,0,0,07cf91a6f6b03ac407a5ff227a66d02d63745b41bdda3ec79dd8f269cab58d42,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43147,0,0,c590bf89cf6a5202fe89338056290cf01662a1b1b6ac4de852c04263e46b87d4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43148,0,0,367042c20a60328d9d239172f6df937e1376a3a36734970e2537ff52eb859952,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43149,0,0,4a12e51a055bbca031f7aa3201c71436e594dbf795e44424d2192e4062f7955a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4315,0,0,392e78ede02028792ceca327e706bfb19bc55163d6718415b77f2fda1df1c705,2024-06-13T18:36:09.013000
|
||||
CVE-2024-43150,0,1,6de4950b12d6cacfb1965ef3dda188cb2d2fd1906585dc37036c6fc8755e47fb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43151,0,1,de011bf78cae48f3194648cbfaa347da48f20f07ed241954f6efc8ae6aed36db,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43152,0,1,a78d2db561be2842fd7056b42a96064c469ae00d9923ec0be32d48eea18bfc99,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43153,1,1,d6892b2b2707b41547817a98fd9f774585fc8cb160e42b88233cc1bc03bc2631,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43155,0,1,287c4999c54607cdbbaa6c567e6363a70fdd399a322f10d7bfb8de455c54e4a1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43156,0,1,209e25af7e43869a61a661bc9aa68a5e80bad47fac1a3024ca4c508103bd4328,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43150,0,0,6de4950b12d6cacfb1965ef3dda188cb2d2fd1906585dc37036c6fc8755e47fb,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43151,0,0,de011bf78cae48f3194648cbfaa347da48f20f07ed241954f6efc8ae6aed36db,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43152,0,0,a78d2db561be2842fd7056b42a96064c469ae00d9923ec0be32d48eea18bfc99,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43153,0,0,d6892b2b2707b41547817a98fd9f774585fc8cb160e42b88233cc1bc03bc2631,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43155,0,0,287c4999c54607cdbbaa6c567e6363a70fdd399a322f10d7bfb8de455c54e4a1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43156,0,0,209e25af7e43869a61a661bc9aa68a5e80bad47fac1a3024ca4c508103bd4328,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4316,0,0,1f2d235ec208ef46fe57643aa08db6f0cf549b33584dbdea1429e6bdf8a86d5e,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43160,1,1,8a5c8492a8d623f9a841a809d338f2656ca38bc5054281ab69390eee01059b3f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43161,0,1,5b3fe19a9477408210ad923793f5bbcba429c44c3cb16bc529d7faaebeda5495,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43163,0,1,caa3cdf113a3ab11749554863a7db8d8587aef6c5cb5f0606f3aecf1a29ec064,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43164,0,1,d8a5575e66507ebe4caef8238d01294d815454b5d00120d795b26842155b8bc2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43165,1,1,321f22f7889f57803944fd7e4c404e6f09a5e8964938ace0ac9a3eaed739b09f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43160,0,0,8a5c8492a8d623f9a841a809d338f2656ca38bc5054281ab69390eee01059b3f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43161,0,0,5b3fe19a9477408210ad923793f5bbcba429c44c3cb16bc529d7faaebeda5495,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43163,0,0,caa3cdf113a3ab11749554863a7db8d8587aef6c5cb5f0606f3aecf1a29ec064,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43164,0,0,d8a5575e66507ebe4caef8238d01294d815454b5d00120d795b26842155b8bc2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43165,0,0,321f22f7889f57803944fd7e4c404e6f09a5e8964938ace0ac9a3eaed739b09f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43167,0,0,01f17fcd63c756d83b948d0875b4414e12688ba0576962ac27da499c54ee819d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-43168,0,0,6f1ce3e85e6cec75b3ae8101a2990b1aa3eb274cac98a0b799813d7d71452062,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
|
||||
@ -257244,20 +257250,20 @@ CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a
|
||||
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
|
||||
CVE-2024-4320,0,0,f21f873c3bfeb896c071276000f6bbe2ae4420d2f2c3184178334c98a666705b,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000
|
||||
CVE-2024-43210,0,1,eaeb77da4fa7d4f4bd565f5ca7f4fe0937fdd8b99f5a61fcafda9fc48e4b5e27,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43213,0,1,809bb94fac9c0d77af6591a688be403cdc593318aea99b9501a335be7cbd8159,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43216,0,1,4363ee4c98c9d015db91fbe608570b7ac978a865f1ff69c0fde570d952f1cf5e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43217,0,1,d3d721f30d15d3252b1b09e66538ef581017d89aaefc29321cd23188b4fc2d3d,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43218,0,1,cb315203c2f8a98c0d0babe8746ee0cb24990721585e1ba396b454836d7ecb36,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43210,0,0,eaeb77da4fa7d4f4bd565f5ca7f4fe0937fdd8b99f5a61fcafda9fc48e4b5e27,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43213,0,0,809bb94fac9c0d77af6591a688be403cdc593318aea99b9501a335be7cbd8159,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43216,0,0,4363ee4c98c9d015db91fbe608570b7ac978a865f1ff69c0fde570d952f1cf5e,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43217,0,0,d3d721f30d15d3252b1b09e66538ef581017d89aaefc29321cd23188b4fc2d3d,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43218,0,0,cb315203c2f8a98c0d0babe8746ee0cb24990721585e1ba396b454836d7ecb36,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4322,0,0,1d1748b4ac4d92a791836ec730671d75744c804cc2e9189accf3943e4e00efc0,2024-05-16T13:03:05.353000
|
||||
CVE-2024-43220,0,1,f3355b713e580dc80cbc20f0e810bb58da59d198936f60a9564d1cfa3f0d2979,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43224,0,1,a7b98564e040578b06f18e4ada3adb79f920860ba1a87e7d1e5de68b7fd4de88,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43225,0,1,7a5171f9cba75abbf653bf140e38e2754e37beb3e36b420daac64e99f63ad584,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43226,0,1,10b1ce847240264524adf496cd3c09f9cf2edfa6d46f7d7dea0a599473b9f5e2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43227,0,1,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43220,0,0,f3355b713e580dc80cbc20f0e810bb58da59d198936f60a9564d1cfa3f0d2979,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43224,0,0,a7b98564e040578b06f18e4ada3adb79f920860ba1a87e7d1e5de68b7fd4de88,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43225,0,0,7a5171f9cba75abbf653bf140e38e2754e37beb3e36b420daac64e99f63ad584,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43226,0,0,10b1ce847240264524adf496cd3c09f9cf2edfa6d46f7d7dea0a599473b9f5e2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43227,0,0,ad1f6a93845342802a80b9924c653d05f8aded241d8c4fe476abc24eaae6fcd1,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4323,0,0,8795dbc0ef00377d638f97794032c86e045103be19a16a47714b9d0a60088551,2024-05-20T13:00:04.957000
|
||||
CVE-2024-43231,0,1,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43233,0,1,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b580379a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4326,0,0,d965aff3554882d9e9e5ba1861fcd18121a605b5a6347dc41a19bd090bda9a65,2024-05-16T13:03:05.353000
|
||||
@ -257270,10 +257276,10 @@ CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9
|
||||
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4335,0,0,0ca058a6a5d3d4471e4538114fc6d3ccf52ed0e69923cf2c5461b8aef31c87bc,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43358,0,1,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ffc3a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43359,0,1,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ffc3a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43360,0,1,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000
|
||||
@ -258563,7 +258569,7 @@ CVE-2024-5844,0,0,cb741198deb8b5f70d2d0ce9c33e3416f6a940b998b67b99e17d7bffff2c68
|
||||
CVE-2024-5845,0,0,23de9b938edaad5f473a2b639120a3c8d86f1b1045f6e52453cfa63e2bd47f75,2024-07-03T02:09:29.493000
|
||||
CVE-2024-5846,0,0,0b2d8f18d514785edc16bc8a9875d408ec093858a0edbb60b84e2acabc32d1b0,2024-07-03T02:09:30.583000
|
||||
CVE-2024-5847,0,0,af863962a64ba64b748fc267021bdca1358cb53ef73ef1a0e2073c98890c9fa1,2024-07-03T02:09:31.730000
|
||||
CVE-2024-5849,1,1,1bc3dc3a318032710b114945324dcb1d298c8713932a88ae69ddd48463f799be,2024-08-13T13:15:13.067000
|
||||
CVE-2024-5849,0,0,1bc3dc3a318032710b114945324dcb1d298c8713932a88ae69ddd48463f799be,2024-08-13T13:15:13.067000
|
||||
CVE-2024-5851,0,0,d34c335450811da4c8dbeb823a49b4fedf64cc8a5affcfcc32e2d9d5897f0dc8,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5852,0,0,17ae123c3ebaa5002b861453d278a4e3499e2a8a6baca11a20783ec79d4cdcf1,2024-08-07T22:19:34.977000
|
||||
CVE-2024-5853,0,0,fce39775d007fbc741a3f2bc4fb52875073a382bd362c86e3cd6e44d0a9e6207,2024-06-20T12:44:01.637000
|
||||
@ -258779,7 +258785,7 @@ CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d7
|
||||
CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6153,0,0,aefe9e23b8ed1d87e58382d973bdf0f329fa76bb8df894b701324ee041e253eb,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda24384133e,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6158,0,0,ea462e929b181c85e24cd7a7a53cc9232157f7c818e5330b2e1c85115dde10f0,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6158,0,1,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000
|
||||
CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6162,0,0,42b0c84bb9f8407ee29b440898aa638cfeb455faf60863456bc05225330b70ad,2024-08-05T15:15:54.090000
|
||||
@ -258956,6 +258962,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985
|
||||
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6384,1,1,4d10b0f4a926ba3e2f92dd58623da1d2eb5638f43adc9a02940aa11e3c53539e,2024-08-13T15:15:18.567000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
@ -259064,7 +259071,7 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6
|
||||
CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6557,0,0,5f8a5c5bf162c69368d24395d90aef2e1a9fd156ec4a6d0f0e02ca54e1438d8b,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6558,0,1,cca325939290855a6fbb36c96da159f7692c9149fa644ac352f933f0f941a702,2024-08-13T13:53:29.533000
|
||||
CVE-2024-6558,0,0,cca325939290855a6fbb36c96da159f7692c9149fa644ac352f933f0f941a702,2024-08-13T13:53:29.533000
|
||||
CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000
|
||||
CVE-2024-6562,0,0,4822995966677dab6da0f49d7f93786d3fcd323a4db6975ffff3f5978def603b,2024-08-12T13:41:36.517000
|
||||
@ -259163,7 +259170,7 @@ CVE-2024-6716,0,0,8ffb92442f0506288b44c8e147b3f474301f4b7d486d9477f8f7548823d67c
|
||||
CVE-2024-6717,0,0,0b065284c5a83df80f016d53c3ebe26a820992221428250ad8b4acf1f2d75be1,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6720,0,0,1dc3a2e2b9f95baf4f0364462830a2005109f2f0ee9a4c40c2088696994c0bf6,2024-08-07T20:53:27.343000
|
||||
CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000
|
||||
CVE-2024-6724,0,1,3e590d6e630d9269f1c064b71cf443bf2aa25c0a348b7959e4c2235e45da2e20,2024-08-13T12:58:25.437000
|
||||
CVE-2024-6724,0,1,ef7cb6dd8a9fd26c655444fe0832cb6904dfb569c6b212206b0491ce3f557e3f,2024-08-13T15:35:30.033000
|
||||
CVE-2024-6725,0,0,02f518ea588b9f58d1f41a7ee9055d6a87d38c1076b40cf72b33d47960c5f058,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6726,0,0,67da9a54e5a829e4300bb2883a5b7a4407d07a460c0b67dc5027c2e9a4f78316,2024-07-30T13:33:30.653000
|
||||
CVE-2024-6727,0,0,9d08fdd347dc87a0df3a4e157904c3068a4121c1538981e1be169dd75a3fc029,2024-07-30T13:33:30.653000
|
||||
@ -259194,13 +259201,13 @@ CVE-2024-6753,0,0,79cd533ef788d1e388d91ad96dd06c23d644eb06446486c79597aa813abb65
|
||||
CVE-2024-6754,0,0,bc8cde0e84d8997b1c75c8ce06ab5236a2f6d5b64ebe5ed2b11b2213361d556f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6755,0,0,ab1b630d4d60f43a14793abf6a91e747f24cf32e85dd2f18d0c7fae990d4845c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6756,0,0,f587e50343ba8d4d9984018181e54a04ca58befeaa1fc8ceb12c6bae56622e09,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6758,0,0,8e0c8009cd76a9d4bc65a9116d366555cd008b71f0b28146b5ec5f874a85e601,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6759,0,0,6bdbf877165c4e693ddef2893b5c211e9fe2f04eb7b673528a8d950ccc2f083c,2024-08-12T15:35:05.710000
|
||||
CVE-2024-6760,0,0,8375f9a099e5cbb4862dd7553e9d084f12b71d9ecc9e58b816e97e99161fe8e4,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6758,0,1,eba9276bccb667ada2a9e6cadd00c35035c829f464cb8fc5793fac965ac82fe4,2024-08-13T14:58:47.857000
|
||||
CVE-2024-6759,0,1,e7cd1780cd31aac9820013b04e76a14ca6ed66e984c4afbf1fe81690ab6c39a6,2024-08-13T15:08:27.780000
|
||||
CVE-2024-6760,0,1,2363997d66d6496a6d94c4263cbac8f525a5e902af0a9a7389048de6fc4d9b78,2024-08-13T15:08:51.977000
|
||||
CVE-2024-6761,0,0,f38b3ccdc89aa0093bd659ba31741817a9ff74cb3bee1ce8404957bf0a35b578,2024-07-29T11:15:10.140000
|
||||
CVE-2024-6765,0,0,582116fb1612a7c43e0b570dc3dd773f185a6bed827d147d00793764d2f2774e,2024-07-17T14:15:04.327000
|
||||
CVE-2024-6766,0,0,4e69f4c5d546bbff4d97a532e9e5f675c0139ba3a0fba76f00597bc0bd516b20,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6768,0,1,82748b5876adf1db3885f7851e524fbc4111b7e46f9748cb3a4056bb52182449,2024-08-13T12:58:25.437000
|
||||
CVE-2024-6768,0,0,82748b5876adf1db3885f7851e524fbc4111b7e46f9748cb3a4056bb52182449,2024-08-13T12:58:25.437000
|
||||
CVE-2024-6770,0,0,4e0dc06a2aaa55c8bf6c7adb0f484fa8776788d11a4220cb3908768a1c995eb7,2024-07-31T12:57:02.300000
|
||||
CVE-2024-6772,0,0,f0ffeebc9a92372629de2eb0378ed8854f5d1b95881919ea662c83ca59f4b1a0,2024-08-06T19:35:10.307000
|
||||
CVE-2024-6773,0,0,1bdc9e628b27751c087418245f6e220f86984c0c8a171e81c36efa661e11acef,2024-08-06T19:35:11.320000
|
||||
@ -259214,6 +259221,7 @@ CVE-2024-6780,0,0,54fc3efeb973ca2f40f04f54d5a723685bcfaff31befba604fec0242bd088a
|
||||
CVE-2024-6781,0,0,e24636cf8aa31acaa4171fe3fd81abcf69649ed380806bfafc0afca571326c8f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6783,0,0,02ffa81303e2d0b2c8d5ada15cd1c5a0e17971825cf42319819acea737c80823,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6788,1,1,311a406131c552bba9972653d5a5960e37994669cd41448aa057a1c1acdcba2c,2024-08-13T14:15:16.457000
|
||||
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
|
||||
@ -259225,7 +259233,7 @@ CVE-2024-6805,0,0,df9c24152184824aaec79a13a2bf3e8af4b412b0a659321142aa5850936d97
|
||||
CVE-2024-6806,0,0,ee5c95118c41ce11e7d4b52c5bbead77dffa73ecabb9abea55db46ee557c211f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6807,0,0,e4d3dc581aa656108086542a60085fb674561ed6b78bc58e0e899b44edae1d40,2024-08-06T11:16:07.450000
|
||||
CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000
|
||||
CVE-2024-6823,0,1,52c574561947d227152f00e4d9c6a8988c5a1a72d80ae8bafb80bd8bbb1cf3bc,2024-08-13T12:58:25.437000
|
||||
CVE-2024-6823,0,0,52c574561947d227152f00e4d9c6a8988c5a1a72d80ae8bafb80bd8bbb1cf3bc,2024-08-13T12:58:25.437000
|
||||
CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6830,0,0,66325e33317c6fde8b929b285667c5104c4ae04492532b5067560968ff36e7fb,2024-07-18T12:28:43.707000
|
||||
@ -259331,7 +259339,7 @@ CVE-2024-7001,0,0,c36cc44ed743aca43eac7951b6662bd893691f9a45d57142d09098c4fe318e
|
||||
CVE-2024-7003,0,0,c2f51c1b71164a15818ef9209a48a467e859077ffdde417023c4b7a222f91993,2024-08-07T19:52:18.500000
|
||||
CVE-2024-7004,0,0,579c7092925f522b24930d2f858d246e2f0e8b8814ade95b044da8929a9fa444,2024-08-07T21:32:44.190000
|
||||
CVE-2024-7005,0,0,50047c6e5a9aa1663d251a4f8d2f7feee05d4f308668b613173701adaf5c68b3,2024-08-07T19:56:48.777000
|
||||
CVE-2024-7006,0,0,d9b22c9d2489a41f77077e91587898b3e051ca6f21314114fd319370a63daa3c,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7006,0,1,e6fa209ac0713e033e0ece6a5e36f45d5c69970bc1d46f1daeb274aa6fa96cd4,2024-08-13T15:14:35.167000
|
||||
CVE-2024-7007,0,0,443ea019503bb62163681477e591813d689cda148f7559da12362b93a0b77177,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7008,0,0,ff87d478ca9fb0d6caf6b0aaa7fee862b967b7c728a593ac30af375f28788cbc,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7009,0,0,922a39893536ffa7ba5eb09abd072489ca61d5474d3ecc496a4eea933227f8f1,2024-08-06T16:30:24.547000
|
||||
@ -259357,20 +259365,20 @@ CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb
|
||||
CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000
|
||||
CVE-2024-7092,0,1,9030e5869b3304fe7dc9c949d83c78ae02d5009d293df488c4e00b5311be7254,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7092,0,0,9030e5869b3304fe7dc9c949d83c78ae02d5009d293df488c4e00b5311be7254,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7094,0,1,b526dd0911dfd9daed075da4e35dab126ea18489318abfa41d36277d3b51e52c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7094,0,0,b526dd0911dfd9daed075da4e35dab126ea18489318abfa41d36277d3b51e52c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7105,0,0,a997b2c0e4e91d96626adcc721c978e22c9883ba6b9b8f61b29dff1a03ad516f,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7106,0,0,4f79551bb831c41c367c51b2f81bdf75eb9c94a2549b6a3ae035069141d77523,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7106,0,1,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000
|
||||
CVE-2024-7114,0,0,63b5a866782f89fc9f6ac1d30b03e6de66da2ca9dd341d6c07330fc52fb56b69,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7115,0,0,d198b7c0d1a7a67e83535bd15c8ec8b27ae3282d7abe6e695fb34b6781238fb3,2024-08-08T19:06:00.017000
|
||||
CVE-2024-7116,0,0,b2ab9f3dee8f843c737ebbc08aa3d5031cd0525c38c25d9a8f184157df5d144a,2024-08-08T19:08:18.813000
|
||||
CVE-2024-7117,0,0,0370972c92aa7f9872300d9752d76cebd60622a0fa3aff5d2fb9461dacdb7e43,2024-08-08T19:11:30.467000
|
||||
CVE-2024-7118,0,0,1f0a957064f55aa50018b5743e93b26ea81b9fa6087c0d5ec8ed17e492201aa2,2024-08-08T19:02:12.083000
|
||||
CVE-2024-7119,0,0,6b773d2ee0198b8c2555adc9c1a3fd196ed4373805abfd3c2f3d4a0da9be4440,2024-08-08T19:01:17.340000
|
||||
CVE-2024-7120,0,0,61740476c5bf721de3ec3243fb937e4e04eb802316b459df4612d60639785741,2024-07-26T12:38:41.683000
|
||||
CVE-2024-7120,0,1,dd88c4d4f5099fe6bbb2fa59d0942931f85db230d235608307fdbb069312e6ec,2024-08-13T14:06:57.033000
|
||||
CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000
|
||||
CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000
|
||||
CVE-2024-7127,0,0,6b292748e8421eae2ee17ad044bc14a6084b68762b6284b02f94a1dd672b3c81,2024-07-30T13:32:45.943000
|
||||
@ -259448,10 +259456,10 @@ CVE-2024-7221,0,0,02cd03e9ef3ccd1f72402ea0e75f79a9dec8b0d0078985051014154600786d
|
||||
CVE-2024-7222,0,0,85ba08369eda71d16b07ac17d1af0b3986f6f47434f835c28f727fa262a05b37,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7223,0,0,fb4ad2671317976e5224b8b90488cd911f8b35bdfcac7bcf593fd9864e14b346,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7224,0,0,af2db88c20757182d6fe4e4cfa97afc8f203736333d30a696d87d762a1939e85,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7225,0,0,e974c1f8e77945a548823cf60aed30edab7ed3ad9e75b60e5161d6e31cd3da09,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7226,0,0,8ccb52401469e015e0678efa0fcd5200575cc7f7749dae8fc4bc7e839e645ade,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7225,0,1,f6b7a5a2ac3e59704ed6ff994e447ad38c84eed49d8cb19f1c1208cd01aab3b3,2024-08-13T14:17:10.833000
|
||||
CVE-2024-7226,0,1,7be6f6e57b1777b742474ebcd204597686d04a1987b04bb682ec599818c11481,2024-08-13T14:19:04.147000
|
||||
CVE-2024-7246,0,0,b268ee120ca92b4c7d0a004d06b39e1ba37d5fd50d8d0e082e72d2daefd1725e,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7247,0,1,eb5e75877fc91cdfa22ecde75bfd097e2a5623f360394e2fce143a5a857b5335,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7247,0,0,eb5e75877fc91cdfa22ecde75bfd097e2a5623f360394e2fce143a5a857b5335,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7248,0,0,ebc2727ef1ac7b5ee7b71368a85d91d1db59260dc970f86f7476ace25fb5fea3,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d833,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
|
||||
@ -259464,7 +259472,7 @@ CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee6358
|
||||
CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000
|
||||
CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7267,0,0,e8d85bd26709e9a7a3dc4e8006f3b5201faefcb4aaf4ea4c1f6b8820dbe896ef,2024-08-07T15:17:46.717000
|
||||
CVE-2024-7272,0,0,0f67148a9aeb9690a6127129eb8401c0ea94a7712c477502b006aff587074ccf,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7272,0,1,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000
|
||||
CVE-2024-7273,0,0,c54f0201f662353be4c71178ecb2b70feeb3be7ae1969d571fa06d849250755c,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7274,0,0,220f148f22e0cdfff330f0ce278ee81a3638cc1ec9363d1b8e0bf68b06a6b216,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7275,0,0,74aabb34c99755fa1fb9c0f4de607d1cfcf582865a86e88bc2523c63afbfed31,2024-07-31T12:57:02.300000
|
||||
@ -259481,8 +259489,8 @@ CVE-2024-7285,0,0,1588f00f62b622cbfe8e88ee83ac742c519c9cf7e893a632f8c10ba375a45e
|
||||
CVE-2024-7286,0,0,faf5f04a7f582a69db088974c15a9d76aed7a5cd16aa3e7b0bbf476907a53b79,2024-08-12T17:35:47.387000
|
||||
CVE-2024-7287,0,0,93289282af448153bcdbd5dfb7b4392092f8580ba2a45cc433658e8ca1c7086d,2024-08-12T17:35:25.170000
|
||||
CVE-2024-7288,0,0,ce128fba82f710d2fd0c96fce3ed58ae6ba7550cb19d04b8a2d7b8e427ff3a89,2024-08-12T17:35:06.740000
|
||||
CVE-2024-7289,0,0,a709df24f87a0f503a11766c66b03ca94607de4e52c2ab315e56364f32619286,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7290,0,0,e8c96d989cb70bd87ad54653beaf9542c2c74968268c5634e080d16dd0ba2bdb,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7289,0,1,6b18fe26b5b26ad6475bd507b3c2a7b6582d96d6d346bf45be6ab6646e91fd65,2024-08-13T14:53:09.637000
|
||||
CVE-2024-7290,0,1,b7cc572b30062b1b5d10bc08d69cddffa31fb5f05e0fc8c35fce33ff6506b95c,2024-08-13T14:53:34.777000
|
||||
CVE-2024-7291,0,0,298cd3a818c66e9bf797d2d090f42649293656283b8daab213f19385b28931e8,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7297,0,0,cb4ca8684118dc46d1f9724d628f899c3458badae695854f058e1eba8efe7ce6,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7299,0,0,18b86413af481c73d022a0c4ed8ac3628863652a0dcfb13bf199bbb5e4db4366,2024-07-31T16:15:05.217000
|
||||
@ -259490,11 +259498,11 @@ CVE-2024-7300,0,0,a2e066ea38ffd4d283558ac9c550384947d588019ed19b0e0b6c2becc0799a
|
||||
CVE-2024-7302,0,0,3e3978a555cf8f7617492d06d41673a59c5323c552cb9b37b079247ec7c0af88,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7303,0,0,9520f852975600abd145b384cdd7bd5ee8f54af62f4a78fc6dcf9ca25a845304,2024-08-12T16:47:04.740000
|
||||
CVE-2024-7306,0,0,3c865c91ac7fc6c8c32a68429064dd89f6391277f467a5bdc571f15092dbadd4,2024-08-12T16:33:51.090000
|
||||
CVE-2024-7307,0,0,8476095e81ec710e7e9c3722c19632483eaa5873e650b0691bf646c8feee1673,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7308,0,0,7e62114ea2d3b6c1a5a8ade9366399ea87a812a2d0e1a6a097a837e22fa3ec32,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7309,0,0,5ccfece9a195af2bcab33eeb76ed6d8e998f45daf1218b4a428e39ed3952e4a4,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7310,0,0,c85c13e977bb78ddae23c7df7677c3a96f9884de3a7996e4498df3ced955ce83,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7311,0,0,049be7cb97674b9bc8fe5857eef44c6cbc0ed5d4b959c108694f8fb2cd9e1f95,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7307,0,1,480862c25d62bf3086f9355b511b9f3605564a857f38684f6972ff45c488e191,2024-08-13T14:55:05.840000
|
||||
CVE-2024-7308,0,1,ff0d49d6715bec6a8fa55cef81ae277660d9ae735dc8eb5d8914001060fb3804,2024-08-13T14:57:18.157000
|
||||
CVE-2024-7309,0,1,0631cf8eb1a47dc64ba800513d438efa35db01116b03be489171df88adabbf79,2024-08-13T15:00:09.397000
|
||||
CVE-2024-7310,0,1,47e814cc1f6c23f028dc19cfddb4fbb249afc7dd33c54329c346df582cc3dfbb,2024-08-13T15:01:01.970000
|
||||
CVE-2024-7311,0,1,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda21,2024-08-13T15:03:33.910000
|
||||
CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000
|
||||
@ -259549,13 +259557,13 @@ CVE-2024-7377,0,0,36e56aac53023f827b914b5a997e5857db515082cb379daae4b49f84fe230f
|
||||
CVE-2024-7378,0,0,4660382211ec1d3019061588c841e586a94d2ce616261678ca4d8a3644da536e,2024-08-09T11:19:25.363000
|
||||
CVE-2024-7382,0,0,01c5212f4fa00121002fa8baa527f3a77d1bda25dc068526094d170157a300b3,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7383,0,0,e9e41ebbc97601346bb675225ba79de921d0c65e55a076ffc6c52d62374e6a9a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7388,0,1,bb72044a27986ef0580bf78cdca606f48dbe32542e4985653f4ae8cb4f4bae98,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7388,0,0,bb72044a27986ef0580bf78cdca606f48dbe32542e4985653f4ae8cb4f4bae98,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7394,0,0,29459446676ebb07a97678c0a588cd4da58f4cf687ed192aec71d6f9cff45400,2024-08-08T18:55:19.180000
|
||||
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7399,0,0,d30b708a498ec985717002912d6f2ea5c7e57732418cf84055f23239b601747d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7399,0,1,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000
|
||||
CVE-2024-7408,0,0,728d92cb3e4bd7993413f2cb9d202dd3d05ca4e90a7d6c8b19000edc1b4dbe7d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7409,0,0,fe0e27b90db802bc9518336b034685fa4c799cf8d0788ebbf26f89b44bf0ec6f,2024-08-06T16:31:05.780000
|
||||
CVE-2024-7410,0,0,247c090cb12333e31f3a0efea00d18747dfe5a3d5c256e6005fe0d4e1c4d1667,2024-08-12T13:41:36.517000
|
||||
@ -259663,7 +259671,7 @@ CVE-2024-7583,0,0,b2c70b6258cd9101ea44bd72a9a7bee40fdef17b5833e45029641b6b1054cd
|
||||
CVE-2024-7584,0,0,88e393ed083253249958807c1b676f862629edacea69fa08e833cacac796d57a,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e65c,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7589,0,0,ec264cfa06d74adc18884d15f0bb08d50afb3ff7b46d5f725f942909f4b4dc96,2024-08-12T16:35:05.763000
|
||||
CVE-2024-7590,0,1,c52a6d4cf8dfd970a8fe3a13dd0d7de54ec6ad3618ea0cc5513929656d029f44,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7590,0,0,c52a6d4cf8dfd970a8fe3a13dd0d7de54ec6ad3618ea0cc5513929656d029f44,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7613,0,0,51cb787f464113bd96bef73c3a1496b2c8fdb1709edd4dc30393e6a61466a202,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7614,0,0,d7cc9c45c708dde228724405eed42fed1e1e5a328ee0ca2886de1c39b6c0c7dc,2024-08-12T13:41:36.517000
|
||||
@ -259711,9 +259719,9 @@ CVE-2024-7693,0,0,21750a5e6660c45557c197a1268fead46b4ed04e41025b7b6ec8827e0452be
|
||||
CVE-2024-7694,0,0,7eb01f663f1a6ae6fa8d343bc54dd9427e90e5a6b166e3bddc2347c03fdce95f,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7697,0,0,509c155762486c19cfc0dceb2044f7d5dc23072793fd0a597d3f1e860d0ba6cd,2024-08-12T15:35:07.293000
|
||||
CVE-2024-7700,0,0,a9f0ec07b98990fe42b46daef65c8e0b5a8fa0712121f2027b841fccbefa3e8e,2024-08-12T18:57:17.383000
|
||||
CVE-2024-7704,0,1,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7705,0,1,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b52f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7706,0,1,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7707,0,1,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7709,0,1,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7715,0,1,643ae05734832b0ffcf6472f2acff2b54708732000601789527e246cea7413e5,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7704,0,0,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7705,0,0,a3429c66c8f2f4d9e27d0928f48e140883704bb780896a841b0634c11d32b52f,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7706,0,0,1056fcaa3affff4b3f9a6b703c011337d2adc8c6bdf71227e831082308194760,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7707,0,0,08017af054a9aea4cbec493bee72603fd26524b137f48eec425b10e1c9a2c5ce,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7709,0,0,9890807a1991d90435fddd18848992ba127ee8603dc9d09cd6e46bfbc80702ff,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7715,0,0,643ae05734832b0ffcf6472f2acff2b54708732000601789527e246cea7413e5,2024-08-13T12:58:25.437000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user