mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-07-02T12:02:54.241450+00:00
This commit is contained in:
parent
5b404b945e
commit
13c4dfa243
48
CVE-2024/CVE-2024-208xx/CVE-2024-20888.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20888.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20888",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:03.133",
|
||||
"lastModified": "2024-07-02T10:15:03.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in OneUIHome prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en OneUIHome antes de SMR Jul-2024 Release 1 permite a atacantes locales iniciar actividades privilegiadas. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20889.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20889.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20889",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:03.767",
|
||||
"lastModified": "2024-07-02T10:15:03.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authentication in BLE prior to SMR Jul-2024 Release 1 allows adjacent attackers to pair with devices."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La autenticaci\u00f3n incorrecta en BLE antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes adyacentes emparejarse con dispositivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20890.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20890.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20890",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:03.947",
|
||||
"lastModified": "2024-07-02T10:15:03.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in BLE prior to SMR Jul-2024 Release 1 allows adjacent attackers to trigger abnormal behavior."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta en BLE antes de la versi\u00f3n 1 de SMR de julio de 2024 permite a los atacantes adyacentes desencadenar un comportamiento anormal."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20891.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20891.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20891",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:04.113",
|
||||
"lastModified": "2024-07-02T10:15:04.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in launchFullscreenIntent of SystemUI prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en launchFullscreenIntent de SystemUI antes de SMR Jul-2024 Release 1 permite a atacantes locales iniciar actividades privilegiadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20892.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20892.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20892",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:04.283",
|
||||
"lastModified": "2024-07-02T10:15:04.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper verification of signature in FilterProvider prior to SMR Jul-2024 Release 1 allows local attackers to execute privileged behaviors. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La verificaci\u00f3n inadecuada de la firma en FilterProvider antes de SMR Jul-2024 Release 1 permite a atacantes locales ejecutar comportamientos privilegiados. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20893.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20893.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20893",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:04.457",
|
||||
"lastModified": "2024-07-02T10:15:04.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in libmediaextractorservice.so prior to SMR Jul-2024 Release 1 allows local attackers to trigger memory corruption."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta en libmediaextractorservice.so antes de SMR Jul-2024 Release 1 permite a atacantes locales provocar da\u00f1os en la memoria."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20894.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20894.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20894",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:04.630",
|
||||
"lastModified": "2024-07-02T10:15:04.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper handling of exceptional conditions in Secure Folder prior to SMR Jul-2024 Release 1 allows physical attackers to bypass authentication under certain condition. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El manejo inadecuado de condiciones excepcionales en Secure Folder antes de SMR Jul-2024 Release 1 permite a los atacantes f\u00edsicos eludir la autenticaci\u00f3n bajo ciertas condiciones. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20895.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20895.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20895",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:04.823",
|
||||
"lastModified": "2024-07-02T10:15:04.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in Dar service prior to SMR Jul-2024 Release 1 allows local attackers to bypass restriction for calling SDP features."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en el servicio Dar antes de la versi\u00f3n 1 de SMR de julio de 2024 permite a los atacantes locales eludir la restricci\u00f3n para llamar a las funciones SDP."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20896.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20896.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20896",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:04.997",
|
||||
"lastModified": "2024-07-02T10:15:04.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of implicit intent for sensitive communication in Configuration message prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaci\u00f3n confidencial en el mensaje de configuraci\u00f3n anterior a SMR de julio de 2024, versi\u00f3n 1, permite a los atacantes locales obtener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20897.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20897.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20897",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:05.163",
|
||||
"lastModified": "2024-07-02T10:15:05.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of implicit intent for sensitive communication in FCM function in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaci\u00f3n confidencial en la funci\u00f3n FCM en el servicio IMS antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes locales obtener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20898.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20898.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20898",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:05.333",
|
||||
"lastModified": "2024-07-02T10:15:05.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of implicit intent for sensitive communication in SoftphoneClient in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaciones confidenciales en SoftphoneClient en el servicio IMS antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes locales obtener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-208xx/CVE-2024-20899.json
Normal file
48
CVE-2024/CVE-2024-208xx/CVE-2024-20899.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20899",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:05.507",
|
||||
"lastModified": "2024-07-02T10:15:05.507",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use of implicit intent for sensitive communication in RCS function in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El uso de intenci\u00f3n impl\u00edcita para comunicaci\u00f3n confidencial en la funci\u00f3n RCS en el servicio IMS antes de SMR, julio de 2024, versi\u00f3n 1, permite a atacantes locales obtener informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-209xx/CVE-2024-20900.json
Normal file
48
CVE-2024/CVE-2024-209xx/CVE-2024-20900.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20900",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:05.690",
|
||||
"lastModified": "2024-07-02T10:15:05.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authentication in MTP application prior to SMR Jul-2024 Release 1 allows local attackers to enter MTP mode without proper authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La autenticaci\u00f3n incorrecta en la aplicaci\u00f3n MTP anterior a SMR Jul-2024 Release 1 permite a atacantes locales ingresar al modo MTP sin la autenticaci\u00f3n adecuada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-209xx/CVE-2024-20901.json
Normal file
48
CVE-2024/CVE-2024-209xx/CVE-2024-20901.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-20901",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:05.860",
|
||||
"lastModified": "2024-07-02T10:15:05.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in copying data to buffer cache in libsaped prior to SMR Jul-2024 Release 1 allows local attackers to write out-of-bounds memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada inadecuada al copiar datos al cach\u00e9 del b\u00fafer en libsaped antes de SMR Jul-2024 Release 1 permite a atacantes locales escribir memoria fuera de los l\u00edmites."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34583.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34583.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34583",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:06.063",
|
||||
"lastModified": "2024-07-02T10:15:06.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in system property prior to SMR Jul-2024 Release 1 allows local attackers to get device identifier."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en la propiedad del sistema antes de SMR Jul-2024 Release 1 permite a los atacantes locales obtener el identificador del dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34584.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34584.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34584",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:06.233",
|
||||
"lastModified": "2024-07-02T10:15:06.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper privilege management in SumeNNService prior to SMR Jul-2024 Release 1 allows local attackers to start privileged service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La gesti\u00f3n inadecuada de privilegios en SumeNNService antes de SMR Jul-2024 Release 1 permite a atacantes locales iniciar un servicio privilegiado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34585.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34585.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34585",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:06.400",
|
||||
"lastModified": "2024-07-02T10:15:06.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in launchApp of SystemUI prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en la aplicaci\u00f3n de lanzamiento de SystemUI anterior a la versi\u00f3n 1 de SMR de julio de 2024 permite a atacantes locales iniciar actividades privilegiadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34586.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34586.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34586",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:06.567",
|
||||
"lastModified": "2024-07-02T10:15:06.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in KnoxCustomManagerService prior to SMR Jul-2024 Release 1 allows local attackers to configure Knox privacy policy."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en KnoxCustomManagerService antes de SMR Jul-2024 Release 1 permite a atacantes locales configurar la pol\u00edtica de privacidad de Knox."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34587.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34587.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34587",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:06.730",
|
||||
"lastModified": "2024-07-02T10:15:06.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in parsing application information from RTCP packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta al analizar la informaci\u00f3n de la aplicaci\u00f3n del paquete RTCP en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34588.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34588.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34588",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:06.903",
|
||||
"lastModified": "2024-07-02T10:15:06.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation\ud63bin parsing RTCP SR packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta al analizar el paquete RTCP SR en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34589.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34589.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34589",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:07.073",
|
||||
"lastModified": "2024-07-02T10:15:07.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in parsing RTCP RR packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta al analizar el paquete RTCP RR en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34590.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34590.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34590",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:07.250",
|
||||
"lastModified": "2024-07-02T10:15:07.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation\ud63bin parsing an item type from RTCP SDES packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta al analizar un tipo de elemento del paquete RTCP SDES en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34591.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34591.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34591",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:07.423",
|
||||
"lastModified": "2024-07-02T10:15:07.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in parsing an item data from RTCP SDES packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta al analizar los datos de un elemento del paquete RTCP SDES en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34592.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34592.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34592",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:07.600",
|
||||
"lastModified": "2024-07-02T10:15:07.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in parsing RTCP SDES packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta al analizar el paquete RTCP SDES en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos desencadenar una denegaci\u00f3n de servicio temporal. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34593.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34593.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34593",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:07.797",
|
||||
"lastModified": "2024-07-02T10:15:07.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in parsing and distributing RTCP packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada inadecuada al analizar y distribuir paquetes RTCP en librtp.so antes de SMR Jul-2024 Release 1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34594.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34594.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34594",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:07.983",
|
||||
"lastModified": "2024-07-02T10:15:07.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of sensitive information in proc file system prior to SMR Jul-2024 Release 1 allows local attackers to read kernel memory address."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La exposici\u00f3n de informaci\u00f3n confidencial en el sistema de archivos proc anterior a SMR Jul-2024 Release 1 permite a atacantes locales leer la direcci\u00f3n de memoria del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34595.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34595.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34595",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:08.150",
|
||||
"lastModified": "2024-07-02T10:15:08.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control in clickAdapterItem of SystemUI prior to SMR Jul-2024 Release 1 allows local attackers to launch privileged activities."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control de acceso inadecuado en clickAdapterItem de SystemUI anterior a SMR Jul-2024 Release 1 permite a atacantes locales iniciar actividades privilegiadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34596.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34596.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34596",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:08.320",
|
||||
"lastModified": "2024-07-02T10:15:08.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authentication in SmartThings prior to version 1.8.17 allows remote attackers to bypass the expiration date for members set by the owner."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La autenticaci\u00f3n inadecuada en SmartThings anterior a la versi\u00f3n 1.8.17 permite a atacantes remotos eludir la fecha de vencimiento de los miembros establecida por el propietario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34597.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34597.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34597",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:08.487",
|
||||
"lastModified": "2024-07-02T10:15:08.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in Samsung Health prior to version 6.27.0.113 allows local attackers to write arbitrary document files to the sandbox of Samsung Health. User interaction is required for triggering this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta en Samsung Health anterior a la versi\u00f3n 6.27.0.113 permite a atacantes locales escribir archivos de documentos arbitrarios en la sandbox de Samsung Health. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-345xx/CVE-2024-34599.json
Normal file
48
CVE-2024/CVE-2024-345xx/CVE-2024-34599.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34599",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:08.650",
|
||||
"lastModified": "2024-07-02T10:15:08.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in Tips prior to version 6.2.9.4 in Android 14 allows local attacker to send broadcast with Tips' privilege."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta en Tips anteriores a la versi\u00f3n 6.2.9.4 en Android 14 permite a un atacante local enviar transmisiones con Tips' privilegio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-346xx/CVE-2024-34600.json
Normal file
48
CVE-2024/CVE-2024-346xx/CVE-2024-34600.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34600",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:08.813",
|
||||
"lastModified": "2024-07-02T10:15:08.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper verification of intent by broadcast receiver vulnerability in Samsung Flow prior to version 4.9.13.0 allows local attackers to copy image files to external storage."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La verificaci\u00f3n inadecuada de la intenci\u00f3n mediante la vulnerabilidad del receptor de transmisi\u00f3n en Samsung Flow anterior a la versi\u00f3n 4.9.13.0 permite a atacantes locales copiar archivos de im\u00e1genes a un almacenamiento externo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-346xx/CVE-2024-34601.json
Normal file
48
CVE-2024/CVE-2024-346xx/CVE-2024-34601.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-34601",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2024-07-02T10:15:08.980",
|
||||
"lastModified": "2024-07-02T10:15:08.980",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper verification of intent by broadcast receiver vulnerability in GalaxyStore prior to version 4.5.81.0 allows local attackers to launch unexported activities of GalaxyStore."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La verificaci\u00f3n inadecuada de la intenci\u00f3n mediante la vulnerabilidad del receptor de transmisi\u00f3n en GalaxyStore antes de la versi\u00f3n 4.5.81.0 permite a atacantes locales lanzar actividades no exportadas de GalaxyStore."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07",
|
||||
"source": "mobile.security@samsung.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2024/CVE-2024-42xx/CVE-2024-4268.json
Normal file
88
CVE-2024/CVE-2024-42xx/CVE-2024-4268.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2024-4268",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-02T11:15:10.250",
|
||||
"lastModified": "2024-07-02T11:15:10.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ultimate Blocks \u2013 WordPress Blocks Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's blocks in all versions up to, and including, 3.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/webber-naut/0a8a4f810da286392a43c4614d31712e",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/advanced-heading/block.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/how-to/block.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/image-slider/block.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/styled-box/block.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/testimonial/block.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/extensions/custom-css/class-custom-css.php?rev=3102541#L173",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3075315/ultimate-blocks",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3108401/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/ultimate-blocks/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dropbox.com/scl/fi/zh7t1qsvxkxk2dfhwd7nn/Ultimate-Blocks-Stored-XSS_POC_4.20.24.mov?rlkey=ws16dcu7f6mjd3h9emsqev7jm&e=2&st=fdr7q9h7&dl=0",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/00b60b53-77bf-4640-bf2b-84e011014623?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018read_more_text\u2019 parameter in all versions up to, and including, 3.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'read_more_text' en todas las versiones hasta, e incluido, 3.5.5 debido a una sanitizaci\u00f3n insuficiente de los insumos y al escape de los productos. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
64
CVE-2024/CVE-2024-60xx/CVE-2024-6011.json
Normal file
64
CVE-2024/CVE-2024-60xx/CVE-2024-6011.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-6011",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-02T10:15:09.170",
|
||||
"lastModified": "2024-07-02T10:15:09.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Cost Calculator Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018textarea.description\u2019 parameter in all versions up to, and including, 3.2.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Cost Calculator Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'textarea.description' en todas las versiones hasta la 3.2.12 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de administrador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1SFQXlRUQw7THm_Vay_pFH3pIX1cjH4AY/view?usp=sharing",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cost-calculator-builder/trunk/templates/frontend/fields/cost-text.php#L15",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cost-calculator-builder/trunk/templates/frontend/fields/cost-text.php#L26",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3108606/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03ad3677-1b02-4f22-af50-e88b2ec83f54?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-60xx/CVE-2024-6012.json
Normal file
56
CVE-2024/CVE-2024-60xx/CVE-2024-6012.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6012",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-02T10:15:09.367",
|
||||
"lastModified": "2024-07-02T10:15:09.367",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Cost Calculator Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'embed-create-page' and 'embed-insert-pages' functions in all versions up to, and including, 3.2.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary posts and append arbitrary content to existing posts."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Cost Calculator Builder para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones 'embed-create-page' e 'embed-insert-pages' en todas las versiones hasta la 3.2.12 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen publicaciones arbitrarias y agreguen contenido arbitrario a publicaciones existentes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cost-calculator-builder/trunk/frontend/dist/admin.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3108606/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd7da039-f6b8-46b7-a43a-145e9f8844c3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-60xx/CVE-2024-6088.json
Normal file
56
CVE-2024/CVE-2024-60xx/CVE-2024-6088.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-6088",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-02T11:15:10.463",
|
||||
"lastModified": "2024-07-02T11:15:10.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized user registration due to a missing capability check on the 'register' function in all versions up to, and including, 4.2.6.8.1. This makes it possible for unauthenticated attackers to bypass disabled user registration to create a new account with the default role."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/class-lp-forms-handler.php#L235",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/jwt/includes/class-jwt-public.php#L127",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3109339/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04e0ddff-16af-4c85-b5b0-cf767684ee08?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
52
CVE-2024/CVE-2024-60xx/CVE-2024-6099.json
Normal file
52
CVE-2024/CVE-2024-60xx/CVE-2024-6099.json
Normal file
@ -0,0 +1,52 @@
|
||||
{
|
||||
"id": "CVE-2024-6099",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-02T11:15:10.650",
|
||||
"lastModified": "2024-07-02T11:15:10.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to unauthenticated bypass to user registration in versions up to, and including, 4.2.6.8.1. This is due to missing checks in the 'check_validate_fields' function in the checkout. This makes it possible for unauthenticated attackers to register as the default role on the site, even if registration is disabled."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/class-lp-checkout.php#L124",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3109339/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee714c7-4c9b-4627-9ba9-f83aeca6a0a5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-62xx/CVE-2024-6264.json
Normal file
60
CVE-2024/CVE-2024-62xx/CVE-2024-6264.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-6264",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-02T11:15:10.840",
|
||||
"lastModified": "2024-07-02T11:15:10.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Post Meta Data Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018$meta_key\u2019 parameter in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_post_metadata_html.php#L23",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_term_metadata_html.php#L32",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/post-meta-data-manager/trunk/includes/admin/html/pmdm_wp_display_user_metadata_html.php#L31",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3109558/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9dd6828b-6235-4284-bce6-be23b79ac70e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-64xx/CVE-2024-6438.json
Normal file
137
CVE-2024/CVE-2024-64xx/CVE-2024-6438.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-6438",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-02T11:15:11.027",
|
||||
"lastModified": "2024-07-02T11:15:11.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Hitout Carsale 1.0 and classified as critical. This vulnerability affects unknown code of the file OrderController.java. The manipulation of the argument orderBy leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-270166 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Hitout/carsale/issues/23",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.270166",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.270166",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.366239",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-64xx/CVE-2024-6439.json
Normal file
137
CVE-2024/CVE-2024-64xx/CVE-2024-6439.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-6439",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-02T11:15:11.523",
|
||||
"lastModified": "2024-07-02T11:15:11.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Home Owners Collection Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Users.php?f=save. The manipulation of the argument img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270167."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GAO-UNO/cve/blob/main/upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.270167",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.270167",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.366753",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-64xx/CVE-2024-6440.json
Normal file
137
CVE-2024/CVE-2024-64xx/CVE-2024-6440.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-6440",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-02T11:15:11.783",
|
||||
"lastModified": "2024-07-02T11:15:11.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Home Owners Collection Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /classes/Master.php?f=delete_category. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270168."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/reverseD0G/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.270168",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.270168",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.366988",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
61
README.md
61
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-02T10:03:14.646623+00:00
|
||||
2024-07-02T12:02:54.241450+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-02T09:15:19.780000+00:00
|
||||
2024-07-02T11:15:11.783000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,44 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
255685
|
||||
255726
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `29`
|
||||
Recently added CVEs: `41`
|
||||
|
||||
- [CVE-2023-41921](CVE-2023/CVE-2023-419xx/CVE-2023-41921.json) (`2024-07-02T08:15:04.160`)
|
||||
- [CVE-2023-41922](CVE-2023/CVE-2023-419xx/CVE-2023-41922.json) (`2024-07-02T08:15:04.373`)
|
||||
- [CVE-2023-41923](CVE-2023/CVE-2023-419xx/CVE-2023-41923.json) (`2024-07-02T08:15:04.573`)
|
||||
- [CVE-2023-41926](CVE-2023/CVE-2023-419xx/CVE-2023-41926.json) (`2024-07-02T08:15:04.773`)
|
||||
- [CVE-2023-41927](CVE-2023/CVE-2023-419xx/CVE-2023-41927.json) (`2024-07-02T08:15:04.973`)
|
||||
- [CVE-2023-41928](CVE-2023/CVE-2023-419xx/CVE-2023-41928.json) (`2024-07-02T08:15:05.153`)
|
||||
- [CVE-2024-31071](CVE-2024/CVE-2024-310xx/CVE-2024-31071.json) (`2024-07-02T09:15:18.087`)
|
||||
- [CVE-2024-3513](CVE-2024/CVE-2024-35xx/CVE-2024-3513.json) (`2024-07-02T08:15:06.600`)
|
||||
- [CVE-2024-36243](CVE-2024/CVE-2024-362xx/CVE-2024-36243.json) (`2024-07-02T09:15:18.323`)
|
||||
- [CVE-2024-36260](CVE-2024/CVE-2024-362xx/CVE-2024-36260.json) (`2024-07-02T09:15:18.557`)
|
||||
- [CVE-2024-36278](CVE-2024/CVE-2024-362xx/CVE-2024-36278.json) (`2024-07-02T09:15:18.757`)
|
||||
- [CVE-2024-37030](CVE-2024/CVE-2024-370xx/CVE-2024-37030.json) (`2024-07-02T09:15:18.963`)
|
||||
- [CVE-2024-37077](CVE-2024/CVE-2024-370xx/CVE-2024-37077.json) (`2024-07-02T09:15:19.157`)
|
||||
- [CVE-2024-37126](CVE-2024/CVE-2024-371xx/CVE-2024-37126.json) (`2024-07-02T08:15:05.347`)
|
||||
- [CVE-2024-37132](CVE-2024/CVE-2024-371xx/CVE-2024-37132.json) (`2024-07-02T08:15:05.553`)
|
||||
- [CVE-2024-37133](CVE-2024/CVE-2024-371xx/CVE-2024-37133.json) (`2024-07-02T08:15:05.773`)
|
||||
- [CVE-2024-37134](CVE-2024/CVE-2024-371xx/CVE-2024-37134.json) (`2024-07-02T08:15:05.980`)
|
||||
- [CVE-2024-37185](CVE-2024/CVE-2024-371xx/CVE-2024-37185.json) (`2024-07-02T09:15:19.353`)
|
||||
- [CVE-2024-37479](CVE-2024/CVE-2024-374xx/CVE-2024-37479.json) (`2024-07-02T08:15:06.190`)
|
||||
- [CVE-2024-38857](CVE-2024/CVE-2024-388xx/CVE-2024-38857.json) (`2024-07-02T08:15:06.387`)
|
||||
- [CVE-2024-4836](CVE-2024/CVE-2024-48xx/CVE-2024-4836.json) (`2024-07-02T09:15:19.553`)
|
||||
- [CVE-2024-5260](CVE-2024/CVE-2024-52xx/CVE-2024-5260.json) (`2024-07-02T09:15:19.780`)
|
||||
- [CVE-2024-5504](CVE-2024/CVE-2024-55xx/CVE-2024-5504.json) (`2024-07-02T08:15:06.793`)
|
||||
- [CVE-2024-5544](CVE-2024/CVE-2024-55xx/CVE-2024-5544.json) (`2024-07-02T08:15:06.997`)
|
||||
- [CVE-2024-5545](CVE-2024/CVE-2024-55xx/CVE-2024-5545.json) (`2024-07-02T08:15:07.190`)
|
||||
- [CVE-2024-34585](CVE-2024/CVE-2024-345xx/CVE-2024-34585.json) (`2024-07-02T10:15:06.400`)
|
||||
- [CVE-2024-34586](CVE-2024/CVE-2024-345xx/CVE-2024-34586.json) (`2024-07-02T10:15:06.567`)
|
||||
- [CVE-2024-34587](CVE-2024/CVE-2024-345xx/CVE-2024-34587.json) (`2024-07-02T10:15:06.730`)
|
||||
- [CVE-2024-34588](CVE-2024/CVE-2024-345xx/CVE-2024-34588.json) (`2024-07-02T10:15:06.903`)
|
||||
- [CVE-2024-34589](CVE-2024/CVE-2024-345xx/CVE-2024-34589.json) (`2024-07-02T10:15:07.073`)
|
||||
- [CVE-2024-34590](CVE-2024/CVE-2024-345xx/CVE-2024-34590.json) (`2024-07-02T10:15:07.250`)
|
||||
- [CVE-2024-34591](CVE-2024/CVE-2024-345xx/CVE-2024-34591.json) (`2024-07-02T10:15:07.423`)
|
||||
- [CVE-2024-34592](CVE-2024/CVE-2024-345xx/CVE-2024-34592.json) (`2024-07-02T10:15:07.600`)
|
||||
- [CVE-2024-34593](CVE-2024/CVE-2024-345xx/CVE-2024-34593.json) (`2024-07-02T10:15:07.797`)
|
||||
- [CVE-2024-34594](CVE-2024/CVE-2024-345xx/CVE-2024-34594.json) (`2024-07-02T10:15:07.983`)
|
||||
- [CVE-2024-34595](CVE-2024/CVE-2024-345xx/CVE-2024-34595.json) (`2024-07-02T10:15:08.150`)
|
||||
- [CVE-2024-34596](CVE-2024/CVE-2024-345xx/CVE-2024-34596.json) (`2024-07-02T10:15:08.320`)
|
||||
- [CVE-2024-34597](CVE-2024/CVE-2024-345xx/CVE-2024-34597.json) (`2024-07-02T10:15:08.487`)
|
||||
- [CVE-2024-34599](CVE-2024/CVE-2024-345xx/CVE-2024-34599.json) (`2024-07-02T10:15:08.650`)
|
||||
- [CVE-2024-34600](CVE-2024/CVE-2024-346xx/CVE-2024-34600.json) (`2024-07-02T10:15:08.813`)
|
||||
- [CVE-2024-34601](CVE-2024/CVE-2024-346xx/CVE-2024-34601.json) (`2024-07-02T10:15:08.980`)
|
||||
- [CVE-2024-4268](CVE-2024/CVE-2024-42xx/CVE-2024-4268.json) (`2024-07-02T11:15:10.250`)
|
||||
- [CVE-2024-6011](CVE-2024/CVE-2024-60xx/CVE-2024-6011.json) (`2024-07-02T10:15:09.170`)
|
||||
- [CVE-2024-6012](CVE-2024/CVE-2024-60xx/CVE-2024-6012.json) (`2024-07-02T10:15:09.367`)
|
||||
- [CVE-2024-6088](CVE-2024/CVE-2024-60xx/CVE-2024-6088.json) (`2024-07-02T11:15:10.463`)
|
||||
- [CVE-2024-6099](CVE-2024/CVE-2024-60xx/CVE-2024-6099.json) (`2024-07-02T11:15:10.650`)
|
||||
- [CVE-2024-6264](CVE-2024/CVE-2024-62xx/CVE-2024-6264.json) (`2024-07-02T11:15:10.840`)
|
||||
- [CVE-2024-6438](CVE-2024/CVE-2024-64xx/CVE-2024-6438.json) (`2024-07-02T11:15:11.027`)
|
||||
- [CVE-2024-6439](CVE-2024/CVE-2024-64xx/CVE-2024-6439.json) (`2024-07-02T11:15:11.523`)
|
||||
- [CVE-2024-6440](CVE-2024/CVE-2024-64xx/CVE-2024-6440.json) (`2024-07-02T11:15:11.783`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-5260](CVE-2024/CVE-2024-52xx/CVE-2024-5260.json) (`2024-07-02T09:15:19.780`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
99
_state.csv
99
_state.csv
@ -231270,17 +231270,17 @@ CVE-2023-41911,0,0,c370f1652ab4a7704bdb8c1c18b508b07e9446ea3a6134c45133ba3207c3b
|
||||
CVE-2023-41913,0,0,ac6a5dec8a2ef981599760c1bd584c0a3e1984d30935032e705f83162150cb05,2024-06-11T04:15:10.863000
|
||||
CVE-2023-41914,0,0,27c5c2c3c84cd968ddce119075b7bda7c87709505c9fb5104442489dec8eacba,2023-11-09T22:11:29.870000
|
||||
CVE-2023-41915,0,0,6f98a3967a35a3981301df9522094adc983487e955c89af8c2ce098770114116,2024-01-09T03:14:55.743000
|
||||
CVE-2023-41917,1,1,75a00a950661871ca70b2157c2431e4a36beb7d5658bc033c4d35ca5acc0374b,2024-07-02T08:15:03.247000
|
||||
CVE-2023-41918,1,1,c2383288126007043fec82b0f8437af2f865f9316a92100e9f22f6c01da45eb2,2024-07-02T08:15:03.490000
|
||||
CVE-2023-41919,1,1,102c9892e1d928393c0c51094da3fc1ce7fd8cb1356c612a65a5a28b2dbcdcae,2024-07-02T08:15:03.680000
|
||||
CVE-2023-41917,0,0,75a00a950661871ca70b2157c2431e4a36beb7d5658bc033c4d35ca5acc0374b,2024-07-02T08:15:03.247000
|
||||
CVE-2023-41918,0,0,c2383288126007043fec82b0f8437af2f865f9316a92100e9f22f6c01da45eb2,2024-07-02T08:15:03.490000
|
||||
CVE-2023-41919,0,0,102c9892e1d928393c0c51094da3fc1ce7fd8cb1356c612a65a5a28b2dbcdcae,2024-07-02T08:15:03.680000
|
||||
CVE-2023-4192,0,0,8f2f20cfbddfb9517a03eb2b1684aa1e1baae715b28b8e6aa49f25d0f9a3982a,2024-05-17T02:31:25.590000
|
||||
CVE-2023-41920,1,1,075d1d09048aa471bd08834b622c2fcb6cd3ee0ec777784a6282c72b9f7bfbe2,2024-07-02T08:15:03.950000
|
||||
CVE-2023-41921,1,1,2b6fb6f1125af508c6eb1057eb5ed8d6a160a0dca66da60ef4ac4df7b849c3e6,2024-07-02T08:15:04.160000
|
||||
CVE-2023-41922,1,1,df72d6595e4166db6f04fc4b4dba388ecee2eacd16fea87a09b63f399a749555,2024-07-02T08:15:04.373000
|
||||
CVE-2023-41923,1,1,2a2a780eb1387d1fea6de9e4c05f43e5489ab154290d21e3e7957ebfbfe36b25,2024-07-02T08:15:04.573000
|
||||
CVE-2023-41926,1,1,990d62fee0a2918e883ac548120cdf2dc153607ceb9bc0b90e4e7eea004b6ad0,2024-07-02T08:15:04.773000
|
||||
CVE-2023-41927,1,1,e2e3b8e3066ade08cdb58df489a199f4760a7584cffb544d82b3336b25d25ba9,2024-07-02T08:15:04.973000
|
||||
CVE-2023-41928,1,1,07135084ba8ee45eb74cf9d47b84a0c92b0d30593fcfb0572a7850e3260ecd08,2024-07-02T08:15:05.153000
|
||||
CVE-2023-41920,0,0,075d1d09048aa471bd08834b622c2fcb6cd3ee0ec777784a6282c72b9f7bfbe2,2024-07-02T08:15:03.950000
|
||||
CVE-2023-41921,0,0,2b6fb6f1125af508c6eb1057eb5ed8d6a160a0dca66da60ef4ac4df7b849c3e6,2024-07-02T08:15:04.160000
|
||||
CVE-2023-41922,0,0,df72d6595e4166db6f04fc4b4dba388ecee2eacd16fea87a09b63f399a749555,2024-07-02T08:15:04.373000
|
||||
CVE-2023-41923,0,0,2a2a780eb1387d1fea6de9e4c05f43e5489ab154290d21e3e7957ebfbfe36b25,2024-07-02T08:15:04.573000
|
||||
CVE-2023-41926,0,0,990d62fee0a2918e883ac548120cdf2dc153607ceb9bc0b90e4e7eea004b6ad0,2024-07-02T08:15:04.773000
|
||||
CVE-2023-41927,0,0,e2e3b8e3066ade08cdb58df489a199f4760a7584cffb544d82b3336b25d25ba9,2024-07-02T08:15:04.973000
|
||||
CVE-2023-41928,0,0,07135084ba8ee45eb74cf9d47b84a0c92b0d30593fcfb0572a7850e3260ecd08,2024-07-02T08:15:05.153000
|
||||
CVE-2023-41929,0,0,00c6c5e803c495fa4361734a029180d7674e5e606a3dff28993b4211a0f69d2e,2023-09-21T15:27:38.020000
|
||||
CVE-2023-4193,0,0,c5d71b74400789b0f2d3e7c374e733f3fa1a7a5763d02dbf603f8b5c5d597c80,2024-05-17T02:31:25.693000
|
||||
CVE-2023-41930,0,0,e9174799687aa009ad856ef47d0f65b7aabb316fab23cc536508868c821cffad,2023-09-11T19:23:34.093000
|
||||
@ -242844,7 +242844,21 @@ CVE-2024-20884,0,0,4ef132ff87bd8a9c9523317a196215cc86b34be55ad765a26c5bddbd57b0b
|
||||
CVE-2024-20885,0,0,3ee08db8f0e4a20dd5c2f29a1d78d8af0c5e7aec5b083ecf2f8fb83cab587a25,2024-06-04T16:57:41.053000
|
||||
CVE-2024-20886,0,0,0a1a939d07ac6fea7c6a5a525a557520367bda61cb7993f5fa76b2974a833911,2024-06-04T16:57:41.053000
|
||||
CVE-2024-20887,0,0,f12783d6926e745ed51bbf0afd7d9fbe1365b2ac40ae720af63c4e36b7a08f85,2024-06-04T16:57:41.053000
|
||||
CVE-2024-20888,1,1,45c1f8b3a0e2b5241c3268975c4351f1394070b455f5e0f6b13d6b8645d831fb,2024-07-02T10:15:03.133000
|
||||
CVE-2024-20889,1,1,ed6278b6d34b749b8a383fe5843487401c0d19160684893d161d4c60f66bbce6,2024-07-02T10:15:03.767000
|
||||
CVE-2024-2089,0,0,96f25c0b661864f2faa4ebe0c7639379fe17dd1bd7ce5242853acf390f1ca579,2024-05-30T13:15:41.297000
|
||||
CVE-2024-20890,1,1,27a1ddbb317ddaf9a2ec7fddd2ba8cc160ff101c75274795a0c44cb778e82b98,2024-07-02T10:15:03.947000
|
||||
CVE-2024-20891,1,1,0c71353808b171ca7976b4bf5b01d4a3900c3813d45d6cbc33ff74aaf7c42f2f,2024-07-02T10:15:04.113000
|
||||
CVE-2024-20892,1,1,b43c9cb337f8047759bbc30e192b92aa77db601ff413d7d5e3498baa761b8345,2024-07-02T10:15:04.283000
|
||||
CVE-2024-20893,1,1,35b0ee37f14912db3541ef4816e5f0b90e39896c2968a25a847ca66c386c91ac,2024-07-02T10:15:04.457000
|
||||
CVE-2024-20894,1,1,a449d75e6a5cb9d45d141565e6addc39da688ff144b4e17ec9d91b342b26691c,2024-07-02T10:15:04.630000
|
||||
CVE-2024-20895,1,1,e896c77c7fb7e30f4debed4c9650d6efe854457c9d05e18de9839890d813aa9b,2024-07-02T10:15:04.823000
|
||||
CVE-2024-20896,1,1,3be787a3d4f825765b9b332c06f8272833b40ee9990c33147cc1f76a0ea5abc9,2024-07-02T10:15:04.997000
|
||||
CVE-2024-20897,1,1,bc4d0eb3e4d7121aee185a47bc0471fef8ad78eb19d653336d42730f3e8027fb,2024-07-02T10:15:05.163000
|
||||
CVE-2024-20898,1,1,0695228f5a7e9f3089af1576d31e2ae89e8585c11b6c4440535a9660ef515af5,2024-07-02T10:15:05.333000
|
||||
CVE-2024-20899,1,1,dc90ddbdee83892f06b5c2e0c5935b164cc8904af6cf2a272c70ef07833f81a7,2024-07-02T10:15:05.507000
|
||||
CVE-2024-20900,1,1,cd4484a6fb5c72444da5c96846e717694070287d1cde764eb8bf773cb4e01248,2024-07-02T10:15:05.690000
|
||||
CVE-2024-20901,1,1,c92227c1258a933e67d6496ad61775ff1f0f4ec3579bcd30b78bfae2710daff0,2024-07-02T10:15:05.860000
|
||||
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
|
||||
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
|
||||
CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000
|
||||
@ -249560,7 +249574,7 @@ CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaa
|
||||
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b3114,2024-05-02T18:00:37.360000
|
||||
CVE-2024-31071,1,1,e508ec037a5df9db7c30a1bdca4ed045779c5e06d9ac516721922015ddce8e64,2024-07-02T09:15:18.087000
|
||||
CVE-2024-31071,0,0,e508ec037a5df9db7c30a1bdca4ed045779c5e06d9ac516721922015ddce8e64,2024-07-02T09:15:18.087000
|
||||
CVE-2024-31076,0,0,94786ff014a244f3e9ba319b83d9624bbc33bea5fc0f1ef6152f98a455637992,2024-06-27T13:15:58.480000
|
||||
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
|
||||
CVE-2024-31078,0,0,12059b4643db1f23db61cb234ce054c5e189af8320b848468c77237912b37117,2024-05-07T13:39:32.710000
|
||||
@ -251774,8 +251788,26 @@ CVE-2024-3458,0,0,95e4aaffa4279b78a2b992b7ca84a76b9c0fc4040617906bdb6d2a26fd53d8
|
||||
CVE-2024-34580,0,0,23e9c9e6196de214627ce70d2ecaafc9ed253a53de7670f13fae70cba93aceb8,2024-06-26T16:15:11.437000
|
||||
CVE-2024-34581,0,0,101eae71972fe0e0b512a60a9bdc31b241f90f9c819f01ada4065ee44845d826,2024-06-26T12:44:29.693000
|
||||
CVE-2024-34582,0,0,4844e743472b7231bfa5452c2e20c2f3ad08007eb97cbefe2d71005b993ee4bd,2024-05-16T15:44:44.683000
|
||||
CVE-2024-34583,1,1,c9b0fa150b255247436c9e4f38cc316d9ebf472b0c333de03039d0acdac8fdf5,2024-07-02T10:15:06.063000
|
||||
CVE-2024-34584,1,1,043b24793a1166d66ede7d1ec8649f5c94576efe509fb22ce70875b34ff4e205,2024-07-02T10:15:06.233000
|
||||
CVE-2024-34585,1,1,3020594996fa316cf64b3aafcfdfb5b1c4ea1db9312bb54676bacdbf8830dd4a,2024-07-02T10:15:06.400000
|
||||
CVE-2024-34586,1,1,2084a64ba86259544f2038176f7633cc93b13df525c481aa56fcbb775eb997ca,2024-07-02T10:15:06.567000
|
||||
CVE-2024-34587,1,1,5ceaadd9b4cf99a8670467ce92c24c84b572f5bedccea0f698bb2f86a4fc6cbc,2024-07-02T10:15:06.730000
|
||||
CVE-2024-34588,1,1,992db2b12d768b2ffc706cdc857ea538eef1a2f661380218062573a4fec8ae6d,2024-07-02T10:15:06.903000
|
||||
CVE-2024-34589,1,1,8decb9ad837822510548b2f81d6124ad82244caeefd6d313954bc659d2f3399d,2024-07-02T10:15:07.073000
|
||||
CVE-2024-3459,0,0,03bb87c9d0cbd21911c231bc7c0f724e986c00982489be8ee05c29896de95c1d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-34590,1,1,e8daccdb40f91aaa80db9fa30fb4be69ec6210c4484a59fb5f652acbc07f7d68,2024-07-02T10:15:07.250000
|
||||
CVE-2024-34591,1,1,2e723be38c2c462a5cb070f2af2da577d3c1caef19d3863428eb3d86ea48ea70,2024-07-02T10:15:07.423000
|
||||
CVE-2024-34592,1,1,a6b00afa7a50f450d8a82d2ce7f957440346b041e27346b446dd5273f6ce2bac,2024-07-02T10:15:07.600000
|
||||
CVE-2024-34593,1,1,a5c3c815d68874bf1061f4028721f70648312a185059ac704f3352a8e259934b,2024-07-02T10:15:07.797000
|
||||
CVE-2024-34594,1,1,ba424cea1ddda2c7af0782b2dccdba7a792b5eba37049a36a76d8b08d775fbe2,2024-07-02T10:15:07.983000
|
||||
CVE-2024-34595,1,1,6cf1a21b3e08d91c3942bdbeceafbd2393025f32467f6b22316ccc963c3a91f9,2024-07-02T10:15:08.150000
|
||||
CVE-2024-34596,1,1,4d9b2c519ba399222d662a5c79a88cb904d44d2caa284424a22536e4f3325bc6,2024-07-02T10:15:08.320000
|
||||
CVE-2024-34597,1,1,09be5c4d16309813fabbf9fee5775e669b5019a74a7f7a2c296df0f2475b7487,2024-07-02T10:15:08.487000
|
||||
CVE-2024-34599,1,1,f13a71e682c1c8e03d51db216db8e4ffe6fef5145ae54e381379a88519af7f37,2024-07-02T10:15:08.650000
|
||||
CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000
|
||||
CVE-2024-34600,1,1,c468e0b0504fdf1ec3f223c12eef3819b500c501fed9ce0da4d2915d73d4af02,2024-07-02T10:15:08.813000
|
||||
CVE-2024-34601,1,1,df2fc2fb166c82f4fa86c2ca2f49573b3535887f093f2534f8668d2c3b9baf23,2024-07-02T10:15:08.980000
|
||||
CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000
|
||||
CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000
|
||||
@ -251995,7 +252027,7 @@ CVE-2024-35110,0,0,07f2b4eefabbfedf17e2731cca374c4a367989ecaeb945f63f5af7217d209
|
||||
CVE-2024-35116,0,0,91a0109df1140cd09bc7ea5c08abbe7ae8c48f4ffa4198fd96c193164e9e1703,2024-07-01T12:37:24.220000
|
||||
CVE-2024-35119,0,0,f8609143b8a4a7a1f03935eb12f8fbcc6d72c76259e212fc26bb3132c6f940ad,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
|
||||
CVE-2024-3513,1,1,640a3e59b1b97961f81de9b9f2c663b54b3247deeefb18adb7389cd96298bf43,2024-07-02T08:15:06.600000
|
||||
CVE-2024-3513,0,0,640a3e59b1b97961f81de9b9f2c663b54b3247deeefb18adb7389cd96298bf43,2024-07-02T08:15:06.600000
|
||||
CVE-2024-35137,0,0,cfa826c0337668659733864f64c3760d46d614c0438a7a4db6c05f7406c4eeb5,2024-07-01T12:37:24.220000
|
||||
CVE-2024-35139,0,0,703f975506f06b114406c8e7efad895fe907f2ada95557d6f69e2711957e3dfc,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
|
||||
@ -252833,14 +252865,14 @@ CVE-2024-36238,0,0,ffa224703ea5d14f14feaac4631f2136ef89cf6e78b5508e4db40614bf827
|
||||
CVE-2024-36239,0,0,f9d1b173110a422fa1162cdcd582db2bdb2808a4f7edf9f4c130505223b94463,2024-06-17T20:20:18.633000
|
||||
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36241,0,0,ec13df73bdae0daae51b14875ab9159491333aae8ecd7b32e3b3849163ae270e,2024-05-28T12:39:28.377000
|
||||
CVE-2024-36243,1,1,37a91d37a376a2deee96f1e120ceacb2e6a276e34999224dcf44f363f4c7c6f3,2024-07-02T09:15:18.323000
|
||||
CVE-2024-36243,0,0,37a91d37a376a2deee96f1e120ceacb2e6a276e34999224dcf44f363f4c7c6f3,2024-07-02T09:15:18.323000
|
||||
CVE-2024-36244,0,0,038656f03db804566ce68ac1f46ed948e8ae898a69338704230a1cd93f8be7c7,2024-06-21T11:22:01.687000
|
||||
CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468e33,2024-05-31T13:01:46.727000
|
||||
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36252,0,0,15f198f9d24050d47b4b65c7729189d555592843e3d7c2313de650ff4411e911,2024-06-20T12:44:01.637000
|
||||
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
|
||||
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
|
||||
CVE-2024-36260,1,1,a8e1fbb977848568732e0ef899dc45ecf79892f492ffa6f5846647a005256d54,2024-07-02T09:15:18.557000
|
||||
CVE-2024-36260,0,0,a8e1fbb977848568732e0ef899dc45ecf79892f492ffa6f5846647a005256d54,2024-07-02T09:15:18.557000
|
||||
CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36264,0,0,3852f3a1f0d8a2d4f62090f3b6254d16b37a584c2a4799814e318aea1f24146e,2024-06-13T18:36:09.010000
|
||||
CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000
|
||||
@ -252849,7 +252881,7 @@ CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3
|
||||
CVE-2024-3627,0,0,f5c20db254155e1980cc0c244f583a6a1536d3adf64c11755694648c0d5e1776,2024-06-20T12:43:25.663000
|
||||
CVE-2024-36270,0,0,291f6e458fbc676a304ed9970e06ef7e4860b79a198510d6c392b901a78fa76c,2024-06-21T11:22:01.687000
|
||||
CVE-2024-36277,0,0,20d47326e280adb94d9059aa48d208d3f478f327ce890b8688aef81aa91e0089,2024-06-17T12:42:04.623000
|
||||
CVE-2024-36278,1,1,f4c881e5fbba81c939793cab0776cbb302a9a6feb037cac1115c27275100d680,2024-07-02T09:15:18.757000
|
||||
CVE-2024-36278,0,0,f4c881e5fbba81c939793cab0776cbb302a9a6feb037cac1115c27275100d680,2024-07-02T09:15:18.757000
|
||||
CVE-2024-36279,0,0,3325b8af913fac0d163d5be9a8802e9f76dc63912c8cffea0ae3040270976e9f,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
|
||||
CVE-2024-36281,0,0,479133ce06ac02edc62536071e8e7fed1efaa94d8e73a60aac6af353af480add,2024-06-21T11:22:01.687000
|
||||
@ -253228,7 +253260,7 @@ CVE-2024-37022,0,0,2e2eefd3e0454318fd9ea45982b5aef37a4139c6c043004fbe53dd71e5f37
|
||||
CVE-2024-37026,0,0,d7cbfb6603c7d2d6e0f58c3d85c47d158b70aead88a80ecee6e5f9c900ea1461,2024-06-24T19:26:47.037000
|
||||
CVE-2024-37029,0,0,534392cbe0894215b76b20e3854d46e7cdecbd3521fcbf5857ca9ed3ca750eae,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3703,0,0,46d289814974ee20b6160fe56cc828277066d832a1c60ccf5d9c1a62d06c47e2,2024-05-03T12:48:41.067000
|
||||
CVE-2024-37030,1,1,db322276ba208a1920e2f90124a43051fd164c092c9d438f07f46d0d88e2be6a,2024-07-02T09:15:18.963000
|
||||
CVE-2024-37030,0,0,db322276ba208a1920e2f90124a43051fd164c092c9d438f07f46d0d88e2be6a,2024-07-02T09:15:18.963000
|
||||
CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3800,2024-06-03T14:46:24.250000
|
||||
CVE-2024-37032,0,0,2fd16d835b1a2cd56c97d409a29d6a495e6793f4206084713a4efe57de2f2107,2024-05-31T13:01:46.727000
|
||||
CVE-2024-37036,0,0,951ff7c7a3ebadcdaa3a95e902df49913785292707f4e965429924c1452bc517,2024-06-13T18:36:09.010000
|
||||
@ -253255,7 +253287,7 @@ CVE-2024-37063,0,0,89f5547c55b84eeb002f751591163c2bac39f3ef815bb40a0ef85dcc0021b
|
||||
CVE-2024-37064,0,0,543b04bd3e0b4f44701f2ff590d34ccaab537b577720c450f51bc177073db1e8,2024-06-04T16:57:41.053000
|
||||
CVE-2024-37065,0,0,77b183f2030b7bd581e452e09e55b74dee78fc06c1bd0201bb553e7d45698d31,2024-06-04T16:57:41.053000
|
||||
CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c160d,2024-04-15T13:15:51.577000
|
||||
CVE-2024-37077,1,1,611c974db3c32f6b7c8cd2e851caa2c0502706f0f0c412a1bfcde706a7f78438,2024-07-02T09:15:19.157000
|
||||
CVE-2024-37077,0,0,611c974db3c32f6b7c8cd2e851caa2c0502706f0f0c412a1bfcde706a7f78438,2024-07-02T09:15:19.157000
|
||||
CVE-2024-37078,0,0,07ffa320065553977b456d5493a365b0e5630945bde4b6a809eb6cb991c42975,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985b9a,2024-06-20T12:44:01.637000
|
||||
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
|
||||
@ -253274,12 +253306,12 @@ CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f
|
||||
CVE-2024-37111,0,0,2257ad3ccadca4c80305b1109feafea1f23c81cf8da2e182d0e85f183c413dd1,2024-06-28T13:15:02.750000
|
||||
CVE-2024-37118,0,0,0ad56c9c4204404fc625d311f20c0b9c243a12023f3ae9f31f4a46be59aef39f,2024-06-24T18:55:07.707000
|
||||
CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000
|
||||
CVE-2024-37126,1,1,ce51f995abf5460eae453a69dc8da4bfde291544917b9c776424ecc387dec853,2024-07-02T08:15:05.347000
|
||||
CVE-2024-37126,0,0,ce51f995abf5460eae453a69dc8da4bfde291544917b9c776424ecc387dec853,2024-07-02T08:15:05.347000
|
||||
CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000
|
||||
CVE-2024-37131,0,0,9d8793df78437fefb0a970a364558bdad589a0c15e132432497cef4b2151f46f,2024-06-13T18:35:19.777000
|
||||
CVE-2024-37132,1,1,935e7996dc7dcc3b4137b046b34573fde3e9bdcb3a2b2860f6737130bb395397,2024-07-02T08:15:05.553000
|
||||
CVE-2024-37133,1,1,e71cf9daca5f2058c6d5517475198f34a66ce3bff23fc5f57bce15eb1b674c7c,2024-07-02T08:15:05.773000
|
||||
CVE-2024-37134,1,1,849038f1e08cf94ea2600f6df2008b82b389d2a56ed30e7a038e63f8072ad4e5,2024-07-02T08:15:05.980000
|
||||
CVE-2024-37132,0,0,935e7996dc7dcc3b4137b046b34573fde3e9bdcb3a2b2860f6737130bb395397,2024-07-02T08:15:05.553000
|
||||
CVE-2024-37133,0,0,e71cf9daca5f2058c6d5517475198f34a66ce3bff23fc5f57bce15eb1b674c7c,2024-07-02T08:15:05.773000
|
||||
CVE-2024-37134,0,0,849038f1e08cf94ea2600f6df2008b82b389d2a56ed30e7a038e63f8072ad4e5,2024-07-02T08:15:05.980000
|
||||
CVE-2024-37137,0,0,876b5deb6120b71515a72548a35979c3fe73b22e5c052fdfcb9847d4c38f186d,2024-06-28T10:27:00.920000
|
||||
CVE-2024-37138,0,0,c32a7c21b94d343f2b3f30b7a7dc2a266744d79653d9f1f3b9c08078539e5f8e,2024-06-26T12:44:29.693000
|
||||
CVE-2024-37139,0,0,4be213816842328a788d9a10ebbbecaea533491c62f7e03adf240d5d001bdfb9,2024-06-26T12:44:29.693000
|
||||
@ -253313,7 +253345,7 @@ CVE-2024-37178,0,0,09d4f25c1f8a3d05343115dea3f64d1198524e716da67f7a6714a382347c3
|
||||
CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000
|
||||
CVE-2024-37182,0,0,549cc5da2b56e1ffc4f85fe12d4fc3bdb7526f84c41d2237f570cc5dd0365265,2024-06-17T12:42:04.623000
|
||||
CVE-2024-37183,0,0,797ee6627defafae369247d5bda2be326b262d85b9c4ea85f3eb35804b563c70,2024-06-21T11:22:01.687000
|
||||
CVE-2024-37185,1,1,f4ae206b596797243dbc8ddfecb92d9b63cbae87cf98d01879bd8b2dad87d15d,2024-07-02T09:15:19.353000
|
||||
CVE-2024-37185,0,0,f4ae206b596797243dbc8ddfecb92d9b63cbae87cf98d01879bd8b2dad87d15d,2024-07-02T09:15:19.353000
|
||||
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
|
||||
CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000
|
||||
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
|
||||
@ -253407,7 +253439,7 @@ CVE-2024-3744,0,0,3408d488e8996c91d94ffcdb9d000c212f3fb5178aa8822cd0999d10712521
|
||||
CVE-2024-3745,0,0,0c97e7d88631153724030fc4589ac35dd3957f099e7d9be0c53b9ed0e2dd38f4,2024-05-20T13:00:34.807000
|
||||
CVE-2024-3746,0,0,bf665bd1c63d674f7a064c0ad8040bd5128d2f5c4febe3dc8aacfad825f7d80f,2024-05-28T17:15:11.570000
|
||||
CVE-2024-3747,0,0,6871870ddb764bd7e2884ba1607d3a8e3ec9c4bf7e3490a3d61f8ca42b77a2e1,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37479,1,1,ed651f375e21ca9ff9588b8abf061df8f9b45def73453eb6bc243bfb3df66126,2024-07-02T08:15:06.190000
|
||||
CVE-2024-37479,0,0,ed651f375e21ca9ff9588b8abf061df8f9b45def73453eb6bc243bfb3df66126,2024-07-02T08:15:06.190000
|
||||
CVE-2024-3748,0,0,b0e27aec04ee07a8ce410bb6d8c3b0277cb63dc4584c172af60f83cc3e59cff2,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12f2,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000
|
||||
@ -253840,7 +253872,7 @@ CVE-2024-3881,0,0,75d6ff7939f1eb42f8c8e14b9aa2dfb06f2eebee5e37b0b47750b4ccbacea0
|
||||
CVE-2024-3882,0,0,43bad73eafa6ac43c909cb529fe3ba674146baf41b9d3a5b4ece14285f4557b3,2024-05-17T02:40:10.457000
|
||||
CVE-2024-3883,0,0,c0ee3c129d03d9b7803729c6b8ba3c3dbf4ee4f2b39f81dd559f9f8568fb1be9,2024-05-02T13:27:25.103000
|
||||
CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c391224,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38857,1,1,bea59054369c0902bc49c4d31031be9a5f760948b08565f329f58a999c519391,2024-07-02T08:15:06.387000
|
||||
CVE-2024-38857,0,0,bea59054369c0902bc49c4d31031be9a5f760948b08565f329f58a999c519391,2024-07-02T08:15:06.387000
|
||||
CVE-2024-3887,0,0,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000
|
||||
CVE-2024-38873,0,0,480e62ff44ca44c60b79669b7942679e9800aada230c257b18bef37e33b79e3a,2024-06-21T11:22:01.687000
|
||||
CVE-2024-38874,0,0,84b324545c03e3af351829556c1e9c9a1e19bfbe37e66a75476dbe17e7f3fa44,2024-06-21T11:22:01.687000
|
||||
@ -254249,6 +254281,7 @@ CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f162
|
||||
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000
|
||||
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4268,1,1,373138a834aac697ad9e027805e352f540224bfc6efdac1f2278730dd4d85d2c,2024-07-02T11:15:10.250000
|
||||
CVE-2024-4270,0,0,dae68ba24abb4217ea4781a91ce52781cf47607cfd48397395ee3a58fe8e32d1,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4271,0,0,b387f99302f91201ccece9e8c147bcdfc30a6615cd2543471e3490cd41180d93,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
|
||||
@ -254727,7 +254760,7 @@ CVE-2024-4824,0,0,18f5c845247adede0ddca9ae15329e658bfdaa618402437af47bcb2e661d69
|
||||
CVE-2024-4825,0,0,d4c986e45acea4bd51964aed53b7ed9dcec2f9adb1090e1fc394822d57edfd78,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4826,0,0,af3613d04b75e94cea034c72d0262809043a8c645db91b90f9ab3d043b9e8532,2024-05-16T13:15:48.163000
|
||||
CVE-2024-4835,0,0,b9626bd6b7354ef649f3d482141bd2eedfd065e81dc3c11d391c7f577be02861,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4836,1,1,5794aa3805c40ca5d0c9510d4f3213ce195d19ffc09ca58a4b38d34f905cef29,2024-07-02T09:15:19.553000
|
||||
CVE-2024-4836,0,0,5794aa3805c40ca5d0c9510d4f3213ce195d19ffc09ca58a4b38d34f905cef29,2024-07-02T09:15:19.553000
|
||||
CVE-2024-4837,0,0,67f132196b6c5804deb56deda048fcbd80dd9bcaa597012fb36064245b7ca6b6,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4838,0,0,213892fd4e00ded7d0e7161081f565f4e4fb5fc98a2507596b17757660a932b0,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4839,0,0,3c3916e0334c166bdcee1348ca91ccfd36f6d6acfe79b1e13a0863625a6e0a42,2024-06-24T19:26:47.037000
|
||||
@ -255055,7 +255088,7 @@ CVE-2024-5248,0,0,b78352407aadb212f93e70af46347d9b26fbbca7606ce8cffa82c8de632819
|
||||
CVE-2024-5256,0,0,aef556d8e7eef39a9e473d71cb0baaf9ddd8441bfdba9b715777a96b312eec3d,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5259,0,0,1133f2690684f5fa329a88cb6129c4f77126359850c2cd2c69369073dabe319e,2024-06-11T17:44:42.783000
|
||||
CVE-2024-5260,1,1,939f94c1e1b5d97a3d677b6d0dcfcad909c78254f7c59a0c8923d14fc17c1345,2024-07-02T09:15:19.780000
|
||||
CVE-2024-5260,0,1,d295753a13055be7c56aa8c5da45694f9965222f9db42382623948ab6db18d2d,2024-07-02T09:15:19.780000
|
||||
CVE-2024-5261,0,0,aaf01fa82c00aa1f97fee6034b7f06b519644bd8c7ab6c8a9a02aece19be141a,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5262,0,0,9ac0e56dcac973bc4b8e5b6fa9933e9dd09a608d6b80fb71c1aa4404fea36f64,2024-06-11T17:18:50.600000
|
||||
CVE-2024-5263,0,0,796ba510b7017654bdfbf9b75644ebd80198f9cf52c47b5302f3a82ca304a5bf,2024-06-17T12:42:04.623000
|
||||
@ -255238,7 +255271,7 @@ CVE-2024-5498,0,0,734c6c536bc56a91dbd107c39a51ae397643e3245409e39f3a56c59dbc2255
|
||||
CVE-2024-5499,0,0,b5af232f34247d4ac7d3c630379d04427a676739309970b0b94548f93464ba69,2024-06-10T17:16:35.033000
|
||||
CVE-2024-5501,0,0,d4e4bc8b8db5b9e6fa14f6bf5c3381308561a5d72eef767955ee99c11419b1db,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5503,0,0,0f697147547c2a2433c49b9b46e01de2014e93e9b95ab1682351373926d90d44,2024-06-21T11:22:01.687000
|
||||
CVE-2024-5504,1,1,c757daf1b96f7ebfe2e24d0e05f9869f4616d4080c5754a9752307302ee9c336,2024-07-02T08:15:06.793000
|
||||
CVE-2024-5504,0,0,c757daf1b96f7ebfe2e24d0e05f9869f4616d4080c5754a9752307302ee9c336,2024-07-02T08:15:06.793000
|
||||
CVE-2024-5505,0,0,ff6feb748e9ca42b8e8d72ec970c71fc058363b762c81ee7cd5f161b90d542df,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5506,0,0,145a0430bcbf3c9e37cb0bfbb46dfd0872ec5ea7a67e12bde9d4f6bf02ce6bf6,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5507,0,0,ccb5bb2278d991403ca27e2a2c2825e9f4f1d687c84a7520e08690b80bccd919,2024-06-07T14:56:05.647000
|
||||
@ -255267,8 +255300,8 @@ CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc3050
|
||||
CVE-2024-5541,0,0,3cf16189373492b41668e36a2b5359be696c8d9818a4c855e885b2ed02acbca6,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5542,0,0,77ae3f3a7c4ffc662d4e5625f82b1efcc56a12c39abbd3546ebc6e9e7e619033,2024-06-11T18:25:51.200000
|
||||
CVE-2024-5543,0,0,8e93e3d42337fd51f8d8d19b50b3f68377ba39e905a95b2594b9c3824c59b9ee,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5544,1,1,cebbb034f939fb29f886f6fbdc027d99a1c9d4fbf98b60e3db3177104f5e0cf2,2024-07-02T08:15:06.997000
|
||||
CVE-2024-5545,1,1,9c6b5eb6c04fde5a678309953b943a6506c0c3d1997ff66558b1faa0f5ceabec,2024-07-02T08:15:07.190000
|
||||
CVE-2024-5544,0,0,cebbb034f939fb29f886f6fbdc027d99a1c9d4fbf98b60e3db3177104f5e0cf2,2024-07-02T08:15:06.997000
|
||||
CVE-2024-5545,0,0,9c6b5eb6c04fde5a678309953b943a6506c0c3d1997ff66558b1faa0f5ceabec,2024-07-02T08:15:07.190000
|
||||
CVE-2024-5547,0,0,10fc933ab96f74e48222460cfee3e0b1d295bbaa26e68f34704c5127d22daf4a,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5548,0,0,0dab8d0a6f7f4b5d3115df8861f1ab0c0c70d1308be14527ce7ee2ffa61fade4,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
|
||||
@ -255510,6 +255543,8 @@ CVE-2024-6006,0,0,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0
|
||||
CVE-2024-6007,0,0,10a5bf7c2814f8c45b29a7830a1e182f887cf45831b7092d81e48bb44ca9bf15,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6008,0,0,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000
|
||||
CVE-2024-6009,0,0,468577c4db742932e2254bcba365ac1e04c74b564538fb241a46994d66ec19d6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6011,1,1,dc181e857e19cb0e9f401aabdf6def729ba0ca62b606e1ea550c48a0425a18f7,2024-07-02T10:15:09.170000
|
||||
CVE-2024-6012,1,1,ce7f3246db6935fe269eaaf46322b0d2c4529b9ff63086a3c630333a11689645,2024-07-02T10:15:09.367000
|
||||
CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d324e,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6015,0,0,b5dd732698ac918c4f9a100a042e5587c72b21ba3272e6fc136fa01311e31fdc,2024-06-17T15:15:52.830000
|
||||
@ -255548,7 +255583,9 @@ CVE-2024-6083,0,0,7e7a5636ed7255d0fcfcd2ad673b2a41cb1a824617e25b4cc387230a5aebb3
|
||||
CVE-2024-6084,0,0,7af730199a10f594b6ce1f1e9ecc3a7779c7858f9e2bf364f776ef80922995a6,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6085,0,0,9ec0c5a378f12acda708e36f1fd937b6a37e47da0cf78939f5184a1970e8c26d,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6086,0,0,14860ec6fbd88099fa44eea5d54e4e6e3888339b61c575153074e11ddcd05154,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6088,1,1,ac71b14c5ab29d27d143da13dc9b1b5b46ea1d1cd57c29efc3ccc16a8a8eb891,2024-07-02T11:15:10.463000
|
||||
CVE-2024-6090,0,0,bdfb03b5dff367089b0030453781624b3aa54f3ea84f8c38b9ecc3c69b89e51c,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6099,1,1,37be248195bc8793f3da6c9b3bdf3adcb6ad3c806ed0492fd4d86139917b0ad9,2024-07-02T11:15:10.650000
|
||||
CVE-2024-6100,0,0,2b903b3a6c63696aea9a10797071b5fd7d0b6547a8f1416ee7dc4ff992de4ff5,2024-06-21T13:15:13.077000
|
||||
CVE-2024-6101,0,0,3b6bc52ab046ce2a9a29c26d80fa3342c59ba956272c0888c64da753b102c8a5,2024-06-21T13:15:13.187000
|
||||
CVE-2024-6102,0,0,229621a473a3fa4bd90193f7d8f9e1a06a3142a4c3e1de71a8a1ff5fb584365f,2024-06-21T13:15:13.277000
|
||||
@ -255621,6 +255658,7 @@ CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debc
|
||||
CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12
|
||||
CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000
|
||||
CVE-2024-6262,0,0,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000
|
||||
CVE-2024-6264,1,1,26d1dda4be31e2515cbe4463d2d268a1fba2ec15c350b4e76c8fed66f31bbeca,2024-07-02T11:15:10.840000
|
||||
CVE-2024-6265,0,0,dd53419ac5d71f3843314be14fea17b7338fd9f39ae5539064d4c12df7d66cd7,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-6267,0,0,d0d81696a0fe56042eb20b9f0c7d606c3ec4ab44f43adaf7633e08749cae8d6a,2024-06-24T15:15:12.093000
|
||||
@ -255684,3 +255722,6 @@ CVE-2024-6418,0,0,b63bb78bc20fc7c9074df0590cf44ede2aa2ea9145f7e2ea976342cbbc9ede
|
||||
CVE-2024-6419,0,0,e1f22570d75c49fa5726171947ce4e56ea60b543707fecfaebe18f84b2ff48d5,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6424,0,0,8d5a2fd0dee2ac07d57032a1c81c2c412cad276a027b89c1b7d3574f7c28481d,2024-07-01T16:37:39.040000
|
||||
CVE-2024-6425,0,0,adbfecb8c3cc947ec785870957655621e37e6a4ecfa332482b1b765f471fc897,2024-07-01T16:37:39.040000
|
||||
CVE-2024-6438,1,1,915bf0236f47457001ad3f9d4fbc6d470ad5a907c6c5087f5c837bdd00f05ef6,2024-07-02T11:15:11.027000
|
||||
CVE-2024-6439,1,1,84b51788e96644296c65dfb50cc6c646ebebc21bdb8f32d25ae74659572ed464,2024-07-02T11:15:11.523000
|
||||
CVE-2024-6440,1,1,65271531e29223d19a804163e25e9d80e81b474860e678a41a4d423fc86ab555,2024-07-02T11:15:11.783000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user