mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-09-17T20:00:17.781870+00:00
This commit is contained in:
parent
730dca30cf
commit
171fde368e
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-21551",
|
"id": "CVE-2021-21551",
|
||||||
"sourceIdentifier": "security_alert@emc.com",
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
"published": "2021-05-04T16:15:07.867",
|
"published": "2021-05-04T16:15:07.867",
|
||||||
"lastModified": "2024-09-16T23:15:49.720",
|
"lastModified": "2024-09-17T19:47:17.670",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2022-03-31",
|
"cisaExploitAdd": "2022-03-31",
|
||||||
"cisaActionDue": "2022-04-21",
|
"cisaActionDue": "2022-04-21",
|
||||||
@ -119,8 +119,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:dell:dbutil_2_3.sys:-:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:dell:dbutil_2_3.sys:*:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "798BA7BA-230C-4548-98E3-DF87F2986193"
|
"versionEndIncluding": "2.3",
|
||||||
|
"matchCriteriaId": "A06CEB22-3B35-4323-93E6-310AAEC4A8CC"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-4911",
|
"id": "CVE-2023-4911",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2023-10-03T18:15:10.463",
|
"published": "2023-10-03T18:15:10.463",
|
||||||
"lastModified": "2024-09-16T14:15:12.840",
|
"lastModified": "2024-09-17T19:46:45.837",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2023-11-21",
|
"cisaExploitAdd": "2023-11-21",
|
||||||
"cisaActionDue": "2023-12-12",
|
"cisaActionDue": "2023-12-12",
|
||||||
@ -207,6 +207,36 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
|
||||||
|
"matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B2E702D7-F8C0-49BF-9FFB-883017076E98"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "204FC6CC-9DAC-45FB-8A9F-C9C8EDD29D54"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
@ -249,6 +279,7 @@
|
|||||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4911",
|
"url": "https://access.redhat.com/security/cve/CVE-2023-4911",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
"Mitigation",
|
||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -265,7 +296,8 @@
|
|||||||
"url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt",
|
"url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt",
|
||||||
"source": "secalert@redhat.com",
|
"source": "secalert@redhat.com",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Exploit"
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-20399",
|
"id": "CVE-2024-20399",
|
||||||
"sourceIdentifier": "ykramarz@cisco.com",
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
"published": "2024-07-01T17:15:04.383",
|
"published": "2024-07-01T17:15:04.383",
|
||||||
"lastModified": "2024-08-14T19:41:18.033",
|
"lastModified": "2024-09-17T19:15:24.747",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"cisaExploitAdd": "2024-07-02",
|
"cisaExploitAdd": "2024-07-02",
|
||||||
"cisaActionDue": "2024-07-23",
|
"cisaActionDue": "2024-07-23",
|
||||||
@ -12,7 +12,7 @@
|
|||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\n\r Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials."
|
"value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\nNote: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:\r\n\r\nNexus 3000 Series Switches\r\nNexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later\r\nNexus 9000 Series Switches in standalone NX-OS mode"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -2537,13 +2537,6 @@
|
|||||||
"tags": [
|
"tags": [
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/",
|
|
||||||
"source": "ykramarz@cisco.com",
|
|
||||||
"tags": [
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
63
CVE-2024/CVE-2024-381xx/CVE-2024-38183.json
Normal file
63
CVE-2024/CVE-2024-381xx/CVE-2024-38183.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-38183",
|
||||||
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
|
"published": "2024-09-17T19:15:25.737",
|
||||||
|
"lastModified": "2024-09-17T19:15:25.737",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"exclusively-hosted-service"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38183",
|
||||||
|
"source": "secure@microsoft.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-383xx/CVE-2024-38380.json
Normal file
56
CVE-2024/CVE-2024-383xx/CVE-2024-38380.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-38380",
|
||||||
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||||
|
"published": "2024-09-17T18:15:03.680",
|
||||||
|
"lastModified": "2024-09-17T18:15:03.680",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "This vulnerability occurs when user-supplied input is improperly sanitized and then reflected back to the user's browser, allowing an attacker to execute arbitrary JavaScript in the context of the victim's browser session."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-261-02",
|
||||||
|
"source": "ics-cert@hq.dhs.gov"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-38521",
|
"id": "CVE-2024-38521",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-06-28T16:15:04.577",
|
"published": "2024-06-28T16:15:04.577",
|
||||||
"lastModified": "2024-07-01T12:37:24.220",
|
"lastModified": "2024-09-17T19:06:59.787",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hushline:hush_line:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "0.1.0",
|
||||||
|
"matchCriteriaId": "D2DA1014-A7A6-4DE2-9809-9A17A0ED6D20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/scidsg/hushline/security/advisories/GHSA-4v8c-r6h2-fhh3",
|
"url": "https://github.com/scidsg/hushline/security/advisories/GHSA-4v8c-r6h2-fhh3",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-38522",
|
"id": "CVE-2024-38522",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-06-28T17:15:03.527",
|
"published": "2024-06-28T17:15:03.527",
|
||||||
"lastModified": "2024-07-01T12:37:24.220",
|
"lastModified": "2024-09-17T19:06:40.850",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-697"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +81,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hushline:hush_line:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "0.1.0",
|
||||||
|
"matchCriteriaId": "D2DA1014-A7A6-4DE2-9809-9A17A0ED6D20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/scidsg/hushline/commit/2bbeae78a24ca2cd893f32a1812f5f6634cb21b6",
|
"url": "https://github.com/scidsg/hushline/commit/2bbeae78a24ca2cd893f32a1812f5f6634cb21b6",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/scidsg/hushline/security/advisories/GHSA-r85c-95x7-4h7q",
|
"url": "https://github.com/scidsg/hushline/security/advisories/GHSA-r85c-95x7-4h7q",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2024/CVE-2024-388xx/CVE-2024-38812.json
Normal file
56
CVE-2024/CVE-2024-388xx/CVE-2024-38812.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-38812",
|
||||||
|
"sourceIdentifier": "security@vmware.com",
|
||||||
|
"published": "2024-09-17T18:15:03.920",
|
||||||
|
"lastModified": "2024-09-17T18:15:03.920",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The\u00a0vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968",
|
||||||
|
"source": "security@vmware.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-388xx/CVE-2024-38813.json
Normal file
60
CVE-2024/CVE-2024-388xx/CVE-2024-38813.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-38813",
|
||||||
|
"sourceIdentifier": "security@vmware.com",
|
||||||
|
"published": "2024-09-17T18:15:04.127",
|
||||||
|
"lastModified": "2024-09-17T18:15:04.127",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The vCenter Server contains a privilege escalation vulnerability.\u00a0A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@vmware.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-250"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-273"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968",
|
||||||
|
"source": "security@vmware.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39373",
|
"id": "CVE-2024-39373",
|
||||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||||
"published": "2024-06-27T16:15:11.470",
|
"published": "2024-06-27T16:15:11.470",
|
||||||
"lastModified": "2024-06-27T17:11:52.390",
|
"lastModified": "2024-09-17T18:26:20.067",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"baseSeverity": "CRITICAL"
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
@ -73,10 +95,72 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-d_\\(compact\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "ABE222DA-98D7-4750-A482-6D3FB8830A74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-d_\\(compact\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "11EE0F9F-E5BA-4EC8-8683-BCD65C2F2802"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-dh_\\(exciter\\+amplifiers\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "A0CBC9C9-F6BE-43CA-A708-B92F01FCE0E4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-dh_\\(exciter\\+amplifiers\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "32D96D45-3648-4C0C-A649-0F9196B053D2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
||||||
"source": "ics-cert@hq.dhs.gov"
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"US Government Resource"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39374",
|
"id": "CVE-2024-39374",
|
||||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||||
"published": "2024-06-27T16:15:11.603",
|
"published": "2024-06-27T16:15:11.603",
|
||||||
"lastModified": "2024-06-27T17:11:52.390",
|
"lastModified": "2024-09-17T18:35:17.677",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,6 +59,28 @@
|
|||||||
"baseSeverity": "CRITICAL"
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
@ -73,10 +95,72 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-d_\\(compact\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "ABE222DA-98D7-4750-A482-6D3FB8830A74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-d_\\(compact\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "11EE0F9F-E5BA-4EC8-8683-BCD65C2F2802"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-dh_\\(exciter\\+amplifiers\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "A0CBC9C9-F6BE-43CA-A708-B92F01FCE0E4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-dh_\\(exciter\\+amplifiers\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "32D96D45-3648-4C0C-A649-0F9196B053D2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
||||||
"source": "ics-cert@hq.dhs.gov"
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"US Government Resource"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39375",
|
"id": "CVE-2024-39375",
|
||||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||||
"published": "2024-06-27T16:15:11.733",
|
"published": "2024-06-27T16:15:11.733",
|
||||||
"lastModified": "2024-06-27T17:11:52.390",
|
"lastModified": "2024-09-17T18:32:55.790",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,9 +59,41 @@
|
|||||||
"baseSeverity": "CRITICAL"
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "ics-cert@hq.dhs.gov",
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -73,10 +105,72 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-d_\\(compact\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "ABE222DA-98D7-4750-A482-6D3FB8830A74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-d_\\(compact\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "11EE0F9F-E5BA-4EC8-8683-BCD65C2F2802"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-dh_\\(exciter\\+amplifiers\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "A0CBC9C9-F6BE-43CA-A708-B92F01FCE0E4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-dh_\\(exciter\\+amplifiers\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "32D96D45-3648-4C0C-A649-0F9196B053D2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
||||||
"source": "ics-cert@hq.dhs.gov"
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"US Government Resource"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39376",
|
"id": "CVE-2024-39376",
|
||||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||||
"published": "2024-06-27T16:15:11.883",
|
"published": "2024-06-27T16:15:11.883",
|
||||||
"lastModified": "2024-06-27T17:11:52.390",
|
"lastModified": "2024-09-17T18:32:09.573",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -59,12 +59,44 @@
|
|||||||
"baseSeverity": "CRITICAL"
|
"baseSeverity": "CRITICAL"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "ics-cert@hq.dhs.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -73,10 +105,72 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-d_\\(compact\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "ABE222DA-98D7-4750-A482-6D3FB8830A74"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-d_\\(compact\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "11EE0F9F-E5BA-4EC8-8683-BCD65C2F2802"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:markoni:markoni-dh_\\(exciter\\+amplifiers\\)_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2.0.1",
|
||||||
|
"matchCriteriaId": "A0CBC9C9-F6BE-43CA-A708-B92F01FCE0E4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:markoni:markoni-dh_\\(exciter\\+amplifiers\\):-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "32D96D45-3648-4C0C-A649-0F9196B053D2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-179-01",
|
||||||
"source": "ics-cert@hq.dhs.gov"
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"US Government Resource"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39878",
|
"id": "CVE-2024-39878",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2024-07-01T17:15:09.350",
|
"published": "2024-07-01T17:15:09.350",
|
||||||
"lastModified": "2024-07-02T12:09:16.907",
|
"lastModified": "2024-09-17T18:50:05.287",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cve@jetbrains.com",
|
"source": "cve@jetbrains.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cve@jetbrains.com",
|
"source": "cve@jetbrains.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.03.3",
|
||||||
|
"matchCriteriaId": "54F38C92-B7AB-4A8B-A0BB-D240126F5383"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39879",
|
"id": "CVE-2024-39879",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2024-07-01T17:15:09.573",
|
"published": "2024-07-01T17:15:09.573",
|
||||||
"lastModified": "2024-07-02T12:09:16.907",
|
"lastModified": "2024-09-17T18:57:49.577",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cve@jetbrains.com",
|
"source": "cve@jetbrains.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cve@jetbrains.com",
|
"source": "cve@jetbrains.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "2024.03.3",
|
||||||
|
"matchCriteriaId": "54F38C92-B7AB-4A8B-A0BB-D240126F5383"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||||
"source": "cve@jetbrains.com"
|
"source": "cve@jetbrains.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-40643",
|
"id": "CVE-2024-40643",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-09-09T15:15:11.597",
|
"published": "2024-09-09T15:15:11.597",
|
||||||
"lastModified": "2024-09-09T18:30:12.050",
|
"lastModified": "2024-09-17T18:03:05.080",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.6,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 6.0
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "security-advisories@github.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -41,7 +61,7 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security-advisories@github.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
@ -49,16 +69,51 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:-:*:*",
|
||||||
|
"versionEndExcluding": "3.0.15",
|
||||||
|
"matchCriteriaId": "A3D65634-E8F7-4309-8E4A-EE63510B032F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/laurent22/joplin/commit/b220413a9b5ed55fb1f565ac786a5c231da8bc87",
|
"url": "https://github.com/laurent22/joplin/commit/b220413a9b5ed55fb1f565ac786a5c231da8bc87",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/laurent22/joplin/security/advisories/GHSA-g796-3g6g-jmmc",
|
"url": "https://github.com/laurent22/joplin/security/advisories/GHSA-g796-3g6g-jmmc",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
44
CVE-2024/CVE-2024-425xx/CVE-2024-42501.json
Normal file
44
CVE-2024/CVE-2024-425xx/CVE-2024-42501.json
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42501",
|
||||||
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
|
"published": "2024-09-17T18:15:04.337",
|
||||||
|
"lastModified": "2024-09-17T18:15:04.337",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An authenticated Path Traversal vulnerabilities exists in the ArubaOS. Successful exploitation of this vulnerability allows an attacker to install unsigned packages on the underlying operating system, enabling the threat actor to execute arbitrary code or install implants."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
44
CVE-2024/CVE-2024-425xx/CVE-2024-42502.json
Normal file
44
CVE-2024/CVE-2024-425xx/CVE-2024-42502.json
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42502",
|
||||||
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
|
"published": "2024-09-17T18:15:04.527",
|
||||||
|
"lastModified": "2024-09-17T18:15:04.527",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability result in the ability to inject shell commands on the underlying operating system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
44
CVE-2024/CVE-2024-425xx/CVE-2024-42503.json
Normal file
44
CVE-2024/CVE-2024-425xx/CVE-2024-42503.json
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-42503",
|
||||||
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
|
"published": "2024-09-17T18:15:04.710",
|
||||||
|
"lastModified": "2024-09-17T18:15:04.710",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Authenticated command execution vulnerability exist in the ArubaOS command line interface (CLI). Successful exploitation of this vulnerabilities result in the ability to run arbitrary commands as a priviledge user on the underlying operating system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43238",
|
"id": "CVE-2024-43238",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-08-18T14:15:06.583",
|
"published": "2024-08-18T14:15:06.583",
|
||||||
"lastModified": "2024-08-19T12:59:59.177",
|
"lastModified": "2024-09-17T19:27:03.220",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:getwemail:wemail:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.14.6",
|
||||||
|
"matchCriteriaId": "7E54F66B-6C64-4B36-A150-3EE93C312DD0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/wemail/wordpress-wemail-email-marketing-newsletter-optin-forms-subscribers-wordpress-plugin-plugin-1-14-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/wemail/wordpress-wemail-email-marketing-newsletter-optin-forms-subscribers-wordpress-plugin-plugin-1-14-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43251",
|
"id": "CVE-2024-43251",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-08-26T21:15:25.193",
|
"published": "2024-08-26T21:15:25.193",
|
||||||
"lastModified": "2024-08-27T13:01:52.723",
|
"lastModified": "2024-09-17T18:10:36.453",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -41,8 +61,18 @@
|
|||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:bitapps:bit_form:*:*:*:*:pro:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "2.6.4",
|
||||||
|
"matchCriteriaId": "C8FA22BD-69F8-4726-B4F6-F3826BEFD28F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/bitformpro/wordpress-bit-form-pro-plugin-2-6-4-authenticated-sensitive-data-exposure-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/bitformpro/wordpress-bit-form-pro-plugin-2-6-4-authenticated-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43255",
|
"id": "CVE-2024-43255",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-08-26T21:15:25.427",
|
"published": "2024-08-26T21:15:25.427",
|
||||||
"lastModified": "2024-08-27T13:01:52.723",
|
"lastModified": "2024-09-17T18:08:50.847",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -40,6 +60,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +81,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:stormhillmedia:mybook_table_bookstore:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "3.3.9",
|
||||||
|
"matchCriteriaId": "AA251CF0-8E74-4ADE-AA4C-428D64BF4FA2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/mybooktable/wordpress-mybooktable-bookstore-by-stormhill-media-plugin-3-3-9-csrf-to-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/mybooktable/wordpress-mybooktable-bookstore-by-stormhill-media-plugin-3-3-9-csrf-to-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43329",
|
"id": "CVE-2024-43329",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-08-18T14:15:07.400",
|
"published": "2024-08-18T14:15:07.400",
|
||||||
"lastModified": "2024-08-19T12:59:59.177",
|
"lastModified": "2024-09-17T19:59:39.933",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cpothemes:allegiant:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "1.2.7",
|
||||||
|
"matchCriteriaId": "B9CE3E52-E742-405E-9020-953E477C0A24"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/allegiant/wordpress-allegiant-theme-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/allegiant/wordpress-allegiant-theme-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43330",
|
"id": "CVE-2024-43330",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-08-18T14:15:07.597",
|
"published": "2024-08-18T14:15:07.597",
|
||||||
"lastModified": "2024-08-19T12:59:59.177",
|
"lastModified": "2024-09-17T19:53:40.987",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "audit@patchstack.com",
|
"source": "audit@patchstack.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:wpbeaveraddons:powerpack_lite_for_beaver_builder:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.37.4",
|
||||||
|
"matchCriteriaId": "8544A652-E219-4F0D-AFBA-B945A924C7FB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/bbpowerpack/wordpress-powerpack-for-beaver-builder-plugin-2-37-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/bbpowerpack/wordpress-powerpack-for-beaver-builder-plugin-2-37-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
63
CVE-2024/CVE-2024-434xx/CVE-2024-43460.json
Normal file
63
CVE-2024/CVE-2024-434xx/CVE-2024-43460.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-43460",
|
||||||
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
|
"published": "2024-09-17T19:15:27.500",
|
||||||
|
"lastModified": "2024-09-17T19:15:27.500",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
|
"tags": [
|
||||||
|
"exclusively-hosted-service"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper authorization in Dynamics 365 Business Central resulted in a vulnerability that allows an authenticated attacker to elevate privileges over a network."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-285"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43460",
|
||||||
|
"source": "secure@microsoft.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2024/CVE-2024-453xx/CVE-2024-45384.json
Normal file
21
CVE-2024/CVE-2024-453xx/CVE-2024-45384.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45384",
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"published": "2024-09-17T19:15:28.100",
|
||||||
|
"lastModified": "2024-09-17T19:15:28.100",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Padding Oracle vulnerability in Apache Druid extension, druid-pac4j.\nThis could allow an attacker to manipulate a pac4j session cookie.\n\nThis issue affects Apache Druid versions 0.18.0 through 30.0.0.\nSince the druid-pac4j extension is optional and disabled by default, Druid installations not using the druid-pac4j extension are not affected by this vulnerability.\n\nWhile we are not aware of a way to meaningfully exploit this flaw, we \nnevertheless recommend upgrading to version 30.0.1 or higher which fixes the issue\nand ensuring you have a strong \ndruid.auth.pac4j.cookiePassphrase as a precaution."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lists.apache.org/thread/gr94fnp574plb50lsp8jw4smvgv1lbz1",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
CVE-2024/CVE-2024-455xx/CVE-2024-45537.json
Normal file
33
CVE-2024/CVE-2024-455xx/CVE-2024-45537.json
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45537",
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"published": "2024-09-17T19:15:28.157",
|
||||||
|
"lastModified": "2024-09-17T19:15:28.157",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Apache Druid allows users with certain permissions to read data from other database systems using JDBC. This functionality allows trusted users to set up Druid lookups or run ingestion tasks. Druid also allows administrators to configure a list of allowed properties that users are able to provide for their JDBC connections. By default, this allowed properties list restricts users to TLS-related properties only. However, when configuration a MySQL JDBC connection, users can use a particularly-crafted JDBC connection string to provide properties that are not on this allow list.\n\nUsers without the permission to configure JDBC connections are not able to exploit this vulnerability.\nCVE-2021-26919 describes a similar vulnerability which was partially addressed in Apache Druid 0.20.2.\n\nThis issue is fixed in Apache Druid 30.0.1."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@apache.org",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lists.apache.org/thread/2ovx1t77y6tlkhk5b42clp4vwo4c8cjv",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2024/CVE-2024-456xx/CVE-2024-45612.json
Normal file
60
CVE-2024/CVE-2024-456xx/CVE-2024-45612.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45612",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-09-17T19:15:28.250",
|
||||||
|
"lastModified": "2024-09-17T19:15:28.250",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Contao is an Open Source CMS. In affected versions an untrusted user can inject insert tags into the canonical tag, which are then replaced on the web page (front end). Users are advised to update to Contao 4.13.49, 5.3.15 or 5.4.3. Users unable to upgrade should disable canonical tags in the root page settings."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://contao.org/en/security-advisories/insert-tag-injection-via-canonical-urls",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/contao/contao/security/advisories/GHSA-2xpq-xp6c-5mgj",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2024/CVE-2024-456xx/CVE-2024-45682.json
Normal file
56
CVE-2024/CVE-2024-456xx/CVE-2024-45682.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45682",
|
||||||
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||||
|
"published": "2024-09-17T18:15:04.893",
|
||||||
|
"lastModified": "2024-09-17T18:15:04.893",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "There is a command injection vulnerability that may allow an attacker to inject malicious input on the device's operating system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-77"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-261-02",
|
||||||
|
"source": "ics-cert@hq.dhs.gov"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-45694",
|
"id": "CVE-2024-45694",
|
||||||
"sourceIdentifier": "twcert@cert.org.tw",
|
"sourceIdentifier": "twcert@cert.org.tw",
|
||||||
"published": "2024-09-16T07:15:02.610",
|
"published": "2024-09-16T07:15:02.610",
|
||||||
"lastModified": "2024-09-16T15:30:28.733",
|
"lastModified": "2024-09-17T18:40:07.243",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,96 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x5460_firmware:1.01:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "41DB57EF-B020-4B06-A725-C568F7F4C8FF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x5460_firmware:1.02:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1D95B7A3-E5E1-4553-AF4C-777843D43BA6"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x5460_firmware:1.04:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E96AFAF8-4617-4AC9-AE3D-871A789F4018"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x5460_firmware:1.10:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "67D9078D-7B51-4FD3-BAE3-2B20822DF7E3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:dlink:dir-x5460:a1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2A276652-CC92-4DBB-8EA8-DF8E6797C794"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.twcert.org.tw/en/cp-139-8081-3fb39-2.html",
|
"url": "https://www.twcert.org.tw/en/cp-139-8081-3fb39-2.html",
|
||||||
"source": "twcert@cert.org.tw"
|
"source": "twcert@cert.org.tw",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.twcert.org.tw/tw/cp-132-8080-7f494-1.html",
|
"url": "https://www.twcert.org.tw/tw/cp-132-8080-7f494-1.html",
|
||||||
"source": "twcert@cert.org.tw"
|
"source": "twcert@cert.org.tw",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-45695",
|
"id": "CVE-2024-45695",
|
||||||
"sourceIdentifier": "twcert@cert.org.tw",
|
"sourceIdentifier": "twcert@cert.org.tw",
|
||||||
"published": "2024-09-16T07:15:02.840",
|
"published": "2024-09-16T07:15:02.840",
|
||||||
"lastModified": "2024-09-16T15:30:28.733",
|
"lastModified": "2024-09-17T18:40:38.573",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -40,6 +40,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "twcert@cert.org.tw",
|
"source": "twcert@cert.org.tw",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +61,54 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.twcert.org.tw/en/cp-139-8083-a299e-2.html",
|
"url": "https://www.twcert.org.tw/en/cp-139-8083-a299e-2.html",
|
||||||
"source": "twcert@cert.org.tw"
|
"source": "twcert@cert.org.tw",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.twcert.org.tw/tw/cp-132-8082-f1687-1.html",
|
"url": "https://www.twcert.org.tw/tw/cp-132-8082-f1687-1.html",
|
||||||
"source": "twcert@cert.org.tw"
|
"source": "twcert@cert.org.tw",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
80
CVE-2024/CVE-2024-457xx/CVE-2024-45798.json
Normal file
80
CVE-2024/CVE-2024-457xx/CVE-2024-45798.json
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45798",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-09-17T19:15:28.457",
|
||||||
|
"lastModified": "2024-09-17T19:15:28.457",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. The `arduino-esp32` CI is vulnerable to multiple Poisoned Pipeline Execution (PPE) vulnerabilities. Code injection in `tests_results.yml` workflow (`GHSL-2024-169`) and environment Variable injection (`GHSL-2024-170`). These issue have been addressed but users are advised to verify the contents of the downloaded artifacts."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.9,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-20"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://codeql.github.com/codeql-query-help/javascript/js-actions-command-injection",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/espressif/arduino-esp32/blob/690bdb511d9f001e2066da2dda2c631a3eee270f/.github/workflows/tests_results.yml",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/espressif/arduino-esp32/security/advisories/GHSA-h52q-xhg2-6jw8",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://securitylab.github.com/research/github-actions-preventing-pwn-requests",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://securitylab.github.com/research/github-actions-untrusted-input",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
86
CVE-2024/CVE-2024-458xx/CVE-2024-45803.json
Normal file
86
CVE-2024/CVE-2024-458xx/CVE-2024-45803.json
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45803",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-09-17T19:15:28.660",
|
||||||
|
"lastModified": "2024-09-17T19:15:28.660",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Wire UI is a library of components and resources to empower Laravel and Livewire application development. A potential Cross-Site Scripting (XSS) vulnerability has been identified in the `/wireui/button` endpoint, specifically through the `label` query parameter. Malicious actors could exploit this vulnerability by injecting JavaScript into the `label` parameter, leading to the execution of arbitrary code in the victim's browser. The `/wireui/button` endpoint dynamically renders button labels based on user-provided input via the `label` query parameter. Due to insufficient sanitization or escaping of this input, an attacker can inject malicious JavaScript. By crafting such a request, an attacker can inject arbitrary code that will be executed by the browser when the endpoint is accessed. If exploited, this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the affected website. This could lead to: **Session Hijacking**: Stealing session cookies, tokens, or other sensitive information. **User Impersonation**: Performing unauthorized actions on behalf of authenticated users. **Phishing**: Redirecting users to malicious websites. **Content Manipulation**: Altering the appearance or behavior of the affected page to mislead users or execute further attacks. The severity of this vulnerability depends on the context of where the affected component is used, but in all cases, it poses a significant risk to user security. This issue has been addressed in release versions 1.19.3 and 2.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "LOW",
|
||||||
|
"subsequentSystemIntegrity": "LOW",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wireui/wireui/commit/784c4f110e58eb41d0f2bdecd4655ea417f16e7e",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wireui/wireui/commit/a457654912055f4dcc559da04d4e319f76b80fc5",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/wireui/wireui/security/advisories/GHSA-rw5h-g8xq-6877",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
16
CVE-2024/CVE-2024-458xx/CVE-2024-45804.json
Normal file
16
CVE-2024/CVE-2024-458xx/CVE-2024-45804.json
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-45804",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-09-17T18:15:05.110",
|
||||||
|
"lastModified": "2024-09-17T18:15:05.110",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: This CVE is a duplicate of another CVE."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-46085",
|
"id": "CVE-2024-46085",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-09-17T13:15:03.793",
|
"published": "2024-09-17T13:15:03.793",
|
||||||
"lastModified": "2024-09-17T13:15:03.793",
|
"lastModified": "2024-09-17T18:35:01.317",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/plugin/file_manager/rename"
|
"value": "FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/plugin/file_manager/rename"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/RainingSEC/cms/tree/main/11/readme.md",
|
"url": "https://github.com/RainingSEC/cms/tree/main/11/readme.md",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-46362",
|
"id": "CVE-2024-46362",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-09-17T13:15:03.903",
|
"published": "2024-09-17T13:15:03.903",
|
||||||
"lastModified": "2024-09-17T13:15:03.903",
|
"lastModified": "2024-09-17T18:35:02.140",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -11,7 +11,42 @@
|
|||||||
"value": "FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/plugin/file_manager/create_directory"
|
"value": "FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/?/plugin/file_manager/create_directory"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/ohuquq/cms/tree/main/13/readme.md",
|
"url": "https://github.com/ohuquq/cms/tree/main/13/readme.md",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-6367",
|
"id": "CVE-2024-6367",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-06-27T12:15:29.653",
|
"published": "2024-06-27T12:15:29.653",
|
||||||
"lastModified": "2024-06-27T12:47:19.847",
|
"lastModified": "2024-09-17T18:39:51.967",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,22 +140,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:labvantage:laboratory_information_management_system:2017:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "88C3D410-4AC6-4B6F-A327-5FAA460F7EE6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-c9aa0641d1464816832bb8b98958626f?pvs=4",
|
"url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-c9aa0641d1464816832bb8b98958626f?pvs=4",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.269800",
|
"url": "https://vuldb.com/?ctiid.269800",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.269800",
|
"url": "https://vuldb.com/?id.269800",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.359344",
|
"url": "https://vuldb.com/?submit.359344",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-6368",
|
"id": "CVE-2024-6368",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-06-27T12:15:30.240",
|
"published": "2024-06-27T12:15:30.240",
|
||||||
"lastModified": "2024-06-27T18:15:21.083",
|
"lastModified": "2024-09-17T19:22:33.767",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,22 +140,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:labvantage:laboratory_information_management_system:2017:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "88C3D410-4AC6-4B6F-A327-5FAA460F7EE6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-53b90219d193451aa81f28dea480d5f2?pvs=4",
|
"url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-53b90219d193451aa81f28dea480d5f2?pvs=4",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.269801",
|
"url": "https://vuldb.com/?ctiid.269801",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.269801",
|
"url": "https://vuldb.com/?id.269801",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.359372",
|
"url": "https://vuldb.com/?submit.359372",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-6369",
|
"id": "CVE-2024-6369",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-06-27T12:15:30.750",
|
"published": "2024-06-27T12:15:30.750",
|
||||||
"lastModified": "2024-06-27T12:47:19.847",
|
"lastModified": "2024-09-17T19:19:25.907",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,22 +140,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:labvantage:laboratory_information_management_system:2017:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "88C3D410-4AC6-4B6F-A327-5FAA460F7EE6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-960bf61d35124c858e3360785cfe40b3?pvs=4",
|
"url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-960bf61d35124c858e3360785cfe40b3?pvs=4",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.269802",
|
"url": "https://vuldb.com/?ctiid.269802",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.269802",
|
"url": "https://vuldb.com/?id.269802",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.359373",
|
"url": "https://vuldb.com/?submit.359373",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-6370",
|
"id": "CVE-2024-6370",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-06-27T12:15:31.207",
|
"published": "2024-06-27T12:15:31.207",
|
||||||
"lastModified": "2024-06-27T12:47:19.847",
|
"lastModified": "2024-09-17T19:17:43.977",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,22 +140,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:labvantage:laboratory_information_management_system:2017:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "88C3D410-4AC6-4B6F-A327-5FAA460F7EE6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://gentle-khaan-c53.notion.site/HTML-Injection-in-Labvantage-LIMS-a229aae13fa14977a677921e7a442619?pvs=4",
|
"url": "https://gentle-khaan-c53.notion.site/HTML-Injection-in-Labvantage-LIMS-a229aae13fa14977a677921e7a442619?pvs=4",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.269803",
|
"url": "https://vuldb.com/?ctiid.269803",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.269803",
|
"url": "https://vuldb.com/?id.269803",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.359374",
|
"url": "https://vuldb.com/?submit.359374",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2024-7526",
|
"id": "CVE-2024-7526",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2024-08-06T13:15:57.483",
|
"published": "2024-08-06T13:15:57.483",
|
||||||
"lastModified": "2024-08-12T16:07:50.743",
|
"lastModified": "2024-09-17T19:15:28.857",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14."
|
"value": "ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-8610",
|
"id": "CVE-2024-8610",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2024-09-09T21:15:13.127",
|
"published": "2024-09-09T21:15:13.127",
|
||||||
"lastModified": "2024-09-10T12:09:50.377",
|
"lastModified": "2024-09-17T18:48:12.130",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -61,6 +61,26 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -120,26 +140,58 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharing",
|
"url": "https://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharing",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.276840",
|
"url": "https://vuldb.com/?ctiid.276840",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.276840",
|
"url": "https://vuldb.com/?id.276840",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.404867",
|
"url": "https://vuldb.com/?submit.404867",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/",
|
"url": "https://www.sourcecodester.com/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Not Applicable"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
82
CVE-2024/CVE-2024-86xx/CVE-2024-8660.json
Normal file
82
CVE-2024/CVE-2024-86xx/CVE-2024-8660.json
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8660",
|
||||||
|
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||||
|
"published": "2024-09-17T19:15:28.953",
|
||||||
|
"lastModified": "2024-09-17T19:15:28.953",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Concrete CMS versions 9.0.0 through 9.3.3 are affected by a\nstored XSS vulnerability in the \"Top Navigator Bar\" block.\nSince the \"Top Navigator Bar\" output was not sufficiently sanitized, a rogue administrator could add a malicious payload that could be executed when targeted users visited the home page.The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6\nwith vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N . This\ndoes not affect versions below 9.0.0 since they do not have the Top\nNavigator Bar Block. Thanks, Chu Quoc Khanh for reporting."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnerableSystemConfidentiality": "NONE",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 4.6,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/934-release-notes",
|
||||||
|
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/concretecms/concretecms/pull/12128",
|
||||||
|
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2024-8661",
|
"id": "CVE-2024-8661",
|
||||||
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
|
||||||
"published": "2024-09-16T18:15:54.583",
|
"published": "2024-09-16T18:15:54.583",
|
||||||
"lastModified": "2024-09-16T18:15:54.583",
|
"lastModified": "2024-09-17T19:15:29.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Concrete CMS versions 9.0.0 to 9.3.4 and below 8.5.18 are vulnerable to Stored XSS in the \"Next&Previous Nav\" block. A rogue administrator could add a malicious payload by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N \u00a0Since the \"Next&Previous Nav\" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users.\u00a0Thanks, Chu Quoc Khanh for reporting."
|
"value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.18 are vulnerable to Stored XSS in the \"Next&Previous Nav\" block. A rogue administrator could add a malicious payload by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N \u00a0Since the \"Next&Previous Nav\" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users.\u00a0Thanks, Chu Quoc Khanh for reporting."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Las versiones 9.0.0 a 9.3.4 y anteriores a 8.5.18 de Concrete CMS son vulnerables a XSS almacenado en el bloque \"Navegaci\u00f3n anterior y siguiente\". Un administrador malintencionado podr\u00eda agregar una carga maliciosa ejecut\u00e1ndola en los navegadores de los usuarios afectados. El equipo de seguridad de Concrete CMS le otorg\u00f3 a esta vulnerabilidad una puntuaci\u00f3n CVSS v4 de 4,6 con el vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Dado que la salida del bloque \"Next&Previous Nav\" no se desinfect\u00f3 lo suficiente, la carga maliciosa podr\u00eda ejecutarse en los navegadores de los usuarios afectados. Gracias, Chu Quoc Khanh, por informar."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
100
CVE-2024/CVE-2024-87xx/CVE-2024-8796.json
Normal file
100
CVE-2024/CVE-2024-87xx/CVE-2024-8796.json
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8796",
|
||||||
|
"sourceIdentifier": "disclosure@synopsys.com",
|
||||||
|
"published": "2024-09-17T18:15:05.443",
|
||||||
|
"lastModified": "2024-09-17T18:15:05.443",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Under the default configuration, Devise-Two-Factor versions >= 2.2.0 & < 6.0.0 generate TOTP shared secrets that are 120 bits instead of the 128-bit minimum defined by RFC 4226. Using a shared secret shorter than the minimum to generate a multi-factor authentication code could make it easier for an attacker to guess the shared secret and generate valid TOTP codes."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "disclosure@synopsys.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackRequirements": "PRESENT",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "HIGH",
|
||||||
|
"vulnerableSystemIntegrity": "NONE",
|
||||||
|
"vulnerableSystemAvailability": "NONE",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 6.0,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "disclosure@synopsys.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.6,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "disclosure@synopsys.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-331"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/devise-two-factor/devise-two-factor/security/advisories/GHSA-qjxf-mc72-wjr2",
|
||||||
|
"source": "disclosure@synopsys.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
25
CVE-2024/CVE-2024-89xx/CVE-2024-8900.json
Normal file
25
CVE-2024/CVE-2024-89xx/CVE-2024-8900.json
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8900",
|
||||||
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
|
"published": "2024-09-17T19:15:29.163",
|
||||||
|
"lastModified": "2024-09-17T19:15:29.163",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An attacker could write data to the user's clipboard, bypassing the user prompt, during a certain sequence of navigational events. This vulnerability affects Firefox < 129."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1872841",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2024-33/",
|
||||||
|
"source": "security@mozilla.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
141
CVE-2024/CVE-2024-89xx/CVE-2024-8944.json
Normal file
141
CVE-2024/CVE-2024-89xx/CVE-2024-8944.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8944",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-09-17T18:15:05.690",
|
||||||
|
"lastModified": "2024-09-17T18:15:05.690",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as critical, was found in code-projects Hospital Management System 1.0. This affects an unknown part of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 7.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://code-projects.org/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/65241/cve/issues/1",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.277761",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.277761",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.408871",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
137
CVE-2024/CVE-2024-89xx/CVE-2024-8945.json
Normal file
137
CVE-2024/CVE-2024-89xx/CVE-2024-8945.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8945",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-09-17T18:15:06.023",
|
||||||
|
"lastModified": "2024-09-17T18:15:06.023",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability has been found in CodeCanyon RISE Ultimate Project Manager 3.7.0 and classified as critical. This vulnerability affects unknown code of the file /index.php/dashboard/save. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://bytium.com/sql-injection-vulnerability-identified-in-rise-crm/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.277762",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.277762",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.409096",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2024/CVE-2024-89xx/CVE-2024-8946.json
Normal file
145
CVE-2024/CVE-2024-89xx/CVE-2024-8946.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8946",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-09-17T19:15:29.220",
|
||||||
|
"lastModified": "2024-09-17T19:15:29.220",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 7.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/commit/29943546343c92334e8518695a11fc0e2ceea68b",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/issues/13006",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/issues/13006#issuecomment-1820309455",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.277764",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.277764",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.409312",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
149
CVE-2024/CVE-2024-89xx/CVE-2024-8947.json
Normal file
149
CVE-2024/CVE-2024-89xx/CVE-2024-8947.json
Normal file
@ -0,0 +1,149 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8947",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-09-17T19:15:29.483",
|
||||||
|
"lastModified": "2024-09-17T19:15:29.483",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file py/objarray.c. The manipulation leads to use after free. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.23.0 is able to address this issue. The identifier of the patch is 4bed614e707c0644c06e117f848fa12605c711cd. It is recommended to upgrade the affected component. In micropython objarray component, when a bytes object is resized and copied into itself, it may reference memory that has already been freed."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.6,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "HIGH",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 5.1
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 4.9,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/commit/4bed614e707c0644c06e117f848fa12605c711cd",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/issues/13283",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/issues/13283#issuecomment-1918479709",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/releases/tag/v1.23.0",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.277765",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.277765",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.409316",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
141
CVE-2024/CVE-2024-89xx/CVE-2024-8948.json
Normal file
141
CVE-2024/CVE-2024-89xx/CVE-2024-8948.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8948",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-09-17T19:15:29.747",
|
||||||
|
"lastModified": "2024-09-17T19:15:29.747",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected by this issue is the function mpz_as_bytes of the file py/objint.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 908ab1ceca15ee6fd0ef82ca4cba770a3ec41894. It is recommended to apply a patch to fix this issue. In micropython objint component, converting zero from int to bytes leads to heap buffer-overflow-write at mpz_as_bytes."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.3,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 7.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/commit/908ab1ceca15ee6fd0ef82ca4cba770a3ec41894",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/micropython/micropython/issues/13041",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.277766",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.277766",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.409317",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
141
CVE-2024/CVE-2024-89xx/CVE-2024-8949.json
Normal file
141
CVE-2024/CVE-2024-89xx/CVE-2024-8949.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-8949",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2024-09-17T19:15:30.017",
|
||||||
|
"lastModified": "2024-09-17T19:15:30.017",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in SourceCodester Online Eyewear Shop 1.0. This affects an unknown part of the file /classes/Master.php of the component Cart Content Handler. The manipulation of the argument cart_id/id leads to improper ownership management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnerableSystemConfidentiality": "LOW",
|
||||||
|
"vulnerableSystemIntegrity": "LOW",
|
||||||
|
"vulnerableSystemAvailability": "LOW",
|
||||||
|
"subsequentSystemConfidentiality": "NONE",
|
||||||
|
"subsequentSystemIntegrity": "NONE",
|
||||||
|
"subsequentSystemAvailability": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||||||
|
"integrityRequirements": "NOT_DEFINED",
|
||||||
|
"availabilityRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||||
|
"safety": "NOT_DEFINED",
|
||||||
|
"automatable": "NOT_DEFINED",
|
||||||
|
"recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL",
|
||||||
|
"baseScore": 6.5
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-282"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/gurudattch/CVEs/edit/main/Sourcecodester-Online-Eyewear-shop-webiste-Broken-access-control.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.277767",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.277767",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.409459",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-09-17T18:00:17.947138+00:00
|
2024-09-17T20:00:17.781870+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-09-17T17:59:00.243000+00:00
|
2024-09-17T19:59:39.933000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,46 +33,68 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
263100
|
263124
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `2`
|
Recently added CVEs: `24`
|
||||||
|
|
||||||
- [CVE-2024-8768](CVE-2024/CVE-2024-87xx/CVE-2024-8768.json) (`2024-09-17T17:15:11.100`)
|
- [CVE-2024-38183](CVE-2024/CVE-2024-381xx/CVE-2024-38183.json) (`2024-09-17T19:15:25.737`)
|
||||||
- [CVE-2024-8939](CVE-2024/CVE-2024-89xx/CVE-2024-8939.json) (`2024-09-17T17:15:11.327`)
|
- [CVE-2024-38380](CVE-2024/CVE-2024-383xx/CVE-2024-38380.json) (`2024-09-17T18:15:03.680`)
|
||||||
|
- [CVE-2024-38812](CVE-2024/CVE-2024-388xx/CVE-2024-38812.json) (`2024-09-17T18:15:03.920`)
|
||||||
|
- [CVE-2024-38813](CVE-2024/CVE-2024-388xx/CVE-2024-38813.json) (`2024-09-17T18:15:04.127`)
|
||||||
|
- [CVE-2024-42501](CVE-2024/CVE-2024-425xx/CVE-2024-42501.json) (`2024-09-17T18:15:04.337`)
|
||||||
|
- [CVE-2024-42502](CVE-2024/CVE-2024-425xx/CVE-2024-42502.json) (`2024-09-17T18:15:04.527`)
|
||||||
|
- [CVE-2024-42503](CVE-2024/CVE-2024-425xx/CVE-2024-42503.json) (`2024-09-17T18:15:04.710`)
|
||||||
|
- [CVE-2024-43460](CVE-2024/CVE-2024-434xx/CVE-2024-43460.json) (`2024-09-17T19:15:27.500`)
|
||||||
|
- [CVE-2024-45384](CVE-2024/CVE-2024-453xx/CVE-2024-45384.json) (`2024-09-17T19:15:28.100`)
|
||||||
|
- [CVE-2024-45537](CVE-2024/CVE-2024-455xx/CVE-2024-45537.json) (`2024-09-17T19:15:28.157`)
|
||||||
|
- [CVE-2024-45612](CVE-2024/CVE-2024-456xx/CVE-2024-45612.json) (`2024-09-17T19:15:28.250`)
|
||||||
|
- [CVE-2024-45682](CVE-2024/CVE-2024-456xx/CVE-2024-45682.json) (`2024-09-17T18:15:04.893`)
|
||||||
|
- [CVE-2024-45798](CVE-2024/CVE-2024-457xx/CVE-2024-45798.json) (`2024-09-17T19:15:28.457`)
|
||||||
|
- [CVE-2024-45803](CVE-2024/CVE-2024-458xx/CVE-2024-45803.json) (`2024-09-17T19:15:28.660`)
|
||||||
|
- [CVE-2024-45804](CVE-2024/CVE-2024-458xx/CVE-2024-45804.json) (`2024-09-17T18:15:05.110`)
|
||||||
|
- [CVE-2024-8660](CVE-2024/CVE-2024-86xx/CVE-2024-8660.json) (`2024-09-17T19:15:28.953`)
|
||||||
|
- [CVE-2024-8796](CVE-2024/CVE-2024-87xx/CVE-2024-8796.json) (`2024-09-17T18:15:05.443`)
|
||||||
|
- [CVE-2024-8900](CVE-2024/CVE-2024-89xx/CVE-2024-8900.json) (`2024-09-17T19:15:29.163`)
|
||||||
|
- [CVE-2024-8944](CVE-2024/CVE-2024-89xx/CVE-2024-8944.json) (`2024-09-17T18:15:05.690`)
|
||||||
|
- [CVE-2024-8945](CVE-2024/CVE-2024-89xx/CVE-2024-8945.json) (`2024-09-17T18:15:06.023`)
|
||||||
|
- [CVE-2024-8946](CVE-2024/CVE-2024-89xx/CVE-2024-8946.json) (`2024-09-17T19:15:29.220`)
|
||||||
|
- [CVE-2024-8947](CVE-2024/CVE-2024-89xx/CVE-2024-8947.json) (`2024-09-17T19:15:29.483`)
|
||||||
|
- [CVE-2024-8948](CVE-2024/CVE-2024-89xx/CVE-2024-8948.json) (`2024-09-17T19:15:29.747`)
|
||||||
|
- [CVE-2024-8949](CVE-2024/CVE-2024-89xx/CVE-2024-8949.json) (`2024-09-17T19:15:30.017`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `50`
|
Recently modified CVEs: `28`
|
||||||
|
|
||||||
- [CVE-2024-38244](CVE-2024/CVE-2024-382xx/CVE-2024-38244.json) (`2024-09-17T16:35:18.607`)
|
- [CVE-2024-38521](CVE-2024/CVE-2024-385xx/CVE-2024-38521.json) (`2024-09-17T19:06:59.787`)
|
||||||
- [CVE-2024-38245](CVE-2024/CVE-2024-382xx/CVE-2024-38245.json) (`2024-09-17T16:34:12.777`)
|
- [CVE-2024-38522](CVE-2024/CVE-2024-385xx/CVE-2024-38522.json) (`2024-09-17T19:06:40.850`)
|
||||||
- [CVE-2024-38246](CVE-2024/CVE-2024-382xx/CVE-2024-38246.json) (`2024-09-17T16:33:20.210`)
|
- [CVE-2024-39373](CVE-2024/CVE-2024-393xx/CVE-2024-39373.json) (`2024-09-17T18:26:20.067`)
|
||||||
- [CVE-2024-38247](CVE-2024/CVE-2024-382xx/CVE-2024-38247.json) (`2024-09-17T16:30:37.957`)
|
- [CVE-2024-39374](CVE-2024/CVE-2024-393xx/CVE-2024-39374.json) (`2024-09-17T18:35:17.677`)
|
||||||
- [CVE-2024-38248](CVE-2024/CVE-2024-382xx/CVE-2024-38248.json) (`2024-09-17T16:29:47.263`)
|
- [CVE-2024-39375](CVE-2024/CVE-2024-393xx/CVE-2024-39375.json) (`2024-09-17T18:32:55.790`)
|
||||||
- [CVE-2024-38249](CVE-2024/CVE-2024-382xx/CVE-2024-38249.json) (`2024-09-17T16:28:46.993`)
|
- [CVE-2024-39376](CVE-2024/CVE-2024-393xx/CVE-2024-39376.json) (`2024-09-17T18:32:09.573`)
|
||||||
- [CVE-2024-38250](CVE-2024/CVE-2024-382xx/CVE-2024-38250.json) (`2024-09-17T16:27:12.593`)
|
- [CVE-2024-39878](CVE-2024/CVE-2024-398xx/CVE-2024-39878.json) (`2024-09-17T18:50:05.287`)
|
||||||
- [CVE-2024-43457](CVE-2024/CVE-2024-434xx/CVE-2024-43457.json) (`2024-09-17T16:25:03.037`)
|
- [CVE-2024-39879](CVE-2024/CVE-2024-398xx/CVE-2024-39879.json) (`2024-09-17T18:57:49.577`)
|
||||||
- [CVE-2024-43458](CVE-2024/CVE-2024-434xx/CVE-2024-43458.json) (`2024-09-17T16:24:06.837`)
|
- [CVE-2024-40643](CVE-2024/CVE-2024-406xx/CVE-2024-40643.json) (`2024-09-17T18:03:05.080`)
|
||||||
- [CVE-2024-43463](CVE-2024/CVE-2024-434xx/CVE-2024-43463.json) (`2024-09-17T16:08:58.350`)
|
- [CVE-2024-43238](CVE-2024/CVE-2024-432xx/CVE-2024-43238.json) (`2024-09-17T19:27:03.220`)
|
||||||
- [CVE-2024-43467](CVE-2024/CVE-2024-434xx/CVE-2024-43467.json) (`2024-09-17T16:06:44.170`)
|
- [CVE-2024-43251](CVE-2024/CVE-2024-432xx/CVE-2024-43251.json) (`2024-09-17T18:10:36.453`)
|
||||||
- [CVE-2024-43469](CVE-2024/CVE-2024-434xx/CVE-2024-43469.json) (`2024-09-17T16:05:54.650`)
|
- [CVE-2024-43255](CVE-2024/CVE-2024-432xx/CVE-2024-43255.json) (`2024-09-17T18:08:50.847`)
|
||||||
- [CVE-2024-43470](CVE-2024/CVE-2024-434xx/CVE-2024-43470.json) (`2024-09-17T17:35:02.157`)
|
- [CVE-2024-43329](CVE-2024/CVE-2024-433xx/CVE-2024-43329.json) (`2024-09-17T19:59:39.933`)
|
||||||
- [CVE-2024-44147](CVE-2024/CVE-2024-441xx/CVE-2024-44147.json) (`2024-09-17T16:35:18.863`)
|
- [CVE-2024-43330](CVE-2024/CVE-2024-433xx/CVE-2024-43330.json) (`2024-09-17T19:53:40.987`)
|
||||||
- [CVE-2024-44375](CVE-2024/CVE-2024-443xx/CVE-2024-44375.json) (`2024-09-17T17:00:40.580`)
|
- [CVE-2024-45694](CVE-2024/CVE-2024-456xx/CVE-2024-45694.json) (`2024-09-17T18:40:07.243`)
|
||||||
- [CVE-2024-46918](CVE-2024/CVE-2024-469xx/CVE-2024-46918.json) (`2024-09-17T16:35:26.513`)
|
- [CVE-2024-45695](CVE-2024/CVE-2024-456xx/CVE-2024-45695.json) (`2024-09-17T18:40:38.573`)
|
||||||
- [CVE-2024-5566](CVE-2024/CVE-2024-55xx/CVE-2024-5566.json) (`2024-09-17T16:42:01.030`)
|
- [CVE-2024-46085](CVE-2024/CVE-2024-460xx/CVE-2024-46085.json) (`2024-09-17T18:35:01.317`)
|
||||||
- [CVE-2024-5795](CVE-2024/CVE-2024-57xx/CVE-2024-5795.json) (`2024-09-17T16:24:29.340`)
|
- [CVE-2024-46362](CVE-2024/CVE-2024-463xx/CVE-2024-46362.json) (`2024-09-17T18:35:02.140`)
|
||||||
- [CVE-2024-5815](CVE-2024/CVE-2024-58xx/CVE-2024-5815.json) (`2024-09-17T16:26:44.973`)
|
- [CVE-2024-6367](CVE-2024/CVE-2024-63xx/CVE-2024-6367.json) (`2024-09-17T18:39:51.967`)
|
||||||
- [CVE-2024-6395](CVE-2024/CVE-2024-63xx/CVE-2024-6395.json) (`2024-09-17T16:30:03.617`)
|
- [CVE-2024-6368](CVE-2024/CVE-2024-63xx/CVE-2024-6368.json) (`2024-09-17T19:22:33.767`)
|
||||||
- [CVE-2024-7015](CVE-2024/CVE-2024-70xx/CVE-2024-7015.json) (`2024-09-17T17:59:00.243`)
|
- [CVE-2024-6369](CVE-2024/CVE-2024-63xx/CVE-2024-6369.json) (`2024-09-17T19:19:25.907`)
|
||||||
- [CVE-2024-8042](CVE-2024/CVE-2024-80xx/CVE-2024-8042.json) (`2024-09-17T17:25:02.330`)
|
- [CVE-2024-6370](CVE-2024/CVE-2024-63xx/CVE-2024-6370.json) (`2024-09-17T19:17:43.977`)
|
||||||
- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2024-09-17T17:24:21.793`)
|
- [CVE-2024-7526](CVE-2024/CVE-2024-75xx/CVE-2024-7526.json) (`2024-09-17T19:15:28.857`)
|
||||||
- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2024-09-17T17:32:33.380`)
|
- [CVE-2024-8610](CVE-2024/CVE-2024-86xx/CVE-2024-8610.json) (`2024-09-17T18:48:12.130`)
|
||||||
- [CVE-2024-8601](CVE-2024/CVE-2024-86xx/CVE-2024-8601.json) (`2024-09-17T17:54:39.767`)
|
- [CVE-2024-8661](CVE-2024/CVE-2024-86xx/CVE-2024-8661.json) (`2024-09-17T19:15:29.053`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
184
_state.csv
184
_state.csv
@ -167799,7 +167799,7 @@ CVE-2021-21548,0,0,c9d4aac130fa4a8f37c6eeeb1aab1b752e455abcf49719a9951fc590ff71e
|
|||||||
CVE-2021-21549,0,0,21d2d633598b434583caf68c02a69d4acdcbd4739f422bf88c93ad1e8cebf0d1,2021-05-28T11:55:46.223000
|
CVE-2021-21549,0,0,21d2d633598b434583caf68c02a69d4acdcbd4739f422bf88c93ad1e8cebf0d1,2021-05-28T11:55:46.223000
|
||||||
CVE-2021-2155,0,0,4a995da972620ab391763a628a315ad2d462c692e562010f446fa70225c01c5b,2021-04-23T22:34:14.980000
|
CVE-2021-2155,0,0,4a995da972620ab391763a628a315ad2d462c692e562010f446fa70225c01c5b,2021-04-23T22:34:14.980000
|
||||||
CVE-2021-21550,0,0,f93ecd3cf9ee15a75a1fb212dfd4459cf201a71f7bc22f3e5de4ca768f911ebe,2021-05-14T15:56:14.163000
|
CVE-2021-21550,0,0,f93ecd3cf9ee15a75a1fb212dfd4459cf201a71f7bc22f3e5de4ca768f911ebe,2021-05-14T15:56:14.163000
|
||||||
CVE-2021-21551,0,0,3d6427600ac9eca817cae47e3338402f73f6daf9aba55cf59b090da7284ba1c2,2024-09-16T23:15:49.720000
|
CVE-2021-21551,0,1,bd5d1da5c27a94a65a1e280cfb2528acba7ae835b82eb31e587408283e155a4c,2024-09-17T19:47:17.670000
|
||||||
CVE-2021-21552,0,0,2815c5820934007b3eded56fca03eef10cf57f07f07d83eeeeaef330ed923d22,2022-04-26T16:05:22.883000
|
CVE-2021-21552,0,0,2815c5820934007b3eded56fca03eef10cf57f07f07d83eeeeaef330ed923d22,2022-04-26T16:05:22.883000
|
||||||
CVE-2021-21553,0,0,9f84afa04ff6232aea5cdefc04577ed3076d4e6c832f4359b02c1227ea3f1bec,2021-08-11T18:23:06.913000
|
CVE-2021-21553,0,0,9f84afa04ff6232aea5cdefc04577ed3076d4e6c832f4359b02c1227ea3f1bec,2021-08-11T18:23:06.913000
|
||||||
CVE-2021-21554,0,0,61cccc6fe281b9f41d9908e50725e9b1bf4113d5da3e9b087e89b44d44ecf897,2022-10-25T23:43:25.277000
|
CVE-2021-21554,0,0,61cccc6fe281b9f41d9908e50725e9b1bf4113d5da3e9b087e89b44d44ecf897,2022-10-25T23:43:25.277000
|
||||||
@ -226378,7 +226378,7 @@ CVE-2023-34974,0,0,5ef0e2289e3e98c41f99d1703197d4fb71444c1747b94cd9b5b7799422f17
|
|||||||
CVE-2023-34975,0,0,4aafbc812392a63c850dd48e16a90f8d91b972c393c224c27a84ee73a41b8ef0,2024-03-08T17:15:21.860000
|
CVE-2023-34975,0,0,4aafbc812392a63c850dd48e16a90f8d91b972c393c224c27a84ee73a41b8ef0,2024-03-08T17:15:21.860000
|
||||||
CVE-2023-34976,0,0,0b3b94df7723f0287929ab195b214722cecf51cbb481f91e6d3fef26aa3d4fed,2023-10-18T19:56:09.990000
|
CVE-2023-34976,0,0,0b3b94df7723f0287929ab195b214722cecf51cbb481f91e6d3fef26aa3d4fed,2023-10-18T19:56:09.990000
|
||||||
CVE-2023-34977,0,0,1703b848a5df1bb3394008c0819906a5fa78d63da44b9476eede69386548ece9,2023-10-14T01:49:11.190000
|
CVE-2023-34977,0,0,1703b848a5df1bb3394008c0819906a5fa78d63da44b9476eede69386548ece9,2023-10-14T01:49:11.190000
|
||||||
CVE-2023-34979,0,1,e633852ec5c5cdbd8daa52e407fd8518b14c0a8225c22834c0bee36f7e5f784e,2024-09-17T16:54:20.340000
|
CVE-2023-34979,0,0,e633852ec5c5cdbd8daa52e407fd8518b14c0a8225c22834c0bee36f7e5f784e,2024-09-17T16:54:20.340000
|
||||||
CVE-2023-34980,0,0,7421b70c66abd07a5d88b0843ee0000c9380414adbb83621b8449b4538a68f8d,2024-03-08T21:19:43.127000
|
CVE-2023-34980,0,0,7421b70c66abd07a5d88b0843ee0000c9380414adbb83621b8449b4538a68f8d,2024-03-08T21:19:43.127000
|
||||||
CVE-2023-34981,0,0,a0c1096a64a6474e5577b62a0185b97ce8f132224687c311ad618bd58d87f813,2023-07-21T19:20:13.337000
|
CVE-2023-34981,0,0,a0c1096a64a6474e5577b62a0185b97ce8f132224687c311ad618bd58d87f813,2023-07-21T19:20:13.337000
|
||||||
CVE-2023-34982,0,0,69ddd85a34f25c63fa63f83f2232e3dfa5c88ebfb8548a87e8b550ae4963b78c,2023-12-08T18:53:18.187000
|
CVE-2023-34982,0,0,69ddd85a34f25c63fa63f83f2232e3dfa5c88ebfb8548a87e8b550ae4963b78c,2023-12-08T18:53:18.187000
|
||||||
@ -232543,8 +232543,8 @@ CVE-2023-43114,0,0,5e4f5cd1c5db4743617a105464fb9671601e4e2d1d7f3f630f7a7a7bdf87c
|
|||||||
CVE-2023-43115,0,0,739c9e91a7f663827562a9b43b9068654685e7e6063091a2959c0946a6b5af8f,2024-02-22T17:49:00.347000
|
CVE-2023-43115,0,0,739c9e91a7f663827562a9b43b9068654685e7e6063091a2959c0946a6b5af8f,2024-02-22T17:49:00.347000
|
||||||
CVE-2023-43116,0,0,695fd7b5325e4003993dd3a713eccb464c7087533af12719ebf49d5ecc7ba881,2024-01-03T02:41:10.107000
|
CVE-2023-43116,0,0,695fd7b5325e4003993dd3a713eccb464c7087533af12719ebf49d5ecc7ba881,2024-01-03T02:41:10.107000
|
||||||
CVE-2023-43118,0,0,f198bfe731b871c428fea82d03945caa63e9615aeea7d3ed9400745e186a0489,2023-10-27T16:25:58.820000
|
CVE-2023-43118,0,0,f198bfe731b871c428fea82d03945caa63e9615aeea7d3ed9400745e186a0489,2023-10-27T16:25:58.820000
|
||||||
CVE-2023-43119,0,1,1c365f3f3f933192ae1ddcd3aa11af7cb57d20d920048a5c2aaddffe0fdfd802,2024-09-17T17:35:03.110000
|
CVE-2023-43119,0,0,1c365f3f3f933192ae1ddcd3aa11af7cb57d20d920048a5c2aaddffe0fdfd802,2024-09-17T17:35:03.110000
|
||||||
CVE-2023-43120,0,1,1bacc1c48aae5073235b06c1240353b368abfb3e217b4382aa1ed8ff62c00265,2024-09-17T17:35:04.420000
|
CVE-2023-43120,0,0,1bacc1c48aae5073235b06c1240353b368abfb3e217b4382aa1ed8ff62c00265,2024-09-17T17:35:04.420000
|
||||||
CVE-2023-43121,0,0,94da0c6ad3a46bd77be556c4236b33e8cec0ca99922239ab9651ad3ff2b037ea,2023-10-27T15:39:58.227000
|
CVE-2023-43121,0,0,94da0c6ad3a46bd77be556c4236b33e8cec0ca99922239ab9651ad3ff2b037ea,2023-10-27T15:39:58.227000
|
||||||
CVE-2023-43122,0,0,68782f37a7e10602fa578ac9d00965f29b1f7e514976f95ce524e69dde427cb3,2023-12-15T19:16:08.323000
|
CVE-2023-43122,0,0,68782f37a7e10602fa578ac9d00965f29b1f7e514976f95ce524e69dde427cb3,2023-12-15T19:16:08.323000
|
||||||
CVE-2023-43123,0,0,e6bd79c30d5927350e51018a85983c74daf78f2818eb6c85c0ef1ca95814952f,2023-11-30T21:03:26.680000
|
CVE-2023-43123,0,0,e6bd79c30d5927350e51018a85983c74daf78f2818eb6c85c0ef1ca95814952f,2023-11-30T21:03:26.680000
|
||||||
@ -236683,7 +236683,7 @@ CVE-2023-49106,0,0,be3dd7a31243d9847a16f30451a0c0d97588194e905d505516b262307d9c7
|
|||||||
CVE-2023-49107,0,0,414e9e4e5481a415ded57ebbdce7a43314c61c3119e242e07c949c0d2ccb68fe,2024-01-23T14:04:46.917000
|
CVE-2023-49107,0,0,414e9e4e5481a415ded57ebbdce7a43314c61c3119e242e07c949c0d2ccb68fe,2024-01-23T14:04:46.917000
|
||||||
CVE-2023-49108,0,0,338c98ee8de740dfeb456a5c35f6776a68096757d990d79e74c5c440e81b0c06,2023-12-07T17:52:39.950000
|
CVE-2023-49108,0,0,338c98ee8de740dfeb456a5c35f6776a68096757d990d79e74c5c440e81b0c06,2023-12-07T17:52:39.950000
|
||||||
CVE-2023-49109,0,0,32922b053acd78f29e519fdfd1f7d4bc485fb78331af0d70603fb5a2ab603ae5,2024-08-26T18:35:02.470000
|
CVE-2023-49109,0,0,32922b053acd78f29e519fdfd1f7d4bc485fb78331af0d70603fb5a2ab603ae5,2024-08-26T18:35:02.470000
|
||||||
CVE-2023-4911,0,0,ab6511f507e1877306d09e963b50fc8718dd3cd005b204a0de1935269ad88ae7,2024-09-16T14:15:12.840000
|
CVE-2023-4911,0,1,12a6849781c99bad741f7c366e79523d1ada6c116681597eb09fb264c618e495,2024-09-17T19:46:45.837000
|
||||||
CVE-2023-49110,0,0,8b58334ac02dd5b7b1ae35b2a658333276b33522d3c8b5bb0fe8859f970db620,2024-07-03T01:42:26.413000
|
CVE-2023-49110,0,0,8b58334ac02dd5b7b1ae35b2a658333276b33522d3c8b5bb0fe8859f970db620,2024-07-03T01:42:26.413000
|
||||||
CVE-2023-49111,0,0,df0dafd2b2920c0c1ef482d192465048000f9bae0650aaf5841143aa649b80f8,2024-07-03T01:42:26.627000
|
CVE-2023-49111,0,0,df0dafd2b2920c0c1ef482d192465048000f9bae0650aaf5841143aa649b80f8,2024-07-03T01:42:26.627000
|
||||||
CVE-2023-49112,0,0,fa413702068a86fc4c7e36ae8fc0a181d36075b881dffad29e8ffcbd503a5335,2024-07-03T01:42:26.830000
|
CVE-2023-49112,0,0,fa413702068a86fc4c7e36ae8fc0a181d36075b881dffad29e8ffcbd503a5335,2024-07-03T01:42:26.830000
|
||||||
@ -243228,7 +243228,7 @@ CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f
|
|||||||
CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000
|
CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000
|
CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-20398,0,0,e5f8f1014ec093b19c3aee1e58f0d383406da3978da2e5e7f51f4a4a4493a0ae,2024-09-12T12:35:54.013000
|
CVE-2024-20398,0,0,e5f8f1014ec093b19c3aee1e58f0d383406da3978da2e5e7f51f4a4a4493a0ae,2024-09-12T12:35:54.013000
|
||||||
CVE-2024-20399,0,0,1658084bea8e53da217e51840f29eeda502742ddfa8390e457cdfba97449b979,2024-08-14T19:41:18.033000
|
CVE-2024-20399,0,1,aaa28123a1d0398c6962f2e8bd8e12b0b06fafe6901cc3060d103023db6feb09,2024-09-17T19:15:24.747000
|
||||||
CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000
|
CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000
|
||||||
CVE-2024-20400,0,0,e22f5359b4eae3d1123c96473d077f1ed8cfcffe9256c923e22249fabd71dd12,2024-07-18T12:28:43.707000
|
CVE-2024-20400,0,0,e22f5359b4eae3d1123c96473d077f1ed8cfcffe9256c923e22249fabd71dd12,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002753,2024-07-18T12:28:43.707000
|
CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002753,2024-07-18T12:28:43.707000
|
||||||
@ -255712,7 +255712,7 @@ CVE-2024-38115,0,0,02e874a63c3ed8e836207d7ec5324587e06233688848e5986aceeba6b3647
|
|||||||
CVE-2024-38116,0,0,cf5f9404ade8a272eaa60eac9416d676a7fec4246c36e11b4419656b9c2b876d,2024-08-16T16:36:12.337000
|
CVE-2024-38116,0,0,cf5f9404ade8a272eaa60eac9416d676a7fec4246c36e11b4419656b9c2b876d,2024-08-16T16:36:12.337000
|
||||||
CVE-2024-38117,0,0,02b7b7449a7b7b31a197bf1e7192817f8fc368d67a62c3b9bfb90b12627dfc8b,2024-08-16T16:40:43.667000
|
CVE-2024-38117,0,0,02b7b7449a7b7b31a197bf1e7192817f8fc368d67a62c3b9bfb90b12627dfc8b,2024-08-16T16:40:43.667000
|
||||||
CVE-2024-38118,0,0,059378b81a9f1bb6254755f38cf2c71d4b5127a9e95a1f8408020622caafceb0,2024-08-16T16:41:04.497000
|
CVE-2024-38118,0,0,059378b81a9f1bb6254755f38cf2c71d4b5127a9e95a1f8408020622caafceb0,2024-08-16T16:41:04.497000
|
||||||
CVE-2024-38119,0,1,6cd0254c18180ba05b450f24d8fc0c7dde9619c6a6375419441de9dabb7fdef4,2024-09-17T17:23:07.473000
|
CVE-2024-38119,0,0,6cd0254c18180ba05b450f24d8fc0c7dde9619c6a6375419441de9dabb7fdef4,2024-09-17T17:23:07.473000
|
||||||
CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da45,2024-05-20T13:00:34.807000
|
CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da45,2024-05-20T13:00:34.807000
|
||||||
CVE-2024-38120,0,0,2ae453d657d52bc7db9af51e7d1476c70babe1dc65f572207fedc460d3088fb7,2024-08-16T17:12:59.383000
|
CVE-2024-38120,0,0,2ae453d657d52bc7db9af51e7d1476c70babe1dc65f572207fedc460d3088fb7,2024-08-16T17:12:59.383000
|
||||||
CVE-2024-38121,0,0,a7fd6853a556fbe6804501b199f8b68852be41a932a956f803d9744290991e8e,2024-08-16T17:13:28.350000
|
CVE-2024-38121,0,0,a7fd6853a556fbe6804501b199f8b68852be41a932a956f803d9744290991e8e,2024-08-16T17:13:28.350000
|
||||||
@ -255776,16 +255776,17 @@ CVE-2024-38178,0,0,0718359cc65b3baa799d5e8ed6ced3acf1847c46f13cc5a862a0cd0e4acf4
|
|||||||
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
|
CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000
|
||||||
CVE-2024-38180,0,0,c5dfb48533b21a7d3d27760cc36627a61099c548597a405684dc960c3bc70967,2024-08-16T19:20:22.853000
|
CVE-2024-38180,0,0,c5dfb48533b21a7d3d27760cc36627a61099c548597a405684dc960c3bc70967,2024-08-16T19:20:22.853000
|
||||||
CVE-2024-38182,0,0,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000
|
CVE-2024-38182,0,0,a7e7d48d119dbb99a3d726dc4a8acec7a776a49bc59985c5f0bc4c0a335c69d9,2024-08-13T23:15:19.657000
|
||||||
|
CVE-2024-38183,1,1,c9bf42da849b887b2241034644a0d2a2d134b2b93908b9b79049be509ed6b764,2024-09-17T19:15:25.737000
|
||||||
CVE-2024-38184,0,0,a4b0c622cbd7fe170fe8fa6173164bdeb90bf3a239ad5abeac2cfb454c573553,2024-08-16T18:54:52.153000
|
CVE-2024-38184,0,0,a4b0c622cbd7fe170fe8fa6173164bdeb90bf3a239ad5abeac2cfb454c573553,2024-08-16T18:54:52.153000
|
||||||
CVE-2024-38185,0,0,a7ebd4af2d05d039a88b9936442ba2ec7acafc1c3a5c5484818b2da4665672e1,2024-08-16T19:00:43.227000
|
CVE-2024-38185,0,0,a7ebd4af2d05d039a88b9936442ba2ec7acafc1c3a5c5484818b2da4665672e1,2024-08-16T19:00:43.227000
|
||||||
CVE-2024-38186,0,0,a42ad31f77f79ac64608d2cfa2f4435f933f607446c5df5a3958a02cae1ebd2e,2024-08-16T19:01:01.663000
|
CVE-2024-38186,0,0,a42ad31f77f79ac64608d2cfa2f4435f933f607446c5df5a3958a02cae1ebd2e,2024-08-16T19:01:01.663000
|
||||||
CVE-2024-38187,0,0,2af892c594e578f08d32d399c5e28a8de7f5967d27bc97e05076defa7f0d39d3,2024-08-16T19:01:16.363000
|
CVE-2024-38187,0,0,2af892c594e578f08d32d399c5e28a8de7f5967d27bc97e05076defa7f0d39d3,2024-08-16T19:01:16.363000
|
||||||
CVE-2024-38188,0,1,0a138531ad3faef6338f7047a4236e3eda6b377b33247b427dab7155abb69e45,2024-09-17T17:49:35.983000
|
CVE-2024-38188,0,0,0a138531ad3faef6338f7047a4236e3eda6b377b33247b427dab7155abb69e45,2024-09-17T17:49:35.983000
|
||||||
CVE-2024-38189,0,0,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000
|
CVE-2024-38189,0,0,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000
|
||||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-38191,0,0,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
|
CVE-2024-38191,0,0,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
|
||||||
CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000
|
CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000
|
||||||
CVE-2024-38194,0,1,24e67804e665b5e6ea54cd0ae83ecdc2b37957cb607c73aa4be48b792efb79b7,2024-09-17T17:02:40.553000
|
CVE-2024-38194,0,0,24e67804e665b5e6ea54cd0ae83ecdc2b37957cb607c73aa4be48b792efb79b7,2024-09-17T17:02:40.553000
|
||||||
CVE-2024-38195,0,0,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
|
CVE-2024-38195,0,0,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
|
||||||
CVE-2024-38196,0,0,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
|
CVE-2024-38196,0,0,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
|
||||||
CVE-2024-38197,0,0,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
|
CVE-2024-38197,0,0,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
|
||||||
@ -255805,42 +255806,42 @@ CVE-2024-38211,0,0,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c
|
|||||||
CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000
|
CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000
|
||||||
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
|
CVE-2024-38214,0,0,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
|
||||||
CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000
|
CVE-2024-38215,0,0,0ced8c69c344bb918392454f0cf78558fdfc7db995aead6aebc3687298b1b7c6,2024-08-16T19:02:41.517000
|
||||||
CVE-2024-38216,0,1,bdedf369bc071d846c0e3fa177672115116e1cec539a9cf2b04fc3239cbd788e,2024-09-17T17:00:29.123000
|
CVE-2024-38216,0,0,bdedf369bc071d846c0e3fa177672115116e1cec539a9cf2b04fc3239cbd788e,2024-09-17T17:00:29.123000
|
||||||
CVE-2024-38217,0,0,904803354f9b5ffa548ccb340d55c93e6c3ec02f6ae6943d19b54f74512e0998,2024-09-12T01:00:01.133000
|
CVE-2024-38217,0,0,904803354f9b5ffa548ccb340d55c93e6c3ec02f6ae6943d19b54f74512e0998,2024-09-12T01:00:01.133000
|
||||||
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
|
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
|
||||||
CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000
|
CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000
|
||||||
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
||||||
CVE-2024-38220,0,1,a9016c861c2695b31a1ce105f60c8a7497ab86c35f7fba294238a213f50a54ec,2024-09-17T16:59:37.167000
|
CVE-2024-38220,0,0,a9016c861c2695b31a1ce105f60c8a7497ab86c35f7fba294238a213f50a54ec,2024-09-17T16:59:37.167000
|
||||||
CVE-2024-38222,0,0,546082c5b79596cf91835be1f1261e7e773f97fddb9c4b3f28252402882ca020,2024-09-12T12:35:54.013000
|
CVE-2024-38222,0,0,546082c5b79596cf91835be1f1261e7e773f97fddb9c4b3f28252402882ca020,2024-09-12T12:35:54.013000
|
||||||
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
|
CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
|
||||||
CVE-2024-38225,0,1,a8f1d15f2be1c40a6f29c5f7c1fea9920ae59300774a3c9a21af35434dbe2539,2024-09-17T16:58:39.197000
|
CVE-2024-38225,0,0,a8f1d15f2be1c40a6f29c5f7c1fea9920ae59300774a3c9a21af35434dbe2539,2024-09-17T16:58:39.197000
|
||||||
CVE-2024-38226,0,0,4bf5fa6111be97c9b6ca9705aef4b23890b24164017bf51690e04459d4fe4310,2024-09-12T01:00:01.133000
|
CVE-2024-38226,0,0,4bf5fa6111be97c9b6ca9705aef4b23890b24164017bf51690e04459d4fe4310,2024-09-12T01:00:01.133000
|
||||||
CVE-2024-38227,0,1,e1166a8b3601198afaa0f36efd17412978a4ad369bdfa6dfc4ece85e44aa4ac2,2024-09-17T16:57:39.267000
|
CVE-2024-38227,0,0,e1166a8b3601198afaa0f36efd17412978a4ad369bdfa6dfc4ece85e44aa4ac2,2024-09-17T16:57:39.267000
|
||||||
CVE-2024-38228,0,1,df0f9c7bad92e403c53d10121c41c8156540867d96dcbabab24d783749d190e6,2024-09-17T16:57:54.950000
|
CVE-2024-38228,0,0,df0f9c7bad92e403c53d10121c41c8156540867d96dcbabab24d783749d190e6,2024-09-17T16:57:54.950000
|
||||||
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
|
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
|
||||||
CVE-2024-38230,0,1,436e1a3ea40688620e23f71172bd013c1c71331c5024bfa4d058c80198524f43,2024-09-17T16:56:15.420000
|
CVE-2024-38230,0,0,436e1a3ea40688620e23f71172bd013c1c71331c5024bfa4d058c80198524f43,2024-09-17T16:56:15.420000
|
||||||
CVE-2024-38231,0,1,05ee79528b663f84aad9814eb88867e2019ce1f3aa0eab3c47c2ec9d53782579,2024-09-17T16:52:56.323000
|
CVE-2024-38231,0,0,05ee79528b663f84aad9814eb88867e2019ce1f3aa0eab3c47c2ec9d53782579,2024-09-17T16:52:56.323000
|
||||||
CVE-2024-38232,0,1,1f71038470945b48f8df871a5642d1be103fea60eb77230b2ef11889ee46790d,2024-09-17T16:52:05.267000
|
CVE-2024-38232,0,0,1f71038470945b48f8df871a5642d1be103fea60eb77230b2ef11889ee46790d,2024-09-17T16:52:05.267000
|
||||||
CVE-2024-38233,0,1,1e1502a82368f23dbfc59a7f1ea397cd970cd406b1816127a34b2179396270a5,2024-09-17T16:51:44.543000
|
CVE-2024-38233,0,0,1e1502a82368f23dbfc59a7f1ea397cd970cd406b1816127a34b2179396270a5,2024-09-17T16:51:44.543000
|
||||||
CVE-2024-38234,0,1,4f9963d580e6f841b413d71a70cc92d272b5cdc5b08316e7e4846bd3bcb529a7,2024-09-17T16:50:39.347000
|
CVE-2024-38234,0,0,4f9963d580e6f841b413d71a70cc92d272b5cdc5b08316e7e4846bd3bcb529a7,2024-09-17T16:50:39.347000
|
||||||
CVE-2024-38235,0,1,ed295904b2501c8916415a634937779dfb1f93c51d0554685f78033ee4192518,2024-09-17T16:43:33.167000
|
CVE-2024-38235,0,0,ed295904b2501c8916415a634937779dfb1f93c51d0554685f78033ee4192518,2024-09-17T16:43:33.167000
|
||||||
CVE-2024-38236,0,1,7f46194358a02788aff0a23400c6373d7b3a367d5d5dd7d0dc250643053daf3e,2024-09-17T16:42:03.620000
|
CVE-2024-38236,0,0,7f46194358a02788aff0a23400c6373d7b3a367d5d5dd7d0dc250643053daf3e,2024-09-17T16:42:03.620000
|
||||||
CVE-2024-38237,0,1,64a745695e090bf8f44b3d2ef06ed5e19ea3d7f38c1b4b3d4020e5a296b9ac7e,2024-09-17T16:41:28.360000
|
CVE-2024-38237,0,0,64a745695e090bf8f44b3d2ef06ed5e19ea3d7f38c1b4b3d4020e5a296b9ac7e,2024-09-17T16:41:28.360000
|
||||||
CVE-2024-38238,0,1,af1d298d3472b254f729dfc6b8bc4c1206830a876d0dfaeaa08389e47fed1974,2024-09-17T16:40:55.423000
|
CVE-2024-38238,0,0,af1d298d3472b254f729dfc6b8bc4c1206830a876d0dfaeaa08389e47fed1974,2024-09-17T16:40:55.423000
|
||||||
CVE-2024-38239,0,1,f3665662dad5f4dab13c3c0380faf5d0b970d6b8afa8a12b5273a3cc934125c8,2024-09-17T16:40:22.847000
|
CVE-2024-38239,0,0,f3665662dad5f4dab13c3c0380faf5d0b970d6b8afa8a12b5273a3cc934125c8,2024-09-17T16:40:22.847000
|
||||||
CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000
|
CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000
|
||||||
CVE-2024-38240,0,1,7a6877c0af5e62faeebb6fe0fa4a46b46373500e3b873b9132e3d2d0e722f01d,2024-09-17T16:38:39.910000
|
CVE-2024-38240,0,0,7a6877c0af5e62faeebb6fe0fa4a46b46373500e3b873b9132e3d2d0e722f01d,2024-09-17T16:38:39.910000
|
||||||
CVE-2024-38241,0,1,38ca452dff680da3fcee01a65facf171723236706198a32af50060a957f0ebeb,2024-09-17T16:37:53
|
CVE-2024-38241,0,0,38ca452dff680da3fcee01a65facf171723236706198a32af50060a957f0ebeb,2024-09-17T16:37:53
|
||||||
CVE-2024-38242,0,1,a7367e7c507369b83df0629e31bd63a855493a32b6de9891555814aade947c1b,2024-09-17T16:37:16.730000
|
CVE-2024-38242,0,0,a7367e7c507369b83df0629e31bd63a855493a32b6de9891555814aade947c1b,2024-09-17T16:37:16.730000
|
||||||
CVE-2024-38243,0,1,bc1042a6c528c44c091432cb18a4b361f2c92fc69972cfe986d247066bdc0163,2024-09-17T16:36:12.010000
|
CVE-2024-38243,0,0,bc1042a6c528c44c091432cb18a4b361f2c92fc69972cfe986d247066bdc0163,2024-09-17T16:36:12.010000
|
||||||
CVE-2024-38244,0,1,70e69202b2e795e9cc6e63831ede7bc8b094353d8698fb7153492692f8bde5f3,2024-09-17T16:35:18.607000
|
CVE-2024-38244,0,0,70e69202b2e795e9cc6e63831ede7bc8b094353d8698fb7153492692f8bde5f3,2024-09-17T16:35:18.607000
|
||||||
CVE-2024-38245,0,1,a767a73dc6f442e90b36c657f52a3a9e8d8c7cb9898904ac48e69461777798e0,2024-09-17T16:34:12.777000
|
CVE-2024-38245,0,0,a767a73dc6f442e90b36c657f52a3a9e8d8c7cb9898904ac48e69461777798e0,2024-09-17T16:34:12.777000
|
||||||
CVE-2024-38246,0,1,52415651570043bd52b5317b00f182ce5f5db37d55d7522f658d9ca83e99afcf,2024-09-17T16:33:20.210000
|
CVE-2024-38246,0,0,52415651570043bd52b5317b00f182ce5f5db37d55d7522f658d9ca83e99afcf,2024-09-17T16:33:20.210000
|
||||||
CVE-2024-38247,0,1,05d4ca04442421be8e663e79b2ac3dc9d088c155983b14ebe6a4888aeb6c6533,2024-09-17T16:30:37.957000
|
CVE-2024-38247,0,0,05d4ca04442421be8e663e79b2ac3dc9d088c155983b14ebe6a4888aeb6c6533,2024-09-17T16:30:37.957000
|
||||||
CVE-2024-38248,0,1,5da03c64b6cc39975806749a96c752e11127c2384b719ed5bba9da35bc7f7b2f,2024-09-17T16:29:47.263000
|
CVE-2024-38248,0,0,5da03c64b6cc39975806749a96c752e11127c2384b719ed5bba9da35bc7f7b2f,2024-09-17T16:29:47.263000
|
||||||
CVE-2024-38249,0,1,5f1fbd88de6768f6b6cef1adf646593ca6c860a2b8fd7db061fe953938697807,2024-09-17T16:28:46.993000
|
CVE-2024-38249,0,0,5f1fbd88de6768f6b6cef1adf646593ca6c860a2b8fd7db061fe953938697807,2024-09-17T16:28:46.993000
|
||||||
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
|
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
|
||||||
CVE-2024-38250,0,1,acc8c041b5bb5ffe101c2b85cbef2b6922f42f19867f7d0b00ea1d0a8cc196db,2024-09-17T16:27:12.593000
|
CVE-2024-38250,0,0,acc8c041b5bb5ffe101c2b85cbef2b6922f42f19867f7d0b00ea1d0a8cc196db,2024-09-17T16:27:12.593000
|
||||||
CVE-2024-38252,0,0,6469f2116fecff10b3fac36d53cdeb28de763c385aca7d73b3649b24b01808d9,2024-09-13T15:23:18.010000
|
CVE-2024-38252,0,0,6469f2116fecff10b3fac36d53cdeb28de763c385aca7d73b3649b24b01808d9,2024-09-13T15:23:18.010000
|
||||||
CVE-2024-38253,0,0,3419bc908b3c8eca0a5649994b4df17f0edf85700f941607866ddc31d72da0a4,2024-09-13T15:20:59.970000
|
CVE-2024-38253,0,0,3419bc908b3c8eca0a5649994b4df17f0edf85700f941607866ddc31d72da0a4,2024-09-13T15:20:59.970000
|
||||||
CVE-2024-38254,0,0,51e07d963269d194219f11a7f07791c63d4b27fc12cb6d3b8ac346f9bf2c86ec,2024-09-13T15:16:48.427000
|
CVE-2024-38254,0,0,51e07d963269d194219f11a7f07791c63d4b27fc12cb6d3b8ac346f9bf2c86ec,2024-09-13T15:16:48.427000
|
||||||
@ -255924,6 +255925,7 @@ CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b
|
|||||||
CVE-2024-38375,0,0,626cc37017b5b99d342165d2bf910513bdb2fdf5a18a0e825a4ce243860e1792,2024-06-27T12:47:19.847000
|
CVE-2024-38375,0,0,626cc37017b5b99d342165d2bf910513bdb2fdf5a18a0e825a4ce243860e1792,2024-06-27T12:47:19.847000
|
||||||
CVE-2024-38379,0,0,d33357e4c17803b0e6fe2dcbf0bca5d072d51824a9aa4168eda4690ab04b1f6e,2024-06-24T12:57:36.513000
|
CVE-2024-38379,0,0,d33357e4c17803b0e6fe2dcbf0bca5d072d51824a9aa4168eda4690ab04b1f6e,2024-06-24T12:57:36.513000
|
||||||
CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d07b,2024-08-06T19:35:06.410000
|
CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d07b,2024-08-06T19:35:06.410000
|
||||||
|
CVE-2024-38380,1,1,627f70dd365a9409327379c2bf73f222a1302e203d88da4a7b50dd6bb1c7485f,2024-09-17T18:15:03.680000
|
||||||
CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000
|
CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000
|
||||||
CVE-2024-38382,0,0,5eb9605172a2cc2881cc14a987b3697e7a685364bc9cd84ed64848cef9c33fdc,2024-09-04T17:10:56.497000
|
CVE-2024-38382,0,0,5eb9605172a2cc2881cc14a987b3697e7a685364bc9cd84ed64848cef9c33fdc,2024-09-04T17:10:56.497000
|
||||||
CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000
|
CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000
|
||||||
@ -256025,8 +256027,8 @@ CVE-2024-38518,0,0,aa2f02f8ed86bcfd7fc6b425ddf1679e310303c5dfcfa85d7522473c60b19
|
|||||||
CVE-2024-38519,0,0,3b366d37f50f101cb2bfcdc78fd05441af2a546f95a42ed60fc08615be04c6b0,2024-07-04T00:15:01.980000
|
CVE-2024-38519,0,0,3b366d37f50f101cb2bfcdc78fd05441af2a546f95a42ed60fc08615be04c6b0,2024-07-04T00:15:01.980000
|
||||||
CVE-2024-3852,0,0,23d67cc6cd9eaaffcbcd8c6df21d1387cf7355b2b4540b1c97d43e33361312ed,2024-07-03T02:06:44.987000
|
CVE-2024-3852,0,0,23d67cc6cd9eaaffcbcd8c6df21d1387cf7355b2b4540b1c97d43e33361312ed,2024-07-03T02:06:44.987000
|
||||||
CVE-2024-38520,0,0,5adf4dbb90762553b78084199dfb3abdb3d5337ac3a1f068b4f090511f700047,2024-07-02T16:15:04.517000
|
CVE-2024-38520,0,0,5adf4dbb90762553b78084199dfb3abdb3d5337ac3a1f068b4f090511f700047,2024-07-02T16:15:04.517000
|
||||||
CVE-2024-38521,0,0,df5b9b471d98848106b372b92778ca10848eed3dc40164d409f2f04227ac21b3,2024-07-01T12:37:24.220000
|
CVE-2024-38521,0,1,90f108087e68d1883645e21f6c34f9bb5ad8f217367b484fcef228afa0eb77a5,2024-09-17T19:06:59.787000
|
||||||
CVE-2024-38522,0,0,a7cecf7d84f614a3e9852f93a3b60a15af40bf45b5b84237a2944ff705039bfe,2024-07-01T12:37:24.220000
|
CVE-2024-38522,0,1,2f9445fd760fb3ce663c1b227585d6ed61b5120dc4a1ed774a18962b5fa1f36f,2024-09-17T19:06:40.850000
|
||||||
CVE-2024-38523,0,0,98e840731b35fd9082344b70afbfc25df92f26b817bf7b41fdcf2e1d10b8eba8,2024-06-28T10:27:00.920000
|
CVE-2024-38523,0,0,98e840731b35fd9082344b70afbfc25df92f26b817bf7b41fdcf2e1d10b8eba8,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-38525,0,0,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83420,2024-07-01T12:37:24.220000
|
CVE-2024-38525,0,0,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83420,2024-07-01T12:37:24.220000
|
||||||
CVE-2024-38526,0,0,9de1edb82d6bb6115c33dfe170943d78568f85fe7ab5266f92239979ec0b9259,2024-07-24T17:15:10.910000
|
CVE-2024-38526,0,0,9de1edb82d6bb6115c33dfe170943d78568f85fe7ab5266f92239979ec0b9259,2024-07-24T17:15:10.910000
|
||||||
@ -256275,6 +256277,8 @@ CVE-2024-38808,0,0,53d74bad70081ff05a1300457357e667e449199d0759115b64cb9ca097eee
|
|||||||
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
|
CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000
|
||||||
CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000
|
CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000
|
||||||
CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000
|
CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000
|
||||||
|
CVE-2024-38812,1,1,41546b64be2607ad2e2faa73d70efbfa5cf304a2244d8a5f27568630e47e0e24,2024-09-17T18:15:03.920000
|
||||||
|
CVE-2024-38813,1,1,76b43c6b19fa6b583cb98801f91c6de1e1ee63de52da25e510bb5573ec81ad1f,2024-09-17T18:15:04.127000
|
||||||
CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269232,2024-09-13T14:06:04.777000
|
CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269232,2024-09-13T14:06:04.777000
|
||||||
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000
|
||||||
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
|
||||||
@ -256525,10 +256529,10 @@ CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b81489
|
|||||||
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
|
CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000
|
||||||
CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000
|
CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000
|
||||||
CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000
|
CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000
|
||||||
CVE-2024-39373,0,0,4d8c0982e7cdb1147cca590a3a2ae7c9ffdce8617464f62ef5a2a6f5e507484b,2024-06-27T17:11:52.390000
|
CVE-2024-39373,0,1,49313ed17734e6debe931be9bab23ed5eb2e40aab9f298cb157f10a9804c26ee,2024-09-17T18:26:20.067000
|
||||||
CVE-2024-39374,0,0,ad17efc6aa67e7b26f65d3189d2658b2488a44464309406f364c5bd8e73d4193,2024-06-27T17:11:52.390000
|
CVE-2024-39374,0,1,1c85587299a2e49a1d50d1e204ff31d15b82942479962a6e767f3200acaf83ed,2024-09-17T18:35:17.677000
|
||||||
CVE-2024-39375,0,0,63cd2388720af3df4268f688ad707fe003b641c7c19fcda0eb4bc47c67645098,2024-06-27T17:11:52.390000
|
CVE-2024-39375,0,1,31332bf05b45d0877e0bebd823a0b8990f670564be1a4f26de0abecda30c158b,2024-09-17T18:32:55.790000
|
||||||
CVE-2024-39376,0,0,c5700ded29923bb8323d7f97de6c0ff12124e48d1fd05b5e64b815253ca12a53,2024-06-27T17:11:52.390000
|
CVE-2024-39376,0,1,094b2854b24d67516e532564da0172680d99cf6023e4bba311dd29dab7b73993,2024-09-17T18:32:09.573000
|
||||||
CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000
|
CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000
|
||||||
CVE-2024-39378,0,0,3b61d992513510d880f3841406cf286a1cca8ad174b6153ccc78fa173926cd3a,2024-09-11T16:26:11.920000
|
CVE-2024-39378,0,0,3b61d992513510d880f3841406cf286a1cca8ad174b6153ccc78fa173926cd3a,2024-09-11T16:26:11.920000
|
||||||
CVE-2024-39379,0,0,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000
|
CVE-2024-39379,0,0,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000
|
||||||
@ -256911,8 +256915,8 @@ CVE-2024-39874,0,0,1b0fc2539c0ac6bc22bd18d777d736e1cbea19ccdbf3d54727dde78f13e6e
|
|||||||
CVE-2024-39875,0,0,b76f0c8a29ed6ff66b830768611b71994a8f96bbc79bbe2616adacce32860808,2024-08-07T19:23:39.247000
|
CVE-2024-39875,0,0,b76f0c8a29ed6ff66b830768611b71994a8f96bbc79bbe2616adacce32860808,2024-08-07T19:23:39.247000
|
||||||
CVE-2024-39876,0,0,c10d95a00655ea784974456837401b1167b43b9873d48be8c6f0ce574516dd40,2024-08-07T19:26:42.817000
|
CVE-2024-39876,0,0,c10d95a00655ea784974456837401b1167b43b9873d48be8c6f0ce574516dd40,2024-08-07T19:26:42.817000
|
||||||
CVE-2024-39877,0,0,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624ace,2024-08-01T13:56:00.307000
|
CVE-2024-39877,0,0,c77d04cd34c34f80c2f57f96e1d07b46b656b0a0c6825dfb1bb5b67677624ace,2024-08-01T13:56:00.307000
|
||||||
CVE-2024-39878,0,0,0884b35ea3731cd2e7aface35755844c8a96ce85e8367efdb0fd3e2b0e3cd639,2024-07-02T12:09:16.907000
|
CVE-2024-39878,0,1,0b85fd94bf462600d0696c96f8bfdba17c025209e72a9e721664cd0b04bb9785,2024-09-17T18:50:05.287000
|
||||||
CVE-2024-39879,0,0,57a396f9b6ba826fa36e3c1f5ccae8a33f1ea2aaaf895368564de864bfa8b6fd,2024-07-02T12:09:16.907000
|
CVE-2024-39879,0,1,7266007dde77a47e10772155bfc472987e8cd3d09c2a2a4e8c4f4fc7f2bbb5ea,2024-09-17T18:57:49.577000
|
||||||
CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000
|
CVE-2024-3988,0,0,517f8158b252993c28722d017d1da97b60c9d30d3cb2f421d187823784125569,2024-04-25T13:18:13.537000
|
||||||
CVE-2024-39880,0,0,420ebd90d89764260e107140863beba300a2b5634b205f073c7d4f785b402bdb,2024-08-29T17:38:18.727000
|
CVE-2024-39880,0,0,420ebd90d89764260e107140863beba300a2b5634b205f073c7d4f785b402bdb,2024-08-29T17:38:18.727000
|
||||||
CVE-2024-39881,0,0,6a404ecfc7936b252de6c2cb5c510b917ceff7b4e467b10d3074afc0f4e7d06b,2024-08-29T17:37:05.707000
|
CVE-2024-39881,0,0,6a404ecfc7936b252de6c2cb5c510b917ceff7b4e467b10d3074afc0f4e7d06b,2024-08-29T17:37:05.707000
|
||||||
@ -257170,7 +257174,7 @@ CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d31
|
|||||||
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
|
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000
|
CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000
|
||||||
CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
|
CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000
|
||||||
CVE-2024-40643,0,0,1f4a53750cce877c070fa28376ffbbab126ba978b1a2b66da1284804f50a6361,2024-09-09T18:30:12.050000
|
CVE-2024-40643,0,1,ca573e96f587d7259446ef4b170297ba613fd054125b5d01ef7c69361b12e169,2024-09-17T18:03:05.080000
|
||||||
CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
|
CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000
|
||||||
CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000
|
CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000
|
||||||
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
|
CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000
|
||||||
@ -258419,6 +258423,9 @@ CVE-2024-42495,0,0,ec6874fdfc9b12ec8ef1020de6e62e8d7226ab1ffee9b169624f6e5854e00
|
|||||||
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
|
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
|
||||||
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
|
||||||
CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000
|
CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000
|
||||||
|
CVE-2024-42501,1,1,6927eb41b24304065dcff622f5a822b32573e49cbb183f8391b90df896ae9853,2024-09-17T18:15:04.337000
|
||||||
|
CVE-2024-42502,1,1,c31c2890cc90ca3254f9f0610ec7468427df704b53028af11db1036fa9a330bb,2024-09-17T18:15:04.527000
|
||||||
|
CVE-2024-42503,1,1,0d1f7916b74d79063ab190f97e8dbd7a78e1b2c8030ce21c28ae9f4888abbcca,2024-09-17T18:15:04.710000
|
||||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||||
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
|
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
|
||||||
@ -258773,7 +258780,7 @@ CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b5803
|
|||||||
CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000
|
CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000
|
||||||
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
|
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
|
||||||
CVE-2024-43236,0,0,023011a32949e87f6bc318354cd0a34190696d548e7018a1624254d686b58e3b,2024-08-19T18:36:07.297000
|
CVE-2024-43236,0,0,023011a32949e87f6bc318354cd0a34190696d548e7018a1624254d686b58e3b,2024-08-19T18:36:07.297000
|
||||||
CVE-2024-43238,0,0,20350528ccd988694af6ca76b6cf21c1a4a8a6d4f0fc04537b0f3976d98d42d2,2024-08-19T12:59:59.177000
|
CVE-2024-43238,0,1,55a9737df7d3a7bb29b80dc0b631f8b007fbdc439de2c352cd0a0288d492e84f,2024-09-17T19:27:03.220000
|
||||||
CVE-2024-43239,0,0,79d51d8573e5ae7ca3d4a994fc625c6641954aca391d8556cc284fe714bd5440,2024-08-19T12:59:59.177000
|
CVE-2024-43239,0,0,79d51d8573e5ae7ca3d4a994fc625c6641954aca391d8556cc284fe714bd5440,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000
|
CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000
|
||||||
CVE-2024-43240,0,0,c0337462e0216defbb94a6add218ed181e8b2fd60593c83358aa092a744bcfcb,2024-09-06T16:57:58.130000
|
CVE-2024-43240,0,0,c0337462e0216defbb94a6add218ed181e8b2fd60593c83358aa092a744bcfcb,2024-09-06T16:57:58.130000
|
||||||
@ -258787,9 +258794,9 @@ CVE-2024-43248,0,0,37e2b8cca688a0234dda3a9dab634a52bdc30376015e490ed29d6343038e8
|
|||||||
CVE-2024-43249,0,0,daa9c739bf37aa314068fc6a2bce3483193f437aa67d0043602d733ed9ca6ca0,2024-09-06T16:30:49.183000
|
CVE-2024-43249,0,0,daa9c739bf37aa314068fc6a2bce3483193f437aa67d0043602d733ed9ca6ca0,2024-09-06T16:30:49.183000
|
||||||
CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000
|
CVE-2024-4325,0,0,76d9bad54216516dac1d03211c486bb781521a024ebba7e9a0e98047a78d0bf5,2024-06-07T14:56:05.647000
|
||||||
CVE-2024-43250,0,0,a841443f689b24b465816a01f105b6a5bcdc875b6da892ea807eb0553baf62d4,2024-09-06T16:02:16.067000
|
CVE-2024-43250,0,0,a841443f689b24b465816a01f105b6a5bcdc875b6da892ea807eb0553baf62d4,2024-09-06T16:02:16.067000
|
||||||
CVE-2024-43251,0,0,288c86c035f283137de3da99ba5c14446ca5b1bddcca54ee12bc0425a59e8a6b,2024-08-27T13:01:52.723000
|
CVE-2024-43251,0,1,7154911118b81496671cf51187ef674b23ebccccdab2c0d297eb1629baa691c4,2024-09-17T18:10:36.453000
|
||||||
CVE-2024-43252,0,0,b771f9e76d477a6b132719a51019c908bb6489774cbaa7cda1dfd67b307e9d1d,2024-08-19T18:36:07.297000
|
CVE-2024-43252,0,0,b771f9e76d477a6b132719a51019c908bb6489774cbaa7cda1dfd67b307e9d1d,2024-08-19T18:36:07.297000
|
||||||
CVE-2024-43255,0,0,b6d91cbee1f38dc4f34c4c2cea2111eef43f73e9868d430d05c5d2d072f1af75,2024-08-27T13:01:52.723000
|
CVE-2024-43255,0,1,aaca36022a4723e66eba0421c46a3b8c92a4b08a6a20bb4a3211673b2b520f30,2024-09-17T18:08:50.847000
|
||||||
CVE-2024-43256,0,0,9b32c5c8838f182333dfeb7852659a728b05e24f477fd863931dcda117b0499f,2024-08-19T18:36:07.297000
|
CVE-2024-43256,0,0,9b32c5c8838f182333dfeb7852659a728b05e24f477fd863931dcda117b0499f,2024-08-19T18:36:07.297000
|
||||||
CVE-2024-43257,0,0,f0c79a7747157f0e00f7f413a5da255733f6bd31800fc0087efe67e7afe88d11,2024-09-12T21:09:58.707000
|
CVE-2024-43257,0,0,f0c79a7747157f0e00f7f413a5da255733f6bd31800fc0087efe67e7afe88d11,2024-09-12T21:09:58.707000
|
||||||
CVE-2024-43258,0,0,d57814356657cd8acff5874321f29ff4a0404beb5cff61e8c6619c1a12a7ad70,2024-09-12T21:11:46.190000
|
CVE-2024-43258,0,0,d57814356657cd8acff5874321f29ff4a0404beb5cff61e8c6619c1a12a7ad70,2024-09-12T21:11:46.190000
|
||||||
@ -258852,9 +258859,9 @@ CVE-2024-43325,0,0,c7e71f31efef4adfd7b652340fa8f95169ea702400525766f98d28f2dbed3
|
|||||||
CVE-2024-43326,0,0,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000
|
CVE-2024-43326,0,0,4b4201c18581215a5b56fb12e75b3d09f6bbdb92546d9bf78577651d9ba94f8c,2024-08-20T15:44:20.567000
|
||||||
CVE-2024-43327,0,0,acd099b8109083e63b5d816040ddc307da420ff33ea37d9f6c3f5b17cd1e029a,2024-08-19T12:59:59.177000
|
CVE-2024-43327,0,0,acd099b8109083e63b5d816040ddc307da420ff33ea37d9f6c3f5b17cd1e029a,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-43328,0,0,45b76704130d3d162b10a10d0e1610ea82761ed70e22ff8c701dd47566965f65,2024-08-20T15:44:20.567000
|
CVE-2024-43328,0,0,45b76704130d3d162b10a10d0e1610ea82761ed70e22ff8c701dd47566965f65,2024-08-20T15:44:20.567000
|
||||||
CVE-2024-43329,0,0,fe527d97b7711be7659463b74107f4193300cf5f6549ae41252b430437b3d67d,2024-08-19T12:59:59.177000
|
CVE-2024-43329,0,1,2d889991c7054adfc3510a6f2a36341cd1187c790fca1d7653a4d88b7b6182fe,2024-09-17T19:59:39.933000
|
||||||
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
|
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
|
||||||
CVE-2024-43330,0,0,7e971811ebd0a65648731bb4b6daf21c09bc489212596a4e87c1119a464437fc,2024-08-19T12:59:59.177000
|
CVE-2024-43330,0,1,292f3679d217f19b4d90b8fcf1aedfdc57b505addc17d70d5b69292c5274be95,2024-09-17T19:53:40.987000
|
||||||
CVE-2024-43331,0,0,6d28b8bc0904e0c3dd60c41d48cef3313c73e3f7ea773d2fece6fad186c8439a,2024-08-22T12:48:02.790000
|
CVE-2024-43331,0,0,6d28b8bc0904e0c3dd60c41d48cef3313c73e3f7ea773d2fece6fad186c8439a,2024-08-22T12:48:02.790000
|
||||||
CVE-2024-43335,0,0,3dff6fb5a934fb330e842040b60a43d630834d9fc8b273f121537efea122bdd4,2024-09-13T14:25:12.027000
|
CVE-2024-43335,0,0,3dff6fb5a934fb330e842040b60a43d630834d9fc8b273f121537efea122bdd4,2024-09-13T14:25:12.027000
|
||||||
CVE-2024-43336,0,0,01d8580ca263b1fc31791415195a5d129d6d58e08f3205c4e1eb6ed293dbb6d7,2024-08-27T16:00:25.177000
|
CVE-2024-43336,0,0,01d8580ca263b1fc31791415195a5d129d6d58e08f3205c4e1eb6ed293dbb6d7,2024-08-27T16:00:25.177000
|
||||||
@ -258937,18 +258944,19 @@ CVE-2024-43444,0,0,869e12b3e86ded10c38d8795cc34fa22bd804c0b1d5e73f28a97d45f8e95e
|
|||||||
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
|
CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000
|
CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000
|
||||||
CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000
|
CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000
|
||||||
CVE-2024-43457,0,1,2d39da1954a904290cdb655f8413466318bc2fb9e79e95d1239baead98599e5b,2024-09-17T16:25:03.037000
|
CVE-2024-43457,0,0,2d39da1954a904290cdb655f8413466318bc2fb9e79e95d1239baead98599e5b,2024-09-17T16:25:03.037000
|
||||||
CVE-2024-43458,0,1,d510a08722ad4b01e3bd416a3ff1688485cee9b82fed026222465a1f7268669b,2024-09-17T16:24:06.837000
|
CVE-2024-43458,0,0,d510a08722ad4b01e3bd416a3ff1688485cee9b82fed026222465a1f7268669b,2024-09-17T16:24:06.837000
|
||||||
CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000
|
CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000
|
||||||
|
CVE-2024-43460,1,1,225ea15c3e8295f9543f2bcecd686c86948b7400ecfe4305a23f6741e2037cd2,2024-09-17T19:15:27.500000
|
||||||
CVE-2024-43461,0,0,f99d1573520331446defc217a57faaa313e0a37923c807afd46dd8502623f146,2024-09-17T11:17:22.597000
|
CVE-2024-43461,0,0,f99d1573520331446defc217a57faaa313e0a37923c807afd46dd8502623f146,2024-09-17T11:17:22.597000
|
||||||
CVE-2024-43463,0,1,82ed3b86032aeae7f20effff7ac01fc984a98742e5e7914a0bb7560978dad83f,2024-09-17T16:08:58.350000
|
CVE-2024-43463,0,0,82ed3b86032aeae7f20effff7ac01fc984a98742e5e7914a0bb7560978dad83f,2024-09-17T16:08:58.350000
|
||||||
CVE-2024-43464,0,0,42956114f68b1d67be14842639914b420d38d850d63203f2075370bc159d7270,2024-09-13T14:48:05.247000
|
CVE-2024-43464,0,0,42956114f68b1d67be14842639914b420d38d850d63203f2075370bc159d7270,2024-09-13T14:48:05.247000
|
||||||
CVE-2024-43465,0,0,5d9250aa7e038ca65d71b1061a2d776c0916a5a9d4039f0bae2a50bea6fdecc1,2024-09-13T14:46:33.210000
|
CVE-2024-43465,0,0,5d9250aa7e038ca65d71b1061a2d776c0916a5a9d4039f0bae2a50bea6fdecc1,2024-09-13T14:46:33.210000
|
||||||
CVE-2024-43466,0,0,b946ecd1f88611673cbb3be558d8f8e03be741959edeb8309467094a9d78f0b9,2024-09-13T14:44:16.013000
|
CVE-2024-43466,0,0,b946ecd1f88611673cbb3be558d8f8e03be741959edeb8309467094a9d78f0b9,2024-09-13T14:44:16.013000
|
||||||
CVE-2024-43467,0,1,06c9c5b2eced8d091ee4cd0089976d978adbc50aa9ed4a3fe075bf3facc90f85,2024-09-17T16:06:44.170000
|
CVE-2024-43467,0,0,06c9c5b2eced8d091ee4cd0089976d978adbc50aa9ed4a3fe075bf3facc90f85,2024-09-17T16:06:44.170000
|
||||||
CVE-2024-43469,0,1,e36b9f8f055a7485db37cb8b3b3c3e478802be4653464a62886fa61cd048c55e,2024-09-17T16:05:54.650000
|
CVE-2024-43469,0,0,e36b9f8f055a7485db37cb8b3b3c3e478802be4653464a62886fa61cd048c55e,2024-09-17T16:05:54.650000
|
||||||
CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000
|
CVE-2024-4347,0,0,f9a9185c34e13435315e8c5679dcdbef88eacdd68a031d012b94daf573ce3f3f,2024-05-24T01:15:30.977000
|
||||||
CVE-2024-43470,0,1,fe528548c21195498b66ceb7663311572a15469603d70a62099c3f6f55f69948,2024-09-17T17:35:02.157000
|
CVE-2024-43470,0,0,fe528548c21195498b66ceb7663311572a15469603d70a62099c3f6f55f69948,2024-09-17T17:35:02.157000
|
||||||
CVE-2024-43472,0,0,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
|
CVE-2024-43472,0,0,4f801f83921e67b67f46b12b24b80ffa004f18db83d5caf5b1035ebd0cb2bc74,2024-08-28T19:13:21.393000
|
||||||
CVE-2024-43474,0,0,f6354f8c65cf4a665f2aa3a40c1c39cf9ab755c4b1c261d05e80e7c058ab75dd,2024-09-10T17:43:14.410000
|
CVE-2024-43474,0,0,f6354f8c65cf4a665f2aa3a40c1c39cf9ab755c4b1c261d05e80e7c058ab75dd,2024-09-10T17:43:14.410000
|
||||||
CVE-2024-43475,0,0,7a1d65cfeb84a374f4d1869bb08628845c754cea5990dbcffc8a8c0cd31d7e0a,2024-09-13T14:42:52.533000
|
CVE-2024-43475,0,0,7a1d65cfeb84a374f4d1869bb08628845c754cea5990dbcffc8a8c0cd31d7e0a,2024-09-13T14:42:52.533000
|
||||||
@ -259248,7 +259256,7 @@ CVE-2024-44134,0,0,08861eb717240c3274a4b430984ab8105b0dbbf7f1f275826256555a7a05b
|
|||||||
CVE-2024-44135,0,0,87bd09056774a11e5987bc31387cce2c52820c19b2c6c0364c242beae92f1a3f,2024-09-17T00:15:50.393000
|
CVE-2024-44135,0,0,87bd09056774a11e5987bc31387cce2c52820c19b2c6c0364c242beae92f1a3f,2024-09-17T00:15:50.393000
|
||||||
CVE-2024-44139,0,0,c299925983c65f2e26a7798504cbbda7a625fbce15c976febf2bc0ac7bb8406b,2024-09-17T00:15:50.443000
|
CVE-2024-44139,0,0,c299925983c65f2e26a7798504cbbda7a625fbce15c976febf2bc0ac7bb8406b,2024-09-17T00:15:50.443000
|
||||||
CVE-2024-44146,0,0,1f2a036a8dbaa5d598b4fbe6193635f3f5057bfa2ca7c38643cbb9301a82cc97,2024-09-17T00:15:50.523000
|
CVE-2024-44146,0,0,1f2a036a8dbaa5d598b4fbe6193635f3f5057bfa2ca7c38643cbb9301a82cc97,2024-09-17T00:15:50.523000
|
||||||
CVE-2024-44147,0,1,71c0555157b8db6b40c6d1f045db2be66c75602c52b1f0ab309ad8440f19a1d0,2024-09-17T16:35:18.863000
|
CVE-2024-44147,0,0,71c0555157b8db6b40c6d1f045db2be66c75602c52b1f0ab309ad8440f19a1d0,2024-09-17T16:35:18.863000
|
||||||
CVE-2024-44148,0,0,cca2c64591ea75746af500e35c65aadd66c8b456febe5d09b9cddebe0ce9bc67,2024-09-17T00:15:50.617000
|
CVE-2024-44148,0,0,cca2c64591ea75746af500e35c65aadd66c8b456febe5d09b9cddebe0ce9bc67,2024-09-17T00:15:50.617000
|
||||||
CVE-2024-44149,0,0,b71db0af392da6c0d42cb7599215cbd3495651504596dd55f8f72b8dcfd492b0,2024-09-17T00:15:50.663000
|
CVE-2024-44149,0,0,b71db0af392da6c0d42cb7599215cbd3495651504596dd55f8f72b8dcfd492b0,2024-09-17T00:15:50.663000
|
||||||
CVE-2024-44151,0,0,edf179a9fe6968d1994b58335f4d878a2fba6d1b34597f26770368895afee69a,2024-09-17T00:15:50.717000
|
CVE-2024-44151,0,0,edf179a9fe6968d1994b58335f4d878a2fba6d1b34597f26770368895afee69a,2024-09-17T00:15:50.717000
|
||||||
@ -259310,7 +259318,7 @@ CVE-2024-44342,0,0,5125cb4fc3697f3398817220a22114141d35ae892a172c5acf5a4a5249bb7
|
|||||||
CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000
|
CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000
|
||||||
CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000
|
CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000
|
||||||
CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000
|
CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000
|
||||||
CVE-2024-44375,0,1,fe0f4e730476c9953a301e5164123b7851c19f876ff8da37ccb193f95715f69d,2024-09-17T17:00:40.580000
|
CVE-2024-44375,0,0,fe0f4e730476c9953a301e5164123b7851c19f876ff8da37ccb193f95715f69d,2024-09-17T17:00:40.580000
|
||||||
CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000
|
CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000
|
||||||
CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000
|
CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000
|
||||||
CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000
|
CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000
|
||||||
@ -259725,6 +259733,7 @@ CVE-2024-45368,0,0,90b261935345e5a71065b81f602a78ead3b313d8ed7a8032973fdb3888383
|
|||||||
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
|
CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000
|
CVE-2024-4538,0,0,1753f7bd0b59062edc1103b5572b8666a59c2630e5fb59443506518ac4083bd7,2024-05-07T13:39:32.710000
|
||||||
CVE-2024-45383,0,0,8070285ac234a2c57451cd7d700ed3c56035571e12498cb9195f8b0d97353fef,2024-09-12T21:34:55.633000
|
CVE-2024-45383,0,0,8070285ac234a2c57451cd7d700ed3c56035571e12498cb9195f8b0d97353fef,2024-09-12T21:34:55.633000
|
||||||
|
CVE-2024-45384,1,1,941e13256bbcdb7f0ece4dcedd02e1d0c151d469f0a38b92008d24b95ebd11da,2024-09-17T19:15:28.100000
|
||||||
CVE-2024-45388,0,0,7379636d4460cd19a1c127a4abe34a191bee635bd1df7e3ee4b0cb5c5cdee0ff,2024-09-03T12:59:02.453000
|
CVE-2024-45388,0,0,7379636d4460cd19a1c127a4abe34a191bee635bd1df7e3ee4b0cb5c5cdee0ff,2024-09-03T12:59:02.453000
|
||||||
CVE-2024-45389,0,0,3c33cfe16c07d091d7fefb5db536793f3efe9f98f40a959df73e39f6dc2254ee,2024-09-12T20:17:31.767000
|
CVE-2024-45389,0,0,3c33cfe16c07d091d7fefb5db536793f3efe9f98f40a959df73e39f6dc2254ee,2024-09-12T20:17:31.767000
|
||||||
CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000
|
CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000
|
||||||
@ -259795,6 +259804,7 @@ CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0
|
|||||||
CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000
|
CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000
|
||||||
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
|
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
|
||||||
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
|
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
|
||||||
|
CVE-2024-45537,1,1,522e8ad70c4a2b88082c6938714c807f5fbe9d880fbc938f7c7e90871d6ceaae,2024-09-17T19:15:28.157000
|
||||||
CVE-2024-4554,0,0,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000
|
CVE-2024-4554,0,0,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000
|
||||||
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
|
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
|
||||||
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
|
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
|
||||||
@ -259815,6 +259825,7 @@ CVE-2024-45597,0,0,0fad881157bfd299e8512a05afe15ba28f7513c6a1c09923d6036dedef269
|
|||||||
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
|
CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-45607,0,0,67a6e47c29587e42f4488dd77fa36902f2c8b9e4de4df31afdc94977a83ab49c,2024-09-12T21:34:55.633000
|
CVE-2024-45607,0,0,67a6e47c29587e42f4488dd77fa36902f2c8b9e4de4df31afdc94977a83ab49c,2024-09-12T21:34:55.633000
|
||||||
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
||||||
|
CVE-2024-45612,1,1,ef43e3990d9c954ad7bf7532592a25b6df1296840bab862dfc7fa4022c718569,2024-09-17T19:15:28.250000
|
||||||
CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000
|
CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000
|
||||||
CVE-2024-45616,0,0,ec4ff704ba2aae95f08442d1bfa2173f2a102c1c3b0570dfa4cb1518cb449547,2024-09-13T19:21:11.507000
|
CVE-2024-45616,0,0,ec4ff704ba2aae95f08442d1bfa2173f2a102c1c3b0570dfa4cb1518cb449547,2024-09-13T19:21:11.507000
|
||||||
CVE-2024-45617,0,0,6cb16d6fbb6421ff7c08177427efbe84e4a03cb3cf72e212ba5673d3ad33ab5e,2024-09-13T19:21:08.633000
|
CVE-2024-45617,0,0,6cb16d6fbb6421ff7c08177427efbe84e4a03cb3cf72e212ba5673d3ad33ab5e,2024-09-13T19:21:08.633000
|
||||||
@ -259834,10 +259845,11 @@ CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d1
|
|||||||
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
|
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
|
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
|
||||||
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
|
||||||
|
CVE-2024-45682,1,1,0a3a96f00baaac84815943dcdccfa17287729c7fa491cf17cf5846701260505e,2024-09-17T18:15:04.893000
|
||||||
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
|
||||||
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
|
||||||
CVE-2024-45694,0,0,9f63c955d9eee17cfd885195e14116e36025ed1f0991533969507e0e3d5313d4,2024-09-16T15:30:28.733000
|
CVE-2024-45694,0,1,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
|
||||||
CVE-2024-45695,0,0,0fed936d57bad0d3608cf8910a4738d455159426e77f4777679ccbdfeb3fe9c7,2024-09-16T15:30:28.733000
|
CVE-2024-45695,0,1,da601d84ea417c0c9279d85654ade81af5192308ba1ba5409f7a2b21c121a433,2024-09-17T18:40:38.573000
|
||||||
CVE-2024-45696,0,0,b551b9e5a33d60ee884b352cc58e0de6e4358b9a2aa8ac71cf9d81795dbc0d1d,2024-09-16T15:30:28.733000
|
CVE-2024-45696,0,0,b551b9e5a33d60ee884b352cc58e0de6e4358b9a2aa8ac71cf9d81795dbc0d1d,2024-09-16T15:30:28.733000
|
||||||
CVE-2024-45697,0,0,b061a52d423d0f158415b239b7e20000a7f8fedec2e7f4abb8775b53aaeae721,2024-09-16T15:30:28.733000
|
CVE-2024-45697,0,0,b061a52d423d0f158415b239b7e20000a7f8fedec2e7f4abb8775b53aaeae721,2024-09-16T15:30:28.733000
|
||||||
CVE-2024-45698,0,0,a981e18179a6b778934544cccfd9a0e75be9eb8d89acdc683c6a6d70ffb7ea78,2024-09-16T15:30:28.733000
|
CVE-2024-45698,0,0,a981e18179a6b778934544cccfd9a0e75be9eb8d89acdc683c6a6d70ffb7ea78,2024-09-16T15:30:28.733000
|
||||||
@ -259858,10 +259870,13 @@ CVE-2024-45788,0,0,daa60ade5ad6724906b695b39b7d4272172d663ec92a618ac35885111e547
|
|||||||
CVE-2024-45789,0,0,b2f5339b5496dd25163390b8a29b58e033c7d1af7551480b4227c42eccad9983,2024-09-11T16:26:11.920000
|
CVE-2024-45789,0,0,b2f5339b5496dd25163390b8a29b58e033c7d1af7551480b4227c42eccad9983,2024-09-11T16:26:11.920000
|
||||||
CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000
|
CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000
|
||||||
CVE-2024-45790,0,0,040e6e6bbab853b34e097efc16fe42692911306e0ad4b6a188d15199a5fc0245,2024-09-11T16:26:11.920000
|
CVE-2024-45790,0,0,040e6e6bbab853b34e097efc16fe42692911306e0ad4b6a188d15199a5fc0245,2024-09-11T16:26:11.920000
|
||||||
|
CVE-2024-45798,1,1,94f407ae281a9d4823e1a5397fb4b399a0b2d14a0927b86ba424f621d9f9aea8,2024-09-17T19:15:28.457000
|
||||||
CVE-2024-45799,0,0,91b14fc0a289ed6c6b5949d54ca5f9a30d3a246868e50c15953ec10acdc5dd5b,2024-09-16T19:16:10.880000
|
CVE-2024-45799,0,0,91b14fc0a289ed6c6b5949d54ca5f9a30d3a246868e50c15953ec10acdc5dd5b,2024-09-16T19:16:10.880000
|
||||||
CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000
|
CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-45800,0,0,15b60dc62fc78c0cc38c124ac63f137374709ba8fcfc04ae1dc9d515d877d818,2024-09-16T20:15:47.097000
|
CVE-2024-45800,0,0,15b60dc62fc78c0cc38c124ac63f137374709ba8fcfc04ae1dc9d515d877d818,2024-09-16T20:15:47.097000
|
||||||
CVE-2024-45801,0,0,6cf2908141281733da9f2c82737c6811e04d5fe422e7fcc54cfb6d6ab7ce7487,2024-09-16T19:16:11.080000
|
CVE-2024-45801,0,0,6cf2908141281733da9f2c82737c6811e04d5fe422e7fcc54cfb6d6ab7ce7487,2024-09-16T19:16:11.080000
|
||||||
|
CVE-2024-45803,1,1,3545b99fe22bbd854319c3d83e4e919bd18f67ffd67280643db637b7c5607646,2024-09-17T19:15:28.660000
|
||||||
|
CVE-2024-45804,1,1,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000
|
||||||
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
|
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
|
||||||
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000
|
||||||
CVE-2024-45823,0,0,54a17f937d68305d32d91930064931beaa080879f88a3df13aee6b9073c444aa,2024-09-12T18:14:03.913000
|
CVE-2024-45823,0,0,54a17f937d68305d32d91930064931beaa080879f88a3df13aee6b9073c444aa,2024-09-12T18:14:03.913000
|
||||||
@ -259914,7 +259929,7 @@ CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152
|
|||||||
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
|
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
|
||||||
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
||||||
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
||||||
CVE-2024-46085,0,0,2a7cb61e2a1a11b00580af2b6dfcf981209fc6444832ba0ba2f2d28f90965ace,2024-09-17T13:15:03.793000
|
CVE-2024-46085,0,1,4bcdae61af1b4709b2602a60bed18e8d14f66a9e47eac90a75adf8f8594192f4,2024-09-17T18:35:01.317000
|
||||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||||
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
|
||||||
CVE-2024-4611,0,0,51a3d5438728b832e97210e2f9860d8c98e7a9272bd8319e6cdccdf57653adc1,2024-05-29T13:02:09.280000
|
CVE-2024-4611,0,0,51a3d5438728b832e97210e2f9860d8c98e7a9272bd8319e6cdccdf57653adc1,2024-05-29T13:02:09.280000
|
||||||
@ -259939,7 +259954,7 @@ CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b4114645
|
|||||||
CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000
|
CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000
|
CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000
|
||||||
CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000
|
CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000
|
||||||
CVE-2024-46362,0,0,3478fb03d11c01827d8f252111b0268442c87782a60457dcc0193c5edb823cbc,2024-09-17T13:15:03.903000
|
CVE-2024-46362,0,1,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000
|
||||||
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
|
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
|
||||||
CVE-2024-4638,0,0,a819fdfba96fa18a2f7909a394b6447b878ef2488f2357c7db7b0cfcaa9db703,2024-06-25T12:24:17.873000
|
CVE-2024-4638,0,0,a819fdfba96fa18a2f7909a394b6447b878ef2488f2357c7db7b0cfcaa9db703,2024-06-25T12:24:17.873000
|
||||||
CVE-2024-4639,0,0,94440a0f589feefd6793182562f7b7ad1826370c3af8edc8bb387cc054e89035,2024-06-25T12:24:17.873000
|
CVE-2024-4639,0,0,94440a0f589feefd6793182562f7b7ad1826370c3af8edc8bb387cc054e89035,2024-06-25T12:24:17.873000
|
||||||
@ -260034,7 +260049,7 @@ CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c8910
|
|||||||
CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000
|
CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000
|
||||||
CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000
|
CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000
|
||||||
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
|
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-46918,0,1,4a5d768b65131d0283a4e304843d416bc4ae74cb825a9649f5cfc1ee106a86d6,2024-09-17T16:35:26.513000
|
CVE-2024-46918,0,0,4a5d768b65131d0283a4e304843d416bc4ae74cb825a9649f5cfc1ee106a86d6,2024-09-17T16:35:26.513000
|
||||||
CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000
|
CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000
|
||||||
CVE-2024-46937,0,0,07fdd1d78aaed903fbff4e5d9a0ce758118188db8683180f256eed71d0649671,2024-09-17T14:35:32.103000
|
CVE-2024-46937,0,0,07fdd1d78aaed903fbff4e5d9a0ce758118188db8683180f256eed71d0649671,2024-09-17T14:35:32.103000
|
||||||
CVE-2024-46938,0,0,9e276dbb5f511d90ea6307dc9981b04eafca4332d1a762536bafb02391c73acc,2024-09-17T15:35:10.980000
|
CVE-2024-46938,0,0,9e276dbb5f511d90ea6307dc9981b04eafca4332d1a762536bafb02391c73acc,2024-09-17T15:35:10.980000
|
||||||
@ -260824,7 +260839,7 @@ CVE-2024-5560,0,0,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e334
|
|||||||
CVE-2024-5561,0,0,82dc9c7a28558b655d3278268f7fefe112c6724d8ad6919886d73aaa7545bf00,2024-09-10T15:35:12.400000
|
CVE-2024-5561,0,0,82dc9c7a28558b655d3278268f7fefe112c6724d8ad6919886d73aaa7545bf00,2024-09-10T15:35:12.400000
|
||||||
CVE-2024-5564,0,0,f4d47902a90dbb93559c7fd22e2dd25c0de5924fe13b2f49f31df78ea2a71a6f,2024-09-16T21:15:46.417000
|
CVE-2024-5564,0,0,f4d47902a90dbb93559c7fd22e2dd25c0de5924fe13b2f49f31df78ea2a71a6f,2024-09-16T21:15:46.417000
|
||||||
CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000
|
CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000
|
||||||
CVE-2024-5566,0,1,c0477f9a669450d35fa5ea491716b2362e467b6bc96edf26617c593b80eafd26,2024-09-17T16:42:01.030000
|
CVE-2024-5566,0,0,c0477f9a669450d35fa5ea491716b2362e467b6bc96edf26617c593b80eafd26,2024-09-17T16:42:01.030000
|
||||||
CVE-2024-5567,0,0,57f1eef885147cb56b2011d105c7e89ffd0cbca00bdfaf8fcec77570ef91bb84,2024-09-13T14:06:04.777000
|
CVE-2024-5567,0,0,57f1eef885147cb56b2011d105c7e89ffd0cbca00bdfaf8fcec77570ef91bb84,2024-09-13T14:06:04.777000
|
||||||
CVE-2024-5569,0,0,b9fd3bed59b5f668c54b0264622201b8600e789b08e0f56eae05ce6b6e8c76ce,2024-07-09T18:19:14.047000
|
CVE-2024-5569,0,0,b9fd3bed59b5f668c54b0264622201b8600e789b08e0f56eae05ce6b6e8c76ce,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-5570,0,0,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec404d,2024-07-09T16:23:05.823000
|
CVE-2024-5570,0,0,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec404d,2024-07-09T16:23:05.823000
|
||||||
@ -261013,7 +261028,7 @@ CVE-2024-5790,0,0,40e3e95c79e12386037d2f0684187dabf01009b79521793b8acd18df532576
|
|||||||
CVE-2024-5791,0,0,24eec5e4d4f16dd492ffc3b7ae28c84e21a1b72754ec8a8604d77dbfee1290a1,2024-06-24T20:00:46.390000
|
CVE-2024-5791,0,0,24eec5e4d4f16dd492ffc3b7ae28c84e21a1b72754ec8a8604d77dbfee1290a1,2024-06-24T20:00:46.390000
|
||||||
CVE-2024-5792,0,0,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd3a,2024-07-11T13:05:54.930000
|
CVE-2024-5792,0,0,9094b7486c3fc344423def250d1a80e78a3bf07108bd316adddc44339dabcd3a,2024-07-11T13:05:54.930000
|
||||||
CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000
|
CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc06e,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-5795,0,1,956ff1b2f14e29b7f01f801db379e0436600c38786f3ba041afbcb3f8c718295,2024-09-17T16:24:29.340000
|
CVE-2024-5795,0,0,956ff1b2f14e29b7f01f801db379e0436600c38786f3ba041afbcb3f8c718295,2024-09-17T16:24:29.340000
|
||||||
CVE-2024-5796,0,0,e179556883d33099fab8768b9c3d50a47b2a022b7b46e47f95f4ba7640cc26df,2024-06-28T10:27:00.920000
|
CVE-2024-5796,0,0,e179556883d33099fab8768b9c3d50a47b2a022b7b46e47f95f4ba7640cc26df,2024-06-28T10:27:00.920000
|
||||||
CVE-2024-5798,0,0,8c4fc55b5a68256010d6e6bfcfe06ef9f209d5a592c838664e8662bbc4a3d762,2024-06-13T18:36:09.010000
|
CVE-2024-5798,0,0,8c4fc55b5a68256010d6e6bfcfe06ef9f209d5a592c838664e8662bbc4a3d762,2024-06-13T18:36:09.010000
|
||||||
CVE-2024-5799,0,0,44e565e53dc2719ab95e3a43ba3fda002a08061d1965277f98f61b7714163b50,2024-09-12T18:35:22.903000
|
CVE-2024-5799,0,0,44e565e53dc2719ab95e3a43ba3fda002a08061d1965277f98f61b7714163b50,2024-09-12T18:35:22.903000
|
||||||
@ -261031,7 +261046,7 @@ CVE-2024-5811,0,0,da48fd72e5de418e87b54290fe68d41aecce53c1cabdd1300feebd9e1c56b8
|
|||||||
CVE-2024-5812,0,0,05caee51ca8afdeadb9e9ce4e5c443d53c88017db3fdf90c8036b6c5139928b3,2024-06-13T18:36:45.417000
|
CVE-2024-5812,0,0,05caee51ca8afdeadb9e9ce4e5c443d53c88017db3fdf90c8036b6c5139928b3,2024-06-13T18:36:45.417000
|
||||||
CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232d2,2024-06-13T18:36:45.417000
|
CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232d2,2024-06-13T18:36:45.417000
|
||||||
CVE-2024-5814,0,0,b53bcc6c4d3dbc5ee42338ab7ba4d2ddb0869c38491163ed26c8c53f4205a07d,2024-08-28T12:57:39.090000
|
CVE-2024-5814,0,0,b53bcc6c4d3dbc5ee42338ab7ba4d2ddb0869c38491163ed26c8c53f4205a07d,2024-08-28T12:57:39.090000
|
||||||
CVE-2024-5815,0,1,1b19aef9db5c5eea2910f41203cac47e070ba6dff7ee27eda9f770685a15e1f4,2024-09-17T16:26:44.973000
|
CVE-2024-5815,0,0,1b19aef9db5c5eea2910f41203cac47e070ba6dff7ee27eda9f770685a15e1f4,2024-09-17T16:26:44.973000
|
||||||
CVE-2024-5816,0,0,877a1656125a6394e7e38aad0f4b134d9d92da4e6ffa6a5215cb91777f905811,2024-09-17T15:29:10.223000
|
CVE-2024-5816,0,0,877a1656125a6394e7e38aad0f4b134d9d92da4e6ffa6a5215cb91777f905811,2024-09-17T15:29:10.223000
|
||||||
CVE-2024-5817,0,0,35fbdf6b52292378d7af30cf2a900d9df38b81bcc96ecdd6dfe66d5b714cc4cc,2024-09-17T15:14:59.360000
|
CVE-2024-5817,0,0,35fbdf6b52292378d7af30cf2a900d9df38b81bcc96ecdd6dfe66d5b714cc4cc,2024-09-17T15:14:59.360000
|
||||||
CVE-2024-5818,0,0,d86b334cccce08c548d2bbc417226a54ab2aadb235a74204ee91228f57e7b1a5,2024-07-26T12:41:49.330000
|
CVE-2024-5818,0,0,d86b334cccce08c548d2bbc417226a54ab2aadb235a74204ee91228f57e7b1a5,2024-07-26T12:41:49.330000
|
||||||
@ -261501,10 +261516,10 @@ CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f1525
|
|||||||
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000
|
||||||
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
|
CVE-2024-6365,0,0,4363950e80c53434fcfd5afd5a384a9df5c49d102c20d1b50eb31e33005d9f26,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-6366,0,0,096c2e4875d70bc17fefd98ca3b9831365fdc0385159836c57ab4bd786cef9c8,2024-08-01T14:00:20.363000
|
CVE-2024-6366,0,0,096c2e4875d70bc17fefd98ca3b9831365fdc0385159836c57ab4bd786cef9c8,2024-08-01T14:00:20.363000
|
||||||
CVE-2024-6367,0,0,e5669753c61050aad2ccc9605a3bbda3db9be9bb07632e72a69497f97bda20b0,2024-06-27T12:47:19.847000
|
CVE-2024-6367,0,1,781f5630398c3e7cb3ac475bbf9a43b543b7c6e54e125056358fc36a8dfa57f3,2024-09-17T18:39:51.967000
|
||||||
CVE-2024-6368,0,0,44fe54b08eb3c9f8d806226d008151b8ca5b76936c36f6684760df4fc340ec52,2024-06-27T18:15:21.083000
|
CVE-2024-6368,0,1,2fe88d7aa4981a405b256a6994dec55748497652e411e53a1dbeb749e1800359,2024-09-17T19:22:33.767000
|
||||||
CVE-2024-6369,0,0,ef2b569149af73e78692eccc45baac7e37d10563dbdcc1d4005507ea12864d72,2024-06-27T12:47:19.847000
|
CVE-2024-6369,0,1,133ada9c0d122bd1e1e2bf1c05a4d5f71cfeaf350a2297fef5fd16f6cb89024f,2024-09-17T19:19:25.907000
|
||||||
CVE-2024-6370,0,0,676cbafac63212a8721b267ae6e9680c1eb8374d74fd167a71e08305a3b8494c,2024-06-27T12:47:19.847000
|
CVE-2024-6370,0,1,b3bba92e3bd78a511033a057f334f39387c77f0e1fbf8806ffc1a2280726320d,2024-09-17T19:17:43.977000
|
||||||
CVE-2024-6371,0,0,5f83f95dcceaa28d11c287dc71af5756afc095d68becb3e3a86bdf854c3c189a,2024-08-20T13:21:59.600000
|
CVE-2024-6371,0,0,5f83f95dcceaa28d11c287dc71af5756afc095d68becb3e3a86bdf854c3c189a,2024-08-20T13:21:59.600000
|
||||||
CVE-2024-6372,0,0,175eedbe6c249e3955927cb279a01c191390828d0195bad6f245ad8466b584f8,2024-08-20T13:31:40.793000
|
CVE-2024-6372,0,0,175eedbe6c249e3955927cb279a01c191390828d0195bad6f245ad8466b584f8,2024-08-20T13:31:40.793000
|
||||||
CVE-2024-6373,0,0,e2b88eb3a63ea5c09c2c5241dee2a7883fb4754c8b06cd4990f2315b5466489d,2024-08-20T13:32:44.213000
|
CVE-2024-6373,0,0,e2b88eb3a63ea5c09c2c5241dee2a7883fb4754c8b06cd4990f2315b5466489d,2024-08-20T13:32:44.213000
|
||||||
@ -261526,7 +261541,7 @@ CVE-2024-6389,0,0,97619f937594e57440ea9f8cb3d55fe9ec171c40b4959fd4a8bcfb76e0e631
|
|||||||
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
|
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
|
||||||
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
|
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
|
||||||
CVE-2024-6392,0,0,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000
|
CVE-2024-6392,0,0,edc3ee0e5658afb33c71de43cf2ca6ea07650ea12323a6b995125316053d44cb,2024-08-15T14:56:16.490000
|
||||||
CVE-2024-6395,0,1,8949d2f54703284d3b545906a65282811d0c7a0bd7bd2d1ca2dc3e2d333d4c69,2024-09-17T16:30:03.617000
|
CVE-2024-6395,0,0,8949d2f54703284d3b545906a65282811d0c7a0bd7bd2d1ca2dc3e2d333d4c69,2024-09-17T16:30:03.617000
|
||||||
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
|
CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000
|
||||||
CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000
|
CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000
|
||||||
CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000
|
CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000
|
||||||
@ -262001,7 +262016,7 @@ CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400
|
|||||||
CVE-2024-7012,0,0,f0e0d2f8670ad7a792afb91a6b1a381690a310d17396ef501ada2605889c18fa,2024-09-05T21:39:20.950000
|
CVE-2024-7012,0,0,f0e0d2f8670ad7a792afb91a6b1a381690a310d17396ef501ada2605889c18fa,2024-09-05T21:39:20.950000
|
||||||
CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000
|
CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcfee,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-7015,0,1,6094948c6aea38543d5cfe789d4e68ef9f64589653d01959504a66451f0fd61b,2024-09-17T17:59:00.243000
|
CVE-2024-7015,0,0,6094948c6aea38543d5cfe789d4e68ef9f64589653d01959504a66451f0fd61b,2024-09-17T17:59:00.243000
|
||||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||||
CVE-2024-7029,0,0,5f4ca22966bfb8fd03ea6c375443c6b1c23e214558aa93ba88feba6b27bd6aa8,2024-09-17T13:30:55.010000
|
CVE-2024-7029,0,0,5f4ca22966bfb8fd03ea6c375443c6b1c23e214558aa93ba88feba6b27bd6aa8,2024-09-17T13:30:55.010000
|
||||||
CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000
|
CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000
|
||||||
@ -262356,7 +262371,7 @@ CVE-2024-7522,0,0,8cb3e499c594094550f4257bf1be1fb169aadf72b2b6dad6246a075ed4ee87
|
|||||||
CVE-2024-7523,0,0,a0f308b16d5ebbedc56cd7091bbb85d180c4d81896244879e7fd734fc3c8496f,2024-08-30T12:59:29.710000
|
CVE-2024-7523,0,0,a0f308b16d5ebbedc56cd7091bbb85d180c4d81896244879e7fd734fc3c8496f,2024-08-30T12:59:29.710000
|
||||||
CVE-2024-7524,0,0,55b2959f46d5a03cc7e4bb47de03aeac574cf3416fb0ebbf64758ff53e5fdcb3,2024-08-29T17:35:34.820000
|
CVE-2024-7524,0,0,55b2959f46d5a03cc7e4bb47de03aeac574cf3416fb0ebbf64758ff53e5fdcb3,2024-08-29T17:35:34.820000
|
||||||
CVE-2024-7525,0,0,0f44155e5b1b275dd77c786a7ef323cd6045a6d2a2adbf5e4f560db015c1f014,2024-08-12T16:07:19.537000
|
CVE-2024-7525,0,0,0f44155e5b1b275dd77c786a7ef323cd6045a6d2a2adbf5e4f560db015c1f014,2024-08-12T16:07:19.537000
|
||||||
CVE-2024-7526,0,0,718006135a6a1c568dedda22ff0d54a97e1bc5accec99de9b33ac5ed305a3aef,2024-08-12T16:07:50.743000
|
CVE-2024-7526,0,1,b80ee88a3d5295a02d52764b69cdfd23ebc8b3dadc05bc2f74a2b56025fb2b30,2024-09-17T19:15:28.857000
|
||||||
CVE-2024-7527,0,0,ba69bbbe0f023f0603eef152253f5471e5d273c1eed361075a22cda08eede171,2024-08-12T16:08:06.493000
|
CVE-2024-7527,0,0,ba69bbbe0f023f0603eef152253f5471e5d273c1eed361075a22cda08eede171,2024-08-12T16:08:06.493000
|
||||||
CVE-2024-7528,0,0,507c997c0a13c19b92f1e9c8e4b25740725889dc4dd872c8a52c03fa3285e0a1,2024-08-12T16:10:00.647000
|
CVE-2024-7528,0,0,507c997c0a13c19b92f1e9c8e4b25740725889dc4dd872c8a52c03fa3285e0a1,2024-08-12T16:10:00.647000
|
||||||
CVE-2024-7529,0,0,b1552bddadcbddb6b1e72a325160be79454e210c5b3d62abdbc12c1785c418f8,2024-08-12T16:09:09.390000
|
CVE-2024-7529,0,0,b1552bddadcbddb6b1e72a325160be79454e210c5b3d62abdbc12c1785c418f8,2024-08-12T16:09:09.390000
|
||||||
@ -262718,7 +262733,7 @@ CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a
|
|||||||
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
||||||
CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000
|
CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000
|
||||||
CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000
|
CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000
|
||||||
CVE-2024-8042,0,1,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000
|
CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000
|
||||||
CVE-2024-8043,0,0,25cc750c1561b848d56db710d47ec2a57c19c3ec63b4b6f24b30593e2c09a688,2024-09-17T15:35:12.877000
|
CVE-2024-8043,0,0,25cc750c1561b848d56db710d47ec2a57c19c3ec63b4b6f24b30593e2c09a688,2024-09-17T15:35:12.877000
|
||||||
CVE-2024-8044,0,0,4243a832aff712bd3fd7410a67dad34070597eed1acc2d07bd00c4bc8956aeaf,2024-09-17T15:35:13.050000
|
CVE-2024-8044,0,0,4243a832aff712bd3fd7410a67dad34070597eed1acc2d07bd00c4bc8956aeaf,2024-09-17T15:35:13.050000
|
||||||
CVE-2024-8045,0,0,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000
|
CVE-2024-8045,0,0,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000
|
||||||
@ -262918,8 +262933,8 @@ CVE-2024-8368,0,0,baf97c7cc8ff7a1cb733a430215d263a54fe511b2546253e4720055414409f
|
|||||||
CVE-2024-8369,0,0,7205218bd76d9d8b9cd145e42c4536180b465d67c379251e436e9fe9c735c653,2024-09-10T15:50:57.713000
|
CVE-2024-8369,0,0,7205218bd76d9d8b9cd145e42c4536180b465d67c379251e436e9fe9c735c653,2024-09-10T15:50:57.713000
|
||||||
CVE-2024-8370,0,0,62abacc1c74e5ddc1a8a0c4c80dfa7425fd9cd85c3b2534054ff6d1e6891bf5a,2024-09-03T14:15:17.787000
|
CVE-2024-8370,0,0,62abacc1c74e5ddc1a8a0c4c80dfa7425fd9cd85c3b2534054ff6d1e6891bf5a,2024-09-03T14:15:17.787000
|
||||||
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
|
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
|
||||||
CVE-2024-8372,0,1,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722aa5,2024-09-17T17:24:21.793000
|
CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722aa5,2024-09-17T17:24:21.793000
|
||||||
CVE-2024-8373,0,1,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
|
CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
|
||||||
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
|
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
|
||||||
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
|
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
|
||||||
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
|
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
|
||||||
@ -263014,10 +263029,10 @@ CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a5706419361
|
|||||||
CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
|
CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
|
||||||
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
|
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
|
||||||
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
|
CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
|
||||||
CVE-2024-8601,0,1,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000
|
CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b36e,2024-09-17T17:54:39.767000
|
||||||
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
|
||||||
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000
|
||||||
CVE-2024-8610,0,0,eb6ce2a7a778672499c51523ea6d8af542e4718cbb348258f3d363f48918c8ec,2024-09-10T12:09:50.377000
|
CVE-2024-8610,0,1,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000
|
||||||
CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000
|
CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000
|
||||||
CVE-2024-8622,0,0,8c0d8566c114d14578f376fb46a83dd09ecfc9aef59b4f73eead49a6f9d03ae6,2024-09-12T12:35:54.013000
|
CVE-2024-8622,0,0,8c0d8566c114d14578f376fb46a83dd09ecfc9aef59b4f73eead49a6f9d03ae6,2024-09-12T12:35:54.013000
|
||||||
CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000
|
CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000
|
||||||
@ -263034,7 +263049,8 @@ CVE-2024-8646,0,0,cfb9f652fd985c7871cc2c3d34f011a0ae92ad7c5f0486bb78cd619daf2d5b
|
|||||||
CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000
|
CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000
|
||||||
CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000
|
CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000
|
||||||
CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a82a,2024-09-13T14:06:04.777000
|
CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a82a,2024-09-13T14:06:04.777000
|
||||||
CVE-2024-8661,0,0,909f55a292677d698df83e8a641ddfb1b5b98b8578b3dc11fe626c50603f4b19,2024-09-16T18:15:54.583000
|
CVE-2024-8660,1,1,ab82c7e26f005302fdb808ebba97a9d76ec0191b3c422bb767ece84565812250,2024-09-17T19:15:28.953000
|
||||||
|
CVE-2024-8661,0,1,9faf3dc478e32d3a199dd2057718464b08fcf94b97b6a44aba36d8ff5090e7a8,2024-09-17T19:15:29.053000
|
||||||
CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000
|
CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000
|
||||||
CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000
|
CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000
|
||||||
CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000
|
CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000
|
||||||
@ -263075,7 +263091,7 @@ CVE-2024-8761,0,0,4b2e90396c11bbbc2e9cd3600db2cc3dcdfb22ed25573d49b03cdaf931a193
|
|||||||
CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000
|
CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000
|
||||||
CVE-2024-8766,0,0,2324716e2cc66becaf1399ee24d86431f71e6aeb653bf4ccd42d648a8d0ec6ec,2024-09-16T20:15:47.600000
|
CVE-2024-8766,0,0,2324716e2cc66becaf1399ee24d86431f71e6aeb653bf4ccd42d648a8d0ec6ec,2024-09-16T20:15:47.600000
|
||||||
CVE-2024-8767,0,0,88a45e0b369d4bb8e56a3dfe9307ae145e765fe7d74bfb184d53fa51f17aa534,2024-09-17T09:15:03.423000
|
CVE-2024-8767,0,0,88a45e0b369d4bb8e56a3dfe9307ae145e765fe7d74bfb184d53fa51f17aa534,2024-09-17T09:15:03.423000
|
||||||
CVE-2024-8768,1,1,00d154826e540767ec58e7c1e181d8a93b644dc80e323a39d75c8345b6a2e437,2024-09-17T17:15:11.100000
|
CVE-2024-8768,0,0,00d154826e540767ec58e7c1e181d8a93b644dc80e323a39d75c8345b6a2e437,2024-09-17T17:15:11.100000
|
||||||
CVE-2024-8775,0,0,fcca86ce876772170d6581789978acb0ae0c53951dd659594245568535621773,2024-09-14T11:47:14.677000
|
CVE-2024-8775,0,0,fcca86ce876772170d6581789978acb0ae0c53951dd659594245568535621773,2024-09-14T11:47:14.677000
|
||||||
CVE-2024-8776,0,0,d6542dd836edb3a7b0373fa55ea55b6588d00dc2d460f1bba77ff0b778a4f882,2024-09-16T15:30:28.733000
|
CVE-2024-8776,0,0,d6542dd836edb3a7b0373fa55ea55b6588d00dc2d460f1bba77ff0b778a4f882,2024-09-16T15:30:28.733000
|
||||||
CVE-2024-8777,0,0,34a835ea08030c4a5a9203e5f6cc8fd8352bd723c399e4db5ce1a16dac92eb5c,2024-09-16T15:30:28.733000
|
CVE-2024-8777,0,0,34a835ea08030c4a5a9203e5f6cc8fd8352bd723c399e4db5ce1a16dac92eb5c,2024-09-16T15:30:28.733000
|
||||||
@ -263085,6 +263101,7 @@ CVE-2024-8780,0,0,bd4bd08e2eb72cc17a88ed55f562faebe92fedded2e0fdee3ed50b9263d53a
|
|||||||
CVE-2024-8782,0,0,07c3a16b8681c9ebf93d105d5b076fbef190c05e8d1e936ffaeb395d86382ca2,2024-09-14T11:47:14.677000
|
CVE-2024-8782,0,0,07c3a16b8681c9ebf93d105d5b076fbef190c05e8d1e936ffaeb395d86382ca2,2024-09-14T11:47:14.677000
|
||||||
CVE-2024-8783,0,0,289128ea1a51112e2b32da270994bcc7b30231f341b1d787ba1fce34d4218f29,2024-09-14T11:47:14.677000
|
CVE-2024-8783,0,0,289128ea1a51112e2b32da270994bcc7b30231f341b1d787ba1fce34d4218f29,2024-09-14T11:47:14.677000
|
||||||
CVE-2024-8784,0,0,598c58979dfe2b73f976c6898315c02c460b4985a94e2fab78e11f95eb647e6e,2024-09-14T11:47:14.677000
|
CVE-2024-8784,0,0,598c58979dfe2b73f976c6898315c02c460b4985a94e2fab78e11f95eb647e6e,2024-09-14T11:47:14.677000
|
||||||
|
CVE-2024-8796,1,1,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000
|
||||||
CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000
|
CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000
|
||||||
CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000
|
CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000
|
||||||
CVE-2024-8863,0,0,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000
|
CVE-2024-8863,0,0,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000
|
||||||
@ -263098,4 +263115,11 @@ CVE-2024-8875,0,0,0e9f0f93ae52ceba12c10384b7bbc3067de71e5c05493a69fd2a253e00e4d5
|
|||||||
CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000
|
CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000
|
||||||
CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000
|
CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000
|
||||||
CVE-2024-8897,0,0,b99b42e128a3a937599a5ee8c7a3b275ca81dee2198a043376f3ec3c0daeea34,2024-09-17T13:15:04.423000
|
CVE-2024-8897,0,0,b99b42e128a3a937599a5ee8c7a3b275ca81dee2198a043376f3ec3c0daeea34,2024-09-17T13:15:04.423000
|
||||||
CVE-2024-8939,1,1,957d3e495c1f91e1f01ec85026d867d3ef775813b5ad800712d45bf5da2fd527,2024-09-17T17:15:11.327000
|
CVE-2024-8900,1,1,f58f5185481b4f9d895145fbfe2d15f4fe9fa908c07bf76713d81ef85bc63469,2024-09-17T19:15:29.163000
|
||||||
|
CVE-2024-8939,0,0,957d3e495c1f91e1f01ec85026d867d3ef775813b5ad800712d45bf5da2fd527,2024-09-17T17:15:11.327000
|
||||||
|
CVE-2024-8944,1,1,e33cef62d9a54e3c9644e7c4b2af554d4827e7ec1a566e407d17d5b44ecd7aca,2024-09-17T18:15:05.690000
|
||||||
|
CVE-2024-8945,1,1,fd45c5052c525bcd2663848f4b04e9d4ca0dd08a1af7e68c5c053387b1392731,2024-09-17T18:15:06.023000
|
||||||
|
CVE-2024-8946,1,1,f683e89c1a7c4d3f311a742522396e1eb7b882f209db6b5cf4981f5f483bbf2b,2024-09-17T19:15:29.220000
|
||||||
|
CVE-2024-8947,1,1,e7358c360d7018d342c095a0ae4b74d3493e808891550c9a094bb59ec7b9a4b3,2024-09-17T19:15:29.483000
|
||||||
|
CVE-2024-8948,1,1,fb95c4586dc1832c9169ff9ab84deb54253d2f0155e4f47c91bfeed6e755aedd,2024-09-17T19:15:29.747000
|
||||||
|
CVE-2024-8949,1,1,558b0f2a15aa10d0215f6e776b245d8a42240ea8527c9ffd4d56905704832de3,2024-09-17T19:15:30.017000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user