mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-15T22:00:17.761064+00:00
This commit is contained in:
parent
70e82a3260
commit
1721cddc63
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49974",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-06T01:15:07.103",
|
||||
"lastModified": "2024-03-06T15:18:08.093",
|
||||
"lastModified": "2024-08-15T21:35:00.653",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de cross-site scripting (XSS) en Customer Support System v1 permite a los atacantes ejecutar scripts web arbitrarios o HTML a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de contacto en /customer_support/index.php?page=customer_list."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49974",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2011",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-06-11T14:15:11.050",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-15T21:25:45.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7593C74-2882-45D3-AB32-3A45E3AECAAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BFAA55C-0815-4ACA-A649-F1F910411885"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7EE987B2-0620-44BB-AEA7-4E20CBE44822"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2009AD7-6DF9-4DFC-B9F2-8632AC037A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78C9E5B-5876-4F15-A98A-359193287446"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73AAF812-D503-4672-98A7-53C332317A30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ABB4A53-07A0-4F9A-824B-A1AC71CCB44E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D83E9A04-633A-493B-BD7A-ED28B88A521D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000194&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2012",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-06-11T14:15:11.273",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-15T21:19:03.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7593C74-2882-45D3-AB32-3A45E3AECAAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BFAA55C-0815-4ACA-A649-F1F910411885"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7EE987B2-0620-44BB-AEA7-4E20CBE44822"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2009AD7-6DF9-4DFC-B9F2-8632AC037A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78C9E5B-5876-4F15-A98A-359193287446"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73AAF812-D503-4672-98A7-53C332317A30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:pc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3071C1DE-77EE-4B40-A382-19A97770D49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ABB4A53-07A0-4F9A-824B-A1AC71CCB44E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D83E9A04-633A-493B-BD7A-ED28B88A521D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2013",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-06-11T14:15:11.503",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-15T21:08:02.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,70 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7593C74-2882-45D3-AB32-3A45E3AECAAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BFAA55C-0815-4ACA-A649-F1F910411885"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7EE987B2-0620-44BB-AEA7-4E20CBE44822"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2009AD7-6DF9-4DFC-B9F2-8632AC037A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78C9E5B-5876-4F15-A98A-359193287446"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73AAF812-D503-4672-98A7-53C332317A30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:pc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3071C1DE-77EE-4B40-A382-19A97770D49B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA6755A-0553-4246-B462-7580B080FDEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D83E9A04-633A-493B-BD7A-ED28B88A521D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22917",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-27T02:15:06.537",
|
||||
"lastModified": "2024-02-27T14:20:06.637",
|
||||
"lastModified": "2024-08-15T21:35:02.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en el proyecto Dynamic Lab Management System en PHP v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2024-22917/blob/main/CVE-22",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23168",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T19:15:18.070",
|
||||
"lastModified": "2024-08-15T19:15:18.070",
|
||||
"lastModified": "2024-08-15T21:35:03.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Vulnerability in Xiexe XSOverlay before build 647 allows non-local websites to send the malicious commands to the WebSocket API, resulting in the arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1385"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xiexe/XSOverlay-Issue-Tracker",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24035",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T21:15:08.223",
|
||||
"lastModified": "2024-03-08T14:02:57.420",
|
||||
"lastModified": "2024-08-15T21:35:04.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross Site Scripting (XSS) en Setor Informatica SIL 3.1 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro hmessage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ELIZEUOPAIN/CVE-2024-24035/tree/main",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-20T18:15:52.463",
|
||||
"lastModified": "2024-06-10T16:15:12.127",
|
||||
"lastModified": "2024-08-15T21:35:04.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,46 @@
|
||||
"value": "QEMU anterior a 8.2.0 tiene un desbordamiento de n\u00famero entero y un desbordamiento de b\u00fafer resultante, a trav\u00e9s de un comando TI cuando una longitud de transferencia esperada que no es DMA es menor que la longitud de los datos FIFO disponibles. Esto ocurre en esp_do_nodma en hw/scsi/esp.c debido a un desbordamiento insuficiente de async_len."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/1047524396/5ce07b9d387095c276b1cd234ae5615e",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24506",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-03T07:15:42.663",
|
||||
"lastModified": "2024-04-03T12:38:04.840",
|
||||
"lastModified": "2024-08-15T20:35:02.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross Site Scripting (XSS) en Lime Survey Community Edition versi\u00f3n v.5.3.32+220817, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de direcci\u00f3n de correo electr\u00f3nico del administrador en la funci\u00f3n de configuraci\u00f3n general."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.limesurvey.org/bug_relationship_graph.php?bug_id=19364&graph=relation",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24512",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T23:15:08.313",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-08-15T21:35:05.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de Cross-Site Scripting en Pkp OJS v.3.4 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente de subt\u00edtulos de entrada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1jRsltje5PRkgigcY5qLWB3GhF0e9j6aF/view?usp=sharing",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25141",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-02-20T21:15:08.267",
|
||||
"lastModified": "2024-02-20T22:15:08.670",
|
||||
"lastModified": "2024-08-15T20:35:03.310",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Cuando se habilit\u00f3 SSL para Mongo Hook, la configuraci\u00f3n predeterminada inclu\u00eda \"allow_insecure\", lo que provocaba que los certificados no se validaran. Esto fue inesperado e indocumentado. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.0.0, que soluciona este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25175",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-25T15:15:52.123",
|
||||
"lastModified": "2024-03-25T16:43:06.137",
|
||||
"lastModified": "2024-08-15T21:35:06.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Kickdler anterior a v1.107.0 permite a los atacantes proporcionar un payload XSS a trav\u00e9s de un ataque de divisi\u00f3n de respuesta HTTP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jet-pentest/CVE-2024-25175",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25327",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-08T00:15:49.977",
|
||||
"lastModified": "2024-03-08T14:02:57.420",
|
||||
"lastModified": "2024-08-15T21:35:07.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross Site Scripting (XSS) en Justice Systems FullCourt Enterprise v.8.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro formatCaseNumber de la funci\u00f3n de b\u00fasqueda de citas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/177500/FullCourt-Enterprise-8.2-Cross-Site-Scripting.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25438",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T23:15:08.457",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-08-15T21:35:08.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el m\u00f3dulo de env\u00edo de Pkp Ojs v3.3 permite a los atacantes ejecutar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo Asunto de entrada bajo la funci\u00f3n Agregar discusi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1-9yUkbsQ-blYpTsdZoXfu3ALBA5wQCbG/view?usp=sharing",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T20:15:46.727",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-15T20:35:03.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Directory Traversal en Terrasoft, Creatio Terrasoft CRM v.7.18.4.1532 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud manipulada al componente terrasoft.axd."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://safe-surf.ru/specialists/news/697426/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25875",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-22T14:15:46.990",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-15T21:35:09.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de cross site scripting (XSS) en el m\u00f3dulo de encabezado de Enhavo CMS v0.13.1 permite a los atacantes ejecutar scrips web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto Subt\u00edtulo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-undertitel-v0.13.1.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25895",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T18:15:51.680",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-15T20:35:04.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad Cross-Site Scripting (XSS) Reflejada en ChurchCRM 5.5.0 permite a atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s del par\u00e1metro de tipo /EventAttendance.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/6853",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25993",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:47.883",
|
||||
"lastModified": "2024-03-15T20:15:08.167",
|
||||
"lastModified": "2024-08-15T20:35:05.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En tmu_reset_tmu_trip_counter de TBD, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26542",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-27T22:15:15.890",
|
||||
"lastModified": "2024-02-28T14:06:45.783",
|
||||
"lastModified": "2024-08-15T21:35:10.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross Site Scripting en Bonitasoft, SA v.7.14. y corregido en v.9.0.2, 8.0.3, 7.15.7, 7.14.8 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el campo Nombre para mostrar de grupos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-26542/README.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27219",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:48.423",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-08-15T20:35:06.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En tmu_set_pi de tmu.c, hay una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-04T15:15:07.167",
|
||||
"lastModified": "2024-03-04T15:35:25.673",
|
||||
"lastModified": "2024-08-15T21:35:11.063",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Flusity-CMS v2.33 es vulnerable a Cross Site Scripting (XSS) en el \"formulario de contacto\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaolanjing0/cms/blob/main/4.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28020",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-06-11T19:16:05.787",
|
||||
"lastModified": "2024-06-13T18:36:09.013",
|
||||
"lastModified": "2024-08-15T21:32:33.467",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman_un:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE718EB5-3F54-4CCB-A34E-5BA0DF87EEF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman_un:r15b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB17D0E8-A0AD-4B1B-A92B-110521975AE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman_un:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3ED924CD-4EBF-453E-BC07-40EB415F2585"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman_un:r16b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D92BFBB-239A-4188-A227-67D13C84CA5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78C9E5B-5876-4F15-A98A-359193287446"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3168F38-7B9E-4F4D-B6D0-1BAFB5FE05F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ABB4A53-07A0-4F9A-824B-A1AC71CCB44E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA6755A-0553-4246-B462-7580B080FDEF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000194&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28021",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-06-11T14:15:10.587",
|
||||
"lastModified": "2024-06-13T18:36:45.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-15T21:29:46.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BFAA55C-0815-4ACA-A649-F1F910411885"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2009AD7-6DF9-4DFC-B9F2-8632AC037A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman_un:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE718EB5-3F54-4CCB-A34E-5BA0DF87EEF0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman_un:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3ED924CD-4EBF-453E-BC07-40EB415F2585"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78C9E5B-5876-4F15-A98A-359193287446"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:pc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "73AAF812-D503-4672-98A7-53C332317A30"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ABB4A53-07A0-4F9A-824B-A1AC71CCB44E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:pc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D83E9A04-633A-493B-BD7A-ED28B88A521D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000194&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28022",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-06-11T19:16:06.017",
|
||||
"lastModified": "2024-06-13T18:36:09.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-15T21:44:20.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7593C74-2882-45D3-AB32-3A45E3AECAAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47606044-296D-4561-B9DC-82659BC666F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7EE987B2-0620-44BB-AEA7-4E20CBE44822"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE743C56-A17F-4FA7-9998-0C767E07518A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78C9E5B-5876-4F15-A98A-359193287446"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3168F38-7B9E-4F4D-B6D0-1BAFB5FE05F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ABB4A53-07A0-4F9A-824B-A1AC71CCB44E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA6755A-0553-4246-B462-7580B080FDEF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000194&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28024",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2024-06-11T19:16:06.243",
|
||||
"lastModified": "2024-06-13T18:36:09.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-15T21:46:11.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7593C74-2882-45D3-AB32-3A45E3AECAAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r15b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47606044-296D-4561-B9DC-82659BC666F2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7EE987B2-0620-44BB-AEA7-4E20CBE44822"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:foxman-un:r16b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE743C56-A17F-4FA7-9998-0C767E07518A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E78C9E5B-5876-4F15-A98A-359193287446"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r15b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3168F38-7B9E-4F4D-B6D0-1BAFB5FE05F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7ABB4A53-07A0-4F9A-824B-A1AC71CCB44E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hitachienergy:unem:r16b:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADA6755A-0553-4246-B462-7580B080FDEF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000194&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000201&languageCode=en&Preview=true",
|
||||
"source": "cybersecurity@hitachienergy.com"
|
||||
"source": "cybersecurity@hitachienergy.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28623",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T08:15:43.497",
|
||||
"lastModified": "2024-03-13T12:33:51.697",
|
||||
"lastModified": "2024-08-15T21:35:11.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que RiteCMS v3.0.0 contiene una vulnerabilidad de Cross Site Scripting (XSS) a trav\u00e9s del componente main_menu/edit_section."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GURJOTEXPERT/ritecms",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28670",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T16:15:30.147",
|
||||
"lastModified": "2024-03-13T18:15:58.530",
|
||||
"lastModified": "2024-08-15T20:35:07.023",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/freelist_main.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/777erp/cms/blob/main/9.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T16:15:30.530",
|
||||
"lastModified": "2024-03-13T18:15:58.530",
|
||||
"lastModified": "2024-08-15T20:35:07.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/diy_add.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/777erp/cms/blob/main/11.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28683",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-13T16:15:30.667",
|
||||
"lastModified": "2024-03-13T18:15:58.530",
|
||||
"lastModified": "2024-08-15T20:35:08.767",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross Site Scripting (XSS) mediante la creaci\u00f3n de un archivo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/777erp/cms/blob/main/20.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29374",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-21T19:15:09.377",
|
||||
"lastModified": "2024-03-21T19:47:03.943",
|
||||
"lastModified": "2024-08-15T20:35:09.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Existe una vulnerabilidad de cross-site scripting (XSS) en la forma en que MOODLE 3.10.9 maneja la entrada del usuario dentro del par\u00e1metro URL \"GET /?lang=\"."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/fir3storm/f9c7f3ec1a6496498517ed216d2640b2",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-29471",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-20T21:15:32.370",
|
||||
"lastModified": "2024-04-30T20:22:53.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-15T20:35:10.563",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30632",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-29T13:15:16.363",
|
||||
"lastModified": "2024-03-29T13:28:22.880",
|
||||
"lastModified": "2024-08-15T20:35:11.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda FH1205 v2.0.0.7(775) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro security_5g de la funci\u00f3n formWifiBasicSet."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security_5g.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-30639",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-29T14:15:14.837",
|
||||
"lastModified": "2024-04-01T01:12:59.077",
|
||||
"lastModified": "2024-08-15T20:35:12.280",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda F1202 v1.2.0.20(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro de p\u00e1gina de la funci\u00f3n fromAddressNat."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_page.md",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38191",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:27.977",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:58:12.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kernel Streaming Service Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador del servicio de transmisi\u00f3n de kernel"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,113 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7159",
|
||||
"matchCriteriaId": "BEEE46C5-718B-43C5-8B06-A4CB2E0DEF7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6054",
|
||||
"matchCriteriaId": "3EE3B092-248B-4F68-AA13-DF4FB2E0DA3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4651",
|
||||
"matchCriteriaId": "905A0D97-FCF2-4999-A3F3-C79D88511D52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4651",
|
||||
"matchCriteriaId": "2DEB25D6-2E73-4DF4-9D7D-2C9780101B1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3079",
|
||||
"matchCriteriaId": "1F4C0A5A-B376-4DE8-A02A-5E341825AAAB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3880",
|
||||
"matchCriteriaId": "A2B9B3F1-347C-4935-BFA9-6B4191831D28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3880",
|
||||
"matchCriteriaId": "E199129F-7F75-42C8-ABA0-7439FE50676B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.24975",
|
||||
"matchCriteriaId": "4E618C1D-665C-44E9-A319-9A845393E3CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7159",
|
||||
"matchCriteriaId": "59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6054",
|
||||
"matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2582",
|
||||
"matchCriteriaId": "4E433A09-F730-4EBE-8050-8789755B0D35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1009",
|
||||
"matchCriteriaId": "EDA01A4A-9AED-484A-8B10-3282FA13F635"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38191",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38195",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:28.470",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:56:25.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure CycleCloud Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Azure CycleCloud"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_cyclecloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.6.3",
|
||||
"matchCriteriaId": "4AE49D2B-8824-41B5-A8B6-F71E53B2A2A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38195",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38196",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:28.710",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:54:50.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del controlador del sistema de archivos de registro com\u00fan de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38196",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38197",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:28.957",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:40:58.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Teams for iOS Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Microsoft Teams para la vulnerabilidad de suplantaci\u00f3n de iOS"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:teams:*:*:*:*:*:iphone_os:*:*",
|
||||
"versionEndExcluding": "7.13.0",
|
||||
"matchCriteriaId": "C4E5BAE0-E39F-4B70-8C1C-E57F64B84B03"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38197",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38198",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:29.193",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:39:20.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la cola de impresi\u00f3n de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38198",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38199",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:29.443",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:32:42.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servicio Windows Line Printer Daemon (LPD)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38199",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38201",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:29.953",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:30:00.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Stack Hub Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Azure Stack Hub"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2311.1.22",
|
||||
"matchCriteriaId": "4DEE9E34-FE45-43E2-BB61-075F9B9DF83D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38201",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38211",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:30.470",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:29:19.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de cross site scripting en Microsoft Dynamics 365 (local)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:dynamics_365:9.1:*:*:*:on-premises:*:*:*",
|
||||
"matchCriteriaId": "5ADE397C-8342-48C2-8A26-2C5A4E367975"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38211",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38214",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:30.983",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:28:25.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servicio de enrutamiento y acceso remoto de Windows (RRAS)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38214",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38223",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:31.810",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:18:28.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Initial Machine Configuration Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la configuraci\u00f3n inicial de la m\u00e1quina de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38223",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-39338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:24.487",
|
||||
"lastModified": "2024-08-12T21:35:08.523",
|
||||
"lastModified": "2024-08-15T20:35:13.427",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "axios 1.7.2 permite SSRF a trav\u00e9s de un comportamiento inesperado donde las solicitudes de URL relativas a la ruta se procesan como URL relativas al protocolo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -18,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40704",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-08-15T17:15:17.697",
|
||||
"lastModified": "2024-08-15T17:34:07.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-15T20:03:13.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -13,6 +13,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -47,14 +67,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1928ECF9-C96F-4584-B575-9F7FEE735B81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "110EA576-3285-4C15-A4F9-664BE7B97BEA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/298277",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7160853",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-424xx/CVE-2024-42487.json
Normal file
64
CVE-2024/CVE-2024-424xx/CVE-2024-42487.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-42487",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-15T21:15:16.997",
|
||||
"lastModified": "2024-08-15T21:15:16.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In the 1.15 branch prior to 1.15.8 and the 1.16 branch prior to 1.16.1, Gateway API HTTPRoutes and GRPCRoutes do not follow the match precedence specified in the Gateway API specification. In particular, request headers are matched before request methods, when the specification describes that the request methods must be respected before headers are matched. This could result in unexpected behaviour with security This issue is fixed in Cilium v1.15.8 and v1.16.1. There is no workaround for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-113"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/commit/a3510fe4a92305822aa1a5e08cb6d6c873c8699a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/pull/34109",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-qcm3-7879-xcww",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-424xx/CVE-2024-42488.json
Normal file
64
CVE-2024/CVE-2024-424xx/CVE-2024-42488.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-42488",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-15T21:15:17.270",
|
||||
"lastModified": "2024-08-15T21:15:17.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.14.14 and 1.15.8, a race condition in the Cilium agent can cause the agent to ignore labels that should be applied to a node. This could in turn cause CiliumClusterwideNetworkPolicies intended for nodes with the ignored label to not apply, leading to policy bypass. This issue has been patched in Cilium v1.14.14 and v1.15.8 As the underlying issue depends on a race condition, users unable to upgrade can restart the Cilium agent on affected nodes until the affected policies are confirmed to be working as expected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/commit/aa44dd148a9be95e07782e4f990e61678ef0abf8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/pull/33511",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-q7w8-72mr-vpgw",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-433xx/CVE-2024-43366.json
Normal file
56
CVE-2024/CVE-2024-433xx/CVE-2024-43366.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-43366",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-15T21:15:17.520",
|
||||
"lastModified": "2024-08-15T21:15:17.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "zkvyper is a Vyper compiler. Starting in version 1.3.12 and prior to version 1.5.3, since LLL IR has no Turing-incompletness restrictions, it is compiled to a loop with a much more late exit condition. It leads to a loss of funds or other unwanted behavior if the loop body contains it. However, more real-life use cases like iterating over an array are not affected. No contracts were affected by this issue, which was fixed in version 1.5.3. Upgrading and redeploying affected contracts is the only way to avoid the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-835"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/matter-labs/era-compiler-vyper/security/advisories/GHSA-8j77-7rrv-6pxx",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-433xx/CVE-2024-43367.json
Normal file
64
CVE-2024/CVE-2024-433xx/CVE-2024-43367.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-43367",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-15T21:15:17.777",
|
||||
"lastModified": "2024-08-15T21:15:17.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript's `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa's implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise's `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don't impact the availability of the main application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-248"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-64xx/CVE-2024-6456.json
Normal file
78
CVE-2024/CVE-2024-64xx/CVE-2024-6456.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-6456",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-08-15T21:15:18.047",
|
||||
"lastModified": "2024-08-15T21:15:18.047",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "AVEVA Historian Server has a vulnerability, if exploited, could allow a malicious SQL command to execute under the privileges of an interactive Historian REST Interface user who had been socially engineered by a miscreant into opening a specially crafted URL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-228-10",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-78xx/CVE-2024-7838.json
Normal file
137
CVE-2024/CVE-2024-78xx/CVE-2024-7838.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7838",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-15T20:15:18.457",
|
||||
"lastModified": "2024-08-15T20:15:18.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcategory.php. The manipulation of the argument cname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/a/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274742",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274742",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.391525",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-78xx/CVE-2024-7839.json
Normal file
137
CVE-2024/CVE-2024-78xx/CVE-2024-7839.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-7839",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-08-15T21:15:18.237",
|
||||
"lastModified": "2024-08-15T21:15:18.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in itsourcecode Billing System 1.0. This affects an unknown part of the file addbill.php. The manipulation of the argument owners_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ppp-src/a/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.274743",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.274743",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.391531",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-78xx/CVE-2024-7866.json
Normal file
78
CVE-2024/CVE-2024-78xx/CVE-2024-7866.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-7866",
|
||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||
"published": "2024-08-15T20:15:18.793",
|
||||
"lastModified": "2024-08-15T20:15:18.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Xpdf 4.05 (and earlier), a PDF object loop in a pattern resource leads to infinite recursion and a stack overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-674"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.xpdfreader.com/security-bug/object-loops.html",
|
||||
"source": "xpdf@xpdfreader.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2024/CVE-2024-78xx/CVE-2024-7867.json
Normal file
82
CVE-2024/CVE-2024-78xx/CVE-2024-7867.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2024-7867",
|
||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||
"published": "2024-08-15T20:15:18.967",
|
||||
"lastModified": "2024-08-15T20:15:18.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Xpdf 4.05 (and earlier), very large coordinates in a page box can cause an integer overflow and divide-by-zero."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-7867.html",
|
||||
"source": "xpdf@xpdfreader.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-78xx/CVE-2024-7868.json
Normal file
78
CVE-2024/CVE-2024-78xx/CVE-2024-7868.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-7868",
|
||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||
"published": "2024-08-15T21:15:18.530",
|
||||
"lastModified": "2024-08-15T21:15:18.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Xpdf 4.05 (and earlier), invalid header info in a DCT (JPEG) stream can lead to an uninitialized variable in the DCT decoder. The proof-of-concept PDF file causes a segfault attempting to read from an invalid address."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 2.1,
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "xpdf@xpdfreader.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-7868.html",
|
||||
"source": "xpdf@xpdfreader.com"
|
||||
}
|
||||
]
|
||||
}
|
85
README.md
85
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-15T20:00:22.922220+00:00
|
||||
2024-08-15T22:00:17.761064+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-15T19:57:34.780000+00:00
|
||||
2024-08-15T21:46:11.737000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,59 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260162
|
||||
260172
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-22217](CVE-2024/CVE-2024-222xx/CVE-2024-22217.json) (`2024-08-15T18:15:19.090`)
|
||||
- [CVE-2024-22218](CVE-2024/CVE-2024-222xx/CVE-2024-22218.json) (`2024-08-15T18:15:19.197`)
|
||||
- [CVE-2024-22219](CVE-2024/CVE-2024-222xx/CVE-2024-22219.json) (`2024-08-15T18:15:19.290`)
|
||||
- [CVE-2024-23168](CVE-2024/CVE-2024-231xx/CVE-2024-23168.json) (`2024-08-15T19:15:18.070`)
|
||||
- [CVE-2024-25633](CVE-2024/CVE-2024-256xx/CVE-2024-25633.json) (`2024-08-15T19:15:18.213`)
|
||||
- [CVE-2024-27728](CVE-2024/CVE-2024-277xx/CVE-2024-27728.json) (`2024-08-15T19:15:18.477`)
|
||||
- [CVE-2024-27729](CVE-2024/CVE-2024-277xx/CVE-2024-27729.json) (`2024-08-15T19:15:18.573`)
|
||||
- [CVE-2024-27730](CVE-2024/CVE-2024-277xx/CVE-2024-27730.json) (`2024-08-15T19:15:18.663`)
|
||||
- [CVE-2024-27731](CVE-2024/CVE-2024-277xx/CVE-2024-27731.json) (`2024-08-15T19:15:18.770`)
|
||||
- [CVE-2024-32231](CVE-2024/CVE-2024-322xx/CVE-2024-32231.json) (`2024-08-15T18:15:19.507`)
|
||||
- [CVE-2024-42472](CVE-2024/CVE-2024-424xx/CVE-2024-42472.json) (`2024-08-15T19:15:19.233`)
|
||||
- [CVE-2024-42475](CVE-2024/CVE-2024-424xx/CVE-2024-42475.json) (`2024-08-15T19:15:19.520`)
|
||||
- [CVE-2024-42476](CVE-2024/CVE-2024-424xx/CVE-2024-42476.json) (`2024-08-15T19:15:19.753`)
|
||||
- [CVE-2024-42757](CVE-2024/CVE-2024-427xx/CVE-2024-42757.json) (`2024-08-15T19:15:19.977`)
|
||||
- [CVE-2024-43357](CVE-2024/CVE-2024-433xx/CVE-2024-43357.json) (`2024-08-15T19:15:20.107`)
|
||||
- [CVE-2024-42487](CVE-2024/CVE-2024-424xx/CVE-2024-42487.json) (`2024-08-15T21:15:16.997`)
|
||||
- [CVE-2024-42488](CVE-2024/CVE-2024-424xx/CVE-2024-42488.json) (`2024-08-15T21:15:17.270`)
|
||||
- [CVE-2024-43366](CVE-2024/CVE-2024-433xx/CVE-2024-43366.json) (`2024-08-15T21:15:17.520`)
|
||||
- [CVE-2024-43367](CVE-2024/CVE-2024-433xx/CVE-2024-43367.json) (`2024-08-15T21:15:17.777`)
|
||||
- [CVE-2024-6456](CVE-2024/CVE-2024-64xx/CVE-2024-6456.json) (`2024-08-15T21:15:18.047`)
|
||||
- [CVE-2024-7838](CVE-2024/CVE-2024-78xx/CVE-2024-7838.json) (`2024-08-15T20:15:18.457`)
|
||||
- [CVE-2024-7839](CVE-2024/CVE-2024-78xx/CVE-2024-7839.json) (`2024-08-15T21:15:18.237`)
|
||||
- [CVE-2024-7866](CVE-2024/CVE-2024-78xx/CVE-2024-7866.json) (`2024-08-15T20:15:18.793`)
|
||||
- [CVE-2024-7867](CVE-2024/CVE-2024-78xx/CVE-2024-7867.json) (`2024-08-15T20:15:18.967`)
|
||||
- [CVE-2024-7868](CVE-2024/CVE-2024-78xx/CVE-2024-7868.json) (`2024-08-15T21:15:18.530`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `69`
|
||||
Recently modified CVEs: `45`
|
||||
|
||||
- [CVE-2024-5678](CVE-2024/CVE-2024-56xx/CVE-2024-5678.json) (`2024-08-15T18:05:54.847`)
|
||||
- [CVE-2024-7326](CVE-2024/CVE-2024-73xx/CVE-2024-7326.json) (`2024-08-15T19:03:41.457`)
|
||||
- [CVE-2024-7342](CVE-2024/CVE-2024-73xx/CVE-2024-7342.json) (`2024-08-15T18:40:22.537`)
|
||||
- [CVE-2024-7343](CVE-2024/CVE-2024-73xx/CVE-2024-7343.json) (`2024-08-15T18:40:52.707`)
|
||||
- [CVE-2024-7635](CVE-2024/CVE-2024-76xx/CVE-2024-7635.json) (`2024-08-15T18:12:33.270`)
|
||||
- [CVE-2024-7636](CVE-2024/CVE-2024-76xx/CVE-2024-7636.json) (`2024-08-15T18:13:23.327`)
|
||||
- [CVE-2024-7637](CVE-2024/CVE-2024-76xx/CVE-2024-7637.json) (`2024-08-15T18:15:15.667`)
|
||||
- [CVE-2024-7638](CVE-2024/CVE-2024-76xx/CVE-2024-7638.json) (`2024-08-15T18:15:11.510`)
|
||||
- [CVE-2024-7639](CVE-2024/CVE-2024-76xx/CVE-2024-7639.json) (`2024-08-15T18:15:52.173`)
|
||||
- [CVE-2024-7640](CVE-2024/CVE-2024-76xx/CVE-2024-7640.json) (`2024-08-15T18:16:20.883`)
|
||||
- [CVE-2024-7641](CVE-2024/CVE-2024-76xx/CVE-2024-7641.json) (`2024-08-15T18:17:06.590`)
|
||||
- [CVE-2024-7642](CVE-2024/CVE-2024-76xx/CVE-2024-7642.json) (`2024-08-15T18:17:34.597`)
|
||||
- [CVE-2024-7643](CVE-2024/CVE-2024-76xx/CVE-2024-7643.json) (`2024-08-15T18:18:22.827`)
|
||||
- [CVE-2024-7644](CVE-2024/CVE-2024-76xx/CVE-2024-7644.json) (`2024-08-15T18:19:11.080`)
|
||||
- [CVE-2024-7665](CVE-2024/CVE-2024-76xx/CVE-2024-7665.json) (`2024-08-15T18:00:13.487`)
|
||||
- [CVE-2024-7666](CVE-2024/CVE-2024-76xx/CVE-2024-7666.json) (`2024-08-15T18:01:41.587`)
|
||||
- [CVE-2024-7667](CVE-2024/CVE-2024-76xx/CVE-2024-7667.json) (`2024-08-15T18:02:40.753`)
|
||||
- [CVE-2024-7668](CVE-2024/CVE-2024-76xx/CVE-2024-7668.json) (`2024-08-15T18:03:27.230`)
|
||||
- [CVE-2024-7669](CVE-2024/CVE-2024-76xx/CVE-2024-7669.json) (`2024-08-15T18:04:10.683`)
|
||||
- [CVE-2024-7676](CVE-2024/CVE-2024-76xx/CVE-2024-7676.json) (`2024-08-15T18:05:17.853`)
|
||||
- [CVE-2024-7677](CVE-2024/CVE-2024-76xx/CVE-2024-7677.json) (`2024-08-15T18:06:06.680`)
|
||||
- [CVE-2024-7678](CVE-2024/CVE-2024-76xx/CVE-2024-7678.json) (`2024-08-15T18:06:54.127`)
|
||||
- [CVE-2024-7680](CVE-2024/CVE-2024-76xx/CVE-2024-7680.json) (`2024-08-15T18:08:52.780`)
|
||||
- [CVE-2024-7681](CVE-2024/CVE-2024-76xx/CVE-2024-7681.json) (`2024-08-15T18:09:55.887`)
|
||||
- [CVE-2024-7682](CVE-2024/CVE-2024-76xx/CVE-2024-7682.json) (`2024-08-15T18:10:41.557`)
|
||||
- [CVE-2024-27680](CVE-2024/CVE-2024-276xx/CVE-2024-27680.json) (`2024-08-15T21:35:11.063`)
|
||||
- [CVE-2024-28020](CVE-2024/CVE-2024-280xx/CVE-2024-28020.json) (`2024-08-15T21:32:33.467`)
|
||||
- [CVE-2024-28021](CVE-2024/CVE-2024-280xx/CVE-2024-28021.json) (`2024-08-15T21:29:46.697`)
|
||||
- [CVE-2024-28022](CVE-2024/CVE-2024-280xx/CVE-2024-28022.json) (`2024-08-15T21:44:20.677`)
|
||||
- [CVE-2024-28024](CVE-2024/CVE-2024-280xx/CVE-2024-28024.json) (`2024-08-15T21:46:11.737`)
|
||||
- [CVE-2024-28623](CVE-2024/CVE-2024-286xx/CVE-2024-28623.json) (`2024-08-15T21:35:11.883`)
|
||||
- [CVE-2024-28670](CVE-2024/CVE-2024-286xx/CVE-2024-28670.json) (`2024-08-15T20:35:07.023`)
|
||||
- [CVE-2024-28680](CVE-2024/CVE-2024-286xx/CVE-2024-28680.json) (`2024-08-15T20:35:07.960`)
|
||||
- [CVE-2024-28683](CVE-2024/CVE-2024-286xx/CVE-2024-28683.json) (`2024-08-15T20:35:08.767`)
|
||||
- [CVE-2024-29374](CVE-2024/CVE-2024-293xx/CVE-2024-29374.json) (`2024-08-15T20:35:09.683`)
|
||||
- [CVE-2024-29471](CVE-2024/CVE-2024-294xx/CVE-2024-29471.json) (`2024-08-15T20:35:10.563`)
|
||||
- [CVE-2024-30632](CVE-2024/CVE-2024-306xx/CVE-2024-30632.json) (`2024-08-15T20:35:11.387`)
|
||||
- [CVE-2024-30639](CVE-2024/CVE-2024-306xx/CVE-2024-30639.json) (`2024-08-15T20:35:12.280`)
|
||||
- [CVE-2024-38191](CVE-2024/CVE-2024-381xx/CVE-2024-38191.json) (`2024-08-15T20:58:12.813`)
|
||||
- [CVE-2024-38195](CVE-2024/CVE-2024-381xx/CVE-2024-38195.json) (`2024-08-15T20:56:25.100`)
|
||||
- [CVE-2024-38196](CVE-2024/CVE-2024-381xx/CVE-2024-38196.json) (`2024-08-15T20:54:50.510`)
|
||||
- [CVE-2024-38197](CVE-2024/CVE-2024-381xx/CVE-2024-38197.json) (`2024-08-15T20:40:58.547`)
|
||||
- [CVE-2024-38198](CVE-2024/CVE-2024-381xx/CVE-2024-38198.json) (`2024-08-15T20:39:20.260`)
|
||||
- [CVE-2024-38199](CVE-2024/CVE-2024-381xx/CVE-2024-38199.json) (`2024-08-15T20:32:42.193`)
|
||||
- [CVE-2024-38201](CVE-2024/CVE-2024-382xx/CVE-2024-38201.json) (`2024-08-15T20:30:00.737`)
|
||||
- [CVE-2024-38211](CVE-2024/CVE-2024-382xx/CVE-2024-38211.json) (`2024-08-15T20:29:19.557`)
|
||||
- [CVE-2024-38214](CVE-2024/CVE-2024-382xx/CVE-2024-38214.json) (`2024-08-15T20:28:25.893`)
|
||||
- [CVE-2024-38223](CVE-2024/CVE-2024-382xx/CVE-2024-38223.json) (`2024-08-15T20:18:28.240`)
|
||||
- [CVE-2024-39338](CVE-2024/CVE-2024-393xx/CVE-2024-39338.json) (`2024-08-15T20:35:13.427`)
|
||||
- [CVE-2024-40704](CVE-2024/CVE-2024-407xx/CVE-2024-40704.json) (`2024-08-15T20:03:13.530`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
266
_state.csv
266
_state.csv
@ -136725,7 +136725,7 @@ CVE-2019-19751,0,0,333e2228e5359aa9aa6607b9b93a13db1e1e4a3afd8a27e1b0809b961a7ad
|
||||
CVE-2019-19752,0,0,ca1be8726247421589be653e6b118d85fb80821e3a23f9fa9ad5253805bdcc1d,2024-04-30T19:35:36.960000
|
||||
CVE-2019-19753,0,0,52a2eda005171f44f58b41fc51a75b87a28c32216d9047f516bbb7dcadc26132,2024-08-01T13:41:49.557000
|
||||
CVE-2019-19754,0,0,cea16ae880519bbe1d98fa9bfa11e9d2b0fb7aed20d6d73373e4fe599034df53,2024-07-03T01:35:48.790000
|
||||
CVE-2019-19755,0,1,3b97901c49f784d257918947dc2314cb49f75323594fa7abf658f7cee8cf116d,2024-08-15T19:35:01.400000
|
||||
CVE-2019-19755,0,0,3b97901c49f784d257918947dc2314cb49f75323594fa7abf658f7cee8cf116d,2024-08-15T19:35:01.400000
|
||||
CVE-2019-19756,0,0,1ac0bdab62e30eb5ab1a78699b860a548408938df444dc2031b32d44e57bf16c,2021-11-02T19:16:30.403000
|
||||
CVE-2019-19757,0,0,6c08333c002f3e1b918b084afd5e3199189401eb1cffc5772a8ec918e1cd505b,2020-02-24T17:53:03.400000
|
||||
CVE-2019-19758,0,0,f3cf0ee2a978417eaa68c2b04df4207f79bbea00f53f54a34da27466d93768b8,2020-02-27T14:16:50.720000
|
||||
@ -227718,7 +227718,7 @@ CVE-2023-37171,0,0,de3454764f71bd1f8ad37fb6dd86fa7322b2ab658f97e7bbbae2f9397bd31
|
||||
CVE-2023-37172,0,0,a4d5bdbbdba91fb16a6cc6636b6832431be2baba0397d040d60d7c3103b8ac7e,2023-07-13T17:32:10.703000
|
||||
CVE-2023-37173,0,0,744d33bc4f109f3ff085755e285fceeb59189cc90cc657fe137ab2b848db5bce,2023-07-13T17:32:19.120000
|
||||
CVE-2023-37174,0,0,c95311a6c7b0528d0e80eea5590c16c6c4a0f85759462a38a8dbf274b008cb9d,2023-07-19T13:19:23.043000
|
||||
CVE-2023-37177,0,1,9b87373d7bdec4912db12ff532dbeab6082d39c7c3e72adf8d917a25fc630bf0,2024-08-15T18:35:03.150000
|
||||
CVE-2023-37177,0,0,9b87373d7bdec4912db12ff532dbeab6082d39c7c3e72adf8d917a25fc630bf0,2024-08-15T18:35:03.150000
|
||||
CVE-2023-3718,0,0,9db573af98fef03baf73fb260bd8e094b6687aa40a3c3478f57e2fae7d6ca330,2023-08-08T17:08:55.400000
|
||||
CVE-2023-37185,0,0,ff2e0ffb5b528321d4ad09484a8a73871e4be3a2b94099fdde93751d7ff089de,2023-12-29T18:38:31.433000
|
||||
CVE-2023-37186,0,0,d6b02c8ce24f7d565c6dde63939458d23062e170ae6ac422845ba55ed12244fd,2023-12-29T18:38:38.973000
|
||||
@ -230097,7 +230097,7 @@ CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903
|
||||
CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d430,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40112,0,0,4ddec6ab2662940b93a3dc42430a4fadcac48159b9ef1e91d81653103c488b43,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40114,0,1,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04
|
||||
CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04
|
||||
CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000
|
||||
CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000
|
||||
CVE-2023-40117,0,0,57dd588e64faf0fa05de5473eaae07275e194e00cf25e46098211736a1cf0d97,2023-10-30T17:13:04.600000
|
||||
@ -237091,7 +237091,7 @@ CVE-2023-4997,0,0,4afed0de14254e77a99b729070c5643ffbf1676389fe16cc856891c73125b6
|
||||
CVE-2023-49970,0,0,5502d6fa1c46a421a8d44ecff9c8db4116bf0ff4c0f42a9e95eba6058d2868c7,2024-03-05T13:41:01.900000
|
||||
CVE-2023-49971,0,0,374def7d9c689df8f58cc4989e4ea0ed3c5a8e848866980b25656660a7f6c663,2024-08-06T14:35:02.513000
|
||||
CVE-2023-49973,0,0,ca1ed5b6df9a46488025a136b2ec31b6790ba3cc516f6b9d8e6dd1ad7f0f7877,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49974,0,0,f5124dacffcab9dae9197d45eeb738402a1e8f4da75c3be6a33ffe13a23af038,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49974,0,1,083867d392522ad7619f542837964c1e212931b3849e0d016c825b75a8d2f854,2024-08-15T21:35:00.653000
|
||||
CVE-2023-49976,0,0,b2b5a09955514926cb7972b7101cec2b04ca5d1f7f45f6c868e7087074f700e7,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49977,0,0,aed154d4bf8ea5599b21c1e323a82e3dc2e828c1921d60bc14254ee66b176359,2024-03-06T15:18:08.093000
|
||||
CVE-2023-49978,0,0,255bd00c3d73b2dea40ba11475aa7facb0a30f1814b1a1bd06cd16bd820bf405,2024-08-03T20:35:02.260000
|
||||
@ -240949,7 +240949,7 @@ CVE-2024-0014,0,0,abd429f14dd48976397c16e9859805e84f3685452006927c1c8b58e12a55dd
|
||||
CVE-2024-0015,0,0,81cd08444b6aef5834e4eb427fcb32b84cfcb9c43ccd80385d5b532e537d2ea5,2024-02-16T19:26:55.393000
|
||||
CVE-2024-0016,0,0,9f5b99ef0d039809c901d88070265a95558aa17f1c51832fa2b12f3ceeec7221,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0018,0,1,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000
|
||||
CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000
|
||||
CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000
|
||||
CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000
|
||||
CVE-2024-0021,0,0,48878e30e65ca9b7752f91ec634b409988ea482f472219ebf9713d370864d726,2024-02-16T21:39:50.223000
|
||||
@ -242455,7 +242455,7 @@ CVE-2024-1691,0,0,2ef9826de93209d069c81e6ab358d8eb246774f7a80e6c411cef0c396fac26
|
||||
CVE-2024-1692,0,0,e629a44d67e992e57af157f5aea9a741f288cdc07f581fddcf0fc8e93b27323f,2024-04-01T01:12:59.077000
|
||||
CVE-2024-1693,0,0,7d3cbcfec88fed9681b32070817b963b8ddcb473d92ad7474c8d67a492ce3782,2024-05-14T16:13:02.773000
|
||||
CVE-2024-1694,0,0,bf85801f0832fa365d7f8985fe10eb8a950958f13710e85ca1e046f87150cc0b,2024-08-01T13:46:10.687000
|
||||
CVE-2024-1695,0,1,040d25b8839514ef94a30e51fac7a9ab85a44004216413bd5b5709553eab9e32,2024-08-15T19:35:04.110000
|
||||
CVE-2024-1695,0,0,040d25b8839514ef94a30e51fac7a9ab85a44004216413bd5b5709553eab9e32,2024-08-15T19:35:04.110000
|
||||
CVE-2024-1696,0,0,a663827cac86b281a6bafba3681725496e03564ad841117e5d12a480311031fd,2024-03-12T12:40:13.500000
|
||||
CVE-2024-1697,0,0,122d0b7b2464b5cdb9c8634ff2a556f4e654f017fc1c1b4f9f5a42e2fdd2fc2b,2024-03-25T01:51:01.223000
|
||||
CVE-2024-1698,0,0,a176064c6784ca5eaa70200471c19c22c1e7519db793cff327cfba5b41c749e3,2024-02-27T14:20:06.637000
|
||||
@ -242831,9 +242831,9 @@ CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b
|
||||
CVE-2024-20082,0,0,939e07ac5f7d9003c45edd70cf6af9d2fbc21054841b5895f6c66ae55e7316de,2024-08-14T15:35:04.003000
|
||||
CVE-2024-20083,0,0,52f24323029e3ba78b5348b46f1326d2ec4dbf8da62d0eef76d56966d5671c89,2024-08-14T13:00:48.243000
|
||||
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
|
||||
CVE-2024-2011,0,0,b92ed21b7a38ae037309fc5e23b3d331b9bad1dd1ccabe85871093b84aa070ec,2024-06-13T18:36:45.417000
|
||||
CVE-2024-2012,0,0,a768dd8feced7d799b02ec4f8dc178d2ff6751001567de726b2da481cde0069d,2024-06-13T18:36:45.417000
|
||||
CVE-2024-2013,0,0,990cfd3611b195ea1cff38f0ab2708015211bf75b29e43894d46ae4cb1aa9395,2024-06-13T18:36:45.417000
|
||||
CVE-2024-2011,0,1,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
|
||||
CVE-2024-2012,0,1,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
|
||||
CVE-2024-2013,0,1,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
|
||||
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
|
||||
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
|
||||
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
|
||||
@ -244085,7 +244085,7 @@ CVE-2024-21978,0,0,bd0ca29172ff67905ab419fb6e0b63fad45bf4b2c53567c94e0d7e696a373
|
||||
CVE-2024-21979,0,0,69d970687ec7fc10c2117ffd8a662f03f2976fe858767ebadf9aede1ce3bc7bd,2024-04-24T13:39:42.883000
|
||||
CVE-2024-2198,0,0,1df4cff98d86f3bfed69b5c9a5afedec636b00bc821bafe7fe3fd5ac8b6e5483,2024-04-10T13:23:38.787000
|
||||
CVE-2024-21980,0,0,872c791ef8c7889b400c55ed7647b05e1f6e6b8b113a22baf77aea9eef603777,2024-08-06T16:30:24.547000
|
||||
CVE-2024-21981,0,1,deb1e8a78bb55715b4492773fc3097281d0a3412a2bc91cb4f6c00fad354f4e4,2024-08-15T18:35:06.310000
|
||||
CVE-2024-21981,0,0,deb1e8a78bb55715b4492773fc3097281d0a3412a2bc91cb4f6c00fad354f4e4,2024-08-15T18:35:06.310000
|
||||
CVE-2024-21982,0,0,a1d7a0b52867843a898049d8dcbdf321d190ddcdceaa8b86d96038ebb2885957,2024-01-18T20:16:20.420000
|
||||
CVE-2024-21983,0,0,f2de681a28bdb7d62262b30d8ab0c99245f80036b39bf9cc43012d973caf3ccc,2024-02-20T19:51:05.510000
|
||||
CVE-2024-21984,0,0,a1fe9457ebbd7ea2c6a9e3374de3f0d5563111fa5006f8920140df4132946c26,2024-02-20T19:51:05.510000
|
||||
@ -244110,7 +244110,7 @@ CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba4577
|
||||
CVE-2024-22014,0,0,97be981b1958260947f79b7908c49463e10e156bc85f07e7f7d4adfcc41c6d71,2024-04-15T19:12:25.887000
|
||||
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
|
||||
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
|
||||
CVE-2024-22017,0,1,bd2434479505f25ba61ded39e252a137caec1b8140356d38e69aae2c52d440c2,2024-08-15T19:35:04.510000
|
||||
CVE-2024-22017,0,0,bd2434479505f25ba61ded39e252a137caec1b8140356d38e69aae2c52d440c2,2024-08-15T19:35:04.510000
|
||||
CVE-2024-22018,0,0,4fae4a09ff6c97462c219a17730a6b02641ce527ea4e228be02726c5015758d3,2024-07-19T14:15:05.763000
|
||||
CVE-2024-22019,0,0,5ea5d0f669fc75d99f03776806b9fffc572153dc1c8ef34725dc8bf55b3cedce,2024-05-01T18:15:13.800000
|
||||
CVE-2024-2202,0,0,07ee8ffdc3e2c6571649a2da17705092fde8ccafb25f9e28d35a275c632c563a,2024-03-25T01:51:01.223000
|
||||
@ -244139,7 +244139,7 @@ CVE-2024-22050,0,0,26cad76c4bed44f07cae5f3f97ba89ef5443ee14184d92fe046d3355cebb8
|
||||
CVE-2024-22051,0,0,d4701fb32ccba7ff31152d6da41e61ccee5919598235b1b16530fe1bd582850a,2024-01-11T17:07:05.660000
|
||||
CVE-2024-22052,0,0,a05a12f336cc805a072166830fe6ae20b18bce4605108c6a31a4ab38fa44ff65,2024-08-01T13:46:52.157000
|
||||
CVE-2024-22053,0,0,fcc7090aebe2df352917521dee947feb77d6dc39631742e8018d520fad4e92a3,2024-07-03T01:47:01.167000
|
||||
CVE-2024-22054,0,1,6e37321c62f2a04e4e3f2f6fd1bef9378fc04c906a238567a88522192ab554c8,2024-08-15T18:35:07.063000
|
||||
CVE-2024-22054,0,0,6e37321c62f2a04e4e3f2f6fd1bef9378fc04c906a238567a88522192ab554c8,2024-08-15T18:35:07.063000
|
||||
CVE-2024-22058,0,0,eae5b623fec72c03a6a5d974e26c7d12252da5cb9c755e2b5a8deaacf0fa051e,2024-05-31T19:14:47.793000
|
||||
CVE-2024-22059,0,0,50d90b3cb7f9bf66ee5ba944e169106caf70e42a039b7301c7281a7acc269806,2024-07-03T01:47:02.030000
|
||||
CVE-2024-2206,0,0,f65296c322fa456a2d924ce652baada633a5cbd15608dca292853eaeea32f655,2024-04-16T12:15:10.187000
|
||||
@ -244279,9 +244279,9 @@ CVE-2024-22211,0,0,c4cf3af5d26943f668cc855d646959db403c118d8b84d54656462b09ba506
|
||||
CVE-2024-22212,0,0,86dd221ab156a07a087f5a87a5c4457da42d8ef98a105e46fbc7675b62db1e0c,2024-01-26T14:58:18.877000
|
||||
CVE-2024-22213,0,0,d89d1bcc1024fa43e4eb255fe1da4898df98a0204835a8aab97986ad487a980d,2024-01-25T15:10:41.767000
|
||||
CVE-2024-22216,0,0,4d4df2ecd199aa7618581804013bbe1e953dec7e554571ec3898fac4c64e9d2a,2024-02-15T20:09:29.663000
|
||||
CVE-2024-22217,1,1,c0f3dc613cf0e6bad4b223923dc52c09f178d9999d57732509eef95c82321e34,2024-08-15T18:15:19.090000
|
||||
CVE-2024-22218,1,1,204254765c42c8a97637bb212c15323a8f797c96f9b3bdf5ae302d4a07def661,2024-08-15T19:35:05.533000
|
||||
CVE-2024-22219,1,1,38bf0493add258562d0515cb0d289c14e1bbd551dc60c82da022c396fffc55eb,2024-08-15T18:15:19.290000
|
||||
CVE-2024-22217,0,0,c0f3dc613cf0e6bad4b223923dc52c09f178d9999d57732509eef95c82321e34,2024-08-15T18:15:19.090000
|
||||
CVE-2024-22218,0,0,204254765c42c8a97637bb212c15323a8f797c96f9b3bdf5ae302d4a07def661,2024-08-15T19:35:05.533000
|
||||
CVE-2024-22219,0,0,38bf0493add258562d0515cb0d289c14e1bbd551dc60c82da022c396fffc55eb,2024-08-15T18:15:19.290000
|
||||
CVE-2024-2222,0,0,11625875cef37d942ee187e2a94de316442ea87eebee9bbcb3de8eb5e07a3e6e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-22220,0,0,e0b3c07a0f10db72074be82e1806c7e64ff7ce617eafb3be6d3de0ce93866b95,2024-02-22T19:07:27.197000
|
||||
CVE-2024-22221,0,0,e19edd26a1c4c3dbc422242510974e3878733456edd7e30a89f97b0340db2a37,2024-02-16T13:40:34.093000
|
||||
@ -244334,7 +244334,7 @@ CVE-2024-22267,0,0,0580d7c131aebd95aa25892cd08f876d614d2fb71c023502992bac4873632
|
||||
CVE-2024-22268,0,0,823f1c8fe109f7318b4cb5fcaf25c94abb4b72eb405c2d208677e483171c233c,2024-05-14T19:18:31.490000
|
||||
CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000
|
||||
CVE-2024-2227,0,0,6858b6fb3beef7b6297eae7344c0bc611e8d1dd2c2ff64967d8d2ab0b2897ccc,2024-03-22T19:02:10.300000
|
||||
CVE-2024-22270,0,1,b9576398a05665519f8e7fa18c7ea965eb2ef26c2b70aff8574e195025c87aea,2024-08-15T19:35:06.457000
|
||||
CVE-2024-22270,0,0,b9576398a05665519f8e7fa18c7ea965eb2ef26c2b70aff8574e195025c87aea,2024-08-15T19:35:06.457000
|
||||
CVE-2024-22271,0,0,c68c7abf466a660fd4d52c665cf118cb88242b1be3f139e271f3b7d99c4e675f,2024-08-01T13:46:54.670000
|
||||
CVE-2024-22272,0,0,a4dcf85cbf4922799718d1c10a1120b8457bb2d971adaefbd7555789801981e0,2024-06-28T10:27:00.920000
|
||||
CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da58959d8,2024-05-22T12:46:53.887000
|
||||
@ -244699,7 +244699,7 @@ CVE-2024-22913,0,0,0c8b6c34e29795c7d7dae2efe2da07b63ec68a5280e3316e86b2a2826fa48
|
||||
CVE-2024-22914,0,0,a1b39b94972a65d744b75ca9176cb7fc53b2a7dcb9c255507add1ee70bdd4a9b,2024-01-25T15:25:00.303000
|
||||
CVE-2024-22915,0,0,58002f77f5b9ff7f33975074fb9cfcf4c4e1a939c3bae512fc22e732ac7275f5,2024-01-25T15:25:19.217000
|
||||
CVE-2024-22916,0,0,7fc468417d1b514ab55cd3ad532c732548e17e78a99d7d9891769c8cff354c44,2024-01-24T17:04:22.573000
|
||||
CVE-2024-22917,0,0,e611b4d0d3fc0f8e3c882970fd02eb7775e56312c362882b7299476962f90f2e,2024-02-27T14:20:06.637000
|
||||
CVE-2024-22917,0,1,d827d36e2bae2c5ebdd29dede1f05f80c1087afddec129461640bf9812693ea9,2024-08-15T21:35:02.417000
|
||||
CVE-2024-22919,0,0,ab4482c61edecd1158b8763653952b1fb29fcb9f0c9aec13247fb053ecc1703e,2024-01-25T14:54:29.357000
|
||||
CVE-2024-22920,0,0,a4e70f8dc7ff196d0f8fe2f46b66b45084abe2c6743f3e5bb2a799094a7564be,2024-01-25T20:26:16.860000
|
||||
CVE-2024-22922,0,0,1ba32e986182936be0f21cbd2fe00d51afc7a660a8bd508ab3ea329b99649cd2,2024-01-29T15:58:07.447000
|
||||
@ -244818,7 +244818,7 @@ CVE-2024-23157,0,0,11b0d8091c8fa8dd11dadbcf1fbb903ad812d8f095800e3ccd96bef2996bf
|
||||
CVE-2024-23158,0,0,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb526d,2024-07-03T01:47:36.407000
|
||||
CVE-2024-23159,0,0,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000
|
||||
CVE-2024-2316,0,0,b886d554fbb39a8ab156ebbf04afa7dff2abe542e80901fe75a178728a777e10,2024-05-17T02:38:09.927000
|
||||
CVE-2024-23168,1,1,5a22752e0a497280fbe0fb7cb267cafdc4d114a01622667cf2c84ff01ce52a77,2024-08-15T19:15:18.070000
|
||||
CVE-2024-23168,0,1,516b014321b2d23dd5e11228b3f4c27201251a7b2e88523a0fca984a63e33e9a,2024-08-15T21:35:03.230000
|
||||
CVE-2024-2317,0,0,8e30ab648286b0ea978301e5a5beda2d9abdf16065d34269cbb1824bfad23955,2024-05-17T02:38:10.027000
|
||||
CVE-2024-23170,0,0,2d2c8288a6a12ddbc7a1710ba6e09b64e14fe785fb79b86b20a944c1ecfef869,2024-02-22T03:15:08.297000
|
||||
CVE-2024-23171,0,0,f88bf803a0c4fbc4509407858b9247c6d4fbb766b717bcd811063458329b2ee7,2024-01-18T20:23:45.707000
|
||||
@ -245506,7 +245506,7 @@ CVE-2024-24028,0,0,c63943ee6dfc53b25a3ab5d44f70abf633bd3f12660446bcc8d4289144acf
|
||||
CVE-2024-24029,0,0,f48b5fef1e233f5b2615b26a0c9b1d6622e82a3c72c6c352158b88f9b48f9c5e,2024-02-06T21:04:04.993000
|
||||
CVE-2024-2403,0,0,6dbf3c7b9ae6279f2eb08793701f0e3b4c85c484143147f528659885f0bc2bec,2024-03-13T18:15:58.530000
|
||||
CVE-2024-24034,0,0,2a4d3db6cf3b4e5048c500ebce4bb202246f9fdd0a665422910e0d80f673dc32,2024-02-08T13:44:21.670000
|
||||
CVE-2024-24035,0,0,ac2bc226cfba183b90813bd575876970e65beea96f46f0aa43a031ea4331e92a,2024-03-08T14:02:57.420000
|
||||
CVE-2024-24035,0,1,d0abb7c64f0c98440e73299b8a7786cd92f1d8fbb7861de6744b39b120e98037,2024-08-15T21:35:04.070000
|
||||
CVE-2024-2404,0,0,9d875e94c9294fe9953ccca085b1745d0613b8cf9f0f07db3175f75218af4ec0,2024-08-09T19:35:05.613000
|
||||
CVE-2024-24041,0,0,4a0d654eb23409577a23026cb4704f48de37c0bc2bebd1ee3faa99b68f3773e8,2024-02-07T17:14:41.607000
|
||||
CVE-2024-24042,0,0,6dc779be2a8b1425083e370c5845f2cde7c5662e2542d528419ae61ff3ec779e,2024-03-19T13:26:46
|
||||
@ -245676,7 +245676,7 @@ CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c7
|
||||
CVE-2024-24469,0,0,ebeddfd52fa0c1e7530b09b05474fbfc79f2e6c0d68157610fdaa187714cf129,2024-02-07T22:02:57.743000
|
||||
CVE-2024-2447,0,0,6305c2b7cb7de274154ca47c393d8343e28d151abe5d313800ccc312259a2658,2024-04-05T12:40:52.763000
|
||||
CVE-2024-24470,0,0,16e381fa0a431abc8440a13d798da189428114544eb84ba0cdf0c6b44081e4ca,2024-02-06T21:07:34.547000
|
||||
CVE-2024-24474,0,0,d6ea2ee40f5f1cd1cc0dfa5fdec2c7d7301f40c888d5c564203a791b4618355b,2024-06-10T16:15:12.127000
|
||||
CVE-2024-24474,0,1,7e9666bf8baf4869b81de15eea7d74142cdbcec829ea181976812d1817d9f045,2024-08-15T21:35:04.887000
|
||||
CVE-2024-24475,0,0,cc33da32b8386d85f2716db0b7573f224c2a2466da82581395da702e95a8ad4c,2024-02-21T01:15:07.890000
|
||||
CVE-2024-24476,0,0,f4b1eaee12a3672aa3ce2076a41e7e21bf4ac04a6f045fb2b55db6f5bb90f517,2024-08-02T00:15:19.267000
|
||||
CVE-2024-24478,0,0,b94544886ad00605269b35b690b03335a5085810bb0290de0a4c36a28c5a785e,2024-08-02T00:15:19.350000
|
||||
@ -245695,11 +245695,11 @@ CVE-2024-24497,0,0,4486a5209afad695cf15372283d911b20ffd5a0694006d7e7ad69dd4f26f2
|
||||
CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab1310b0,2024-04-25T06:15:56.283000
|
||||
CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000
|
||||
CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46e1,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24506,0,0,352f7b438b05b4fbf04fde226f661101b73c52d15d081ca65fec9f440b295fc5,2024-04-03T12:38:04.840000
|
||||
CVE-2024-24506,0,1,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000
|
||||
CVE-2024-24507,0,0,db6d74810f343dc9083835da56a72771c241b14db21b5bd25cdd0f323d95a56d,2024-07-24T12:55:13.223000
|
||||
CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000
|
||||
CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000
|
||||
CVE-2024-24512,0,0,5297ae1840ce088f7a7ad9c82816ab5d47fccf4784d399ef43fa4059b97a6a10,2024-03-04T13:58:23.447000
|
||||
CVE-2024-24512,0,1,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000
|
||||
CVE-2024-2452,0,0,cca6a173274889cd69a2095d63054482ce0ac9763c76eccaa731ce2a40b02048,2024-06-10T19:15:53.417000
|
||||
CVE-2024-24520,0,0,3c774368f33e309a9aff5a70713a9d6c94a70066616aae4e879a98640fa83db5,2024-07-03T01:48:18.843000
|
||||
CVE-2024-24524,0,0,61939d34114517af38312bcfbce13ad9e833fb758fc861ac1b9c4d60456d9a12,2024-07-03T01:48:19.690000
|
||||
@ -246152,7 +246152,7 @@ CVE-2024-25138,0,0,5216fc591ac60d49fd017d17c222c81ab9d6ca5294460860349d6bb46cb75
|
||||
CVE-2024-25139,0,0,c88b223ab467593ac8de29d9a0590df6a82e1476f4af9f7ff43561b04a15b98e,2024-08-05T14:35:05.477000
|
||||
CVE-2024-2514,0,0,956e72a82145af5df3731620e2db9c4a0fa06ee5f96614ef673f99b0f16dc312,2024-05-17T02:38:16.170000
|
||||
CVE-2024-25140,0,0,2efd0c5629a3b4005a26b66a24cac50566792a4a7f9314aa9d76f11ed38db984,2024-08-02T00:15:26.257000
|
||||
CVE-2024-25141,0,0,6bad47ff109bca0106de2077237baa1c6344159be83414be44a6add548b51d05,2024-02-20T22:15:08.670000
|
||||
CVE-2024-25141,0,1,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000
|
||||
CVE-2024-25142,0,0,19d4bb5bd9d9370afd571c0a6d80ffe65e65cfd553d5b4ccef4ef771df0d1e04,2024-06-17T12:42:04.623000
|
||||
CVE-2024-25143,0,0,10a6bb922da86e2acb7fedc41f329f10932019b09aa65cbea04bcb9e229da526,2024-02-07T17:04:54.407000
|
||||
CVE-2024-25144,0,0,8416cb9676120788fbc94760aa779f11f83eeafe55e75ecc3de9574dca979c73,2024-02-15T04:36:24.350000
|
||||
@ -246179,7 +246179,7 @@ CVE-2024-25168,0,0,dad8d6efa703d292b2e1316077e648b5d024741360f9670fbd7a5b3f86b84
|
||||
CVE-2024-25169,0,0,ddfaf7adafd107d54fdd755c9a7f5c8ead3bddd5d293a6320fdace627636b9a5,2024-02-29T13:49:47.277000
|
||||
CVE-2024-2517,0,0,fd27584c55a08a26b7b1fdff8ab4423fb114835c3aa51e3c4abdd3a6801696e6,2024-05-17T02:38:16.440000
|
||||
CVE-2024-25170,0,0,5a57c221aced5771a411a434828fd35e5d41dcc64fd1585dedec2f988b96ac80,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25175,0,0,ad4ea007e52c37651824e213a3b64b3c4092cd82343f35a8650cc6af46434ddd,2024-03-25T16:43:06.137000
|
||||
CVE-2024-25175,0,1,82ee8e03ebec4e8b131826423b9193f799e642892bb29c3d5eecad8e1ca0ad29,2024-08-15T21:35:06.723000
|
||||
CVE-2024-2518,0,0,67143896f82c167febad3b5ae58ed9a1bb65a46487dbef8c359c6c9e56cccd8d,2024-05-17T02:38:16.523000
|
||||
CVE-2024-25180,0,0,7ba581c3caef0d3c03c0f8f2ecb5a0dce1d4af599fb0dc59bceacf92113e3f6b,2024-08-02T00:15:26.843000
|
||||
CVE-2024-25187,0,0,235931cb55f2324cb5235f058c93cb713e862085431cae896b9108cfe9eba975,2024-04-02T12:50:42.233000
|
||||
@ -246265,7 +246265,7 @@ CVE-2024-25318,0,0,816caedc6e45e8daf872d525cbac5de4c424378189abd90933e824060204b
|
||||
CVE-2024-2532,0,0,dbd2e90a8b9f0e6a244b6c6163b20f8979fc7a3177b780d02e1509ee97c26b6a,2024-05-17T02:38:17.753000
|
||||
CVE-2024-25320,0,0,af842a9080e1a2474b48f9d94aba0e31c99f072b88471f69ccaea451c1f5904e,2024-02-16T19:26:55.393000
|
||||
CVE-2024-25325,0,0,5dc3e9eaa4b68d64dbfeed83e2113e7339ef26567f6f094d65da12c277401023,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25327,0,0,a329346eb77a742b22ddf119bc31a9e7911a904fc26f9850cb286568e30a1234,2024-03-08T14:02:57.420000
|
||||
CVE-2024-25327,0,1,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000
|
||||
CVE-2024-2533,0,0,6520d041e2b7ba39d1700487d120781106e9a9e9b41da5c3ad12ec52a81a1e5b,2024-05-17T02:38:17.843000
|
||||
CVE-2024-25331,0,0,4f27830f39927c3895bcf33b02286589a44e6189e721c70e2368b6ca05c425b4,2024-08-05T15:35:11.043000
|
||||
CVE-2024-2534,0,0,4887af7a0ab37b01ddfa2f72430762a504040b1465853138458422ea16a2da1b,2024-05-17T02:38:17.933000
|
||||
@ -246318,7 +246318,7 @@ CVE-2024-2543,0,0,90e05f36a3d2dfc0c0cb0570a48a9a80b8042b66097a9bbd3537fdf34c177b
|
||||
CVE-2024-25434,0,0,26bac245bd5b6380c1089f8063086eb0c8545596793c0265b0d4261729bfcdb4,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000
|
||||
CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25438,0,0,7afb128454169133a93c3b51a6bebbe2c69c11640c7e435fab86df0a19809367,2024-03-04T13:58:23.447000
|
||||
CVE-2024-25438,0,1,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000
|
||||
CVE-2024-2544,0,0,ed2d05b42178fff9a17d6f22998085016a1e0e93b19acb35a0624153a8b064cb,2024-08-08T15:27:52.437000
|
||||
CVE-2024-25442,0,0,eb84b12a8b6870c7b4be7ea073493dd91ec0cf779e81ffeb769d60880071c8d7,2024-02-20T02:15:51.217000
|
||||
CVE-2024-25443,0,0,f9f46e03349c3c7bab20646f2d76799e4fab073653be96db01bac732191b3058,2024-02-20T02:15:51.313000
|
||||
@ -246334,7 +246334,7 @@ CVE-2024-25453,0,0,6c26623f3a213339d332369aa2196301f829be136c6f86125273e619866f9
|
||||
CVE-2024-25454,0,0,8ab63453c76a5630b02c9a4acc28cd19e727677c1ac1b8b1e1b94ff8d701b7fe,2024-02-12T21:39:19.300000
|
||||
CVE-2024-25458,0,0,883238ad1910abf3be131d65578a9146b081aa618c9d002b21ea014aab5330f3,2024-08-15T16:35:03.913000
|
||||
CVE-2024-2546,0,0,08a8dee38ee812f84c4c40bdcc0668312236b55abd93840557efb145295c9cba,2024-05-17T02:38:18.283000
|
||||
CVE-2024-25461,0,0,f79828e5cdd5c8b1566d8a280a104a52fda1e59174912b34a7899227cff3aab1,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25461,0,1,8db6a140bbc64b5af9f21a58ef0d9e6bf050fd6cc1f8f9c53b140972b95af9fe,2024-08-15T20:35:03.633000
|
||||
CVE-2024-25466,0,0,4f8ddadef0f0c470fac1d08a20c254a296296fab619f433d46a2ccdc8a4b306f,2024-02-16T13:37:51.433000
|
||||
CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e72c,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25469,0,0,c93aa28e3914b49b6c5094bb3a85adbe0a6d382b0bed611cf4ed2908051d45fc,2024-02-26T13:42:22.567000
|
||||
@ -246441,7 +246441,7 @@ CVE-2024-25629,0,0,ddcad0078b57ad6a983c41f65309abceb6903dae44fc54a92c56dcc31e42c
|
||||
CVE-2024-2563,0,0,f27f9483fb5da6088dc2485a49b6aec5dfafca82d3498b35d814764d5e89ddd9,2024-05-17T02:38:19.417000
|
||||
CVE-2024-25630,0,0,306917c09bdc07e4318e88be00444c17dbe2150b8da032a761ce6c8a24ea3cf0,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25631,0,0,4f2bd06a701d340628585c4bae77dca605819fa4840f39cbd3a6e9a77b48a46d,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25633,1,1,bc48d1576951d848bc86a7016d1cee48e5f828a2d69aacf2c199fdbafe9953d5,2024-08-15T19:15:18.213000
|
||||
CVE-2024-25633,0,0,bc48d1576951d848bc86a7016d1cee48e5f828a2d69aacf2c199fdbafe9953d5,2024-08-15T19:15:18.213000
|
||||
CVE-2024-25634,0,0,a6c0976398d76132e45109770c34649b9cd1b53574ce636d0b3d3dba0d5b6a39,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25635,0,0,0396aede9a718a4992e7575bb30a0d211bf1d85759070350344147d63377b4eb,2024-02-20T19:50:53.960000
|
||||
CVE-2024-25636,0,0,4e6fd7db5d6991432a0fc47bea99f1bd82ebb492967965ed027d0a8cefe8402e,2024-02-20T19:50:53.960000
|
||||
@ -246581,7 +246581,7 @@ CVE-2024-25869,0,0,748b3f6208379a05bd57fedf558ac81540396f4b22ed44a19829a3ed8cbeb
|
||||
CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded5337,2024-03-18T19:40:00.173000
|
||||
CVE-2024-25873,0,0,8a4faa4943ee6e0e03bd7795594e92abaa0f28587f9f5694820c6cc3d79de9cd,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25874,0,0,6d2389bddde8527bf2136be3df99fb38d1df3f190ca0f8297eea242b1fbad855,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25875,0,0,9f464ac36c812987a2e2d5b242dd7e1d1ab16a5405d2442d37968c57441466f4,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25875,0,1,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000
|
||||
CVE-2024-25876,0,0,eab75ff187e39cea5a5bd43607d99f08c93997057646f878e61338d1a27cf6de,2024-02-22T19:07:27.197000
|
||||
CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000
|
||||
CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000
|
||||
@ -246589,7 +246589,7 @@ CVE-2024-25891,0,0,84cfc5f312c597141ee54b1ce3a081aaaa3c04f515375840db467867fd6cd
|
||||
CVE-2024-25892,0,0,07c9353c0d552f69039cc71e4568ea59bc368ec591c74518e59aba5979c0e7bd,2024-08-14T15:35:06.250000
|
||||
CVE-2024-25893,0,0,6074afa7b83b45196c5c6ba86bd6a55a5db84fa3d221197e7e610730da7175c7,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25894,0,0,110687aa8f80df3297624f90f6f33809d75def9197abe56922d406f86b8dd02c,2024-08-01T13:47:55.813000
|
||||
CVE-2024-25895,0,0,2ba47c5d5388e14fe3cf07023711e7e1a5f93270bba38897d7644c4993762323,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25895,0,1,4ad6b56345de948a6e266d7d9c59e0f3f67a87b7a67e84d7f7541ae3635b9194,2024-08-15T20:35:04.423000
|
||||
CVE-2024-25896,0,0,08f878ee14441b76754056ef0405ddf3a84202dc82f048a455b46423ba277c2d,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25897,0,0,3213328e6055109c729a79555e408be1167e003093cb1be559eee482ac1df1a8,2024-08-01T13:47:56.570000
|
||||
CVE-2024-25898,0,0,44c4d18d364691615141c272c666cd64d62bb83c92d766f5a80a7a5cbee93172,2024-02-22T19:07:27.197000
|
||||
@ -246692,7 +246692,7 @@ CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48a
|
||||
CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000
|
||||
CVE-2024-25991,0,0,55a93164172a1b22ef8f30a0ed89816155551a2ca968148a5c0da905634180b8,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25992,0,0,9077f849d4dddde51329fbf2553fb349784d84e4a5aa50feb6dadd6e5e8acf0c,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25993,0,0,9be19c7e891cbed9482f884ce35870fcaafd6f3102d81a00ac286ece83959326,2024-03-15T20:15:08.167000
|
||||
CVE-2024-25993,0,1,e7cf4460dc5198c620b3541161c2ca1906e1b44bebbdda031856c68acc35baa6,2024-08-15T20:35:05.303000
|
||||
CVE-2024-25994,0,0,4a9979fd659a52838af4203d59aee9f2f6fbf6a2d3333b82853712f36ab74c9a,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25995,0,0,7785cd6f8b87e1198fedd03d14b86de2a700a99574185f6812c6d8bee7390322,2024-03-12T12:40:13.500000
|
||||
CVE-2024-25996,0,0,b7b4bd77042e96294c38d7d1bda93598dd0d513f4128d7212ac13d0be2bb25f7,2024-03-12T12:40:13.500000
|
||||
@ -247081,7 +247081,7 @@ CVE-2024-26529,0,0,bd6cd552c022306ecb15ba77a51e2bdce3a9e1417338a63b92cda08b02e6c
|
||||
CVE-2024-2653,0,0,b3409d37c73c6e84286baa910f6042b0e4464dede287f82c98b61b036f897600,2024-05-01T18:15:19.257000
|
||||
CVE-2024-2654,0,0,44518084de18b3ca2eeba7166bf4da9d0a7d05a78603be70a4c69d74aa776745,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26540,0,0,6576c4885606d2c13376308bfe770084b7f2e54af2c02ae0a3e8966e16709f35,2024-03-15T12:53:06.423000
|
||||
CVE-2024-26542,0,0,e329c774d5f52a538b77e4a513a0eef11d414726ce87c62149b36f0f462cb7dd,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26542,0,1,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec010e,2024-08-15T21:35:10.243000
|
||||
CVE-2024-26548,0,0,a14221a020c4eadf543d91f52da71379b261a56fd8977996e8b1456e032b4731,2024-03-01T14:04:26.010000
|
||||
CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d6e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26557,0,0,bce4bb7db30c44200534fa645c4e21a32632f06526ac89541f2afa8ce855d2c7,2024-03-22T12:45:36.130000
|
||||
@ -247768,7 +247768,7 @@ CVE-2024-27213,0,0,38bf62e6cca45cb13c31c1b3c1f577caf25772cec3b7bdb3ce04f4d4c6e5c
|
||||
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
|
||||
CVE-2024-27217,0,0,cb0dbfe9327fc52a02d056b77105239417a7cff860961ae434eeaf1ef6d2cb33,2024-05-07T13:39:32.710000
|
||||
CVE-2024-27218,0,0,b2b126ff7fe34ab697f8634bcd6e10d8f03d8a1ff2b55462d7717768f1583a4d,2024-03-15T20:15:08.960000
|
||||
CVE-2024-27219,0,0,5920370887e174f28d236d9944344275cf2dbac9709bc54b2c0d4a0da40367ef,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27219,0,1,6380ac10382315d4da0453b5e48de21d3e106d94e656f543da93609a89c868c9,2024-08-15T20:35:06.643000
|
||||
CVE-2024-2722,0,0,3d547fbfae7104f0dbf6c0b76ddd02751536ed8c09a63381f891ff8e3f28de99,2024-03-22T15:34:43.663000
|
||||
CVE-2024-27220,0,0,6aa117866566feca4db0bf9d961972fe519fb1f249380c2ccd18e46e235df101,2024-03-15T20:15:09.010000
|
||||
CVE-2024-27221,0,0,275da2c75e59fe51a6d2607d4b2206bfcadad2f1626d8a1a46fd3353d31e8ed1,2024-03-15T20:15:09.050000
|
||||
@ -248078,7 +248078,7 @@ CVE-2024-2767,0,0,0bf7785127743211b004b316b19cc2da72c8338b0475b0f75d892aa6611c2d
|
||||
CVE-2024-27673,0,0,b827936180312254f56c8c18e1a9e00f4dbc9d441e499ec6aaa928d4b3451535,2024-04-03T16:15:07.173000
|
||||
CVE-2024-27674,0,0,21e90956bc1e5ed96e828710d1d2cfc02b0d7dccfda52db8ef3f15b53b564e06,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6afb,2024-05-17T02:38:29.203000
|
||||
CVE-2024-27680,0,0,7dbacde6159cf116347148af7decce95acf3333fb08b589a9a3c4e3e2bf44c68,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27680,0,1,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000
|
||||
CVE-2024-27683,0,0,907eeb18dbdd6bbefaa7b9be484cc98a16f164c9a600e2bae77550cea0d2db2c,2024-08-14T19:35:21.653000
|
||||
CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27689,0,0,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000
|
||||
@ -248103,11 +248103,11 @@ CVE-2024-27717,0,0,24b56efd365305b6bc14b31a5e0ebd3ded5b43adf71ab9f369b01e76538e6
|
||||
CVE-2024-27718,0,0,348ef178d7c72ea2bf9561abf13cadc3c1ef45743840695e6b53f9dba8489836,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27719,0,0,cc91452d4b82f581b97b47b20481d35d29255b9662a7f1b32120fdd873effa3d,2024-03-28T20:53:20.813000
|
||||
CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c74d,2024-05-20T13:00:34.807000
|
||||
CVE-2024-27728,1,1,92c2f4f300ca741f2c37bce04178555a76577e155666dd983f312360347cacd1,2024-08-15T19:15:18.477000
|
||||
CVE-2024-27729,1,1,c948204789378d657f2b41d6c6761ce5ea794f998ddb93f2ebf81a9fb64e12c5,2024-08-15T19:15:18.573000
|
||||
CVE-2024-27728,0,0,92c2f4f300ca741f2c37bce04178555a76577e155666dd983f312360347cacd1,2024-08-15T19:15:18.477000
|
||||
CVE-2024-27729,0,0,c948204789378d657f2b41d6c6761ce5ea794f998ddb93f2ebf81a9fb64e12c5,2024-08-15T19:15:18.573000
|
||||
CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a733,2024-05-17T02:38:29.487000
|
||||
CVE-2024-27730,1,1,32a18e903d98aa035fd1fe5fcdbab3b67106449b10089c696c32a889a14b214f,2024-08-15T19:15:18.663000
|
||||
CVE-2024-27731,1,1,0e54bb9a495ca00aca3255fbd7013d472940c8369148ec88372e9e447c0ebdfe,2024-08-15T19:15:18.770000
|
||||
CVE-2024-27730,0,0,32a18e903d98aa035fd1fe5fcdbab3b67106449b10089c696c32a889a14b214f,2024-08-15T19:15:18.663000
|
||||
CVE-2024-27731,0,0,0e54bb9a495ca00aca3255fbd7013d472940c8369148ec88372e9e447c0ebdfe,2024-08-15T19:15:18.770000
|
||||
CVE-2024-27733,0,0,f76bf300f1cfa0de74d17f1145877f7fe4a3d69ea3dede66e09a54e795dd7256,2024-03-08T14:02:57.420000
|
||||
CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663b2a,2024-03-01T22:22:25.913000
|
||||
CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000
|
||||
@ -248358,11 +248358,11 @@ CVE-2024-28014,0,0,baa237796e504a857089db5ec5b80237d79b2645a24add79eb9cfcbdb3266
|
||||
CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000
|
||||
CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000
|
||||
CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000
|
||||
CVE-2024-28020,0,0,2375ef98ce8769f1ee6408c6bebcbef990543e738c9849476b7b59656001a147,2024-06-13T18:36:09.013000
|
||||
CVE-2024-28021,0,0,0ff26efab74f3ecf1eaea2effe93bf3a16e8ed8c464b480618e8617211df2a2d,2024-06-13T18:36:45.417000
|
||||
CVE-2024-28022,0,0,1c1b411aa18aaf6f02b7017dfa6c21da9fce848904faa83d97dfcad4e0dbe10c,2024-06-13T18:36:09.013000
|
||||
CVE-2024-28020,0,1,20d763f6a7d879da851798b82fa90e89f1e3cf4560e3c465ec8e7510e66b7ffc,2024-08-15T21:32:33.467000
|
||||
CVE-2024-28021,0,1,698af9df63c869e8bcfc4e84d62db6e4d7ff182600a91f2bc02d26dab9f88c10,2024-08-15T21:29:46.697000
|
||||
CVE-2024-28022,0,1,05ab2292ec2d5764d60dc41d68acf6b7ed0f81413d1d5304ceb85ddefc5f7d7d,2024-08-15T21:44:20.677000
|
||||
CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000
|
||||
CVE-2024-28024,0,0,d58cb732d1bad72c4f4b12473f98520a1476ef8b05d36ceafc46457b7613a85f,2024-06-13T18:36:09.013000
|
||||
CVE-2024-28024,0,1,023885276663800ce2b5419331ef97f1151e80df5fff534e76aea30066f91b6f,2024-08-15T21:46:11.737000
|
||||
CVE-2024-28029,0,0,b95079061ab17fc2818c1925165793c8c13dcc14c8729d51ad302026ac5a145d,2024-03-25T16:06:44.403000
|
||||
CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000
|
||||
@ -248379,7 +248379,7 @@ CVE-2024-2805,0,0,286efc9a19dc11ee0838ec500ba164305f2c14641c0d5856229be06ec762a8
|
||||
CVE-2024-28050,0,0,71475d1893717c27a814421398be4cbeea83178798ffa6fe94f9088915c3241f,2024-08-14T17:49:14.177000
|
||||
CVE-2024-28053,0,0,c6161d8eec33d0d4874e655333f8b3d42189dbff5254c952286bcd697b2efc85,2024-03-15T12:53:06.423000
|
||||
CVE-2024-28054,0,0,42bd8bafc554125a5c189382c84c5d77dd5214fa492ad959b0494172465d0aa0,2024-03-23T03:15:11.510000
|
||||
CVE-2024-28056,0,1,c35a08b2cbca4e8b19728715e17e817ce4b19045fe6d73162e692c29df0fb231,2024-08-15T19:35:07.857000
|
||||
CVE-2024-28056,0,0,c35a08b2cbca4e8b19728715e17e817ce4b19045fe6d73162e692c29df0fb231,2024-08-15T19:35:07.857000
|
||||
CVE-2024-2806,0,0,d5f508ca75cb9f6fa1405297772fa31ca59b69e9c9f039686470ebea3a3dfe0a,2024-05-17T02:38:30.940000
|
||||
CVE-2024-28060,0,0,749ab409791184ab9b217e9bb8a98b7497dfd8e9ca8e8b87425c211be02834c2,2024-05-29T13:02:09.280000
|
||||
CVE-2024-28061,0,0,69ae8c16e1b63fd4290855dfe7823169455b79a10f705efce789e14ccfaa8c1b,2024-05-29T13:02:09.280000
|
||||
@ -248646,7 +248646,7 @@ CVE-2024-2849,0,0,7ddd80bf2dddeeb49b4f7c75b1bb53734965b8214d690d5f80f092578b7cf0
|
||||
CVE-2024-2850,0,0,aa087e8105e87f804b43529eb18757f7a4acf7dbdd8f4604dc208cac4ea95437,2024-05-17T02:38:33.820000
|
||||
CVE-2024-2851,0,0,5b5b2abe0cec799e0c475c24a1ca157de3540e7eb560494a6cfd6aff8f806a99,2024-05-17T02:38:34.107000
|
||||
CVE-2024-28515,0,0,a1e2389b4555eab5e18310c7e283a6a35bc4bcaedf003e200c7e78de4e2e3006,2024-04-03T12:38:04.840000
|
||||
CVE-2024-28519,0,1,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000
|
||||
CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000
|
||||
CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000
|
||||
CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000
|
||||
CVE-2024-28521,0,0,3e889be75d13efa28405295dc4871a57c35f44292a958a216db39725fc259f8b,2024-03-22T12:45:36.130000
|
||||
@ -248699,7 +248699,7 @@ CVE-2024-2860,0,0,46217b9da2b2fddda54a23d86fd9667171b5afae15a6ec5a04d81b349c2499
|
||||
CVE-2024-2861,0,0,978a1015efa40b0403e35a6152b7f5d6b235fd3f9d4adac2eb469279c47e40ff,2024-05-24T01:15:30.977000
|
||||
CVE-2024-28613,0,0,a54ab1f2e9b074c0005ceac95268c51f4526b7bbad2e62927797643c18df7693,2024-04-24T13:39:42.883000
|
||||
CVE-2024-2862,0,0,a23b81783b91b2bbbcfde47ace372e4762456e140bdf506d0fced8226e2738a0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28623,0,0,d4a89576bcd3f053c91fd3d2a950cf9a0ef4333514934b14a28f4b1c4f729461,2024-03-13T12:33:51.697000
|
||||
CVE-2024-28623,0,1,79616151150b38e903c5a53d907c32ebad20bca0de7abc40dd486b1f904d4588,2024-08-15T21:35:11.883000
|
||||
CVE-2024-28627,0,0,c3fbcb53d4bd8b45e2ac137db3c6b6a64476aafbbecf256367ec9be49dd43388,2024-07-03T01:51:44.343000
|
||||
CVE-2024-2863,0,0,51f45da8967ac2e9bd5b7be7c2b96b4f6f6eb08fbb2e67a9216114664ff1a479,2024-03-25T13:47:14.087000
|
||||
CVE-2024-28635,0,0,3ea376c2382b19ba1c40e1ca96db4a046dad170ab353c27de44a820093ca692e,2024-08-02T16:35:41.160000
|
||||
@ -248715,7 +248715,7 @@ CVE-2024-28667,0,0,a722c74094b46413cd2f0e1e6663b7ae2104332e1b5c605e7cc511a2a8371
|
||||
CVE-2024-28668,0,0,dfab810650daaa38b417cd38363fcb259e164356905554402cb2ffe391f0ae90,2024-08-02T19:35:34.313000
|
||||
CVE-2024-28669,0,0,7e7c51ad09a2f0694752bdd394c9ed2f89e1b1247bb99fcc406852b79b139fc6,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000
|
||||
CVE-2024-28670,0,0,8304fe18b2d677df60ee2d838546c447b1c5104e8cd119687063ee3b30c1d031,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28670,0,1,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000
|
||||
CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000
|
||||
CVE-2024-28672,0,0,cd39d1fdf90137bb06b7bf130d6e97d1809e7cb18d315c08621547499fb882df,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28673,0,0,bd6746b41a01ccf049d37eb60c73f070158ae6b16895b623dddfc8455f2801ff,2024-08-02T21:35:24.280000
|
||||
@ -248725,10 +248725,10 @@ CVE-2024-28677,0,0,c212bc6abeb632592f29fbc5fe22ee750468c999ed8be8e2db7f3e23376a0
|
||||
CVE-2024-28678,0,0,e5023173fc11d3622828b4613c2efc53b1e9700f74a309c2cce387d24da005e5,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff71d,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28680,0,0,5b71fab17412aa1c7fc6a4c63156944d7a6a6f5195e840c3e5772803b542fff0,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28680,0,1,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000
|
||||
CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc8757f7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,0,a4d093be60b3c2d6b460f6a76cb45ebc186bb3e16caaa646235de3d01aeda1d8,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28683,0,1,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000
|
||||
CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000
|
||||
CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000
|
||||
CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000
|
||||
@ -248739,7 +248739,7 @@ CVE-2024-28714,0,0,18b853be5dc2833c618e4ddbd9bb373d963fc65628b928a515e70d080b0e0
|
||||
CVE-2024-28715,0,0,af77246106a78842a7b294f3e28f52ff784cab47ce869925f80951f17109d52a,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28716,0,0,3f63cfc047c308b332d22713c97a67a2241b00455960cf73e7cb5d9cde33a8f2,2024-07-03T01:51:46.153000
|
||||
CVE-2024-28717,0,0,68c50e0969fa42fdfa87f41ced9aa5bc718acbfde537527889081e6d8b905cbf,2024-07-03T01:51:46.980000
|
||||
CVE-2024-28718,0,1,4be24d2522720079b588ee8fc9971b2e135ab721e46930d077db5b43cb6279e7,2024-08-15T19:35:08.413000
|
||||
CVE-2024-28718,0,0,4be24d2522720079b588ee8fc9971b2e135ab721e46930d077db5b43cb6279e7,2024-08-15T19:35:08.413000
|
||||
CVE-2024-2872,0,0,e60d6692ffdbbc7dca47dd221e29fe124966b59c3165de45eca31ca595a9df4d,2024-08-02T19:35:35.923000
|
||||
CVE-2024-28722,0,0,4d114a5bb3de475df05c084fbb00bf1fb6503998847c685d4d1672b2617054ce,2024-07-03T01:51:47.757000
|
||||
CVE-2024-28725,0,0,76f38f123d93dc5a87b1081a9a46cc5a546425e009751f0bb38d077b83255a95,2024-08-01T13:49:14.173000
|
||||
@ -248999,7 +248999,7 @@ CVE-2024-29048,0,0,229fc7fbafb7204b99cd3440f87e8bbe00c06e5dbf09a72f3e2bd451f3cfd
|
||||
CVE-2024-29049,0,0,9544af760c0216bc435752ec35b072507a98402401180a617eb4b48fddf44972,2024-05-28T23:15:16.837000
|
||||
CVE-2024-2905,0,0,5aff97d46eb2a2ded6dabc5db119de0709b820d0400d89ee79c9a5ee743d2157,2024-06-12T09:15:17.483000
|
||||
CVE-2024-29050,0,0,1536bd54947e3cf128c1b094cebcaa34c3fbd6943d0052d924dc643cad9ccc59,2024-04-10T13:24:00.070000
|
||||
CVE-2024-29052,0,1,c05103f4d53f6004d89cac56ffb3497bfc9729041012764698255416e4e669bc,2024-08-15T19:35:09.370000
|
||||
CVE-2024-29052,0,0,c05103f4d53f6004d89cac56ffb3497bfc9729041012764698255416e4e669bc,2024-08-15T19:35:09.370000
|
||||
CVE-2024-29053,0,0,0a2a9891f60c97a89868d861ddd10850010f084346a0ce5022dfd6f0683f4bf6,2024-04-26T15:58:55.843000
|
||||
CVE-2024-29054,0,0,c6d60b200c3c90d4dfabdd7c2fb9f4592506a14cccc86b2bb17cfd7bb8629ca5,2024-04-26T15:59:00.880000
|
||||
CVE-2024-29055,0,0,361b4ecd1e226ec69efffd675e62a61f1a153627c4bcad17c56bbab62933cf2d,2024-04-26T15:58:48.473000
|
||||
@ -249212,7 +249212,7 @@ CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c
|
||||
CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000
|
||||
CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000
|
||||
CVE-2024-2937,0,0,79954cfe98c2940c0942106d942fe05f3c11cf3e503a3ae1500fa6b5fca01f84,2024-08-05T16:35:09.543000
|
||||
CVE-2024-29374,0,0,d2ac5a721d12777649fcd030beb01ff2c11bea2c0dd1a7deea6b2cbbb441b4fa,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29374,0,1,be8e602eebbb83c03bdd549b3faaa1f0dfc77d0ca5e7f9526b71be3aea9cae09,2024-08-15T20:35:09.683000
|
||||
CVE-2024-29375,0,0,716fc3c8e0ccb042475d24e7fe2ab7abf1b6955d8021a6ba9e6aecf5e8253511,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000
|
||||
CVE-2024-2938,0,0,ab88b913066937a047849ba483b0f7e9bae4b5bc13ea45b9cc5b395f17c9e679,2024-05-17T02:38:38.137000
|
||||
@ -249263,7 +249263,7 @@ CVE-2024-29466,0,0,4fa136a9b1a51af6517f939484fb1c8a80e3e0537d7615acddb3c99d86059
|
||||
CVE-2024-29469,0,0,2079505dc0da5a3cbf2c6e066fddfdad1eb85fcaa078af0bbb19417ca0e16ca0,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2947,0,0,7fa842f2bc2c8f223df34834539dd7f7d20bc53e8c380819b606cea859d50c0a,2024-06-12T09:15:17.717000
|
||||
CVE-2024-29470,0,0,56425811d021c212dbd848b24d323bfc83ff20dfcd604f9dd34d98a1dfae7b6e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29471,0,0,ebf1d29c49d3ece00f190d2d5a5846b59f3af2d9bc86c2c1d590d86d559c36d8,2024-04-30T20:22:53.443000
|
||||
CVE-2024-29471,0,1,5558733fa7b1a4697bbc8cd56d5ef313ce31c2ab78e350286f8e19f0c34b081d,2024-08-15T20:35:10.563000
|
||||
CVE-2024-29472,0,0,e62aac3c11b80b896f7dce9bc263bf444e326ccaa5bb3a22d5f14836d30cf59d,2024-04-30T20:22:59.060000
|
||||
CVE-2024-29473,0,0,8245ba1b7b6cfc2fd736894d074e12778ffb6419be24c78b4098d989642f62f6,2024-03-21T12:58:51.093000
|
||||
CVE-2024-29474,0,0,1e6da7c761ee3de98f7b759f0097c1b775ea91f11305f8a90e1129070ffdd028,2024-08-02T20:35:28.270000
|
||||
@ -249449,7 +249449,7 @@ CVE-2024-29851,0,0,6caf5af40512bdf306f6260aee64ffb7f918410ac566052e5e4ec42901fc0
|
||||
CVE-2024-29852,0,0,726c48fca6ecce09ba0891a4732d56a8cd51267214424717a9c0997e21d90cb7,2024-07-03T01:52:49.260000
|
||||
CVE-2024-29853,0,0,c1ae8cba1ec19d8da2e0ffbfe16c680f8b2163da29207d481a72323097831057,2024-07-03T01:52:49.947000
|
||||
CVE-2024-29855,0,0,b2802ced0a558e4f090c6287efb3198501503af3c94eb0da01eddf25e7dcba7e,2024-06-11T13:54:12.057000
|
||||
CVE-2024-29857,0,1,ab5aace8726aee3d1e7393ae75a416217cc2ccbc3ddcccec94ddfc2d233ec46c,2024-08-15T19:35:09.613000
|
||||
CVE-2024-29857,0,0,ab5aace8726aee3d1e7393ae75a416217cc2ccbc3ddcccec94ddfc2d233ec46c,2024-08-15T19:35:09.613000
|
||||
CVE-2024-29858,0,0,aa5c90a68e61d5eea7826384e8d70b409ed6638b27cfe587538945dd40bbacb5,2024-08-05T20:35:08.840000
|
||||
CVE-2024-29859,0,0,0c52659382beed573a576d19d14344fb05eadf0b0b39ff1fc944de0677e36d69,2024-08-05T17:35:11.090000
|
||||
CVE-2024-2986,0,0,952d70d69d44f406b2fd5c4135c9fe58871a413b604b281f838364e0f0dd222b,2024-05-17T02:38:40.777000
|
||||
@ -250178,14 +250178,14 @@ CVE-2024-30629,0,0,065564e121e3b652e8f433bc4bebac9590da04ba26d95145648a65cf0a32c
|
||||
CVE-2024-3063,0,0,e4ccb06d5ff3e906359417688d6094345cf7b0c3520fac98072d600493716bc5,2024-05-30T13:15:41.297000
|
||||
CVE-2024-30630,0,0,d1f2c24f30d736799fbd9614b05322c8af9640ffb03dab0097ee140dec9fb5dc,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30631,0,0,41f838085add8cf1dec118fb7468de6b4fc9bce111467eb8baa174f9e9137432,2024-08-01T15:35:12.897000
|
||||
CVE-2024-30632,0,0,83cac55fd4836e72e0e62bb030e60c6b8eec8f95446dacdfd0035ea7c9069b4e,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30632,0,1,3f8589dc8873f1f40fc2805a6241d9d5b4cb8cf8b5c1194f5bfaa117d3af4731,2024-08-15T20:35:11.387000
|
||||
CVE-2024-30633,0,0,0e20fbff7533df843343aa1ca8784af549e42237ddf63007c09299ebacdd216c,2024-08-01T13:50:23.153000
|
||||
CVE-2024-30634,0,0,9a5935e8c0707d47485f35151f5f78ee198d5683ff7c1df187b9b9e0a14e2e20,2024-08-01T13:50:23.927000
|
||||
CVE-2024-30635,0,0,9867b65ad790b03849102a4433871e5822d9883f60fd5996addd4ba7b4f88aa1,2024-08-01T13:50:24.723000
|
||||
CVE-2024-30636,0,0,7706c251cc6730da406f80ce2a2cf3af8e2faaef16970992a4ea0e2557948f7a,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30637,0,0,4903be2e34292b70c4fd64a16207b4d414e56da06073b801c097feb452620a21,2024-07-03T01:54:12.967000
|
||||
CVE-2024-30638,0,0,3f3309eb59690079a4df49f920e01371c189055cc07ce956d10dd836bf37277b,2024-08-01T15:35:13.663000
|
||||
CVE-2024-30639,0,0,cd3ec80806ba7186e56079017f52ba70f82561d29b942affd85b213d0a656871,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30639,0,1,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078965,2024-08-15T20:35:12.280000
|
||||
CVE-2024-3064,0,0,8a36a79ace74b39564c56ff7401e476ffc08c1a4de80ba6f8cd5a5d5cd60f7fb,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30645,0,0,77873f1c56920b575cbc0a26f80968d9589bdd66fb005fe46610787de441aca3,2024-08-01T13:50:25.530000
|
||||
CVE-2024-3065,0,0,0bda0f080fba1f5572d33c440e40f60c6a3ce2d985dfed057962a87436804b26,2024-05-24T01:15:30.977000
|
||||
@ -250275,7 +250275,7 @@ CVE-2024-3081,0,0,01dfa9fbad742b3b5c96a84664fd07fad21a9856f0e0dafe766309ca8f119c
|
||||
CVE-2024-3082,0,0,73f778fdc2724a4675c4d14baf6f3f3263310fd80e05bde56450b6ab5fd9fdcf,2024-08-12T18:36:54.220000
|
||||
CVE-2024-3083,0,0,167876b1272c8a6dfd73f29aaa5d21992769cf34711c3674318107cb49ffc67f,2024-08-12T18:35:54.460000
|
||||
CVE-2024-3084,0,0,305df29625577e6dd31738e34631201c5ea39f1d684ffd5f5306069a5e541323,2024-05-17T02:39:42.520000
|
||||
CVE-2024-30840,0,1,bde9cfa535b48f54d789e649b4a4f6901a0c8eeadf35c9ffc95194a241788b3d,2024-08-15T19:35:10.820000
|
||||
CVE-2024-30840,0,0,bde9cfa535b48f54d789e649b4a4f6901a0c8eeadf35c9ffc95194a241788b3d,2024-08-15T19:35:10.820000
|
||||
CVE-2024-30845,0,0,76935f5a808359b33b84594c4799e1bfdd6b3d8771fa4780e8d409785d9dbe54,2024-04-15T13:15:51.577000
|
||||
CVE-2024-30848,0,0,e520fc03d7d120883158934b80667a2b4d6398e475b39bea0f39a4affc9e9f6e,2024-08-01T13:50:28.210000
|
||||
CVE-2024-30849,0,0,4b2a4ccd593d26ef45288147032dbc711b9bbef7de8ea7827855efca75655daa,2024-08-01T13:50:28.983000
|
||||
@ -250861,7 +250861,7 @@ CVE-2024-3178,0,0,724b5b9b62dd4e92f1f229f9f28fcb0bddf71f92c79c0b94c18fdb2af7074b
|
||||
CVE-2024-31783,0,0,dea8534fc1b6933b26cda6217a1982520e5d50556b9ff7b4e3fbbb8c80f4a35b,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31784,0,0,872beb17d1c68d7ed92a4188cf9514602c2aada50c10052ecdc3a0e44dff88ee,2024-08-01T13:51:07.627000
|
||||
CVE-2024-3179,0,0,464d285bc972fdb5e95f8aa4a77b96bdfaeed1940a229e7762cb456353d6a4b4,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31798,0,1,ee48e2ab495264a21fe7995fe970190dab05038847f90349c8e2458409ca33ae,2024-08-15T18:35:07.483000
|
||||
CVE-2024-31798,0,0,ee48e2ab495264a21fe7995fe970190dab05038847f90349c8e2458409ca33ae,2024-08-15T18:35:07.483000
|
||||
CVE-2024-31799,0,0,9c5e9f8b47c839c569f6cf17352b69f8667d49cb8d93113be08508a650b55d97,2024-08-15T17:34:07.033000
|
||||
CVE-2024-3180,0,0,5bb7af5f4cf3797fd0e13fd61c5a120e857e3a7924c7f2a1b54e6cd1ca4c495c,2024-08-08T17:15:19.223000
|
||||
CVE-2024-31800,0,0,dd95211950f50097de0b3e68a33198707fd3a51656eb80975168feb72bda72f9,2024-08-15T17:34:07.033000
|
||||
@ -251172,7 +251172,7 @@ CVE-2024-32228,0,0,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85
|
||||
CVE-2024-32229,0,0,46cfde26330a35dd5af3aef05c7164d23baa98664713e164e4ba017a64475da0,2024-07-08T14:18:28.213000
|
||||
CVE-2024-3223,0,0,ea7ad0974e81e86878848176b870b25d4ede66377ba0daa6f895cdaeb06d9607,2024-05-17T02:39:47.627000
|
||||
CVE-2024-32230,0,0,9362b2b797a006bddcc5169710b996c1bae5f306510d2ae9a0e823f8d5efd51f,2024-07-02T12:09:16.907000
|
||||
CVE-2024-32231,1,1,e56fd475c922abc3bf764253738fd784ff1822758b584297a234d13913a8c81f,2024-08-15T18:15:19.507000
|
||||
CVE-2024-32231,0,0,e56fd475c922abc3bf764253738fd784ff1822758b584297a234d13913a8c81f,2024-08-15T18:15:19.507000
|
||||
CVE-2024-32236,0,0,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000
|
||||
CVE-2024-32238,0,0,2e383d4cf27763d4a2e4c78aa0cd5794584e416efc1aa13fdb576cfd26ca2359,2024-07-03T01:55:55.820000
|
||||
CVE-2024-3224,0,0,5cb76873d21890ad6afc0804dc7e9ce4b6d28fdd7bfda362c8cc03368f50e1a6,2024-05-17T02:39:47.717000
|
||||
@ -251244,7 +251244,7 @@ CVE-2024-32352,0,0,d332e53ad000ad8435c81c28241440757adaa084990611f8a2796504f9f9e
|
||||
CVE-2024-32353,0,0,95056727f707fc243928d89d790259f229ec041cac954a579b9099dbee969c0b,2024-07-03T01:56:22.500000
|
||||
CVE-2024-32354,0,0,7a51f481a311ea6ef8a37cf0ab90a70652431f14a7a615163cc4248af79f2619,2024-07-03T01:56:23.250000
|
||||
CVE-2024-32355,0,0,968872e2f9388a4f300a29bf059bb9d041ad5f1af64c12a13c06a0c4c507e69c,2024-07-03T01:56:24.003000
|
||||
CVE-2024-32358,0,1,4a9f04d7de7cf37957e5ddca82d08447fdb5095559f0322ed212cb704525f951,2024-08-15T19:35:12.137000
|
||||
CVE-2024-32358,0,0,4a9f04d7de7cf37957e5ddca82d08447fdb5095559f0322ed212cb704525f951,2024-08-15T19:35:12.137000
|
||||
CVE-2024-32359,0,0,5f5adaa7c351afc161843c430c2d85ebb8e96c4f13e61a22d9be5940d569bde0,2024-07-03T01:56:24.743000
|
||||
CVE-2024-3236,0,0,ec36abc2f11295d96bb4af829279736b1662391782f95917c947e11ba35b7504,2024-07-03T02:06:05.707000
|
||||
CVE-2024-32368,0,0,a245b295adfa06788541a26df62f1afc9fccb21b7ad815d7b584befe0d95c5a6,2024-07-03T01:56:25.517000
|
||||
@ -252545,11 +252545,11 @@ CVE-2024-34203,0,0,7c4fea643e6e97753f9c8250ce54a3db82e8ad36a97a2537629259caa2f68
|
||||
CVE-2024-34204,0,0,8c3a766ba6d418066e6235fac6d57a4c9976cf3ca35aae4d34005c5286e47927,2024-08-01T13:52:16.747000
|
||||
CVE-2024-34205,0,0,5e6ec1f83f8df2b44ee77e87d09f991b3d26ad92e17843fda65dc4a06a8d8d48,2024-07-03T01:59:33.503000
|
||||
CVE-2024-34206,0,0,bf2b14d36cc1c2097afe17c99c0cac4b916ae816d9a6bfbf97f078b15fc27e67,2024-07-03T01:59:34.333000
|
||||
CVE-2024-34207,0,1,e1c737d138ed257b551349ef6a0ef03bbca9833943e5bdf93286a556eca2ae45,2024-08-15T18:35:09.073000
|
||||
CVE-2024-34207,0,0,e1c737d138ed257b551349ef6a0ef03bbca9833943e5bdf93286a556eca2ae45,2024-08-15T18:35:09.073000
|
||||
CVE-2024-34209,0,0,4ad44bfcbcf039f986b2d526a19d98c15b5b8bb73456978475253049b47762bd,2024-07-03T01:59:35.650000
|
||||
CVE-2024-3421,0,0,53f50eb479be3dff70e3f58c7bc10ed5ab9e46a1c588cac2a904bb9207010438,2024-05-17T02:39:54.817000
|
||||
CVE-2024-34210,0,0,02626780bed2bd793e39eb14595382898b75f6bd94088cfe6237dd06a298d5c6,2024-07-03T01:59:36.677000
|
||||
CVE-2024-34211,0,1,497bc27d8a9c519a3e8144c9a75bc0cc16c1789b9f3e200fc3b05cccdf381584,2024-08-15T18:35:09.893000
|
||||
CVE-2024-34211,0,0,497bc27d8a9c519a3e8144c9a75bc0cc16c1789b9f3e200fc3b05cccdf381584,2024-08-15T18:35:09.893000
|
||||
CVE-2024-34212,0,0,349c5ceaae711c6c258753506e7441916ed8a606582e8e23b3a895f6369c1db5,2024-07-03T01:59:37.463000
|
||||
CVE-2024-34213,0,0,53d3ba806aa46d773a8e337fee7142388687e212bee6517408c0857d401b6448,2024-07-03T01:59:38.230000
|
||||
CVE-2024-34215,0,0,88585b38adcdb11fabddf85123f183f044f14feba5e8e740334272a1fa850701,2024-07-03T01:59:38.987000
|
||||
@ -253029,7 +253029,7 @@ CVE-2024-34936,0,0,8edb055c2e80e0324b4bcba4cb55226affc069e205c0fafde60f980bb5ead
|
||||
CVE-2024-3494,0,0,18f9b9bd36d8a43e8f4c6da36d532e779d9d98429c42e261e00b97ab82c89568,2024-05-08T13:15:00.690000
|
||||
CVE-2024-34942,0,0,c49dd24762e84a77fd533acb36e8b66632ca6d8510ce64e6f0a0bef34b144d2a,2024-08-01T13:52:28.260000
|
||||
CVE-2024-34943,0,0,27f223f9ebdd1c5e044a9b8c3ea5e878cc25ed59e01266545a6073517a2a7075,2024-07-03T02:00:59.257000
|
||||
CVE-2024-34944,0,1,ebf0acd3bf1df8d027c779fbcc35d2b8dc9c5d428d6c000f540b43c5e01a3289,2024-08-15T18:35:10.807000
|
||||
CVE-2024-34944,0,0,ebf0acd3bf1df8d027c779fbcc35d2b8dc9c5d428d6c000f540b43c5e01a3289,2024-08-15T18:35:10.807000
|
||||
CVE-2024-34945,0,0,bd887865baa11222c5471f83f64ee50937d3f1c1cfa2d234bd4834ddeb94df5d,2024-07-03T02:01:00.147000
|
||||
CVE-2024-34946,0,0,bc37c91351bb9de539bebc2edf6ca00a5506257a85c0193f030841ee78b07113,2024-07-03T02:01:00.960000
|
||||
CVE-2024-34947,0,0,1639e64ad64e3efff06c97dd9d715badbd33e6d8d7c52e5aa73aac445f5ce021,2024-05-20T19:34:58.277000
|
||||
@ -254184,7 +254184,7 @@ CVE-2024-36598,0,0,00d0a8090fa16fe89aa3866d79b98c53443431993afed273e14298b9e0b2a
|
||||
CVE-2024-36599,0,0,2b2bc07f90b37a08fed3176237d4d673945409fdbbe06bfa5eecf36828a7ec56,2024-08-01T20:31:01.340000
|
||||
CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117ed2,2024-08-01T13:56:38.227000
|
||||
CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000
|
||||
CVE-2024-36604,0,1,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000
|
||||
CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000
|
||||
CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000
|
||||
CVE-2024-3662,0,0,bf35bc71372b512799f21214c4add2ef96949612530c04611b0774c90b1261c4,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3663,0,0,aac8884135ebb34dcb3248cfa17d27356201b5565d5879d71d9c52eb44a76d97,2024-05-22T12:46:53.887000
|
||||
@ -255202,27 +255202,27 @@ CVE-2024-38186,0,0,e48699951b83a13a8c545a7bb39dc766d490dd0a39c76d8a25aa85e46c5ed
|
||||
CVE-2024-38187,0,0,426ec9e92ff0a407b183738cdd31a21c97647274d94618ee0b6aa72a02fffbbf,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38189,0,0,548200171a7637a1944ce86ea38e36c3daaf16d5a029877c7e9488a838ab8ca5,2024-08-14T02:07:05.410000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38191,0,0,4371229bbf54a5f72675f18bbdb7de5689b83dd55dd4002078c6bdcc30a95796,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38191,0,1,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
|
||||
CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000
|
||||
CVE-2024-38195,0,0,403da1e7ee54acf8b46d0bc20dca9a0a0b7a697360f9e7173be4732a734fa99a,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38196,0,0,a7370d4df50d307e3cac385cc9982cd5cbe2c91b24beceac1e58024fa8be9b0c,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38197,0,0,a2526a063c676aa3c0db0fb5816953b73c407ae5b9ba1850dcbce0dd2a4f0782,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38198,0,0,7c13ff5cd4318fc67f08ffed59d97140f5f68a8109259b86efceaffe5b5b6581,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38199,0,0,e71cd41bdce22471126664df3627a9d9808057998ff9b14c41522629adb2f0e0,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38195,0,1,d7663b0e9aa556c8ce10c21ef451a7d773e7f876b8747c98159d99dc83716a8b,2024-08-15T20:56:25.100000
|
||||
CVE-2024-38196,0,1,036126fa4e67f7c18a11733658d35aa169249f60e5767c04da0dc3a714533203,2024-08-15T20:54:50.510000
|
||||
CVE-2024-38197,0,1,9a40abe98c5d54835551587ddc4b75a591055dcd8f35ba539478fb7646793bd3,2024-08-15T20:40:58.547000
|
||||
CVE-2024-38198,0,1,628cd807f7bcba6952b2c2062766a5214149c29bd5be742232c43abd2bc51e12,2024-08-15T20:39:20.260000
|
||||
CVE-2024-38199,0,1,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e0f4,2024-08-15T20:32:42.193000
|
||||
CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000
|
||||
CVE-2024-38201,0,0,3e987f4acaf2a21496a50322db1e6da756540fc1a9004f5bf53ece5892738941,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38201,0,1,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000
|
||||
CVE-2024-38202,0,0,e2d641c476f9dc13a8d336a19bdebe9a3b3a110a87f90a532b99552457779a18,2024-08-13T18:15:30.203000
|
||||
CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000
|
||||
CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000
|
||||
CVE-2024-38211,0,0,bd8bfa8c4624deff7dac7aa73db9b3ba77b12b1effbc26ec571237f245488313,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38211,0,1,51e2e73d6d93c77460ccfd3a0684ba8ffade47d470b416e9dbd607fd57a6c040,2024-08-15T20:29:19.557000
|
||||
CVE-2024-38213,0,0,a57ec7b97080baf05c7c67e1e8b814c6ef63e8cb4eb809fa5c6a9e16af89b3b3,2024-08-14T14:55:49.887000
|
||||
CVE-2024-38214,0,0,f705851ec0fdbb3a65ed2141ff0f9dc742521a9e167acb42f445dc7e7472d6e0,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38214,0,1,36d440db09d4a2cbf6127fa4a6571f8fdbf7003c0a2820ce7057958b7fe01f75,2024-08-15T20:28:25.893000
|
||||
CVE-2024-38215,0,0,1d004986cdbbdb186909c75ded4a7501590ae50a83feca56ee16c60de3d95af5,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b9b4,2024-08-13T18:15:31.500000
|
||||
CVE-2024-38219,0,0,e14090e36cb268ebd4ddc662de283a811b72a0453a256d8c6fb64b84db762356,2024-08-13T18:15:31.623000
|
||||
CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000
|
||||
CVE-2024-38223,0,0,9dfc6e5cacfc6a41126f771912b915dcc656f2a64f587867aaa45e3601a69163,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38223,0,1,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000
|
||||
CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578b4,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000
|
||||
@ -255848,7 +255848,7 @@ CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f3
|
||||
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
|
||||
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
|
||||
CVE-2024-39338,0,0,1d01e198c754bf37624d174e342122b94597a5e2c77c36168412d03f0eb20a07,2024-08-12T21:35:08.523000
|
||||
CVE-2024-39338,0,1,b2902b8c8fc819dc7cfd9bba42bea4279b850087be05ea18d3d2870591906304,2024-08-15T20:35:13.427000
|
||||
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
|
||||
CVE-2024-39340,0,0,5ebdab5b5b68a92db4ff353d7a08162224794f82acef11835fd7731e9f604ef2,2024-08-01T13:55:49.473000
|
||||
CVE-2024-39345,0,0,a7fe401efcbb2b3728b6e10777ee0a9c04a224d785c5c0839b1d13cfea4ecde8,2024-08-01T13:55:50.247000
|
||||
@ -256310,7 +256310,7 @@ CVE-2024-4030,0,0,5921f7a0bad0c927ce4dbb50662fc4a35b1a0000bcf4f0fcdcf8646834ec43
|
||||
CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac95b,2024-04-23T12:52:09.397000
|
||||
CVE-2024-40318,0,0,707e2278ed76999501b0ebe41731bc6c7ce3d362b11b135857b22a4598f749d4,2024-08-01T13:57:01.373000
|
||||
CVE-2024-4032,0,0,3096efec5a4aac10abf7764e78ac4ae4cb7cabc4d2a57ccc635113d230119926,2024-07-28T14:15:10.783000
|
||||
CVE-2024-40322,0,1,36ec868cc25cae082851f8dbd78b3b47072e07627ac44a4353edc37394e6afff,2024-08-15T18:22:21.890000
|
||||
CVE-2024-40322,0,0,36ec868cc25cae082851f8dbd78b3b47072e07627ac44a4353edc37394e6afff,2024-08-15T18:22:21.890000
|
||||
CVE-2024-40324,0,0,800cbefc1e1a0f1674df7427e869d5b9b9ba12466acb5c50fa044c1ecb6cdfeb,2024-08-01T13:57:04.970000
|
||||
CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000
|
||||
CVE-2024-40329,0,0,26b60d9602f8b52b720fff41651ef4092fad02f73b2a1ba0d8eaca9598e4c3e0,2024-07-12T16:11:58.887000
|
||||
@ -256462,8 +256462,8 @@ CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08ed
|
||||
CVE-2024-40690,0,0,288f59aa1afbad71e8a264760a25606f0765322027457660d06b06f1220570f0,2024-07-12T19:04:57.907000
|
||||
CVE-2024-40697,0,0,bebf3d413c945a3b35cf93ef4b95b34b89f9c389fda4792714ebafea2974c936,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
|
||||
CVE-2024-40704,0,0,cf1a6bf1c98efc6b003c3662998595e57fe5a182136e10ea043a042d6f514ef6,2024-08-15T17:34:07.033000
|
||||
CVE-2024-40705,0,1,275d0b75adf60123909502ce4ab0bfe2d790c03f0eb4301b2362936b51ce0432,2024-08-15T19:57:34.780000
|
||||
CVE-2024-40704,0,1,2cad5906579743e8e98ddcd83d02c56b18a31e7ad68147157b568c3e9be363eb,2024-08-15T20:03:13.530000
|
||||
CVE-2024-40705,0,0,275d0b75adf60123909502ce4ab0bfe2d790c03f0eb4301b2362936b51ce0432,2024-08-15T19:57:34.780000
|
||||
CVE-2024-4071,0,0,5f6b5ae6c8e3d6e0ce3e89718b14a6bb17b22a46ae9131966ebec62404b12da9,2024-05-17T02:40:14.747000
|
||||
CVE-2024-40719,0,0,b6da62d4912c9bd07427fa16443cd7668b6b1bac31228d96cfe2dfe539bd5688,2024-08-09T14:36:32.300000
|
||||
CVE-2024-4072,0,0,5325ee2ea26a58f6ec285799bb6ee6c62eeadace5f641482183f3a76d39bf009,2024-05-17T02:40:14.847000
|
||||
@ -257420,11 +257420,11 @@ CVE-2024-42468,0,0,76cb3122a8232cee530b0374441c48dedc4c3d24ff695d723500b8a92fe30
|
||||
CVE-2024-42469,0,0,b65049b5c4751d92c1e0b91c507812510fe11805ae8aa9f7a38c440861e678c6,2024-08-12T13:41:36.517000
|
||||
CVE-2024-4247,0,0,e85864e661a2b1d9942e48a3c52bc53fc949e702c33b68de4ade6b9cd86f67dd,2024-06-04T19:20:33.897000
|
||||
CVE-2024-42470,0,0,c2337f1ff190575de6395575b084daf7bce25ccaf9e3e76f2820207f899cd76d,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42472,1,1,97b667f1740c5cdaf6adfaa20e1329dff65cbc8d6625a2330e189233bf6585e1,2024-08-15T19:15:19.233000
|
||||
CVE-2024-42472,0,0,97b667f1740c5cdaf6adfaa20e1329dff65cbc8d6625a2330e189233bf6585e1,2024-08-15T19:15:19.233000
|
||||
CVE-2024-42473,0,0,4ed1851fb406b4127fd12c2bea40398eaaed7991df0df7d58ed2677a68f6e622,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42474,0,0,4857cb5e72d8ea0d32d5af9cf7ffd6ae8ca8513ca577f0cc8130743d345121e8,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42475,1,1,eee5c6508567d14a26bd82a835ddbfe9f19ee9c18911c2eef65a0e7b9b5b7b30,2024-08-15T19:15:19.520000
|
||||
CVE-2024-42476,1,1,9a7cad6df15130bbf377169acf136fb2b8294b31c91aedfea34ba4e43f0e6e1f,2024-08-15T19:15:19.753000
|
||||
CVE-2024-42475,0,0,eee5c6508567d14a26bd82a835ddbfe9f19ee9c18911c2eef65a0e7b9b5b7b30,2024-08-15T19:15:19.520000
|
||||
CVE-2024-42476,0,0,9a7cad6df15130bbf377169acf136fb2b8294b31c91aedfea34ba4e43f0e6e1f,2024-08-15T19:15:19.753000
|
||||
CVE-2024-42477,0,0,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf37dd,2024-08-15T14:02:23.130000
|
||||
CVE-2024-42478,0,0,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000
|
||||
CVE-2024-42479,0,0,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000
|
||||
@ -257433,6 +257433,8 @@ CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c0
|
||||
CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000
|
||||
CVE-2024-42482,0,0,b30158f5b674bded8c099de403a1859157e22ee6eae596b9cbf6c6cda1ffed96,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42485,0,0,fe887079979720fde6a2564dece883024602b52e3edd829141a610d95ce6aeb6,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42487,1,1,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000
|
||||
CVE-2024-42488,1,1,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000
|
||||
CVE-2024-42489,0,0,1203b17e47b8d78391ae8374fec72a221549be23a40702733d44133e504634fc,2024-08-12T18:57:17.383000
|
||||
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
|
||||
CVE-2024-42493,0,0,f6b5486c33bc66cf003608659d12007760e6f11e14f162d8f0f6b524c3d0cd10,2024-08-08T18:55:19.180000
|
||||
@ -257494,7 +257496,7 @@ CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02ca
|
||||
CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000
|
||||
CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000
|
||||
CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000
|
||||
CVE-2024-42757,1,1,b590f5c691893937050e21d09ed7435c1f3d07fef2df10a9b954093ef9410723,2024-08-15T19:15:19.977000
|
||||
CVE-2024-42757,0,0,b590f5c691893937050e21d09ed7435c1f3d07fef2df10a9b954093ef9410723,2024-08-15T19:15:19.977000
|
||||
CVE-2024-4277,0,0,ec975a6ab8cd435ccab2b915965095df8c992e1e8e765cf73bc6d545aa3b1e0a,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000
|
||||
@ -257510,41 +257512,41 @@ CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9
|
||||
CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000
|
||||
CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000
|
||||
CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000
|
||||
CVE-2024-42940,0,1,8459117022d1933d94f39e35ddb242a10590c376e2175e7cc652f32c04f3f616,2024-08-15T19:33:37.670000
|
||||
CVE-2024-42941,0,1,f276860328f60b69410589f7a70f549ecede1d869efb16ef961d03ddea8f3d9e,2024-08-15T19:33:07.637000
|
||||
CVE-2024-42942,0,1,22160e7a51aba7ec4c2a442eda5365016c21f50a3ce436f5593e17d4a4e43925,2024-08-15T18:35:12.117000
|
||||
CVE-2024-42943,0,1,89c464dfd8c5f51926e53bbc150c1d5fb409b705cb2bcd9dfb7d1af986ed8796,2024-08-15T19:32:41.770000
|
||||
CVE-2024-42944,0,1,6a290ba62a9fff3904840cadfe2b37e39d360c8330bb30550edf0cc0dbc5dd2d,2024-08-15T19:35:13.737000
|
||||
CVE-2024-42945,0,1,b51c554c7b4c6d19cac5e4b0d4a01832b1af734dc7e9521d8a5997f778081806,2024-08-15T18:35:13.343000
|
||||
CVE-2024-42946,0,1,93fe4893c0cedb4738a7e308b70ad69c3528d6545aadd1d60c711d4757ed44f7,2024-08-15T19:31:54.883000
|
||||
CVE-2024-42940,0,0,8459117022d1933d94f39e35ddb242a10590c376e2175e7cc652f32c04f3f616,2024-08-15T19:33:37.670000
|
||||
CVE-2024-42941,0,0,f276860328f60b69410589f7a70f549ecede1d869efb16ef961d03ddea8f3d9e,2024-08-15T19:33:07.637000
|
||||
CVE-2024-42942,0,0,22160e7a51aba7ec4c2a442eda5365016c21f50a3ce436f5593e17d4a4e43925,2024-08-15T18:35:12.117000
|
||||
CVE-2024-42943,0,0,89c464dfd8c5f51926e53bbc150c1d5fb409b705cb2bcd9dfb7d1af986ed8796,2024-08-15T19:32:41.770000
|
||||
CVE-2024-42944,0,0,6a290ba62a9fff3904840cadfe2b37e39d360c8330bb30550edf0cc0dbc5dd2d,2024-08-15T19:35:13.737000
|
||||
CVE-2024-42945,0,0,b51c554c7b4c6d19cac5e4b0d4a01832b1af734dc7e9521d8a5997f778081806,2024-08-15T18:35:13.343000
|
||||
CVE-2024-42946,0,0,93fe4893c0cedb4738a7e308b70ad69c3528d6545aadd1d60c711d4757ed44f7,2024-08-15T19:31:54.883000
|
||||
CVE-2024-42947,0,0,f42bc46add20d44771b56145fee731c1ddc38654b99b066f8df3372fea34b28f,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42948,0,1,59733d9ea03ff832cdda58530fe7794aa6dde194a9927e51f986b168d6545b07,2024-08-15T19:31:38.217000
|
||||
CVE-2024-42949,0,1,9d545118cba6649782b54ae27c38f1aa504bb881d29e0b9897d5de790ac29d20,2024-08-15T18:35:14.430000
|
||||
CVE-2024-42948,0,0,59733d9ea03ff832cdda58530fe7794aa6dde194a9927e51f986b168d6545b07,2024-08-15T19:31:38.217000
|
||||
CVE-2024-42949,0,0,9d545118cba6649782b54ae27c38f1aa504bb881d29e0b9897d5de790ac29d20,2024-08-15T18:35:14.430000
|
||||
CVE-2024-4295,0,0,848d1af2676088d8bdb79c5f7e3bd4f81684dc40347bc492c56560372b53041d,2024-06-11T17:15:18.997000
|
||||
CVE-2024-42950,0,1,74ee57e8c628f2aa5c0f1d0ddce8190cf5b54413211793b2f8739e00bf8d3d7d,2024-08-15T19:31:17.737000
|
||||
CVE-2024-42951,0,1,85275541fa923c811c363f65806be15ab72ba82c78bd854fd99c466c7c5802a2,2024-08-15T19:30:54.620000
|
||||
CVE-2024-42952,0,1,b65ff3219b833a55817e0927e7de1af3e44121268840902e5ccda1d541c6cdf9,2024-08-15T19:30:38.387000
|
||||
CVE-2024-42953,0,1,58c878dc5f5cca4ba3f36cfc4bba965c4a1c2ae0257b6ccf0d5ee87f2b28abe9,2024-08-15T18:35:15.460000
|
||||
CVE-2024-42954,0,1,21936edb6d76a1dd8ac96611d3a88660fcfb4cf78730c9339bc7845c4b218f07,2024-08-15T18:35:16.510000
|
||||
CVE-2024-42955,0,1,9320f4344c94707c19eb1638f7623083e78d4d0cac1d427a8b445dec8cf0f81b,2024-08-15T19:29:55.033000
|
||||
CVE-2024-42950,0,0,74ee57e8c628f2aa5c0f1d0ddce8190cf5b54413211793b2f8739e00bf8d3d7d,2024-08-15T19:31:17.737000
|
||||
CVE-2024-42951,0,0,85275541fa923c811c363f65806be15ab72ba82c78bd854fd99c466c7c5802a2,2024-08-15T19:30:54.620000
|
||||
CVE-2024-42952,0,0,b65ff3219b833a55817e0927e7de1af3e44121268840902e5ccda1d541c6cdf9,2024-08-15T19:30:38.387000
|
||||
CVE-2024-42953,0,0,58c878dc5f5cca4ba3f36cfc4bba965c4a1c2ae0257b6ccf0d5ee87f2b28abe9,2024-08-15T18:35:15.460000
|
||||
CVE-2024-42954,0,0,21936edb6d76a1dd8ac96611d3a88660fcfb4cf78730c9339bc7845c4b218f07,2024-08-15T18:35:16.510000
|
||||
CVE-2024-42955,0,0,9320f4344c94707c19eb1638f7623083e78d4d0cac1d427a8b445dec8cf0f81b,2024-08-15T19:29:55.033000
|
||||
CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000
|
||||
CVE-2024-42966,0,0,7036dbdf7da9b7158f74fdec9e3f9843fb38b3fb3db5bcb2d5a5e5aabf1b56eb,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42967,0,0,5c6ddff043edb9f64de457e7c85cad51d59eabcef112c7839a0cb8ad985ed120,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42968,0,1,84d22483f402fc29ed06b4ae05d8aa8fbdb879fa4407f135b8f72274cf5102ac,2024-08-15T18:35:17.583000
|
||||
CVE-2024-42968,0,0,84d22483f402fc29ed06b4ae05d8aa8fbdb879fa4407f135b8f72274cf5102ac,2024-08-15T18:35:17.583000
|
||||
CVE-2024-42969,0,0,dab713097fbe2947e59a0176f16b8e27764ab16d6facc62d76c163a189a81644,2024-08-15T17:34:07.033000
|
||||
CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828d7,2024-04-29T12:42:03.667000
|
||||
CVE-2024-42973,0,1,d5485c43677896de6fa08dcef41d866080793d4ea6f42d62bb087be9a42b86ec,2024-08-15T18:35:18.647000
|
||||
CVE-2024-42974,0,1,61d1e7965783de08549ceb87497ce958d38b08adcba4b51b3e7dd7cf76abda57,2024-08-15T18:35:19.710000
|
||||
CVE-2024-42973,0,0,d5485c43677896de6fa08dcef41d866080793d4ea6f42d62bb087be9a42b86ec,2024-08-15T18:35:18.647000
|
||||
CVE-2024-42974,0,0,61d1e7965783de08549ceb87497ce958d38b08adcba4b51b3e7dd7cf76abda57,2024-08-15T18:35:19.710000
|
||||
CVE-2024-42976,0,0,d165d33fb1b82c5e775ee0c65e2c10b26a90558e47fb27e5e58d08c1dbc0c1da,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42977,0,0,216d08b83eb897d4c82c26b1613e1467dfd8ebeaf8e443b8a8e7d153bdb5f0c2,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42978,0,0,445b492eb8eef775e4a64681b6fb4e1eecf6f10d9e0f2c1f4066ab3e8606a4f2,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42979,0,1,fec579a62e68a4a25550b4929302262929d70ec750534fbc7a3c9c744abc20d4,2024-08-15T18:35:20.827000
|
||||
CVE-2024-42979,0,0,fec579a62e68a4a25550b4929302262929d70ec750534fbc7a3c9c744abc20d4,2024-08-15T18:35:20.827000
|
||||
CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000
|
||||
CVE-2024-42980,0,0,dc163a69e8d5c3f861d4f427507fadb0cc55c39c971f41ea09320319bfccf444,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42981,0,0,87895a5069b3dc548585bf01f286cc66421c91858c24a113a62f709091d7298e,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42982,0,0,93843ee8c658c74b2a9ffc628d9fd29095f015d941629c4b5dc7ba3ff8d636ee,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42983,0,1,2ff07324e83d99eb1dc609eafc4c3fb864fe9bede7cebb3f3a45d534c9241118,2024-08-15T18:35:21.960000
|
||||
CVE-2024-42984,0,1,bab3f2f7207ff98837835928f6ef37efbc1f08e16988e1becb88b00c2369e868,2024-08-15T18:35:23.283000
|
||||
CVE-2024-42983,0,0,2ff07324e83d99eb1dc609eafc4c3fb864fe9bede7cebb3f3a45d534c9241118,2024-08-15T18:35:21.960000
|
||||
CVE-2024-42984,0,0,bab3f2f7207ff98837835928f6ef37efbc1f08e16988e1becb88b00c2369e868,2024-08-15T18:35:23.283000
|
||||
CVE-2024-42985,0,0,7f62f88eba2c019f1e1b26c0b33d7843e72bfa968e58169dbe10df937551f153,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42986,0,0,8d53b407a9850298a10bc61660fa7b954a46af6a6bb93a6c1615e6d9021b549a,2024-08-15T17:34:07.033000
|
||||
CVE-2024-42987,0,0,91a85ec7e84c61060a1de30fd69339f4a10b02e9d13b96f093136cee79498a8c,2024-08-15T17:34:07.033000
|
||||
@ -257637,11 +257639,13 @@ CVE-2024-4332,0,0,229e2a44f62342d9fecf4d77bd1ae1368633da9c89a437515cafc4b1ffcbd9
|
||||
CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953e9,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4335,0,0,0ca058a6a5d3d4471e4538114fc6d3ccf52ed0e69923cf2c5461b8aef31c87bc,2024-05-14T16:11:39.510000
|
||||
CVE-2024-43357,1,1,72055b0be374c13d5effd025bc0243cf9d737f6b2c46cea06576894189e5d68c,2024-08-15T19:15:20.107000
|
||||
CVE-2024-43357,0,0,72055b0be374c13d5effd025bc0243cf9d737f6b2c46cea06576894189e5d68c,2024-08-15T19:15:20.107000
|
||||
CVE-2024-43358,0,0,fbf8fe905c3ca9abb9115b42cc5614eccd0cebf28f3e14adb9347834e27ffc3a,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43359,0,0,65d4fabedd6480e45a35d791ca8acdefa39599f7f2c5dac0d8096fc11d685101,2024-08-13T12:58:25.437000
|
||||
CVE-2024-4336,0,0,c134d6edc5435f42ac06617edd246079dd96557f1185ced7c01e0aea0bd59b88,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43360,0,0,5e83697ea820bba28f28ac74c16eaa49368718cf4d29d0f4eeaac44e95899ac3,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43366,1,1,c6a0c9b79f40e9ac6adfe96e8a726d4a739758a69bf451c548536be75a4590b2,2024-08-15T21:15:17.520000
|
||||
CVE-2024-43367,1,1,aa40d7ce5e159a344ef88943101f5635e11309c45219cf73c00055952573916e,2024-08-15T21:15:17.777000
|
||||
CVE-2024-43368,0,0,bc8404f29bdb04258d364b3952f9782a6581bd81b6fee1a7f290b39a6cca9c9f,2024-08-15T13:01:10.150000
|
||||
CVE-2024-4337,0,0,87f9a4f489ef032776e3da435c02385147be0cf8fdf2fdcc393190f8f887eca5,2024-04-30T13:11:16.690000
|
||||
CVE-2024-43373,0,0,69d56183bd2a33523e74549d732339012a778a169f9424729adc89709a9fb8e3,2024-08-15T17:34:07.033000
|
||||
@ -258798,7 +258802,7 @@ CVE-2024-5674,0,0,19a588e59b6b0a5cd86582f1d6ecebdb5fae3e091de3e9e5a8f682eaf8708c
|
||||
CVE-2024-5675,0,0,c94a13a2a4b4b541f4d9019f3017bff689f5579f32759b7a87deb8cdfe0fb73d,2024-06-11T18:14:02.017000
|
||||
CVE-2024-5676,0,0,ac70690e5e5a82915ea8b21175c3316ecbf6493d45f7e6ea6d37cbb46bb6c2ce,2024-06-24T05:15:09.600000
|
||||
CVE-2024-5677,0,0,e2511915c83441842f7c8a6e8aecd9d8b3c471bd0e1157bcb520b0c0755a9041,2024-07-11T13:05:54.930000
|
||||
CVE-2024-5678,0,1,afe74031d89f42a567cee8ccb637e89bb2adfa159544a8b4a6426bad0bf8944a,2024-08-15T18:05:54.847000
|
||||
CVE-2024-5678,0,0,afe74031d89f42a567cee8ccb637e89bb2adfa159544a8b4a6426bad0bf8944a,2024-08-15T18:05:54.847000
|
||||
CVE-2024-5679,0,0,0839965cde25fea3aa350fa717eb81302bb5423efd743b60fd44dbd620732a01,2024-07-12T16:38:44.027000
|
||||
CVE-2024-5680,0,0,4b89f5f26e3b07478091cc4705b6bf03eb5b6d7ef8a454176f219f6262119e02,2024-07-12T16:38:49.670000
|
||||
CVE-2024-5681,0,0,ba69ac569d7576d195fd1b6967a53d4cc4e5811e9ef97dab1bfc2916a4020575,2024-07-12T16:37:40.303000
|
||||
@ -259379,6 +259383,7 @@ CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06
|
||||
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6453,0,0,a31f9b2d11e920ef5820d5943bd943df178bc2e27d100b648bd1b922afad8eca,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f369,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6456,1,1,bc36926cd39d9c147941407431b009e2492d4daa481901d0ea883b3657b0a7bf,2024-08-15T21:15:18.047000
|
||||
CVE-2024-6457,0,0,2021b397e47ab38cda013de2c201fe3ea53b49570246fbb65269f60be90e5ab4,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6458,0,0,e6f4f9a699790cfa92517dafe90bcdba32232615fceb305817a9ccda94d06fc4,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
|
||||
@ -259892,7 +259897,7 @@ CVE-2024-7321,0,0,42cb7d687a3ea14a5f795d2e8dc1d36894e3cc4a44b6104596b7ddb427645e
|
||||
CVE-2024-7323,0,0,9ade4a736dcd7d946c31626909fde6ca44169336c2686d18f85ae47322aa8137,2024-08-02T12:59:43.990000
|
||||
CVE-2024-7324,0,0,095fe191ca170a7ec3aafa46faf9007b467b7e450c1bcd7d0af0a45c400bd246,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7325,0,0,a6bde1ed410a10749d44bba07a55a46b87addce8acb914516046e9ef7fd987c8,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7326,0,1,e3f620860b2c85477fb2efe05441eb7c734011e1cba89f910fddb650411bf7ba,2024-08-15T19:03:41.457000
|
||||
CVE-2024-7326,0,0,e3f620860b2c85477fb2efe05441eb7c734011e1cba89f910fddb650411bf7ba,2024-08-15T19:03:41.457000
|
||||
CVE-2024-7327,0,0,9ec7c5b4f3fea2ac5f9abdae5d7475fef06eab11099d18f41ef0237ea3e05b7b,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7328,0,0,d7a3331bca731f76c4abaa1cc5cdfd3af91da16a0035eba7b48c86ad7eb687ea,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7329,0,0,f2ada99243d0f575b81eec21f3148ca66fce3d9559ae9316ecf85d94bc4c0b72,2024-08-01T12:42:36.933000
|
||||
@ -259907,8 +259912,8 @@ CVE-2024-7337,0,0,bb4e29754f24508ee03646d09f02a9e9792b2bdc0b40ad3f742f7daf359e30
|
||||
CVE-2024-7338,0,0,40f9236687cb1fba08bae47e5bce5fdf8596baa7faf10b9e6c7a335576e73829,2024-08-09T14:51:45.677000
|
||||
CVE-2024-7339,0,0,b22bc8c3b0525a6c98a03e6df13c491f10ced24284b84aa3889a1e52c55f16a5,2024-08-01T12:42:36.933000
|
||||
CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000
|
||||
CVE-2024-7342,0,1,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000
|
||||
CVE-2024-7343,0,1,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000
|
||||
CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000
|
||||
CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000
|
||||
CVE-2024-7347,0,0,7294264a78f876054f68f937878dfd9b5003cf87b7a3bb83d1bac4c279d851db,2024-08-14T17:49:14.177000
|
||||
CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000
|
||||
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
|
||||
@ -260074,16 +260079,16 @@ CVE-2024-7624,0,0,fe880bbf70f7d6e0e0d7959fc4667ae33cede9b405a9b87471b54fc1288842
|
||||
CVE-2024-7625,0,0,f8c051bee159f37ecabf1edf8939b9aaaa1199377d2392fdca002a4a5223d380,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7628,0,0,3ea535a326d0197b5259672683acf97672f398fa364ea0c9846f4657432fb454,2024-08-15T13:01:10.150000
|
||||
CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000
|
||||
CVE-2024-7635,0,1,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000
|
||||
CVE-2024-7636,0,1,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000
|
||||
CVE-2024-7637,0,1,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000
|
||||
CVE-2024-7638,0,1,14704d8b98a0b1ff9d1d66ca41baa4777ff0244ee5bd3cf331741dfde51369be,2024-08-15T18:15:11.510000
|
||||
CVE-2024-7639,0,1,1f2bbc0c7a03c70c40e55fcb6437cc0f93e0b9e71f322a344c94d6c29afc47ec,2024-08-15T18:15:52.173000
|
||||
CVE-2024-7640,0,1,a904ac98281d1ae12fa6cf830538035c8287c0eff0403b9351fbe43bd7af1574,2024-08-15T18:16:20.883000
|
||||
CVE-2024-7641,0,1,31531d7ba6c4790873e3e2cbb5e0f029b43c16ba80a6eb72b0be87c407522388,2024-08-15T18:17:06.590000
|
||||
CVE-2024-7642,0,1,7529ae7f3e258c0bacf9321b53a5a8cb22d41a7a410253e46b217922db56c34d,2024-08-15T18:17:34.597000
|
||||
CVE-2024-7643,0,1,561f361e340de6652f3552e8a31740bd4d6ceba659a82983fde2458aeab94c1a,2024-08-15T18:18:22.827000
|
||||
CVE-2024-7644,0,1,af133dd73ba0f9ae2c852b6a18dbacddae25120427cf0e48515211be4d6d6b46,2024-08-15T18:19:11.080000
|
||||
CVE-2024-7635,0,0,77137333cb856f76f03e4b50e0e5dbce5cc99fa466aafebf6530d8cfb2e96fdd,2024-08-15T18:12:33.270000
|
||||
CVE-2024-7636,0,0,81414365f80fa57b345628baccc97b68e4a32475a3dd61fce01a599a3ee31eee,2024-08-15T18:13:23.327000
|
||||
CVE-2024-7637,0,0,07fff1a7df418b9e3b67d234f6aa590337509d3b6198aaa332e768f862723c65,2024-08-15T18:15:15.667000
|
||||
CVE-2024-7638,0,0,14704d8b98a0b1ff9d1d66ca41baa4777ff0244ee5bd3cf331741dfde51369be,2024-08-15T18:15:11.510000
|
||||
CVE-2024-7639,0,0,1f2bbc0c7a03c70c40e55fcb6437cc0f93e0b9e71f322a344c94d6c29afc47ec,2024-08-15T18:15:52.173000
|
||||
CVE-2024-7640,0,0,a904ac98281d1ae12fa6cf830538035c8287c0eff0403b9351fbe43bd7af1574,2024-08-15T18:16:20.883000
|
||||
CVE-2024-7641,0,0,31531d7ba6c4790873e3e2cbb5e0f029b43c16ba80a6eb72b0be87c407522388,2024-08-15T18:17:06.590000
|
||||
CVE-2024-7642,0,0,7529ae7f3e258c0bacf9321b53a5a8cb22d41a7a410253e46b217922db56c34d,2024-08-15T18:17:34.597000
|
||||
CVE-2024-7643,0,0,561f361e340de6652f3552e8a31740bd4d6ceba659a82983fde2458aeab94c1a,2024-08-15T18:18:22.827000
|
||||
CVE-2024-7644,0,0,af133dd73ba0f9ae2c852b6a18dbacddae25120427cf0e48515211be4d6d6b46,2024-08-15T18:19:11.080000
|
||||
CVE-2024-7645,0,0,5907fa67844d9e7166c08ec4cacd3d4b0081da6e8a85d6ebbe1b0401ec39e9c0,2024-08-15T17:43:58.627000
|
||||
CVE-2024-7648,0,0,8d0848f3c912d45507f2515d657c3145304e9beedf27145e13d7372b35504285,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7649,0,0,71a050c23b49b2bf89e78f71215149381b0d79d78392c26dd3fc2a8745df9a5b,2024-08-12T13:41:36.517000
|
||||
@ -260095,17 +260100,17 @@ CVE-2024-7661,0,0,fb8b7e61ebaacab9d71504bbbb5267d6837e683d49fbdb711d2e02f04662a1
|
||||
CVE-2024-7662,0,0,d449c4e04c3e7f00f5c0d8835d9ad3e59e9a73a9b2e853be04645c4f8895ffbb,2024-08-15T17:54:26.217000
|
||||
CVE-2024-7663,0,0,d3c4e012b4d672e569a299d353c685fb77c3652b8bbf0bc152ae248460d3e418,2024-08-15T17:56:43.847000
|
||||
CVE-2024-7664,0,0,f693ce60204eafc2cee48485c91b9d10da6fc37dbe3272f970cd4336f572651b,2024-08-15T17:57:57.097000
|
||||
CVE-2024-7665,0,1,82523df3d754efb6156b8e5eb79872ad303fa4d213d3b6f7e7f722b08fdc81b5,2024-08-15T18:00:13.487000
|
||||
CVE-2024-7666,0,1,f2b68bf84cf12b2e705532346f5fbf721aa3efb262803a62f88c0fa80fee64ad,2024-08-15T18:01:41.587000
|
||||
CVE-2024-7667,0,1,13abd3aa97c12513e674c572fc5b43340a56fdaed1eb7d49228ca6bc7d71fe38,2024-08-15T18:02:40.753000
|
||||
CVE-2024-7668,0,1,7fa4ff2ff2decc6801e955c109bbbe309fcdc48f3d34f4136c5c1f4e1d8b57e6,2024-08-15T18:03:27.230000
|
||||
CVE-2024-7669,0,1,1ab8d834092c7284d64294dd9869665d57807a9389d554f2c75360b402163967,2024-08-15T18:04:10.683000
|
||||
CVE-2024-7676,0,1,7817fdd5f2edbb492448eb9de4bc52ee9c1fd35a5b97e69f44935e966a3aaa34,2024-08-15T18:05:17.853000
|
||||
CVE-2024-7677,0,1,619a29b11672f1d6182de3fe0ed62cac67fac40890fa3659f2ed393ccafc6a23,2024-08-15T18:06:06.680000
|
||||
CVE-2024-7678,0,1,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f03181a,2024-08-15T18:06:54.127000
|
||||
CVE-2024-7680,0,1,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000
|
||||
CVE-2024-7681,0,1,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000
|
||||
CVE-2024-7682,0,1,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000
|
||||
CVE-2024-7665,0,0,82523df3d754efb6156b8e5eb79872ad303fa4d213d3b6f7e7f722b08fdc81b5,2024-08-15T18:00:13.487000
|
||||
CVE-2024-7666,0,0,f2b68bf84cf12b2e705532346f5fbf721aa3efb262803a62f88c0fa80fee64ad,2024-08-15T18:01:41.587000
|
||||
CVE-2024-7667,0,0,13abd3aa97c12513e674c572fc5b43340a56fdaed1eb7d49228ca6bc7d71fe38,2024-08-15T18:02:40.753000
|
||||
CVE-2024-7668,0,0,7fa4ff2ff2decc6801e955c109bbbe309fcdc48f3d34f4136c5c1f4e1d8b57e6,2024-08-15T18:03:27.230000
|
||||
CVE-2024-7669,0,0,1ab8d834092c7284d64294dd9869665d57807a9389d554f2c75360b402163967,2024-08-15T18:04:10.683000
|
||||
CVE-2024-7676,0,0,7817fdd5f2edbb492448eb9de4bc52ee9c1fd35a5b97e69f44935e966a3aaa34,2024-08-15T18:05:17.853000
|
||||
CVE-2024-7677,0,0,619a29b11672f1d6182de3fe0ed62cac67fac40890fa3659f2ed393ccafc6a23,2024-08-15T18:06:06.680000
|
||||
CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f03181a,2024-08-15T18:06:54.127000
|
||||
CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000
|
||||
CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000
|
||||
CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000
|
||||
CVE-2024-7683,0,0,184c8441aeee1399a10570eec1ae85db1a96dc4419787dd917127300fb23e226,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7684,0,0,1cd1616fd5cdfcc64d8f4101825657bd014c3a04c15343f65e565e9e5dd16b1f,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7685,0,0,02afd545542a50266d19d3efb9a8ba3b5320834a3ffad0cba2d2ebd3fb80a7d9,2024-08-12T13:41:36.517000
|
||||
@ -260161,3 +260166,8 @@ CVE-2024-7830,0,0,45175212ec7bdf20d19dd48afd4b20ecd81d3922aa2b6b23e80ca74b4822c2
|
||||
CVE-2024-7831,0,0,6b336f36e84f924efd73293c9c063709dd72cbe1db48e780f4be49ea64db2706,2024-08-15T16:15:25.957000
|
||||
CVE-2024-7832,0,0,00d2014761e47bd40d6e682a4ee12fe2eb058ba3b7621c75452dfb99e80b88e1,2024-08-15T17:34:07.033000
|
||||
CVE-2024-7833,0,0,41a645ce5af3bb29e8224b7a5935f3873d565966d12ccc5e0059eebfd7ee4d00,2024-08-15T17:34:07.033000
|
||||
CVE-2024-7838,1,1,c712dc588f45dde05958418e0db93c4d0a113dcbc2aed2850c5d20f660b89673,2024-08-15T20:15:18.457000
|
||||
CVE-2024-7839,1,1,74eedb667d5f5074a851b0a27ea50f1d8dc2517ed085e073c6a09e4486928282,2024-08-15T21:15:18.237000
|
||||
CVE-2024-7866,1,1,7b21c6eb36d73c92e1f7d8bb8574d36dfd6e1deee61d5ef7c7c7b7a0b352193c,2024-08-15T20:15:18.793000
|
||||
CVE-2024-7867,1,1,2c6807e6cda13329c05cc32828904aaff7f4fcd646d878acd15e994ea1a532df,2024-08-15T20:15:18.967000
|
||||
CVE-2024-7868,1,1,1270b7dc6c77cab6c2ea3d2de21860bb4fd556dbaed1521f53d18e8f28829e9b,2024-08-15T21:15:18.530000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user