mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-07-24T20:00:17.347984+00:00
This commit is contained in:
parent
fff4209c11
commit
190e1a4064
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-7857",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-04-14T04:59:00.273",
|
||||
"lastModified": "2021-01-26T12:33:24.523",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-24T18:06:58.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -86,8 +86,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.7.1",
|
||||
"matchCriteriaId": "AEEA3966-EA75-48BB-8D9C-3C834BA9CC8A"
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndExcluding": "2.8",
|
||||
"matchCriteriaId": "F2A965F0-BC5A-4267-9A1A-4FA55A76D390"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -107,6 +108,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/97680",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -115,17 +117,24 @@
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=759",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/201706-14",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-7858",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-04-14T04:59:00.307",
|
||||
"lastModified": "2021-01-26T12:33:24.523",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-24T18:06:39.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -107,6 +107,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/97682",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -115,17 +116,24 @@
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=738",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/201706-14",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48835",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:11.053",
|
||||
"lastModified": "2024-07-16T13:43:58.773",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T19:24:02.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,107 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: mpt3sas: Error de p\u00e1gina en respuesta q procesamiento Se encontr\u00f3 un error de p\u00e1gina en mpt3sas en una ruta de error de restablecimiento de LUN: [145.763216] mpt3sas_cm1: Error al cancelar la tarea: handle(0x0002) ,timeout(30) tr_method(0x0) smid(3) msix_index(0) [ 145.778932] scsi 1:0:0:0: cancelaci\u00f3n de tarea: FALLADO scmd(0x0000000024ba29a2) [ 145.817307] scsi 1:0:0:0: intentando reinicio del dispositivo! scmd(0x0000000024ba29a2) [ 145.827253] scsi 1:0:0:0: [sg1] etiqueta#2 CDB: Recibir diagn\u00f3stico 1c 01 01 ff fc 00 [ 145.837617] scsi target1:0:0: handle(0x0002), sas_address(0x500605b0 000272b9 ), phy(0) [ 145.848598] scsi target1:0:0: ID l\u00f3gico del gabinete (0x500605b0000272b8), slot(0) [ 149.858378] mpt3sas_cm1: sondear las colas de ReplyDescriptor para completar smid(0), task_type(0x05), handle( 0x0002) [149.875202] ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 00000007fffc445d [149.885617] #PF: acceso de lectura del supervisor en modo kernel [149.894346] #PF: error_code(0x0000) - p\u00e1gina no presente [149.903123] PGD 0 0 [ 149.909387] Ups: 0000 [#1] PREEMPT SMP NOPTI [ 149.917417] CPU: 24 PID: 3512 Comm: scsi_eh_1 Kdump: cargado Contaminado: GSO 5.10.89-altav-1 #1 [ 149.934327] Nombre de hardware: DDN 200NVX2 00NVX2 -MB, BIOS ATHG2.2.02.01 10/09/2021 [149.951871] RIP: 0010:_base_process_reply_queue+0x4b/0x900 [mpt3sas] [149.961889] C\u00f3digo: 0f 84 22 02 00 00 8d 48 01 89f 48 8d 57 38 f0 0f b1 4f 38 0f 85 d8 01 00 00 49 8b 45 10 45 31 e4 41 8b 55 0c 48 8d 1c d0 <0f> b6 03 83 e0 0f 3c 0f 0f 85 a2 00 00 00 e9 e6 01 00 0f b7 ee [ 149.991952] RSP: 0018:ffffc9000f1ebcb8 EFLAGS: 00010246 [ 150.000937] RAX: 0000000000000055 RBX: 00000007fffc445d RCX: 000000002548f071 [ 150.011841] RDX: 00000000ffff8881 RSI: 0000000000000001 RDI: ffff888125ed50d8 [ 150.022670] RBP: 0000000000000000 R08: 0000000000000000 R09 : c0000000ffff7fff [ 150.033445] R10: ffffc9000f1ebb68 R11: ffffc9000f1ebb60 R12: 0000000000000000 [ 150.044204] R13: ffff888125ed50d8 R14: 0000000000000080 R15: cdea80 [ 150.054963] FS: 0000000000000000(0000) GS:ffff88dfaf200000(0000) knlGS:00000000000000000 [ 150.066715] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 150.076078] CR2: 00000007fffc445d CR3: 000000012448a006 CR4: 0000000000770ee0 [ 150.086887] DR0: 0000000000 000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 150.097670] DR3: 0000000000000000 DR6: 00000000ffe0ff0 DR7: 0000000000000400 [ 150.10 8323] PKRU: 55555554 [ 150.114690] Llamar Seguimiento: [150.120497]? printk+0x48/0x4a [ 150.127049] mpt3sas_scsih_issue_tm.cold.114+0x2e/0x2b3 [mpt3sas] [ 150.136453] mpt3sas_scsih_issue_locked_tm+0x86/0xb0 [mpt3sas] [ 150.145759] sih_dev_reset+0xea/0x300 [mpt3sas] [ 150.153891] scsi_eh_ready_devs+0x541/0x9e0 [scsi_mod] [150.162206]? __scsi_host_match+0x20/0x20 [scsi_mod] [150.170406]? \u00bfscsi_try_target_reset+0x90/0x90 [scsi_mod] [150.178925]? blk_mq_tagset_busy_iter+0x45/0x60 [150.186638]? scsi_try_target_reset+0x90/0x90 [scsi_mod] [ 150.195087] scsi_error_handler+0x3a5/0x4a0 [scsi_mod] [ 150.203206] ? __programar+0x1e9/0x610 [ 150.209783] ? scsi_eh_get_sense+0x210/0x210 [scsi_mod] [ 150.217924] kthread+0x12e/0x150 [ 150.224041] ? kthread_worker_fn+0x130/0x130 [ 150.231206] ret_from_fork+0x1f/0x30 Esto se debe a que mpt3sas_base_sync_reply_irqs() utiliza un puntero de respuesta_q no v\u00e1lido fuera del bucle list_for_each_entry(). Al final del recorrido de la lista completa, el puntero no es v\u00e1lido. Mueva la llamada _base_process_reply_queue() dentro del bucle."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-763"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10",
|
||||
"versionEndExcluding": "5.10.108",
|
||||
"matchCriteriaId": "21098D82-BD47-4B56-B0F5-10205BFDC879"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.31",
|
||||
"matchCriteriaId": "F25C317E-A673-47D1-844E-171C9BFDF352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.17",
|
||||
"matchCriteriaId": "DC9A634D-C617-4F8C-ADEF-AF94CE69D687"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0cd2dd4bcf4abc812148c4943f966a3c8dccb00f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3916e33b917581e2b2086e856c291cb86ea98a05",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69ad4ef868c1fc7609daa235dfa46d28ba7a3ba3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/98e7a654a5bebaf1a28e987af5e44c002544a413",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48836",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:11.133",
|
||||
"lastModified": "2024-07-16T13:43:58.773",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T18:32:13.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Entrada: aiptek: verifique correctamente el tipo de endpoint Syzbot inform\u00f3 una advertencia en usb_submit_urb() que se debe a un tipo de endpoint incorrecto. Se verific\u00f3 la cantidad de endpoints, pero no el tipo de endpoint. Solucionarlo reemplazando la antigua comprobaci\u00f3n desc.bNumEndpoints con el asistente usb_find_common_endpoints() para encontrar endpoints Registro de errores: usb 5-1: BOGUS urb xfer, tuber\u00eda 1! = tipo 3 ADVERTENCIA: CPU: 2 PID: 48 en drivers/usb/core/ urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 M\u00f3dulos vinculados en: CPU: 2 PID: 48 Comm: kworker/2:2 No contaminado 5.17.0-rc6-syzkaller-00226- g07ebd38a0da2 #0 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 01/04/2014 Cola de trabajo: usb_hub_wq hub_event ... Seguimiento de llamadas: aiptek_open+0xd5/0x130 drivers/input/ tableta/aiptek.c:830 input_open_device+0x1bb/0x320 controladores/input/input.c:629 kbd_connect+0xfe/0x160 controladores/tty/vt/keyboard.c:1593"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4",
|
||||
"versionEndExcluding": "4.9.308",
|
||||
"matchCriteriaId": "95BAE078-A259-4798-9659-B68D181D29F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.273",
|
||||
"matchCriteriaId": "A1E9CE4F-B0EA-4F88-9562-4F113E598085"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.236",
|
||||
"matchCriteriaId": "09979837-E01F-4E28-B943-9F680CA3D278"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.187",
|
||||
"matchCriteriaId": "D9FFB805-4ED2-4FAE-9EF4-8AB4BC9D8F5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.108",
|
||||
"matchCriteriaId": "24925527-AC4A-4594-8D6C-3B34D31862C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.31",
|
||||
"matchCriteriaId": "F25C317E-A673-47D1-844E-171C9BFDF352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.17",
|
||||
"matchCriteriaId": "DC9A634D-C617-4F8C-ADEF-AF94CE69D687"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48838",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:11.280",
|
||||
"lastModified": "2024-07-16T13:43:58.773",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T18:43:27.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,159 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: corrige el error de use-after-free al no configurar udc->dev.driver El syzbot fuzzer encontr\u00f3 un error de use-after-free: ERROR: KASAN: uso- after-free en dev_uevent+0x712/0x780 drivers/base/core.c:2320 Lectura de tama\u00f1o 8 en addr ffff88802b934098 por tarea udevd/3689 CPU: 2 PID: 3689 Comm: udevd Not tainted 5.17.0-rc4-syzkaller-00229 -g4f12b742eb2b #0 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.14.0-2 01/04/2014 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0xcd/ 0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255 __kasan_report mm/kasan/report.c:442 [en l\u00ednea] kasan_report.cold+0x83/0xdf mm/ kasan/report.c:459 dev_uevent+0x712/0x780 drivers/base/core.c:2320 uevent_show+0x1b8/0x380 drivers/base/core.c:2391 dev_attr_show+0x4b/0x90 drivers/base/core.c:2094 Aunque El error se manifest\u00f3 en el n\u00facleo del controlador, la verdadera causa fue una ejecuci\u00f3n con el n\u00facleo del dispositivo. dev_uevent() hace: if (dev->driver) add_uevent_var(env, \"DRIVER=%s\", dev->driver->name); y entre la prueba y la desreferencia de dev->driver, el n\u00facleo del gadget establece dev->driver en NULL. La ejecuci\u00f3n no ocurrir\u00eda si el n\u00facleo del dispositivo registrara sus dispositivos en un autob\u00fas real, utilizando las t\u00e9cnicas de sincronizaci\u00f3n est\u00e1ndar del n\u00facleo del conductor. Sin embargo, no es necesario realizar un cambio tan grande para corregir este error; todo lo que tenemos que hacer es asegurarnos de que udc->dev.driver sea siempre NULL. De hecho, no hay ninguna raz\u00f3n para que udc->dev.driver se establezca en alg\u00fan momento, y mucho menos en el valor que obtiene actualmente: la direcci\u00f3n del controlador del dispositivo. Despu\u00e9s de todo, un controlador de dispositivo s\u00f3lo sabe c\u00f3mo administrar un dispositivo, no c\u00f3mo administrar un UDC. Este parche simplemente elimina las declaraciones en el n\u00facleo del gadget que tocan udc->dev.driver."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.1",
|
||||
"versionEndExcluding": "4.9.308",
|
||||
"matchCriteriaId": "6B0F08D1-9BA3-4198-9925-28CA83858D6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.273",
|
||||
"matchCriteriaId": "A1E9CE4F-B0EA-4F88-9562-4F113E598085"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.236",
|
||||
"matchCriteriaId": "09979837-E01F-4E28-B943-9F680CA3D278"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.187",
|
||||
"matchCriteriaId": "D9FFB805-4ED2-4FAE-9EF4-8AB4BC9D8F5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.108",
|
||||
"matchCriteriaId": "24925527-AC4A-4594-8D6C-3B34D31862C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.31",
|
||||
"matchCriteriaId": "F25C317E-A673-47D1-844E-171C9BFDF352"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.17",
|
||||
"matchCriteriaId": "DC9A634D-C617-4F8C-ADEF-AF94CE69D687"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/00bdd9bf1ac6d401ad926d3d8df41b9f1399f646",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/16b1941eac2bd499f065a6739a40ce0011a3d740",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2015c23610cd0efadaeca4d3a8d1dae9a45aa35a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2282a6eb6d4e118e294e43dcc421e0e0fe4040b5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/27d64436984fb8835a8b7e95993193cc478b162e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4325124dde6726267813c736fee61226f1d38f0b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/609a7119bffe3ddd7c93f2fa65be8917e02a0b7e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e2d3a7009e505e120805f449c832942660f3f7f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48843",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:11.650",
|
||||
"lastModified": "2024-07-16T13:43:58.773",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T18:25:11.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,116 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/vrr: establezca la propiedad con capacidad de VRR solo si est\u00e1 conectada al conector. La propiedad con capacidad de VRR no est\u00e1 conectada de manera predeterminada al conector. Se conecta solo si se admite VRR. Entonces, si el controlador intenta llamar a la funci\u00f3n drm core set prop sin que est\u00e9 adjunta, eso causa una desreferencia NULL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.186",
|
||||
"matchCriteriaId": "28FAD0CF-DA8C-481E-B208-7F00220C8838"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.107",
|
||||
"matchCriteriaId": "295C9D5D-520B-4D0F-A53A-7C514F05B3D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.30",
|
||||
"matchCriteriaId": "F1745C4F-8278-4F2E-9239-53C59154A03D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.16",
|
||||
"matchCriteriaId": "EDF25425-C006-411E-B842-0F12075B8C13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0ba557d330946c23559aaea2d51ea649fdeca98a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3534c5c005ef99a1804ed50b8a72cdae254cabb5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/62929726ef0ec72cbbe9440c5d125d4278b99894",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/85271e92ae4f13aa679acaa6cf76b3c36bcb7bab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/941e8bcd2b2ba95490738e33dfeca27168452779",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48844",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:11.733",
|
||||
"lastModified": "2024-07-16T13:43:58.773",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T18:24:04.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,88 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: hci_core: corrige la fuga de sent_cmd skb La memoria sent_cmd no se libera antes de liberar hci_dev, lo que provoca que se filtre su contenido."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.15.30",
|
||||
"matchCriteriaId": "B4DCE220-813A-4393-8BEF-C705DCD12175"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.16",
|
||||
"matchCriteriaId": "EDF25425-C006-411E-B842-0F12075B8C13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3679ccc09d8806686d579095ed504e045af7f7d6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9473d06bd1c8da49eafb685aa95a290290c672dd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd3b1dc3dd050f1f47cd13e300732852414270f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48845",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:11.803",
|
||||
"lastModified": "2024-07-16T13:43:58.773",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-07-24T19:19:41.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,158 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: MIPS: smp: complete los mapas de hermanos y n\u00facleos antes Despu\u00e9s de habilitar CONFIG_SCHED_CORE (aterrizado durante el ciclo 5.14), se inici\u00f3 interAptiv de 2 n\u00facleos y 2 subprocesos por n\u00facleo (controlado por CPS) emitiendo lo siguiente: [0.025698] La revisi\u00f3n de CPU1 es: 0001a120 (MIPS interAptiv (multi)) [0.048183] ------------[ cortar aqu\u00ed ]------------ [0.048187] ADVERTENCIA: CPU: 1 PID: 0 en kernel/sched/core.c:6025 sched_core_cpu_starting+0x198/0x240 [0.048220] M\u00f3dulos vinculados en: [0.048233] CPU: 1 PID: 0 Comm: swapper/1 No contaminado 5.17 .0-rc3+ #35 b7b319f24073fd9a3c2aa7ad15fb7993eec0b26f [0.048247] Pila: 817f0000 00000004 327804c8 810eb050 00000000 00000004 00000000 c314fdd1 [ 0.048278] 830cbd64 819c0000 81800000 817f0000 83070bf4 00000001 830cbd08 00000000 [ 0.048307] 00000000 00000000 815fcbc 4 00000000 00000000 00000000 00000000 00000000 [ 0,048334] 00000000 00000000 00000000 00000000 817f0000 00000000 00000000 817f6f34 [ 0.048361] 817f0000 818a3c00 817f0000 00000004 00000000 00000000 4dc33260 0018c933 [ 0.048389] ... 0.048396] Seguimiento de llamadas: [ 0.048399] [<8105a7bc>] show_stack+0x3c/0x140 [ 0.048424] [<8131c2a0>] dump_stack_lvl+0x60 /0x80 [ 0.048440] [<8108b5c0>] __warn+0xc0/0xf4 [ 0.048454] [<8108b658>] warn_slowpath_fmt+0x64/0x10c [ 0.048467] [<810bd418>] 198/0x240 [ 0.048483] [<810c6514>] sched_cpu_starting +0x14/0x80 [ 0.048497] [<8108c0f8>] cpuhp_invoke_callback_range+0x78/0x140 [ 0.048510] [<8108d914>] notify_cpu_starting+0x94/0x140 [ 0.048523] [<8106593c>] _secundario+0xbc/0x280 [ 0,048539] [ 0,048543] - --[ end trace 0000000000000000 ]--- [ 0.048636] Sincronizar contadores para CPU 1: hecho. ...para cada uno menos CPU 0/arranque. Las impresiones de depuraci\u00f3n b\u00e1sicas justo antes de la l\u00ednea mencionada dicen: [0.048170] CPU: 1, smt_mask: Entonces smt_mask, que obviamente es una m\u00e1scara hermana, est\u00e1 vac\u00eda al ingresar a la funci\u00f3n. Esto es cr\u00edtico, ya que sched_core_cpu_starting() calcula los par\u00e1metros de programaci\u00f3n central solo una vez por inicio de CPU, y es crucial tener todos los par\u00e1metros completados en ese momento (al menos usa cpu_smt_mask() que de hecho es `&cpu_sibling_map[cpu]` en MIPS). Un poco de depuraci\u00f3n me llev\u00f3 a que set_cpu_sibling_map() realizaba el c\u00e1lculo del mapa real, se invocaba despu\u00e9s de notify_cpu_start(), y exactamente la \u00faltima funci\u00f3n inicia la ronda de devoluci\u00f3n de llamada de CPU HP (sched_core_cpu_starting() es b\u00e1sicamente una devoluci\u00f3n de llamada de CPU HP). Si bien el flujo es el mismo en ARM64 (mapas despu\u00e9s del notificador, aunque antes de llamar a set_cpu_online()), x86 comenz\u00f3 a calcular mapas de hermanos antes de iniciar las devoluciones de llamada de CPU HP en Linux 4.14 (consulte [0] para la referencia). Ni yo ni mis breves pruebas pudimos encontrar posibles advertencias al calcular los mapas justo despu\u00e9s de realizar la calibraci\u00f3n de retraso, pero el s\u00edmbolo WARN ya no est\u00e1. Las mismas impresiones de depuraci\u00f3n ahora producen exactamente lo que esperaba de ellas: [0.048433] CPU: 1, smt_mask: 0-1 [0] https://git.kernel.org/pub/scm/linux/kernel/git/mips /linux.git/commit/?id=76ce7cfe35ef"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.9.308",
|
||||
"matchCriteriaId": "0B50CF0F-1EB6-46C4-AFBA-C5492AC849BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.273",
|
||||
"matchCriteriaId": "A1E9CE4F-B0EA-4F88-9562-4F113E598085"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.236",
|
||||
"matchCriteriaId": "09979837-E01F-4E28-B943-9F680CA3D278"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.186",
|
||||
"matchCriteriaId": "F5FC3779-EA15-49D0-A021-B9224F651B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.107",
|
||||
"matchCriteriaId": "295C9D5D-520B-4D0F-A53A-7C514F05B3D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.30",
|
||||
"matchCriteriaId": "F1745C4F-8278-4F2E-9239-53C59154A03D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "5.16.16",
|
||||
"matchCriteriaId": "EDF25425-C006-411E-B842-0F12075B8C13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/32813321f18d5432cec1b1a6ecc964f9ea26d565",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/56eaacb8137ba2071ce48d4e3d91979270e139a7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7315f8538db009605ffba00370678142ef00ac98",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/94647aec80d03d6914aa664b7b8e103cd9d63239",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be538b764a46be1d0700fd3b6e82fb76bd17f13a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c2420bc3333111184cdcb112282d13afe1338dd7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e8ad9ecc406974deb5e7c070f51cc1d09d21dc4b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f2703def339c793674010cc9f01bfe4980231808",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2024/CVE-2024-216xx/CVE-2024-21684.json
Normal file
44
CVE-2024/CVE-2024-216xx/CVE-2024-21684.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-21684",
|
||||
"sourceIdentifier": "security@atlassian.com",
|
||||
"published": "2024-07-24T18:15:03.793",
|
||||
"lastModified": "2024-07-24T18:15:03.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a low severity open redirect vulnerability within affected versions of Bitbucket Data Center. Versions of Bitbucket DC from 8.0.0 to 8.9.12 and 8.19.0 to 8.19.1 are affected by this vulnerability. It is patched in 8.9.13 and 8.19.2.\n\nThis open redirect vulnerability, with a CVSS Score of 3.1 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N, allows an unauthenticated attacker to redirect a victim user upon login to Bitbucket Data Center to any arbitrary site which can be utilized for further exploitation which has low impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction.\n\nAtlassian recommends that Bitbucket Data Center customers upgrade to the version. If you are unable to do so, upgrade your instance to one of the supported fixed versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@atlassian.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.atlassian.com/browse/BSERV-19454",
|
||||
"source": "security@atlassian.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-365xx/CVE-2024-36536.json
Normal file
21
CVE-2024/CVE-2024-365xx/CVE-2024-36536.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-36536",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.293",
|
||||
"lastModified": "2024-07-24T19:15:04.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in fabedge v0.8.1 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/HouqiyuA/381f100f2ba82a8ada03994aac5bb2e8",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-365xx/CVE-2024-36537.json
Normal file
21
CVE-2024/CVE-2024-365xx/CVE-2024-36537.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-36537",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.373",
|
||||
"lastModified": "2024-07-24T19:15:04.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in cert-manager v1.14.4 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/HouqiyuA/27879a6366a65fcd5f6c6fcbcf68d8e3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-365xx/CVE-2024-36538.json
Normal file
21
CVE-2024/CVE-2024-365xx/CVE-2024-36538.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-36538",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.487",
|
||||
"lastModified": "2024-07-24T19:15:04.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in chaos-mesh v2.6.3 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/HouqiyuA/f06d1fa07b5287b862c1e0b288f301e5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-375xx/CVE-2024-37533.json
Normal file
60
CVE-2024/CVE-2024-375xx/CVE-2024-37533.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-37533",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-24T18:15:04.690",
|
||||
"lastModified": "2024-07-24T18:15:04.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM InfoSphere Information Server 11.7 could disclose sensitive user information to another user with physical access to the machine. IBM X-Force ID: 294727."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-359"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294727",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7159173",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39494",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:12.113",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T19:17:25.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ima: corrige el use-after-free en dentry dname.name ->d_name.name puede cambiar al cambiar el nombre y el valor anterior se puede liberar; existen condiciones suficientes para estabilizarlo (->d_lock on dentry, ->d_lock on its parent, ->i_rwsem exclusivo en el inodo del padre, rename_lock), pero ninguna de ellas se cumple en ninguno de los sitios. En su lugar, tome una instant\u00e1nea estable del nombre."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.97",
|
||||
"matchCriteriaId": "11DA4D7A-BB0A-4555-8D1D-ECCC5108F772"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7fb374981e31c193b1152ed8d3b0a95b671330d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a78a6f0da57d058e2009e9958fdcef66f165208c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/be84f32bb2c981ca670922e047cdde1488b233de",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd431c3ac1fc34a9268580dd59ad3e3c76b32a8c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39495",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:12.183",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T19:04:38.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,144 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: greybus: corrigi\u00f3 el error de use-after-free en gb_interface_release debido a la condici\u00f3n de ejecuci\u00f3n. En gb_interface_create, &intf->mode_switch_completion est\u00e1 vinculado con gb_interface_mode_switch_work. Luego lo iniciar\u00e1 gb_interface_request_mode_switch. Aqu\u00ed est\u00e1 el c\u00f3digo relevante. if (!queue_work(system_long_wq, &intf->mode_switch_work)) { ... } Si llamamos a gb_interface_release para realizar la limpieza, es posible que haya un trabajo sin terminar. Esta funci\u00f3n llamar\u00e1 a kfree para liberar el objeto \"intf\". Sin embargo, si gb_interface_mode_switch_work est\u00e1 programado para ejecutarse despu\u00e9s de kfree, puede causar un error de use-after-free ya que gb_interface_mode_switch_work usar\u00e1 el objeto \"intf\". El posible flujo de ejecuci\u00f3n que puede provocar el problema es el siguiente: CPU0 CPU1 | gb_interface_create | gb_interface_request_mode_switch gb_interface_release | kfree(intf) (gratis) | | gb_interface_mode_switch_work | mutex_lock(&intf->mutex) (uso) Solucionarlo cancelando el trabajo antes de kfree."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "5EBA530D-458E-447C-8744-13D4429CCC4A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/03ea2b129344152157418929f06726989efc0445",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0b8fba38bdfb848fac52e71270b2aa3538c996ea",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2b6bb0b4abfd79b8698ee161bb73c0936a2aaf83",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c9c5d7f26acc2c669c1dcf57d1bb43ee99220ce",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/74cd0a421896b2e07eafe7da4275302bfecef201",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a733d69a4a59c2d08620e6589d823c24be773dc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fb071f5c75d4b1c177824de74ee75f9dd34123b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39496",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:12.253",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T19:02:36.660",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,102 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs:zoned: corrige el use-after-free debido a la ejecuci\u00f3n con el reemplazo de desarrollo. Mientras cargamos la informaci\u00f3n de una zona durante la creaci\u00f3n de un grupo de bloques, podemos ejecutar una operaci\u00f3n de reemplazo de dispositivo y luego activar un use-after-free en el dispositivo que acaba de ser reemplazado (dispositivo fuente de la operaci\u00f3n de reemplazo). Esto sucede porque en btrfs_load_zone_info() extraemos un dispositivo del mapa de fragmentos en una variable local y luego usamos el dispositivo mientras no est\u00e1 bajo la protecci\u00f3n del dispositivo y reemplazamos rwsem. Entonces, si se produce una operaci\u00f3n de reemplazo de dispositivo cuando extraemos el dispositivo y ese dispositivo es la fuente de la operaci\u00f3n de reemplazo, activaremos un use-after-free si antes de terminar de usar el dispositivo la operaci\u00f3n de reemplazo finaliza y libera el dispositivo. Solucione este problema ampliando la secci\u00f3n cr\u00edtica bajo la protecci\u00f3n del dispositivo y reemplace rwsem para que todos los usos del dispositivo se realicen dentro de la secci\u00f3n cr\u00edtica."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "19A7A2F1-5F51-4897-8BF3-5079D28CBE9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0090d6e1b210551e63cf43958dc7a1ec942cdde9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/092571ef9a812566c8f2c9038d9c2a64c49788d6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/17765964703b88d8befd899f8501150bb7e07e43",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a0cc006f4214b87e70983c692e05bb36c59b5752",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-401xx/CVE-2024-40137.json
Normal file
21
CVE-2024/CVE-2024-401xx/CVE-2024-40137.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-40137",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.637",
|
||||
"lastModified": "2024-07-24T19:15:04.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dolibarr ERP CRM before 19.0.2-php8.2 was discovered to contain a remote code execution (RCE) vulnerability via the Computed field parameter under the Users Module Setup function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-40137",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-404xx/CVE-2024-40495.json
Normal file
29
CVE-2024/CVE-2024-404xx/CVE-2024-40495.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-40495",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-24T19:15:04.693",
|
||||
"lastModified": "2024-07-24T19:15:04.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was discovered in Linksys Router E2500 with firmware 2.0.00, allows authenticated attackers to execute arbitrary code via the hnd_parentalctrl_unblock function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://e2500.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://linksys.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/iotaMing/IOT-CVE/blob/master/Linksys/CVE-2024-40495/CVE-2024-40495.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40902",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:13.583",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T18:52:23.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,173 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: jfs: xattr: corrige el desbordamiento del b\u00fafer para xattr no v\u00e1lido Cuando un tama\u00f1o de xattr no es el esperado, se imprime en el registro del kernel en formato hexadecimal como una forma de depuraci\u00f3n. Pero cuando el tama\u00f1o de xattr es mayor que el tama\u00f1o esperado, imprimirlo puede provocar un acceso desde el final del b\u00fafer. Solucione todo esto restringiendo adecuadamente el tama\u00f1o del volcado hexadecimal de depuraci\u00f3n en el registro del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.317",
|
||||
"matchCriteriaId": "AD25C2E5-C116-4160-BA6D-CE9B0D10AE3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.279",
|
||||
"matchCriteriaId": "F4E38E58-1B9F-4DF2-AD3D-A8BEAA2959D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.221",
|
||||
"matchCriteriaId": "659E1520-6345-41AF-B893-A7C0647585A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.162",
|
||||
"matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "D435765D-2766-44F5-B319-F713A13E35CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "6F019D15-84C0-416B-8C57-7F51B68992F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "0ABBBA1D-F79D-4BDB-AA41-D1EDCC4A6975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40903",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-12T13:15:13.660",
|
||||
"lastModified": "2024-07-12T16:34:58.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T19:01:54.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,118 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: tcpm: arreglar el caso de use-after-free en tcpm_register_source_caps Podr\u00eda haber un posible caso de use-after-free en tcpm_register_source_caps(). Esto podr\u00eda suceder cuando: * se anuncian l\u00edmites de fuente nuevos (por ejemplo, no v\u00e1lidos) * los l\u00edmites de fuente existentes no est\u00e1n registrados * tcpm_register_source_caps() devuelve un error ya que usb_power_delivery_register_capabilities() falla Esto hace que port->partner_source_caps conserve los l\u00edmites de fuente ahora liberados. Restablezca el valor de puerto->partner_source_caps a NULL despu\u00e9s de cancelar el registro de los l\u00edmites de origen existentes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.61",
|
||||
"versionEndExcluding": "6.1.95",
|
||||
"matchCriteriaId": "84374DE2-3256-4B28-905E-BCB7407CE7DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.31",
|
||||
"versionEndExcluding": "6.6.35",
|
||||
"matchCriteriaId": "3775F39F-C7DC-42FB-9E42-7C07CD017B48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.9",
|
||||
"versionEndExcluding": "6.9.6",
|
||||
"matchCriteriaId": "A2E0E6CD-2DC0-4E5C-9037-9A023960B2F9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/04c05d50fa79a41582f7bde8a1fd4377ae4a39e5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4053696594d7235f3638d49a00cf0f289e4b36a3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6b67b652849faf108a09647c7fde9b179ef24e2b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e7e921918d905544500ca7a95889f898121ba886",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-416xx/CVE-2024-41666.json
Normal file
72
CVE-2024/CVE-2024-416xx/CVE-2024-41666.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-41666",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T18:15:05.090",
|
||||
"lastModified": "2024-07-24T18:15:05.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD has a Web-based terminal that allows users to get a shell inside a running pod, just as they would with kubectl exec. Starting in version 2.6.0, when the administrator enables this function and grants permission to the user `p, role:myrole, exec, create, */*, allow`, even if the user revokes this permission, the user can still perform operations in the container, as long as the user keeps the terminal view open for a long time. Although the token expiration and revocation of the user are fixed, however, the fix does not address the situation of revocation of only user `p, role:myrole, exec, create, */*, allow` permissions, which may still lead to the leakage of sensitive information. A patch for this vulnerability has been released in Argo CD versions 2.11.7, 2.10.16, and 2.9.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1Fynj5Sho8Lf8CETqsNXZyPKlTDdmgJuN/view?usp=sharing",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-cd/commit/05edb2a9ca48f0f10608c1b49fbb0cf7164f6476",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-cd/commit/e96f32d233504101ddac028a5bf8117433d333d6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-cd/commit/ef535230d8bd8ad7b18aab1ea1063e9751d348c4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-v8wx-v5jq-qhhw",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-416xx/CVE-2024-41667.json
Normal file
60
CVE-2024/CVE-2024-416xx/CVE-2024-41667.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-41667",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T18:15:05.310",
|
||||
"lastModified": "2024-07-24T18:15:05.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default PingOne Advanced Identity Cloud login page,they did not restrict the `CustomLoginUrlTemplate`, allowing it to be set freely. Commit fcb8432aa77d5b2e147624fe954cb150c568e0b8 introduces `TemplateClassResolver.SAFER_RESOLVER` to disable the resolution of commonly exploited classes in FreeMarker template injection. As of time of publication, this fix is expected to be part of version 15.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenIdentityPlatform/OpenAM/commit/fcb8432aa77d5b2e147624fe954cb150c568e0b8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenIdentityPlatform/OpenAM/security/advisories/GHSA-7726-43hg-m23v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-416xx/CVE-2024-41672.json
Normal file
64
CVE-2024/CVE-2024-416xx/CVE-2024-41672.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-41672",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T18:15:05.527",
|
||||
"lastModified": "2024-07-24T18:15:05.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DuckDB is a SQL database management system. In versions 1.0.0 and prior, content in filesystem is accessible for reading using `sniff_csv`, even with `enable_external_access=false`. This vulnerability provides an attacker with access to filesystem even when access is expected to be disabled and other similar functions do NOT provide access. There seem to be two vectors to this vulnerability. First, access to files that should otherwise not be allowed. Second, the content from a file can be read (e.g. `/etc/hosts`, `proc/self/environ`, etc) even though that doesn't seem to be the intent of the sniff_csv function. A fix for this issue is available in commit c9b7c98aa0e1cd7363fe8bb8543a95f38e980d8a and is expected to be part of version 1.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/duckdb/duckdb/commit/c9b7c98aa0e1cd7363fe8bb8543a95f38e980d8a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/duckdb/duckdb/pull/13133",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4459",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-06T04:15:12.717",
|
||||
"lastModified": "2024-06-06T14:17:35.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T18:00:21.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -39,14 +59,50 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themesflat:themesflat_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.3",
|
||||
"matchCriteriaId": "362E549B-7B0C-41CF-A7C7-1DB047A2748D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-simple-slide.php#L1117",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce7c2f30-188a-4ae7-976f-c7f0aaf96eee?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4753",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:04.190",
|
||||
"lastModified": "2024-07-12T12:49:07.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T19:53:04.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "El complemento de WordPress WP Secure Maintenance anterior a 1.7 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpexperts:wp_secure_maintenance:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7",
|
||||
"matchCriteriaId": "D91FBA38-8B88-42FC-AF95-BB3C4ECE5544"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/81725b17-532a-43e6-8ce5-fe50a2ed0819/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5626",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:04.420",
|
||||
"lastModified": "2024-07-12T12:49:07.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T19:52:09.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "El complemento Inline Related Posts para WordPress anterior a 3.7.0 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:data443:inline_related_posts:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.7.0",
|
||||
"matchCriteriaId": "08239D28-8BD0-40A7-AEE4-02685AEE0233"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6b03f450-4982-4f6c-a6f1-f7e85b1deec1/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5811",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-12T06:15:04.670",
|
||||
"lastModified": "2024-07-12T12:49:07.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-07-24T19:41:17.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,68 @@
|
||||
"value": "El complemento Simple Video Directory para WordPress anterior a 1.4.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a los contribuyentes y superiores realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:quantumcloud:simple_video_directory:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.4",
|
||||
"matchCriteriaId": "938F5A18-D08C-4D71-A362-8345281E0753"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bf6c2e28-51ef-443b-b1c2-d555c7e12f7f/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6387",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-01T13:15:06.467",
|
||||
"lastModified": "2024-07-23T22:15:09.313",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-07-24T18:07:19.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -110,11 +110,6 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7945F60B-460E-4CA6-9EB4-BEE663386D50"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BF2C0441-653D-4BD3-A45D-D97C929A596F"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -454,130 +449,193 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/12",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/13",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/02/1",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/1",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/11",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/2",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/3",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/4",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/5",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/04/1",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/04/2",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/08/2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/08/3",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/5",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/1",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/2",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/3",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/4",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/6",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/1",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/3",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/23/4",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/07/23/6",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4312",
|
||||
@ -588,27 +646,45 @@
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4340",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4389",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4469",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4474",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4479",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4484",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-6387",
|
||||
@ -644,7 +720,8 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -656,7 +733,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
|
||||
@ -669,53 +749,63 @@
|
||||
"url": "https://github.com/AlmaLinux/updates/issues/629",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Azure/AKS/issues/4379",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/microsoft/azurelinux/issues/9555",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/oracle/oracle-linux/issues/149",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rapier1/hpn-ssh/issues/87",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -727,7 +817,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
|
||||
@ -742,7 +836,8 @@
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -750,7 +845,8 @@
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -804,11 +900,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
|
||||
@ -821,7 +923,8 @@
|
||||
"url": "https://www.openssh.com/txt/release-9.8",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
"Release Notes",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -834,7 +937,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.suse.com/security/cve/CVE-2024-6387.html",
|
||||
|
74
README.md
74
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-24T18:00:18.596058+00:00
|
||||
2024-07-24T20:00:17.347984+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-24T17:59:54.607000+00:00
|
||||
2024-07-24T19:53:04.617000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,55 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
257906
|
||||
257916
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2024-22444](CVE-2024/CVE-2024-224xx/CVE-2024-22444.json) (`2024-07-24T16:15:06.220`)
|
||||
- [CVE-2024-31970](CVE-2024/CVE-2024-319xx/CVE-2024-31970.json) (`2024-07-24T16:15:06.600`)
|
||||
- [CVE-2024-36539](CVE-2024/CVE-2024-365xx/CVE-2024-36539.json) (`2024-07-24T17:15:10.767`)
|
||||
- [CVE-2024-36540](CVE-2024/CVE-2024-365xx/CVE-2024-36540.json) (`2024-07-24T17:15:10.827`)
|
||||
- [CVE-2024-36541](CVE-2024/CVE-2024-365xx/CVE-2024-36541.json) (`2024-07-24T16:15:06.870`)
|
||||
- [CVE-2024-40422](CVE-2024/CVE-2024-404xx/CVE-2024-40422.json) (`2024-07-24T16:15:07.087`)
|
||||
- [CVE-2024-40575](CVE-2024/CVE-2024-405xx/CVE-2024-40575.json) (`2024-07-24T16:15:07.150`)
|
||||
- [CVE-2024-41110](CVE-2024/CVE-2024-411xx/CVE-2024-41110.json) (`2024-07-24T17:15:11.053`)
|
||||
- [CVE-2024-41662](CVE-2024/CVE-2024-416xx/CVE-2024-41662.json) (`2024-07-24T17:15:11.310`)
|
||||
- [CVE-2024-7069](CVE-2024/CVE-2024-70xx/CVE-2024-7069.json) (`2024-07-24T16:15:07.357`)
|
||||
- [CVE-2024-7079](CVE-2024/CVE-2024-70xx/CVE-2024-7079.json) (`2024-07-24T16:15:07.613`)
|
||||
- [CVE-2024-21684](CVE-2024/CVE-2024-216xx/CVE-2024-21684.json) (`2024-07-24T18:15:03.793`)
|
||||
- [CVE-2024-36536](CVE-2024/CVE-2024-365xx/CVE-2024-36536.json) (`2024-07-24T19:15:04.293`)
|
||||
- [CVE-2024-36537](CVE-2024/CVE-2024-365xx/CVE-2024-36537.json) (`2024-07-24T19:15:04.373`)
|
||||
- [CVE-2024-36538](CVE-2024/CVE-2024-365xx/CVE-2024-36538.json) (`2024-07-24T19:15:04.487`)
|
||||
- [CVE-2024-37533](CVE-2024/CVE-2024-375xx/CVE-2024-37533.json) (`2024-07-24T18:15:04.690`)
|
||||
- [CVE-2024-40137](CVE-2024/CVE-2024-401xx/CVE-2024-40137.json) (`2024-07-24T19:15:04.637`)
|
||||
- [CVE-2024-40495](CVE-2024/CVE-2024-404xx/CVE-2024-40495.json) (`2024-07-24T19:15:04.693`)
|
||||
- [CVE-2024-41666](CVE-2024/CVE-2024-416xx/CVE-2024-41666.json) (`2024-07-24T18:15:05.090`)
|
||||
- [CVE-2024-41667](CVE-2024/CVE-2024-416xx/CVE-2024-41667.json) (`2024-07-24T18:15:05.310`)
|
||||
- [CVE-2024-41672](CVE-2024/CVE-2024-416xx/CVE-2024-41672.json) (`2024-07-24T18:15:05.527`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `95`
|
||||
Recently modified CVEs: `18`
|
||||
|
||||
- [CVE-2024-31971](CVE-2024/CVE-2024-319xx/CVE-2024-31971.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-31977](CVE-2024/CVE-2024-319xx/CVE-2024-31977.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-37386](CVE-2024/CVE-2024-373xx/CVE-2024-37386.json) (`2024-07-24T16:15:06.970`)
|
||||
- [CVE-2024-38526](CVE-2024/CVE-2024-385xx/CVE-2024-38526.json) (`2024-07-24T17:15:10.910`)
|
||||
- [CVE-2024-3896](CVE-2024/CVE-2024-38xx/CVE-2024-3896.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-39345](CVE-2024/CVE-2024-393xx/CVE-2024-39345.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-41914](CVE-2024/CVE-2024-419xx/CVE-2024-41914.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-4608](CVE-2024/CVE-2024-46xx/CVE-2024-4608.json) (`2024-07-24T17:59:54.607`)
|
||||
- [CVE-2024-4707](CVE-2024/CVE-2024-47xx/CVE-2024-4707.json) (`2024-07-24T17:59:29.230`)
|
||||
- [CVE-2024-5141](CVE-2024/CVE-2024-51xx/CVE-2024-5141.json) (`2024-07-24T17:58:54.867`)
|
||||
- [CVE-2024-5152](CVE-2024/CVE-2024-51xx/CVE-2024-5152.json) (`2024-07-24T17:58:12.617`)
|
||||
- [CVE-2024-5153](CVE-2024/CVE-2024-51xx/CVE-2024-5153.json) (`2024-07-24T17:56:55.923`)
|
||||
- [CVE-2024-5161](CVE-2024/CVE-2024-51xx/CVE-2024-5161.json) (`2024-07-24T17:54:42.387`)
|
||||
- [CVE-2024-5162](CVE-2024/CVE-2024-51xx/CVE-2024-5162.json) (`2024-07-24T17:53:33.277`)
|
||||
- [CVE-2024-5324](CVE-2024/CVE-2024-53xx/CVE-2024-5324.json) (`2024-07-24T17:42:49.020`)
|
||||
- [CVE-2024-5449](CVE-2024/CVE-2024-54xx/CVE-2024-5449.json) (`2024-07-24T17:47:44.637`)
|
||||
- [CVE-2024-5818](CVE-2024/CVE-2024-58xx/CVE-2024-5818.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-6096](CVE-2024/CVE-2024-60xx/CVE-2024-6096.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-6327](CVE-2024/CVE-2024-63xx/CVE-2024-6327.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-6900](CVE-2024/CVE-2024-69xx/CVE-2024-6900.json) (`2024-07-24T16:55:06.977`)
|
||||
- [CVE-2024-6901](CVE-2024/CVE-2024-69xx/CVE-2024-6901.json) (`2024-07-24T16:55:57.230`)
|
||||
- [CVE-2024-6902](CVE-2024/CVE-2024-69xx/CVE-2024-6902.json) (`2024-07-24T16:55:37.197`)
|
||||
- [CVE-2024-6903](CVE-2024/CVE-2024-69xx/CVE-2024-6903.json) (`2024-07-24T16:56:18.070`)
|
||||
- [CVE-2024-7067](CVE-2024/CVE-2024-70xx/CVE-2024-7067.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2024-7068](CVE-2024/CVE-2024-70xx/CVE-2024-7068.json) (`2024-07-24T17:12:32.367`)
|
||||
- [CVE-2017-7857](CVE-2017/CVE-2017-78xx/CVE-2017-7857.json) (`2024-07-24T18:06:58.130`)
|
||||
- [CVE-2017-7858](CVE-2017/CVE-2017-78xx/CVE-2017-7858.json) (`2024-07-24T18:06:39.347`)
|
||||
- [CVE-2022-48835](CVE-2022/CVE-2022-488xx/CVE-2022-48835.json) (`2024-07-24T19:24:02.410`)
|
||||
- [CVE-2022-48836](CVE-2022/CVE-2022-488xx/CVE-2022-48836.json) (`2024-07-24T18:32:13.537`)
|
||||
- [CVE-2022-48838](CVE-2022/CVE-2022-488xx/CVE-2022-48838.json) (`2024-07-24T18:43:27.610`)
|
||||
- [CVE-2022-48843](CVE-2022/CVE-2022-488xx/CVE-2022-48843.json) (`2024-07-24T18:25:11.790`)
|
||||
- [CVE-2022-48844](CVE-2022/CVE-2022-488xx/CVE-2022-48844.json) (`2024-07-24T18:24:04.500`)
|
||||
- [CVE-2022-48845](CVE-2022/CVE-2022-488xx/CVE-2022-48845.json) (`2024-07-24T19:19:41.597`)
|
||||
- [CVE-2024-39494](CVE-2024/CVE-2024-394xx/CVE-2024-39494.json) (`2024-07-24T19:17:25.057`)
|
||||
- [CVE-2024-39495](CVE-2024/CVE-2024-394xx/CVE-2024-39495.json) (`2024-07-24T19:04:38.953`)
|
||||
- [CVE-2024-39496](CVE-2024/CVE-2024-394xx/CVE-2024-39496.json) (`2024-07-24T19:02:36.660`)
|
||||
- [CVE-2024-40902](CVE-2024/CVE-2024-409xx/CVE-2024-40902.json) (`2024-07-24T18:52:23.540`)
|
||||
- [CVE-2024-40903](CVE-2024/CVE-2024-409xx/CVE-2024-40903.json) (`2024-07-24T19:01:54.317`)
|
||||
- [CVE-2024-4459](CVE-2024/CVE-2024-44xx/CVE-2024-4459.json) (`2024-07-24T18:00:21.097`)
|
||||
- [CVE-2024-4753](CVE-2024/CVE-2024-47xx/CVE-2024-4753.json) (`2024-07-24T19:53:04.617`)
|
||||
- [CVE-2024-5626](CVE-2024/CVE-2024-56xx/CVE-2024-5626.json) (`2024-07-24T19:52:09.273`)
|
||||
- [CVE-2024-5811](CVE-2024/CVE-2024-58xx/CVE-2024-5811.json) (`2024-07-24T19:41:17.503`)
|
||||
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-07-24T18:07:19.347`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
258
_state.csv
258
_state.csv
@ -17324,7 +17324,7 @@ CVE-2006-1543,0,0,32da06cd3c25311eef0d2751ec555c071a3ecb3fad417f22c0f826abc49b6c
|
||||
CVE-2006-1544,0,0,4269caec6b20b929b44b7edd2c9c2f46264f2bd22fecc30cf9e0e1e8964be9d2,2018-10-18T16:33:21.907000
|
||||
CVE-2006-1545,0,0,f7060d558f2f5d0657bb88a13ea0f95760d1725a8e813a4b56e15fcfa808a0bf,2018-10-18T16:33:22.310000
|
||||
CVE-2006-1546,0,0,f6f9382606085e31a0d246b50165fd8e24eacc983528837b85db91d8ffedcee5,2023-02-13T02:16:24.123000
|
||||
CVE-2006-1547,0,1,cab2e0137fca5f6fe99d9c5358d626c2685487bd694827bf11fe31defd61b6b9,2024-07-24T16:47:20.377000
|
||||
CVE-2006-1547,0,0,cab2e0137fca5f6fe99d9c5358d626c2685487bd694827bf11fe31defd61b6b9,2024-07-24T16:47:20.377000
|
||||
CVE-2006-1548,0,0,7459e4f3372bbed9b5719b48c68bbc8c6b161c36000b4f77dddc1cae3f35eb37,2017-07-20T01:30:41.707000
|
||||
CVE-2006-1549,0,0,4037adb342517801944d951b8327e7b7648b6f21532c6e901717f589abb31fbd,2018-10-18T16:33:22.810000
|
||||
CVE-2006-1550,0,0,104f59a6de420fd180dffe67935fe25a24e02a1cec850a662b8b501bc2708781,2018-10-18T16:33:23.703000
|
||||
@ -43573,7 +43573,7 @@ CVE-2010-1867,0,0,ead6f71ca777f6c30ec774e7b546692f582f29ee2340982b0de101ec97d4a8
|
||||
CVE-2010-1868,0,0,120e2cd0d8f6ba6179a422ce423b8577f8d4517014c066b7506809991a2577af,2010-05-11T04:00:00
|
||||
CVE-2010-1869,0,0,98c1e62fb1462f4f1a2d40b00cfe439d464c431e414c372f014f0cd19614763b,2018-10-10T19:57:52.843000
|
||||
CVE-2010-1870,0,0,04baed661a084efd85acef97c8776d4979e149bd26185218536c004666d8c120,2020-10-20T22:15:15.390000
|
||||
CVE-2010-1871,0,1,331f17975eb8a674bb164ff09052d8791e871e2445c360481b20d21e9d6cb6c7,2024-07-24T16:52:37.187000
|
||||
CVE-2010-1871,0,0,331f17975eb8a674bb164ff09052d8791e871e2445c360481b20d21e9d6cb6c7,2024-07-24T16:52:37.187000
|
||||
CVE-2010-1872,0,0,5fc3fa02b19d2c57751268b725b9fdbbe95c80c98fd9064b8bd74d8156fa9f55,2010-05-12T11:46:12.437000
|
||||
CVE-2010-1873,0,0,f5af0163fd189a882ae5ad7bcbc075e72085c84281c88f0292da8144ab57942a,2024-02-14T01:17:43.863000
|
||||
CVE-2010-1874,0,0,6abf4c5494c08118b47a51b3b6722bfe17bd9112f3b8dfe80529d72e8ff84d70,2017-08-17T01:32:31.603000
|
||||
@ -46781,7 +46781,7 @@ CVE-2010-5168,0,0,f694de3d35ca2a4d77e300bd9ecc53d3e677a4a4409ac07cbd949f37b1b42c
|
||||
CVE-2010-5169,0,0,4423c654da6375805473d621ae5bfaf766e1ebeddf2cec9a50354f02aaa41fc5,2024-05-17T00:48:28.210000
|
||||
CVE-2010-5170,0,0,42c1dfe30af8816bb58930f35cc5f6bd0e4c292a5e684c9459ce76b58d4f52be,2024-05-17T00:48:28.327000
|
||||
CVE-2010-5171,0,0,e5858308040e44d44c8a033eda1aba8428b6bdadce84f048fce3a1db6b888e1f,2024-05-17T00:48:28.443000
|
||||
CVE-2010-5172,0,1,88b9da2d088eec6ac2228a7c1277eab8f39a35b0d14f50ffe87fdb0b737b2300,2024-07-24T16:15:04.677000
|
||||
CVE-2010-5172,0,0,88b9da2d088eec6ac2228a7c1277eab8f39a35b0d14f50ffe87fdb0b737b2300,2024-07-24T16:15:04.677000
|
||||
CVE-2010-5173,0,0,a07914001576280ed8b6d62c4f9c5341ac6614cc2931657fa477e5cfb6e65bf4,2024-05-17T00:48:28.623000
|
||||
CVE-2010-5174,0,0,600998b2bf0fd4a9338a3525067b89daf66aa06b5a625e93f203d5a1b6ecf652,2024-05-17T00:48:28.713000
|
||||
CVE-2010-5175,0,0,2b9bf9c38d2285eff498426bfab6dae1e01c98f76efed89c218d7719f28e733b,2024-07-03T01:35:08.560000
|
||||
@ -51967,7 +51967,7 @@ CVE-2012-0154,0,0,efa06ce29b99a454b6b230812dcfbc8a7c31f15a6a191e9fb95afb234dddcb
|
||||
CVE-2012-0155,0,0,68a183f20800f9961f068e677782f7eaa42ea3fe48483efc018b54b45a28d0b1,2022-03-01T16:30:30.787000
|
||||
CVE-2012-0156,0,0,fa81019405ae57206e1d158f95b164a7373a2a41ddaffb137d0b37be203dfd90,2023-12-07T18:38:56.693000
|
||||
CVE-2012-0157,0,0,92bf8ff06aac6dd87cacabae0ae9fefc93197d3b87593317af0eaf7b77b42375,2023-12-07T18:38:56.693000
|
||||
CVE-2012-0158,0,1,f69db6c672dd23a5b52ad8bca99d8eb7205e4ae230d8e8911335e892aa0c959b,2024-07-24T17:07:11.617000
|
||||
CVE-2012-0158,0,0,f69db6c672dd23a5b52ad8bca99d8eb7205e4ae230d8e8911335e892aa0c959b,2024-07-24T17:07:11.617000
|
||||
CVE-2012-0159,0,0,425befc33c8cdced8996419e813f6be783e3fc81bea1439f4795c2b8142a03db,2018-10-12T22:02:12.603000
|
||||
CVE-2012-0160,0,0,4ff178f576b312033258a2be7f7f3e7d880ea13cb9c9c374d458c1a6a7624fef,2018-10-12T22:02:13.727000
|
||||
CVE-2012-0161,0,0,cafa64353e008dd9d03ba04a503c78a28930b270dacd6b358b825315bc216dbd,2018-10-12T22:02:14.227000
|
||||
@ -61306,7 +61306,7 @@ CVE-2013-3902,0,0,c3268eb845cc61f648c0f924f7aea32bf035b177d6afdc3b4618f8fae3570f
|
||||
CVE-2013-3903,0,0,ba33c71cb834f29161cb041ea3ea2cb9e5593eb9759c9e34363de18a0ee9ff62,2019-05-08T22:03:15.720000
|
||||
CVE-2013-3904,0,0,f895a1ec47db3f9071dc02e2d6448fd75e692b985e48dc5fa59d39154f8d75db,2023-11-07T02:16:04.790000
|
||||
CVE-2013-3905,0,0,f8ea6d1aaa53a22eb3464983f5067cb73adde4643f93077e85931e70dacee1ba,2021-08-30T14:28:30.720000
|
||||
CVE-2013-3906,0,1,081311c5ad83780ad1cb64fe68bb97356bd4e9caf74da6175e6d5743f7dd8716,2024-07-24T16:19:31.253000
|
||||
CVE-2013-3906,0,0,081311c5ad83780ad1cb64fe68bb97356bd4e9caf74da6175e6d5743f7dd8716,2024-07-24T16:19:31.253000
|
||||
CVE-2013-3907,0,0,1915d8f05f8a7759412a032f6f9435ed13f0719b2122df0a949581a6861dd8b5,2023-12-07T18:38:56.693000
|
||||
CVE-2013-3908,0,0,ab052dce28e34e95a32e07235abebab9765980f1bef6344e2aa24fd67ea61829,2018-10-12T22:05:17.387000
|
||||
CVE-2013-3909,0,0,465d2b65b91e14ae8358c5ed649c4122175a22120a670ad71ed32443261cc205,2018-10-12T22:05:17.790000
|
||||
@ -66175,7 +66175,7 @@ CVE-2014-1757,0,0,c0abd9b47af2d3dc4ebc76f7d13c268bbf9c61ea4121a09759cfee5e063a4c
|
||||
CVE-2014-1758,0,0,bc6875f187e388ac0e743b4ab5c65b03fe4b2d6c3b594abe7da57098fa2f11b6,2018-10-12T22:05:57.077000
|
||||
CVE-2014-1759,0,0,94a89a0f71fbe9e15ff297ae1d6aaabc41fb62b0ada56e3876d0bdbf9dc1f19a,2018-10-12T22:05:57.247000
|
||||
CVE-2014-1760,0,0,d37b8bce115d3eda4f6c49e340390546327c9ccd284769549c8d0b081c66120e,2018-10-12T22:05:57.403000
|
||||
CVE-2014-1761,0,1,f846ec25dcf1fd059b1c5001b1016d3695a4ad962eb542800b0cd736feb0a62e,2024-07-24T16:05:50.600000
|
||||
CVE-2014-1761,0,0,f846ec25dcf1fd059b1c5001b1016d3695a4ad962eb542800b0cd736feb0a62e,2024-07-24T16:05:50.600000
|
||||
CVE-2014-1762,0,0,0ab21642153cf4c2f0f596b1dfa7cd47c36d75244be88a6cb84e12ca59ae5d3d,2018-10-12T22:05:57.827000
|
||||
CVE-2014-1763,0,0,e50e10dba3f25ae5c41294aa858e151951d1b806f15e681c0466710b0921c104,2018-10-12T22:05:58.310000
|
||||
CVE-2014-1764,0,0,80c9a204113520ead36668c46febbeabae64930940b04bab50782342ef47f625,2018-10-12T22:05:59.170000
|
||||
@ -66190,7 +66190,7 @@ CVE-2014-1772,0,0,0c295fab3b797e2b752d71c6f501e65aa543959237c23f718c1a060846dbb3
|
||||
CVE-2014-1773,0,0,b5e3c9dd8e8dcbbbbbb08667ca3513646a7ff4a48c4148aced76b41b73da0678,2018-10-12T22:06:03.137000
|
||||
CVE-2014-1774,0,0,0e380f5023eee3fe061b15cf7447bd4d71109249305d56d926ac3bb85bfff4f8,2018-10-12T22:06:03.467000
|
||||
CVE-2014-1775,0,0,b32f443e2244219a7bc4e5b4d9e7b7fb6428282367b5edab45d8b29f5e410b38,2018-10-12T22:06:03.733000
|
||||
CVE-2014-1776,0,1,341790a2bd0724e93cdfd6a24929e9cc028690efc8aba7c1589b1d3bb0fb68dd,2024-07-24T16:47:41.447000
|
||||
CVE-2014-1776,0,0,341790a2bd0724e93cdfd6a24929e9cc028690efc8aba7c1589b1d3bb0fb68dd,2024-07-24T16:47:41.447000
|
||||
CVE-2014-1777,0,0,b8dc524ef06bbb717b7465aeb6a1d70996e1ce1564bf5c772771d7c3c1461dde,2018-10-12T22:06:05.187000
|
||||
CVE-2014-1778,0,0,e21d8ee39d9013b6ba7f287aee1f3e4f35ef024c3506e3ca1077be6e501e4027,2018-10-12T22:06:05.467000
|
||||
CVE-2014-1779,0,0,cb8daa48b15693b7769778e8e8e45f37e53b2fffe0b359aa19a3c7a473510d20,2018-10-12T22:06:05.717000
|
||||
@ -68494,7 +68494,7 @@ CVE-2014-4400,0,0,8749df843bc321782dacd5a0e3349647d190688e6cd38648cd05ccc5c2eb46
|
||||
CVE-2014-4401,0,0,b1a72009180363792f06c345d95a4550ed4d3f887d3915fb7c7a1c557b2890ff,2017-08-29T01:34:59.920000
|
||||
CVE-2014-4402,0,0,26c153dae12bd3eae1168add0197a9b7536c72a36aa3ca0d591e0d7cfe70f2c3,2017-08-29T01:34:59.967000
|
||||
CVE-2014-4403,0,0,81a723621a2393ebc3413e39d3b856bdd1a62e0f000afbc927f04c9402c8227b,2017-08-29T01:35:00.030000
|
||||
CVE-2014-4404,0,1,cfa98dad84153ca4618e57af6c2ca5bee673b813739b0db009fde531001a4e3f,2024-07-24T16:04:19.063000
|
||||
CVE-2014-4404,0,0,cfa98dad84153ca4618e57af6c2ca5bee673b813739b0db009fde531001a4e3f,2024-07-24T16:04:19.063000
|
||||
CVE-2014-4405,0,0,4e0077d387ea4c3c5c0a1af4ea5aa7264d84f79ac9b15094f9bd5bedd46502ef,2019-03-08T16:06:31.107000
|
||||
CVE-2014-4406,0,0,fda6545bb195e685689698c964152dbba9570b025e5323d20acb8bf5e2ab776b,2017-09-16T01:29:00.687000
|
||||
CVE-2014-4407,0,0,5bb98afdc2131f713022b611755e562f051db3f648db6975fef6c355e2876333,2019-03-08T16:06:31.107000
|
||||
@ -70097,7 +70097,7 @@ CVE-2014-6262,0,0,4d73990cd060477b0944624d0fb1da8c79795795a7b1e1932de3e5ab3f7c91
|
||||
CVE-2014-6268,0,0,071365316c103e56c6d74b542de9a53359a955fd9d3bd342e4e23e7f05b38a5e,2017-09-08T01:29:13.433000
|
||||
CVE-2014-6269,0,0,e0669194de11c5823379ee9d4b339e9c2faf5ff5d8e1c5447451d7c99d4a3f78,2023-11-07T02:20:57.473000
|
||||
CVE-2014-6270,0,0,97a9e3424b41e596b5dd3c54341de8bcc330a39e4d465ad3dddd838cc96be40c,2017-09-08T01:29:13.510000
|
||||
CVE-2014-6271,0,1,9a4f8618549eaa54022872ec7700bdca1f6ee0b2e1c183fca44c1c77ef2aa9ee,2024-07-24T16:47:47.667000
|
||||
CVE-2014-6271,0,0,9a4f8618549eaa54022872ec7700bdca1f6ee0b2e1c183fca44c1c77ef2aa9ee,2024-07-24T16:47:47.667000
|
||||
CVE-2014-6272,0,0,4f6aa02a84a1fdfa6a8c7961080b5c230814a1eaa52ed9f7f4221d26e18efb3f,2017-12-09T02:29:03.687000
|
||||
CVE-2014-6273,0,0,8d9e21493226ddc6cceffec2eb04b105fcf2c517aa2126add0a29fbbae6a407f,2020-01-08T15:22:40.690000
|
||||
CVE-2014-6275,0,0,d9772520db18162781d8d9f0f1d8081d1b5ef8cded4300f34c5eff374aa212ad,2020-01-14T17:38:38.020000
|
||||
@ -70169,7 +70169,7 @@ CVE-2014-6348,0,0,e5cbf95bc431bab6427d430c34e8ac185cbd7dabb2829abfd245b50219a24a
|
||||
CVE-2014-6349,0,0,a1df5a85f3557295e6c0c604f23d99dd33eeb2f51da7c75b855ad1fb3d9af242,2018-10-12T22:07:42.020000
|
||||
CVE-2014-6350,0,0,2b1bde979761394b08a28ac22d54a6d8f4282fbac886a9ed8b504c7ff81e23f2,2018-10-12T22:07:42.317000
|
||||
CVE-2014-6351,0,0,eaaa39ce94afe5b91d1bad3136fad2eb975eeef6185fcebc2b3a818f153b3516,2018-10-12T22:07:42.693000
|
||||
CVE-2014-6352,0,1,72b5bdfd293bec682771a4889ecd1845e8a43b3f47cb4bb01b74bc0b51a41a55,2024-07-24T16:20:19.387000
|
||||
CVE-2014-6352,0,0,72b5bdfd293bec682771a4889ecd1845e8a43b3f47cb4bb01b74bc0b51a41a55,2024-07-24T16:20:19.387000
|
||||
CVE-2014-6353,0,0,54def2610ded35abd05b29b4e008ccff598292263fcbf37995702570901c1f11,2018-10-12T22:07:43.943000
|
||||
CVE-2014-6354,0,0,a969e607f7977ac2a38b085fe4f74b6c7379c8ec9ce488ae2469527ba0582764,2018-10-12T22:07:44.350000
|
||||
CVE-2014-6355,0,0,b8728e76c9d988225c82996e299851cf30d098abd67847f3c82269fbbcefa87f,2019-02-26T14:04:02.387000
|
||||
@ -70944,7 +70944,7 @@ CVE-2014-7155,0,0,fe705da2b89e9e0bc26612e487d396b9567b06e885e4a4f69254cfa064dec4
|
||||
CVE-2014-7156,0,0,31b0051fec70d7b9cfd334e6c18c5598c1a5ddb3086a51d41f06db11ac5a097e,2018-10-30T16:26:53.700000
|
||||
CVE-2014-7157,0,0,aa65ddd46e22d5b9f61758aaf7d76b39c8571f2b63bc1a2eb5ed506b5300425a,2017-09-08T01:29:15.073000
|
||||
CVE-2014-7158,0,0,162be160a3070e7ae09e451bf98e6eea204f9c83918dfe32eccea1487608bb3a,2017-09-08T01:29:15.137000
|
||||
CVE-2014-7169,0,1,83fdeb2e04e063b4237d1b8ab5d2af1dfe566f1e08364caabab174dbb93ba576,2024-07-24T16:47:57.690000
|
||||
CVE-2014-7169,0,0,83fdeb2e04e063b4237d1b8ab5d2af1dfe566f1e08364caabab174dbb93ba576,2024-07-24T16:47:57.690000
|
||||
CVE-2014-7170,0,0,71e3e0158df7d2cb5aed111849ad755d24f45eb9cba8cab0d0e45522a573b5eb,2019-07-11T14:03:33.747000
|
||||
CVE-2014-7173,0,0,23b311bc6963c1af3d18f408eb0563f95bf5d3960c4beccea0ba4be988649749,2020-06-02T13:24:09.123000
|
||||
CVE-2014-7174,0,0,8d2221ff0aaed3a395aca672e36967d395dbe97f118a91ffb3062d4241a6d8cf,2020-06-02T13:51:27.387000
|
||||
@ -75125,7 +75125,7 @@ CVE-2015-1637,0,0,74d16a1bf2051427e52eada3f0e3784b8fda12ec1970659a0f9f3b5e4861ec
|
||||
CVE-2015-1638,0,0,8bb9d03dd8081318c5083ec90d3b4c3a8d7e1a6944a4a0c3857427f9b58f142f,2019-05-08T22:03:15.720000
|
||||
CVE-2015-1639,0,0,a7ff8f25ac2d528b8368badf316ae3492f0d84070eb652417766404dca15793f,2018-10-12T22:08:33.010000
|
||||
CVE-2015-1640,0,0,fd605648b3af988cbc285cb1a0e07c6c15c4f3ea4e15e865fde82b35e40a865f,2018-10-12T22:08:33.273000
|
||||
CVE-2015-1641,0,1,3e0bb186b6d084d06a758dea92f669a0e831f94f1dfd47de90f8b4e8e8a30656,2024-07-24T17:06:41.523000
|
||||
CVE-2015-1641,0,0,3e0bb186b6d084d06a758dea92f669a0e831f94f1dfd47de90f8b4e8e8a30656,2024-07-24T17:06:41.523000
|
||||
CVE-2015-1642,0,0,9b5f63e9c3fdcae425cc27f7eeb2782afe537b08b19f8e5baac9f9908bf90dfb,2024-07-16T17:34:22.490000
|
||||
CVE-2015-1643,0,0,36b19c692e9ef1fcffe6fb4943eb124e3225a474579fc315c67b7774c1b726fb,2019-05-14T19:59:23.087000
|
||||
CVE-2015-1644,0,0,2cdaaaf587320554f4b82bb18a4fb198cbdf2ad09d931be218c14437084a76ff,2019-05-14T20:10:07.177000
|
||||
@ -75528,7 +75528,7 @@ CVE-2015-2047,0,0,02720eaf1e48aa3168a182845b21feaf8c4dbfa213152a00d8a03858dbe5d8
|
||||
CVE-2015-2048,0,0,48a88bb170dd57dace6ecfe47ff9342e109734b4710b0d12b677b24063bf01cd,2023-04-26T19:27:52.350000
|
||||
CVE-2015-2049,0,0,e148c769144f4e66cfb8d7e0033276efeaaeffa4af93b857d2b736382a5c9a9d,2023-04-26T19:27:52.350000
|
||||
CVE-2015-2050,0,0,8f435e74719cdc2b6f7ece52e0f95dbbf1c368ae8bae9e1684981a9931c3181b,2023-04-26T19:27:52.350000
|
||||
CVE-2015-2051,0,1,517cd37ecc5976f567c4d0073af006b1bd075f5dcd773ab89e0015eeebc1daf6,2024-07-24T16:05:08.900000
|
||||
CVE-2015-2051,0,0,517cd37ecc5976f567c4d0073af006b1bd075f5dcd773ab89e0015eeebc1daf6,2024-07-24T16:05:08.900000
|
||||
CVE-2015-2052,0,0,d264c36264e456f20846e4c36f41f60b8ed98fa5b94df717a0eceeb08afd1eed,2023-04-26T19:27:52.350000
|
||||
CVE-2015-2053,0,0,68fba4c55705a4435ad5af90d6590b1ceb9e5b3f94ac7b731551c9f339699979,2016-11-30T03:00:45.767000
|
||||
CVE-2015-2054,0,0,4e02c8b5fc7fce5b084be4cd633e01ef700394975f32e0ad7f229df69da0dc72,2016-11-30T03:00:46.893000
|
||||
@ -80275,7 +80275,7 @@ CVE-2015-7446,0,0,8e297810b5a48afd2ba82341d81199bcb4ee97a999cda7f54dd6f7c9e7cf8c
|
||||
CVE-2015-7447,0,0,10f53b59a10b12bd9d2896796b330c34892d8b3c00bba28f69f59b3eef2b6874,2016-12-07T18:24:03.370000
|
||||
CVE-2015-7448,0,0,e80a62c73e858f1218947267299260b86c6acb129e2b928a40c94434a0e465f5,2016-03-22T12:00:54.307000
|
||||
CVE-2015-7449,0,0,bf955f7b865a8ffcc473c7ad55382a7a69ea2155e6f7e02691c082779f9d8000,2018-04-13T16:12:12.323000
|
||||
CVE-2015-7450,0,1,0f01e48d43799979ca9a3546b107178ebc2846e1793d63f42492e05edafbafeb,2024-07-24T17:02:03.383000
|
||||
CVE-2015-7450,0,0,0f01e48d43799979ca9a3546b107178ebc2846e1793d63f42492e05edafbafeb,2024-07-24T17:02:03.383000
|
||||
CVE-2015-7451,0,0,dbe777c29641a4d83849ec0b0e2af37fff4a7f9611d1065f740724621927cf22,2016-01-06T19:48:25.127000
|
||||
CVE-2015-7452,0,0,7e609c5e64d64dee43090a376aa3e342c83b9eb62ca3d7cbb169809cbed1dce5,2016-01-06T19:43:22.527000
|
||||
CVE-2015-7453,0,0,92cdf68b6c44a5b2211d415390c7d809f166e389e34a6b0dbe7c87d611bbad6c,2018-04-10T14:15:34.760000
|
||||
@ -82377,7 +82377,7 @@ CVE-2016-0163,0,0,ad012537ac7387ed104107f6ad783b07e56491dc0f59c8c36f5426188f5ab0
|
||||
CVE-2016-0164,0,0,ce7b9209def215d5460b61d43a3a0b3429e56881e4168eeeb4ce1174a44cdfbc,2018-10-12T22:11:23.020000
|
||||
CVE-2016-0165,0,0,7ea481d422f13f3917f0b93a9cc7ce3d7a1d4a9a18abef33823ac7970791381d,2024-06-27T19:16:56.003000
|
||||
CVE-2016-0166,0,0,269dfab7eddfb2f15bce27d55cc7b9ba6cb3584c621cd31611501efce15cee94,2018-10-12T22:11:23.630000
|
||||
CVE-2016-0167,0,1,dc19a324a74ef8090c27d35b89917cca6760c465e5d4f8690c06ab632b9a7b3a,2024-07-24T17:06:31.923000
|
||||
CVE-2016-0167,0,0,dc19a324a74ef8090c27d35b89917cca6760c465e5d4f8690c06ab632b9a7b3a,2024-07-24T17:06:31.923000
|
||||
CVE-2016-0168,0,0,5d8626c5a6cb6d90819f0f36a5d437129bd94c98b0e605f0aacbcf2437444839,2018-10-12T22:11:24.147000
|
||||
CVE-2016-0169,0,0,1ef107e470987bb2727864d83a86f42a52171d8b83ff122b9075fa65e2209e5b,2018-10-12T22:11:24.490000
|
||||
CVE-2016-0170,0,0,670c49d08f964e7f10ba7e103d16055909ad5783cf13864d7d7cf5eb9824c3d8,2018-10-12T22:11:24.817000
|
||||
@ -82395,7 +82395,7 @@ CVE-2016-0181,0,0,092902717d2bed959230b297edf9a12ac722cf9e84292026f13c7a0c6be3c0
|
||||
CVE-2016-0182,0,0,0f7773e90e01ddeee71b59c3392f44e0053f90740115196b91265536fc7224b3,2018-10-12T22:11:28.240000
|
||||
CVE-2016-0183,0,0,faefec04306b3f58c534ea8d9a47dec3291a869aba3d8b8023337c07ddffc22e,2018-10-12T22:11:28.567000
|
||||
CVE-2016-0184,0,0,e44c8c83cc3aad5c426a73c64c2412aa7b1d41845666099bb339bdcda55de6bb,2018-10-12T22:11:28.770000
|
||||
CVE-2016-0185,0,1,6c7977488d05e747e465235418e2c020e182d593da26bd6e0fbc18b8d4531b66,2024-07-24T17:05:45.267000
|
||||
CVE-2016-0185,0,0,6c7977488d05e747e465235418e2c020e182d593da26bd6e0fbc18b8d4531b66,2024-07-24T17:05:45.267000
|
||||
CVE-2016-0186,0,0,a5dc3cb58f3ea07a0712143254d610091e8062fb021650da6d193840570934f9,2018-10-12T22:11:29.473000
|
||||
CVE-2016-0187,0,0,b78bcc23a5a27d19ecb40b38f0cfe598f289663f64ab02f92a78843699e5c089,2018-10-12T22:11:29.863000
|
||||
CVE-2016-0188,0,0,6c8ad361fe47466fb5bd937f70d18b9df362b64a795e61eabc9a66beca0ea44f,2018-10-12T22:11:30.303000
|
||||
@ -86380,7 +86380,7 @@ CVE-2016-3084,0,0,95b18b032e4c4ad6c4f659df0773c95cc158f3db06fb082be1fe61a056d12d
|
||||
CVE-2016-3085,0,0,a29f78fd5d1e23e67c3b5e34b081a11daa81ceb980b4a44c6bcded242231fa30,2018-10-09T19:59:45.207000
|
||||
CVE-2016-3086,0,0,c9bcf72b409ac5724ed28cfc151470e0f4880a66a1e8707dfd20d9ba0c4c5688,2017-09-11T18:25:59.830000
|
||||
CVE-2016-3087,0,0,57637e2ee08ca37f7212a818188864c42787dce57ab3da7d2f8383240fd8f241,2019-08-12T21:15:13.313000
|
||||
CVE-2016-3088,0,1,acf1da64cf7c6a5db28e7b78b1b7ab87114bb0fd69238b91055173ade2290c84,2024-07-24T16:04:58.387000
|
||||
CVE-2016-3088,0,0,acf1da64cf7c6a5db28e7b78b1b7ab87114bb0fd69238b91055173ade2290c84,2024-07-24T16:04:58.387000
|
||||
CVE-2016-3089,0,0,2b058169fae38c3a97e3e5577ac51a93de29df420178fe64b2af4cfdc53bd47a,2018-10-09T19:59:45.457000
|
||||
CVE-2016-3090,0,0,0ab355b056a0ef650d1032022c17a4c0cd5a82c73b9341b04ff74dbd4cae35b8,2018-07-01T01:29:00.833000
|
||||
CVE-2016-3091,0,0,3e1aea8bd6421931a99a2cce8fc04d91797acf534bc8a9142838798b54997c70,2017-06-15T13:30:18.910000
|
||||
@ -86516,7 +86516,7 @@ CVE-2016-3231,0,0,f7ecd4356be7abd1e2d99e092b24562574eb1b90bb3434d05f378268a3eead
|
||||
CVE-2016-3232,0,0,1ae45835d7f46644f2c4c7144b113600ca6e4063d1e04ddd1a37d9ad6817e6da,2019-05-08T22:03:15.720000
|
||||
CVE-2016-3233,0,0,115e0fcc0227596027a5c19b0bbecf451b373f09431a601bb4a37c3518776fe4,2018-10-12T22:12:04.227000
|
||||
CVE-2016-3234,0,0,2060a50d9f6702481f7e7f0a3401390d6be18d4ae131a4ee035870aba139582e,2018-10-12T22:12:04.460000
|
||||
CVE-2016-3235,0,1,deceff871c54717c4f4a88622bbe8c7a938eeb217f5f191fdfc017c986fe5a36,2024-07-24T17:05:24.710000
|
||||
CVE-2016-3235,0,0,deceff871c54717c4f4a88622bbe8c7a938eeb217f5f191fdfc017c986fe5a36,2024-07-24T17:05:24.710000
|
||||
CVE-2016-3236,0,0,24a0512b05804c12caca4703daee312235ed7cb79a91bfe4bb35800cb7f8a52e,2018-10-12T22:12:05.443000
|
||||
CVE-2016-3237,0,0,b96c2486892fe4f059ccc62487fd6e820b9baf6cddad0f24365c6a6e54fa34a0,2019-05-20T15:09:22.843000
|
||||
CVE-2016-3238,0,0,5e6d6a29e769d68457ca690d2cb31dec91a884601f63828d1d1fe600a24d97f8,2018-10-12T22:12:06.053000
|
||||
@ -86976,10 +86976,10 @@ CVE-2016-3711,0,0,c83a67f72aa4c2861ef346c90cac54d305f88ed90f7be93aa656fb4e4c2c38
|
||||
CVE-2016-3712,0,0,c7f8b4f08f7e1f6b1a1ea7bea5477b9261472b30b06cc0735ec9663f83a435d4,2023-02-12T23:19:25.750000
|
||||
CVE-2016-3713,0,0,a0fd3a736659e40bc6953eb2ee96f88b830db73527d62c25a6b3e9fd4b3aae3c,2016-06-27T17:57:26.057000
|
||||
CVE-2016-3714,0,0,fc4b4686bb90bdb0b4f71b3386460cbaeb0a246987cddba30a9a0036fc345322,2023-02-12T23:19:41.723000
|
||||
CVE-2016-3715,0,1,41a429bb9cd4e58bec46c18da65f864fbf1003189981e9643c46c4b6d44f1441,2024-07-24T17:06:03.347000
|
||||
CVE-2016-3715,0,0,41a429bb9cd4e58bec46c18da65f864fbf1003189981e9643c46c4b6d44f1441,2024-07-24T17:06:03.347000
|
||||
CVE-2016-3716,0,0,2d621eca38580eb36b12da03d5052a9d202f297848297f9114ec53c77580c3f4,2023-02-12T23:20:02.797000
|
||||
CVE-2016-3717,0,0,578985c683d019d0063f96d744b7323756592c56c56d5244a232b553f341441d,2023-02-12T23:20:04.043000
|
||||
CVE-2016-3718,0,1,a8b8c677f1b15707714d879c8647e67a16f4660a14c952ad38d3df304cabf162,2024-07-24T17:05:54.827000
|
||||
CVE-2016-3718,0,0,a8b8c677f1b15707714d879c8647e67a16f4660a14c952ad38d3df304cabf162,2024-07-24T17:05:54.827000
|
||||
CVE-2016-3719,0,0,06298023ce26190463946472029ea0cb30a258e565da712e8d83d7855e5af9f0,2023-11-07T02:32:25.260000
|
||||
CVE-2016-3720,0,0,8d0c6e9044df6bb087caa3ca76d5c7ef025c4480fea4b56d32a7d470da39224e,2019-10-10T12:18:55.307000
|
||||
CVE-2016-3721,0,0,6cc746b94821579f0d3c9319f6f27904b973426ad3ff9de0a6339c3d6d45b074,2024-07-03T01:35:18.193000
|
||||
@ -87668,7 +87668,7 @@ CVE-2016-4433,0,0,672bf110af7941e35e26b94c7630adea9297247c03209b6398fc48f18c21c7
|
||||
CVE-2016-4434,0,0,a452d7cf565324770a7f5be521ae8c35e4f2db878f305486ef101108e453451e,2023-11-07T02:32:37.470000
|
||||
CVE-2016-4435,0,0,13d82d8990beeeb30da505bb5d3913502ad8eb72deef615b304fc5ada18629a3,2017-10-02T15:28:14.257000
|
||||
CVE-2016-4436,0,0,7c592266d8d0c8f0b5f0d75b8789d00a249e7a520e3fb54fee73d6ad26d08578,2017-08-09T01:29:05.797000
|
||||
CVE-2016-4437,0,1,71d40602728d42bc0582e2254ebeca32d57294b555336cad6a293523e070ac89,2024-07-24T17:05:36.093000
|
||||
CVE-2016-4437,0,0,71d40602728d42bc0582e2254ebeca32d57294b555336cad6a293523e070ac89,2024-07-24T17:05:36.093000
|
||||
CVE-2016-4438,0,0,a461168bbef202afd4fc3f813b1c12e88713caeaeebe3f012928d6569776cb3f,2019-08-12T21:15:13.423000
|
||||
CVE-2016-4439,0,0,6ea9d836b2b255c0c32db57ace223053350a12d3a7f6711e96882a1de703608e,2020-05-14T15:28:42.317000
|
||||
CVE-2016-4440,0,0,d3403343b4b7b3611c7704cd783f405ba49a94ebd54f414d78545cbd2eb9ff5a,2023-01-17T21:40:14.993000
|
||||
@ -92895,8 +92895,8 @@ CVE-2017-0138,0,0,396210bfb7406c5891dfed997fd42dbff9e3e8657280ea39b929e776690297
|
||||
CVE-2017-0140,0,0,d6331d35020d494ec23f5777199c63154b3dcddf238fc5006d74fc8b056eead0,2019-10-03T00:03:26.223000
|
||||
CVE-2017-0141,0,0,59100e627c6d5e6c854f5c0a90877b657e168ea1ff42a1387282e4e78dd7f994,2023-06-12T07:15:09.250000
|
||||
CVE-2017-0143,0,0,db0947174e668dc322a0eef3c91b502155997eb4ded2032b877786d97e7460d5,2018-06-21T01:29:00.353000
|
||||
CVE-2017-0144,0,1,183ef3848db2ab20e84f06a306733e2dbc52adf7f438c21ff2d323a857e45b1d,2024-07-24T16:03:46.547000
|
||||
CVE-2017-0145,0,1,232138ca57243f7f8c6aafce2480dfaecbcddbf5e8606d4b7a1beed701a61ebd,2024-07-24T16:22:57.507000
|
||||
CVE-2017-0144,0,0,183ef3848db2ab20e84f06a306733e2dbc52adf7f438c21ff2d323a857e45b1d,2024-07-24T16:03:46.547000
|
||||
CVE-2017-0145,0,0,232138ca57243f7f8c6aafce2480dfaecbcddbf5e8606d4b7a1beed701a61ebd,2024-07-24T16:22:57.507000
|
||||
CVE-2017-0146,0,0,5fd4cf5faacc484bb38494cacd53c5f3a3c1b9631fcf0e3ea961d395f919c2da,2024-07-16T17:55:42.890000
|
||||
CVE-2017-0147,0,0,4738fa144a446610dad559a1e7d5f72a7c987059e1c24dd15784753810fa03d6,2024-07-02T13:00:45.673000
|
||||
CVE-2017-0148,0,0,e2fd4ac9088f29b3fabbde64258da1d22d8efef8c7b25bad3942f26e1aba9d1f,2024-07-09T18:28:14.240000
|
||||
@ -92944,7 +92944,7 @@ CVE-2017-0194,0,0,b1f9e44935cf361394d7e9d025d0fd804468915ef5df8bfd5e9cc9c72e33a2
|
||||
CVE-2017-0195,0,0,fae41ea31ec32dc23b8ccdbf4aec5aee191f28aa23fe273017d5c4c4dcd42cbc,2017-04-20T18:20:48.530000
|
||||
CVE-2017-0196,0,0,d66e7247b6093749237ca9f0f0d47d91642a8627e6a9c2b0964af3ed0742ef63,2017-07-21T16:23:59.983000
|
||||
CVE-2017-0197,0,0,ec36ccafda4056c04603f1e055c29dff39e04da5701b4b405d450680c16640c1,2017-07-11T01:33:25.643000
|
||||
CVE-2017-0199,0,1,0ed6d516aa112498ba9c9625a05d05882df4e6f4523dfab838ae29798e42aa48,2024-07-24T17:11:35.740000
|
||||
CVE-2017-0199,0,0,0ed6d516aa112498ba9c9625a05d05882df4e6f4523dfab838ae29798e42aa48,2024-07-24T17:11:35.740000
|
||||
CVE-2017-0200,0,0,0f0d6db86b2b97a437a60d4cd42c94d74ade165230160037d60fc24094276037,2017-07-11T01:33:25.737000
|
||||
CVE-2017-0201,0,0,6b9af987494ad97e2ca76968ff8e5225fb7b3e03081686fa7be166dcdad25ce5,2017-07-11T01:33:25.783000
|
||||
CVE-2017-0202,0,0,ee6e56fe2662f8271f0d32b80baf7a11d0786a744364efb7b029c7b553e76cd1,2017-08-16T01:29:14.507000
|
||||
@ -92964,7 +92964,7 @@ CVE-2017-0218,0,0,0c57db9f9ccbecf8b6790c60b923f0a93cdb3540a98c2b31f11180363836c7
|
||||
CVE-2017-0219,0,0,5897d3e9d3bdfcd22f3cbc6bb9cfeebea7d19a8b77f9d6deba136234502bdec4,2019-10-03T00:03:26.223000
|
||||
CVE-2017-0220,0,0,af9c9c6ce644c0afd77b0f445e9dd0602a660f56f2b441015c6a1e5099f68e63,2017-08-13T01:29:15.333000
|
||||
CVE-2017-0221,0,0,a2281fa6b886e013d9fad563039a84e2dd4095d6d81ad4b123e5058cfd82391d,2017-05-23T19:17:47.830000
|
||||
CVE-2017-0222,0,1,593955ae8abb22643ec337c2bf991324315dfc77ba5608e123513fe915b09967,2024-07-24T16:19:54.883000
|
||||
CVE-2017-0222,0,0,593955ae8abb22643ec337c2bf991324315dfc77ba5608e123513fe915b09967,2024-07-24T16:19:54.883000
|
||||
CVE-2017-0223,0,0,6e0cbf5f90531fa2324cbeabdb7190cf5ff283b64073efff1ccdacf7454c4443,2017-07-08T01:29:03.333000
|
||||
CVE-2017-0224,0,0,cd0c3cb2d22ac9254c1931e2f6e5b2b3cf3184d38f973f4a157badb03c96961f,2017-05-23T17:42:17.920000
|
||||
CVE-2017-0226,0,0,8159ebfde431a57d3131c9be12a232227eeada97570b054e3bf55f5ddf4467a3,2017-05-23T18:05:41.127000
|
||||
@ -92998,7 +92998,7 @@ CVE-2017-0259,0,0,98b404582f5da497332b6d0440fb8983977bda334ebb8fbbe312ae6b6b34d5
|
||||
CVE-2017-0260,0,0,f0cab1de1b65558ae2ebcf4ddc9e9fdb70b4fa21d6fe90e02519cb3aa7342e8f,2019-10-03T00:03:26.223000
|
||||
CVE-2017-0261,0,0,bd3ba2861bbb6ffeb259d53455d066701d0f49c839e813f123a89181bf131174,2024-07-16T17:33:27.907000
|
||||
CVE-2017-0262,0,0,a6de48d37f028ccb339fc382793ff29bafb7622f7d55f27d216bfaea5c5ba3cc,2019-10-03T00:03:26.223000
|
||||
CVE-2017-0263,0,1,4d7a50ec63b75bb5213f6ccb1d6349b7fe08550194c095f3f9f56b79c9021264,2024-07-24T16:04:49.230000
|
||||
CVE-2017-0263,0,0,4d7a50ec63b75bb5213f6ccb1d6349b7fe08550194c095f3f9f56b79c9021264,2024-07-24T16:04:49.230000
|
||||
CVE-2017-0264,0,0,8975d6da17434bcc6f9d2ba31850a45e3f53a2265acbea5ffcab0a6374a950d2,2017-05-23T19:49:11.083000
|
||||
CVE-2017-0265,0,0,716fc7368a65fc1177829a83c57370f8942ab56a33787ae5cc08867f97099ef7,2017-07-08T01:29:04.333000
|
||||
CVE-2017-0266,0,0,f1c024aae37bc74dd51400f2fb3490ee7b72f4f20c4651efeaec30c7d96ac4fe,2017-05-23T19:08:29.413000
|
||||
@ -94420,7 +94420,7 @@ CVE-2017-10268,0,0,f2207bb9cc9a1a28910eaf1a4567d7456fa9be003016f6d45ace117cad76f
|
||||
CVE-2017-10269,0,0,b7fa7a1c4ce2410f78d2617d17da90e8cfdbd1c93cab4fe7604efe47736b1e05,2019-10-03T00:03:26.223000
|
||||
CVE-2017-1027,0,0,a722572dd9e4e8a2c22d0d11f87337325cef2446e18a9c5891b511e41dd44047,2023-11-07T02:42:06.330000
|
||||
CVE-2017-10270,0,0,ce75ff997e857a0ed3f157350782d1885dbece28cce35a297fc0f65f413030e1,2019-10-03T00:03:26.223000
|
||||
CVE-2017-10271,0,1,012ede1ee4d84127e97e85dd38e6c90b457b7bc42d2372878e587e045e5afc79,2024-07-24T16:04:33.233000
|
||||
CVE-2017-10271,0,0,012ede1ee4d84127e97e85dd38e6c90b457b7bc42d2372878e587e045e5afc79,2024-07-24T16:04:33.233000
|
||||
CVE-2017-10272,0,0,8505cd53353e5d6f2df76c722b2b52001e45686715bc921b0a1d44633ace113a,2019-10-03T00:03:26.223000
|
||||
CVE-2017-10273,0,0,56d292e592b0c9f1539c1f6d729f438c46f7cce4ca2cd5cc6196e4a6ffae023e,2018-01-25T13:52:45.463000
|
||||
CVE-2017-10274,0,0,d8011d137a839d5f478e579276ad4254458cff6089a107db31e2067d4e497708,2022-10-19T19:45:15.390000
|
||||
@ -95935,7 +95935,7 @@ CVE-2017-12144,0,0,fd6e5e0fa7fa577edb0ef895f37bc9ff800e4793e024f9c51f7bedc3fbe46
|
||||
CVE-2017-12145,0,0,89d2e0b2d1c8f2f3d29b36da8d702d5cf78c9dbb0156ae6f9c575c76289edbc2,2017-08-03T11:35:06.187000
|
||||
CVE-2017-12146,0,0,78874fb58b73f66572973a5064a64513e7425623e368459a3fb06cc04731fd4f,2023-06-21T20:59:19.180000
|
||||
CVE-2017-12148,0,0,b307b8b16d089028b29f3f26e836ab28c8bb5786073fddc853b38c6f254d731a,2019-10-09T23:22:22.153000
|
||||
CVE-2017-12149,0,1,cb24f64452828b3d9e4ff2e4b82795e8ad67e3c4e89c7659f4b88d9e84b57d74,2024-07-24T16:52:09.310000
|
||||
CVE-2017-12149,0,0,cb24f64452828b3d9e4ff2e4b82795e8ad67e3c4e89c7659f4b88d9e84b57d74,2024-07-24T16:52:09.310000
|
||||
CVE-2017-12150,0,0,ef89d9b933c588d36ed4593c2c7229ed72babd8b0328684bb5f84ad27518be9c,2022-08-29T20:43:04.670000
|
||||
CVE-2017-12151,0,0,457275a2a26e6b9767b0dbd841b1393282a03fddf9d07f0bdb11ceeb7b1b83ff,2019-10-09T23:22:22.637000
|
||||
CVE-2017-12152,0,0,b30a644384c1e46a7ccab8059ee04d0b040f8f2170f5b86f797bdf0545b0b474,2023-11-07T02:38:22.517000
|
||||
@ -100842,7 +100842,7 @@ CVE-2017-17558,0,0,10e16198edfcdbaef42226bd77c7734abf5db0f00f58e5f7d56fd06acdd55
|
||||
CVE-2017-1756,0,0,b1300ec30db6489533da42dc2de2d7803ffd91f0fddb5d758ef1b333140e424e,2019-10-09T23:26:29.037000
|
||||
CVE-2017-17560,0,0,14c6b3ffa84c81fc2ca5dae78c1fe0f94cb3b40c51cd3125f5254519a08aa17c,2019-05-28T15:08:19.263000
|
||||
CVE-2017-17561,0,0,1fe8424194fc6ef2e1f3094a95840a9592f005fe79c4fd5b6cf682014f93c680,2019-10-03T00:03:26.223000
|
||||
CVE-2017-17562,0,1,3700aec7e6fd4fd7a5273d17f628c4302654b803c3f45d8a64aa6a1a407ba3a5,2024-07-24T16:51:59.797000
|
||||
CVE-2017-17562,0,0,3700aec7e6fd4fd7a5273d17f628c4302654b803c3f45d8a64aa6a1a407ba3a5,2024-07-24T16:51:59.797000
|
||||
CVE-2017-17563,0,0,923f6db9e1123d211004ca6daba813f229b8dd3304375258928cebc2b54e188e,2018-10-19T10:29:05.237000
|
||||
CVE-2017-17564,0,0,b755a42e75838f6f206bcfa9b5566a3dda6aa26ab80af214c7e2a23072d64725,2018-10-19T10:29:05.753000
|
||||
CVE-2017-17565,0,0,d841ec189b3dadfba837017b0e440f3303c644061cdeaf68a5bf9bb7d44eb7b7,2018-10-19T10:29:06.253000
|
||||
@ -106464,7 +106464,7 @@ CVE-2017-6323,0,0,b19a53b94504f5e7eae937a00692d0d5268dd5bbadf0e313e45951e3203870
|
||||
CVE-2017-6324,0,0,4c99df6d4c9151c356f31af079f87651134a5905cbab8e1120550da487c8c904,2019-10-03T00:03:26.223000
|
||||
CVE-2017-6325,0,0,dbaee723976f69f841000707f49ede83cf180bb8e0487f9e5b6f299c6aa6f63d,2017-07-07T01:29:04.057000
|
||||
CVE-2017-6326,0,0,b8fc8dd94ad0a8c98f632196dd466d04d646d23f2a9540245d118c08a129d869,2019-10-03T00:03:26.223000
|
||||
CVE-2017-6327,0,1,98f4d126796a188732810ae15e832391ce81fac17cc0e4557b90175c955585c1,2024-07-24T17:11:25.850000
|
||||
CVE-2017-6327,0,0,98f4d126796a188732810ae15e832391ce81fac17cc0e4557b90175c955585c1,2024-07-24T17:11:25.850000
|
||||
CVE-2017-6328,0,0,e84714aaf238ee92de1091613d3e488b75193b5ae8a2ac28a297985b705f13f8,2017-08-24T19:57:35.500000
|
||||
CVE-2017-6329,0,0,3a62e902e655059bbcf5de21e27de858a93fb524f26a656dbf31c9860b8a2b66,2019-10-03T00:03:26.223000
|
||||
CVE-2017-6330,0,0,5b9a0343a5590461c79c9b82eb82d4aa7a519197d3552e721853e79b2ca02e39,2019-10-03T00:03:26.223000
|
||||
@ -107806,8 +107806,8 @@ CVE-2017-7853,0,0,967267e12367bac6ba0fabde86f025e811884c838341b512a1521a756c215c
|
||||
CVE-2017-7854,0,0,2287b6633c6b6c8222b37549e1350d331bbb9ea5246f79522c703d63e1b80fa3,2019-10-03T00:03:26.223000
|
||||
CVE-2017-7855,0,0,6cbba406f3278060e7299e4cf9ace7935b0e74c7d7f767c75ea94fe84adfd735,2017-09-05T18:28:13.287000
|
||||
CVE-2017-7856,0,0,8830a334296d95b05b4daf37a4c5c4c1fd362f865437fb570ed45c7146e57f2d,2017-11-15T02:29:10.563000
|
||||
CVE-2017-7857,0,0,8a77a55d7969e23bc9adef9cf114e4bd2cf64b417775d9c2f550f5e3727f2255,2021-01-26T12:33:24.523000
|
||||
CVE-2017-7858,0,0,378063668721b9e8fe2a46f43c08c8322d44e03074402ceabd711a6728cca8c1,2021-01-26T12:33:24.523000
|
||||
CVE-2017-7857,0,1,dfe167a0934182e45a7f9172c17564d7618cb2068758b68f367adde67dad0e1b,2024-07-24T18:06:58.130000
|
||||
CVE-2017-7858,0,1,83d69322cc69ef979739b35f5108dc863292d53c6c2dc4b5f58f3619e379c393,2024-07-24T18:06:39.347000
|
||||
CVE-2017-7859,0,0,c18997bd9b7f665ee321149caf3745239e2bc31524c52496fc6f0c1522f53e6c,2017-04-20T17:34:58.350000
|
||||
CVE-2017-7860,0,0,b14d01b16cbb61131d7eccf00f229f543b9803f2000f400412d657f17c841fdf,2017-04-21T00:53:54.787000
|
||||
CVE-2017-7861,0,0,7c6c10a50c18012f131fa33585ca471b3a02f9614c0f549fe891695e6f2beb1c,2017-04-21T00:54:08.163000
|
||||
@ -108620,7 +108620,7 @@ CVE-2017-8755,0,0,bb0f9a0554f5d768f0717363bfba8dd00164142d1dec2f3a256a79ebabb8e1
|
||||
CVE-2017-8756,0,0,7f4f44c76530d71bd2fb59e02e7da5053e94da6633c5bdcf406c45f55acd70bd,2017-09-19T16:38:35.633000
|
||||
CVE-2017-8757,0,0,2ca772d1ac2da906d57fe647a93300e6596c5ee45852748d245d04e48d7346ae,2017-09-18T16:18:18.693000
|
||||
CVE-2017-8758,0,0,320638e320834aca18985bd0d9faa041e9615c872ccc80fba557b9e15a266581,2020-04-09T13:15:27.170000
|
||||
CVE-2017-8759,0,1,c9ad335777916e99e7d76bf27f821e7ca02dc3791597fcc4c9e0528f2b8ff900,2024-07-24T17:11:20.257000
|
||||
CVE-2017-8759,0,0,c9ad335777916e99e7d76bf27f821e7ca02dc3791597fcc4c9e0528f2b8ff900,2024-07-24T17:11:20.257000
|
||||
CVE-2017-8760,0,0,10be357a6b7ea619b5e23dccbea4062d29b2680184f9c0ea0f586f4d8fb278c8,2017-05-17T16:49:48.257000
|
||||
CVE-2017-8761,0,0,45075615c3926b8caad35f2199477e93744f5e3b939c61f9bae26509bcd0981d,2021-06-11T17:33:42.223000
|
||||
CVE-2017-8762,0,0,2ebd723f1c4419dadb55c920521ca56fb55a0d2d677ce32552b761aabe9dfa14,2017-05-12T15:30:44.960000
|
||||
@ -109581,7 +109581,7 @@ CVE-2017-9818,0,0,7eb41951bad51fee049b02c2156b8d0747dac18ba2da9e5457fb2232f79a83
|
||||
CVE-2017-9819,0,0,e2573891d0c6438173a84fc65de6882f4418c05a8185fbce089cba61f1a3a880,2018-11-01T13:36:19.553000
|
||||
CVE-2017-9820,0,0,5e9c4ddb315361e5225ea2026b198f9cf061f07ba1b077e9b09e2459b19828fa,2018-11-01T13:44:44.650000
|
||||
CVE-2017-9821,0,0,0232c70871e0bcb255d7432cd98562fcbf57f058fe2a50545ce7ddce0aeebea7,2018-11-01T13:53:03.757000
|
||||
CVE-2017-9822,0,1,3b6983b468b8a5203c634644e4c623ad76551fa32e9f2a4090fdc32fa77d455e,2024-07-24T17:11:30.870000
|
||||
CVE-2017-9822,0,0,3b6983b468b8a5203c634644e4c623ad76551fa32e9f2a4090fdc32fa77d455e,2024-07-24T17:11:30.870000
|
||||
CVE-2017-9828,0,0,448754f6a246254a9aa18ae625809857fb76b745ea0ab103c4329a2a2e69e651,2019-10-03T00:03:26.223000
|
||||
CVE-2017-9829,0,0,934b781823053cde653f08d9d31666e3bda996bece880e8398e3ddeb59e0bef5,2017-07-05T17:49:02.913000
|
||||
CVE-2017-9830,0,0,5e7e49550f0fee228de851fd403ffebf891d9309b314fc590cae450ec8cbe462,2017-07-05T17:57:41.103000
|
||||
@ -114212,7 +114212,7 @@ CVE-2018-13379,0,0,61d6908654e1acc81b27fc1525490aa3081cd4d6add47fc3ba9eed2bbb192
|
||||
CVE-2018-1338,0,0,d64411637977ae42c91121f0409cbf1c71d1031cb46205ab4bc91aedd4d1c053,2023-11-07T02:55:59.417000
|
||||
CVE-2018-13380,0,0,480272033178ab224e15cb78036830ce2ce28e5ca27484adf0a78212d77e5330,2021-04-06T12:56:42.507000
|
||||
CVE-2018-13381,0,0,c6d40fea6a34ff14b2a09585a7b5be2b92a5fed103e6436015156bf377343728,2021-03-16T02:41:08.027000
|
||||
CVE-2018-13382,0,1,ca43b2040162dddaa95b9380e114e014e168a64ced16cdb5edee66eb4c311ffb,2024-07-24T17:00:11.230000
|
||||
CVE-2018-13382,0,0,ca43b2040162dddaa95b9380e114e014e168a64ced16cdb5edee66eb4c311ffb,2024-07-24T17:00:11.230000
|
||||
CVE-2018-13383,0,0,55bb53e286984e1ed3d949b7aaf5296a0b7ab211b536ccfce1835626d229dbd0,2021-03-16T15:48:20.167000
|
||||
CVE-2018-13384,0,0,0470da54b93707468acde7194067c44388da84e74ce445a3f6794a553a854a11,2019-06-05T14:26:09.117000
|
||||
CVE-2018-13385,0,0,4e701bd89560a8ee5e1216c62101d98e943a0ac12ab90ea0f01e645a62b830ae,2020-05-11T16:29:41.080000
|
||||
@ -119942,7 +119942,7 @@ CVE-2018-20247,0,0,9abebae2c8e02267371aa9cf8315448dfeb2f01995555ed4d117d5ecbb1b0
|
||||
CVE-2018-20248,0,0,ae0b9c435c918f50a30018beb74e072dffa89fc5d49850278076abe71ad97725,2019-10-09T23:39:35.790000
|
||||
CVE-2018-20249,0,0,2421da8c7dcadee89ae4c99aec3b76f57e43b34a92d56c4644512e85899d5b75,2019-10-09T23:39:35.933000
|
||||
CVE-2018-2025,0,0,61fd68d65a6e56e7cb84c0a29c704b8492ba2ffcc5b5823c9a2a290e62a36292,2019-12-05T15:46:04.367000
|
||||
CVE-2018-20250,0,1,7f7ed7f5666b6400a93618fe608ad0401b58978ba15654a8873df19e720126d3,2024-07-24T16:05:24.393000
|
||||
CVE-2018-20250,0,0,7f7ed7f5666b6400a93618fe608ad0401b58978ba15654a8873df19e720126d3,2024-07-24T16:05:24.393000
|
||||
CVE-2018-20251,0,0,21b1d12832c4e59baa206337788d45773e6f28103db6b454b1b1e274ea20cf5e,2019-10-09T23:39:36.197000
|
||||
CVE-2018-20252,0,0,fe1825aa3175d72f96c8f6b232a6bdc03660e9a94a67635f5d932a93e350dbff,2019-10-09T23:39:36.307000
|
||||
CVE-2018-20253,0,0,9d9212abaf15f1ef0cff93c61a627b0ffd5aa08d002140ab9cfcebb2eece0b9c,2019-10-09T23:39:36.447000
|
||||
@ -126220,7 +126220,7 @@ CVE-2018-8448,0,0,eb58dccc46d9a340b63a74df8aaf5f98b2173019e3b756f55d5f3798e8e06b
|
||||
CVE-2018-8449,0,0,1639dfb0e4eee9828daa100c4a21165f602a78468d3b9494cb6d2abf0792cf72,2019-10-03T00:03:26.223000
|
||||
CVE-2018-8450,0,0,df58458ae19d956884a308298b7f839867eba5a2dccef0475b552bb014789a96,2019-10-03T00:03:26.223000
|
||||
CVE-2018-8452,0,0,e108bcf45b6eab1f7f951fb15a8a822ef3623e3bf9c30459c9b7c77c57f027ab,2019-10-03T00:03:26.223000
|
||||
CVE-2018-8453,0,1,79ffd3ecca73a137ceca2cd7b7771b5e85b7b4b444c59f1c82c11177d09cb3ae,2024-07-24T16:47:11.400000
|
||||
CVE-2018-8453,0,0,79ffd3ecca73a137ceca2cd7b7771b5e85b7b4b444c59f1c82c11177d09cb3ae,2024-07-24T16:47:11.400000
|
||||
CVE-2018-8454,0,0,8ba3f6e81e1c2132f874bfd856d4aca67ceca50642cf641f5a1e9ddb735ca373,2018-12-17T19:28:51.533000
|
||||
CVE-2018-8455,0,0,c60b7ca7bd727954e62dc7cbbbca2e0e00d3df5cc661c4f7e3c1a8bedc6cf21b,2019-10-03T00:03:26.223000
|
||||
CVE-2018-8456,0,0,85f42f218e408108605da7115ea8cab435fd7a32f49ee525f32873f856e9125f,2020-08-24T17:37:01.140000
|
||||
@ -127275,7 +127275,7 @@ CVE-2019-0189,0,0,5e1117dd56f625380005b6bd49e3db30fb681b7da73aac9e5d5d3f76ad472e
|
||||
CVE-2019-0190,0,0,10e1035faa60f85c3e9615fa9f5f422f0dec1b38f26efbe5362db9e90bdc8932,2023-11-07T03:01:47.243000
|
||||
CVE-2019-0191,0,0,e4ce67813aaac7a6df5a30b11c500bbec735f1b72c2507a07899d7345f6c7873,2023-11-07T03:01:47.423000
|
||||
CVE-2019-0192,0,0,509ba86653d15d72901971ad0a56a06747d13c35e1de8326b180183aac6b2bad,2023-11-07T03:01:47.513000
|
||||
CVE-2019-0193,0,1,a38ad571312868276ce16413aab5f213e9537669607e2d760db2d0399e69b6a9,2024-07-24T17:08:36.653000
|
||||
CVE-2019-0193,0,0,a38ad571312868276ce16413aab5f213e9537669607e2d760db2d0399e69b6a9,2024-07-24T17:08:36.653000
|
||||
CVE-2019-0194,0,0,676fb27d808b976d526487b2239c92ab44669b9f3d6f5e74f1d14cfa5f6cc3dc,2023-11-07T03:01:47.810000
|
||||
CVE-2019-0195,0,0,5d2060bf55fa95f2f1fbbf5373aa2ce7b8ed69366fadd1d18fe7343dd2f27ee9,2023-11-07T03:01:47.890000
|
||||
CVE-2019-0196,0,0,85df39396706db7917a0acce64d20a09589dd35327cc3ca7f69ed28a313b660e,2023-11-07T03:01:47.987000
|
||||
@ -131293,7 +131293,7 @@ CVE-2019-13269,0,0,d63571c103c1b159148917626cec6498a140dc6b069e0111622d139aac85c
|
||||
CVE-2019-1327,0,0,65bd7a2737d52851a657a4ea38496e6778a14c1efc1bfbb8d39aad5e79a04d16,2020-08-24T17:37:01.140000
|
||||
CVE-2019-13270,0,0,68f24565ab6fd3ea7b854f751c66db2914e8f3588107bb35c42b95eafccb5555,2019-09-04T00:37:37.793000
|
||||
CVE-2019-13271,0,0,fa97d54bddb6e6c8ee8bf1ba98a28e7051193095b65d51c8222060846bda4e2f,2020-08-24T17:37:01.140000
|
||||
CVE-2019-13272,0,1,76acc5acd888d2fb2a65b05cba4c3ee880cb0fa48ae24d40e32530c859bbbf51,2024-07-24T16:51:53.170000
|
||||
CVE-2019-13272,0,0,76acc5acd888d2fb2a65b05cba4c3ee880cb0fa48ae24d40e32530c859bbbf51,2024-07-24T16:51:53.170000
|
||||
CVE-2019-13273,0,0,1383e98b64730f6b5a260c80e0ef6e45484a141f58b0adf8d7146865c19040a9,2020-08-24T17:37:01.140000
|
||||
CVE-2019-13274,0,0,888503ffbfdbee7720f34faec5efb624d3c3b66d78453ede8331533f6eea7248,2019-08-28T18:09:08.420000
|
||||
CVE-2019-13275,0,0,597535679da98d6f8da487965d39c9fa22eb9a0cdf5d15f05b4f2d3cc098de18,2019-07-10T13:50:22.623000
|
||||
@ -133608,7 +133608,7 @@ CVE-2019-15786,0,0,5b1c75ae80bdce361104f80f6f1177f9ae8ec2ceecb6793700a699389cde0
|
||||
CVE-2019-15787,0,0,21074357feba8ca975ce623461e0c4500fd87b1f1255959b50366d9f4d3ffc0a,2019-09-04T15:49:10.487000
|
||||
CVE-2019-15788,0,0,8b3dd31be89ebe845955f177dc278e7155b910b3ad749361b4d6465bb683b7c2,2019-09-03T21:36:54.473000
|
||||
CVE-2019-15789,0,0,f29fb22e493a6f2711bda5d806304ffda4157facac759cb9179699fc4767ad72,2020-10-16T16:29:13.087000
|
||||
CVE-2019-1579,0,1,0f6e55bf2d182d76e8dc047e1827add4b0ae1c78cbbca43fcd1dd90a4ec1f8b1,2024-07-24T16:58:14.647000
|
||||
CVE-2019-1579,0,0,0f6e55bf2d182d76e8dc047e1827add4b0ae1c78cbbca43fcd1dd90a4ec1f8b1,2024-07-24T16:58:14.647000
|
||||
CVE-2019-15790,0,0,c49fecf5d3bfb7ac3e562a2f8d012a73b05ed2a956b07ea676ee4d5b58c5d500,2023-06-12T07:15:11.920000
|
||||
CVE-2019-15791,0,0,05b91cf6096bf5908f54e62ebe171b6ac68984b6362525ce14195792aa014fa5,2020-05-01T14:55:04.083000
|
||||
CVE-2019-15792,0,0,f7bf73309cd23bdd0482f419846ca9ddf600f965a171bdc7b37ce332eab79a39,2020-05-01T14:51:51.907000
|
||||
@ -142050,7 +142050,7 @@ CVE-2019-7590,0,0,fd39a89a18c5d5f888a31b02793bd180d132506c68c3060a86c1515de65241
|
||||
CVE-2019-7593,0,0,10f7cba7fafa686c0097bcd6c3cf6f04c5158891a6ec55d7ea38e0c4994dd20a,2020-02-10T21:53:55.083000
|
||||
CVE-2019-7594,0,0,6b79f6cf1dfc28ef5edb9f358864a01931992294f39fa6756b2f939c09939659,2020-02-10T21:53:55.163000
|
||||
CVE-2019-7608,0,0,83968ce41f0a7b630f76cc22d589ed90b3e04da442d3b9e5c1265debf529af4d,2019-09-27T05:15:10.727000
|
||||
CVE-2019-7609,0,1,93fab4af3f28e583687ed4cc9d761bf63ecd0e06954d7c7983f8413fe6d4e044,2024-07-24T16:58:04.403000
|
||||
CVE-2019-7609,0,0,93fab4af3f28e583687ed4cc9d761bf63ecd0e06954d7c7983f8413fe6d4e044,2024-07-24T16:58:04.403000
|
||||
CVE-2019-7610,0,0,95992284d9f2008e0099c09ab83b472d2e2029c06c1ddc062721af419e24133f,2019-07-30T22:15:12.003000
|
||||
CVE-2019-7611,0,0,0e040724adfdbfa819bffba10a5a8b6ac3d8d2cb3cbb2d100e637c4ead71a18d,2020-10-19T18:10:07.320000
|
||||
CVE-2019-7612,0,0,3f398c785e9d4f134de8d00c540da5a10e790c8dd2f1a815ffa6f6e4b4d75a8e,2020-10-05T20:38:49.580000
|
||||
@ -143814,7 +143814,7 @@ CVE-2019-9661,0,0,ab434c671734a196783e165ec1daf9c0bd3171980e05a1a1b7078058ab4911
|
||||
CVE-2019-9662,0,0,1faa38432c1c911e0246c08d75ed2f27ce6f646cf23eda354ef40f78e4f5cc8c,2020-08-24T17:37:01.140000
|
||||
CVE-2019-9668,0,0,a7a9c5f1e585b889de15ea071b8421b7f0bb66acb0f6e0fed3855ff5c43a62af,2020-01-10T17:44:16.410000
|
||||
CVE-2019-9669,0,0,749960486749795b067308594d5afab76277b1d3a3490c09b4e4682207c52944,2024-05-17T01:40:06.370000
|
||||
CVE-2019-9670,0,1,10c127c46084fd294f7c20fa567dacb5014bdcfb9ab45475b72cd7c2f658cfca,2024-07-24T17:00:28.917000
|
||||
CVE-2019-9670,0,0,10c127c46084fd294f7c20fa567dacb5014bdcfb9ab45475b72cd7c2f658cfca,2024-07-24T17:00:28.917000
|
||||
CVE-2019-9673,0,0,2306d428dc10bc3fbd99125b3884d671ccaf00485803a146fbbd2559d35ef073,2019-06-10T17:36:06.990000
|
||||
CVE-2019-9674,0,0,85f2aa4feb0f80737942bbbe25ed475fb99417f6957fd78ce1733d5252ca0977,2023-03-01T16:40:14.307000
|
||||
CVE-2019-9675,0,0,167a9b90515010e6382191f280d116bad5008459a9658e6357b093a14e112b67,2024-05-17T01:40:06.590000
|
||||
@ -144856,7 +144856,7 @@ CVE-2020-0783,0,0,862777e29a6403b550709cf16a9f8ce4992358ee517e73c6a9325534c27ac9
|
||||
CVE-2020-0784,0,0,3c7fb77bc44018117ed54beefd4e9aebf77efe374b1de0515224d5b420ddd917,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0785,0,0,175416ff3cab9371d86dc106cff2b31db366c00655e46f15914ac454da0add72,2020-03-18T16:36:19.967000
|
||||
CVE-2020-0786,0,0,f2ea47fd26844fb81f666a17be676cf5675a31b4bb786f9dd8853c1a13230479,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0787,0,1,016ef263f7e86a83a39a1f67f876b3cbdaaba417e3141f8f7b256f8041647717,2024-07-24T16:47:33.313000
|
||||
CVE-2020-0787,0,0,016ef263f7e86a83a39a1f67f876b3cbdaaba417e3141f8f7b256f8041647717,2024-07-24T16:47:33.313000
|
||||
CVE-2020-0788,0,0,e98fca7f177c44c00fe4bcddb7725ec2a9691ccb9a51103a4d15dd22c1be03f9,2021-07-21T11:39:23.747000
|
||||
CVE-2020-0789,0,0,4eafbbf6e3467fba518b2cffac86cdfb3551ac9503893ceeb5829af684c53eb4,2020-03-17T11:48:02.217000
|
||||
CVE-2020-0790,0,0,4a8d88b45a5acc134fb06a9a60389b866f70fa933979dec280451c9dfdbaa550,2023-12-31T22:15:44.727000
|
||||
@ -146856,7 +146856,7 @@ CVE-2020-11895,0,0,8e4abdcde3a545842b75db78a5b392f3e3a4d6129f75e30d71bfda02ef82c
|
||||
CVE-2020-11896,0,0,e20489c58bc2934ad957f7f87349b421632fdb49a3441c3dff14bf40b4bc3286,2021-07-21T11:39:23.747000
|
||||
CVE-2020-11897,0,0,b2c4ae6adc70f27b77990dbcd794872056a503cbca14247badc5d74017f05f3a,2020-07-22T00:15:11.830000
|
||||
CVE-2020-11898,0,0,9fb743248c0f6b331f8511a49e3a862d4992081918ac9620967891eb8b2d2011,2021-07-21T11:39:23.747000
|
||||
CVE-2020-11899,0,1,62f0be2dedb039867a955f0e8d7080e473b893c3bb61eb281b12911dee8a88f6,2024-07-24T16:22:11.793000
|
||||
CVE-2020-11899,0,0,62f0be2dedb039867a955f0e8d7080e473b893c3bb61eb281b12911dee8a88f6,2024-07-24T16:22:11.793000
|
||||
CVE-2020-1190,0,0,54ff9903f018b1cd1b533ff3eaf026b5eda0a6c1e4f46a6536ddff4116a1bd3e,2021-07-21T11:39:23.747000
|
||||
CVE-2020-11900,0,0,ed1f5f76a661d76f38f98066cfbab1e17a5bd5891e15f1110dccaa2be28811e1,2020-07-22T01:15:18.697000
|
||||
CVE-2020-11901,0,0,37da44680035405a5c7c94713bb422941da7a885d0bda19cf039c6a5e5862edc,2021-07-21T11:39:23.747000
|
||||
@ -146931,7 +146931,7 @@ CVE-2020-11974,0,0,92f7cc2b04c832c55d628b13d59d2ae3e597b948d27416caca09ea8810214
|
||||
CVE-2020-11975,0,0,347707fa4cb7bfb7a19d66bc1e4979fb9b06d5f58cb42795e4b4313742d89118,2023-11-07T03:15:16.860000
|
||||
CVE-2020-11976,0,0,62126a2cb1a7a505253f16fe9e0e31fdfa3619586ab9e7b556ce7885b35b3e5a,2023-11-07T03:15:16.920000
|
||||
CVE-2020-11977,0,0,908e16ce66d2e6beda69a6fe0e39188a8593d57ac5f513077ebad70024e01dfa,2020-09-24T13:42:34.213000
|
||||
CVE-2020-11978,0,1,4d379b7362dd88034b14097ce2e8c4f9e17f109a451a95a32c855bbe3a3e3aa9,2024-07-24T16:47:01.857000
|
||||
CVE-2020-11978,0,0,4d379b7362dd88034b14097ce2e8c4f9e17f109a451a95a32c855bbe3a3e3aa9,2024-07-24T16:47:01.857000
|
||||
CVE-2020-11979,0,0,b6420f169abc392accc2affb9a22cd8a9cc3f72e5fae2e93e82a7670cddeba18,2023-11-07T03:15:17.033000
|
||||
CVE-2020-1198,0,0,bd53520b665cc3c98860e727d6167450337404695ff598eba030a4722c781584,2023-12-31T22:15:59.300000
|
||||
CVE-2020-11980,0,0,79abec18dbfac2b580684e9ce9977f01d9547e30def66ee753baa864cac4f7f4,2021-01-07T19:02:26.970000
|
||||
@ -148470,7 +148470,7 @@ CVE-2020-13668,0,0,674746d246492016c1fac067712fbc3e2eacbba1bdb29a72b4a021ced3d55
|
||||
CVE-2020-13669,0,0,49537563af3698a01495eee896ec310a374f8170c46c0df01bb5408bdcae0c87,2022-02-17T21:30:50.090000
|
||||
CVE-2020-1367,0,0,f51ca1fc993ca9a65f40db5f6c37fe8012e51503fb2a5cbc39de21f15e045f0e,2021-07-21T11:39:23.747000
|
||||
CVE-2020-13670,0,0,d6fd78d49f9bf21323a9c843a97ef252ed06451c47e09472d4d079e8e98edc08,2022-02-23T18:32:32.397000
|
||||
CVE-2020-13671,0,1,78a01e714363e8860ac318d1f1409bda10c0183ed3ad940c6e277e2923f41fc7,2024-07-24T16:44:54.537000
|
||||
CVE-2020-13671,0,0,78a01e714363e8860ac318d1f1409bda10c0183ed3ad940c6e277e2923f41fc7,2024-07-24T16:44:54.537000
|
||||
CVE-2020-13672,0,0,a8dee45a97bbcae1e83bcb4078c9f90b2a1c9af4b64562dc9c6875bcc9564f78,2022-04-12T16:52:44.053000
|
||||
CVE-2020-13673,0,0,5b3b93b6d8e8e948f3a9ca9c25c5a0fca773b5a9dee1d6665feabdc280461e66,2022-07-25T10:26:16.563000
|
||||
CVE-2020-13674,0,0,394acf0be7cd9d1da8866275ea84cbacefdf111bc41bf2246906282a4009c4d5,2022-02-18T01:42:40.160000
|
||||
@ -167541,7 +167541,7 @@ CVE-2021-21311,0,0,008d242377e1acc526182a2b5342629a43e4e764844cbcc432ad24c030c83
|
||||
CVE-2021-21312,0,0,96cb1634cfb1b97ca3391deed9d6b25b444c74ff35e4082a929153d8b3642b6e,2021-03-10T17:22:13.437000
|
||||
CVE-2021-21313,0,0,98c1026ba8c553924d58a280af264f1dcc5917accc3c73e6c4c88d2b134362aa,2022-10-24T17:07:43.740000
|
||||
CVE-2021-21314,0,0,0645a689bcb9f5c62cc442e901b4600630de421db4c473c239793e9dd516e4d7,2021-03-09T20:13:09.110000
|
||||
CVE-2021-21315,0,1,1767b4ccae530aa18fdc5e874be19e8e0399de3d2b26d3e4ed8bed43b39141ab,2024-07-24T16:45:54.860000
|
||||
CVE-2021-21315,0,0,1767b4ccae530aa18fdc5e874be19e8e0399de3d2b26d3e4ed8bed43b39141ab,2024-07-24T16:45:54.860000
|
||||
CVE-2021-21316,0,0,542adc54551df3d7d5239c2bf1f39432e71f6c5606cbb63cd1c47855e377b67b,2021-02-26T14:35:45.587000
|
||||
CVE-2021-21317,0,0,58c394618ee208ead999d099e90685b4956f85a075027e1350ae67fc125c447e,2024-02-08T20:29:02.863000
|
||||
CVE-2021-21318,0,0,2170d49aa0e61170ae2e051733e862b3d58f6d1c3361d8e18be87630212946ab,2021-02-26T04:04:04.403000
|
||||
@ -168396,7 +168396,7 @@ CVE-2021-22200,0,0,b1b9a3423ca32ca239581dec52991307b9ff53c6e73f87ef86d2fa52f6776
|
||||
CVE-2021-22201,0,0,f7d732b1f4acdcc2d70fd88ce3f3a7d11241a766a8359d839321ccdd7825778d,2021-04-07T16:02:48.167000
|
||||
CVE-2021-22202,0,0,1350f0956b43e4cd4665e53cfeb36055cbc3debe51b475c4b95e754e41d11c40,2021-04-07T19:01:48.483000
|
||||
CVE-2021-22203,0,0,04c823716f4b62c1e3e648683d958604cb5a5f694494b0ed21467afcd8ee488a,2022-07-22T12:14:46.430000
|
||||
CVE-2021-22204,0,1,6ad8e0e8c598430c8867a7cc21ac6b6ac0d894782eb69de7731748c5abe2fe65,2024-07-24T17:07:58.813000
|
||||
CVE-2021-22204,0,0,6ad8e0e8c598430c8867a7cc21ac6b6ac0d894782eb69de7731748c5abe2fe65,2024-07-24T17:07:58.813000
|
||||
CVE-2021-22205,0,0,ba602c357828f2d273602a3c23001192b7f672b3893e44a84d08b638bee14ac5,2022-07-12T17:42:04.277000
|
||||
CVE-2021-22206,0,0,f26b4de2748d56bb0ed8a74340ea4c8f991e4ca52d809ae424d3fdb2d347614b,2021-05-13T13:22:42.720000
|
||||
CVE-2021-22207,0,0,0f42e11a8fa6a3a4ab6de24eb8f48ba5b9fb8fb18bd9a855246b7770e3a42509,2023-11-07T03:30:10.473000
|
||||
@ -171094,9 +171094,9 @@ CVE-2021-25292,0,0,08182f2adeba9610d2badd68f49f48d6a9fb54087d76d56bc8a947ea7c531
|
||||
CVE-2021-25293,0,0,aa3c55980e9585fe8ae02cb6bdcd558a0073811798359a365b254fff06676c52,2021-12-01T16:20:51.457000
|
||||
CVE-2021-25294,0,0,94ae3add3f9f5cc18780f4e80373c9c2c618f1f6b4a87e16637ce8f1f5acf53b,2021-01-26T21:44:35.073000
|
||||
CVE-2021-25295,0,0,2d8de79a27499b8dfcb2195f7318fad4835e7264153e3b10208f1cd06aa7e7a7,2021-01-26T21:36:13.513000
|
||||
CVE-2021-25296,0,1,174b0500e98ad2b9c1e808710ed81d99b2b20c0242d35201479bc69116b6caa8,2024-07-24T16:46:48.010000
|
||||
CVE-2021-25297,0,1,a3494b35690c1e094f9d531a84bdbdb4c4ec81f8de290c230585d38ccddf771f,2024-07-24T16:46:23.400000
|
||||
CVE-2021-25298,0,1,7b585e286148695f6819354e4175ffe44d770df9aff25ccb287dc519f0acee94,2024-07-24T16:46:08.650000
|
||||
CVE-2021-25296,0,0,174b0500e98ad2b9c1e808710ed81d99b2b20c0242d35201479bc69116b6caa8,2024-07-24T16:46:48.010000
|
||||
CVE-2021-25297,0,0,a3494b35690c1e094f9d531a84bdbdb4c4ec81f8de290c230585d38ccddf771f,2024-07-24T16:46:23.400000
|
||||
CVE-2021-25298,0,0,7b585e286148695f6819354e4175ffe44d770df9aff25ccb287dc519f0acee94,2024-07-24T16:46:08.650000
|
||||
CVE-2021-25299,0,0,2682c118b36cdc7ea8cc698ead3ae9de1be6ca69794ee3b0014956d6a6d70e38,2021-03-04T21:18:50.673000
|
||||
CVE-2021-25306,0,0,f17355121b01ad7bd688e7c890d9ef487a4d17eaa64106cbd29fdf52a37d10a8,2021-03-08T15:41:17.123000
|
||||
CVE-2021-25309,0,0,70dd8f3c43488fe980aaa4dbbb626eda4bae82c5e68e32bff470c64419ad6db9,2022-04-26T16:00:33.177000
|
||||
@ -172796,7 +172796,7 @@ CVE-2021-27856,0,0,533296ca9c7874cb02c687903a27c879e7c0010968a04ebb331876cf80310
|
||||
CVE-2021-27857,0,0,acba09ac25f2743a0829147a6eaf8dae24cf8ae99bdf7c502e2a22f55a8e3547,2021-12-21T13:46:52.143000
|
||||
CVE-2021-27858,0,0,25e7eb58a97ac0f5ef0b3256f984b13ca1b71abe48af148f3b3681be87929143,2021-12-21T13:53:28.840000
|
||||
CVE-2021-27859,0,0,1f00a7a74db94a88b4ff1554e0be4ace20ca79c23e18891d213686d088900e17,2021-12-21T13:26:41.290000
|
||||
CVE-2021-27860,0,1,318333d4274da56c30a9369ad6be285ab85fcd25d34e96025eee10510ed182bc,2024-07-24T16:53:07.983000
|
||||
CVE-2021-27860,0,0,318333d4274da56c30a9369ad6be285ab85fcd25d34e96025eee10510ed182bc,2024-07-24T16:53:07.983000
|
||||
CVE-2021-27861,0,0,461da82cf301b4e6332a8eb301e6958ff671fd6c2e458a539df3c016c34f7dec,2022-10-12T13:15:10.550000
|
||||
CVE-2021-27862,0,0,53a0f6ac2e46688ee53fa3d00d211209e39bd34159a9be7e5f193182aa40c519,2022-10-12T13:15:10.630000
|
||||
CVE-2021-27876,0,0,dd89c8b7f6326e708add95e74a357febcd76ffef0432e7f605f72861670c52f6,2022-09-27T20:14:17.313000
|
||||
@ -177190,7 +177190,7 @@ CVE-2021-33762,0,0,71ef9fb5c0760945c2fd325f1316a0705fc2fd53e3f53d348a37ba3d537c3
|
||||
CVE-2021-33763,0,0,e6325603ffebc27e9aa810c89d9e6db108c2a591158b384a81ead8892465b426,2023-12-28T23:15:19.890000
|
||||
CVE-2021-33764,0,0,c55340f2b1974f20b9e2fa4c28bfce6a5ebdf7e370d619305574ca5fd0cbc598,2023-12-28T23:15:20.110000
|
||||
CVE-2021-33765,0,0,8b29a4a25f42cc645d5f9b2c2af8ff02ca614c320855aabe46566794df590dbb,2023-12-28T23:15:20.333000
|
||||
CVE-2021-33766,0,1,7db0b7b0a848a2ea194c56711405b9178decaab7540de4e696bfda8d60f51885,2024-07-24T16:45:35.687000
|
||||
CVE-2021-33766,0,0,7db0b7b0a848a2ea194c56711405b9178decaab7540de4e696bfda8d60f51885,2024-07-24T16:45:35.687000
|
||||
CVE-2021-33767,0,0,c03d9fc75ec16d143efce50fd4b62dd3531abb75089d584376a677e40791dc4e,2023-12-28T23:15:20.773000
|
||||
CVE-2021-33768,0,0,98f731208fbc2908fb93a2b445409bf0aa40a714b5e45bbef0997966b800d545,2023-12-28T23:15:20.987000
|
||||
CVE-2021-3377,0,0,aa11e07462ebabffc03391c9764df5060e142b7a45d02c628a32f178591ef1fe,2021-03-09T15:46:50.940000
|
||||
@ -179388,7 +179388,7 @@ CVE-2021-36930,0,0,8cb1ae6f998ce72ecc3e0f41e2593c8cbe021886d7b9857f17572b37c9904
|
||||
CVE-2021-36931,0,0,7366c98d32112f7ddd543e38987022265bbd8d910a6ab335202596e9da054f2a,2023-12-28T23:15:43.020000
|
||||
CVE-2021-36932,0,0,b14e72d42a93557e3cba5fb46d0b0a33d80346ad102f786201ba8a8636e57169,2023-12-28T20:15:51.530000
|
||||
CVE-2021-36933,0,0,41dd591dabb318ce134ba442adb0527c7597045795ee4e2ab27aec3995bf01e8,2023-12-28T20:15:51.727000
|
||||
CVE-2021-36934,0,1,28126541bb373fd00e408b538ec79951ea97e077bb5bab34be0d73ea99d9446c,2024-07-24T16:48:35.283000
|
||||
CVE-2021-36934,0,0,28126541bb373fd00e408b538ec79951ea97e077bb5bab34be0d73ea99d9446c,2024-07-24T16:48:35.283000
|
||||
CVE-2021-36936,0,0,adba9fd510c163340be8d8857467c9e1784e51bfc247b91d83234496007c5aa8,2023-12-28T20:15:51.943000
|
||||
CVE-2021-36937,0,0,82ef9e0630c5708a469ea3d3728369ae4c236e6c67b7e0fc432a052cf6f4f5a4,2023-12-28T20:15:52.143000
|
||||
CVE-2021-36938,0,0,11b30a839c0862714961e1aef94bd2a89d2bc5b0e4f6a0c518d0a3c547ff8956,2023-12-28T20:15:52.390000
|
||||
@ -182182,7 +182182,7 @@ CVE-2021-40424,0,0,6cc9f49e082e3140aee85ce6a2c7035115acb383bfe5dffbaec66b3dd76ae
|
||||
CVE-2021-40425,0,0,986c807d5d980cb91d8cccc408073c21b5a6706f05cca05fa89896fb2c9a146d,2022-04-21T15:47:50.853000
|
||||
CVE-2021-40426,0,0,5d72a17907f1725e43fb0aab61001410ddfaa528a0774ae1abefe783386aca67,2023-02-23T00:15:10.890000
|
||||
CVE-2021-4043,0,0,3f78b5edede052e4afe6c6366fa735b47812096f65817503719366c9c4f259a8,2023-05-27T04:15:20.003000
|
||||
CVE-2021-40438,0,1,5414e0c1495a90d6f42b1bae6a30b531da4e2d738b2ecf4184cc8a70d5198a3d,2024-07-24T17:08:07.093000
|
||||
CVE-2021-40438,0,0,5414e0c1495a90d6f42b1bae6a30b531da4e2d738b2ecf4184cc8a70d5198a3d,2024-07-24T17:08:07.093000
|
||||
CVE-2021-40439,0,0,2a8b255e58952b8e3bc2fe39246b2c6164ca9e4eabf1fba2b4937eec3211dc19,2023-11-07T03:38:35.240000
|
||||
CVE-2021-4044,0,0,063b69fc68b4e42b2f1ddc7170cc4d1cada10e4b27aa7dc6eec919242eaaa7d1,2023-11-09T14:44:33.733000
|
||||
CVE-2021-40440,0,0,7cb2158ef3a493baf1a86f0c1dad9e0bce6717c435561f74c2693fa184f30de3,2023-12-28T20:16:06.383000
|
||||
@ -182192,7 +182192,7 @@ CVE-2021-40443,0,0,bfaed0b45c141cff5efe4aaa0e7de95ef7f2f9b2384e04b65e7d7879cb98e
|
||||
CVE-2021-40444,0,0,1077e4ccdf106930dd55b730a6f474e1f18b858d39037130b36711cd2de3c7cc,2023-12-28T20:16:06.563000
|
||||
CVE-2021-40447,0,0,0ae13992ae1a3d36ba8db537678de522896a3af0fe5069db7d85fc9aeaa46638,2023-12-28T20:16:06.780000
|
||||
CVE-2021-40448,0,0,6431a12324cff3dd2a147551fd0277be98c5e76a83a490ced4cba31399aea97a,2023-12-28T20:16:06.993000
|
||||
CVE-2021-40449,0,1,e950d2d8f6f739aedd96d10b819c7f43c3e0ed6e65bfad8ff8505a8dc665a7b2,2024-07-24T17:07:46.127000
|
||||
CVE-2021-40449,0,0,e950d2d8f6f739aedd96d10b819c7f43c3e0ed6e65bfad8ff8505a8dc665a7b2,2024-07-24T17:07:46.127000
|
||||
CVE-2021-4045,0,0,55b6db7a3155ec68944543c3ad3f554af8a3082bc8a9c8bd2afb6a2941fc533b,2022-09-30T14:46:27.997000
|
||||
CVE-2021-40450,0,0,83e8bdea547d95f0a79756252494d856cb0960e33a447d5f868326b95665fadd,2024-07-02T17:03:33.753000
|
||||
CVE-2021-40452,0,0,5fafdb809ee70fde4ba5fca1a17d55e2792015c7006c673a40c911e320a16e7f,2023-12-28T00:15:08.107000
|
||||
@ -182983,7 +182983,7 @@ CVE-2021-41375,0,0,937b5fbe2d91e5f173018e547f38eeaf2baca1614df9a42e0d1297cce8b3a
|
||||
CVE-2021-41376,0,0,e7b950da05b8486ddf9b2a3dc240b56622905d8e78f6ade3fabebc212438e1f4,2023-12-28T16:15:53.353000
|
||||
CVE-2021-41377,0,0,5386cd71884d6d7595cdce4cb25673321b2e2bb97ff2cfd01628ea1267cbeaa7,2023-12-28T16:15:53.593000
|
||||
CVE-2021-41378,0,0,0736b810be758a8d96c95fbbbc9ab44747f023166c617dba7ee1fd9b252e5d15,2023-12-28T16:15:53.907000
|
||||
CVE-2021-41379,0,1,989be9ff422ea06ae71bba7e4a8903ec1e4bccafeda36eaae00a4d47d080e261,2024-07-24T16:21:53.237000
|
||||
CVE-2021-41379,0,0,989be9ff422ea06ae71bba7e4a8903ec1e4bccafeda36eaae00a4d47d080e261,2024-07-24T16:21:53.237000
|
||||
CVE-2021-4138,0,0,1e17b4025d96ee649b9191540aaaf997eaf1e31fc6ca152c3b4f5a8440cf449e,2022-05-11T00:34:41.097000
|
||||
CVE-2021-41380,0,0,90755ca3029f85ac80bbecc41661e54c8de42baa1e5f8db26102469553af1bfd,2024-05-17T02:01:10.033000
|
||||
CVE-2021-41381,0,0,9aea90395a13616110fa89cc3fb3014bd2cb5f1eaac5cfc131e9f2ac29a1afe9,2023-01-20T14:16:07.233000
|
||||
@ -183626,7 +183626,7 @@ CVE-2021-42287,0,0,1c7eddd27011068f431f066ff4735b4c7089b91bfa275dc0fd9e2bb24e670
|
||||
CVE-2021-42288,0,0,31d7dd705e6ba5dbae2e77e609ac4cf7f1af7a6e87251b7e545d22e8376baf4e,2023-12-28T16:15:57.040000
|
||||
CVE-2021-4229,0,0,3d8758143ec1235fec1da5623157baf827d5a6cdb624a4b72ec2e779d9ec8f75,2022-06-06T14:23:42.200000
|
||||
CVE-2021-42291,0,0,87d113b0837bc5db18d4e7a7569051aa672020f53ca9ac45f8bf66fb8c7b2200,2023-12-28T16:15:57.257000
|
||||
CVE-2021-42292,0,1,3479b8cbf0b8c1cd1a053cebf0b2b657b9a188bb8790e384ba3852401821fd2e,2024-07-24T17:07:29.217000
|
||||
CVE-2021-42292,0,0,3479b8cbf0b8c1cd1a053cebf0b2b657b9a188bb8790e384ba3852401821fd2e,2024-07-24T17:07:29.217000
|
||||
CVE-2021-42293,0,0,f23d61694dd90d5a18002f97f35ff121f5fc324920df8041a1f2b40bc7875659,2022-07-12T17:42:04.277000
|
||||
CVE-2021-42294,0,0,48ac159188ca63f1871eff54d6e90512aa119cedc2e6a39a0ec472a50e58fcc5,2023-12-28T00:15:09.087000
|
||||
CVE-2021-42295,0,0,f97d69c5afaf91cc419da0b5993851cb19c3049e90d536a48af79115a8f58ce5,2023-08-08T14:22:24.967000
|
||||
@ -183656,7 +183656,7 @@ CVE-2021-42316,0,0,350bf070e4ab8a234e758b93fc6d25c2eb737bcd994260ad056b8a7db3211
|
||||
CVE-2021-42319,0,0,1fa2b75bc3bdf9f5e945b5f5c77de9b70482e4374c0d657aaa20c0ea98fd89f7,2023-12-28T16:15:59.943000
|
||||
CVE-2021-4232,0,0,8abb2447206ea14b0dbdd8ffbbc6eb6e0fbd2a6bd8493d99c6ade93ac756f117,2023-11-14T20:19:32.323000
|
||||
CVE-2021-42320,0,0,f5f778b2bdfd1f6c8e72296c77ccd6c83971a7961ee6e2f7239adadd45f5c3fd,2023-12-28T00:15:09.963000
|
||||
CVE-2021-42321,0,1,62e2c0d0c4c525a22fa2e55f377f36fd6d225b5957d1daeab001f9895a27c401,2024-07-24T17:07:18.663000
|
||||
CVE-2021-42321,0,0,62e2c0d0c4c525a22fa2e55f377f36fd6d225b5957d1daeab001f9895a27c401,2024-07-24T17:07:18.663000
|
||||
CVE-2021-42322,0,0,ec43c900a14fab0ccf16e8a13cc748f63d2143225139f6a06752b6c9a3abe5b3,2023-12-28T16:16:00.313000
|
||||
CVE-2021-42323,0,0,977900bd1507b2761689c272180c8545ad9cccb51e592ae5bf59219dd000d5fc,2023-12-28T16:16:00.487000
|
||||
CVE-2021-42324,0,0,ea4aa1249aa52366ddf5a1a54f47ec47a4f97d47033b5dcca16121250256eb32,2022-07-12T17:42:04.277000
|
||||
@ -184753,7 +184753,7 @@ CVE-2021-43883,0,0,8dea81dcfa5db63272ef8b76cf4bcbcb6272b1612f1ace9ebe8c6995cff0c
|
||||
CVE-2021-43888,0,0,b218b708e5bef16a84b3c8f26665714f1799b3f5022068a2e96a32a09e41d028,2023-08-08T14:22:24.967000
|
||||
CVE-2021-43889,0,0,901c5752d5836cdfa3a75d36051e649080e4aa92f1f92b2c5ce0683d63db2b4b,2023-12-28T00:15:12.010000
|
||||
CVE-2021-4389,0,0,a37f3bceccf63c1ebb84627692a9e50b465101ded5a6c9e8c1d3dbea7ff51faf,2023-11-07T03:40:50.440000
|
||||
CVE-2021-43890,0,1,ae6dd4d7aca72f82ee8f9ec427a90b010d00e75c665a8c5bfc7801ab6b208c28,2024-07-24T16:52:54.103000
|
||||
CVE-2021-43890,0,0,ae6dd4d7aca72f82ee8f9ec427a90b010d00e75c665a8c5bfc7801ab6b208c28,2024-07-24T16:52:54.103000
|
||||
CVE-2021-43891,0,0,193462f74c0ca62807be11f03cc516b19f631e36e3329052d8b1dd64f8073809,2022-07-12T17:42:04.277000
|
||||
CVE-2021-43892,0,0,b51ada4532f13bb58c00c6f98da4edb338ffbb1e0596c6a74bf0fb383dfb11e9,2022-01-01T17:49:29.473000
|
||||
CVE-2021-43893,0,0,79e8b5f3471bb4f5b523fe15cee01a03ebf0134cf2c5c978cb46cb1f4e06ea65,2022-07-12T17:42:04.277000
|
||||
@ -185029,7 +185029,7 @@ CVE-2021-44224,0,0,de2733c000ac6c38d6f1f53cd8a11599c7bf7cda4173070953d59f936091a
|
||||
CVE-2021-44225,0,0,8b1b38eb4612d45d8f380d4f783524376dcd8d3df2e15fbdb0ab3597f4cb2480,2023-11-07T03:39:36.787000
|
||||
CVE-2021-44226,0,0,3467deaa944988840a91f59a112ad40c93eccb5f1fdd4525b48eee8384107e11,2023-09-18T16:15:44.463000
|
||||
CVE-2021-44227,0,0,2d52c5dcc288ab62000a25b0ab7fd696e88b7de81af18aeb7d70ae8d67a3b051,2022-12-09T16:07:59.963000
|
||||
CVE-2021-44228,0,1,3acf198b19f2d123f139451b811c8fb38d872d2a25da95994f6f647c3761aab8,2024-07-24T17:08:24.167000
|
||||
CVE-2021-44228,0,0,3acf198b19f2d123f139451b811c8fb38d872d2a25da95994f6f647c3761aab8,2024-07-24T17:08:24.167000
|
||||
CVE-2021-4423,0,0,00cd009fcae63fe931ad0e5819e571f35a186bddb2c5aa170d887cab8d5a0179,2023-11-07T03:40:54.887000
|
||||
CVE-2021-44230,0,0,ce942228fb9c94ae53a5d6d7ec260631a335b65781788e7c6225e24939aa08c5,2021-12-01T20:36:12.197000
|
||||
CVE-2021-44231,0,0,7095b580c94448fe867e75a85b3bc6d97f1e29bdaa1a231d66cc2f76f8b2dca6,2022-10-05T14:16:09.207000
|
||||
@ -191145,7 +191145,7 @@ CVE-2022-21879,0,0,ff10478b137844addef54a37aff3ef6f71272cad209e9e87da434fcabbbd1
|
||||
CVE-2022-2188,0,0,55d3398b17c8580970a402b3138b19fbf105bc319e31fecf24a3789446c85770,2023-11-07T03:46:16.607000
|
||||
CVE-2022-21880,0,0,3e4bce6dbe10e720568d4cd6170bc597b091365cc6215ef549f240fc7fdfb9dc,2023-12-21T01:15:20.787000
|
||||
CVE-2022-21881,0,0,faa7bc7865e63c9c2138161e7ff86fb6bfa7b9b85fd878fbcade9eeca8822d86,2023-12-21T01:15:20.893000
|
||||
CVE-2022-21882,0,1,7cdb0a1ed548284b4379b35a0f0519645f7067e1efe888e384bd178e2a99d400,2024-07-24T16:48:20.753000
|
||||
CVE-2022-21882,0,0,7cdb0a1ed548284b4379b35a0f0519645f7067e1efe888e384bd178e2a99d400,2024-07-24T16:48:20.753000
|
||||
CVE-2022-21883,0,0,ef75141eb63acbee76c00f255783bc90261ceb27b41574c978cd7f1bf71a6c8c,2023-12-21T01:15:21.110000
|
||||
CVE-2022-21884,0,0,9c4bc11382b71b55140ef262a8369dcafcf999d99dc21fb170cc829e75d2edae,2023-12-21T01:15:21.210000
|
||||
CVE-2022-21885,0,0,ea24b3565fd7074dbed52d3fbd3199588b3a763082d097c5af22ca4251de7c43,2023-12-21T01:15:21.293000
|
||||
@ -192320,7 +192320,7 @@ CVE-2022-23130,0,0,f33af331d8f39126ee4184cd2f91732e6e6f1d10b38f1f9311ba08bcf948b
|
||||
CVE-2022-23131,0,0,d3d7be05c89c86b71a86ae058e52e0c08b9009f23239e03923f7f98f573d427e,2022-01-19T21:08:10.630000
|
||||
CVE-2022-23132,0,0,397cb25879c359d35342406a48243eab9351822dbed5d609151ac64cfb3f09be,2023-11-07T03:44:04.800000
|
||||
CVE-2022-23133,0,0,a2c4a03811e3ac232b401d000b1d126d7d8d0d21136a097d8394dd57add41e0c,2023-11-07T03:44:04.887000
|
||||
CVE-2022-23134,0,1,4ce45367e3de0db4de0df9db3860a609cdee1ae34fa018cca52f72648eebfee1,2024-07-24T16:19:41.053000
|
||||
CVE-2022-23134,0,0,4ce45367e3de0db4de0df9db3860a609cdee1ae34fa018cca52f72648eebfee1,2024-07-24T16:19:41.053000
|
||||
CVE-2022-23135,0,0,5ccf42becc205a16db300828e4e33302545619842bc71c2944a778c0d18e1cca,2022-03-08T17:07:18.560000
|
||||
CVE-2022-23136,0,0,311439258d7cef69f5167444664940f080e574ac56f97e8ca105fb3aab53a53b,2022-04-07T17:05:39.457000
|
||||
CVE-2022-23137,0,0,8926358afae63230740c8577d23e92c722a22cef5bbdba9af3cd1666d6dc5d2d,2022-05-19T18:39:54.610000
|
||||
@ -212291,21 +212291,21 @@ CVE-2022-48831,0,0,4a8025331788e9d821cfbdf999c0d086ed64dbc880b2e933b4369ddeca3f8
|
||||
CVE-2022-48832,0,0,b30ec8122cb4cf6247378d3690124ac91659168e23a421869fe8e139009b388a,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48833,0,0,b319762b3fabccee0ae4d02a2ce1f222f3a815f1dfd8fa80c86941b27e858ca6,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48834,0,0,3fb7de4eb75ae6cee58aac6782b7ecb504ead7c703df9b113b93be65a47f5989,2024-07-19T18:00:51.173000
|
||||
CVE-2022-48835,0,0,ad4c3b312e5ee3dc97a35a09bcf5779cbb291c63d517b78dffc06c6b7c8f4ba1,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48836,0,0,bcdf1c6cc38874940e1783a6a6ef642fe22d4af94e1e0970a67b03a3cd7d8b00,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48835,0,1,fae5bbf2c72a725c06c905a8a8a1671884275a22d0e885831a8ada16de72fe03,2024-07-24T19:24:02.410000
|
||||
CVE-2022-48836,0,1,07462d0028444be914db52546fcdb2c51059b44250caa092984de711cae70f98,2024-07-24T18:32:13.537000
|
||||
CVE-2022-48837,0,0,6ba0c2c49c8b0fc22b8aa3e7bd58e22713beeb87b8a880fecfa58840737e2898,2024-07-18T16:07:46.433000
|
||||
CVE-2022-48838,0,0,4b72bd1113209d50a9d7d75bb6f90d3fb2aa917c350721eddd435341c8a6af8b,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48838,0,1,a223c7d1830dff324f08b65e72bc9a254a4b4a6907ab9fe69ad3545f06856d0a,2024-07-24T18:43:27.610000
|
||||
CVE-2022-48839,0,0,4d5d6a0de2d6a605b6f7b59c8f8554c7e465136158f7bb768964bc4f924e581a,2024-07-18T16:04:39.003000
|
||||
CVE-2022-4884,0,0,6f95461b45974d66adcf02c5a89bbb800bbcac90c85043e608b2719bec467950,2024-07-23T19:37:16.630000
|
||||
CVE-2022-48840,0,0,9ad6931cadf0439cf46929ba61b21a62bdce8a96db55ceff3e04e77c78c7c242,2024-07-17T20:37:49.917000
|
||||
CVE-2022-48841,0,0,72965da807da7e0b27dba0275b42cf491045cefcba204398eb35b7491a1fb6c8,2024-07-17T20:31:28.440000
|
||||
CVE-2022-48842,0,0,ee502b8c64e084af8e0f6629b8b52e7f162a31838fbb6ef5f9c997d98eec6026,2024-07-17T20:29:57.607000
|
||||
CVE-2022-48843,0,0,3608cf58547a9da9f540eeeace38768b246184795734232c41b10c60dba7af45,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48844,0,0,414a5b6201f2ccfad666afcafa6dab34dace193dd8e99d7cd69160bda2376a68,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48845,0,0,d0d8bacbeaadac4ed574e80a459dd1290ff1feb09770c0ae5c1cd2a3d3faf57f,2024-07-16T13:43:58.773000
|
||||
CVE-2022-48846,0,1,e244c294d9337a043c90abbd699a3f7795cb0e239b8ee009029c7ad891b9efc9,2024-07-24T17:56:26.767000
|
||||
CVE-2022-48847,0,1,5853680be9f5e4c5c6da03dea1c36a45778b883d152605f39a4b6becc6cf4f2b,2024-07-24T17:34:26.853000
|
||||
CVE-2022-48848,0,1,1cfba98deddf8b166a5900b655af2f6ed914b1d7ddecc9ba0e4a327e802556db,2024-07-24T16:43:54.880000
|
||||
CVE-2022-48843,0,1,1d52285e8e6dba636016eafb15ffea4a6f4eb441c9552ea474c81d8d5e893330,2024-07-24T18:25:11.790000
|
||||
CVE-2022-48844,0,1,46bc27ef9268e841ee8669182888bdb2982a8b923ed635d4c004082982c3f0d8,2024-07-24T18:24:04.500000
|
||||
CVE-2022-48845,0,1,951fefbd1abafc93b49cb87b1dabf488f75dc3f4f61cb2095ee2b88cbff4d336,2024-07-24T19:19:41.597000
|
||||
CVE-2022-48846,0,0,e244c294d9337a043c90abbd699a3f7795cb0e239b8ee009029c7ad891b9efc9,2024-07-24T17:56:26.767000
|
||||
CVE-2022-48847,0,0,5853680be9f5e4c5c6da03dea1c36a45778b883d152605f39a4b6becc6cf4f2b,2024-07-24T17:34:26.853000
|
||||
CVE-2022-48848,0,0,1cfba98deddf8b166a5900b655af2f6ed914b1d7ddecc9ba0e4a327e802556db,2024-07-24T16:43:54.880000
|
||||
CVE-2022-48849,0,0,016c5643058b7be64f2fc414ce9f20639993c67d73cb205d7d7633710ee6dbd2,2024-07-23T17:09:44.370000
|
||||
CVE-2022-4885,0,0,6dfd3bcc205acf11a6a336fd859c715f78ad0d5c5de19658ba0e65de5d18469e,2024-05-17T02:17:01.360000
|
||||
CVE-2022-48850,0,0,458c421742def3a2b68d612e2bbd387d1c2395caa97d294537edd4740d1826d1,2024-07-23T17:06:58.507000
|
||||
@ -225441,8 +225441,8 @@ CVE-2023-33948,0,0,a15c02735e415ef8fadd5da5149feb5504d592e25dd82d34c6021d7e837b2
|
||||
CVE-2023-33949,0,0,751a8c61235cd02c484e0f14d970721723f431ce50bc9f53ccf992a1361a867a,2023-05-31T20:16:46.520000
|
||||
CVE-2023-3395,0,0,581c51d4c280e089e2c645e627fdf942a2c8da790181334fb2772074b94b08a1,2023-11-07T04:18:40.710000
|
||||
CVE-2023-33950,0,0,a62df5ac452e53d4229daf285ecba748de64d97eec18f86709196c94ffe686b3,2023-05-31T20:22:30.147000
|
||||
CVE-2023-33951,0,1,ac2ddde7cf1f5a22a37e28beb1f83a8b7812ac9826584bcfa544bc9fbe5943c5,2024-07-24T16:15:05.013000
|
||||
CVE-2023-33952,0,1,bc8737fca49eaf3afa67d357da6b8787eb2d1dca7e960ba9ed448dcd2d596f83,2024-07-24T16:15:05.250000
|
||||
CVE-2023-33951,0,0,ac2ddde7cf1f5a22a37e28beb1f83a8b7812ac9826584bcfa544bc9fbe5943c5,2024-07-24T16:15:05.013000
|
||||
CVE-2023-33952,0,0,bc8737fca49eaf3afa67d357da6b8787eb2d1dca7e960ba9ed448dcd2d596f83,2024-07-24T16:15:05.250000
|
||||
CVE-2023-33953,0,0,b4e452996a0460c69e1d9ad385203414166f505f4cc90f8fc1ac2cee616c968b,2023-08-17T14:15:26.377000
|
||||
CVE-2023-33955,0,0,7800a5f6d1ae2d14302ad1ddce579575ad926aee1cbfa74d194c57e66a67559f,2023-06-05T16:42:23.013000
|
||||
CVE-2023-33956,0,0,82e8d691b9d1a79e989cf6287b3e6ccdb26b772a80f9e67b564d1578a0fed295,2023-06-12T14:14:39.023000
|
||||
@ -233618,7 +233618,7 @@ CVE-2023-45245,0,0,f71f5550bce318c5896855b0720ef3b014b7edad826762736cbbe2c3e48a3
|
||||
CVE-2023-45246,0,0,6799976449efb5e7dfbd39ca49c91e79edc135b105c217fc842128d098ea333b,2023-10-11T17:20:21.937000
|
||||
CVE-2023-45247,0,0,cf730bce8af4196d54c7fa8e0341f517de223cc02208e0ec0dd8e04054077116,2023-10-11T19:06:49.937000
|
||||
CVE-2023-45248,0,0,cde75e840aad96dac96b2f35c9e6f15ef3cf04deb0931c7f7ba39cfb3ca21688,2024-02-27T17:15:10.327000
|
||||
CVE-2023-45249,0,1,ea114c1a8320b21bb2ea718e1969399ce56c8e7292a516554c8821c949eb7ac2,2024-07-24T17:12:32.367000
|
||||
CVE-2023-45249,0,0,ea114c1a8320b21bb2ea718e1969399ce56c8e7292a516554c8821c949eb7ac2,2024-07-24T17:12:32.367000
|
||||
CVE-2023-4525,0,0,5bf42f67193da0102cbdfa0f5eae1107ad391f3088f5c3d8fcbbf1b1f9dc9ba6,2023-11-07T04:22:41.327000
|
||||
CVE-2023-45251,0,0,9301cd01cf0e1a09a624bf8b6813dd7dcd8b5641f21dfda46acef47990364d11,2023-12-26T18:15:08.030000
|
||||
CVE-2023-45252,0,0,307228454f587d0983793c9bfdd500c095874fad12af348d470cff72f1f8a6d2,2023-12-08T18:45:28.017000
|
||||
@ -239390,7 +239390,7 @@ CVE-2023-5629,0,0,7e6798797b363836a6f68c0660a0441b52f3631f60a9991276c08a96f30860
|
||||
CVE-2023-5630,0,0,3072d6705514ff8b04e35c4acd894f558cdb54032a9cbe6e724fdab46e963cc4,2023-12-27T18:45:36.387000
|
||||
CVE-2023-5631,0,0,5f07007a20bb2dda9efb27c552720a26c393ce7eb1f775cb2a4d745ead162b5d,2023-12-22T18:55:30.400000
|
||||
CVE-2023-5632,0,0,56ff7f39be5ba1eee3e0439676ca7f39fd02b7efec57b6f2580941c9bb104be4,2023-10-25T17:32:13.007000
|
||||
CVE-2023-5633,0,1,b562cfe2db95c3e745ec0c114df2ad6af8ae7fd5b64a5c86cb8c5053059196d5,2024-07-24T16:15:05.527000
|
||||
CVE-2023-5633,0,0,b562cfe2db95c3e745ec0c114df2ad6af8ae7fd5b64a5c86cb8c5053059196d5,2024-07-24T16:15:05.527000
|
||||
CVE-2023-5634,0,0,e587ffcfa7ea95a40df03855557a10777d01a5818110ab153743d2b6b549ed87,2023-12-06T18:59:59.893000
|
||||
CVE-2023-5635,0,0,809760649528b2a8ff45a46ed3580c71b50b09190c35543546f6b22b8f14c24f,2023-12-06T18:59:51.757000
|
||||
CVE-2023-5636,0,0,5b9f7faf77daa38955d87414eba1ab1ed6bca8c51088b10eac66b79b69cea5d6,2023-12-06T18:59:28.783000
|
||||
@ -241844,7 +241844,7 @@ CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328
|
||||
CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000
|
||||
CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000
|
||||
CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000
|
||||
CVE-2024-1151,0,1,f1120b2321e40a46359110a747e23c5be9b7c1390b8b005f81a6f5c75cde82b8,2024-07-24T16:15:05.793000
|
||||
CVE-2024-1151,0,0,f1120b2321e40a46359110a747e23c5be9b7c1390b8b005f81a6f5c75cde82b8,2024-07-24T16:15:05.793000
|
||||
CVE-2024-1153,0,0,f63803b078e32875d89d575d4b462673565a6d5cdf9ae1c5582d3c5142b3f8aa,2024-06-27T17:11:52.390000
|
||||
CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000
|
||||
@ -243762,6 +243762,7 @@ CVE-2024-21678,0,0,cb3827f1e523b06b300224171594f9fd4e5c2622fa5d40070141728fc7783
|
||||
CVE-2024-2168,0,0,74490de60c08e043593352cd4979e484251e5c8cdc32185131e72bfecce0dd0c,2024-05-17T02:38:05.397000
|
||||
CVE-2024-21682,0,0,ea94962fb19bc771b1e7e5a4a1b57027a5c5c8b332b79d32007472ab6d5177d5,2024-02-20T19:50:53.960000
|
||||
CVE-2024-21683,0,0,9e98100df1746075be9f809cd7f00fd6b0e3e97382e91b70d2a85ac430e36b94,2024-07-03T01:46:45.440000
|
||||
CVE-2024-21684,1,1,033d0c2fabc1d276dc5b62b7abcda94db7f8ee0250b414706e22682d08c59c20,2024-07-24T18:15:03.793000
|
||||
CVE-2024-21685,0,0,5660fcc85eb1dde5c65259d6d6205ae74624ad923dcf6470bb4f3577f99d7f00,2024-06-20T12:44:01.637000
|
||||
CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559bd43,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21687,0,0,7f853701aecb2ebf7acbec91687c790cb83db5ee246802aacc74de3322b22abf,2024-07-17T13:34:20.520000
|
||||
@ -244319,8 +244320,8 @@ CVE-2024-2244,0,0,41aec355f079deb3c815718a9277f010e5e21c50317c0cc2fa902ffd2d6d51
|
||||
CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d915,2024-04-17T12:48:07.510000
|
||||
CVE-2024-22441,0,0,d974db705829cf05b22e157df217440dd5d74842713d9bc45c9eb02f022d665b,2024-06-13T18:35:19.777000
|
||||
CVE-2024-22442,0,0,6cd8943b606f82f9805c763a4b9ec31735cf88cf76efca2ccc718cdf40618170,2024-07-16T18:00:02.110000
|
||||
CVE-2024-22443,0,1,c52632f4bcdeeb28d6bc6d5cd24263b0884e03dc4419b129318aba75fed40931,2024-07-24T17:12:32.367000
|
||||
CVE-2024-22444,1,1,45372a2223b95716cffc76bfc8a6d86ecfe275858c4bb765e202a696dfd6a002,2024-07-24T17:12:32.367000
|
||||
CVE-2024-22443,0,0,c52632f4bcdeeb28d6bc6d5cd24263b0884e03dc4419b129318aba75fed40931,2024-07-24T17:12:32.367000
|
||||
CVE-2024-22444,0,0,45372a2223b95716cffc76bfc8a6d86ecfe275858c4bb765e202a696dfd6a002,2024-07-24T17:12:32.367000
|
||||
CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000
|
||||
CVE-2024-22448,0,0,8e90df505cef41effc57c679101495cb231edb0790ae704dce635c915090456b,2024-04-10T13:23:38.787000
|
||||
CVE-2024-22449,0,0,f33d4db580b05ecc377b9d7d6de8d5383f1a67c4e1bbff2a1ad282c40aa707a2,2024-02-03T00:30:30.737000
|
||||
@ -250686,10 +250687,10 @@ CVE-2024-31965,0,0,c4b61ad2f9eef097e0954fa70290fdb78da64c708fb57d0eafd0380254742
|
||||
CVE-2024-31966,0,0,e813fbcff3c742b22ff3620e22028114e0bd0dc18f84922743926ac1c55086d9,2024-07-03T01:55:39.753000
|
||||
CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb91b0,2024-07-03T01:55:40.527000
|
||||
CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000
|
||||
CVE-2024-31970,1,1,21aa8e8f2683c724f57644618668a330affa2842772381a1886887917836573a,2024-07-24T17:12:32.367000
|
||||
CVE-2024-31971,0,1,c01103c7a27f61a563b001c647885d07de844f2c03f92bb191e43610aaea5763,2024-07-24T17:12:32.367000
|
||||
CVE-2024-31970,0,0,21aa8e8f2683c724f57644618668a330affa2842772381a1886887917836573a,2024-07-24T17:12:32.367000
|
||||
CVE-2024-31971,0,0,c01103c7a27f61a563b001c647885d07de844f2c03f92bb191e43610aaea5763,2024-07-24T17:12:32.367000
|
||||
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
|
||||
CVE-2024-31977,0,1,2e845dd8e2dbf0b94e2238c6740554d5934910b7cebbf8cf7289ad0332368bf6,2024-07-24T17:12:32.367000
|
||||
CVE-2024-31977,0,0,2e845dd8e2dbf0b94e2238c6740554d5934910b7cebbf8cf7289ad0332368bf6,2024-07-24T17:12:32.367000
|
||||
CVE-2024-31978,0,0,e4cc4367e420e8dcd4ef937e3967f9710a2baec19b8785bc53e2d6ca59645c6f,2024-04-09T12:48:04.090000
|
||||
CVE-2024-31979,0,0,f9deec5ae1bbbfb21f2bdc6463cb5006e2e3b0c363609d81cd2769fd53ba3bc0,2024-07-17T13:34:20.520000
|
||||
CVE-2024-3198,0,0,1f0d31c07f6270b253d2bb83c7332c7bc9f718736230fc6377e93749d92894d3,2024-05-22T12:46:53.887000
|
||||
@ -253670,10 +253671,13 @@ CVE-2024-36528,0,0,2720657851e73513f2a766ff74bcbf76f8ccd5ffff5f964570f2d3734bd16
|
||||
CVE-2024-3653,0,0,2ce001c8a2558fa4f76ef87c21e8ceeb7eaae4cf2cb26c9cd78a019c19336759,2024-07-09T18:19:14.047000
|
||||
CVE-2024-36531,0,0,309244ba7df6e757b847511595184db51193505c4bbceece7db96d568b889d7a,2024-06-10T18:06:22.600000
|
||||
CVE-2024-36532,0,0,b051ad55854f4bc888db3a53610f7bcd9ed49e35c5868005d5e65395b423f5e4,2024-07-03T02:03:15.647000
|
||||
CVE-2024-36539,1,1,1c06ea00d48a9cd0f3aabb67d1610f7b7cb65726a791ef13a8c51d92f718b2c5,2024-07-24T17:15:10.767000
|
||||
CVE-2024-36536,1,1,81055ba9345781f5ac2845b9e16cd1860116e534627f5e505b90c732d23d0422,2024-07-24T19:15:04.293000
|
||||
CVE-2024-36537,1,1,ca15d636672c067611f82db6e8fed44b605c0751c3b3623ed5e71b0748bc3dbe,2024-07-24T19:15:04.373000
|
||||
CVE-2024-36538,1,1,68a27c850ff04774e300a8695ee6ca1ffa9c9c746aa07894c18d7b077245e44d,2024-07-24T19:15:04.487000
|
||||
CVE-2024-36539,0,0,1c06ea00d48a9cd0f3aabb67d1610f7b7cb65726a791ef13a8c51d92f718b2c5,2024-07-24T17:15:10.767000
|
||||
CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000
|
||||
CVE-2024-36540,1,1,4d633887b87eb1c8060a8e6786bca44ee4e71578563e85032fbd12a9e5e29066,2024-07-24T17:15:10.827000
|
||||
CVE-2024-36541,1,1,6a8a7f7727809c1260cd3b5c8c832484186631ab30a12c54c0721ce5292077c7,2024-07-24T17:12:32.367000
|
||||
CVE-2024-36540,0,0,4d633887b87eb1c8060a8e6786bca44ee4e71578563e85032fbd12a9e5e29066,2024-07-24T17:15:10.827000
|
||||
CVE-2024-36541,0,0,6a8a7f7727809c1260cd3b5c8c832484186631ab30a12c54c0721ce5292077c7,2024-07-24T17:12:32.367000
|
||||
CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000
|
||||
CVE-2024-36547,0,0,63fa93ba07106c565a1033909cd3b8147be168386a42b3286a8bfe46cc4ab092,2024-06-06T15:16:11.897000
|
||||
CVE-2024-36548,0,0,aff0414515c8e648334d6ef2a1bf413e6b70804d4ac2887710c25a232cc52bfc,2024-06-06T15:24:02.577000
|
||||
@ -254188,7 +254192,7 @@ CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9
|
||||
CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000
|
||||
CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000
|
||||
CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000
|
||||
CVE-2024-37386,0,1,11096fb093cb31a975b6d4a2f60faa537dc9b7d88674a570ecbb06ffc3cba3f5,2024-07-24T16:15:06.970000
|
||||
CVE-2024-37386,0,0,11096fb093cb31a975b6d4a2f60faa537dc9b7d88674a570ecbb06ffc3cba3f5,2024-07-24T16:15:06.970000
|
||||
CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000
|
||||
CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000
|
||||
CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000
|
||||
@ -254279,6 +254283,7 @@ CVE-2024-37523,0,0,13bb725e58e999cc176a750d097aad585b673654b57d0f90da08bbd809966
|
||||
CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000
|
||||
CVE-2024-3753,0,0,7ec7e7ddead92833cf7c33f0b6871feebee71d63726e8d778e9efc350bba07de,2024-07-15T13:00:34.853000
|
||||
CVE-2024-37532,0,0,aa877fbc00f03a99fc2b9d43fb935fba6551700aac862f95f49a54cca4d5d3d2,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37533,1,1,15e39a76c61052aaace04c07adce9e7f91231eabe293d2964440b2a84473d749,2024-07-24T18:15:04.690000
|
||||
CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000
|
||||
CVE-2024-37536,0,0,df209a8df9bdd9e6c141521f70aae153351cd936d4fcc329ecd5520bb21d30d3,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37537,0,0,d6f2faf95678b7215b67e0396b1da334479107789418e26bf8fa81b809970ca6,2024-07-22T13:00:31.330000
|
||||
@ -254765,7 +254770,7 @@ CVE-2024-38521,0,0,2311d8af284d8ecd997452bb188fd1cef58d4fe05ff15f59ded69f45525ae
|
||||
CVE-2024-38522,0,0,ab564dc444a369fc5518b1b865033967f292e4b44f2517e37c5c794af744484c,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38523,0,0,98e840731b35fd9082344b70afbfc25df92f26b817bf7b41fdcf2e1d10b8eba8,2024-06-28T10:27:00.920000
|
||||
CVE-2024-38525,0,0,c6d09ec2ec4a195ad79165c044ef499ca4961803c76ab9f8203674d54bb83420,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38526,0,1,9de1edb82d6bb6115c33dfe170943d78568f85fe7ab5266f92239979ec0b9259,2024-07-24T17:15:10.910000
|
||||
CVE-2024-38526,0,0,9de1edb82d6bb6115c33dfe170943d78568f85fe7ab5266f92239979ec0b9259,2024-07-24T17:15:10.910000
|
||||
CVE-2024-38527,0,0,d79f673f66de487942038a941e7146b053a6ddb1c998291462a54ca077215594,2024-06-27T12:47:19.847000
|
||||
CVE-2024-38528,0,0,abe62c0b36f96b72c42ae3a20756e7dee4cdc68dd98be36932d675c96e479202,2024-07-01T12:37:24.220000
|
||||
CVE-2024-3853,0,0,7e352b0debfe2ff1972966571472dc1ad9a92992dff183ce4b7132f5ac558f7a,2024-07-03T02:06:45.877000
|
||||
@ -255009,7 +255014,7 @@ CVE-2024-38951,0,0,68f3f4da755e62c58899a1c14a3bba19a0238b69cfd8361c9d435e588ebf0
|
||||
CVE-2024-38952,0,0,f3ef3fd79d2aa5fbb6eac9aa4ae095adbf433e668b0d02d175100cd59627c991,2024-06-25T18:50:42.040000
|
||||
CVE-2024-38953,0,0,dbde02c3cebb008392d98c40885c4b018b5aa478839fb4271aaec02242524f62,2024-07-01T16:37:39.040000
|
||||
CVE-2024-38959,0,0,cfec0ef25838165e6aeb5c8d3c664ec76927671369d600966c63c52c96a40800,2024-07-11T15:06:03.203000
|
||||
CVE-2024-3896,0,1,87c9f895ea2e40eafc52aedb21736cfd1d71d76503c57e1946ca9e3025b3ed55,2024-07-24T17:12:32.367000
|
||||
CVE-2024-3896,0,0,87c9f895ea2e40eafc52aedb21736cfd1d71d76503c57e1946ca9e3025b3ed55,2024-07-24T17:12:32.367000
|
||||
CVE-2024-38963,0,0,d6810e29d19f952e1613d829958cfc344b3c3660b4b5f6561b4ad90c435b0dfd,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3897,0,0,5a8068a855e86bb89a1451de196d4bad1fbc355f1787f3259631c60aae1e07ca,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38970,0,0,eb04e06c9fbc74e88c4fcf5d6eeffbd442cec39d7eaf1361f68ecba935eabe9c,2024-07-12T14:51:48.070000
|
||||
@ -255159,7 +255164,7 @@ CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a
|
||||
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
|
||||
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
|
||||
CVE-2024-39340,0,0,8a19ea0d82baf517391d74de09fe55b24d4bbbe3d357c771c961dd3f6f9df19c,2024-07-15T22:15:02.910000
|
||||
CVE-2024-39345,0,1,2a86733888b892cf1f1a4162d3ac0a53217089ddee2bfb34560fb358e3388c2b,2024-07-24T17:12:32.367000
|
||||
CVE-2024-39345,0,0,2a86733888b892cf1f1a4162d3ac0a53217089ddee2bfb34560fb358e3388c2b,2024-07-24T17:12:32.367000
|
||||
CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39348,0,0,798f996b4382b8a6e782460918b5005c42ce376a9b87c3209ffaa4789fe2c24c,2024-06-28T10:27:00.920000
|
||||
CVE-2024-39349,0,0,d94bdd4e2f366e0736711898b6f6670e30f7a98126cdfe514679d42f61eff674,2024-06-28T10:27:00.920000
|
||||
@ -255226,9 +255231,9 @@ CVE-2024-39490,0,0,3a7cfe69ff3072a0b714a0d11ffcf616850cc2417c5fe88da248bebd02107
|
||||
CVE-2024-39491,0,0,af25979e19919d2c32f2a4545b8f16aa1b2a079fea20c3993dde8a730fddf96f,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39492,0,0,625213f757b099ac014e1ec8aa2bfb66b87e041fe2911867f1bfe6984535b4b6,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39493,0,0,edb61e2bdcc22b19fdda7456b1765ba09bdac53634d9f36b25d7f9ffc79b9375,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39494,0,0,ef2864d8be51e5d59ea6972a9da4661770683a47a70a347756a9096b2acb11d9,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39495,0,0,803251bd857d6ccc15eacfd472ce549d7d48ed245d4d9a5c9cd25f3e128d6711,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39496,0,0,468926726e176d92a1425bc3c1c32232cc690ceaaa0294be9a2327ec28bd3cfb,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39494,0,1,cd5b98761898c18d5798c0adfe37b87761d11b3a6881346f26e7cf24a0210e13,2024-07-24T19:17:25.057000
|
||||
CVE-2024-39495,0,1,5f2b306056792f1d74b23afd1a1654b401fffd98eba66c1e3da089b7156ac6f4,2024-07-24T19:04:38.953000
|
||||
CVE-2024-39496,0,1,f3e0050f9f6d4172355944986adc84657f7bcf89e594796ec2a4a696594f9b81,2024-07-24T19:02:36.660000
|
||||
CVE-2024-39497,0,0,2d6d1942d32951f62bed9c7f2b517cbb03d4fdefc867fdac7e0afd61c8c01f96,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39498,0,0,06e845e5de946a201f3f5ec4d08d83e4ee56c45943b0facff867fb70de094147,2024-07-12T16:34:58.687000
|
||||
CVE-2024-39499,0,0,8bd78139ee9d6c3d000d5156a9790ce67d1b2af9b3aee62da6523d24ba14e435,2024-07-12T16:34:58.687000
|
||||
@ -255486,6 +255491,7 @@ CVE-2024-40119,0,0,aa3f22f2b45cca59856fa60c50a815719d2780bf42b0db28717c574ce736b
|
||||
CVE-2024-40129,0,0,ff07d2c16c2d7f391b26147b4d490409bfa9117fc71e9ac1a4c2f99b87b4353c,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-40130,0,0,e8c5d76bc1438487e9c98dcf68a804e04354d33532c30674477455ae2e09b468,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40137,1,1,87af7c12a16acb2a389840419e63627e065241b5c99d013f2eb3094ba75365de,2024-07-24T19:15:04.637000
|
||||
CVE-2024-4014,0,0,b3b1290aefb4c494a91b06e73308720019bcbbd573300060d0dbb0155cbc5507,2024-04-22T13:28:43.747000
|
||||
CVE-2024-4017,0,0,80bc2cfe2c053bce72096cd358a992628c3c16de9493da95b29bf0e4f3e1b16f,2024-04-22T13:28:50.310000
|
||||
CVE-2024-4018,0,0,74eaff707843a7b5f103084c6ce08054e0cc1b873b7afe3ef59eb208a28e4429,2024-04-22T13:28:50.310000
|
||||
@ -255530,7 +255536,7 @@ CVE-2024-40416,0,0,86aaef45b4dd45872bf5a38395b95958dd718e8a7700ea1c997426e37f7c7
|
||||
CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000
|
||||
CVE-2024-4042,0,0,96d4041426aa53c8eaed5efb2fa5542195ac0f31740a6b227c0436d63b09d34b,2024-07-18T16:07:41.967000
|
||||
CVE-2024-40420,0,0,6e460149a3e6ef0d0e6e77ad5f5ac9ffef80b9a3e82ab52e80f4b03f5aaffd87,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40422,1,1,4963621ab414826824241c81a39d448cd61e8f9693236d502f591f85170698f0,2024-07-24T17:12:32.367000
|
||||
CVE-2024-40422,0,0,4963621ab414826824241c81a39d448cd61e8f9693236d502f591f85170698f0,2024-07-24T17:12:32.367000
|
||||
CVE-2024-40425,0,0,ed5ea69d78e69de5a03f2dea647d2c038f05f8f6ff89f420995c2c0d1881d668,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000
|
||||
CVE-2024-40430,0,0,7c58e9bc8510ad060f5e444996a825bf66eaf89868c5789197ff059705e42f6d,2024-07-22T13:00:31.330000
|
||||
@ -255540,6 +255546,7 @@ CVE-2024-40455,0,0,31e25278556a7a569f6d48ca8afce7491b76507f09027ad01ea2eacbbf9dd
|
||||
CVE-2024-40456,0,0,b69676c819bae5d36b3537137bd74debeb1a273fb95e8271fb39d39294f7a466,2024-07-17T13:34:20.520000
|
||||
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
|
||||
CVE-2024-40492,0,0,18603dc677df2f037c3e12bbfcb2354793a3ae9660f3df13b65361dfae39cba9,2024-07-18T12:28:43.707000
|
||||
CVE-2024-40495,1,1,b0de96acd68b371348356a923cdea10e232737434cfb2ab77a5540fd2def635e,2024-07-24T19:15:04.693000
|
||||
CVE-2024-40502,0,0,80ad739d30245682b2de314d0692efbae6d0a48cd212ab5565e45a2b6c762b58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-40503,0,0,b7b74c3ecc2e3dadce6e3ea76ca2bffcfa4a5e02454bb102e0ec56df0b252cc5,2024-07-17T13:34:20.520000
|
||||
CVE-2024-40505,0,0,a786b0d0057f0bbe60b81b592bc5adaae8e017b897b7a005a6c8b1ead930e40f,2024-07-17T13:34:20.520000
|
||||
@ -255573,7 +255580,7 @@ CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f
|
||||
CVE-2024-4056,0,0,b8d993c32e0d1df4fc3c3b0df01e5b9a4366d92d1a2ad184a020d404aa44587a,2024-04-26T12:58:17.720000
|
||||
CVE-2024-40560,0,0,885c8c46bcc9d242b11ff00568640d31e8526b7b94eab8b6f84ddb49fcdedf5c,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
|
||||
CVE-2024-40575,1,1,8361a854071c7d69cd1a3e473058d545702b5888d2814bf11b25808d1337e143,2024-07-24T17:12:32.367000
|
||||
CVE-2024-40575,0,0,8361a854071c7d69cd1a3e473058d545702b5888d2814bf11b25808d1337e143,2024-07-24T17:12:32.367000
|
||||
CVE-2024-4058,0,0,e20d454336ea887bbb54d47433e5560889db558189699560ce98773941e9b99e,2024-06-07T15:40:49.707000
|
||||
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
|
||||
CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000
|
||||
@ -255665,8 +255672,8 @@ CVE-2024-40898,0,0,6d797ebcdf9c53e0eade3a2c00a2f7d68b1d101b3405603dd30cc2157b772
|
||||
CVE-2024-40899,0,0,e950acc969e56b6fc4b2198a92989ebcef19e4b4c9a9c8ad08fee90da2bba031,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40900,0,0,d5b683c8350615b20febf47a29bbffae93edd0a350147e3cd873aa7a5a37926c,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40901,0,0,e26097fb6f292c0ef621a3948768a962501ab86f3daa859d54d1945bd865aa16,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40902,0,0,988693aaf1ca8371af454b8911b3f3f832de3f59b88cfece73771415699cad26,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40903,0,0,ea2d0ae600c90c5131fb1c7bed8d674a784caafee46cbed4180d1d921413cafb,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40902,0,1,2f7d4ca94747f48550a0025dcb58bda474d1a7adef8eacd89e2d7ec7535468d0,2024-07-24T18:52:23.540000
|
||||
CVE-2024-40903,0,1,651b7373d15f2926785ce0de2df21ae36288d984de87f3f47e275557d5da218e,2024-07-24T19:01:54.317000
|
||||
CVE-2024-40904,0,0,9aa568b0e026595888acd360a993289314f39d24eb5e574eafaa70b28e216bd9,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40905,0,0,96eb254d5f8b6d07fa83b1d2229752059acc8f42da01741b8cbd4eaae04230ff,2024-07-12T16:34:58.687000
|
||||
CVE-2024-40906,0,0,5c60c6a51bf3d33fb56a478deec3a7b641b4f91617f4ad721d7d102664d4f879,2024-07-12T16:34:58.687000
|
||||
@ -255791,7 +255798,7 @@ CVE-2024-4106,0,0,3fc11eee434aa540a2e37440bd2e3ba6e18faae117022d3f68496d405f62ba
|
||||
CVE-2024-4107,0,0,ce88498baf95f06d1267d29854f2a9888ac0ddfe7fc00ea3036ccad453e487fa,2024-05-14T16:11:39.510000
|
||||
CVE-2024-41107,0,0,652a52b6606e110f3534fe4630dd6711a03cc8b36414513968170cc7d60165da,2024-07-19T14:15:06.080000
|
||||
CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000
|
||||
CVE-2024-41110,1,1,57c4a02d46f68819ab468fcb7c496560361bf6cb0c8ad019c35ea49425fa6b56,2024-07-24T17:15:11.053000
|
||||
CVE-2024-41110,0,0,57c4a02d46f68819ab468fcb7c496560361bf6cb0c8ad019c35ea49425fa6b56,2024-07-24T17:15:11.053000
|
||||
CVE-2024-41111,0,0,52a25c3214b943235db4ca14cf3f4d1ccd955b2141e1d6abf224fc5c4732905d,2024-07-19T13:01:44.567000
|
||||
CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6cdd,2024-05-17T02:40:15.740000
|
||||
CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000
|
||||
@ -255869,12 +255876,15 @@ CVE-2024-41655,0,0,ef3400d9e58c2cde6c539334829c8042d5ee995783a74a46bd16638786b0b
|
||||
CVE-2024-41656,0,0,d1b3325a39b6b3bcc8a959c5c8544c45c6c0440a0b7279ac0753d809322ad5fb,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4166,0,0,f698286bcd13839c3e713fc944a2d68390d9d1f07ea9696da7a343bdead6335d,2024-05-17T02:40:17.900000
|
||||
CVE-2024-41661,0,0,9bb4ba38de23abec768fb88c25fd9926dc19ebbf46e995b3d88e74cabbdda1a3,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41662,1,1,027a23d20ac7f041b008226b693a861075372c52682261d575778ca6ca9fab2c,2024-07-24T17:15:11.310000
|
||||
CVE-2024-41662,0,0,027a23d20ac7f041b008226b693a861075372c52682261d575778ca6ca9fab2c,2024-07-24T17:15:11.310000
|
||||
CVE-2024-41663,0,0,2b5ce53141b2de9b74a60e92e3f30deaac3830f3d557479059cba8f6054aac58,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41664,0,0,968689d7fd6f27159fff0941cd7d62708c912d0aa7f698a223c6de5e87e7791e,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41665,0,0,abaea4fdc3c53915a3209a944b40b8fe3a83fdbd0827e5893c651a4d0f6386e2,2024-07-24T12:55:13.223000
|
||||
CVE-2024-41666,1,1,cc3fd73062efb2936120c102f2985762b4a922ac1e8ab8c2cab7a268f65cba88,2024-07-24T18:15:05.090000
|
||||
CVE-2024-41667,1,1,1f9db84f3f6fead0dc9db71fdbfa16e28b3702084aeef443585f27944b2afe0e,2024-07-24T18:15:05.310000
|
||||
CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca747be,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000
|
||||
CVE-2024-41672,1,1,85102b17f81785d70b6bc95473e15cb41b94b472a01f04c8239327e5cecce8cb,2024-07-24T18:15:05.527000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-4169,0,0,c62ff626929882f5d2c6f5c5b02ad92c379b5b400e34f72b774f8d063efba0f1,2024-06-04T19:20:31.780000
|
||||
CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000
|
||||
@ -255904,7 +255914,7 @@ CVE-2024-4185,0,0,2ebb1e96affd30f65338d1aa453a686ffeaefddcc6c26d6c3c25de17e937fc
|
||||
CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000
|
||||
CVE-2024-41880,0,0,2045bc24fb104b692bbe32c5951eb01a25f3639f665062ea76ff47318e893861,2024-07-24T12:55:13.223000
|
||||
CVE-2024-4190,0,0,937461468fcd73b26e47070e7d0620ac3009210ef2f47e2156f0b87dd1c21bc4,2024-06-13T18:36:09.013000
|
||||
CVE-2024-41914,0,1,7ab23e43d61c969fead285fe596044f42ea4738f0bf39e697d71d27eaf24f8c6,2024-07-24T17:12:32.367000
|
||||
CVE-2024-41914,0,0,7ab23e43d61c969fead285fe596044f42ea4738f0bf39e697d71d27eaf24f8c6,2024-07-24T17:12:32.367000
|
||||
CVE-2024-4192,0,0,0768e429bccaed861e82d220deefd437e5feb26a94e95c7a121626318970662c,2024-05-01T13:02:20.750000
|
||||
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4194,0,0,cb2c64b568e3bd7c78c9d4f736651c66722818abe246f3bc5aedd70e3521cb96,2024-06-06T14:17:35.017000
|
||||
@ -256135,7 +256145,7 @@ CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88f
|
||||
CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000
|
||||
CVE-2024-4456,0,0,4944908816b0dabd168db28a33c87155bafc589f1ccdd7f87c25aad569cea442,2024-05-08T13:15:00.690000
|
||||
CVE-2024-4458,0,0,f73d3a9908e02d441bab814d40431eeafad3dd8ce4b9e612f8156ad497e2e4eb,2024-06-06T14:17:35.017000
|
||||
CVE-2024-4459,0,0,f9d161a4d9183a59b71c67982b8099f68d64014c6e49958fd77d66590bbbf6f1,2024-06-06T14:17:35.017000
|
||||
CVE-2024-4459,0,1,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000
|
||||
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
|
||||
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
|
||||
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
|
||||
@ -256272,7 +256282,7 @@ CVE-2024-4603,0,0,7bca9f2dadfec866e13d2cb237a0cdfb3e7733f93330ed987bf2cce70155b7
|
||||
CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000
|
||||
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4606,0,0,1762c1d15ebc2ec60093a6d78e47c2427107d80c6a65abde0809dacb63c557b9,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4608,0,1,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
||||
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
CVE-2024-4610,0,0,9d1f5948ee247bb460ec957dcfec1558fe286260475ff78c506e184740f1e859,2024-07-03T02:07:50.390000
|
||||
CVE-2024-4611,0,0,51a3d5438728b832e97210e2f9860d8c98e7a9272bd8319e6cdccdf57653adc1,2024-05-29T13:02:09.280000
|
||||
@ -256355,7 +256365,7 @@ CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a257803
|
||||
CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
|
||||
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000
|
||||
CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4707,0,1,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
|
||||
CVE-2024-4708,0,0,8cec8d3c98f03426276473bd86d4c40854969a664eb1a1ad68a38c039fa7f150,2024-07-03T12:53:24.977000
|
||||
CVE-2024-4709,0,0,291d83b7a71e23f3ddf2ffe4b4f9de6c9c89e71bab3de54c457add53e92c99e9,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4710,0,0,bc3d641a4dcd652350f442cdc80714adde1798c9afb82fb5cdb92bbe3aa27b20,2024-05-21T12:37:59.687000
|
||||
@ -256398,7 +256408,7 @@ CVE-2024-4749,0,0,247ef47fe14e2f3c30261b0797a6006095cb7721478ad0f0b62ea1bc828e91
|
||||
CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,0,0,4a5505fa6c4a26d1ebadf255bdcb189a3f8a4e23e25b830092ad73bb71504b01,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4752,0,0,f168ba945180fbe043a32a258fdb26c4bd817ecdcef6ee3e8dbf46da0da37e29,2024-07-15T13:00:34.853000
|
||||
CVE-2024-4753,0,0,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-4753,0,1,5d474e8f687e7d7ee7f353935d9c97b0087984d14674fcf222b18c206cddfb8a,2024-07-24T19:53:04.617000
|
||||
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
CVE-2024-4756,0,0,149e542e60f3cf04ee5845a2ca397b471809d8a4131bc1cd55ab960278b7539b,2024-06-07T14:56:05.647000
|
||||
@ -256720,7 +256730,7 @@ CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c
|
||||
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
|
||||
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
|
||||
CVE-2024-5138,0,0,f1b79bdf375efa3e69b9bd2975c7545f101040d8757ad73fa8febb232dcb7ec1,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5141,0,1,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
|
||||
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
|
||||
CVE-2024-5142,0,0,119bfee848baf758cd8a11edf4272de8bc87d85b266606835e501ab753b0716a,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5143,0,0,e21a987518c06589a6da36e0d35257f005aa787fff502677dfeaefae4b228c17,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
|
||||
@ -256729,8 +256739,8 @@ CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe73
|
||||
CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000
|
||||
CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5151,0,0,ad1fc500121b870dcb89d61dc389b45e74c596af15ff84262d6f22aae7a67508,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5152,0,1,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000
|
||||
CVE-2024-5153,0,1,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000
|
||||
CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000
|
||||
CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000
|
||||
CVE-2024-5154,0,0,c37a1c166e2341b63fc43ba0c7b0c57b683b1792a775d103939216c8339749a9,2024-07-17T05:15:10.880000
|
||||
CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000
|
||||
CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000
|
||||
@ -256738,8 +256748,8 @@ CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe5994
|
||||
CVE-2024-5158,0,0,8c70fcc8db449f9a5a335015df1612ab2222ce3250558850ee4d694ef204cd6f,2024-07-03T02:08:35.143000
|
||||
CVE-2024-5159,0,0,9a9b3de45c6c36099e2df42ed5c739b91b4960d213fd6f345b99527b20e821e8,2024-07-03T02:08:35.967000
|
||||
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
|
||||
CVE-2024-5161,0,1,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
|
||||
CVE-2024-5162,0,1,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000
|
||||
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
|
||||
CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000
|
||||
CVE-2024-5163,0,0,bdc81db4ac58629f980356520760931bcc42aa23cfccd4fdeb3934ec7b891de9,2024-07-03T02:08:37.670000
|
||||
CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000
|
||||
@ -256877,7 +256887,7 @@ CVE-2024-5317,0,0,ca9413f34c0b442e0ebe516eaf4713c47241a346ee54ab90be673b58c28dbb
|
||||
CVE-2024-5318,0,0,57c4f59f6a451d6f05e81bdd8afab94c5de1c9afb56a5a0aa1d0fc569b3192c2,2024-05-24T18:09:20.027000
|
||||
CVE-2024-5321,0,0,fec7922c58ce8cd726297ee4febb74d7bc97b03487c287977380c1cb890912c0,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570df,2024-07-02T12:09:16.907000
|
||||
CVE-2024-5324,0,1,68af38ce3b695644cbcf19d3a148fcefd2523c0cdca6a2454fd88f0297edc15c,2024-07-24T17:42:49.020000
|
||||
CVE-2024-5324,0,0,68af38ce3b695644cbcf19d3a148fcefd2523c0cdca6a2454fd88f0297edc15c,2024-07-24T17:42:49.020000
|
||||
CVE-2024-5325,0,0,3161b31796f943a80af27275e8f23d08c58d4d31d567c9aa76aee11dec3e806e,2024-07-12T16:34:58.687000
|
||||
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5327,0,0,4827791dbb34368c55d6cd06e5ae60d7938f5b7d8da35d37ecd04c9478388419,2024-05-30T13:15:41.297000
|
||||
@ -256987,7 +256997,7 @@ CVE-2024-5443,0,0,5355e7ea1610df75dc467c6771933fd6a627b9eafa985364872ccc88c9e02e
|
||||
CVE-2024-5444,0,0,7a2603f1e6478613a17365e974ef612aa2f89724976e490873c8e2e39efd0067,2024-07-15T13:41:20.447000
|
||||
CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000
|
||||
CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000
|
||||
CVE-2024-5449,0,1,c1e6c0786c1e275f994246efd4bba7bddfb8ded5af596514af2741d165623e37,2024-07-24T17:47:44.637000
|
||||
CVE-2024-5449,0,0,c1e6c0786c1e275f994246efd4bba7bddfb8ded5af596514af2741d165623e37,2024-07-24T17:47:44.637000
|
||||
CVE-2024-5450,0,0,80002c52fa004acd100f77f277a6657bbab887f4ecf21032f57c390f6fb18acb,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5451,0,0,2896975541f1deb7d32c27fb696c9ed10757c5f40f89d620628d7346403ef637,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5452,0,0,78c116a6a9dc3570ee7c04955c3fdb947d6a087a3e839a7cc2b81e0409d936d8,2024-06-07T14:56:05.647000
|
||||
@ -257113,7 +257123,7 @@ CVE-2024-5618,0,0,ebe36b14a25a2ade3e64c60f6c84014fea87ffe3e6c056e2ec2d4c12a7dbd5
|
||||
CVE-2024-5619,0,0,1dd4749b6be6d7e6dc7272136e2a3e724b171183a64961a248fdb4990b57a472,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5620,0,0,e414f2b903fd835e5fe0db0e605e2aee6c78620744a7541756005a422222af46,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5625,0,0,2e44049535f78135e500a8f8d54d8f4d59ba5936e80e3b134df5c51262f22971,2024-07-19T13:01:44.567000
|
||||
CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5626,0,1,4d44d16ebb40f7dcbdd8f966d6064f08980c676d5cdd8597fffcc24e77ebd509,2024-07-24T19:52:09.273000
|
||||
CVE-2024-5627,0,0,b223ea977e14432dc305de4592ca7e0252873a120062584093cd834d6b6d0c82,2024-07-15T13:00:34.853000
|
||||
CVE-2024-5629,0,0,7b249822418cf5aa1c707605ba6baf660f2f435a4da7f400697e48d05f897bc1,2024-06-18T18:31:05.663000
|
||||
CVE-2024-5630,0,0,f9c6a42aee5daa3d50f3d4f8a05899c87348bb902884a0d46ccac4fec00f266e,2024-07-16T18:10:17.693000
|
||||
@ -257249,13 +257259,13 @@ CVE-2024-5804,0,0,944c60e3868cb88abd10c74562e980fee4d055c47351e0f84fb7de6b37f889
|
||||
CVE-2024-5805,0,0,f734cfbda04e521c3e66e4ddc2a1025a96de47f7633c45b189fcc72ae4a4191a,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5806,0,0,91588fb1cdb8115c3da665d3d031e599ad42ef712f85a57d764591dd0370421d,2024-06-26T00:15:11.293000
|
||||
CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773fa,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5811,0,0,d3e3c10745e2c3778d30791400c68b545b10596257ee108655514d6181571546,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5811,0,1,ed199cd1888a7a079b0f8dda911181091f221cb3baa9309d375439b25d6f23c2,2024-07-24T19:41:17.503000
|
||||
CVE-2024-5812,0,0,05caee51ca8afdeadb9e9ce4e5c443d53c88017db3fdf90c8036b6c5139928b3,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232d2,2024-06-13T18:36:45.417000
|
||||
CVE-2024-5815,0,0,9c0e5d25f32c2dbefca23815fc2b16e88ce81dd54b9a22e21c721a2b2a9cb1cc,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5816,0,0,3d67952ce4a1b2b1ece947260f0beee9de9f9da521a3f15a0343c5e1d47b81ea,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5817,0,0,e05abd62bd06ccb376baea6b1d5f924e4e6fb0941dae50b59d4aa5f4c769fe7a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-5818,0,1,3babd5eaff075708fb30e27f0d14671bd636258d2e5fc5a9da724c7d1b08af68,2024-07-24T17:12:32.367000
|
||||
CVE-2024-5818,0,0,3babd5eaff075708fb30e27f0d14671bd636258d2e5fc5a9da724c7d1b08af68,2024-07-24T17:12:32.367000
|
||||
CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd27,2024-07-01T12:37:24.220000
|
||||
CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000
|
||||
CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000
|
||||
@ -257442,7 +257452,7 @@ CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69
|
||||
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6094,0,0,d7f2cdb304cc396e64e032d9bb4fe0d71d15cb3ae6b14e9986dd1176fe25d9f4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
|
||||
CVE-2024-6096,0,1,8ccc60f574d33651c90cd28e6c786ffed5c3326b06805b8f50f16d3e1b4ef2dd,2024-07-24T17:12:32.367000
|
||||
CVE-2024-6096,0,0,8ccc60f574d33651c90cd28e6c786ffed5c3326b06805b8f50f16d3e1b4ef2dd,2024-07-24T17:12:32.367000
|
||||
CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000
|
||||
CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000
|
||||
CVE-2024-6101,0,0,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000
|
||||
@ -257606,7 +257616,7 @@ CVE-2024-6321,0,0,23af826e4693bc2738f8ec7dcb0f933eeef79b645dd2f2305f1f94359ced50
|
||||
CVE-2024-6323,0,0,16f93962f537d8478d96317e8b0d9cad0e3aee225ed0ebdb8d6f6bf214bb804e,2024-06-28T13:15:19.317000
|
||||
CVE-2024-6325,0,0,3ea6578ebdd2a7633259d686c429ab9b3e7708f0e981d10184478f4442c00880,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6326,0,0,e689387b2cb49e7365da7fd7c751e52e0ede20a7a6c6966f5f5b92a6b53089de,2024-07-16T18:00:02.110000
|
||||
CVE-2024-6327,0,1,03f55385a24637d78f8bbfee8eb5ee6acf91ca188f1cf8fb80c2759eb8eb2dab,2024-07-24T17:12:32.367000
|
||||
CVE-2024-6327,0,0,03f55385a24637d78f8bbfee8eb5ee6acf91ca188f1cf8fb80c2759eb8eb2dab,2024-07-24T17:12:32.367000
|
||||
CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8cbc,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000
|
||||
@ -257635,7 +257645,7 @@ CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b3
|
||||
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6387,0,0,5f5001ecbff64778026589d3b2a2dbe62cc4c06621a457160b01dfca5694806b,2024-07-23T22:15:09.313000
|
||||
CVE-2024-6387,0,1,f3759add0d8750c77d1d649335f19913d0182b0a803cc4bc186624ba4876a3ad,2024-07-24T18:07:19.347000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6391,0,0,f39301e9680e09028795caddd1f0219ac421e8fbe3773aa2e024531728c8f9e1,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6392,0,0,f361942df6276a0c96574512bc05717f2075a1be2cafe6840357bf3e68ede92f,2024-07-12T12:49:07.030000
|
||||
@ -257845,10 +257855,10 @@ CVE-2024-6895,0,0,ba732cd0d0196677d9fba02b4344054d4844d09e5d174114e4dcf4446ecf92
|
||||
CVE-2024-6896,0,0,801c74edfd9bf4c5786030707fac190d86b113e6627f16ad4c2e5810705558a7,2024-07-24T12:55:13.223000
|
||||
CVE-2024-6898,0,0,98dae2dc951da0c9f1ac4e695a7ad38573b2abb15f5508f51642ed9635c194c6,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6899,0,0,397359020457c655f416abd05bdc982e2cbc9cd703cb46d21be66b71a5df8e91,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6900,0,1,e500188038c3ea14b8e23eb8bbafe809d907d6d44fb62c1134048b209905575c,2024-07-24T16:55:06.977000
|
||||
CVE-2024-6901,0,1,5b35468e95067e893aef6f3b2a5c35230a71dda604aa4246e174e6067847a2c6,2024-07-24T16:55:57.230000
|
||||
CVE-2024-6902,0,1,9b85a01f5de4fc5c3a3410cfeacfa5e7187e00590b2e96e858dd024e26f3a385,2024-07-24T16:55:37.197000
|
||||
CVE-2024-6903,0,1,3562be7283cd266c32fb750a7d46a5a631a70817178a7f6f69f1ad8349916e1d,2024-07-24T16:56:18.070000
|
||||
CVE-2024-6900,0,0,e500188038c3ea14b8e23eb8bbafe809d907d6d44fb62c1134048b209905575c,2024-07-24T16:55:06.977000
|
||||
CVE-2024-6901,0,0,5b35468e95067e893aef6f3b2a5c35230a71dda604aa4246e174e6067847a2c6,2024-07-24T16:55:57.230000
|
||||
CVE-2024-6902,0,0,9b85a01f5de4fc5c3a3410cfeacfa5e7187e00590b2e96e858dd024e26f3a385,2024-07-24T16:55:37.197000
|
||||
CVE-2024-6903,0,0,3562be7283cd266c32fb750a7d46a5a631a70817178a7f6f69f1ad8349916e1d,2024-07-24T16:56:18.070000
|
||||
CVE-2024-6904,0,0,60a89a4626a1964bd018cfabe32fc1d85b23351d4c706882a497bf04531664f1,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6905,0,0,8fc776bf9fa4350104cb7a97d75c3f12956fd9d4638b78f2d808e195f3991135,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6906,0,0,9e40f187cd4da90adccf007ba1893c4ad127ba3945e95eb45170fe5a98bef8ec,2024-07-19T13:01:44.567000
|
||||
@ -257901,7 +257911,7 @@ CVE-2024-7014,0,0,bf4bcb57365a86d29a45ebd019245eec542daaec8aac5d2bd790565f954bcf
|
||||
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7065,0,0,861ad9f4a94f327ec6cfd0f89d5da23664e863601bc1e4fe87c301d15a9d3692,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7066,0,0,f0b9597030c216e17a91b9bbd330c3ccd1220fd3a9abefaf98fb6df981dc96f4,2024-07-24T12:55:13.223000
|
||||
CVE-2024-7067,0,1,cd81f5e59f5ccc969e002fbd0535f928704dbb9e13b2c7b953cab40d6b4980c7,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7068,0,1,eb9a728b0e4f24863b90d18d69d6956459c7f7f272d8ea5eb0f258d70cb7d654,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7069,1,1,c4ab9f752bac2645a76cae34601a6412cc6a70cc3262d39aa941af9fa7d8f5b8,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7079,1,1,af9d3a4629d0dee8d9c1382cf5b8b38f2af1c4359748e6b63c5acce1d7ffd90b,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7067,0,0,cd81f5e59f5ccc969e002fbd0535f928704dbb9e13b2c7b953cab40d6b4980c7,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7068,0,0,eb9a728b0e4f24863b90d18d69d6956459c7f7f272d8ea5eb0f258d70cb7d654,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7069,0,0,c4ab9f752bac2645a76cae34601a6412cc6a70cc3262d39aa941af9fa7d8f5b8,2024-07-24T17:12:32.367000
|
||||
CVE-2024-7079,0,0,af9d3a4629d0dee8d9c1382cf5b8b38f2af1c4359748e6b63c5acce1d7ffd90b,2024-07-24T17:12:32.367000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user