mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-09-19T20:00:17.597789+00:00
This commit is contained in:
parent
cb37cfe2ff
commit
1aa41e63c7
@ -2,10 +2,10 @@
|
||||
"id": "CVE-2013-0643",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2013-02-27T00:55:01.017",
|
||||
"lastModified": "2024-09-18T19:35:01.410",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T19:48:10.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\r\n\r\n'Flash Player 11.6.602.168 and earlier versions for Windows \r\nFlash Player 11.6.602.167 and earlier versions for Macintosh\r\nFlash Player 11.2.202.270 and earlier for Linux'",
|
||||
"evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\n\n'Flash Player 11.6.602.168 and earlier versions for Windows \nFlash Player 11.6.602.167 and earlier versions for Macintosh\nFlash Player 11.2.202.270 and earlier for Linux'",
|
||||
"cisaExploitAdd": "2024-09-17",
|
||||
"cisaActionDue": "2024-10-08",
|
||||
"cisaRequiredAction": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",
|
||||
@ -22,6 +22,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -76,7 +96,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -102,16 +122,15 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.3",
|
||||
"versionEndExcluding": "10.3.183.67",
|
||||
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
|
||||
"matchCriteriaId": "1CCB5060-546D-4023-8E02-E330E9DF33A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.6",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.6.602.171",
|
||||
"matchCriteriaId": "429D84D8-F0CF-4532-B0C8-EF3B4700F191"
|
||||
"matchCriteriaId": "73216ADC-DAB5-4679-835E-0601EBC9E828"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -143,16 +162,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.3",
|
||||
"versionEndExcluding": "10.3.183.67",
|
||||
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.2.202.273",
|
||||
"matchCriteriaId": "BB9395A3-F409-45B2-B877-5D4F5DD20F72"
|
||||
"matchCriteriaId": "0FE3C70F-1D0D-4FB8-A747-4F3594A888DF"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -168,6 +180,81 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -175,24 +262,21 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -206,6 +290,7 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-0648",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2013-02-27T00:55:01.160",
|
||||
"lastModified": "2024-09-18T19:35:02.327",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T19:51:57.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb13-08.html\r\n\r\n'Flash Player 11.6.602.168 and earlier versions for Windows \r\nFlash Player 11.6.602.167 and earlier versions for Macintosh\r\nFlash Player 11.2.202.270 and earlier for Linux'",
|
||||
"cisaExploitAdd": "2024-09-17",
|
||||
@ -22,6 +22,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -92,16 +112,15 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.3",
|
||||
"versionEndExcluding": "10.3.183.67",
|
||||
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
|
||||
"matchCriteriaId": "1CCB5060-546D-4023-8E02-E330E9DF33A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.6",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.6.602.171",
|
||||
"matchCriteriaId": "429D84D8-F0CF-4532-B0C8-EF3B4700F191"
|
||||
"matchCriteriaId": "73216ADC-DAB5-4679-835E-0601EBC9E828"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -133,16 +152,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.3",
|
||||
"versionEndExcluding": "10.3.183.67",
|
||||
"matchCriteriaId": "335A8B62-0556-4DEB-A786-A06B9F396D57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.2",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.2.202.273",
|
||||
"matchCriteriaId": "BB9395A3-F409-45B2-B877-5D4F5DD20F72"
|
||||
"matchCriteriaId": "0FE3C70F-1D0D-4FB8-A747-4F3594A888DF"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -158,6 +170,81 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
|
||||
"matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -165,24 +252,21 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00025.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00026.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00035.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -196,6 +280,7 @@
|
||||
"url": "http://www.adobe.com/support/security/bulletins/apsb13-08.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-0497",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2014-02-05T05:15:29.897",
|
||||
"lastModified": "2024-09-18T19:35:02.543",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T19:56:17.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-17",
|
||||
"cisaActionDue": "2024-10-08",
|
||||
@ -21,6 +21,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -75,7 +95,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-189"
|
||||
"value": "CWE-191"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,9 +121,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.2.202.336",
|
||||
"matchCriteriaId": "E069816A-A585-4546-B344-6E7831B8749C"
|
||||
"matchCriteriaId": "0FFB96CE-2C20-471A-BA61-36909F36400F"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -130,16 +149,15 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.7.700.261",
|
||||
"matchCriteriaId": "73692E91-A04B-4F58-8AC4-B635E3848540"
|
||||
"matchCriteriaId": "D00F33E5-B1D9-4D70-9BA7-994BB84A423D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.8",
|
||||
"versionStartIncluding": "11.8.800.94",
|
||||
"versionEndExcluding": "12.0.0.44",
|
||||
"matchCriteriaId": "0CD2FFF0-5A3C-4593-A6F5-9C6941747468"
|
||||
"matchCriteriaId": "53CBCC27-0B1B-4DAA-990E-A724720C3C58"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -160,6 +178,134 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "32.0.1700.107",
|
||||
"matchCriteriaId": "D956DCBD-B205-4A80-A8C5-82C186F50DEF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -167,13 +313,14 @@
|
||||
"url": "http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-04.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -182,24 +329,21 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -213,6 +357,7 @@
|
||||
"url": "http://secunia.com/advisories/56437",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -220,6 +365,7 @@
|
||||
"url": "http://secunia.com/advisories/56737",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -227,6 +373,7 @@
|
||||
"url": "http://secunia.com/advisories/56780",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -234,6 +381,7 @@
|
||||
"url": "http://secunia.com/advisories/56799",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -241,6 +389,7 @@
|
||||
"url": "http://secunia.com/advisories/56839",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -263,6 +412,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/65327",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -271,6 +421,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1029715",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-0502",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2014-02-21T05:07:00.017",
|
||||
"lastModified": "2024-09-18T19:35:03.393",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T19:53:44.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-17",
|
||||
"cisaActionDue": "2024-10-08",
|
||||
@ -21,6 +21,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -75,7 +95,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-399"
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -101,23 +121,15 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.7.700.269",
|
||||
"matchCriteriaId": "6C9AF7F7-0F10-49B7-B488-F0E12692FCD0"
|
||||
"matchCriteriaId": "CE22099C-BC63-499E-A515-EFFEA7F5EEFF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.8",
|
||||
"versionEndExcluding": "11.8.800.175",
|
||||
"matchCriteriaId": "EF750BDF-A76B-4967-8BD4-9B6F3336156D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.9",
|
||||
"versionStartIncluding": "11.8.800.94",
|
||||
"versionEndExcluding": "12.0.0.70",
|
||||
"matchCriteriaId": "2ECFF685-8C36-4804-9815-E5A9484D4253"
|
||||
"matchCriteriaId": "5695E310-F309-4E89-B0B2-A43E922BEF26"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -127,8 +139,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
|
||||
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
@ -165,9 +177,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.2.202.341",
|
||||
"matchCriteriaId": "EBCC4F71-82B0-41D9-B184-96652760AAE5"
|
||||
"matchCriteriaId": "1AF78710-B045-41A8-A080-FA287D72BB8F"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -177,8 +188,36 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.0.0.1628",
|
||||
"matchCriteriaId": "6ED74F32-A4F4-424C-B9E7-C54F3DAFFDE6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -192,9 +231,73 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.0.0.1628",
|
||||
"matchCriteriaId": "6ED74F32-A4F4-424C-B9E7-C54F3DAFFDE6"
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -206,6 +309,7 @@
|
||||
"url": "http://helpx.adobe.com/security/products/flash-player/apsb14-07.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
@ -214,24 +318,21 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -252,6 +353,7 @@
|
||||
"url": "http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -259,6 +361,7 @@
|
||||
"url": "https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html",
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-1069",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2019-06-12T14:29:04.337",
|
||||
"lastModified": "2024-09-19T01:00:03.107",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T19:58:01.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-18",
|
||||
"cisaActionDue": "2024-10-09",
|
||||
@ -22,8 +22,8 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -40,15 +40,13 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -121,54 +119,54 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB"
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "37097C39-D588-4018-B94D-5EB87B1E3D5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "530DF8C9-467C-4F4F-9FCA-CDD934BADF3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-3156",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-01-26T21:15:12.987",
|
||||
"lastModified": "2024-09-18T17:15:13.843",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-09-19T19:58:23.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2022-04-06",
|
||||
"cisaActionDue": "2022-04-27",
|
||||
@ -760,7 +760,11 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2023-30464",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-18T21:15:13.080",
|
||||
"lastModified": "2024-09-18T21:15:13.080",
|
||||
"lastModified": "2024-09-19T19:35:01.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "CoreDNS hasta la versi\u00f3n 1.10.1 permite a los atacantes lograr envenenamiento de cach\u00e9 DNS e inyectar respuestas falsas a trav\u00e9s de un ataque de cumplea\u00f1os."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40654",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-10-08T04:15:57.893",
|
||||
"lastModified": "2023-10-11T19:08:04.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T18:35:02.187",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T20:15:13.250",
|
||||
"lastModified": "2023-10-07T02:52:28.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:04.850",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44833",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.807",
|
||||
"lastModified": "2023-10-07T03:17:11.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:05.797",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44834",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.863",
|
||||
"lastModified": "2023-10-07T03:17:41.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:06.803",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44835",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.917",
|
||||
"lastModified": "2023-10-07T03:17:27.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:07.573",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44836",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:11.973",
|
||||
"lastModified": "2023-10-06T15:20:09.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:08.333",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-44837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-05T16:15:12.020",
|
||||
"lastModified": "2023-10-06T15:19:36.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:09.180",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45282",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-06T19:15:12.950",
|
||||
"lastModified": "2023-11-02T01:23:35.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:10.307",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45303",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-06T19:15:13.040",
|
||||
"lastModified": "2023-10-12T18:10:31.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:11.117",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -69,6 +69,16 @@
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45370",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-09T06:15:10.470",
|
||||
"lastModified": "2023-10-12T16:05:00.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T18:35:05.060",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45372",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-09T06:15:10.607",
|
||||
"lastModified": "2023-10-12T16:04:34.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T18:35:05.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45374",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-09T06:15:10.723",
|
||||
"lastModified": "2023-10-12T16:06:05.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T18:35:06.723",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4585",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2023-09-11T09:15:09.797",
|
||||
"lastModified": "2023-12-21T00:57:28.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T19:35:12.583",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-0220",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2024-02-22T11:15:08.840",
|
||||
"lastModified": "2024-05-27T08:15:09.070",
|
||||
"lastModified": "2024-09-19T18:15:05.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,16 +46,12 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
"value": "CWE-1240"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-0335",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2024-04-03T19:15:43.743",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-09-19T18:15:05.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may \nbe used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)\n\nThis issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2.\n\n"
|
||||
"value": "ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may \nbe used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)\n\n\nThis issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
29
CVE-2024/CVE-2024-256xx/CVE-2024-25673.json
Normal file
29
CVE-2024/CVE-2024-256xx/CVE-2024-25673.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-25673",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-19T19:15:24.093",
|
||||
"lastModified": "2024-09-19T19:15:24.093",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Couchbase Server 7.6.x before 7.6.2, 7.2.x before 7.2.6, and all earlier versions allows HTTP Host header injection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://forums.couchbase.com/tags/security",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27348",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-04-22T14:15:07.420",
|
||||
"lastModified": "2024-09-19T01:00:03.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T19:55:24.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"cisaExploitAdd": "2024-09-18",
|
||||
"cisaActionDue": "2024-10-09",
|
||||
@ -21,6 +21,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -44,6 +64,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -55,18 +85,75 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/22/3",
|
||||
"source": "security@apache.org"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:hugegraph:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0.0",
|
||||
"versionEndExcluding": "1.3.0",
|
||||
"matchCriteriaId": "5DDD7AA3-3439-48D7-B24B-1D9D31B284BD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hugegraph.apache.org/docs/config/config-authentication/#configure-user-authentication",
|
||||
"source": "security@apache.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDA29D0B-F022-4711-ABE9-4221E57FAF17"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9",
|
||||
"source": "security@apache.org"
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:oracle:jdk:11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CD5164A-75F9-46AC-A7D4-0323A4A2D915"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4A9D4C2-98A6-43F0-A925-8A84AB3040AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:a:oracle:jre:11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A5E4F97-F7D9-42CE-8A7A-902B4768C60F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/22/3",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://hugegraph.apache.org/docs/config/config-authentication/#configure-user-authentication",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9",
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-31414",
|
||||
"sourceIdentifier": "CybersecurityCOE@eaton.com",
|
||||
"published": "2024-09-13T17:15:11.707",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:48:25.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Eaton Foreseer software provides users the capability to customize the dashboard in WebView pages. However, the input fields for this feature in the Eaton Foreseer software lacked proper input sanitization on the server-side, which could lead to injection and execution of malicious scripts when abused by bad actors."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El software Eaton Foreseer ofrece a los usuarios la posibilidad de personalizar el panel de control en las p\u00e1ginas WebView. Sin embargo, los campos de entrada para esta funci\u00f3n en el software Eaton Foreseer carec\u00edan de una desinfecci\u00f3n de entrada adecuada en el lado del servidor, lo que pod\u00eda provocar la inyecci\u00f3n y ejecuci\u00f3n de scripts maliciosos cuando los actores maliciosos los utilizaban de forma abusiva."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
|
||||
"source": "CybersecurityCOE@eaton.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.8.600",
|
||||
"matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-31415",
|
||||
"sourceIdentifier": "CybersecurityCOE@eaton.com",
|
||||
"published": "2024-09-13T17:15:11.907",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:50:27.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Eaton Foreseer software provides the feasibility for the user to configure external servers for multiple purposes such as network management, user management, etc. The software uses encryption to store these configurations securely on the host machine. However, the keys used for this encryption were insecurely stored, which could be abused to possibly change or remove the server configuration."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El software Eaton Foreseer ofrece al usuario la posibilidad de configurar servidores externos para m\u00faltiples prop\u00f3sitos, como administraci\u00f3n de red, administraci\u00f3n de usuarios, etc. El software utiliza cifrado para almacenar estas configuraciones de forma segura en la m\u00e1quina host. Sin embargo, las claves utilizadas para este cifrado se almacenaron de forma insegura, lo que podr\u00eda utilizarse de forma indebida para cambiar o eliminar la configuraci\u00f3n del servidor."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
|
||||
"source": "CybersecurityCOE@eaton.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.8.600",
|
||||
"matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-31416",
|
||||
"sourceIdentifier": "CybersecurityCOE@eaton.com",
|
||||
"published": "2024-09-13T17:15:12.090",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T19:06:59.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El software Eaton Foreseer ofrece m\u00faltiples campos de entrada personalizables para que los usuarios configuren par\u00e1metros en la herramienta, como alarmas, informes, etc. Algunos de estos campos de entrada no verificaban la longitud y los l\u00edmites del valor ingresado. Si un actor malintencionado aprovecha esta falla de seguridad, puede resultar en un consumo excesivo de memoria o un desbordamiento de n\u00fameros enteros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
|
||||
"source": "CybersecurityCOE@eaton.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "7.8.600",
|
||||
"matchCriteriaId": "9F67BFC9-4D31-42C3-804D-C7F0B6CA8E89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf",
|
||||
"source": "CybersecurityCOE@eaton.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-331xx/CVE-2024-33109.json
Normal file
48
CVE-2024/CVE-2024-331xx/CVE-2024-33109.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-33109",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-19T19:15:24.170",
|
||||
"lastModified": "2024-09-19T19:15:24.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://tiptel.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.bdosecurity.de/en-gb/advisories/cve-2024-33109",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34343",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-05T21:15:38.257",
|
||||
"lastModified": "2024-08-06T16:30:24.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T19:57:52.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf",
|
||||
"source": "security-advisories@github.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.12.4",
|
||||
"matchCriteriaId": "BB92C785-9011-406E-A048-9FEC653045EC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-vf6r-87q4-2vjf",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-401xx/CVE-2024-40125.json
Normal file
25
CVE-2024/CVE-2024-401xx/CVE-2024-40125.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-40125",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-19T19:15:24.350",
|
||||
"lastModified": "2024-09-19T19:15:24.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the Media Manager function of Closed-Loop Technology CLESS Server v4.5.2 allows attackers to execute arbitrary code via uploading a crafted PHP file to the upload endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/brendontkl/My-CVEs/tree/main/CVE-2024-40125",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.closed-loop.biz/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-40568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-18T21:15:13.390",
|
||||
"lastModified": "2024-09-18T21:15:13.390",
|
||||
"lastModified": "2024-09-19T19:35:13.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in btstack mesh commit before v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 allows a remote attacker to execute arbitrary code via the pb_adv_handle_tranaction_cont function in the src/mesh/pb_adv.c component"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de desbordamiento de b\u00fafer en el commit de btstack mesh anterior a v.864e2f2b6b7878c8fab3cf5ee84ae566e3380c58 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n pb_adv_handle_tranaction_cont en el componente src/mesh/pb_adv.c"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaobye-ctf/My-CVE/tree/main/BTstack/CVE-2024-40568",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45159",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-05T19:15:13.150",
|
||||
"lastModified": "2024-09-06T12:08:04.550",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T18:26:24.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,82 @@
|
||||
"value": "Se descubri\u00f3 un problema en Mbed TLS 3.x antes de la versi\u00f3n 3.6.1. Con TLS 1.3, cuando un servidor habilita la autenticaci\u00f3n opcional del cliente, si el certificado proporcionado por el cliente no tiene los valores adecuados en las extensiones if keyUsage o extKeyUsage, el valor de retorno de mbedtls_ssl_get_verify_result() tendr\u00eda incorrectamente los bits MBEDTLS_X509_BADCERT_KEY_USAGE y MBEDTLS_X509_BADCERT_KEY_USAGE limpios. Como resultado, un atacante que tuviera un certificado v\u00e1lido para usos distintos a la autenticaci\u00f3n de cliente TLS podr\u00eda usarlo de todos modos para la autenticaci\u00f3n de cliente TLS. Solo los servidores TLS 1.3 se vieron afectados, y solo con autenticaci\u00f3n opcional (con la autenticaci\u00f3n requerida, el protocolo de enlace se cancelar\u00eda con una alerta fatal)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://github.com/Mbed-TLS/mbedtls/releases/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
{
|
||||
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
|
||||
"source": "cve@mitre.org"
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.2.0",
|
||||
"versionEndExcluding": "3.6.1",
|
||||
"matchCriteriaId": "21841FE2-FFD3-4EF1-9257-7A31C00B14C2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Mbed-TLS/mbedtls/releases/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45400",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-06T00:15:02.507",
|
||||
"lastModified": "2024-09-06T12:08:04.550",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T18:04:36.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/mlewand/ckeditor-plugin-openlink/commit/402391fdd4d9cfd079031372f9caebbf54993ffb",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/mlewand/ckeditor-plugin-openlink/security/advisories/GHSA-qj47-6x6q-m3c9",
|
||||
"source": "security-advisories@github.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mlewand:open_link:*:*:*:*:*:ckeditor:*:*",
|
||||
"versionEndExcluding": "1.0.7",
|
||||
"matchCriteriaId": "B3A98245-1561-49F7-9C6B-2527AEFCABE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mlewand/ckeditor-plugin-openlink/commit/402391fdd4d9cfd079031372f9caebbf54993ffb",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mlewand/ckeditor-plugin-openlink/security/advisories/GHSA-qj47-6x6q-m3c9",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45401",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-05T18:15:06.227",
|
||||
"lastModified": "2024-09-06T12:08:21.290",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T18:12:52.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/stripe/stripe-cli/security/advisories/GHSA-fv4g-gwpj-74gr",
|
||||
"source": "security-advisories@github.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:stripe:stripe-cli:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.11.1",
|
||||
"versionEndExcluding": "1.21.3",
|
||||
"matchCriteriaId": "F43365D4-FD7D-470A-9948-88FC4B3DE261"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/stripe/stripe-cli/security/advisories/GHSA-fv4g-gwpj-74gr",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45455",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:13.150",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:51:15.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.5.14",
|
||||
"matchCriteriaId": "71245A69-8CD3-456C-98B2-99EC31276371"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45456",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:13.350",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:38:57.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.5.14",
|
||||
"matchCriteriaId": "71245A69-8CD3-456C-98B2-99EC31276371"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-5-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45458",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-15T08:15:13.763",
|
||||
"lastModified": "2024-09-16T15:30:28.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:55:46.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.9.14",
|
||||
"matchCriteriaId": "2CD91243-6FF0-44AA-AE85-B1C4B6604A9F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45620",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-09-03T22:15:05.743",
|
||||
"lastModified": "2024-09-12T19:38:16.130",
|
||||
"lastModified": "2024-09-19T19:21:38.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 3.9,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
@ -96,6 +96,22 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.26.0",
|
||||
"matchCriteriaId": "3220C607-8358-4E23-AB07-11E55FD2727F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4554",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-08-28T07:15:09.330",
|
||||
"lastModified": "2024-09-12T15:01:12.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-09-19T18:15:10.433",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,7 +76,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-46373",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-18T21:15:13.497",
|
||||
"lastModified": "2024-09-18T21:15:13.497",
|
||||
"lastModified": "2024-09-19T19:35:14.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dedecms V5.7.115 contains an arbitrary code execution via file upload vulnerability in the backend."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dedecms V5.7.115 contiene una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de carga de archivos en el backend."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46373.md",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-46374",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-18T21:15:13.543",
|
||||
"lastModified": "2024-09-18T21:15:13.543",
|
||||
"lastModified": "2024-09-19T19:35:15.573",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Best House Rental Management System 1.0 contains a SQL injection vulnerability in the delete_category() function of the file rental/admin_class.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Best House Rental Management System 1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n delete_category() del archivo rental/admin_class.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46374.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46681",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T06:15:12.710",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:10:49.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pktgen: uso de cpus_read_lock() en pg_net_init() He visto que WARN_ON(smp_processor_id() != cpu) se activa en pktgen_thread_worker() durante las pruebas. Debemos usar cpus_read_lock()/cpus_read_unlock() alrededor del bucle for_each_online_cpu(cpu). Mientras estamos en ello, use WARN_ON_ONCE() para evitar una posible inundaci\u00f3n de syslog."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5f5f7366dda8ae870e8305d6e7b3c0c2686cd2cf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/979b581e4c69257acab1af415ddad6b2d78a2fa5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.12",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "2DDC3632-2BC6-4270-A2DC-12DF4F03FA06"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5f5f7366dda8ae870e8305d6e7b3c0c2686cd2cf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/979b581e4c69257acab1af415ddad6b2d78a2fa5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46684",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T06:15:13.103",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:04:22.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,100 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binfmt_elf_fdpic: se corrige el c\u00e1lculo del tama\u00f1o de AUXV cuando se define ELF_HWCAP2 create_elf_fdpic_tables() no tiene en cuenta correctamente el espacio para el vector AUX cuando una arquitectura tiene definido ELF_HWCAP2. Antes del commit 10e29251be0e (\"binfmt_elf_fdpic: fix /proc//auxv\"), esto provocaba que la \u00faltima entrada del vector AUX se estableciera en cero, pero con ese cambio se produce un ERROR del kernel. Corrija esto a\u00f1adiendo uno al n\u00famero de entradas AUXV (nitems) cuando se define ELF_HWCAP2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c507da85e4f80c630deb9e98222ccf4118cbe6f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c6a09e342f8e6d3cac7f7c5c14085236aca284b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "2CE718D7-41ED-4D4A-AED5-326C3D4383FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c507da85e4f80c630deb9e98222ccf4118cbe6f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c6a09e342f8e6d3cac7f7c5c14085236aca284b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46688",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T06:15:13.547",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:01:43.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,95 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: erofs: se corrige el acceso fuera de los l\u00edmites cuando z_erofs_gbuf_growsize() falla parcialmente Si z_erofs_gbuf_growsize() falla parcialmente en un b\u00fafer global debido a un error en la asignaci\u00f3n de memoria o inyecci\u00f3n de fallas (como lo inform\u00f3 syzbot [1]), se deben liberar nuevas p\u00e1ginas compar\u00e1ndolas con las p\u00e1ginas existentes para evitar fugas de memoria. Sin embargo, la matriz gbuf->pages[] anterior puede no ser lo suficientemente grande, lo que puede provocar un acceso fuera de los l\u00edmites o una desreferencia de ptr nula. Corrija esto verificando con gbuf->nrpages de antemano. [1] https://lore.kernel.org/r/000000000000f7b96e062018c6e3@google.com"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0005e01e1e875c5e27130c5e2ed0189749d1e08a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49c0e081998008cde0c872c0ff9affa1ece4b878",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "2CE718D7-41ED-4D4A-AED5-326C3D4383FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0005e01e1e875c5e27130c5e2ed0189749d1e08a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49c0e081998008cde0c872c0ff9affa1ece4b878",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46694",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T06:15:14.240",
|
||||
"lastModified": "2024-09-13T14:06:04.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:16:22.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,128 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: evitar usar un objeto nulo de framebuffer En lugar de usar state->fb->obj[0] directamente, obtener el objeto de framebuffer llamando a drm_gem_fb_get_obj() y devolver un c\u00f3digo de error cuando el objeto es nulo para evitar usar un objeto nulo de framebuffer. (seleccionado del commit 73dd0ad9e5dad53766ea3e631303430116f834b3)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/093ee72ed35c2338c87c26b6ba6f0b7789c9e14e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3b9a33235c773c7a3768060cf1d2cf8a9153bc37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49e1b214f3239b78967c6ddb8f8ec47ae047b051",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6f5e39a3fe7cbdba190f42b28b40bdff03c8cf0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0",
|
||||
"versionEndExcluding": "6.1.108",
|
||||
"matchCriteriaId": "3807A5A8-BA5F-4F06-88B1-DC5FEB956E74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.49",
|
||||
"matchCriteriaId": "1191B7F1-F275-45F5-9E82-A012FF517BFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "1B5D46C3-56A4-4380-9309-27BF73DF29A7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/093ee72ed35c2338c87c26b6ba6f0b7789c9e14e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3b9a33235c773c7a3768060cf1d2cf8a9153bc37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/49e1b214f3239b78967c6ddb8f8ec47ae047b051",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6f5e39a3fe7cbdba190f42b28b40bdff03c8cf0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-471xx/CVE-2024-47159.json
Normal file
56
CVE-2024/CVE-2024-471xx/CVE-2024-47159.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47159",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-09-19T18:15:09.803",
|
||||
"lastModified": "2024-09-19T18:15:09.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains YouTrack before 2024.3.44799 user without appropriate permissions could restore workflows attached to a project"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-471xx/CVE-2024-47160.json
Normal file
56
CVE-2024/CVE-2024-471xx/CVE-2024-47160.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47160",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-09-19T18:15:10.013",
|
||||
"lastModified": "2024-09-19T18:15:10.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains YouTrack before 2024.3.44799 access to global app config data without appropriate permissions was possible"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-471xx/CVE-2024-47162.json
Normal file
56
CVE-2024/CVE-2024-471xx/CVE-2024-47162.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47162",
|
||||
"sourceIdentifier": "cve@jetbrains.com",
|
||||
"published": "2024-09-19T18:15:10.227",
|
||||
"lastModified": "2024-09-19T18:15:10.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains YouTrack before 2024.3.44799 token could be revealed on Imports page"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "cve@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,42 @@
|
||||
"id": "CVE-2024-6087",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-09-13T17:15:13.027",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T19:32:14.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de control de acceso indebido en lunary-ai/lunary en la \u00faltima confirmaci\u00f3n (a761d83) en la rama principal. La vulnerabilidad permite a un atacante utilizar los tokens de autenticaci\u00f3n emitidos por la funci\u00f3n \"invitar usuario\" para obtener tokens JWT v\u00e1lidos. Estos tokens se pueden utilizar para comprometer a los usuarios objetivo al registrarse en sus propias organizaciones arbitrarias. El atacante puede invitar a un correo electr\u00f3nico objetivo, obtener un token de uso \u00fanico, retractarse de la invitaci\u00f3n y, m\u00e1s tarde, utilizar el token para restablecer la contrase\u00f1a del usuario objetivo, lo que lleva a la toma de control total de la cuenta."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -37,8 +63,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,14 +83,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/844e8855c7a713dc7371766dba4125de4007b1cf",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/bd9f2301-11c7-4cbd-8d77-3e9225bd67e8",
|
||||
"source": "security@huntr.dev"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.9",
|
||||
"matchCriteriaId": "6C97FEE4-5604-4DA0-B695-116366C729AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/844e8855c7a713dc7371766dba4125de4007b1cf",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/bd9f2301-11c7-4cbd-8d77-3e9225bd67e8",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,42 @@
|
||||
"id": "CVE-2024-6582",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-09-13T17:15:13.220",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T19:45:30.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A broken access control vulnerability exists in the latest version of lunary-ai/lunary. The `saml.ts` file allows a user from one organization to update the Identity Provider (IDP) settings and view the SSO metadata of another organization. This vulnerability can lead to unauthorized access and potential account takeover if the email of a user in the target organization is known."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de control de acceso en la \u00faltima versi\u00f3n de lunary-ai/lunary. El archivo `saml.ts` permite que un usuario de una organizaci\u00f3n actualice la configuraci\u00f3n del proveedor de identidad (IDP) y vea los metadatos de SSO de otra organizaci\u00f3n. Esta vulnerabilidad puede provocar acceso no autorizado y una posible apropiaci\u00f3n de cuentas si se conoce el correo electr\u00f3nico de un usuario de la organizaci\u00f3n de destino."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -36,6 +62,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
@ -47,14 +83,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/1f043d8798ad87346dfe378eea723bff78ad7433",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/251d138c-3911-4a81-96e5-5a4ab59a0b59",
|
||||
"source": "security@huntr.dev"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4.9",
|
||||
"matchCriteriaId": "6C97FEE4-5604-4DA0-B695-116366C729AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/1f043d8798ad87346dfe378eea723bff78ad7433",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/251d138c-3911-4a81-96e5-5a4ab59a0b59",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,42 @@
|
||||
"id": "CVE-2024-6862",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-09-13T17:15:13.420",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:37:20.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in lunary-ai/lunary version 1.2.34 due to overly permissive CORS settings. This vulnerability allows an attacker to sign up for and create projects or use the instance as if they were a user with local access. The main attack vector is for instances hosted locally on personal machines, which are not publicly accessible. The CORS settings in the backend permit all origins, exposing unauthenticated endpoints to CSRF attacks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en la versi\u00f3n 1.2.34 de lunary-ai/lunary debido a una configuraci\u00f3n CORS demasiado permisiva. Esta vulnerabilidad permite que un atacante se registre y cree proyectos o utilice la instancia como si fuera un usuario con acceso local. El principal vector de ataque son las instancias alojadas localmente en m\u00e1quinas personales, que no son de acceso p\u00fablico. La configuraci\u00f3n CORS en el backend permite todos los or\u00edgenes, lo que expone los endpoints no autenticados a ataques CSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -47,14 +73,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/3451fcd7b9d95e9091d62c515752f39f2faa6e54",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/0b1d851e-3455-480c-ad5a-23565894976f",
|
||||
"source": "security@huntr.dev"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lunary:lunary:1.2.34:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6D4C592-3D6E-4371-A03F-BA35C1A6473F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/3451fcd7b9d95e9091d62c515752f39f2faa6e54",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/0b1d851e-3455-480c-ad5a-23565894976f",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,42 @@
|
||||
"id": "CVE-2024-6867",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-09-13T17:15:13.613",
|
||||
"lastModified": "2024-09-14T11:47:14.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:28:05.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure vulnerability exists in the lunary-ai/lunary, specifically in the `runs/{run_id}/related` endpoint. This endpoint does not verify that the user has the necessary access rights to the run(s) they are accessing. As a result, it returns not only the specified run but also all runs that have the `run_id` listed as their parent run. This issue affects the main branch, commit a761d833. The vulnerability allows unauthorized users to obtain information about non-public runs and their related runs, given the `run_id` of a public or non-public run."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en lunary-ai/lunary, espec\u00edficamente en el punto de conexi\u00f3n `runs/{run_id}/related`. Este punto de conexi\u00f3n no verifica que el usuario tenga los derechos de acceso necesarios a las ejecuciones a las que est\u00e1 accediendo. Como resultado, no solo devuelve la ejecuci\u00f3n especificada, sino tambi\u00e9n todas las ejecuciones que tienen el `run_id` indicado como su ejecuci\u00f3n principal. Este problema afecta a la rama principal, commit a761d833. La vulnerabilidad permite a usuarios no autorizados obtener informaci\u00f3n sobre ejecuciones no p\u00fablicas y sus ejecuciones relacionadas, dado el `run_id` de una ejecuci\u00f3n p\u00fablica o no p\u00fablica."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -47,14 +73,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/35afd4439464571eb016318cd7b6f85a162225ca",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/460df515-164c-4435-954b-0233a181545f",
|
||||
"source": "security@huntr.dev"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lunary:lunary:1.4.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F0DAD2D-0C97-49C3-908F-E3BA6B8E6FFA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/35afd4439464571eb016318cd7b6f85a162225ca",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/460df515-164c-4435-954b-0233a181545f",
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7591",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-09-05T18:15:06.480",
|
||||
"lastModified": "2024-09-06T12:08:21.290",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T18:19:12.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@progress.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591",
|
||||
"source": "security@progress.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.40.0",
|
||||
"versionEndIncluding": "7.2.60.0",
|
||||
"matchCriteriaId": "C477074C-D2DF-4BDB-87FD-76133561BABB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:kemptechnologies:multi-tenant_hypervisor_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.1.35.4",
|
||||
"versionEndExcluding": "7.1.35.11",
|
||||
"matchCriteriaId": "A696FEC5-08C0-4297-9684-03CC7C1BE9B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591",
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7618",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-10T08:15:03.620",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:20:00.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -51,30 +81,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.4.0/templates/reactions/admin_reaction.php#L112",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigreactions.php?rev=3147528#L88",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3147528/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/peepso-core/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.peepso.com/changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf2e060-5ae4-4b46-bc68-22ae5f516fe8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.4.6.0",
|
||||
"matchCriteriaId": "AFC63B3E-224E-4106-864F-6FCB8EBB1519"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.4.0/templates/reactions/admin_reaction.php#L112",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigreactions.php?rev=3147528#L88",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3147528/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/peepso-core/#developers",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.peepso.com/changelog/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf2e060-5ae4-4b46-bc68-22ae5f516fe8?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7655",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-10T08:15:03.830",
|
||||
"lastModified": "2024-09-10T12:09:50.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-09-19T18:20:53.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -18,8 +18,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -51,30 +71,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigfields.php?rev=3147528#L17",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3147528/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/peepso-core/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.peepso.com/6-4-6-0/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.peepso.com/changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e85ee611-ae81-4736-b4f0-b9d06714da18?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "6.4.6.0",
|
||||
"matchCriteriaId": "AFC63B3E-224E-4106-864F-6FCB8EBB1519"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigfields.php?rev=3147528#L17",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3147528/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/peepso-core/#developers",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.peepso.com/6-4-6-0/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.peepso.com/changelog/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e85ee611-ae81-4736-b4f0-b9d06714da18?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8417",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-04T18:15:06.273",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-09-19T19:53:12.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276496",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276496",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.402376",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.shikangsi.com/post/share/d31fefa1-ca08-48d7-a671-727d63bfaf65",
|
||||
"source": "cna@vuldb.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yunknet:online_school_system:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.5.6",
|
||||
"matchCriteriaId": "306CF7F4-C30C-4602-94C5-FA26F591A346"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.276496",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.276496",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.402376",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.shikangsi.com/post/share/d31fefa1-ca08-48d7-a671-727d63bfaf65",
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-89xx/CVE-2024-8963.json
Normal file
56
CVE-2024/CVE-2024-89xx/CVE-2024-8963.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8963",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2024-09-19T18:15:10.600",
|
||||
"lastModified": "2024-09-19T18:15:10.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-19T18:00:17.803773+00:00
|
||||
2024-09-19T20:00:17.597789+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-19T17:59:23.113000+00:00
|
||||
2024-09-19T19:58:23.870000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,57 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
263450
|
||||
263457
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-31570](CVE-2024/CVE-2024-315xx/CVE-2024-31570.json) (`2024-09-19T17:15:12.623`)
|
||||
- [CVE-2024-38016](CVE-2024/CVE-2024-380xx/CVE-2024-38016.json) (`2024-09-19T17:15:12.947`)
|
||||
- [CVE-2024-45752](CVE-2024/CVE-2024-457xx/CVE-2024-45752.json) (`2024-09-19T16:15:04.910`)
|
||||
- [CVE-2024-45861](CVE-2024/CVE-2024-458xx/CVE-2024-45861.json) (`2024-09-19T16:15:05.103`)
|
||||
- [CVE-2024-45862](CVE-2024/CVE-2024-458xx/CVE-2024-45862.json) (`2024-09-19T16:15:05.227`)
|
||||
- [CVE-2024-7736](CVE-2024/CVE-2024-77xx/CVE-2024-7736.json) (`2024-09-19T16:15:05.520`)
|
||||
- [CVE-2024-7737](CVE-2024/CVE-2024-77xx/CVE-2024-7737.json) (`2024-09-19T16:15:05.727`)
|
||||
- [CVE-2024-8375](CVE-2024/CVE-2024-83xx/CVE-2024-8375.json) (`2024-09-19T16:15:06.023`)
|
||||
- [CVE-2024-8651](CVE-2024/CVE-2024-86xx/CVE-2024-8651.json) (`2024-09-19T17:15:15.173`)
|
||||
- [CVE-2024-8652](CVE-2024/CVE-2024-86xx/CVE-2024-8652.json) (`2024-09-19T17:15:15.360`)
|
||||
- [CVE-2024-8653](CVE-2024/CVE-2024-86xx/CVE-2024-8653.json) (`2024-09-19T17:15:15.503`)
|
||||
- [CVE-2024-8698](CVE-2024/CVE-2024-86xx/CVE-2024-8698.json) (`2024-09-19T16:15:06.177`)
|
||||
- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-09-19T16:15:06.403`)
|
||||
- [CVE-2024-25673](CVE-2024/CVE-2024-256xx/CVE-2024-25673.json) (`2024-09-19T19:15:24.093`)
|
||||
- [CVE-2024-33109](CVE-2024/CVE-2024-331xx/CVE-2024-33109.json) (`2024-09-19T19:15:24.170`)
|
||||
- [CVE-2024-40125](CVE-2024/CVE-2024-401xx/CVE-2024-40125.json) (`2024-09-19T19:15:24.350`)
|
||||
- [CVE-2024-47159](CVE-2024/CVE-2024-471xx/CVE-2024-47159.json) (`2024-09-19T18:15:09.803`)
|
||||
- [CVE-2024-47160](CVE-2024/CVE-2024-471xx/CVE-2024-47160.json) (`2024-09-19T18:15:10.013`)
|
||||
- [CVE-2024-47162](CVE-2024/CVE-2024-471xx/CVE-2024-47162.json) (`2024-09-19T18:15:10.227`)
|
||||
- [CVE-2024-8963](CVE-2024/CVE-2024-89xx/CVE-2024-8963.json) (`2024-09-19T18:15:10.600`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `39`
|
||||
Recently modified CVEs: `50`
|
||||
|
||||
- [CVE-2024-39317](CVE-2024/CVE-2024-393xx/CVE-2024-39317.json) (`2024-09-19T16:08:43.417`)
|
||||
- [CVE-2024-40865](CVE-2024/CVE-2024-408xx/CVE-2024-40865.json) (`2024-09-19T17:58:37.370`)
|
||||
- [CVE-2024-41565](CVE-2024/CVE-2024-415xx/CVE-2024-41565.json) (`2024-09-19T16:19:59.317`)
|
||||
- [CVE-2024-42698](CVE-2024/CVE-2024-426xx/CVE-2024-42698.json) (`2024-09-19T16:29:51.217`)
|
||||
- [CVE-2024-44589](CVE-2024/CVE-2024-445xx/CVE-2024-44589.json) (`2024-09-19T17:35:04.797`)
|
||||
- [CVE-2024-45176](CVE-2024/CVE-2024-451xx/CVE-2024-45176.json) (`2024-09-19T17:56:15.603`)
|
||||
- [CVE-2024-45304](CVE-2024/CVE-2024-453xx/CVE-2024-45304.json) (`2024-09-19T17:26:37.030`)
|
||||
- [CVE-2024-45440](CVE-2024/CVE-2024-454xx/CVE-2024-45440.json) (`2024-09-19T17:38:40.100`)
|
||||
- [CVE-2024-46695](CVE-2024/CVE-2024-466xx/CVE-2024-46695.json) (`2024-09-19T17:59:23.113`)
|
||||
- [CVE-2024-46697](CVE-2024/CVE-2024-466xx/CVE-2024-46697.json) (`2024-09-19T17:53:43.173`)
|
||||
- [CVE-2024-46706](CVE-2024/CVE-2024-467xx/CVE-2024-46706.json) (`2024-09-19T17:51:07.670`)
|
||||
- [CVE-2024-6053](CVE-2024/CVE-2024-60xx/CVE-2024-6053.json) (`2024-09-19T17:22:36.697`)
|
||||
- [CVE-2024-6142](CVE-2024/CVE-2024-61xx/CVE-2024-6142.json) (`2024-09-19T17:47:00.270`)
|
||||
- [CVE-2024-6143](CVE-2024/CVE-2024-61xx/CVE-2024-6143.json) (`2024-09-19T17:47:33.370`)
|
||||
- [CVE-2024-6144](CVE-2024/CVE-2024-61xx/CVE-2024-6144.json) (`2024-09-19T17:48:27.787`)
|
||||
- [CVE-2024-6145](CVE-2024/CVE-2024-61xx/CVE-2024-6145.json) (`2024-09-19T17:50:17.250`)
|
||||
- [CVE-2024-6146](CVE-2024/CVE-2024-61xx/CVE-2024-6146.json) (`2024-09-19T17:50:48.247`)
|
||||
- [CVE-2024-6251](CVE-2024/CVE-2024-62xx/CVE-2024-6251.json) (`2024-09-19T16:50:07.723`)
|
||||
- [CVE-2024-6252](CVE-2024/CVE-2024-62xx/CVE-2024-6252.json) (`2024-09-19T16:51:12.527`)
|
||||
- [CVE-2024-6266](CVE-2024/CVE-2024-62xx/CVE-2024-6266.json) (`2024-09-19T16:53:36.647`)
|
||||
- [CVE-2024-6268](CVE-2024/CVE-2024-62xx/CVE-2024-6268.json) (`2024-09-19T17:06:24.663`)
|
||||
- [CVE-2024-8006](CVE-2024/CVE-2024-80xx/CVE-2024-8006.json) (`2024-09-19T17:46:03.447`)
|
||||
- [CVE-2024-8260](CVE-2024/CVE-2024-82xx/CVE-2024-8260.json) (`2024-09-19T16:08:58.863`)
|
||||
- [CVE-2024-8304](CVE-2024/CVE-2024-83xx/CVE-2024-8304.json) (`2024-09-19T17:39:46.687`)
|
||||
- [CVE-2024-8395](CVE-2024/CVE-2024-83xx/CVE-2024-8395.json) (`2024-09-19T17:53:45.753`)
|
||||
- [CVE-2024-31416](CVE-2024/CVE-2024-314xx/CVE-2024-31416.json) (`2024-09-19T19:06:59.787`)
|
||||
- [CVE-2024-34343](CVE-2024/CVE-2024-343xx/CVE-2024-34343.json) (`2024-09-19T19:57:52.007`)
|
||||
- [CVE-2024-40568](CVE-2024/CVE-2024-405xx/CVE-2024-40568.json) (`2024-09-19T19:35:13.880`)
|
||||
- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-19T18:26:24.687`)
|
||||
- [CVE-2024-45400](CVE-2024/CVE-2024-454xx/CVE-2024-45400.json) (`2024-09-19T18:04:36.627`)
|
||||
- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-19T18:12:52.220`)
|
||||
- [CVE-2024-45455](CVE-2024/CVE-2024-454xx/CVE-2024-45455.json) (`2024-09-19T18:51:15.433`)
|
||||
- [CVE-2024-45456](CVE-2024/CVE-2024-454xx/CVE-2024-45456.json) (`2024-09-19T18:38:57.500`)
|
||||
- [CVE-2024-45458](CVE-2024/CVE-2024-454xx/CVE-2024-45458.json) (`2024-09-19T18:55:46.513`)
|
||||
- [CVE-2024-4554](CVE-2024/CVE-2024-45xx/CVE-2024-4554.json) (`2024-09-19T18:15:10.433`)
|
||||
- [CVE-2024-45620](CVE-2024/CVE-2024-456xx/CVE-2024-45620.json) (`2024-09-19T19:21:38.653`)
|
||||
- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2024-09-19T19:35:14.767`)
|
||||
- [CVE-2024-46374](CVE-2024/CVE-2024-463xx/CVE-2024-46374.json) (`2024-09-19T19:35:15.573`)
|
||||
- [CVE-2024-46681](CVE-2024/CVE-2024-466xx/CVE-2024-46681.json) (`2024-09-19T18:10:49.623`)
|
||||
- [CVE-2024-46684](CVE-2024/CVE-2024-466xx/CVE-2024-46684.json) (`2024-09-19T18:04:22.623`)
|
||||
- [CVE-2024-46688](CVE-2024/CVE-2024-466xx/CVE-2024-46688.json) (`2024-09-19T18:01:43.037`)
|
||||
- [CVE-2024-46694](CVE-2024/CVE-2024-466xx/CVE-2024-46694.json) (`2024-09-19T18:16:22.247`)
|
||||
- [CVE-2024-6087](CVE-2024/CVE-2024-60xx/CVE-2024-6087.json) (`2024-09-19T19:32:14.710`)
|
||||
- [CVE-2024-6582](CVE-2024/CVE-2024-65xx/CVE-2024-6582.json) (`2024-09-19T19:45:30.283`)
|
||||
- [CVE-2024-6862](CVE-2024/CVE-2024-68xx/CVE-2024-6862.json) (`2024-09-19T18:37:20.910`)
|
||||
- [CVE-2024-6867](CVE-2024/CVE-2024-68xx/CVE-2024-6867.json) (`2024-09-19T18:28:05.477`)
|
||||
- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-19T18:19:12.210`)
|
||||
- [CVE-2024-7618](CVE-2024/CVE-2024-76xx/CVE-2024-7618.json) (`2024-09-19T18:20:00.000`)
|
||||
- [CVE-2024-7655](CVE-2024/CVE-2024-76xx/CVE-2024-7655.json) (`2024-09-19T18:20:53.617`)
|
||||
- [CVE-2024-8417](CVE-2024/CVE-2024-84xx/CVE-2024-8417.json) (`2024-09-19T19:53:12.383`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
211
_state.csv
211
_state.csv
@ -58299,12 +58299,12 @@ CVE-2013-0639,0,0,b31be035ceb64b0d082ddfacc740a4210652cc5e7e0dde51ddff1158c160dc
|
||||
CVE-2013-0640,0,0,124b8bb226f7e9d6096b31adba4a0e431bfd4cafe81871fe0024db93f6d5836d,2024-07-16T17:36:16.623000
|
||||
CVE-2013-0641,0,0,8b435cbf77af4b23b70d0392c35e373c862cd1b7676f3d77a9653fe18e07ad76,2024-07-16T17:36:05.960000
|
||||
CVE-2013-0642,0,0,bfadc58d9042f0563f6f464599e9d26f03ce9f43f5f43c002304603f48da66a2,2018-12-06T19:47:16.903000
|
||||
CVE-2013-0643,0,0,729305f657b64058679da68ad515dc2a54231958b32050c68b1c86f5c900050c,2024-09-18T19:35:01.410000
|
||||
CVE-2013-0643,0,1,ac028e28f0c58cfd927fcc5eee044da647ef72101b764105bdbe0ec010bc29b2,2024-09-19T19:48:10.033000
|
||||
CVE-2013-0644,0,0,79820981c348e4e64b9198c5d6054f480e970cc8d8c247ee3d548bff6c82ac85,2018-12-06T19:48:02.123000
|
||||
CVE-2013-0645,0,0,6125d0f7d22b366190241b77a7b5922adc7339604421994dce13d534098c6aea,2018-12-06T19:48:36.513000
|
||||
CVE-2013-0646,0,0,c06c944b7c73de3e62d948a2b222d45721d45f6414f5e68a92e11e952ff01974,2014-03-26T04:44:11.977000
|
||||
CVE-2013-0647,0,0,eef38ab0e06ece5be29234416a43368cf2dc4818ff0481da512aa8e96cfa7923,2018-12-06T19:50:48.563000
|
||||
CVE-2013-0648,0,0,6b0666a3ff66920f1be6ded6a96213840168c4e3336527f9bfefe5c13da1df25,2024-09-18T19:35:02.327000
|
||||
CVE-2013-0648,0,1,1bbefef5fe7b99ef5472e70aee3444d59a0b886e0a86d2abe59f31dd3051169e,2024-09-19T19:51:57.317000
|
||||
CVE-2013-0649,0,0,08f618eda7f64799433610eda3b01050cfd3e669aa064372e20a16c5d61237e1,2018-12-06T19:50:14.467000
|
||||
CVE-2013-0650,0,0,05a6fa43599436cf52455a9e658850893592583b2a41594c4c9c1629f1ff4728,2014-03-26T04:44:15.773000
|
||||
CVE-2013-0651,0,0,f49ccbeee68ba586b35032f2fc9fbd62aa3c838e205fd987ab565ea2bea44c76,2013-01-30T05:00:00
|
||||
@ -64974,12 +64974,12 @@ CVE-2014-0493,0,0,5980f8ce7bccecebd2e70dd6b857cb4b656971c59fbacbb63249cc45b51f75
|
||||
CVE-2014-0494,0,0,8b294b47a486336cd6b4db3f06f91abe3b0268360260099a12dc8b5ebb59c596,2017-08-29T01:34:11.030000
|
||||
CVE-2014-0495,0,0,671e97412a74358a5c6e50a3bb0dbb2b494498ae12e83fc145a13daedb649abf,2018-12-13T15:50:35.977000
|
||||
CVE-2014-0496,0,0,943eee2f6677ecbddd894736d06d754908e933d15ae4ea4f9cfea3e0ddbbf17b,2018-12-13T15:50:55.103000
|
||||
CVE-2014-0497,0,0,d6e32f9fc77d829dbf50e0c69e55537733d441acc9da96160dfc9a69312dffe9,2024-09-18T19:35:02.543000
|
||||
CVE-2014-0497,0,1,52c8371071aa4fd7738da924f81c155923a24cc665bb1c815f7c347dec1de3d5,2024-09-19T19:56:17.247000
|
||||
CVE-2014-0498,0,0,1618f11598fb67e87357bcde2d1122794a71c785ac05d06e2d56fd17028571fc,2018-12-13T15:54:15.917000
|
||||
CVE-2014-0499,0,0,0361066feb81eae85003bd40e34d63a55b78a3c7f0bdfd41851c555d91004b71,2018-12-13T15:54:47.153000
|
||||
CVE-2014-0500,0,0,97edfd619058dc26ad56cf33391d9dc91362a50dec1d0dbc02abb7edf993b617,2018-01-03T02:29:03.130000
|
||||
CVE-2014-0501,0,0,4025edf733331396525b490cf3d77ea02dc26b06228603a4b61385c7de6588f2,2018-01-03T02:29:03.210000
|
||||
CVE-2014-0502,0,0,0aec5223f09074d52a34e1c752542c3e472ac2f8b486fe6bc9d439bb474a1256,2024-09-18T19:35:03.393000
|
||||
CVE-2014-0502,0,1,411a92a14510541e15575d6525d0a6e735d616f03fe8f2886da4486c39f075fb,2024-09-19T19:53:44.480000
|
||||
CVE-2014-0503,0,0,c67bf98b7682ef5050d13c43497f2af42e7aa350e509586400ddb6191e666325,2018-12-13T16:00:37.443000
|
||||
CVE-2014-0504,0,0,e6a68e9a83d1aff357dde03fe34200e26c34033a1843fb3b1a467a539bb2000a,2018-12-13T16:00:23.630000
|
||||
CVE-2014-0505,0,0,9cf82e807986acb6181ee7efa5d77d0a8127ac7e93c1c91848a81dbe58937cd2,2014-03-14T17:07:42.850000
|
||||
@ -128928,7 +128928,7 @@ CVE-2019-10686,0,0,071dffbfdea10181bb98b77b81173ea1ee44c0bf3f27125b70455662edc40
|
||||
CVE-2019-10687,0,0,4d2aa4f6c0463103aef2503f43b6f1e6753450b125b2eb1b959d173389b0f8e1,2019-08-27T15:51:11.620000
|
||||
CVE-2019-10688,0,0,139389dbc249e8cae439573037005e32285d24298cd9752f9767fbd85f7cada6,2019-06-17T16:15:11.653000
|
||||
CVE-2019-10689,0,0,3a6ff66e02d9a27391650c9b85af3797719e726b15e08ea64568eab01a8deea0,2019-06-27T17:26:21.897000
|
||||
CVE-2019-1069,0,0,f31e90e4331009e9da44368d612d680d5b98b6b04c978425b0ce779643dd7237,2024-09-19T01:00:03.107000
|
||||
CVE-2019-1069,0,1,0515bb971e4f7a4465e7951022bb244d8e5b1246162c1944d1f49a5443592e90,2024-09-19T19:58:01.950000
|
||||
CVE-2019-10691,0,0,e8e0d767bb2f3b5e08db6f24e350ea086b46abac68877bbd2cba7819c236f317,2023-11-07T03:02:32.480000
|
||||
CVE-2019-10692,0,0,8adff711cac0bb2de2edadfdf1000b35b700fb5b209d412cad8743610b43de23,2023-05-23T20:30:59.777000
|
||||
CVE-2019-10694,0,0,9582148ff7994145825de46f0455936b126d6116ce2adec095540a2cc82c30a9,2022-01-24T16:46:01.133000
|
||||
@ -175555,7 +175555,7 @@ CVE-2021-31555,0,0,7de5df80bc06456a2bd06cb1ed2fa6bf25b8a0e66ee1e2ceff5a7504cc2b9
|
||||
CVE-2021-31556,0,0,93b949700d04612fa67f7aa21454bcfa0dedb54b45feb534dfde6a346bbdbf4e,2023-11-07T03:34:58.647000
|
||||
CVE-2021-31558,0,0,ceed4d2a05c41f9fdd58ce2921315e67a6e46f1c89b4c2da0bce257ffbc7f901,2021-12-28T14:54:32.527000
|
||||
CVE-2021-31559,0,0,c056101e3a724e5296c3096cffa3217710e8d3f22622b1fbc675682800b56fdf,2022-10-25T16:42:38.307000
|
||||
CVE-2021-3156,0,0,756a4c61ba757c306e336a56d1a3eabd3a978cd9871d60b7e3550598effb17de,2024-09-18T17:15:13.843000
|
||||
CVE-2021-3156,0,1,c9f0ccb5f8e0b0bd0d85e1cc30dd2ecceb494b21ff9563b3056182a6d1fce82a,2024-09-19T19:58:23.870000
|
||||
CVE-2021-31562,0,0,ac50e4387893ec363455949ced3c17ca407e9a27f3f2c3f523390c3482b094df,2022-01-28T15:55:53.923000
|
||||
CVE-2021-31566,0,0,801f1236a607222712dc7741b61bbdda3061d826b7fd22f878d0c5c45a130a15,2024-03-27T16:04:30.260000
|
||||
CVE-2021-31567,0,0,0da3da305c7b1718259a905dc09c36fc318ae57a531df276f807be7858b88fad,2022-02-03T17:09:44.553000
|
||||
@ -213190,7 +213190,7 @@ CVE-2023-0632,0,0,d83115f04f4989ede052facc5d8104ea2fb79fa2a1de534b7f13673b082097
|
||||
CVE-2023-0633,0,0,c55f2b66671ce085b4ad3974c5b038c8c1ffd9a2f567e03eea54fc854cda175a,2023-09-25T18:32:19.187000
|
||||
CVE-2023-0634,0,0,e1f434232229f0b69e5813912fc243d281927b7062ddb545130690b604bd0d71,2023-11-07T04:01:03.280000
|
||||
CVE-2023-0635,0,0,d81026f71e5aca952558a8d499cbeb71f364c949b09c316ae202aeba51d2fc8c,2024-09-19T15:15:12.403000
|
||||
CVE-2023-0636,0,1,daf2ae1675c4a664309e700bd6ab90b8f65b32aff69a932fba6e183e64ec4bda,2024-09-19T17:15:12.017000
|
||||
CVE-2023-0636,0,0,daf2ae1675c4a664309e700bd6ab90b8f65b32aff69a932fba6e183e64ec4bda,2024-09-19T17:15:12.017000
|
||||
CVE-2023-0637,0,0,89cd23cbb4fa4626e47231bb03b58900a8eed173642bad665a49a10f9ff14366,2024-05-17T02:17:27.057000
|
||||
CVE-2023-0638,0,0,ba94fa67c2ce1ebb9da3f45635b51b7bc32a46cbd4ca9f565be0d8435038da97,2024-05-17T02:17:27.163000
|
||||
CVE-2023-0639,0,0,97ebc3e83332f93df2d560c117d07a78fd7479e47b3a71fd746d3fbb9a517457,2024-05-17T02:17:27.273000
|
||||
@ -222909,7 +222909,7 @@ CVE-2023-30458,0,0,48c15acc8080e55dcad253897d98be087ef3a613a48400bab015ca689a5a0
|
||||
CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05326,2023-04-25T15:56:57.943000
|
||||
CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000
|
||||
CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31
|
||||
CVE-2023-30464,0,0,7ed8486907cd9811a99dcb420b4c9fa8895464d669565a41f685a043dcdf6d95,2024-09-18T21:15:13.080000
|
||||
CVE-2023-30464,0,1,3aae22a2e0f43047e68f03e1c3bca7b8e0d56717d49f06b096746b3b526617e7,2024-09-19T19:35:01.113000
|
||||
CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000
|
||||
CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000
|
||||
CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000
|
||||
@ -225565,7 +225565,7 @@ CVE-2023-33833,0,0,8cabb27c4a96645953c1a4f1036d344749d66b348828bd126020c3efb5d4e
|
||||
CVE-2023-33834,0,0,8a99184e234095ae4700b728415aa680a907977cb94f44aaa995a53c8fcba752,2023-09-01T20:48:26.573000
|
||||
CVE-2023-33835,0,0,da6214caf650e801b3a9fdeb758dc442525c15d94e4f974e5b44154e1073b4df,2023-09-01T20:48:06.953000
|
||||
CVE-2023-33836,0,0,13579f69f5ba3df93b75aa9b258f2d9f33b31ebbc257567a3ea6c574557bd8d7,2023-10-19T16:27:02.050000
|
||||
CVE-2023-33837,0,1,50b24b6dd685668a1aa425c6457e8db215df45025fbdff151f60f7fdf3b7780b,2024-09-19T16:15:03.897000
|
||||
CVE-2023-33837,0,0,50b24b6dd685668a1aa425c6457e8db215df45025fbdff151f60f7fdf3b7780b,2024-09-19T16:15:03.897000
|
||||
CVE-2023-33839,0,0,bc28ce9c837b78c2fb043e0a611220533f03485c577d075d53f20054bb056fac,2023-10-28T03:31:20.867000
|
||||
CVE-2023-3384,0,0,c366782f96c01b6685af33932f5b3dbfa67631b1a69a8be3fadc1c8aad177b98,2023-11-07T04:18:39.110000
|
||||
CVE-2023-33840,0,0,586d7d4f70d01d8ed3bf3edb820638ca5a1ed02b7e9e624c28a81439ca6eb363,2023-10-28T03:32:15.907000
|
||||
@ -225576,7 +225576,7 @@ CVE-2023-33847,0,0,82ca8aa0bc2d03362319c542ea5b2770d3d85f3edc1d48ee0a623bf42e800
|
||||
CVE-2023-33848,0,0,8c230bcaf355a577515ed758441936574666148d6f8eb2c4fef9542b77704701,2023-06-15T15:08:53.457000
|
||||
CVE-2023-33849,0,0,cee19490ece517fd373f4e7e8ed6adf35f850894b189fbcc578bbd8d63ec8305,2023-06-15T16:56:56.460000
|
||||
CVE-2023-3385,0,0,9500094f984a4b5d1e66b5fa4a2c7e1b713d3f8f392f6fc06da408d890552a37,2023-08-04T19:19:04.697000
|
||||
CVE-2023-33850,0,1,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000
|
||||
CVE-2023-33850,0,0,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000
|
||||
CVE-2023-33851,0,0,4ac32a90038a96c4290f8386bc4de44c14e956a2c207f0eac7a85d82111f6074,2024-02-12T19:54:23.117000
|
||||
CVE-2023-33852,0,0,bc3c73250f73c64645e886b9ff4fe0ce89bb90d67afa464822661d78d1e66b51,2023-08-29T04:43:06.033000
|
||||
CVE-2023-33855,0,0,aa3542d64ac11799927f1e76ad33cc287cefdca6570205fddaaa45ff2dc14b58,2024-03-26T17:09:53.043000
|
||||
@ -226424,7 +226424,7 @@ CVE-2023-35006,0,0,5acb31cc1556024eeb64b08b60260767e246691f5242ee9df31af625e2b32
|
||||
CVE-2023-35009,0,0,d8de65d8c74d095102650d61033fbe6e6edcf88ae0bfa7092ac4ef92348c016e,2024-06-21T19:15:27.300000
|
||||
CVE-2023-3501,0,0,a76559ca80d102957b322b035a4ffefc79e9201575b2cccb00498046008bf9e4,2023-11-07T04:18:51.230000
|
||||
CVE-2023-35011,0,0,38ddb64d0651455b912949926db10e88999c3cf7ce781799eb53e2740057a3b5,2024-06-21T19:15:27.467000
|
||||
CVE-2023-35012,0,1,f81d33aa7d3186d868c53d1111ace48462742e3ef54c4edf2c8b154c222007b6,2024-09-19T17:15:12.223000
|
||||
CVE-2023-35012,0,0,f81d33aa7d3186d868c53d1111ace48462742e3ef54c4edf2c8b154c222007b6,2024-09-19T17:15:12.223000
|
||||
CVE-2023-35013,0,0,534ee78f8c171fc79a4adeb51556f3dbd30c4450c8c4b3cfa11fe98e966cbdbc,2023-10-19T16:42:30.197000
|
||||
CVE-2023-35016,0,0,4fa91503d6f6db95a191dff0d99a0bfebb7cd1f190858d458e96118cac712474,2023-08-04T17:23:18.223000
|
||||
CVE-2023-35018,0,0,6d336ce3e2614937180971b4858c079e9a4762f40daaf2f592acb48025066235,2023-10-19T16:20:10.327000
|
||||
@ -230784,7 +230784,7 @@ CVE-2023-40650,0,0,352b9f0a42924a10ae1ec80f36517882f8a68e0276912361872f5d0ea9707
|
||||
CVE-2023-40651,0,0,4b7377a587c45b53860a7f5cef45bd5433fa18a2bfcf837a51529a6560be5347,2023-10-11T17:35:31.657000
|
||||
CVE-2023-40652,0,0,a18e3fe3990e80f554e1b4f55aa445ad66414551a973c9af4895cf611c407613,2023-10-11T17:35:49.427000
|
||||
CVE-2023-40653,0,0,88eeb937a3e4c749b0b049debb5babce5dcc6cdc9ad79aae89cfb1d78ecb1fb7,2024-02-15T20:53:14.203000
|
||||
CVE-2023-40654,0,0,8d852dea043a9db45de1594e9fa2b1213b47065b3e199c550a2cc4f0930babdb,2023-10-11T19:08:04.547000
|
||||
CVE-2023-40654,0,1,75ef0ecb7c1b4344a60dff2f1c173adf0d9c0494c9c6a83bf973de2bf626831c,2024-09-19T18:35:02.187000
|
||||
CVE-2023-40655,0,0,4328cdbb4187e8b0234c53d0517ebc655578d5acdd9d3f7f4547eb76c952f50d,2023-12-19T17:09:11.113000
|
||||
CVE-2023-40656,0,0,19b49d5f2f04f7adc1e8ec42eabd1ec41b91195134dc054a4b5906547d33a983,2023-12-19T16:53:42.183000
|
||||
CVE-2023-40657,0,0,de372f5606a6a9c0eb353d9acefa85fa576d984d78e2f34c3e3bafeafb5ce44c,2023-12-19T16:10:07.447000
|
||||
@ -233121,7 +233121,7 @@ CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a23020
|
||||
CVE-2023-43980,0,0,bbbdf96fe43913bc9148a2be4e4cf79c095e8946d088cfcca396bde192a42883,2023-10-06T16:26:51.337000
|
||||
CVE-2023-43981,0,0,7bc0b04a874fb37912d5a49421c2f5f408de1077870392e33bb57c9ca9c75f89,2023-10-07T02:52:59.353000
|
||||
CVE-2023-43982,0,0,36c050839890ac22e9c1d01ac6e12f62ba92c226ca1aa60fc6850304f993fad5,2023-11-09T22:07:27.420000
|
||||
CVE-2023-43983,0,0,6d9211a02e0a131adf3e167416c4fcfa68bb60a61bdffb8dcb0aef2773cbd238,2023-10-07T02:52:28.870000
|
||||
CVE-2023-43983,0,1,9159a914c282ab44b718a500a523f5b25649be59fcdc42674f05ea6f2949ffee,2024-09-19T19:35:04.850000
|
||||
CVE-2023-43984,0,0,734f41a89a1d8239b9e46c66d768f28b73875d461f17b4c52b2f21e0399d5916,2024-09-05T13:35:00.617000
|
||||
CVE-2023-43985,0,0,d6426e07dde5bc7e003721bf3af2143d307be62b95406f9014be4ad2380774e6,2024-01-25T20:07:56.693000
|
||||
CVE-2023-43986,0,0,f6e814df340a370055926dfb76c8e5c7ca2c32dbd5d8ca11c76fab82aae5e055,2023-10-25T19:57:40.860000
|
||||
@ -233637,11 +233637,11 @@ CVE-2023-44829,0,0,5db7752f8ecb00403264ccf21f2659fe0ddfcfbbceb6f5c8ddddc55c7780b
|
||||
CVE-2023-44830,0,0,f49977dfe516745c571ff61090d55c8fc4270a5fd142bbbdb6ce53b5908f7adf,2023-10-07T03:18:38.277000
|
||||
CVE-2023-44831,0,0,b97e9b1170ac4de59d7ff19e0fb6f009616c576284357e866bbfe60abc61bb12,2023-10-07T03:16:56.033000
|
||||
CVE-2023-44832,0,0,9c1b721dcfa1a8d8e89ace89b9c1b3507031d5009c9747a3da72e27d19da2342,2023-10-07T03:15:46.517000
|
||||
CVE-2023-44833,0,0,c2b3c7d97797d8e23ef25182b7d4eadd3c4bf2687e1609987205fb358fa89dd0,2023-10-07T03:17:11.587000
|
||||
CVE-2023-44834,0,0,e7d05c7046c9a3cee4e8fdbbf7577987637ea30fb78e39f8a73ce48b0cebfd95,2023-10-07T03:17:41.593000
|
||||
CVE-2023-44835,0,0,4087f2df3b958b6a40d6db323c9a86117da5378d28c84199c00ff8f3d171417b,2023-10-07T03:17:27.913000
|
||||
CVE-2023-44836,0,0,2ef940f84d5706190363ff3de97961d61304db78caa9a1d358045f9a54e24843,2023-10-06T15:20:09.927000
|
||||
CVE-2023-44837,0,0,5aee9220517509b69f4bde4ec41abe9da85d39e01f66ffd26cc455e41c8ce77f,2023-10-06T15:19:36.920000
|
||||
CVE-2023-44833,0,1,0c804cc3c43204c5befa90250fbfba4df8a5bf5007c06fd8daefda112103f533,2024-09-19T19:35:05.797000
|
||||
CVE-2023-44834,0,1,08996b4cba22df2276f30026a7a29031ecdcee6cb18029b0142bf849bd6c516d,2024-09-19T19:35:06.803000
|
||||
CVE-2023-44835,0,1,e17d982550d6512cf6fe9c365f1e06a437afe69d67fde550145cafbe5bb73011,2024-09-19T19:35:07.573000
|
||||
CVE-2023-44836,0,1,62a6ff921417f32c3e565b38aade4a341ea0660c3ac13f7991d1da446ddfc7c8,2024-09-19T19:35:08.333000
|
||||
CVE-2023-44837,0,1,6edc4c0f7cb805a39f28f03e490a78fd2c9751dfa21d9ab0c3067871839fa870,2024-09-19T19:35:09.180000
|
||||
CVE-2023-44838,0,0,826bd96275d8c94caef15f783d57a0f555324313131d73e5992ad76971191292,2023-10-06T15:18:30.847000
|
||||
CVE-2023-44839,0,0,a0e587d190a99eed8b1b0978216fd7d1258814f55b89567589a009468b22137d,2023-10-06T14:59:00.183000
|
||||
CVE-2023-44846,0,0,f34b0705d17778a0a98e8c488cd79f0636bd3cd4cc85846f0269be4cceaf4a53,2024-09-19T15:35:06.370000
|
||||
@ -233901,7 +233901,7 @@ CVE-2023-45234,0,0,52d30ab5beac57d2cd298224003e0bee22da7a17b147520a845e2ba90bf70
|
||||
CVE-2023-45235,0,0,cff23e65f01ec655fd14e6d133970016dc039673f6b11aca9b36e51667543adf,2024-03-13T02:15:50.617000
|
||||
CVE-2023-45236,0,0,92efaaa1bc2b9526c3c29cdc6dca31efe1a1886632750ddc1bb644329a7afb03,2024-03-07T17:15:10.670000
|
||||
CVE-2023-45237,0,0,0f5d91aa15f206eb3d1e77aa53043c5accebb7aca7118063aaf11d800c2c94eb,2024-03-07T17:15:10.760000
|
||||
CVE-2023-45239,0,1,2545b4f732ace5a74a14a9e3677c47c49ff70212481a6cf990b811f00b194a93,2024-09-19T17:35:03.203000
|
||||
CVE-2023-45239,0,0,2545b4f732ace5a74a14a9e3677c47c49ff70212481a6cf990b811f00b194a93,2024-09-19T17:35:03.203000
|
||||
CVE-2023-4524,0,0,6171a24003395a10a6c4523565599e5d20b99c80085550635695f5cb34ea1af7,2023-11-07T04:22:41.293000
|
||||
CVE-2023-45240,0,0,f711761fc8cac003e2c7eefd2a3014f0b4173d214c89b3d991292a0dafe0873d,2023-10-10T14:55:56.860000
|
||||
CVE-2023-45241,0,0,db8de00a92ca3a17a0e4f01f86babfe2ffbe4970691655ee4146d59ab57686c2,2024-02-27T17:15:10.147000
|
||||
@ -233932,7 +233932,7 @@ CVE-2023-45279,0,0,898ce636410e7ee87b3770444fcac6d3f827786fce9dcb4b413820160cb82
|
||||
CVE-2023-4528,0,0,fb6f9d976b6ad831fd6e3df0b8811afbfab41e66da4fc9cbcc5aac0b556464af,2023-09-13T01:02:46.907000
|
||||
CVE-2023-45280,0,0,587e5e1ce24b098e3665aa207a0ea7ded3e3371b3bf4c75269401122fcd388cb,2023-10-25T19:05:48.603000
|
||||
CVE-2023-45281,0,0,cd0978c74ba2a3ae2f0cd409990a0511bfb93e86139e2ad7fb10f6ba5d1be143,2023-10-25T14:47:01.093000
|
||||
CVE-2023-45282,0,0,6ed2c2cc801c83a19d22a9f4cb86f11cebdf6066eee12a34876ad1251c661720,2023-11-02T01:23:35.490000
|
||||
CVE-2023-45282,0,1,368524b1a0238251df4f98fe6fa760382cdd08500bee7e40ce4ccc29c50e3928,2024-09-19T19:35:10.307000
|
||||
CVE-2023-45283,0,0,cd5d279d60eb7cff2b94547ec8e6d00135f36cff01f6563cfb3f789184507d96,2023-12-14T10:15:07.947000
|
||||
CVE-2023-45284,0,0,73d119dc77c426359595c7c8f0829890e7bf623858b010da63a96abc58828085,2024-09-03T19:35:05.593000
|
||||
CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a300d,2024-01-20T04:15:08.013000
|
||||
@ -233943,7 +233943,7 @@ CVE-2023-45289,0,0,55227dc74f3b7eff2b0242a09fa3e698d7b0d3f59cb4bf8a9cc5e9e130d6e
|
||||
CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000
|
||||
CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000
|
||||
CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000
|
||||
CVE-2023-45303,0,0,f21ed387a8abb41711edefd2fe89234918c4e7dbf7062a4c7b8e46ea1b5c5b75,2023-10-12T18:10:31.853000
|
||||
CVE-2023-45303,0,1,688e5be499770cb09d83a318de82d649f890929552dc6a722b4fae6f03dffe83,2024-09-19T19:35:11.117000
|
||||
CVE-2023-4531,0,0,06add8a6070b98064716f1fe58388261ce4316eee88c526ba1a6617b07e80b19,2023-09-08T16:51:00.220000
|
||||
CVE-2023-45311,0,0,71d49c76ae9cfe1ccb4815d505b4234841f0d63a53ece89b238db654f857d950,2023-11-28T07:15:43.260000
|
||||
CVE-2023-45312,0,0,461d9c4a1f47fcd79a0ef49d81d7b730848406a39d4ed8738d381c26b5b04ed4,2024-09-18T20:35:04.773000
|
||||
@ -234002,11 +234002,11 @@ CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb
|
||||
CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000
|
||||
CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000
|
||||
CVE-2023-4537,0,0,d55e9c2ec2d6a309b7146da78217b22dabb54a472777f14cd37d2689a428a754,2024-02-15T14:28:31.380000
|
||||
CVE-2023-45370,0,0,9543640caf10dd3e07daee9db7f8e87f89d27c5a0e3530fda019c8f7730c9b18,2023-10-12T16:05:00.760000
|
||||
CVE-2023-45370,0,1,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000
|
||||
CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000
|
||||
CVE-2023-45372,0,0,d9bfe48c017efefbc51e4858892313d03ed6df453f512f147a4b3e1b8435be66,2023-10-12T16:04:34.703000
|
||||
CVE-2023-45372,0,1,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000
|
||||
CVE-2023-45373,0,0,eae3bb62b6bed4d1a32b5243afb1d8915435578a2d4194a9f7539a9a665df972,2023-10-12T16:05:49.617000
|
||||
CVE-2023-45374,0,0,952f3e8b059091d2fd9e2d60e5dd74685d971435a3e471f0bce6d096d2100546,2023-10-12T16:06:05.330000
|
||||
CVE-2023-45374,0,1,e7f1257195844480b5ab4252c7ad2dfc96c3635b0d1bdb6f06b94f101e8f72a1,2024-09-19T18:35:06.723000
|
||||
CVE-2023-45375,0,0,76059dcd6e9ba7e45e2b8af4dc253230088aab2bc0c3d542b3bea56d2109e241,2023-10-23T13:53:31.007000
|
||||
CVE-2023-45376,0,0,1752dcacc13952823593868aaeb32cb69bcd8a15123706c8973983a514b83041,2023-10-31T18:06:10.480000
|
||||
CVE-2023-45377,0,0,8a38d8223faf098b86051796f3101a98163b9ac34429e2c21be3610b867c9a30,2023-11-30T05:42:43.520000
|
||||
@ -234322,7 +234322,7 @@ CVE-2023-45845,0,0,9522a3662f29e92e7ad7c10b0718fcfbd446326415f192be0026a1d413e6a
|
||||
CVE-2023-45846,0,0,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000
|
||||
CVE-2023-45847,0,0,f7a26b5da655e9a29f01aa31d2e32a7796ef0da3d21aadd9906e8c1df71a55c7,2023-12-14T18:20:40.697000
|
||||
CVE-2023-45849,0,0,4630a94faf635ed71b5e98033836bda86572afa3061550d59c00be4ed0b6e7b0,2023-12-08T00:15:07.350000
|
||||
CVE-2023-4585,0,0,0c7d484dd3fd4858183e24c37b7c22e1d3749e885c104e9186641bba529400c7,2023-12-21T00:57:28.747000
|
||||
CVE-2023-4585,0,1,e01dbed274463ee65ebfe5933af4ba4d70e0f55b294738ea323aa184822c558a,2024-09-19T19:35:12.583000
|
||||
CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000
|
||||
CVE-2023-45851,0,0,a3947611dcf22f6805d628e99aaae522253196bfe6bc115a5e6e07eee5573efb,2023-11-06T14:33:29.510000
|
||||
CVE-2023-45852,0,0,9f9928a73d27493bd16960e42e3753b817edb53bf0a279e8c73f0394583e4b85,2023-10-18T21:02:05.847000
|
||||
@ -237416,7 +237416,7 @@ CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac16118
|
||||
CVE-2023-50172,0,0,0e77f8672f5cf0fb47b8becab367b19a56d5395eded77044b2dad65f5dff69cb,2024-01-18T14:28:59.977000
|
||||
CVE-2023-50174,0,0,5231481744a295e82b51c5724a4a3afbdad4616950b393d426cf684f8bc4019b,2024-02-14T18:15:46.640000
|
||||
CVE-2023-50175,0,0,1f4c148f2ad49dc23cadeda416bba9717617a9eed1ffebc27bb2042d761f8318,2024-01-02T19:53:20.863000
|
||||
CVE-2023-50178,0,1,e70c7f9333304ad169a3d817a8261a36cae8eb5c6f191d06e5ee03e53b449db7,2024-09-19T16:06:36.073000
|
||||
CVE-2023-50178,0,0,e70c7f9333304ad169a3d817a8261a36cae8eb5c6f191d06e5ee03e53b449db7,2024-09-19T16:06:36.073000
|
||||
CVE-2023-50179,0,0,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000
|
||||
CVE-2023-5018,0,0,cae5f64430f83fdd33bf69324906a6cb5316c44f52a942103dd4a7b86daf8ff3,2024-05-17T02:32:46.463000
|
||||
CVE-2023-50180,0,0,0e74c4dab87377ea6e7224cae654f4c96addd7d2706381ea322da69706e6caba,2024-05-23T15:55:49.800000
|
||||
@ -241188,7 +241188,7 @@ CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee3
|
||||
CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000
|
||||
CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000
|
||||
CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000
|
||||
CVE-2023-7256,0,1,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000
|
||||
CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000
|
||||
CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000
|
||||
CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000
|
||||
CVE-2023-7260,0,0,a283d80bfb35f6dd126dbb811c8254dc2cb2d619c2a0fdb098a89d48e2a7bedf,2024-08-23T16:18:28.547000
|
||||
@ -241353,7 +241353,7 @@ CVE-2024-0216,0,0,5db0150a6defe94c534ea06b438d3680a2481b7203149642bcafa6eeb47bdd
|
||||
CVE-2024-0217,0,0,dff0ee3a755b5789dbb3bda1883ae669fffbc3624903a03817fe2262041b1ae5,2024-02-02T15:20:25.843000
|
||||
CVE-2024-0218,0,0,e0f7082bfe7bdb2b72e28d6537974d07e10b08637004dd51d50eee8295bc543b,2024-05-28T13:15:10.927000
|
||||
CVE-2024-0219,0,0,b7044527e6312a645cfd11fb721216b84cfeb88504d813d0c3eb89e1835d8e0b,2024-02-09T17:15:31.870000
|
||||
CVE-2024-0220,0,0,d7d2c26ce46e9e9d42929c005658acc0239b79eb08b04223165988fb993b20a8,2024-05-27T08:15:09.070000
|
||||
CVE-2024-0220,0,1,4478b53c04077624854d5b69c9fe95d675429fc1d7fab33a90dc864a1050bb80,2024-09-19T18:15:05
|
||||
CVE-2024-0221,0,0,50e4123bdd9330b9856aaead23e8d95b6f2e4b19cc54edeb2503c031d7426fb8,2024-02-13T18:48:37.837000
|
||||
CVE-2024-0222,0,0,b3f6fc9b6decb29bb4c0f2b45d4d98de1d7ddc35add0e737e26b11cd8923ec19,2024-01-31T17:15:29.990000
|
||||
CVE-2024-0223,0,0,38a64de470819b095ee0b7b4b77ec34c2ec8923a888de65b096c5951a52e2499,2024-01-31T17:15:30.487000
|
||||
@ -241458,7 +241458,7 @@ CVE-2024-0325,0,0,b11f466ff4ff08fafe0e1564b77e877f7ef01996631763e0cca61be78af48c
|
||||
CVE-2024-0326,0,0,46531da0f2066fdd9f046a34fce12789358ed55a6f22b205eff42d5de697942f,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0333,0,0,9eaf58c044c101ac9ee4da325dc0cbe7baa26316edb9c32b68718e9200d8ba0e,2024-01-18T19:39:16.620000
|
||||
CVE-2024-0334,0,0,f64e24da86d08ef5624336a0a2ef7f631f77b98c0c17027395f19c584275ec3f,2024-05-01T19:50:25.633000
|
||||
CVE-2024-0335,0,0,8c70dc4c2c1cd890e3b797d6942fd50c3abf750fef2989b9ac71c6205ee38bbc,2024-04-04T12:48:41.700000
|
||||
CVE-2024-0335,0,1,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377db,2024-09-19T18:15:05.150000
|
||||
CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000
|
||||
CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000
|
||||
CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000
|
||||
@ -246192,7 +246192,7 @@ CVE-2024-24760,0,0,712e50ebe0dfd036080457db09cbfac631236bade7f3aab0fefe0bd1d6c76
|
||||
CVE-2024-24761,0,0,b1f2bf902e5fec122e2292b6e3e60586d417fb53e3af18ffd9589198f195ec1f,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24762,0,0,35449d26fd46707c48224f8b5b5217335ce323aca77c6984e1cac20361aac3cc,2024-02-17T02:15:52.700000
|
||||
CVE-2024-24763,0,0,8aa9488aba8310d408295beec746929572897f70a048552a2d0371466f18f492,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24764,0,1,51888f40f8d4272aad2d8cb14def9cb3125276a64923f00cc5389ceef9c8c258,2024-09-19T16:57:46.463000
|
||||
CVE-2024-24764,0,0,51888f40f8d4272aad2d8cb14def9cb3125276a64923f00cc5389ceef9c8c258,2024-09-19T16:57:46.463000
|
||||
CVE-2024-24765,0,0,2b41e2c8e0486bcdab8814f4f07d873fcc36842f0236f866fd2e1bdc249f0bf6,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24766,0,0,c955e8304ba83aae2f62f951890258afd73aa209a898d99ff634435549d8a4d1,2024-03-06T21:42:48.053000
|
||||
CVE-2024-24767,0,0,96e52ab9e08a81077d985c7f3ec93901c3b769f1869cb5507b822b4ac772704c,2024-03-06T21:42:48.053000
|
||||
@ -246835,6 +246835,7 @@ CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb3
|
||||
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
|
||||
CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000
|
||||
CVE-2024-25673,1,1,81e639b1f7fbf8754b4e267411fcc130c67ff83ee62eb8538403064c33f649ae,2024-09-19T19:15:24.093000
|
||||
CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000
|
||||
CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000
|
||||
CVE-2024-25676,0,0,a08186e93b8e72e7d0fccd86e2d99f3ceb03caa74e9fe0fb3ce31f97ab303d23,2024-05-02T13:27:25.103000
|
||||
@ -248271,7 +248272,7 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0
|
||||
CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000
|
||||
CVE-2024-27348,0,0,add8565b363ebc7d89e1b1994d7f3550469242b7a7f9dbd84c0a9f2f5bcf2bcf,2024-09-19T01:00:03.120000
|
||||
CVE-2024-27348,0,1,e96554afb28cbad659be9176aa4ca79d5b61a879b075bffbc242daa401baea3d,2024-09-19T19:55:24.297000
|
||||
CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000
|
||||
CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000
|
||||
@ -251147,9 +251148,9 @@ CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea07
|
||||
CVE-2024-31411,0,0,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000
|
||||
CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000
|
||||
CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000
|
||||
CVE-2024-31414,0,0,e14364144fa3f237790ebf592477e0e40448a812dc429d2d1bc787aa72072c1a,2024-09-14T11:47:14.677000
|
||||
CVE-2024-31415,0,0,d00ba0ed8019050c1160e178755b13bc22aaa5775f7d5c37e54fc4949be98447,2024-09-14T11:47:14.677000
|
||||
CVE-2024-31416,0,0,c5045af1311803e878612c4da84972621f9a5f9de399d3ca1c47f45ef3f2c50e,2024-09-14T11:47:14.677000
|
||||
CVE-2024-31414,0,1,e387f0c66bf477a9777c6073fbe8e1bf77c81fd3f2da5d969d5f9db7d198c8b7,2024-09-19T18:48:25.893000
|
||||
CVE-2024-31415,0,1,4af626a01b2b209263b9f18365da822790629e58a8f2859d318f652182ce6cf7,2024-09-19T18:50:27.827000
|
||||
CVE-2024-31416,0,1,0d8c2b6f5939f620709e7ed49bc9a2b299d23aa8d9465d6808a0e5cb060665e0,2024-09-19T19:06:59.787000
|
||||
CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3142,0,0,983e14121dea75c617117997ac50797df98bf192fa8cfa7597e476b17cc231ee,2024-05-17T02:39:44.690000
|
||||
CVE-2024-31420,0,0,93cd6c74288acbee362fcfe80ff941e3294a823738c730373f8d597f177cf09c,2024-04-03T17:24:18.150000
|
||||
@ -251249,7 +251250,7 @@ CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db
|
||||
CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000
|
||||
CVE-2024-3156,0,0,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000
|
||||
CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000
|
||||
CVE-2024-31570,1,1,302362516937afe00aad1ae54e1b06de52069ec662fa4dedeb63a6ddae2290c9,2024-09-19T17:15:12.623000
|
||||
CVE-2024-31570,0,0,302362516937afe00aad1ae54e1b06de52069ec662fa4dedeb63a6ddae2290c9,2024-09-19T17:15:12.623000
|
||||
CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000
|
||||
CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000
|
||||
CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000
|
||||
@ -252164,7 +252165,7 @@ CVE-2024-32855,0,0,c49305c977dd2e708a0d316df4ef9be1d74cd331a1c2ffedbc125e28a1059
|
||||
CVE-2024-32856,0,0,6d8137a0b9dec706e783082fa3a1037a7f0ce7ef4a6d1bed9d383583e1a8b038,2024-06-13T18:35:19.777000
|
||||
CVE-2024-32857,0,0,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196183,2024-08-08T21:10:04.773000
|
||||
CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-32859,0,1,6878eb303e3fed06b69428c85d734cc5e74e821709864440c8758419372d20f9,2024-09-19T16:24:39.147000
|
||||
CVE-2024-32859,0,0,6878eb303e3fed06b69428c85d734cc5e74e821709864440c8758419372d20f9,2024-09-19T16:24:39.147000
|
||||
CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000
|
||||
CVE-2024-32860,0,0,140d176974a544a70b011e4a7385dddf6177887685faa32d97074b7714e98c8d,2024-08-16T16:46:36.203000
|
||||
CVE-2024-32861,0,0,4690ae217a4b596d64e69c4e91eed7a814ce164eeb5aed983f8d559fa108dfae,2024-08-02T03:15:20.680000
|
||||
@ -252358,6 +252359,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176
|
||||
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
|
||||
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
|
||||
CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
|
||||
CVE-2024-33109,1,1,623840b47a3d2080ddfa6fe372db92281baacbad134dc7e3c1b1fb9648b17803,2024-09-19T19:15:24.170000
|
||||
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
|
||||
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
|
||||
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
|
||||
@ -252668,8 +252670,8 @@ CVE-2024-3365,0,0,e3ada40b6344afa9237bbf3a9dbdf421d928eb8fa8993a69cd37398003bfb8
|
||||
CVE-2024-33650,0,0,8f98f6950383ea7bb5fba364f4ca6f73e01e32591eac1d754836fc53112322d7,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33651,0,0,f2ee7352faa4d013ce2dbc2e7d6ca251932118d3e5b2422d264e03fcb1cbdc4e,2024-04-26T12:58:17.720000
|
||||
CVE-2024-33652,0,0,486e801beae2c2c99c631668abda9d91af90b0e1a9af64a8cd7a679f08c5c36e,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33653,0,1,f131ad381140a4aa9c30ffd8ecb2981958292f1cb9df7cad93511d6d48dc2039,2024-09-19T16:00:12.400000
|
||||
CVE-2024-33654,0,1,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a98c5,2024-09-19T16:00:43.363000
|
||||
CVE-2024-33653,0,0,f131ad381140a4aa9c30ffd8ecb2981958292f1cb9df7cad93511d6d48dc2039,2024-09-19T16:00:12.400000
|
||||
CVE-2024-33654,0,0,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a98c5,2024-09-19T16:00:43.363000
|
||||
CVE-2024-33655,0,0,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000
|
||||
CVE-2024-33656,0,0,bcce08f394a095ebca60ada0fb4a4aafac76a15e930d7944ca1f9457799a1c56,2024-08-21T17:24:59.627000
|
||||
CVE-2024-33657,0,0,4304e9ad6a833f4e772f3f337e66d35550f113c5280de638d62e655b681eb6cd,2024-08-21T17:24:59.627000
|
||||
@ -253139,7 +253141,7 @@ CVE-2024-3434,0,0,665daf763cf280ad6e13fab45ba57a35fec69ba9e6cd1628917c4e7d75dedc
|
||||
CVE-2024-34340,0,0,ce6bbf8ca46ec29426c800768c938c7ed5fd800a09085acbf821400587996e11,2024-06-10T17:16:28.827000
|
||||
CVE-2024-34341,0,0,874d0ac87ba692c788b408f2928cb7b384b1146ea2fb2be7ea431c974b164434,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34342,0,0,3e142b43b7b4afad7d384023ad82da3d4505656b73350774ba0911c6409bd959,2024-05-07T20:07:58.737000
|
||||
CVE-2024-34343,0,0,066fdbea031320951bbbb7067bbd91806cf74901441b806a1f8acbcf80dda5d7,2024-08-06T16:30:24.547000
|
||||
CVE-2024-34343,0,1,a3b005bc8eba213738fde9a67dd414ba97bac0d8e4da53b457c6cda9ca8b4f39,2024-09-19T19:57:52.007000
|
||||
CVE-2024-34344,0,0,f5a9ba01025bca91b189ed9bcd3017020d0db224ae447d4b59293ea787794849,2024-08-06T16:30:24.547000
|
||||
CVE-2024-34345,0,0,af3be7ad8b1b1d44ae22efd1e5357ec15980df2dfb15c98b9c630c2989cf22cf,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34346,0,0,461f54cd153daac8a3bd1e483b3a64b76b9087848b91f7f6ce6604a27c331020,2024-05-08T13:15:00.690000
|
||||
@ -254668,8 +254670,8 @@ CVE-2024-36414,0,0,3a5660a66d942114556bd0815630fa2959614be320647325e5bb5b0dd386e
|
||||
CVE-2024-36415,0,0,3d862aa9f2826b7b61961813da971e9ec48ebb49fe79a256d77ce95e1decf2be,2024-06-12T17:58:53.497000
|
||||
CVE-2024-36416,0,0,d6ce7543acefc397e88a4e607f8e8cd9d6d7c5889aa1948b360b7ced938d60dd,2024-07-22T17:15:03.773000
|
||||
CVE-2024-36417,0,0,1ea038de4e5acdad4256a27455220cbea49cafc564bda7423cce84beb58771db,2024-06-12T17:58:04.477000
|
||||
CVE-2024-36418,0,1,de9964a7d485c183b822b8eee7a7bbc85f459ebb87460abd5abb1e92f4c47751,2024-09-19T16:28:35.647000
|
||||
CVE-2024-36419,0,1,4f7a601ca880551c5e81b870e61d1cdfdece76b4b4881ac77c77b77ddf8951df,2024-09-19T16:31:00.760000
|
||||
CVE-2024-36418,0,0,de9964a7d485c183b822b8eee7a7bbc85f459ebb87460abd5abb1e92f4c47751,2024-09-19T16:28:35.647000
|
||||
CVE-2024-36419,0,0,4f7a601ca880551c5e81b870e61d1cdfdece76b4b4881ac77c77b77ddf8951df,2024-09-19T16:31:00.760000
|
||||
CVE-2024-3642,0,0,18761de76cd7cd0e44650c50bce43f4d6feb32d4cdbac8c295b7b13430f4f486,2024-05-16T13:03:05.353000
|
||||
CVE-2024-36420,0,0,f88ca1da3f418238df7aa68f8868409c11480e63fa5a419dd8cae87369fdc260,2024-07-03T15:29:45.557000
|
||||
CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a5422db,2024-07-03T15:36:31.170000
|
||||
@ -255684,7 +255686,7 @@ CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d
|
||||
CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000
|
||||
CVE-2024-38014,0,0,667a2ca3aa42729c9c1f636c1bc19b21cfc3cbfc4eb15603accaad3e335421c5,2024-09-12T01:00:01.133000
|
||||
CVE-2024-38015,0,0,5b1426585b115ad720503cf293b548c59cb7459bc19ab9bc440800c3121fe7f4,2024-07-11T16:18:10.113000
|
||||
CVE-2024-38016,1,1,b2d3139c2c71c4856b736470c4446e549feac25fb459136c9a56122bc3ca8899,2024-09-19T17:15:12.947000
|
||||
CVE-2024-38016,0,0,b2d3139c2c71c4856b736470c4446e549feac25fb459136c9a56122bc3ca8899,2024-09-19T17:15:12.947000
|
||||
CVE-2024-38017,0,0,b2da9df045e49b65d6e2e15b7cfe34dfa17f558263037e08e7692bad9d214937,2024-07-11T16:20:51.827000
|
||||
CVE-2024-38018,0,0,60b7566e82c4496b0dca7d4fdef697c13c6221141b8468138e42395de75492a1,2024-09-18T15:04:58.240000
|
||||
CVE-2024-38019,0,0,da6757aee92bad96249ea36fde1018805a15808ac2fa25fa1dd2f958ebdbe19f,2024-07-11T16:21:19.367000
|
||||
@ -255991,7 +255993,7 @@ CVE-2024-38372,0,0,3d54cf49c69f5dcfca10b8ed801434d5b29c7aa6896635c0f913f2cd2b718
|
||||
CVE-2024-38373,0,0,871cf732e8d89daf91760031051bd3f20f88f5dad720fab8628df5921c7be18f,2024-06-26T15:02:05.100000
|
||||
CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b1b2,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38375,0,0,626cc37017b5b99d342165d2bf910513bdb2fdf5a18a0e825a4ce243860e1792,2024-06-27T12:47:19.847000
|
||||
CVE-2024-38379,0,1,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000
|
||||
CVE-2024-38379,0,0,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000
|
||||
CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d07b,2024-08-06T19:35:06.410000
|
||||
CVE-2024-38380,0,0,627f70dd365a9409327379c2bf73f222a1302e203d88da4a7b50dd6bb1c7485f,2024-09-17T18:15:03.680000
|
||||
CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000
|
||||
@ -256565,7 +256567,7 @@ CVE-2024-39313,0,0,9e833554bfb77c34493fd31ffb1eaf0ef9773e2886372005ffb0d80f9a99c
|
||||
CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee2c4,2024-07-02T12:09:16.907000
|
||||
CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000
|
||||
CVE-2024-39316,0,0,0330ee1f4f66ad5c4fc8d75b41d6a1a5d4b46137b39514674c0311e081ce6ff7,2024-07-02T17:44:45.700000
|
||||
CVE-2024-39317,0,1,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000
|
||||
CVE-2024-39317,0,0,bae2aa4f7badec0edc31db102a83207f0bd6d840ba46b9f715d3db216be3b8e0,2024-09-19T16:08:43.417000
|
||||
CVE-2024-39318,0,0,d84809b5481c68217d59c341f89a33a753d6db4b36e662db9d71acc330a074f7,2024-08-01T12:42:36.933000
|
||||
CVE-2024-3932,0,0,d78b7c01d3f6b397349c50b0cef81a61649a3d63b8878b7ded7786d99bb82db6,2024-06-06T20:15:14.030000
|
||||
CVE-2024-39320,0,0,e4457acba8f556f298935fbc133601a3fb3b1932660972d8c1667e76d43acbce,2024-09-11T14:09:44.857000
|
||||
@ -257086,6 +257088,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca
|
||||
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
|
||||
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
|
||||
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
|
||||
CVE-2024-40125,1,1,cc8392b182c6e8c7ee622740e83412c4a0ff89e87d8cc4c186b22da6539e9ed9,2024-09-19T19:15:24.350000
|
||||
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
|
||||
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
|
||||
CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
|
||||
@ -257204,7 +257207,7 @@ CVE-2024-40554,0,0,975eaaed007d6b505cb8ba22ce57b12be37e7b3d2ebcc8a575de58b8f5a20
|
||||
CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f460,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4056,0,0,7c25f0a1764fd01965b39ebc13bb94a8ae53607d9ce0dfc30a27083c9e919722,2024-08-27T11:15:04.430000
|
||||
CVE-2024-40560,0,0,08dc0b5066047c5e119a09d69ea20c085f8549859adcaecbbf38995d7d2e2e54,2024-08-01T13:57:50.440000
|
||||
CVE-2024-40568,0,0,fa33a3ce565335eff8c471d4854e347140063afa111c56d97dc2dc6d636b2948,2024-09-18T21:15:13.390000
|
||||
CVE-2024-40568,0,1,293cc67ac7cb929d50728436658796c25ce534bf9199331065d8c719678bb7f3,2024-09-19T19:35:13.880000
|
||||
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
|
||||
CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000
|
||||
CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000
|
||||
@ -257406,7 +257409,7 @@ CVE-2024-40860,0,0,e36dab9e833d088b935ab68c9a151e9f1fa4c0b43f03d6bb0621ce4e4428b
|
||||
CVE-2024-40861,0,0,d87cf92bd694c19d1e4d3aca5f00c6e43dee289f9de1a39f0fc2b781db69db0f,2024-09-17T15:35:08.583000
|
||||
CVE-2024-40862,0,0,41adab65858c72ffe5166360c0c7d08451acfb072731fac3b645799d62b8fb88,2024-09-18T08:35:48.760000
|
||||
CVE-2024-40863,0,0,8102a55f22f39834a5de79e8de0f022b089678ae9882643f5ee65b65c051fabf,2024-09-17T00:15:49.793000
|
||||
CVE-2024-40865,0,1,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
|
||||
CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000
|
||||
CVE-2024-40866,0,0,ffb4d4555ccfaa65df4084c4704bde934d69f675e3f09339fb6d0f4bf47c0770,2024-09-17T00:15:49.840000
|
||||
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
|
||||
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
|
||||
@ -257826,7 +257829,7 @@ CVE-2024-41550,0,0,6726e0c6849e70c536d9bf6936241acc920718305f74521a185836b6b5189
|
||||
CVE-2024-41551,0,0,a47b3d6d1401636bd7731728d6fcb9c38717d9cec4c98b37b50c290693f43ad0,2024-08-01T13:58:54.023000
|
||||
CVE-2024-4156,0,0,31cc9500838d0dc99d5959700d84ebbac93048893a2eb67f37ed77d13093550c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-41564,0,0,3f9573f6925d935097a5479628729abea72980995a08b63ebbf863a6de0d308b,2024-09-19T14:40:32.270000
|
||||
CVE-2024-41565,0,1,09b9917fbb2f411622e9ea1f75fe318038921a2fcca27e9c7f8474c7ccbe8a12,2024-09-19T16:19:59.317000
|
||||
CVE-2024-41565,0,0,09b9917fbb2f411622e9ea1f75fe318038921a2fcca27e9c7f8474c7ccbe8a12,2024-09-19T16:19:59.317000
|
||||
CVE-2024-4157,0,0,ac5ec2e690c76b81403cfa49bc63d1a8caa2fb9d97d28a1055398849720db727,2024-05-22T12:46:53.887000
|
||||
CVE-2024-41570,0,0,548cd2006d0021700d97d9ac462942b0586c18cb85e20f0c023fdc6e3f8676c8,2024-08-29T13:32:21.020000
|
||||
CVE-2024-41572,0,0,e3312852513c75151c7b09071c0730654908f266b196f942a02a8abd098a0bd7,2024-09-11T14:15:13.380000
|
||||
@ -258608,7 +258611,7 @@ CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca7
|
||||
CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
|
||||
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
|
||||
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
|
||||
CVE-2024-42698,0,1,de1720a9d956d361c16c9949dd2868e63ee7adfae9f7ccbc87c98136280e24e5,2024-09-19T16:29:51.217000
|
||||
CVE-2024-42698,0,0,de1720a9d956d361c16c9949dd2868e63ee7adfae9f7ccbc87c98136280e24e5,2024-09-19T16:29:51.217000
|
||||
CVE-2024-4270,0,0,17133812b9c812b17ff2909d738c8b5ae6f8cc2b39eef016edec8cd05359b195,2024-07-29T16:31:09.117000
|
||||
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
|
||||
CVE-2024-4272,0,0,c6d51ebaf4553eb5c8964297a8a6646c1c8e34e58f8be34bef185e25a27d5cec,2024-08-01T13:59:29.913000
|
||||
@ -259488,7 +259491,7 @@ CVE-2024-44575,0,0,201a6ca7c7ab73c1cf72eb94fa46c058ee5fb2f214506723411e1243ae73d
|
||||
CVE-2024-44577,0,0,f23b5398825615b1e4c9cdd4a9ee17debd24c87e40c16b163c6e9227921995f9,2024-09-12T12:35:54.013000
|
||||
CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000
|
||||
CVE-2024-44587,0,0,df65b03ef618d179da9d66b0f4fc4c4e495ab75863a2207f1a4d99901686f98d,2024-09-05T17:44:56.007000
|
||||
CVE-2024-44589,0,1,8cb7fe0028eed391be14922113778103f1f7a9710ff1959caf828ca38391a02b,2024-09-19T17:35:04.797000
|
||||
CVE-2024-44589,0,0,8cb7fe0028eed391be14922113778103f1f7a9710ff1959caf828ca38391a02b,2024-09-19T17:35:04.797000
|
||||
CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000
|
||||
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
|
||||
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
|
||||
@ -259745,7 +259748,7 @@ CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c
|
||||
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
|
||||
CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000
|
||||
CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000
|
||||
CVE-2024-45159,0,0,536b41a2ee45b72a77485ff00b0df03c600eee1ed452fbccbec7bdbd95c0104a,2024-09-06T12:08:04.550000
|
||||
CVE-2024-45159,0,1,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000
|
||||
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
|
||||
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
|
||||
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
|
||||
@ -259760,7 +259763,7 @@ CVE-2024-45172,0,0,68b3dace475f9bcf51f79da5da4aa2b3c04841de6dc44424481c247078201
|
||||
CVE-2024-45173,0,0,9a54bf008dec04451b7071ad4cee60b11c2ddc76ef8f26e46ea5715d67b0ea43,2024-09-05T18:35:11.413000
|
||||
CVE-2024-45174,0,0,2ba63c333cfe37e6c7dca9f72909d21c7893acb52b292b0e6cf7a4a15b777141,2024-09-05T12:53:21.110000
|
||||
CVE-2024-45175,0,0,4ada181a2aa083d471c5722f19453f1bfb3dcb4512c65292efacb2e8f687f29f,2024-09-05T18:35:12.220000
|
||||
CVE-2024-45176,0,1,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000
|
||||
CVE-2024-45176,0,0,db59498dbbbd1220886c359bd2c67c79d060ad645451aba913ef23c50057d344,2024-09-19T17:56:15.603000
|
||||
CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000
|
||||
CVE-2024-45178,0,0,2894143084503cc7bb4d728541a98225973d7da963e85745983ffa8b8255b936,2024-09-05T17:44:56.007000
|
||||
CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000
|
||||
@ -259823,7 +259826,7 @@ CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e
|
||||
CVE-2024-45300,0,0,371ea055cbd370f2315f57d501b2d8bde7fe9993dc271953659e5b000db99936,2024-09-06T16:46:26.830000
|
||||
CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45303,0,0,0f2993ec35c2f5c69a86f92f14083da5a1f9682262497cdf98941162719918c3,2024-09-18T20:25:05.807000
|
||||
CVE-2024-45304,0,1,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000
|
||||
CVE-2024-45304,0,0,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000
|
||||
CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000
|
||||
CVE-2024-45306,0,0,2089f2b015e15041c3f3807cc6f2c8eb1cf893208c28e4b1ca171ff53a3a8feb,2024-09-03T12:59:02.453000
|
||||
CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000
|
||||
@ -259861,8 +259864,8 @@ CVE-2024-45395,0,0,40bba716ba89648b0a5b0a469128bfb2472f289be140a10878a9431641f22
|
||||
CVE-2024-45398,0,0,7758f6d65fcbad19eab77bcca68b8445fb5c0f0afca8b3214cdef86ff36248a6,2024-09-17T20:15:04.670000
|
||||
CVE-2024-45399,0,0,037a7bffbd0f8d9091903d0d9148831df46e7343b0a57250b24ff56b22720edf,2024-09-05T12:53:21.110000
|
||||
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
|
||||
CVE-2024-45400,0,0,af1e2f79a14b2efa09c2579698273d7be8e8e6f2c9b71f5e572cda7963b006a6,2024-09-06T12:08:04.550000
|
||||
CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd48835a,2024-09-06T12:08:21.290000
|
||||
CVE-2024-45400,0,1,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000
|
||||
CVE-2024-45401,0,1,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000
|
||||
CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000
|
||||
CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000
|
||||
CVE-2024-45407,0,0,363c12723797ac0c72d1d271ead356acc799cc8a41f14636bd37d7f20defb6ac,2024-09-10T17:43:14.410000
|
||||
@ -259880,7 +259883,7 @@ CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd
|
||||
CVE-2024-45435,0,0,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000
|
||||
CVE-2024-45436,0,0,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000
|
||||
CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000
|
||||
CVE-2024-45440,0,1,5c40cf851b4b7b9412ff4be7ed9eec976a4116ec7f3a4af3e7cd032e9d9d181b,2024-09-19T17:38:40.100000
|
||||
CVE-2024-45440,0,0,5c40cf851b4b7b9412ff4be7ed9eec976a4116ec7f3a4af3e7cd032e9d9d181b,2024-09-19T17:38:40.100000
|
||||
CVE-2024-45441,0,0,5d4634290df0954dd0f61dff1649f0dd3d3d4ad0fc1e8ec875e3be2f2406d8e3,2024-09-12T19:35:47.880000
|
||||
CVE-2024-45442,0,0,88ceab2d364754645573afab825dc9db7db1156b26adadd90889beed39cf5305,2024-09-13T20:00:30.680000
|
||||
CVE-2024-45443,0,0,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000
|
||||
@ -259894,10 +259897,10 @@ CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97a
|
||||
CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000
|
||||
CVE-2024-45451,0,0,5229461646061f5229c33d4bf801b0a9f7047a3683ddb2578fb28570321f2734,2024-09-17T23:15:20.970000
|
||||
CVE-2024-45452,0,0,fdfee902792e194b32d188f2f974cff27f1fb2a2547b725b9bb68c5c8e0a2fab,2024-09-17T23:15:21.183000
|
||||
CVE-2024-45455,0,0,2252ed0190aceaaf231db9e13c20002f9f0347dbc9cd3d6637ac9295250f3d43,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45456,0,0,f24597a7e3d48154883583103775982966f08c6eeafb8e5ace41268c1fcf3230,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45455,0,1,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000
|
||||
CVE-2024-45456,0,1,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000
|
||||
CVE-2024-45457,0,0,56f051ff4ecd4b6bed95d9151f6e0b39eb3d323739c8a3289fa8218221d2fc6c,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45458,0,0,40cddece72fc94745b6e482a4da9ccb4b2ab5ddfcc0bf5466a7b36c8f5eb9014,2024-09-16T15:30:28.733000
|
||||
CVE-2024-45458,0,1,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000
|
||||
CVE-2024-45459,0,0,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000
|
||||
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
|
||||
CVE-2024-45460,0,0,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000
|
||||
@ -259924,7 +259927,7 @@ CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c
|
||||
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
|
||||
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
|
||||
CVE-2024-45537,0,0,522e8ad70c4a2b88082c6938714c807f5fbe9d880fbc938f7c7e90871d6ceaae,2024-09-17T19:15:28.157000
|
||||
CVE-2024-4554,0,0,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000
|
||||
CVE-2024-4554,0,1,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000
|
||||
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
|
||||
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
|
||||
CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000
|
||||
@ -259955,7 +259958,7 @@ CVE-2024-45617,0,0,6cb16d6fbb6421ff7c08177427efbe84e4a03cb3cf72e212ba5673d3ad33a
|
||||
CVE-2024-45618,0,0,dc2dc7fd3bf0d86469d9d1e7cf8afe886c6a0db83c5b7c56e1d5c7bc488c4153,2024-09-13T16:30:27.693000
|
||||
CVE-2024-45619,0,0,19913ec071f09571eb2fafb85b3bcf05650473cef15788106e54de572df55757,2024-09-18T09:15:05.227000
|
||||
CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-45620,0,0,4b93eb131fcc5aa370c611a1d350fa96cf799a590a6dd2ccf111caa79d7e72d1,2024-09-12T19:38:16.130000
|
||||
CVE-2024-45620,0,1,62d7efd1f4f3b2c671c5ae6f75d170d2e8f1f728e1204e1922e6a8c5eec065f3,2024-09-19T19:21:38.653000
|
||||
CVE-2024-45621,0,0,0e87271e3b523f5d125d92dc504ca3a7772b99de219d6f52d1ecafc891e937da,2024-09-16T17:28:53.437000
|
||||
CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000
|
||||
CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000
|
||||
@ -259983,7 +259986,7 @@ CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df6109
|
||||
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
|
||||
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
|
||||
CVE-2024-45752,1,1,011305e5643eeb4a93bf894c37aad5e6746c1482bd06f4dd86def3fd52eea26e,2024-09-19T16:35:06.277000
|
||||
CVE-2024-45752,0,0,011305e5643eeb4a93bf894c37aad5e6746c1482bd06f4dd86def3fd52eea26e,2024-09-19T16:35:06.277000
|
||||
CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000
|
||||
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
|
||||
CVE-2024-45769,0,0,92aeaef10977321b3b8f880452f808da2ba9009b0d38d64b0d275ffae85a5d17,2024-09-19T14:15:17.120000
|
||||
@ -260035,8 +260038,8 @@ CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54
|
||||
CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000
|
||||
CVE-2024-45858,0,0,26e716964960a7625743254ab836d7c358ad6927670be1bca3f8d6e0ddda0dbf,2024-09-18T15:15:16.333000
|
||||
CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000
|
||||
CVE-2024-45861,1,1,f2700b8537298b1d77c39a6181a74a65e0b5407cbb7c0f50791135712d1ab8bf,2024-09-19T16:15:05.103000
|
||||
CVE-2024-45862,1,1,8bee6ce34dafde56e12a20a08c53abf8f2aee4852ffb0aff5a366ec400a7c326,2024-09-19T16:15:05.227000
|
||||
CVE-2024-45861,0,0,f2700b8537298b1d77c39a6181a74a65e0b5407cbb7c0f50791135712d1ab8bf,2024-09-19T16:15:05.103000
|
||||
CVE-2024-45862,0,0,8bee6ce34dafde56e12a20a08c53abf8f2aee4852ffb0aff5a366ec400a7c326,2024-09-19T16:15:05.227000
|
||||
CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000
|
||||
CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000
|
||||
CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000
|
||||
@ -260093,8 +260096,8 @@ CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef
|
||||
CVE-2024-46362,0,0,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000
|
||||
CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-46372,0,0,fd6f56a0663f220726a1bac55ab58f9ad10bc05a60b983463690dc99ae056ea6,2024-09-18T21:15:13.443000
|
||||
CVE-2024-46373,0,0,7e35dc6500a4231fa63976e944e360586157ff1c000ec1338e970f1d2cf36139,2024-09-18T21:15:13.497000
|
||||
CVE-2024-46374,0,0,2d124efc7e040a46a76f3f4ea0cc4f1ea6dc1b6fe7a5ac9c6be3c92ddba5c018,2024-09-18T21:15:13.543000
|
||||
CVE-2024-46373,0,1,26308fac89234bd0c4e6545029c0375bca524ac42183e23bc115426b28dd097d,2024-09-19T19:35:14.767000
|
||||
CVE-2024-46374,0,1,d8f5ae0d53687ee2132192046d5833100ce6e39c88021fb4246bbf0f13d8b372,2024-09-19T19:35:15.573000
|
||||
CVE-2024-46375,0,0,a3753b0b860f3107bde948855a197ee1efaa17527c91f22e315c5003ce34e48c,2024-09-19T14:35:06.727000
|
||||
CVE-2024-46376,0,0,a3c7dd3b4bc749abac101cd27fd7d78b57ef129d32ef5359aae71578abaf0c50,2024-09-19T14:35:07.493000
|
||||
CVE-2024-46377,0,0,95e91e17e2ab812f3da9298bb3d6639e1f6afea01389da755fb47626e16ccaef,2024-09-19T15:35:09.843000
|
||||
@ -260175,24 +260178,24 @@ CVE-2024-46678,0,0,0e842f6f0546edbddbc3c711ac91deff93c4a1dd44f16ff31c31239d48d66
|
||||
CVE-2024-46679,0,0,5bde69d05e3c296a2601ee086688ce4b06bc49b8b5611729b2be82e470bb0f3d,2024-09-13T14:06:04.777000
|
||||
CVE-2024-4668,0,0,ecbe5c3985983203e802de76c9f88e6fca1078853835be834d70b53a54cc9e61,2024-05-30T13:15:41.297000
|
||||
CVE-2024-46680,0,0,53c6bf89a5bc3949c31b94cf312216e18ee2de106f93d5214fdad7ca6fdc356e,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46681,0,0,1e50ea04845187a91f4f21406f7e93a07cc0e4dfd59a8462802044e628fe7824,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46681,0,1,66e176f13756dcc0d8ab331fd0f39d2f2c349ffd10d9d4cbb6d64818840f1c2b,2024-09-19T18:10:49.623000
|
||||
CVE-2024-46682,0,0,ac171974a7e950a314e59d0243b9e9f062b63a309ff607f2a164bec5594c8099,2024-09-13T16:52:02.067000
|
||||
CVE-2024-46683,0,0,5299c97d1fc80f78dbfc5ccddf1bf7e66a8882d99e8d0b9ff70c92161eec2568,2024-09-13T16:52:14.373000
|
||||
CVE-2024-46684,0,0,5a44bb026dfdb6b73fcc4c9fa21162b9fc4154517e61f7ace6c17f322254cebc,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46684,0,1,3dd8d6161a75a02a3be01356f95b0f512dd073e666142fad3ca14e59b093e391,2024-09-19T18:04:22.623000
|
||||
CVE-2024-46685,0,0,1b48d894cf37f05d909d964324e0bdd0c004048501a99e5c3c6ac200b20fa0d2,2024-09-14T16:00:55.547000
|
||||
CVE-2024-46686,0,0,4afc0303c037a90aa176527c5c1d12aa028b7efb97890dbc9b5bee7f3de95eed,2024-09-14T16:16:33.087000
|
||||
CVE-2024-46687,0,0,6df93b329e4c9b4912f75ba797c3862dd3825d176bc4b8d52421481a95ca02a9,2024-09-14T16:17:33.073000
|
||||
CVE-2024-46688,0,0,d2d8d862ff8f73fb0df2a233ca2e46f800252dbe84e09f5f72fee3526fe8b520,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46688,0,1,742ceea25117b25b2bd80750a6e9911adc074107f75e2746760ff11b497a9894,2024-09-19T18:01:43.037000
|
||||
CVE-2024-46689,0,0,d4a917f4af8389cbed7fe97091a2204305beeb74bbc4442a420d1eb90798629a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-4669,0,0,a0976f7ea3148ea450eb6167436e6be2dce8d6ef83862711f573c56cae3ce5e3,2024-06-13T18:36:09.013000
|
||||
CVE-2024-46690,0,0,5af0b3656d8665491f28716ea7603bb0aea5a272e8c1bf40ddd30a1255705d3f,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46691,0,0,8d55b848b81c7cb2c778de047700fe79e5a572a7f93e6b725cb6041c3a622df9,2024-09-13T16:52:21.057000
|
||||
CVE-2024-46692,0,0,9bca0a6bdb61a96f9bc64b59f8db4ea9997f8804d892b4802b2be44c689f8375,2024-09-13T16:52:31.627000
|
||||
CVE-2024-46693,0,0,f40beda26d58dd63f40fce79476da79807c21e41b509da1c16e262d523bfeffd,2024-09-13T16:52:41.270000
|
||||
CVE-2024-46694,0,0,f3c662a07d20538ea5dd6d89e6508a4bf0609b9b63e75079997ab6c6b086a693,2024-09-13T14:06:04.777000
|
||||
CVE-2024-46695,0,1,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000
|
||||
CVE-2024-46694,0,1,06269357f08eee761908cfd9b04c5fe20fc860e28bbdb44b42b210145df9925d,2024-09-19T18:16:22.247000
|
||||
CVE-2024-46695,0,0,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000
|
||||
CVE-2024-46696,0,0,4daffe95396a7dfd0d7acd939b4305def2a9b7710efef4f9245a07291857d3de,2024-09-13T16:52:54.363000
|
||||
CVE-2024-46697,0,1,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000
|
||||
CVE-2024-46697,0,0,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000
|
||||
CVE-2024-46698,0,0,dd18a350b42292bfa692742bfea20969ac387a40a6df6f50c4209832f6c49c3c,2024-09-13T16:53:03
|
||||
CVE-2024-46699,0,0,06698b262190134bec89f3644bb256a03fde8105e3a035b81d99b56d18cdb050,2024-09-13T16:53:10.620000
|
||||
CVE-2024-4670,0,0,08919fb788216a4ef8fb408ade2563afef66ea572b0f16375f44123bc9f15eb1,2024-05-15T16:40:19.330000
|
||||
@ -260202,7 +260205,7 @@ CVE-2024-46702,0,0,5aad35e2d7d1ccbb97d6a3251704aac50eabfd028ebefa2b04bd88e7e42de
|
||||
CVE-2024-46703,0,0,e11c195a259f3df31398758ffb3ccf027e5548f4969c954514a9f4cce3608756,2024-09-19T13:33:57.563000
|
||||
CVE-2024-46704,0,0,f78588eb2f2a44341e8643254e6b27a014ea20b715f19c482965344be2a2c1ed,2024-09-19T13:32:39.257000
|
||||
CVE-2024-46705,0,0,90099fce686500ca9a4af7d5dad56b9132c185dd3789d400df5fe529ab883451,2024-09-19T13:30:44.133000
|
||||
CVE-2024-46706,0,1,42db06665631a62d321d7edbfb78183067249013c54e16b47c4a6e6ba7502d1b,2024-09-19T17:51:07.670000
|
||||
CVE-2024-46706,0,0,42db06665631a62d321d7edbfb78183067249013c54e16b47c4a6e6ba7502d1b,2024-09-19T17:51:07.670000
|
||||
CVE-2024-46707,0,0,74dcaf9ed923021710159c21f486f26a1f03ecaa0f7a649f40a6ffec6ab91290,2024-09-19T13:29:46.757000
|
||||
CVE-2024-46708,0,0,87dc269451b066b6993dbb5930897253927943ffe2fed7d96f86c37f09c45816,2024-09-19T13:28:49.483000
|
||||
CVE-2024-46709,0,0,4fbf8864408f806038214e80c57c5097ea72706b241ae096cb98bc0895ec0e4c,2024-09-19T13:26:24.140000
|
||||
@ -260367,7 +260370,10 @@ CVE-2024-4712,0,0,8c9912a72fdb973e445c03f0c431e473f67586d80716ea23b3c04f9af648d8
|
||||
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
|
||||
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
|
||||
CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000
|
||||
CVE-2024-47159,1,1,37cd59fd117f5cf50861cd88b8abebb1e1884db1ba94dfcf9ceb69cfa69bb528,2024-09-19T18:15:09.803000
|
||||
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
|
||||
CVE-2024-47160,1,1,3f6af29a5418c0ea31328b241c0a67d429ed0f2ea9a2a4795d9856d4f3850696,2024-09-19T18:15:10.013000
|
||||
CVE-2024-47162,1,1,7a918a68f616964c3a64fa06f015fde786d9abd7d452c1eb72d0cb1650c8a0a1,2024-09-19T18:15:10.227000
|
||||
CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000
|
||||
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
|
||||
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
|
||||
@ -261533,7 +261539,7 @@ CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9
|
||||
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
|
||||
CVE-2024-6052,0,0,32d564c18d4d17b199f574c28ffe31c1fb3d7a1b6f6859f56e252f37a5a22c28,2024-09-16T14:15:13.410000
|
||||
CVE-2024-6053,0,1,bad8fea9e1557f6e3942b82b20978ade64544c8438a72e97ebb03355ea705f3f,2024-09-19T17:22:36.697000
|
||||
CVE-2024-6053,0,0,bad8fea9e1557f6e3942b82b20978ade64544c8438a72e97ebb03355ea705f3f,2024-09-19T17:22:36.697000
|
||||
CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000
|
||||
CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000
|
||||
CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000
|
||||
@ -261565,7 +261571,7 @@ CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5
|
||||
CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
|
||||
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6086,0,0,28c3e2540b87e65e53355efd52e7428f1a054dcf2c80ab6446e2a8ede4d737ac,2024-09-19T15:57:50.267000
|
||||
CVE-2024-6087,0,0,bd8b7ffb5790bff23459a1175abf6870ac2ed6fcd6a6fe860d24726af8d03b75,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6087,0,1,2f3eb6d59e26864799858a36adcfa783331a6d1634807496019392d9a2953a02,2024-09-19T19:32:14.710000
|
||||
CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000
|
||||
CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000
|
||||
CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000
|
||||
@ -261612,11 +261618,11 @@ CVE-2024-6137,0,0,e58f6c0787a0fe87e16b6d9ce7e652fbe72d3a55d70774470af6282c4fe57c
|
||||
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
|
||||
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6141,0,0,1d5a717ee6e758ce9e5016396a1ddc2e4691c96cb20e6973eb41cca889dc4be3,2024-08-23T16:53:48.270000
|
||||
CVE-2024-6142,0,1,b5701e63ddcbaf9774de387fff373143cf14e6ab10afa024be2e2ac7f6aaa481,2024-09-19T17:47:00.270000
|
||||
CVE-2024-6143,0,1,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1b7,2024-09-19T17:47:33.370000
|
||||
CVE-2024-6144,0,1,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000
|
||||
CVE-2024-6145,0,1,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000
|
||||
CVE-2024-6146,0,1,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000
|
||||
CVE-2024-6142,0,0,b5701e63ddcbaf9774de387fff373143cf14e6ab10afa024be2e2ac7f6aaa481,2024-09-19T17:47:00.270000
|
||||
CVE-2024-6143,0,0,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1b7,2024-09-19T17:47:33.370000
|
||||
CVE-2024-6144,0,0,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000
|
||||
CVE-2024-6145,0,0,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000
|
||||
CVE-2024-6146,0,0,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000
|
||||
CVE-2024-6147,0,0,2d9a1014611d118f27efff7052050ed6f6b11c1b39720db4ab48899a60221b47,2024-06-21T11:22:01.687000
|
||||
CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000
|
||||
CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000
|
||||
@ -261703,8 +261709,8 @@ CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb479326954
|
||||
CVE-2024-6243,0,0,af3e968f15710e52d1218645566e4f111ef2efb93699a091cf90e62d1a93b4e5,2024-08-01T14:00:17.580000
|
||||
CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000
|
||||
CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000
|
||||
CVE-2024-6251,0,1,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000
|
||||
CVE-2024-6252,0,1,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000
|
||||
CVE-2024-6251,0,0,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000
|
||||
CVE-2024-6252,0,0,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000
|
||||
CVE-2024-6253,0,0,01b6d1d17531ea68c5548dabbc96f038e6efc11a085c095b9b4d1329d8cd997b,2024-09-06T16:57:26.650000
|
||||
CVE-2024-6254,0,0,fde0fafe626682898f8bbfd16af33ff0c947c80d91ffee5375f17b755d365a35,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6255,0,0,4b23bc0ba79484acd9ec84f5e33767095b874b70e803764459f9fd056777671c,2024-08-30T16:15:10.467000
|
||||
@ -261716,9 +261722,9 @@ CVE-2024-6262,0,0,295b38dc67b71cbe5bd8be303a870636c7b9e2de2092da87a091242e8bc362
|
||||
CVE-2024-6263,0,0,ea6dc54bae9a6133bb18ce010b56ac510f28080d60dc0881662f41b01cd3c1ce,2024-07-03T18:24:27.877000
|
||||
CVE-2024-6264,0,0,ad70cfe4611bfb10e28e7f1e9ab3f1d3972f21098785857aa1fab5f0efe27af2,2024-07-02T17:57:31.737000
|
||||
CVE-2024-6265,0,0,31e31d78b3c7a6511102ac434eb579b5f62a9a1e1457304e8802b01e8e49e130,2024-08-01T16:53:56.223000
|
||||
CVE-2024-6266,0,1,97cf72285d45ed69b5824e8f81cb5259b6243a784781e18f8a3198493b251b90,2024-09-19T16:53:36.647000
|
||||
CVE-2024-6266,0,0,97cf72285d45ed69b5824e8f81cb5259b6243a784781e18f8a3198493b251b90,2024-09-19T16:53:36.647000
|
||||
CVE-2024-6267,0,0,33ac6ef4afec730cb116f41e289137ef2658a3490dc4f1e070ef9295b99330a6,2024-09-06T16:56:11.543000
|
||||
CVE-2024-6268,0,1,420aef07aef5af0532c73abc04760f1ddb146531b4514a62ba8c9eb47bd8747b,2024-09-19T17:06:24.663000
|
||||
CVE-2024-6268,0,0,420aef07aef5af0532c73abc04760f1ddb146531b4514a62ba8c9eb47bd8747b,2024-09-19T17:06:24.663000
|
||||
CVE-2024-6269,0,0,5faaf462a19676e34593dd0a0afbe0cb206ebbb8a7e70c532ba34e4117e361f3,2024-06-26T19:15:14.483000
|
||||
CVE-2024-6270,0,0,afb158e2a27846102675d7c9b52684128d3f9cc58ddd69c86dbb7ca5aa644315,2024-08-05T14:35:08.040000
|
||||
CVE-2024-6271,0,0,427d631db618dffd77aaff0c6f93b041e9536bc7bd39022d5cb6f3d2036ef186,2024-08-01T14:00:18.090000
|
||||
@ -261980,7 +261986,7 @@ CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070
|
||||
CVE-2024-6578,0,0,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000
|
||||
CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6582,0,0,5ee990245e7579fed88b2c8c107090ca6558ea2076f0042f82b0e3b6f6141aab,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6582,0,1,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000
|
||||
CVE-2024-6585,0,0,21557c5e847867bddd52df3ea3c8bef1c24ed1d84f80217fb776a5f25fb72332,2024-09-03T15:35:16.350000
|
||||
CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de0a,2024-09-03T15:35:16.577000
|
||||
CVE-2024-6587,0,0,a3f7b0fbe3d852ff05f7aac13ae8f9e1a110910501abae4c571a6fba27015678,2024-09-13T16:37:22.997000
|
||||
@ -262181,10 +262187,10 @@ CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c1
|
||||
CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000
|
||||
CVE-2024-6856,0,0,19b5d479e1e69973e8f497d2ae00f38aea8ffd7644169a9718f707450440aae4,2024-09-11T16:20:45.503000
|
||||
CVE-2024-6859,0,0,5a84bd798224932fef849d8b4793f644b651b362a6172317aad467bf1bad3991,2024-09-11T16:19:18.517000
|
||||
CVE-2024-6862,0,0,fd393379df312bec9e99e771b6e9ca6b56acd2b8ba0014c4d95a4e539000e755,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6862,0,1,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000
|
||||
CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000
|
||||
CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000
|
||||
CVE-2024-6867,0,0,4c5421a734def1499f39e8ebdf18304362d294435484aabee9a2355391e09ba7,2024-09-14T11:47:14.677000
|
||||
CVE-2024-6867,0,1,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000
|
||||
CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000
|
||||
CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000
|
||||
@ -262717,7 +262723,7 @@ CVE-2024-7585,0,0,c8cbc83b6349dead88df56624342a371a1668d621fa6cda31e8fc0e9835fc3
|
||||
CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000
|
||||
CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000
|
||||
CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000
|
||||
CVE-2024-7591,0,0,5ffbb24db28774add77bc3656c2e21a5720e9e9b63d1c53541af99087acd2dba,2024-09-06T12:08:21.290000
|
||||
CVE-2024-7591,0,1,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000
|
||||
CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000
|
||||
CVE-2024-7593,0,0,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000
|
||||
CVE-2024-7599,0,0,425c886d21e000ef875307fcd7ee082e5b24e31594a14a2fc6a0c956123982af,2024-09-06T16:46:26.830000
|
||||
@ -262737,7 +262743,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2
|
||||
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
|
||||
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
|
||||
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
|
||||
CVE-2024-7618,0,0,a6149ec34b2a8c7be413bc36f1943fe9aebcb6fe380868fee0becf4e0c41b606,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7618,0,1,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00
|
||||
CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000
|
||||
CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000
|
||||
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
|
||||
@ -262769,7 +262775,7 @@ CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed
|
||||
CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000
|
||||
CVE-2024-7652,0,0,c7f694e385002b920efe17a183ba7538023c7cf88dd53a372f2912343dfa2405,2024-09-09T13:03:38.303000
|
||||
CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000
|
||||
CVE-2024-7655,0,0,f298cc9a9afea680a6796cf910ff4a570db8418f9a3558eeaf2eff77bb4e3b44,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7655,0,1,0e49c78835c3c35a884c75ee847ab7ab55175fc03260920848d00a05b510db96,2024-09-19T18:20:53.617000
|
||||
CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000
|
||||
CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000
|
||||
CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000
|
||||
@ -262831,8 +262837,8 @@ CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434
|
||||
CVE-2024-7732,0,0,8a3c8a90acf6f5b098dbde4b61fbc477d38ff395fb346234319b59a8d03915b0,2024-09-16T16:49:31.427000
|
||||
CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000
|
||||
CVE-2024-7734,0,0,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000
|
||||
CVE-2024-7736,1,1,793266d0f87a5b7f5db686013fb7ca43b6829c1d4a302cdbd16f9330a7e437c3,2024-09-19T16:15:05.520000
|
||||
CVE-2024-7737,1,1,b86114bd3b9828440bffc5c6b86d2465141e10c2d700271feb71bbfa3f5d7169,2024-09-19T16:15:05.727000
|
||||
CVE-2024-7736,0,0,793266d0f87a5b7f5db686013fb7ca43b6829c1d4a302cdbd16f9330a7e437c3,2024-09-19T16:15:05.520000
|
||||
CVE-2024-7737,0,0,b86114bd3b9828440bffc5c6b86d2465141e10c2d700271feb71bbfa3f5d7169,2024-09-19T16:15:05.727000
|
||||
CVE-2024-7738,0,0,77baa8ad9219363c0b9f8c974088b914a426a11beaf2249218dd53ceafa511c2,2024-09-13T16:03:45.013000
|
||||
CVE-2024-7739,0,0,93ba2cd98f674046a013ca0d04355005a6712730837693604a9e1ff7550070b5,2024-09-13T16:03:11.377000
|
||||
CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000
|
||||
@ -263019,7 +263025,7 @@ CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a21
|
||||
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
|
||||
CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000
|
||||
CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000
|
||||
CVE-2024-8006,0,1,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db6b,2024-09-19T17:46:03.447000
|
||||
CVE-2024-8006,0,0,424b66a7c8ad10ed90018a1d48a900ac603fe191d94008774d57b07810e9db6b,2024-09-19T17:46:03.447000
|
||||
CVE-2024-8007,0,0,d4843ecbff9c18b0a3733961009c3b0a5fd18a5329783b13479a12d64d8f35f3,2024-09-18T08:15:06.990000
|
||||
CVE-2024-8011,0,0,47ed34213e682e27e1c9cff56ca191160c24a6476f0554888eb469f5be11be06,2024-09-11T18:15:02.023000
|
||||
CVE-2024-8012,0,0,8a1525213894489e4e1b5228ce01d263a380f2eb822086dfeb6cd3303970b800,2024-09-18T17:53:47.860000
|
||||
@ -263169,7 +263175,7 @@ CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c2
|
||||
CVE-2024-8253,0,0,91918f2cda2657bd2182507d0429f1a8d4a218563516f304bdbf9084cadbf1b5,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000
|
||||
CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8260,0,1,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
|
||||
CVE-2024-8260,0,0,58ee93928fd92124dbf3bf24e885a2e8306c83787bcabfd7a73757f9785d81fb,2024-09-19T16:08:58.863000
|
||||
CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8269,0,0,1cde71886327f84d38bc524bb03f145915447114bd4b7b254fb181f8027e91d6,2024-09-18T15:20:44.553000
|
||||
CVE-2024-8271,0,0,3562c0d9d060a8b2f43387dce3941b2ee080bc34564191358e2afbabb30a0397,2024-09-14T11:47:14.677000
|
||||
@ -263192,7 +263198,7 @@ CVE-2024-8298,0,0,b6e0265f7e06064f96a4b1454f4843c935b76c78438dc3aea3b160aebd5f45
|
||||
CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
|
||||
CVE-2024-8302,0,0,73573fb95f4db9829ae46e4068d229d908324e137e6241c89a1030ab338e0051,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
|
||||
CVE-2024-8304,0,1,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
|
||||
CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
|
||||
CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000
|
||||
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
|
||||
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
|
||||
@ -263238,7 +263244,7 @@ CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e39076
|
||||
CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722aa5,2024-09-17T17:24:21.793000
|
||||
CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
|
||||
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
|
||||
CVE-2024-8375,1,1,aaa7aacdae353ea1e1868b53188416f82d46294c587bbf7a4322d9966d07dd9b,2024-09-19T16:15:06.023000
|
||||
CVE-2024-8375,0,0,aaa7aacdae353ea1e1868b53188416f82d46294c587bbf7a4322d9966d07dd9b,2024-09-19T16:15:06.023000
|
||||
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
|
||||
CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000
|
||||
CVE-2024-8382,0,0,6313fe051491464f5060a11c4fbfc0623b9d0d82cc5fbeccd812557ff3cd8b8d,2024-09-06T17:15:17.677000
|
||||
@ -263251,7 +263257,7 @@ CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f9
|
||||
CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000
|
||||
CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e0076,2024-09-12T16:44:01.247000
|
||||
CVE-2024-8394,0,0,537ec046b9d95c9c611478000abd6dd7551041a1f2ea81cd7e79459ae0e45ad8,2024-09-11T16:25:44.833000
|
||||
CVE-2024-8395,0,1,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000
|
||||
CVE-2024-8395,0,0,7904c0b52ace758f0078aaf5623dc08c2f22d70190a82ab855b84d88ee4995e4,2024-09-19T17:53:45.753000
|
||||
CVE-2024-8399,0,0,ff5a0b61b9891ed649233268ce0fa37bd0b7c79ba8aa2863ea2ecc61c35c709c,2024-09-12T19:45:07.347000
|
||||
CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000
|
||||
CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000
|
||||
@ -263263,7 +263269,7 @@ CVE-2024-8413,0,0,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a7854
|
||||
CVE-2024-8414,0,0,40169a23a4033486754844c64fbfe06d703efd0c5e76953cc0d7fdb87952af16,2024-09-06T16:44:04.583000
|
||||
CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30fc,2024-09-06T16:40:06.120000
|
||||
CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000
|
||||
CVE-2024-8417,0,0,06f2fb3a9c5f24d70d3e64f2adf01488c8a1074d97d657d22a3388a406d1616e,2024-09-05T12:53:21.110000
|
||||
CVE-2024-8417,0,1,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000
|
||||
CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000
|
||||
CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000
|
||||
CVE-2024-8428,0,0,d38eeb7d0c97ad7b1cddb799376a1380930df039d2cf833bc9165ae4323bcbef,2024-09-06T16:46:26.830000
|
||||
@ -263349,9 +263355,9 @@ CVE-2024-8641,0,0,6714847a0a2d7b4da8f2ecb0f7b3c9e94c4657d9429961f088a44e0537d838
|
||||
CVE-2024-8642,0,0,2aae0632e6322f09814ded77019a17c6bdd3adefc0841a6f6e92e4043db21740,2024-09-19T15:18:47.917000
|
||||
CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000
|
||||
CVE-2024-8651,1,1,24c43d83d88e55ccb42455ca7f2a06a85f1137676fd4c59e592afc727b0a6f4f,2024-09-19T17:15:15.173000
|
||||
CVE-2024-8652,1,1,01de35da454bcf77db821c9e18f381f6885088365f6408939562cc6f4bdec039,2024-09-19T17:15:15.360000
|
||||
CVE-2024-8653,1,1,30c691d97001a678d25f8d3bf4fef38ffd5cd2e38e7a3f0a9c9d02b4c7c9017c,2024-09-19T17:15:15.503000
|
||||
CVE-2024-8651,0,0,24c43d83d88e55ccb42455ca7f2a06a85f1137676fd4c59e592afc727b0a6f4f,2024-09-19T17:15:15.173000
|
||||
CVE-2024-8652,0,0,01de35da454bcf77db821c9e18f381f6885088365f6408939562cc6f4bdec039,2024-09-19T17:15:15.360000
|
||||
CVE-2024-8653,0,0,30c691d97001a678d25f8d3bf4fef38ffd5cd2e38e7a3f0a9c9d02b4c7c9017c,2024-09-19T17:15:15.503000
|
||||
CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000
|
||||
CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a82a,2024-09-13T14:06:04.777000
|
||||
@ -263372,7 +263378,7 @@ CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490dae
|
||||
CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000
|
||||
CVE-2024-8696,0,0,3ba62a921109450e540b318e77e86831bda9c658513319d0aed77dfa516028ff,2024-09-13T16:01:22.410000
|
||||
CVE-2024-8698,1,1,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000
|
||||
CVE-2024-8698,0,0,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000
|
||||
CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8707,0,0,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000
|
||||
@ -263422,7 +263428,7 @@ CVE-2024-8869,0,0,b189f35b5a28c07852ca6d00280a8a46d906bab51b4d56357a90dd535f0651
|
||||
CVE-2024-8875,0,0,0e9f0f93ae52ceba12c10384b7bbc3067de71e5c05493a69fd2a253e00e4d595,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000
|
||||
CVE-2024-8883,1,1,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000
|
||||
CVE-2024-8883,0,0,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000
|
||||
CVE-2024-8887,0,0,3a4ee8c7c72402467690a1d5baf4ee46122c1a9bd1979c36a47f557846bba5ff,2024-09-18T11:15:10.530000
|
||||
CVE-2024-8888,0,0,1e74f6eae96ea2bc3e4d1e807f25808d32b7d4278014e4cabc70fec925ff3214,2024-09-18T12:15:03.520000
|
||||
CVE-2024-8889,0,0,d14885671be48487e73dc26a56497c68dd08124696a268e049900425bd24a291,2024-09-18T12:15:03.710000
|
||||
@ -263447,5 +263453,6 @@ CVE-2024-8949,0,0,558b0f2a15aa10d0215f6e776b245d8a42240ea8527c9ffd4d56905704832d
|
||||
CVE-2024-8951,0,0,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39aef,2024-09-17T20:15:07.020000
|
||||
CVE-2024-8956,0,0,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000
|
||||
CVE-2024-8957,0,0,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000
|
||||
CVE-2024-8963,1,1,bad5e8de51e4d1a286774f7d07084658a354cb4de050dbe04254efc089204dfb,2024-09-19T18:15:10.600000
|
||||
CVE-2024-8969,0,0,b91ca645bf2071dccf15db49fd3efa26a97008959fe8a964028e51af15b02de3,2024-09-18T07:15:04.657000
|
||||
CVE-2024-8986,0,0,26509263613f6b019d61b82311e5933cc6dfa31601ff6ae6235d1951248ed56c,2024-09-19T11:15:10.913000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user