mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-11-04T03:00:23.406842+00:00
This commit is contained in:
parent
602b2b5875
commit
23a290bacd
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10310",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-02T02:15:12.070",
|
||||
"lastModified": "2024-11-02T02:15:12.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10540",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-02T02:15:12.320",
|
||||
"lastModified": "2024-11-02T02:15:12.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10697",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-02T12:15:15.780",
|
||||
"lastModified": "2024-11-02T12:15:15.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10698",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-02T14:15:12.980",
|
||||
"lastModified": "2024-11-02T14:15:12.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10699",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-02T15:15:16.313",
|
||||
"lastModified": "2024-11-02T15:15:16.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10700",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-02T16:15:03.243",
|
||||
"lastModified": "2024-11-02T16:15:03.243",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10701",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-02T18:15:03.057",
|
||||
"lastModified": "2024-11-02T18:15:03.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10702",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-02T18:15:03.363",
|
||||
"lastModified": "2024-11-02T18:15:03.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10730",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T09:15:02.943",
|
||||
"lastModified": "2024-11-03T09:15:02.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10731",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T10:15:03.113",
|
||||
"lastModified": "2024-11-03T10:15:03.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10732",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T11:15:03.147",
|
||||
"lastModified": "2024-11-03T11:15:03.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10733",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T12:15:12.780",
|
||||
"lastModified": "2024-11-03T12:15:12.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10734",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T13:15:03.197",
|
||||
"lastModified": "2024-11-03T13:15:03.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10735",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T14:15:13.127",
|
||||
"lastModified": "2024-11-03T14:15:13.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10736",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T15:15:03.113",
|
||||
"lastModified": "2024-11-03T15:15:03.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10737",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T15:15:03.367",
|
||||
"lastModified": "2024-11-03T15:15:03.367",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10738",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T17:15:12.803",
|
||||
"lastModified": "2024-11-03T17:15:12.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10739",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T18:15:02.640",
|
||||
"lastModified": "2024-11-03T18:15:02.640",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10740",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T20:15:14.127",
|
||||
"lastModified": "2024-11-03T20:15:14.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10741",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T21:15:03.253",
|
||||
"lastModified": "2024-11-03T21:15:03.253",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10742",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T21:15:03.533",
|
||||
"lastModified": "2024-11-03T21:15:03.533",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10743",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T22:15:03.987",
|
||||
"lastModified": "2024-11-03T22:15:03.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10744",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T23:15:03.040",
|
||||
"lastModified": "2024-11-03T23:15:03.040",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10745",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-03T23:15:03.317",
|
||||
"lastModified": "2024-11-03T23:15:03.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10746",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T00:15:11.437",
|
||||
"lastModified": "2024-11-04T00:15:11.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-10747",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T00:15:11.740",
|
||||
"lastModified": "2024-11-04T00:15:11.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
137
CVE-2024/CVE-2024-107xx/CVE-2024-10748.json
Normal file
137
CVE-2024/CVE-2024-107xx/CVE-2024-10748.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-10748",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T01:15:03.167",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in Cosmote Greece What's Up App 4.47.3 on Android. This issue affects some unknown processing of the file gr/desquared/kmmsharedmodule/db/RealmDB.java of the component Realm Database Handler. The manipulation of the argument defaultRealmKey leads to use of default cryptographic key. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 2.0,
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:H/Au:S/C:P/I:N/A:N",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 1.0
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1394"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20Realm%20Database%20Encryption%20Key%5D%20found%20in%20What's%20UP%20Android%20App%204.47.3%20-%20(RealmDB.java).md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282917",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282917",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.432429",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-107xx/CVE-2024-10749.json
Normal file
137
CVE-2024/CVE-2024-107xx/CVE-2024-10749.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-10749",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T01:15:03.470",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 4.6
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pwysec/Xmwcq/blob/main/1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282918",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282918",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.432436",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-107xx/CVE-2024-10750.json
Normal file
141
CVE-2024/CVE-2024-107xx/CVE-2024-10750.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-10750",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T02:15:14.667",
|
||||
"lastModified": "2024-11-04T02:15:14.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Tenda i22 1.0.0.3(4687) and classified as problematic. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV?fgHPOST/goform/SysToo. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 6.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/tenda-vul-i22",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282919",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282919",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.435407",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-107xx/CVE-2024-10751.json
Normal file
137
CVE-2024/CVE-2024-107xx/CVE-2024-10751.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-10751",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T02:15:14.993",
|
||||
"lastModified": "2024-11-04T02:15:14.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Codezips ISP Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file pay.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/JiangJiangCC/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282920",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282920",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.436296",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-107xx/CVE-2024-10752.json
Normal file
137
CVE-2024/CVE-2024-107xx/CVE-2024-10752.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-10752",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T02:15:15.310",
|
||||
"lastModified": "2024-11-04T02:15:15.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /productsadd.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file names to be affected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/primaryboy/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282921",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282921",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.436316",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-107xx/CVE-2024-10753.json
Normal file
141
CVE-2024/CVE-2024-107xx/CVE-2024-10753.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-10753",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-04T02:15:15.613",
|
||||
"lastModified": "2024-11-04T02:15:15.613",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been declared as problematic. This vulnerability affects unknown code of the file admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data_two_headers.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dom_data_two_headers.php).md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.282922",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.282922",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.436375",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20104.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20104.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20104",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:15.940",
|
||||
"lastModified": "2024-11-04T02:15:15.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20106.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20106.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20106",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.070",
|
||||
"lastModified": "2024-11-04T02:15:16.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In m4u, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08960505; Issue ID: MSV-1590."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20107.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20107.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20107",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.163",
|
||||
"lastModified": "2024-11-04T02:15:16.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20108.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20108.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20108",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.273",
|
||||
"lastModified": "2024-11-04T02:15:16.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20109.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20109.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20109",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.387",
|
||||
"lastModified": "2024-11-04T02:15:16.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065928; Issue ID: MSV-1763."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20110.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20110.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20110",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.480",
|
||||
"lastModified": "2024-11-04T02:15:16.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065887; Issue ID: MSV-1762."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20111.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20111.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20111",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.567",
|
||||
"lastModified": "2024-11-04T02:15:16.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065033; Issue ID: MSV-1754."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20112.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20112.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20112",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.653",
|
||||
"lastModified": "2024-11-04T02:15:16.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20113.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20113.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20113",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.743",
|
||||
"lastModified": "2024-11-04T02:15:16.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036814; Issue ID: MSV-1715."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20114.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20114.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20114",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.830",
|
||||
"lastModified": "2024-11-04T02:15:16.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09037038; Issue ID: MSV-1714."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20115.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20115.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20115",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:16.923",
|
||||
"lastModified": "2024-11-04T02:15:16.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036695; Issue ID: MSV-1713."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20117.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20117.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20117",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.017",
|
||||
"lastModified": "2024-11-04T02:15:17.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1681."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20118.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20118.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20118",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.097",
|
||||
"lastModified": "2024-11-04T02:15:17.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062392; Issue ID: MSV-1621."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-123"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20119.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20119.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20119",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.190",
|
||||
"lastModified": "2024-11-04T02:15:17.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062301; Issue ID: MSV-1620."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-123"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20120.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20120.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20120",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.280",
|
||||
"lastModified": "2024-11-04T02:15:17.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20121.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20121.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20121",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.383",
|
||||
"lastModified": "2024-11-04T02:15:17.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20122.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20122.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20122",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.473",
|
||||
"lastModified": "2024-11-04T02:15:17.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1572."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20123.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20123.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20123",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.567",
|
||||
"lastModified": "2024-11-04T02:15:17.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1569."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2024/CVE-2024-201xx/CVE-2024-20124.json
Normal file
33
CVE-2024/CVE-2024-201xx/CVE-2024-20124.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2024-20124",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-11-04T02:15:17.647",
|
||||
"lastModified": "2024-11-04T02:15:17.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1568."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
|
||||
"source": "security@mediatek.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44232",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-11-01T21:15:14.730",
|
||||
"lastModified": "2024-11-01T21:15:14.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44233",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-11-01T21:15:14.787",
|
||||
"lastModified": "2024-11-01T21:15:14.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44234",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-11-01T21:15:14.847",
|
||||
"lastModified": "2024-11-01T21:15:14.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51774",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-02T06:15:03.007",
|
||||
"lastModified": "2024-11-02T06:15:03.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8739",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-02T02:15:12.560",
|
||||
"lastModified": "2024-11-02T02:15:12.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9191",
|
||||
"sourceIdentifier": "psirt@okta.com",
|
||||
"published": "2024-11-01T22:15:03.213",
|
||||
"lastModified": "2024-11-01T22:15:03.213",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9868",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-02T02:15:12.803",
|
||||
"lastModified": "2024-11-02T02:15:12.803",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9896",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-11-02T08:15:03.197",
|
||||
"lastModified": "2024-11-02T08:15:03.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-11-04T01:35:50.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
66
README.md
66
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-04T00:55:37.313798+00:00
|
||||
2024-11-04T03:00:23.406842+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-04T00:15:11.740000+00:00
|
||||
2024-11-04T02:15:17.647000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,29 +27,75 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-11-03T01:00:10.074845+00:00
|
||||
2024-11-04T01:00:10.068841+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
268038
|
||||
268063
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `25`
|
||||
|
||||
- [CVE-2024-10744](CVE-2024/CVE-2024-107xx/CVE-2024-10744.json) (`2024-11-03T23:15:03.040`)
|
||||
- [CVE-2024-10745](CVE-2024/CVE-2024-107xx/CVE-2024-10745.json) (`2024-11-03T23:15:03.317`)
|
||||
- [CVE-2024-10746](CVE-2024/CVE-2024-107xx/CVE-2024-10746.json) (`2024-11-04T00:15:11.437`)
|
||||
- [CVE-2024-10747](CVE-2024/CVE-2024-107xx/CVE-2024-10747.json) (`2024-11-04T00:15:11.740`)
|
||||
- [CVE-2024-10748](CVE-2024/CVE-2024-107xx/CVE-2024-10748.json) (`2024-11-04T01:15:03.167`)
|
||||
- [CVE-2024-10749](CVE-2024/CVE-2024-107xx/CVE-2024-10749.json) (`2024-11-04T01:15:03.470`)
|
||||
- [CVE-2024-10750](CVE-2024/CVE-2024-107xx/CVE-2024-10750.json) (`2024-11-04T02:15:14.667`)
|
||||
- [CVE-2024-10751](CVE-2024/CVE-2024-107xx/CVE-2024-10751.json) (`2024-11-04T02:15:14.993`)
|
||||
- [CVE-2024-10752](CVE-2024/CVE-2024-107xx/CVE-2024-10752.json) (`2024-11-04T02:15:15.310`)
|
||||
- [CVE-2024-10753](CVE-2024/CVE-2024-107xx/CVE-2024-10753.json) (`2024-11-04T02:15:15.613`)
|
||||
- [CVE-2024-20104](CVE-2024/CVE-2024-201xx/CVE-2024-20104.json) (`2024-11-04T02:15:15.940`)
|
||||
- [CVE-2024-20106](CVE-2024/CVE-2024-201xx/CVE-2024-20106.json) (`2024-11-04T02:15:16.070`)
|
||||
- [CVE-2024-20107](CVE-2024/CVE-2024-201xx/CVE-2024-20107.json) (`2024-11-04T02:15:16.163`)
|
||||
- [CVE-2024-20108](CVE-2024/CVE-2024-201xx/CVE-2024-20108.json) (`2024-11-04T02:15:16.273`)
|
||||
- [CVE-2024-20109](CVE-2024/CVE-2024-201xx/CVE-2024-20109.json) (`2024-11-04T02:15:16.387`)
|
||||
- [CVE-2024-20110](CVE-2024/CVE-2024-201xx/CVE-2024-20110.json) (`2024-11-04T02:15:16.480`)
|
||||
- [CVE-2024-20111](CVE-2024/CVE-2024-201xx/CVE-2024-20111.json) (`2024-11-04T02:15:16.567`)
|
||||
- [CVE-2024-20112](CVE-2024/CVE-2024-201xx/CVE-2024-20112.json) (`2024-11-04T02:15:16.653`)
|
||||
- [CVE-2024-20113](CVE-2024/CVE-2024-201xx/CVE-2024-20113.json) (`2024-11-04T02:15:16.743`)
|
||||
- [CVE-2024-20114](CVE-2024/CVE-2024-201xx/CVE-2024-20114.json) (`2024-11-04T02:15:16.830`)
|
||||
- [CVE-2024-20115](CVE-2024/CVE-2024-201xx/CVE-2024-20115.json) (`2024-11-04T02:15:16.923`)
|
||||
- [CVE-2024-20117](CVE-2024/CVE-2024-201xx/CVE-2024-20117.json) (`2024-11-04T02:15:17.017`)
|
||||
- [CVE-2024-20118](CVE-2024/CVE-2024-201xx/CVE-2024-20118.json) (`2024-11-04T02:15:17.097`)
|
||||
- [CVE-2024-20119](CVE-2024/CVE-2024-201xx/CVE-2024-20119.json) (`2024-11-04T02:15:17.190`)
|
||||
- [CVE-2024-20120](CVE-2024/CVE-2024-201xx/CVE-2024-20120.json) (`2024-11-04T02:15:17.280`)
|
||||
- [CVE-2024-20121](CVE-2024/CVE-2024-201xx/CVE-2024-20121.json) (`2024-11-04T02:15:17.383`)
|
||||
- [CVE-2024-20122](CVE-2024/CVE-2024-201xx/CVE-2024-20122.json) (`2024-11-04T02:15:17.473`)
|
||||
- [CVE-2024-20123](CVE-2024/CVE-2024-201xx/CVE-2024-20123.json) (`2024-11-04T02:15:17.567`)
|
||||
- [CVE-2024-20124](CVE-2024/CVE-2024-201xx/CVE-2024-20124.json) (`2024-11-04T02:15:17.647`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
- [CVE-2024-10731](CVE-2024/CVE-2024-107xx/CVE-2024-10731.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10732](CVE-2024/CVE-2024-107xx/CVE-2024-10732.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10733](CVE-2024/CVE-2024-107xx/CVE-2024-10733.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10734](CVE-2024/CVE-2024-107xx/CVE-2024-10734.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10735](CVE-2024/CVE-2024-107xx/CVE-2024-10735.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10736](CVE-2024/CVE-2024-107xx/CVE-2024-10736.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10737](CVE-2024/CVE-2024-107xx/CVE-2024-10737.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10738](CVE-2024/CVE-2024-107xx/CVE-2024-10738.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10739](CVE-2024/CVE-2024-107xx/CVE-2024-10739.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10740](CVE-2024/CVE-2024-107xx/CVE-2024-10740.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10741](CVE-2024/CVE-2024-107xx/CVE-2024-10741.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10742](CVE-2024/CVE-2024-107xx/CVE-2024-10742.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10743](CVE-2024/CVE-2024-107xx/CVE-2024-10743.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10744](CVE-2024/CVE-2024-107xx/CVE-2024-10744.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10745](CVE-2024/CVE-2024-107xx/CVE-2024-10745.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10746](CVE-2024/CVE-2024-107xx/CVE-2024-10746.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-10747](CVE-2024/CVE-2024-107xx/CVE-2024-10747.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-44232](CVE-2024/CVE-2024-442xx/CVE-2024-44232.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-44233](CVE-2024/CVE-2024-442xx/CVE-2024-44233.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-44234](CVE-2024/CVE-2024-442xx/CVE-2024-44234.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-51774](CVE-2024/CVE-2024-517xx/CVE-2024-51774.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-8739](CVE-2024/CVE-2024-87xx/CVE-2024-8739.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-9191](CVE-2024/CVE-2024-91xx/CVE-2024-9191.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-9868](CVE-2024/CVE-2024-98xx/CVE-2024-9868.json) (`2024-11-04T01:35:50.083`)
|
||||
- [CVE-2024-9896](CVE-2024/CVE-2024-98xx/CVE-2024-9896.json) (`2024-11-04T01:35:50.083`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
93
_state.csv
93
_state.csv
@ -242525,7 +242525,7 @@ CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884f
|
||||
CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000
|
||||
CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000
|
||||
CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000
|
||||
CVE-2024-10310,0,0,44e4f212dbd387191ac1c17fafbfea8afd0cd16e10f15c2104cc89bcbf827181,2024-11-02T02:15:12.070000
|
||||
CVE-2024-10310,0,1,8627942b9bedc88403b058610e178026fa2c4afa02baf09482128bde758698c0,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000
|
||||
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
|
||||
@ -242659,7 +242659,7 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef
|
||||
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
|
||||
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
|
||||
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10540,0,0,fb85c19421ab3f69a93be1f392ed322f4e3a3a646d1bbc79bb70857cca41b582,2024-11-02T02:15:12.320000
|
||||
CVE-2024-10540,0,1,71b4d8dd372610eb6aadd9ee2f499b7f6c7c514a0fbc392c946046e7aec32132,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10544,0,0,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10546,0,0,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000
|
||||
CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000
|
||||
@ -242717,36 +242717,42 @@ CVE-2024-10662,0,0,d4e1d96fd372cbdc5b8334f5c6dd869966981cc60e3dd848ec899c5d2ee68
|
||||
CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000
|
||||
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
|
||||
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
|
||||
CVE-2024-10697,0,0,b6a5fbdd54ff78ca8f29be9d904245700764dda2892e20d8100f91a87604ea47,2024-11-02T12:15:15.780000
|
||||
CVE-2024-10698,0,0,8281674c5312d1eac605117cac32e949ec8e479274dd1749bb2715d742010d6d,2024-11-02T14:15:12.980000
|
||||
CVE-2024-10699,0,0,ef67a20c3335f29b114cad7b0aedb794f1b00f327f73345873f5e40c4d641fcb,2024-11-02T15:15:16.313000
|
||||
CVE-2024-10697,0,1,400b0c691de1d4d04a08ed75b5ff2c1090c210982145630e8b93e65ea795d2a2,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10698,0,1,236b38079c641e413bd7bebc1fdfad07acc1d9e6f5d99c4e4596e4bb9429c7df,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10699,0,1,fe2c7d137c97c404816ddf9e3bb9e571274df811b1a38d888d420c39b6c31f06,2024-11-04T01:35:50.083000
|
||||
CVE-2024-1070,0,0,945eeccf4f5ba232f5b58cbe0a0fb277520149997c332f988c0ef3d652aa0c5c,2024-02-29T13:49:29.390000
|
||||
CVE-2024-10700,0,0,b17b93e7f82967a1cd70f297abdf013df9d7712afeb0e21e10309930c9dd8b06,2024-11-02T16:15:03.243000
|
||||
CVE-2024-10701,0,0,64d00583e128223a818e31012b27c2f4fcc546f61ed52ef284055292721719a1,2024-11-02T18:15:03.057000
|
||||
CVE-2024-10702,0,0,b860327a4907fe5152218cc2a7d1bde1b844706b23959e8ecc33094988f3f771,2024-11-02T18:15:03.363000
|
||||
CVE-2024-10700,0,1,a26404e46b37e656f5281779e0d9091897613c667bf7801ba7d96eada96120c0,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10701,0,1,feef0490b9a5343bbd81c2d74656e28446f2c282178d53c2cfc86555fe72242e,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10702,0,1,1325634e3f4fdbfa2e4a1276b2401b086b25bcc969a908cc22819ae619148a71,2024-11-04T01:35:50.083000
|
||||
CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44f6,2024-02-13T19:44:28.620000
|
||||
CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000
|
||||
CVE-2024-10730,0,0,0290ba426de3764e77845b12f9be23ede9a2d5cdb0858e6e836b6393eea1c65a,2024-11-03T09:15:02.943000
|
||||
CVE-2024-10731,0,0,0edbd27ff87fe7ed63697e42258d1992829a75f85bde44db29e4896a5b1dcdfc,2024-11-03T10:15:03.113000
|
||||
CVE-2024-10732,0,0,cc05b547a090986643dc6f60010297a6e164d0fc561f19045f5c23b16d08a8d3,2024-11-03T11:15:03.147000
|
||||
CVE-2024-10733,0,0,e31e1515e56cea31e3e6cd23ea983f95655bbeddaaf828558407c18b76e76328,2024-11-03T12:15:12.780000
|
||||
CVE-2024-10734,0,0,1ada97ce88c9764cce86d1be06d5a440543b67631c7509fb56b879cad67b8d57,2024-11-03T13:15:03.197000
|
||||
CVE-2024-10735,0,0,18e5abeb765f8b4cee532a9ccfe47a41535b695e674660e0401d753889675ed7,2024-11-03T14:15:13.127000
|
||||
CVE-2024-10736,0,0,2b3c1ca1fde308db2682ba585d91df4e5fb8e8b2132e6896b341182640475636,2024-11-03T15:15:03.113000
|
||||
CVE-2024-10737,0,0,d5f597e3131334cb6398b921e8ae2406a2cedfdef19debcbf36a8289606bdaac,2024-11-03T15:15:03.367000
|
||||
CVE-2024-10738,0,0,cf3434bd59b0285df7a84404b7ffeefec9fd9bbab036f7db09502c7b06bbe882,2024-11-03T17:15:12.803000
|
||||
CVE-2024-10739,0,0,2d9d0512020c1f842d19eb7873caa87034bcedcbf1098acfc3b06d84312e22d7,2024-11-03T18:15:02.640000
|
||||
CVE-2024-10730,0,1,7ce4421b8e6852fd42d52a08ac5d64cca9f961fa36f0f9b178564ab2c7b010fc,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10731,0,1,e9573f69cc170cafd345054080776894775b4b6ef21372d23290dedcafe0e5b5,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10732,0,1,2794c37d840ac85d80e6c6ee22e0cafa21a8bf385597e614f0966ea692f6b0f3,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10733,0,1,ecfa611fffa7dda7b20a60257897e0fb58b1e425e94f2e6ec6ece37368bae70d,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10734,0,1,4bdf3d9933efb7c2036a96af2289bb842795f8b5d58b3a97064506aeabfba048,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10735,0,1,a16cccc151e9f2bcc15c729d193af752b598e5a499de6cc85f10b7387b0a41fd,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10736,0,1,30b87f486dfbd55aa362867c46d8dcc45ec927ce563a6b5741ce601545c2ab1f,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10737,0,1,1c0a27b6a0f6352047b4dfdf5563612ad3b9bab250d86c650765dfc629a73416,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10738,0,1,8a0072515d947ec408b784d3e6ce1bd5b3e05b55ff660db8ef16ced14bb5241e,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10739,0,1,d1743cc8054aad38eef2acd426187b3ee676a28c7bc532fe709feadcb472844e,2024-11-04T01:35:50.083000
|
||||
CVE-2024-1074,0,0,dead9100582cc2974c0c91196eb84b5d13c4d6e306ff1bc10a509afe7df361d3,2024-03-13T18:16:18.563000
|
||||
CVE-2024-10740,0,0,217073bf1930c0f14a0fc226a9bb2d6398d765fa68bd0fff7edbfeb9d520c0f7,2024-11-03T20:15:14.127000
|
||||
CVE-2024-10741,0,0,ad19cf95cdeabbcd628e782f1aef9e0a797e7e2a931984e3147cce270645d2c3,2024-11-03T21:15:03.253000
|
||||
CVE-2024-10742,0,0,6a62150a0204ffc17beb47d87a5902b3367743d3f1d487bded09a284fcc7f3cb,2024-11-03T21:15:03.533000
|
||||
CVE-2024-10743,0,0,7611018f0a9e71fea5a36fac5f4dfeb4f6eff80ab38389ae42f5a10f8b11138a,2024-11-03T22:15:03.987000
|
||||
CVE-2024-10744,1,1,b4c4e009e5596df94ce79d62ee56cd3fbc6a900cff97bdb4d1aa0745a35b1462,2024-11-03T23:15:03.040000
|
||||
CVE-2024-10745,1,1,51128a835b5b59553a6908c04ad84a8b4da4fc5730f783ce2d78ea058fa94927,2024-11-03T23:15:03.317000
|
||||
CVE-2024-10746,1,1,e23188babfde0ffbb47feb6b6c9f36cbc2b7ae157fe8ca236ea137bd1fc23e84,2024-11-04T00:15:11.437000
|
||||
CVE-2024-10747,1,1,8e25b9be4440f8a0bdbe2ba2f18fb0464e7bda631f613f54d7a2e0d0a17cf7c2,2024-11-04T00:15:11.740000
|
||||
CVE-2024-10740,0,1,96ae1b50031fdef804d7941f636b5cc91402b9e022058e71fa088d447d37e9fd,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10741,0,1,d677d081ae90772d9c62e5eea166401d1a36ed1ce290a4c4cf0fca2a8f45e908,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10742,0,1,7e43489f32deadc14864d8fabccd1005ed82b082c5d08626921b13cf108b6229,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10743,0,1,f4196b5be77693362a82a07a1abbed5d528d0f570809fe8b21b46f419f58a446,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10744,0,1,2c6e64fe43853cda822e15d40340f32792083b462e7980325b4be1e7805845b9,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10745,0,1,9b882c9f702379042badc860798ab8ac79d88ccc37d410489dcf6335bc9dba88,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10746,0,1,5fc5b1f0c7c81c9c17f031df506140838636e81da729c18f4dee42e8bb008e3e,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10747,0,1,65defe3ce03d4e7029fc0dc81fec58dc74e785c46c902e5a5dc8cb2b4c82ceb1,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10748,1,1,046d3079c4eb2e3a10c0f9284d1ec682329dd55d91d1ebf1b461964671cc9500,2024-11-04T01:35:50.083000
|
||||
CVE-2024-10749,1,1,ced9684eb6bbdaaa8891bf4946486b251511fc0da6f635e33f3c9a1ae41d6b8e,2024-11-04T01:35:50.083000
|
||||
CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000
|
||||
CVE-2024-10750,1,1,a5ab38ab4e0a30803b76cb92f36d106e28cb9646c5f450e7b359c617fa79db89,2024-11-04T02:15:14.667000
|
||||
CVE-2024-10751,1,1,ece80e95a2cea401caf01f16c80e716d345300d1a9937ae65bf2b9b198d7fbdc,2024-11-04T02:15:14.993000
|
||||
CVE-2024-10752,1,1,8a3cbd606c9961479f693d42867703d9117f36820b9a355e369e4c3dc6e7a45d,2024-11-04T02:15:15.310000
|
||||
CVE-2024-10753,1,1,bba63f6afd5c7db41ec944ca9e3254b1565ead11d9f0f9c2936fcd3fdd183f4d,2024-11-04T02:15:15.613000
|
||||
CVE-2024-1076,0,0,1eec5a2aed6def26ca78a00c90cdc2a9e26a823100b6419a30b16c630a915a03,2024-08-30T13:15:12.257000
|
||||
CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000
|
||||
CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000
|
||||
@ -243720,8 +243726,27 @@ CVE-2024-20100,0,0,6232a5e349fb938dfde44a6272036d8fcab6eb82e3b395e905d1ef444c94e
|
||||
CVE-2024-20101,0,0,4ab31b8617124baf5a584f677af857db4f34ad707839e76bd0c5af95515b24c2,2024-10-07T19:36:43.247000
|
||||
CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000
|
||||
CVE-2024-20103,0,0,db42d95d798d4c29343c261aa8a039b0877035c0ce319208cb5d6e304467accf,2024-10-07T19:36:43.530000
|
||||
CVE-2024-20104,1,1,661fc67dbcdb1ca1b3a9dcb0db0e00d638855bf588515f8fe400ac77c76151ad,2024-11-04T02:15:15.940000
|
||||
CVE-2024-20106,1,1,51f90ca794383a5c2bfc20cba0cf660f0a64d83b490b33f63c0d4bc14a368e29,2024-11-04T02:15:16.070000
|
||||
CVE-2024-20107,1,1,922cc22eadfefcee8e734664d9fb6565be24bcbf2c94fca880abdb60812ec87e,2024-11-04T02:15:16.163000
|
||||
CVE-2024-20108,1,1,cc520a14b3242d8e9165692d2d17f9f18b7ea31e755767123888ee69a34e06a4,2024-11-04T02:15:16.273000
|
||||
CVE-2024-20109,1,1,54795d1d7fd515ea820548086475776cda34b0ce69d6720787f4e237144d7231,2024-11-04T02:15:16.387000
|
||||
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
|
||||
CVE-2024-20110,1,1,6f5a4c4b9adf7359592c8804c0bd25dcfa7bae0a9b7bd7baedd3251427f4d4a7,2024-11-04T02:15:16.480000
|
||||
CVE-2024-20111,1,1,27d22f9b268a8c3b7284649bfde84bce31ffe5554c53de51675e4fad0516fe32,2024-11-04T02:15:16.567000
|
||||
CVE-2024-20112,1,1,84c649e4458a5610722ef13eff2e7bccc80211f1069764379375ca5abd753952,2024-11-04T02:15:16.653000
|
||||
CVE-2024-20113,1,1,8e7b0c04b4d4ed0b893903cba4c199153ed552db76caf2e34be7db959d9a6d69,2024-11-04T02:15:16.743000
|
||||
CVE-2024-20114,1,1,3ab633082fb562a27e5d95e86318ac3b18818e40ff24ad66240303d146fc57ff,2024-11-04T02:15:16.830000
|
||||
CVE-2024-20115,1,1,d671ab30f09df16767829e3fea998fb0f41a9daf49276d42345088b6858cfd2e,2024-11-04T02:15:16.923000
|
||||
CVE-2024-20117,1,1,d61b2f990b1e15b7058e4556c78df8414fed2e10f805d41207337618f97c757b,2024-11-04T02:15:17.017000
|
||||
CVE-2024-20118,1,1,a704fdd2e1dde1a934b585bc78a59bfc44b3b7d71084d3d46b3975c6477a549e,2024-11-04T02:15:17.097000
|
||||
CVE-2024-20119,1,1,5e2d11df70ca1ca51a4d20891fb63f7289f15a3ccc06813c8c89fff44967631f,2024-11-04T02:15:17.190000
|
||||
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
|
||||
CVE-2024-20120,1,1,ccc8588caef2c754d0f2d3a62096a317fe95226b38302d1661505059372773a5,2024-11-04T02:15:17.280000
|
||||
CVE-2024-20121,1,1,323992abdcb80e925340c9d5380591ccb11059d2c67bc6cc09508284dbd715e0,2024-11-04T02:15:17.383000
|
||||
CVE-2024-20122,1,1,7f3da73d1063726b36c15c2eead085208e001c249ada6692b5a0ead1ef2dd874,2024-11-04T02:15:17.473000
|
||||
CVE-2024-20123,1,1,5b11ca42e589c3e23b63de7d94f1539bff348aa54a5100c00b6c443a91847ca8,2024-11-04T02:15:17.567000
|
||||
CVE-2024-20124,1,1,ea196b7f4300fdd6e9f7e59aa6adb0ebab1f3c2a66191c5840c9ed88124506e9,2024-11-04T02:15:17.647000
|
||||
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
|
||||
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
|
||||
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
|
||||
@ -261034,9 +261059,9 @@ CVE-2024-44222,0,0,2d1c9506aa01928c94a245f74651f0e477458ddd815a4bd143998351ecb56
|
||||
CVE-2024-44228,0,0,4d366f4ca03e1f210ca17d40371d7f0002d4d2fd25c7288f272f27e0c556885e,2024-10-30T20:35:27.570000
|
||||
CVE-2024-44229,0,0,459366a3ff6ef76a99d08535a28f4f2b6e8f55a20bc19afc8ece1fec95aa44c2,2024-10-29T23:15:03.437000
|
||||
CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000
|
||||
CVE-2024-44232,0,0,191f9bfeeb1d62bdd87334797048d4412244f7ecfe6bbd6480aa91153492f1cd,2024-11-01T21:15:14.730000
|
||||
CVE-2024-44233,0,0,2ca2e0a55694b969813c2ea21d075e99121deaa48b4daf8c0e3001c0881abd5f,2024-11-01T21:15:14.787000
|
||||
CVE-2024-44234,0,0,24c16a966156c95ed52608f2e801d8dab42879e91efb09e6ab39c80f7fe34435,2024-11-01T21:15:14.847000
|
||||
CVE-2024-44232,0,1,4c28f2f4a7eeb218636d2d83bbc63a2a4c4883c4a9d8461e7c674b470a63b1a2,2024-11-04T01:35:50.083000
|
||||
CVE-2024-44233,0,1,5fbcd61e78328b0d5b5d8515b5e18152226785bd560b0e3433d5e80f113fbb1c,2024-11-04T01:35:50.083000
|
||||
CVE-2024-44234,0,1,6c6aec5b8251f584ee84a7e4fff6c667b44c4d629cbdb2d26c9c95408643ab2f,2024-11-04T01:35:50.083000
|
||||
CVE-2024-44235,0,0,f6b12e29f9914b58eea41bdafe0e4148ebdbea0c9aa9cac7f81ae35deb7df419,2024-10-30T21:35:06.987000
|
||||
CVE-2024-44236,0,0,2596c988781ee3ffb6a2ddc6dda4e4baeacf8834e38bce0c324b3d9abc20481c,2024-10-30T17:28:52.077000
|
||||
CVE-2024-44237,0,0,0ccb96caec122e6d60ce17ba18063b0a9447d8c20c9511ccf57f0112e5d3846b,2024-10-29T21:35:16.563000
|
||||
@ -264380,7 +264405,7 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812
|
||||
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
|
||||
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-51774,0,0,596774be6de28515ec1b421651436af5f842b86d44b3a546fb99267d554b2c28,2024-11-02T06:15:03.007000
|
||||
CVE-2024-51774,0,1,242a44b9a9a0589607c8c1cdba956fe336337ab5aadb3b57a9925f5da73df90f,2024-11-04T01:35:50.083000
|
||||
CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000
|
||||
CVE-2024-5179,0,0,ea665152b8c9953ad6e84eb904f7eac78af7e075a45f2a4da51451b13f6b9cb3,2024-10-09T16:57:08.317000
|
||||
CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000
|
||||
@ -267309,7 +267334,7 @@ CVE-2024-8733,0,0,2ad75c4913be224ff75684fa724a275e53b709dc0d7f918cc99544f1d75453
|
||||
CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000
|
||||
CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000
|
||||
CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000
|
||||
CVE-2024-8739,0,0,ba103783330da51a68b7977ee0653396c66f5c092a1a8772f841a298e993b44e,2024-11-02T02:15:12.560000
|
||||
CVE-2024-8739,0,1,41153810936f3619e5c81e3d953c85176c796fb54603cafdf01bd17244a97cb1,2024-11-04T01:35:50.083000
|
||||
CVE-2024-8740,0,0,344648ec73420b23dee0eff45da9579413da1d5a4cc904056aa5b9f023dadc49,2024-10-29T14:46:02.103000
|
||||
CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000
|
||||
CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000
|
||||
@ -267577,7 +267602,7 @@ CVE-2024-9180,0,0,43a25f270cfb7cd861387fae3760598de599a33ae7c6d1aa6e3f1a95d5d03b
|
||||
CVE-2024-9184,0,0,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000
|
||||
CVE-2024-9191,0,0,83a992af53a23983e3607616beb0d4f27ad95a615e8bc88c24b927f198a88fc3,2024-11-01T22:15:03.213000
|
||||
CVE-2024-9191,0,1,c5c6218bb397957fa2ce005f80352a140b08b33c91a2e82fcc916dff9be5ccd6,2024-11-04T01:35:50.083000
|
||||
CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000
|
||||
CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000
|
||||
@ -267944,7 +267969,7 @@ CVE-2024-9862,0,0,a125c015e3b00c8735ed8c9687686a16a9d40d9b6f2ce90b19ff292bf536d9
|
||||
CVE-2024-9863,0,0,5a2779f928f03a35905e31f60158c72d5505c6aaa35173f98063e46d2c1389f4,2024-10-18T12:53:04.627000
|
||||
CVE-2024-9864,0,0,ecd679b570a8abacc1db8d694db02ae1ea10c97942981b05302fe359da1cbf9c,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9865,0,0,767ca346f0a1ff11496989a87fd401620d0792dff4b8ce54d6dd2bc8cbb6f984,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9868,0,0,cfa3fb7bcdb4df457cfcd8cd91388f3153ab52ef6741ef4dfc11f5fc24b8bf96,2024-11-02T02:15:12.803000
|
||||
CVE-2024-9868,0,1,619ab7a97cf5b6852372ad0a01ba35ee632f7798836d1aef77412959238d8fb1,2024-11-04T01:35:50.083000
|
||||
CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
|
||||
CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9884,0,0,757f98f3275a3bf4e9b1e819bb018e139225ae1ebee044e7c027a7c44897e089,2024-11-01T12:57:03.417000
|
||||
@ -267958,7 +267983,7 @@ CVE-2024-9892,0,0,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714
|
||||
CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000
|
||||
CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000
|
||||
CVE-2024-9896,0,0,50af1852de2ceeb6ef7007469273b0df4a41cf8534b27ab37ac70aa2310c8ecc,2024-11-02T08:15:03.197000
|
||||
CVE-2024-9896,0,1,b6422a69408923c8fbfb23c93250f2055895778f177137c25dbacaac56966208,2024-11-04T01:35:50.083000
|
||||
CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000
|
||||
CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user