mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-08-16T18:00:17.215682+00:00
This commit is contained in:
parent
4e93a6d71f
commit
290ab88b79
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-6748",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2017-09-25T17:29:00.490",
|
||||
"lastModified": "2020-01-27T00:15:10.553",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-08-16T16:09:58.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -86,8 +86,24 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jsoup:jsoup:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.6.0",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "FE38C5CA-5335-4547-9564-72147FEF3A64"
|
||||
"matchCriteriaId": "1C802FF9-AAAC-4AE3-9BAE-8E5F05B3CC1B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -106,6 +122,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/76504",
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -142,7 +159,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00021.html",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-20227",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-12-19T11:29:01.920",
|
||||
"lastModified": "2019-01-07T14:38:22.633",
|
||||
"lastModified": "2024-08-16T16:09:23.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eclipse:rdf4j:2.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96E45985-FA15-4DB2-9BC1-CBAF8A7956A0"
|
||||
"criteria": "cpe:2.3:a:eclipse:rdf4j:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.5.0",
|
||||
"matchCriteriaId": "A87007A4-F9E4-4592-A805-6AEC9213AD43"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-29631",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-06-06T21:15:08.697",
|
||||
"lastModified": "2022-06-14T17:03:37.153",
|
||||
"lastModified": "2024-08-16T16:11:20.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,10 +85,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jodd:http:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:jodd:jodd_http:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0",
|
||||
"versionEndIncluding": "6.2.1",
|
||||
"matchCriteriaId": "E86AA75D-BD93-4E0F-A196-CAF5A31ECB63"
|
||||
"versionEndExcluding": "6.2.1",
|
||||
"matchCriteriaId": "AA7523BB-2371-44AA-873B-3006F18A8653"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -101,6 +101,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
@ -109,6 +110,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46089",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T02:15:51.337",
|
||||
"lastModified": "2024-03-07T13:52:27.110",
|
||||
"lastModified": "2024-08-16T17:35:01.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross-Site Scripting (XSS) en Online Flight Booking Management System v1.0 permite a los atacantes ejecutar scripts web arbitrarios o HTML a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de la aerol\u00ednea."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2022-46089/blob/main/CVE-35",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-33676",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-07T09:15:38.107",
|
||||
"lastModified": "2024-03-07T13:52:27.110",
|
||||
"lastModified": "2024-08-16T17:35:02.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Sourcecodester Lost and Found Information System's Version 1.0 es vulnerable a una inyecci\u00f3n SQL no autenticada en \"?page=items/view&id=*\" que puede escalarse a la ejecuci\u00f3n remota de comandos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2023-33676/blob/main/CVE-30",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-40109",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-02-15T23:15:08.260",
|
||||
"lastModified": "2024-02-16T13:37:55.033",
|
||||
"lastModified": "2024-08-16T16:35:00.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En createFromParcel de UsbConfiguration.java, existe un posible inicio de actividad en segundo plano (BAL) debido a una omisi\u00f3n de permisos. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/387d258cf10a30537fc48dc0e48d28071efa92e7",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43292",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-12T21:15:55.837",
|
||||
"lastModified": "2024-03-13T12:33:51.697",
|
||||
"lastModified": "2024-08-16T17:35:02.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross Site Scripting en My Food Recipe usando PHP con c\u00f3digo fuente v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el nombre de la receta, el procedimiento y los par\u00e1metros de los ingredientes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ASR511-OO7/CVE-2023-43292/blob/main/CVE-8",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51141",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T01:22:43.520",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-08-16T16:35:01.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en ZKTeko BioTime v.8.5.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente Autenticaci\u00f3n y Autorizaci\u00f3n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://biotime.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22543",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-27T01:15:06.980",
|
||||
"lastModified": "2024-02-27T14:20:06.637",
|
||||
"lastModified": "2024-08-16T17:35:03.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en Linksys Router E1700 1.0.04 (compilaci\u00f3n 3), que permite a atacantes autenticados escalar privilegios a trav\u00e9s de una solicitud GET manipulada al URI /goform/* o mediante la funci\u00f3n ExportSettings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-613"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://mat4mee.notion.site/Leaked-SessionID-can-lead-to-authentication-bypass-on-the-Linksys-Router-E1700-f56f9c4b15e7443fa237bd1b101a18d2",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23755",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-23T22:15:07.827",
|
||||
"lastModified": "2024-03-25T01:51:01.223",
|
||||
"lastModified": "2024-08-16T17:35:04.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "ClickUp Desktop anterior a 3.3.77 en macOS y Windows permite la inyecci\u00f3n de c\u00f3digo debido a Electron Fuses espec\u00edficos. Existe una protecci\u00f3n inadecuada contra la inyecci\u00f3n de c\u00f3digo a trav\u00e9s de configuraciones como RunAsNode."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://clickup.com/security/disclosures",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-03T03:15:09.173",
|
||||
"lastModified": "2024-04-03T12:38:04.840",
|
||||
"lastModified": "2024-08-16T16:35:03.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Gibbon hasta 26.0.00 permite /modules/School%20Admin/messengerSettings.php la inyecci\u00f3n de plantilla del lado del servidor que conduce a la ejecuci\u00f3n remota de c\u00f3digo porque la entrada se pasa al motor de plantilla Twig (messengerSettings.php) sin sanitizaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gibbonedu.org/download/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25090",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-07-26T09:15:09.700",
|
||||
"lastModified": "2024-07-26T12:38:41.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T17:56:31.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "La validaci\u00f3n de entrada y sanitizaci\u00f3n insuficientes de las funciones Profile name & screenname, Bookmark name & description and blogroll name en todas las versiones de Apache Roller en todas las plataformas permite que un usuario autenticado realice un ataque de XSS. Mitigaci\u00f3n: si no tiene Roller configurado para usuarios no confiables, entonces no necesita hacer nada porque conf\u00eda en que sus usuarios creen HTML sin formato y otro contenido web. Si est\u00e1 ejecutando con usuarios no confiables, entonces debe actualizar a Roller 6.1.3. Este problema afecta a Apache Roller: desde 5.0.0 hasta 6.1.3. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.1.3, que soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
@ -32,10 +55,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "6.1.3",
|
||||
"matchCriteriaId": "34B9206D-CB9B-49BD-8162-CEFAE5C287E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/lb50jqyxwf8jrfpydl6dc5zpqtpgrrwd",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25164",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-05T00:15:52.400",
|
||||
"lastModified": "2024-03-05T13:41:01.900",
|
||||
"lastModified": "2024-08-16T16:35:03.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La vulnerabilidad iA Path Traversal existe en iDURAR v2.0.0, que permite a atacantes no autenticados exponer archivos confidenciales a trav\u00e9s de la funcionalidad de descarga."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/idurar/idurar-erp-crm/tree/2.0.0/routes/erpRoutes/erpDownloadRouter.js",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25288",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-21T17:15:09.817",
|
||||
"lastModified": "2024-02-22T19:07:27.197",
|
||||
"lastModified": "2024-08-16T17:35:05.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SLIMS (Senayan Library Management Systems) 9 Bulian v9.6.1 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de pop-scope-vocabolary.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-pop_scope_vocabolary.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25386",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T06:15:48.390",
|
||||
"lastModified": "2024-03-13T04:15:07.960",
|
||||
"lastModified": "2024-08-16T17:35:06.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Directory Traversal en DICOM\u00ae Connectivity Framework de laurelbridge anterior a v.2.7.6b permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo format_logfile.pl."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-25410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-26T16:27:58.960",
|
||||
"lastModified": "2024-04-03T21:15:31.220",
|
||||
"lastModified": "2024-08-16T17:35:06.847",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "flusity-CMS 2.33 es vulnerable a la carga sin restricciones de archivos con tipo peligroso en update_setting.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/flusity/flusity-CMS/commit/b99de3bd05677e8b61c04a70235faa6001556b3b",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27182",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-08-02T10:16:00.250",
|
||||
"lastModified": "2024-08-02T12:59:43.990",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T16:55:10.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,8 +15,41 @@
|
||||
"value": "En Apache Linkis <= 1.5.0, la eliminaci\u00f3n arbitraria de archivos en los servicios de administraci\u00f3n b\u00e1sicos puede provocar que un usuario con una cuenta de administrador elimine cualquier archivo al que tenga acceso el usuario del sistema Linkis. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.6.0, que soluciona este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
@ -28,10 +61,33 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:linkis:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.3.2",
|
||||
"versionEndExcluding": "1.6.0",
|
||||
"matchCriteriaId": "A34962F7-E33B-4593-99EE-B99AE33E5130"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/2of1p433h8rbq2bx525rtftnk19oz38h",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27497",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T15:15:08.580",
|
||||
"lastModified": "2024-03-01T15:23:36.177",
|
||||
"lastModified": "2024-08-16T16:35:04.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Linksys E2000 Ver.1.0.06 build 1 es vulnerable a la omisi\u00f3n de autenticaci\u00f3n a trav\u00e9s del archivo position.js."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27684",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-04T14:15:41.587",
|
||||
"lastModified": "2024-03-04T15:35:25.673",
|
||||
"lastModified": "2024-08-16T16:35:05.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en dlapn.cgi, dldongle.cgi, dlcfg.cgi, fwup.cgi y seama.cgi en D-Link GORTAC750_A1_FW_v101b03 permite a atacantes remotos inyectar script web o HTML arbitrarios a trav\u00e9s del par\u00e1metro url."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1qu4iBQGeAwolTXjVOTXsAAusSHo2ie-Y/view",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-27730",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T19:15:18.663",
|
||||
"lastModified": "2024-08-15T19:15:18.663",
|
||||
"lastModified": "2024-08-16T16:35:06.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure Permissions vulnerability in Friendica v.2023.12 allows a remote attacker to obtain sensitive information and execute arbitrary code via the cid parameter of the calendar event feature."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " La vulnerabilidad de permisos inseguros en Friendica v.2023.12 permite a un atacante remoto obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro cid de la funci\u00f3n de eventos del calendario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/friendica/friendica/pull/13927",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27744",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-01T22:15:47.870",
|
||||
"lastModified": "2024-03-13T07:15:36.410",
|
||||
"lastModified": "2024-08-16T16:35:07.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Vulnerabilidad de Cross-Site Scripting en Petrol Pump Mangement Software v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro de imagen en el componente profile.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27881",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-07-29T23:15:10.807",
|
||||
"lastModified": "2024-07-30T13:32:45.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T17:37:25.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,120 @@
|
||||
"value": " Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Es posible que una aplicaci\u00f3n pueda acceder a informaci\u00f3n sobre los contactos de un usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0",
|
||||
"versionEndExcluding": "12.7.6",
|
||||
"matchCriteriaId": "EA924D87-8FAE-4E34-83F7-A5E25C7450E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13",
|
||||
"versionEndExcluding": "13.6.8",
|
||||
"matchCriteriaId": "389354D3-A504-48B7-A379-B894963B2B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14",
|
||||
"versionEndExcluding": "14.6",
|
||||
"matchCriteriaId": "3A459550-0BAE-4843-96F0-39780516D4A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/18",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/19",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jul/20",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214118",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214119",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT214120",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28418",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-14T13:15:53.833",
|
||||
"lastModified": "2024-03-14T14:21:20.217",
|
||||
"lastModified": "2024-08-16T16:35:08.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Webedition CMS 9.2.2.0 tiene una vulnerabilidad de carga de archivos a trav\u00e9s de /webEdition/we_cmd.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/shavchen214/pwn/issues/I94VI3",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28964",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-12T15:15:50.647",
|
||||
"lastModified": "2024-06-13T18:36:09.010",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T16:44:09.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:common_event_enabler:*:*:*:*:*:windows:*:*",
|
||||
"versionEndIncluding": "8.9.10.0",
|
||||
"matchCriteriaId": "F0DBDBFB-2C27-4F9A-BEB8-D591BDE733B5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000224987/dsa-2024-179-security-update-for-dell-emc-common-event-enabler-windows-for-cavatools-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29157",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:15:31.520",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-08-16T16:35:08.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "HDF5 hasta 1.14.3 contiene un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en H5HG_read, lo que provoca la corrupci\u00f3n del puntero de instrucci\u00f3n y provoca denegaci\u00f3n de servicio o posible ejecuci\u00f3n de c\u00f3digo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-32316",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T16:15:09.013",
|
||||
"lastModified": "2024-04-17T16:51:07.347",
|
||||
"lastModified": "2024-08-16T16:35:09.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El firmware Tenda AC500 V2.0.1.9(1307) tiene una vulnerabilidad de desbordamiento de pila en la funci\u00f3n fromDhcpListClient."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_list1.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-32609",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T15:36:45.683",
|
||||
"lastModified": "2024-05-14T16:12:23.490",
|
||||
"lastModified": "2024-08-16T16:35:10.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La librer\u00eda HDF5 hasta 1.14.3 permite el consumo de pila en la funci\u00f3n H5E_printf_stack en H5Eint.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-674"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32860",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-13T13:15:49.517",
|
||||
"lastModified": "2024-06-13T18:35:19.777",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T16:46:36.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
@ -41,8 +61,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +81,631 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.26.0",
|
||||
"matchCriteriaId": "6D3E1671-D766-4BEE-A382-3F9950540382"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D355D92F-71AB-4D6D-9D3D-85A0BF4133E5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.0.24",
|
||||
"matchCriteriaId": "09B0F2CD-223E-4C11-896E-E0D2AED3D7CA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C32F25E-2F1F-409D-85DF-15CCAB423DD5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1.25",
|
||||
"matchCriteriaId": "6D3892D1-FA31-4E08-8C4A-B233A7E6166E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F0C34FD-6A6D-43BF-B548-13D57532AF8C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.1.19",
|
||||
"matchCriteriaId": "2BA98A09-CEC8-4765-9F67-1B8E31A403BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "486DCCF7-79D9-45C1-8CBD-26FB78705F91"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1.12",
|
||||
"matchCriteriaId": "502B41A3-DA11-4F02-ADBA-12BAEB90E9D9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2943649A-0559-4184-AE43-B6FCEDF3BF98"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.13.0",
|
||||
"matchCriteriaId": "34DF7BEA-2EF9-47A8-965D-C045C793F834"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "503027CC-7D9B-4F00-9728-48C12B18BD7B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.18.0",
|
||||
"matchCriteriaId": "2C2FE0D4-FEFE-4E9D-BFCA-5EAC643E47A1"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66B64687-CF02-414E-B961-84A011DC49E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.27.0",
|
||||
"matchCriteriaId": "CBC6538F-95F5-411B-9AEE-E330D33F765E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCCE762E-FB6C-4493-A21F-347DE5CB57E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.21.0",
|
||||
"matchCriteriaId": "7EE1A9B5-8534-4DAE-957E-FF670060C35A"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B084185F-1C0D-47D9-9F72-A79095462428"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.27.0",
|
||||
"matchCriteriaId": "626441E2-E195-4E18-B5CF-093CE2706827"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.21.0",
|
||||
"matchCriteriaId": "3E92F1AF-4259-40FA-BD64-2B5E36DB815B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C631E678-90F0-4DB2-8AB8-7378EC32FAC0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.18.0",
|
||||
"matchCriteriaId": "84A10F10-F9C8-4FF0-8F28-BCBDABE8C8EA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05928944-E647-4A4D-AEA1-B67804BC7DB5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.22.0",
|
||||
"matchCriteriaId": "69E828F7-2199-470B-B3F3-251704F4BAA4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.20.0",
|
||||
"matchCriteriaId": "D9A38198-F80D-4D7C-B660-8B5B44C95751"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A254E353-E519-401F-8657-76C7625F9A0C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.22.0",
|
||||
"matchCriteriaId": "AF468943-A697-46B0-A8DF-3D9F329E87D6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.20.0",
|
||||
"matchCriteriaId": "07378EE2-F446-4E05-A6C3-42532865C664"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C0272BD-DAFD-47EC-9B70-F72B686032B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:aurora_r16_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.7.0",
|
||||
"matchCriteriaId": "F084A15D-0C77-4AC7-A2E8-CCE5B638C968"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:aurora_r16:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D6A86161-7209-4DC6-9315-66C37C1807DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:inspiron_15_3510_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.19.0",
|
||||
"matchCriteriaId": "2CB354C9-725F-41D3-A514-C61D1E2C6DD9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:inspiron_15_3510:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9B4D72F-BF7F-4AE3-825E-394DF12F0482"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:inspiron_15_352_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.14.0",
|
||||
"matchCriteriaId": "AF372BE7-5B95-4DF7-A85A-22B92D3931BF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:inspiron_15_352:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "807B8FFB-4AB1-43B3-B2E6-BA53D1244437"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.16.0",
|
||||
"matchCriteriaId": "36119F09-7608-4DD7-A5BC-297D015F9FE8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52628A84-FEE1-4194-A13F-4139A3A0AE9F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.19.0",
|
||||
"matchCriteriaId": "54398C42-AD80-4365-8F44-F3B6F44D33F5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5944D668-16F9-4098-A99E-811F02C65B2A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.6.0",
|
||||
"matchCriteriaId": "4C42BB7D-2380-4FA9-8C5C-FE0F594B3A7F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E75E14FE-EDC4-43F8-960C-F135EDFFBDCB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000223440/dsa-2024-125",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32918",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-06-13T21:15:55.683",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T17:49:01.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,66 @@
|
||||
"value": "Omisi\u00f3n de permiso que permite a los atacantes desactivar el cifrado HDCP 2.2 al no completar los pasos de inicializaci\u00f3n del intercambio de claves HDCP"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-06-01",
|
||||
"source": "dsap-vuln-management@google.com"
|
||||
"source": "dsap-vuln-management@google.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-33212",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-23T15:15:50.090",
|
||||
"lastModified": "2024-04-24T13:39:42.883",
|
||||
"lastModified": "2024-08-16T16:35:11.323",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que Tenda FH1206 V1.2.0.8(8155)_EN contiene una vulnerabilidad de desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro funcpara1 en ip/goform/setcfm."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://palm-vertebra-fe9.notion.site/formSetCfm-7d199da0fd0740988a498304905e2dd1",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34686",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2024-06-11T03:15:11.080",
|
||||
"lastModified": "2024-06-11T13:54:12.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T17:54:46.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@sap.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,108 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:103:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D84BD4DE-15D9-4201-9A31-0A20F36D19AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:104:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E5511CFF-7BEF-46FE-BE5B-2445BC540BAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:105:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5295DFAB-ACDA-49DD-B2E6-07F6D4F3DC85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:106:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99A1D12E-2E49-4C4A-9732-CCB2328AD838"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:107:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE65B3D9-B97C-4016-B432-CD79F104BE6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F220D25-9344-482A-A36C-9D743EA55DE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:730:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0075805-C6FC-4E0D-9E1B-6ABA3A69F6C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48791122-7265-4C51-8AEB-DEBC199F9A7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9EEA160-B4B4-45E9-84C8-C26E52D6F329"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BDBE717-ADB6-4080-A198-E468080F82B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B8775BD-EAB8-4F08-B65D-35B704C0E36B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BFCEADC-7359-470F-A412-5B2808CF6069"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A387786F-F4F6-44FC-B969-6FB92A1AA096"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:s4fnd_102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "115FB1F7-4C37-4519-AEEF-93E33FCEB745"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:webcuif_700:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "757BEDCD-BB4D-4F29-B6D7-41861286122E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://me.sap.com/notes/3465129",
|
||||
"source": "cna@sap.com"
|
||||
"source": "cna@sap.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html",
|
||||
"source": "cna@sap.com"
|
||||
"source": "cna@sap.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,59 @@
|
||||
"id": "CVE-2024-34741",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-08-15T22:15:06.820",
|
||||
"lastModified": "2024-08-15T22:15:06.820",
|
||||
"lastModified": "2024-08-16T16:35:12.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setForceHideNonSystemOverlayWindowIfNeeded of WindowState.java, there is a possible way for message content to be visible on the screensaver while lock screen visibility settings are restricted by the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " En setForceHideNonSystemOverlayWindowIfNeeded de WindowState.java, existe una forma posible de que el contenido del mensaje sea visible en el protector de pantalla mientras el usuario restringe la configuraci\u00f3n de visibilidad de la pantalla de bloqueo debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-783"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://android.googlesource.com/platform/frameworks/base/+/abfaf702ef833dc4d374492d45c615c6e6de7f01",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-36821",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-11T18:15:13.927",
|
||||
"lastModified": "2024-08-01T13:53:17.693",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T16:33:38.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +81,50 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linksys:velop_whw0101_firmware:1.1.13.202617:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B38C1D00-1410-4536-9DD4-B0C98871999B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:linksys:velop_whw0101:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62FDA4EB-13BE-4CD6-9E35-9DE76F6F9C06"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://downloads.linksys.com/support/assets/releasenotes/WHW01_VLP01_1.1.13.202617_Customer_Release_Notes.txt",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/IvanGlinkin/CVE-2024-36821",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37293",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-11T17:16:04.237",
|
||||
"lastModified": "2024-06-13T18:36:09.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T16:11:53.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +81,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:amazon:aws_deployment_framework:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.0.0",
|
||||
"matchCriteriaId": "F3858F8E-B54E-4077-B22D-161EE66B0A73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/awslabs/aws-deployment-framework/pull/732",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/awslabs/aws-deployment-framework/releases/tag/v4.0.0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/awslabs/aws-deployment-framework/security/advisories/GHSA-mcj7-ppmv-h6jr",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38115",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:12.080",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T16:32:49.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del complemento de administraci\u00f3n de enrutamiento IP de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38115",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38116",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:12.333",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T16:36:12.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IP Routing Management Snapin Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del complemento de administraci\u00f3n de enrutamiento IP de Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -36,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
@ -47,10 +61,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38117",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:12.570",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T16:40:43.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NTFS Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de NTFS"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38117",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38118",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:12.817",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T16:41:04.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servidor de la Autoridad de seguridad local (LSA) de Microsoft"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,10 +51,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38120",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:13.047",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T17:12:59.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38120",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38121",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:13.320",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T17:13:28.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del Servicio de enrutamiento y acceso remoto de Windows (RRAS)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -37,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -47,10 +61,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38121",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-38122",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-08-13T18:15:13.613",
|
||||
"lastModified": "2024-08-14T02:07:05.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T17:16:41.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n del servidor de la Autoridad de seguridad local (LSA) de Microsoft"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -47,10 +51,125 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.10240.20751",
|
||||
"matchCriteriaId": "7E76B107-D977-41BE-8E5C-6A9B52C6EBDE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "6808A3F0-AC0E-4825-A582-5D7841F4870F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4780",
|
||||
"matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4780",
|
||||
"matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.3147",
|
||||
"matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4037",
|
||||
"matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4037",
|
||||
"matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.1457",
|
||||
"matchCriteriaId": "3C7E2433-4D16-40E5-973A-42F651779A47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.9200.25031",
|
||||
"matchCriteriaId": "28824912-3E9D-4E1E-AE1F-F9700DB892C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7259",
|
||||
"matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6189",
|
||||
"matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2655",
|
||||
"matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1085",
|
||||
"matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38122",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41962",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-01T17:16:09.507",
|
||||
"lastModified": "2024-08-02T12:59:43.990",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T16:34:48.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +81,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yonle:bostr:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.0.10",
|
||||
"matchCriteriaId": "572ED35B-69A0-4DD8-9764-8AC380AEF2F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Yonle/bostr/blob/8665374a66e2afb9f92d0414b0d6f420a95d5d2d/auth.js#L21",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Yonle/bostr/commit/49181f4ec9ae1472c6675cab56bbc01e723855af",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Yonle/bostr/releases/tag/3.0.10",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Yonle/bostr/security/advisories/GHSA-5cf7-cxrf-mq73",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-02T07:16:10.230",
|
||||
"lastModified": "2024-08-07T19:35:13.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T16:51:40.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elliptic_project:elliptic:6.5.6:*:*:*:*:node.js:*:*",
|
||||
"matchCriteriaId": "EAFFCBB8-D7CC-49D0-A052-D1FAAF4F3C33"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/indutny/elliptic/pull/317",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-42480",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-12T16:15:15.750",
|
||||
"lastModified": "2024-08-12T18:57:29.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T16:24:40.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an \"open at the top\" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Kamaji es el administrador del plano de control alojado para Kubernetes. En las versiones 1.0.0 y anteriores, Kamaji utiliza una definici\u00f3n de rango \"abierto en la parte superior\" en RBAC para funciones etcd, lo que permite que algunos servidores API de TCP puedan leer, escribir y eliminar los datos de otros planos de control. Esta vulnerabilidad se solucion\u00f3 en edge-24.8.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -47,18 +81,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clastix:kamaji:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "edge-24.8.2",
|
||||
"matchCriteriaId": "442C676D-6F12-40B2-B23E-A45A3E94B7A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/clastix/kamaji/blob/8cdc6191242f80d120c46b166e2102d27568225a/internal/datastore/etcd.go#L19-L24",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/clastix/kamaji/commit/1731e8c2ed5148b125ecfbdf091ee177bd44f3db",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/clastix/kamaji/security/advisories/GHSA-6r4j-4rjc-8vw5",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-426xx/CVE-2024-42634.json
Normal file
21
CVE-2024/CVE-2024-426xx/CVE-2024-42634.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42634",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T16:15:06.670",
|
||||
"lastModified": "2024-08-16T16:15:06.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Command Injection vulnerability exists in formWriteFacMac of the httpd binary in Tenda AC9 v15.03.06.42. As a result, attacker can execute OS commands with root privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/goldds96/Report/blob/main/Tenda/AC9/CI.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42946",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T17:15:19.097",
|
||||
"lastModified": "2024-08-15T19:31:54.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-16T17:35:08.227",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromVirtualSer function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 (408) conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro page en la funci\u00f3n fromVirtualSer. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-42955",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T17:15:19.990",
|
||||
"lastModified": "2024-08-15T19:29:55.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-16T17:35:08.957",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que Tenda FH1201 v1.2.0.14 (408) conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro page en la funci\u00f3n fromSafeClientFilter. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante una solicitud POST manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42976",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T17:15:20.767",
|
||||
"lastModified": "2024-08-16T13:31:28.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-16T17:35:09.687",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42985",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T17:15:21.623",
|
||||
"lastModified": "2024-08-16T13:29:27.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-16T17:35:10.400",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
21
CVE-2024/CVE-2024-429xx/CVE-2024-42994.json
Normal file
21
CVE-2024/CVE-2024-429xx/CVE-2024-42994.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42994",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T17:15:15.153",
|
||||
"lastModified": "2024-08-16T17:15:15.153",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VTiger CRM <= 8.1.0 does not properly sanitize user input before using it in a SQL statement, leading to a SQL Injection in the \"CompanyDetails\" operation of the \"MailManager\" module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-429xx/CVE-2024-42995.json
Normal file
21
CVE-2024/CVE-2024-429xx/CVE-2024-42995.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-42995",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T17:15:15.273",
|
||||
"lastModified": "2024-08-16T17:15:15.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VTiger CRM <= 8.1.0 does not correctly check user privileges. A low-privileged user can interact directly with the \"Migration\" administrative module to disable arbitrary modules."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.shielder.com/advisories/vtiger-migration-bac/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43044",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-08-07T14:15:33.000",
|
||||
"lastModified": "2024-08-07T15:17:46.717",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T17:19:30.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,73 @@
|
||||
"value": "Jenkins 2.470 y anteriores, LTS 2.452.3 y anteriores permiten que los procesos del agente lean archivos arbitrarios del sistema de archivos del controlador Jenkins mediante el m\u00e9todo `ClassLoaderProxy#fetchJar` en la librer\u00eda Remoting."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
|
||||
"versionEndExcluding": "2.452.4",
|
||||
"matchCriteriaId": "0041C764-EA61-4445-9696-65E22A678FD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "2.471",
|
||||
"matchCriteriaId": "1139DB12-D88F-4E0D-B22F-2A147B1EFD31"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43045",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2024-08-07T14:15:33.077",
|
||||
"lastModified": "2024-08-07T15:17:46.717",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-08-16T17:21:26.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,73 @@
|
||||
"value": "Jenkins 2.470 y anteriores, LTS 2.452.3 y anteriores no realizan una verificaci\u00f3n de permisos en un endpoint HTTP, lo que permite a los atacantes con permiso general/lectura acceder a \"Mis vistas\" de otros usuarios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
|
||||
"versionEndExcluding": "2.452.4",
|
||||
"matchCriteriaId": "0041C764-EA61-4445-9696-65E22A678FD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "2.471",
|
||||
"matchCriteriaId": "1139DB12-D88F-4E0D-B22F-2A147B1EFD31"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3349",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5976",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-13T21:15:57.683",
|
||||
"lastModified": "2024-06-17T12:43:31.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-08-16T17:53:25.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_and_visitor_gate_pass_logging_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E79823D1-656B-47ED-B919-817CF98B423B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Xu-Mingming/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.268422",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.268422",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.355692",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-6134",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-08-12T13:38:38.780",
|
||||
"lastModified": "2024-08-12T13:41:36.517",
|
||||
"lastModified": "2024-08-16T17:35:11.413",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-cart-for-digital-products WordPress plugin before 8.5.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento wp-cart-for-digital-products de WordPress anterior a 8.5.6 no desinfecta ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/34d61f7e-90eb-4a64-a8a7-18f2d6518118/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6239",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-06-21T14:15:14.007",
|
||||
"lastModified": "2024-06-24T19:06:27.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-08-16T16:15:06.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -125,6 +125,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:5305",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-6239",
|
||||
"source": "secalert@redhat.com",
|
||||
|
84
README.md
84
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-08-16T16:02:30.402064+00:00
|
||||
2024-08-16T18:00:17.215682+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-08-16T16:00:36.687000+00:00
|
||||
2024-08-16T17:56:31.230000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,65 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
260229
|
||||
260232
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `21`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-2175](CVE-2024/CVE-2024-21xx/CVE-2024-2175.json) (`2024-08-16T15:15:27.940`)
|
||||
- [CVE-2024-42462](CVE-2024/CVE-2024-424xx/CVE-2024-42462.json) (`2024-08-16T14:15:13.253`)
|
||||
- [CVE-2024-42463](CVE-2024/CVE-2024-424xx/CVE-2024-42463.json) (`2024-08-16T14:15:13.650`)
|
||||
- [CVE-2024-42464](CVE-2024/CVE-2024-424xx/CVE-2024-42464.json) (`2024-08-16T14:15:13.933`)
|
||||
- [CVE-2024-42465](CVE-2024/CVE-2024-424xx/CVE-2024-42465.json) (`2024-08-16T14:15:14.133`)
|
||||
- [CVE-2024-42466](CVE-2024/CVE-2024-424xx/CVE-2024-42466.json) (`2024-08-16T14:15:14.343`)
|
||||
- [CVE-2024-42486](CVE-2024/CVE-2024-424xx/CVE-2024-42486.json) (`2024-08-16T15:15:28.777`)
|
||||
- [CVE-2024-43381](CVE-2024/CVE-2024-433xx/CVE-2024-43381.json) (`2024-08-16T15:15:29.000`)
|
||||
- [CVE-2024-43807](CVE-2024/CVE-2024-438xx/CVE-2024-43807.json) (`2024-08-16T15:15:29.197`)
|
||||
- [CVE-2024-43808](CVE-2024/CVE-2024-438xx/CVE-2024-43808.json) (`2024-08-16T15:15:29.417`)
|
||||
- [CVE-2024-43809](CVE-2024/CVE-2024-438xx/CVE-2024-43809.json) (`2024-08-16T15:15:29.597`)
|
||||
- [CVE-2024-43810](CVE-2024/CVE-2024-438xx/CVE-2024-43810.json) (`2024-08-16T15:15:29.790`)
|
||||
- [CVE-2024-4763](CVE-2024/CVE-2024-47xx/CVE-2024-4763.json) (`2024-08-16T15:15:30.563`)
|
||||
- [CVE-2024-4781](CVE-2024/CVE-2024-47xx/CVE-2024-4781.json) (`2024-08-16T15:15:30.783`)
|
||||
- [CVE-2024-4782](CVE-2024/CVE-2024-47xx/CVE-2024-4782.json) (`2024-08-16T15:15:30.967`)
|
||||
- [CVE-2024-5209](CVE-2024/CVE-2024-52xx/CVE-2024-5209.json) (`2024-08-16T15:15:31.150`)
|
||||
- [CVE-2024-5210](CVE-2024/CVE-2024-52xx/CVE-2024-5210.json) (`2024-08-16T15:15:31.337`)
|
||||
- [CVE-2024-6004](CVE-2024/CVE-2024-60xx/CVE-2024-6004.json) (`2024-08-16T15:15:31.527`)
|
||||
- [CVE-2024-6098](CVE-2024/CVE-2024-60xx/CVE-2024-6098.json) (`2024-08-16T15:15:31.737`)
|
||||
- [CVE-2024-7144](CVE-2024/CVE-2024-71xx/CVE-2024-7144.json) (`2024-08-16T14:15:14.690`)
|
||||
- [CVE-2024-7145](CVE-2024/CVE-2024-71xx/CVE-2024-7145.json) (`2024-08-16T14:15:15.187`)
|
||||
- [CVE-2024-42634](CVE-2024/CVE-2024-426xx/CVE-2024-42634.json) (`2024-08-16T16:15:06.670`)
|
||||
- [CVE-2024-42994](CVE-2024/CVE-2024-429xx/CVE-2024-42994.json) (`2024-08-16T17:15:15.153`)
|
||||
- [CVE-2024-42995](CVE-2024/CVE-2024-429xx/CVE-2024-42995.json) (`2024-08-16T17:15:15.273`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `44`
|
||||
Recently modified CVEs: `53`
|
||||
|
||||
- [CVE-2024-37090](CVE-2024/CVE-2024-370xx/CVE-2024-37090.json) (`2024-08-16T14:19:42.403`)
|
||||
- [CVE-2024-37091](CVE-2024/CVE-2024-370xx/CVE-2024-37091.json) (`2024-08-16T14:08:08.113`)
|
||||
- [CVE-2024-37513](CVE-2024/CVE-2024-375xx/CVE-2024-37513.json) (`2024-08-16T14:30:47.543`)
|
||||
- [CVE-2024-37952](CVE-2024/CVE-2024-379xx/CVE-2024-37952.json) (`2024-08-16T14:43:20.333`)
|
||||
- [CVE-2024-38123](CVE-2024/CVE-2024-381xx/CVE-2024-38123.json) (`2024-08-16T15:40:45.897`)
|
||||
- [CVE-2024-38125](CVE-2024/CVE-2024-381xx/CVE-2024-38125.json) (`2024-08-16T15:41:26.523`)
|
||||
- [CVE-2024-38126](CVE-2024/CVE-2024-381xx/CVE-2024-38126.json) (`2024-08-16T15:42:36.073`)
|
||||
- [CVE-2024-38127](CVE-2024/CVE-2024-381xx/CVE-2024-38127.json) (`2024-08-16T15:43:13.980`)
|
||||
- [CVE-2024-38128](CVE-2024/CVE-2024-381xx/CVE-2024-38128.json) (`2024-08-16T15:31:29.327`)
|
||||
- [CVE-2024-38130](CVE-2024/CVE-2024-381xx/CVE-2024-38130.json) (`2024-08-16T15:31:59.127`)
|
||||
- [CVE-2024-38131](CVE-2024/CVE-2024-381xx/CVE-2024-38131.json) (`2024-08-16T15:32:31.797`)
|
||||
- [CVE-2024-38132](CVE-2024/CVE-2024-381xx/CVE-2024-38132.json) (`2024-08-16T15:33:07.097`)
|
||||
- [CVE-2024-38133](CVE-2024/CVE-2024-381xx/CVE-2024-38133.json) (`2024-08-16T15:25:05.590`)
|
||||
- [CVE-2024-38136](CVE-2024/CVE-2024-381xx/CVE-2024-38136.json) (`2024-08-16T15:26:24.433`)
|
||||
- [CVE-2024-38137](CVE-2024/CVE-2024-381xx/CVE-2024-38137.json) (`2024-08-16T15:27:09.137`)
|
||||
- [CVE-2024-38189](CVE-2024/CVE-2024-381xx/CVE-2024-38189.json) (`2024-08-16T15:11:42.940`)
|
||||
- [CVE-2024-41264](CVE-2024/CVE-2024-412xx/CVE-2024-41264.json) (`2024-08-16T16:00:36.687`)
|
||||
- [CVE-2024-42982](CVE-2024/CVE-2024-429xx/CVE-2024-42982.json) (`2024-08-16T14:35:03.793`)
|
||||
- [CVE-2024-5691](CVE-2024/CVE-2024-56xx/CVE-2024-5691.json) (`2024-08-16T14:44:05.733`)
|
||||
- [CVE-2024-6347](CVE-2024/CVE-2024-63xx/CVE-2024-6347.json) (`2024-08-16T14:33:42.730`)
|
||||
- [CVE-2024-6384](CVE-2024/CVE-2024-63xx/CVE-2024-6384.json) (`2024-08-16T14:29:24.947`)
|
||||
- [CVE-2024-6990](CVE-2024/CVE-2024-69xx/CVE-2024-6990.json) (`2024-08-16T15:21:14.383`)
|
||||
- [CVE-2024-7255](CVE-2024/CVE-2024-72xx/CVE-2024-7255.json) (`2024-08-16T15:23:19.167`)
|
||||
- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-16T14:25:42.820`)
|
||||
- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-16T14:25:46.027`)
|
||||
- [CVE-2024-32918](CVE-2024/CVE-2024-329xx/CVE-2024-32918.json) (`2024-08-16T17:49:01.547`)
|
||||
- [CVE-2024-33212](CVE-2024/CVE-2024-332xx/CVE-2024-33212.json) (`2024-08-16T16:35:11.323`)
|
||||
- [CVE-2024-34686](CVE-2024/CVE-2024-346xx/CVE-2024-34686.json) (`2024-08-16T17:54:46.250`)
|
||||
- [CVE-2024-34741](CVE-2024/CVE-2024-347xx/CVE-2024-34741.json) (`2024-08-16T16:35:12.133`)
|
||||
- [CVE-2024-36821](CVE-2024/CVE-2024-368xx/CVE-2024-36821.json) (`2024-08-16T16:33:38.597`)
|
||||
- [CVE-2024-37293](CVE-2024/CVE-2024-372xx/CVE-2024-37293.json) (`2024-08-16T16:11:53.287`)
|
||||
- [CVE-2024-38115](CVE-2024/CVE-2024-381xx/CVE-2024-38115.json) (`2024-08-16T16:32:49.573`)
|
||||
- [CVE-2024-38116](CVE-2024/CVE-2024-381xx/CVE-2024-38116.json) (`2024-08-16T16:36:12.337`)
|
||||
- [CVE-2024-38117](CVE-2024/CVE-2024-381xx/CVE-2024-38117.json) (`2024-08-16T16:40:43.667`)
|
||||
- [CVE-2024-38118](CVE-2024/CVE-2024-381xx/CVE-2024-38118.json) (`2024-08-16T16:41:04.497`)
|
||||
- [CVE-2024-38120](CVE-2024/CVE-2024-381xx/CVE-2024-38120.json) (`2024-08-16T17:12:59.383`)
|
||||
- [CVE-2024-38121](CVE-2024/CVE-2024-381xx/CVE-2024-38121.json) (`2024-08-16T17:13:28.350`)
|
||||
- [CVE-2024-38122](CVE-2024/CVE-2024-381xx/CVE-2024-38122.json) (`2024-08-16T17:16:41.717`)
|
||||
- [CVE-2024-41962](CVE-2024/CVE-2024-419xx/CVE-2024-41962.json) (`2024-08-16T16:34:48.873`)
|
||||
- [CVE-2024-42461](CVE-2024/CVE-2024-424xx/CVE-2024-42461.json) (`2024-08-16T16:51:40.270`)
|
||||
- [CVE-2024-42480](CVE-2024/CVE-2024-424xx/CVE-2024-42480.json) (`2024-08-16T16:24:40.430`)
|
||||
- [CVE-2024-42946](CVE-2024/CVE-2024-429xx/CVE-2024-42946.json) (`2024-08-16T17:35:08.227`)
|
||||
- [CVE-2024-42955](CVE-2024/CVE-2024-429xx/CVE-2024-42955.json) (`2024-08-16T17:35:08.957`)
|
||||
- [CVE-2024-42976](CVE-2024/CVE-2024-429xx/CVE-2024-42976.json) (`2024-08-16T17:35:09.687`)
|
||||
- [CVE-2024-42985](CVE-2024/CVE-2024-429xx/CVE-2024-42985.json) (`2024-08-16T17:35:10.400`)
|
||||
- [CVE-2024-43044](CVE-2024/CVE-2024-430xx/CVE-2024-43044.json) (`2024-08-16T17:19:30.643`)
|
||||
- [CVE-2024-43045](CVE-2024/CVE-2024-430xx/CVE-2024-43045.json) (`2024-08-16T17:21:26.803`)
|
||||
- [CVE-2024-5976](CVE-2024/CVE-2024-59xx/CVE-2024-5976.json) (`2024-08-16T17:53:25.450`)
|
||||
- [CVE-2024-6134](CVE-2024/CVE-2024-61xx/CVE-2024-6134.json) (`2024-08-16T17:35:11.413`)
|
||||
- [CVE-2024-6239](CVE-2024/CVE-2024-62xx/CVE-2024-6239.json) (`2024-08-16T16:15:06.760`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
239
_state.csv
239
_state.csv
@ -79627,7 +79627,7 @@ CVE-2015-6744,0,0,ca2d66c76739783f716b1cdcc4ad3d204d35663a9542d22561c35a22e800ca
|
||||
CVE-2015-6745,0,0,e627d87474527daa79e7db2e1742300f4bd416724c177b6a6d8ec953ff29eca7,2015-08-31T19:08:00.877000
|
||||
CVE-2015-6746,0,0,7e29a9dc31ea25916e170d4ba83bc34337696a20eed0923f46cc852b4dbd6721,2015-08-31T19:08:26.937000
|
||||
CVE-2015-6747,0,0,a78c01ec5c822ac123b463fe0c957ec53cf6e33a09298554185c99ece916ef30,2015-08-31T19:08:48.720000
|
||||
CVE-2015-6748,0,0,127756c2b0ef0cf95f1da6f4edd29fe4db415868dba3d1ed3d1ce33dccea2daf,2020-01-27T00:15:10.553000
|
||||
CVE-2015-6748,0,1,f049f25f1e6c0ea2410c5396476cb8476bbb17e19c7f07baf9cf7a1d0e72da6a,2024-08-16T16:09:58.827000
|
||||
CVE-2015-6749,0,0,f87c3a43609c773ca6f81a43f39e0d6c771bccada5b3fcf86178cf12796c77a4,2016-12-08T03:13:18.987000
|
||||
CVE-2015-6750,0,0,81c69f4954e30747a454457076be8a1ade8a803744cd6badf8f33ada62a65d0a,2015-09-01T18:23:26.903000
|
||||
CVE-2015-6751,0,0,5c4be3ca0d6e05978dc982372915dded47b3e5eaafd3b39d7c4f17a76a131d44,2015-09-11T17:59:46.143000
|
||||
@ -109236,7 +109236,7 @@ CVE-2017-9437,0,0,64e23275d195a1ab2cbc31c52573223cde8ca170da9b723fd8474232992ca7
|
||||
CVE-2017-9438,0,0,1a16512c2f194e9c8d7ea21627fc6228bd5549f81a4e55109342be440100bd8a,2023-11-07T02:50:46.323000
|
||||
CVE-2017-9439,0,0,456f16a5e48c436581a51d320ede1d67b85a567c7da9bc7eaa063565aca48200,2019-10-03T00:03:26.223000
|
||||
CVE-2017-9440,0,0,2123eb4ea3a03cedde6e2eddbaa29d3fe6e33ff0b3ee0a93b6111ae21ce4a4ec,2019-10-03T00:03:26.223000
|
||||
CVE-2017-9441,0,1,6e652d223a5dc3eaece5b3b62832b1fb6d10153f411c16e97db83690374877f9,2024-08-16T15:35:01.103000
|
||||
CVE-2017-9441,0,0,6e652d223a5dc3eaece5b3b62832b1fb6d10153f411c16e97db83690374877f9,2024-08-16T15:35:01.103000
|
||||
CVE-2017-9442,0,0,8bf9f336242e1c1489746dbf1b94a79372e63100caad4ebd9dbd12e2a621193e,2024-08-05T17:15:39.363000
|
||||
CVE-2017-9443,0,0,54e257e6a290bc5924fb0dfda90995bb7d0e850ef0677f89bc9cc580b15fd1d3,2024-08-05T17:15:39.430000
|
||||
CVE-2017-9444,0,0,a8a61be64f1fe6f977b85debc8187d06e9259b178fd3bed8f2748cb6c8036855,2017-06-12T17:44:06.033000
|
||||
@ -119921,7 +119921,7 @@ CVE-2018-20221,0,0,5fd00b71cc487e4e0e4193daba4cceeb8f5705806d153b6672f8f29f74b7c
|
||||
CVE-2018-20222,0,0,8e0c16e57d9dcc30033901200ca3c9da59694c4f503c1b22d690ba9bc360aad2,2019-04-08T11:56:13.073000
|
||||
CVE-2018-20225,0,0,b27824f57b885e319090ecc9a354a7faaf14af2f7c34c7e7a258c32460ecce7b,2024-08-05T12:15:29.653000
|
||||
CVE-2018-20226,0,0,7d0a52318600d72e8702c5ca7c094270b9052a8df2b0da4bb948918001ecfba1,2019-10-03T00:03:26.223000
|
||||
CVE-2018-20227,0,0,e0483ae742de594c3c3497c75bb20080f6ff0b5047c6814ec6d5c093eecdcb63,2019-01-07T14:38:22.633000
|
||||
CVE-2018-20227,0,1,a9caf84bef65bc1087c3cf0d315ef0ab956e2f0d5407f1246e20b01dc37393b8,2024-08-16T16:09:23.257000
|
||||
CVE-2018-20228,0,0,4e90f13706674b200b83ac5ad5612cdd8d08d3cf02d435efa10b9deb11d15ffc,2019-01-24T15:37:52.280000
|
||||
CVE-2018-20229,0,0,2f2605790386ea4f1918e0a0a2344cce728cb227ddab0e6739b41de696f780b0,2019-04-08T16:29:58.260000
|
||||
CVE-2018-20230,0,0,0881d313ffec24b55ad46c902fec949a0be3386cfd883c69c8ca77f41722e84a,2020-08-24T17:37:01.140000
|
||||
@ -197747,7 +197747,7 @@ CVE-2022-29624,0,0,b7304d3f3d8a3fc21bb530fa62622522262f40c296b6abc0e5d2f4893aa57
|
||||
CVE-2022-29627,0,0,ffa421d2c9b9f34fa5129a23f31eab5821dd06b3edf2869d17e4218d06592946,2022-06-12T02:12:18.457000
|
||||
CVE-2022-29628,0,0,ed87694646944d873796e13e11b56199fcf3eb8b9ce0fb46cd12f5d571e6ecdb,2022-06-09T20:11:00.937000
|
||||
CVE-2022-2963,0,0,f75c48b435f8a5336e2327a75c2e41ade8c611cf0f5a72ab580655090bfa4f1b,2022-10-18T18:04:12.260000
|
||||
CVE-2022-29631,0,0,9e75f09225ea998af93999be145286e588fcbb5ca3b3d7fcd2496bf7bf3523fd,2022-06-14T17:03:37.153000
|
||||
CVE-2022-29631,0,1,901bdf323e111be1491fba1cf63af131ff327ee14d14e6d2651fd7d73345ec9e,2024-08-16T16:11:20.603000
|
||||
CVE-2022-29632,0,0,330989ff1b1ea65814ad0e45d736a41973f8dc7d17221c330c3f21fc050c4681,2022-06-08T15:54:04.953000
|
||||
CVE-2022-29633,0,0,cfa42aa13fd24239ac389e8a2f3603df7bbdce50cf8d75f18e8b39a6b73524ba,2023-08-08T14:22:24.967000
|
||||
CVE-2022-29637,0,0,d80755a0ed2863cfa85e5e86c4fe0cd1373f11826a292f73211d8e383a471bee,2022-06-08T16:04:59.757000
|
||||
@ -210372,7 +210372,7 @@ CVE-2022-46080,0,0,fe9b2f2a23de7c5102d29ab9bc9b6a0f2eb379ce1e2d5a8ce8acadcffbe0e
|
||||
CVE-2022-46081,0,0,10dd263b055bb8688d827cd365513fa6234714848594880daa28df023fae41a3,2024-08-03T15:15:33.853000
|
||||
CVE-2022-46087,0,0,2d7a2aad383393e3a211a5235a80f74ad68301414683cf8758f0099824be289a,2023-02-06T21:54:50.580000
|
||||
CVE-2022-46088,0,0,4ed06a94c0bc5acd5a9950d39108669b474d03ba4d63c42e5b0a87c8dd938716,2024-03-05T18:50:18.333000
|
||||
CVE-2022-46089,0,0,32a450b8d6f1081fe551f32b5626a3eee19b8cf229568431e3a129e772b8efdc,2024-03-07T13:52:27.110000
|
||||
CVE-2022-46089,0,1,a389db1543f1a2ff5fae3a5ebf216c4a40482acbc273e2405c2ae12b84cb1029,2024-08-16T17:35:01.040000
|
||||
CVE-2022-4609,0,0,e70428330dd60a5e25b1dc4109e568b1aced34149fef1cd3984474ebc7588254,2022-12-23T18:44:47.767000
|
||||
CVE-2022-46091,0,0,6ff24a58a333a49492281b25c366e610950da50d2b34311dcc22df1e4f6200df,2024-08-05T16:35:01.230000
|
||||
CVE-2022-46093,0,0,c0c02a4cae40cc3ff547b83ecf90b1666a8ae67ef432ea60abf5435d631d85a2,2023-01-24T14:24:27.513000
|
||||
@ -215476,7 +215476,7 @@ CVE-2023-21348,0,0,6536205321d5fe5c8ecb581d119686017cf544a48b45f9971c9987430c9d5
|
||||
CVE-2023-21349,0,0,6db4fdb58824ed6add2774434860256244faea3a5778dec5dee8a7389bbf3391,2023-11-03T18:59:35.570000
|
||||
CVE-2023-2135,0,0,4975a001fe13471f3f36bbc1a515f8a00221f54cd705ee38f3b61a934cb9f011,2023-10-20T20:53:18.983000
|
||||
CVE-2023-21350,0,0,190e6cfe06286946a16c7d06283fc13546904bc93f168f3bd1a752e5caa577dc,2023-11-04T03:22:37.570000
|
||||
CVE-2023-21351,0,1,dfa04bdbe866b1a8220a4a23f3b3a9f73d22c0f87606557b670b234ca20f7d5a,2024-08-16T15:35:01.333000
|
||||
CVE-2023-21351,0,0,dfa04bdbe866b1a8220a4a23f3b3a9f73d22c0f87606557b670b234ca20f7d5a,2024-08-16T15:35:01.333000
|
||||
CVE-2023-21352,0,0,bf9bbc836531e62cddd0e2eb36967636a5feba7eeb8a8cc199d223cecbe99cd0,2023-11-04T03:22:08.317000
|
||||
CVE-2023-21353,0,0,c66984d1d99a5b13dc3ec131e5a274aa6bd6b74fe67d618fbf20f8803ecf6638,2023-11-04T03:22:00.393000
|
||||
CVE-2023-21354,0,0,d6461086ceeb0e8c3fc21b5518c694b08fab2af77c245181d061ef4d315b3c02,2023-11-04T03:21:47.663000
|
||||
@ -225303,7 +225303,7 @@ CVE-2023-33671,0,0,2c64ca1e06c9630e4ba1d8fe85512ff860c671e3e913c3ae1fe0459631330
|
||||
CVE-2023-33672,0,0,291fb7f59d1eae6b75bde1b5d591242bc0fb25cab928068f6a85a8688c610a10,2023-06-12T13:15:10.900000
|
||||
CVE-2023-33673,0,0,c54995448b4f5118860c2c72a41cb2379fdd61584cffca9b1c4f30c22fddffd4,2023-06-12T13:15:10.967000
|
||||
CVE-2023-33675,0,0,381da06a94ad6f9361a878c803e4e1fb1f9a7067c3b213f78ad9c1dfbf3d4a3c,2023-06-12T13:15:11.027000
|
||||
CVE-2023-33676,0,0,90ba6c2c3d44d3e4ddbc93a4545955fd021e123f330baf5ccdf142ce22cf6a9f,2024-03-07T13:52:27.110000
|
||||
CVE-2023-33676,0,1,d8f74a6186c94f33f7f4dd75f85dc420a2cca6e4b92a04965885a06575277154,2024-08-16T17:35:02.057000
|
||||
CVE-2023-33677,0,0,fdaeb49d64bdf1efa8b5411d739207103f1736e1ceb5ef124ebf0bc2d9538056,2024-03-06T15:18:08.093000
|
||||
CVE-2023-3368,0,0,b9cfa1fb1e0c63886e4f96496a557e99b9be48828e3aceb01ab78631664a93ea,2023-12-04T18:57:35.040000
|
||||
CVE-2023-33684,0,0,afc92e89b7d5bca4bcdf52147d5685baff42318e93d9730a4d548a1a2dfb30f9,2024-02-16T20:34:46.687000
|
||||
@ -230092,7 +230092,7 @@ CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9
|
||||
CVE-2023-40105,0,0,aad385399771bf8ef1682cd01ea151bd6776f60f896cc985fd26fd6d806bf2b4,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40106,0,0,6d9f8c84c211a0ff1a7429561ccdcbd5b138bf68f865cdf0fd7423613ec0599e,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40107,0,0,66f62207d9e25b242ec6da7f35b2ef9ecf0f1e96681d1510eaef351f3c32142f,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40109,0,0,9852e1ed3ab84624ed488dd571dfcb2a8f8fbe67a503c0c3a8f8a32f6ca7bd2c,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40109,0,1,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
|
||||
CVE-2023-4011,0,0,f4c9a2bb464c5a1de2dfebfd2730b2028967d3b4a059651b6b18a027ee3ccdd5,2023-08-04T19:45:30.020000
|
||||
CVE-2023-40110,0,0,0da8aae64ff0eaf8c18d1725956d88dfae89050f4e3cb7fa2c7e3b0656903e32,2024-02-16T13:37:55.033000
|
||||
CVE-2023-40111,0,0,f1ce81f644f8445e9edc563f366dea3f110d604fec94f86b52e2f9e00728d430,2024-02-16T13:37:55.033000
|
||||
@ -232453,7 +232453,7 @@ CVE-2023-43281,0,0,a8043741c9358a4c4a6eb393caa7cb080a33c75aaafb8cfaf3705b4ad1ef0
|
||||
CVE-2023-43284,0,0,d19af47cad8f003ee912aefb8b077df83455ebeb41fc85cb4eac052cd716193d,2023-11-22T15:15:09.303000
|
||||
CVE-2023-4329,0,0,8b75efb685335d1476e96d7eec54e652c5d16a0d171dc01ce34df40a6d7b080d,2023-08-21T18:40:42.853000
|
||||
CVE-2023-43291,0,0,d5ba19d030168db77bf7db7e6beafa094201b9e344ad7626faccfa0f9a3f170d,2023-09-29T17:25:25.957000
|
||||
CVE-2023-43292,0,0,065ac2f210732043951d2ad4eb65f830f888507c648fd02a30a9db517004e7a7,2024-03-13T12:33:51.697000
|
||||
CVE-2023-43292,0,1,24ca0ca0034ab3716a04050b8953f7ca74741d3547dbf42a22c571c80aa2ce0b,2024-08-16T17:35:02.787000
|
||||
CVE-2023-43295,0,0,654a2e717a810338b9f5002f5c757587f6953578d4b0f454b1d2aae95dbd9902,2023-11-08T18:29:14.447000
|
||||
CVE-2023-43297,0,0,dd6c536a8c4208de85afa8f1927062a6a713aaab4fa69403926f8e654f86f56a,2023-10-04T17:05:58.947000
|
||||
CVE-2023-43298,0,0,9dc228ff73bdf528d43d0ed69906bd07f68ca6fc9bc3f0ef853fca33224732bc,2023-12-11T17:48:50.780000
|
||||
@ -237787,7 +237787,7 @@ CVE-2023-51133,0,0,4bc9e38acdb3d80c5232cd830b1f09875cdf7b59bc6548f7ae1d4caef7595
|
||||
CVE-2023-51135,0,0,53c80adeaa8e75c9e3cd470f8895bc91ebde787cdb264fd2dcfc95c04b4bb99d,2024-01-05T18:31:15.977000
|
||||
CVE-2023-51136,0,0,63ac77396c787693d1da831a86e7e0b47a74d8a0de9124c93b3461410be3e60a,2024-01-05T18:30:58.837000
|
||||
CVE-2023-5114,0,0,54f99e7d2f0cfaa44a8d93ec082f1df9899d84ed3553bc7f2db17be741a57d05,2023-11-13T17:48:55.993000
|
||||
CVE-2023-51141,0,0,d0a59f47f631036480902f5b7c06b564781b9cba22a29a98faf605d8d6619d3c,2024-04-11T12:47:44.137000
|
||||
CVE-2023-51141,0,1,ed87fa65299edf13575c071e576bf18048cd3ec368ae733d0d5c21fda476e068,2024-08-16T16:35:01.820000
|
||||
CVE-2023-51142,0,0,3cc421719bb627f399e2e569c0e2f084a8d2b6a78a2b82bf6a4efa03230e2ce3,2024-07-08T14:16:45.710000
|
||||
CVE-2023-51146,0,0,565c9e6150b79b32d680692996443b4529e7b07694ee0fd8309e418e9a5f3ca2,2024-03-27T12:29:30.307000
|
||||
CVE-2023-51147,0,0,75e5ad9e43cde03291b18d115e151db0aadaa5d5d0263e6c24a28fb6db5ae3b5,2024-08-05T21:35:01.980000
|
||||
@ -238270,7 +238270,7 @@ CVE-2023-51796,0,0,3bdae660f318686e13d3a2a8a11434f559a9ba3bec20be5b73aed2cdea2ca
|
||||
CVE-2023-51797,0,0,15fc85d3358fc86d221e1d0ab3fdefddcc3d7931f292adf653ee482f3b3f049e,2024-07-03T01:43:23.157000
|
||||
CVE-2023-51798,0,0,3544aa30bd6dda454e0b3df26600e87350716d42514085effafca2449c32796c,2024-07-03T01:43:23.963000
|
||||
CVE-2023-5180,0,0,05de7a925f3b457b2b9f8a9dc5ce3c9a3d8ff4c9a3d8e7d0ed796b81c1f1e2d9,2024-01-04T15:43:40.260000
|
||||
CVE-2023-51800,0,1,93a99ca6ee46e69a132e46eb486333b1af37da71382d74108d17c872eb589999,2024-08-16T15:35:02.053000
|
||||
CVE-2023-51800,0,0,93a99ca6ee46e69a132e46eb486333b1af37da71382d74108d17c872eb589999,2024-08-16T15:35:02.053000
|
||||
CVE-2023-51801,0,0,daec35424d16e8651180e47ce7964aaa86708153ff4d98fb80cf1eeaac664121,2024-08-01T13:45:33
|
||||
CVE-2023-51802,0,0,26d2eb61c4bcd76ccdbaa324cdefd7f58728d6a0c595e8ec56ace22886ad7131,2024-02-29T13:49:29.390000
|
||||
CVE-2023-51803,0,0,5790a7a80f4880b3e3a0fa86790ea4c84e94ec68c366f5e2ddc287043198ebc5,2024-04-01T01:12:59.077000
|
||||
@ -238383,7 +238383,7 @@ CVE-2023-52064,0,0,2e6eacf3122e193934b8e5026ba3d667018aabe2b15f00e378d2dd371a1d1
|
||||
CVE-2023-52068,0,0,9738fbe2996c9d736286f8e78dfc9c20ccebb2ce66b7bbc56f1565006d5c4c29,2024-01-22T19:53:08.497000
|
||||
CVE-2023-52069,0,0,ad23cadb3859f85a66031ccd7a898a641dcf7c2393a905b66159386dbb4d3689,2024-01-23T21:41:02.097000
|
||||
CVE-2023-5207,0,0,ae7a22a20155b6a0e191891e5e59a6b878214fc55c1a67934deb96cc7d59a0de,2023-10-04T01:55:31.953000
|
||||
CVE-2023-52070,0,1,eb135ebe9555f9263de301311a19bde2c26d80c5302f7256ab733a45a10b5c37,2024-08-16T15:35:02.790000
|
||||
CVE-2023-52070,0,0,eb135ebe9555f9263de301311a19bde2c26d80c5302f7256ab733a45a10b5c37,2024-08-16T15:35:02.790000
|
||||
CVE-2023-52071,0,0,812221a84c238215dcedea186e9ad0947ed6c219cfb74718c68ca339bd585423,2024-02-23T09:15:21.867000
|
||||
CVE-2023-52072,0,0,1d3ce461c7777391c7f83d91e740b1ebc41a9b9c6ba2aac12cdeda55979ce207,2024-01-11T20:05:45.403000
|
||||
CVE-2023-52073,0,0,44eca5907bf748429307dd6a52fcacd5ad285cf13a8090b51741b3af5b94a19e,2024-01-11T20:05:37.137000
|
||||
@ -243917,10 +243917,10 @@ CVE-2024-21725,0,0,5e6534017e45269ab964c843fba95f205445e30933324620ccbba3f3f4e2e
|
||||
CVE-2024-21726,0,0,6323b2b43ac337f244a115fea0a0997a8ee4d7e666452b5dae48b4ac07f1f7fb,2024-02-29T13:49:29.390000
|
||||
CVE-2024-21727,0,0,4af573498420db9348e00aac06b95b56a5038edabffc25cb0f25ab9c01be1a45,2024-02-15T14:28:31.380000
|
||||
CVE-2024-21728,0,0,6d3de60c64db99ec16689d15b3a09c6273756d73ea66742792a8ee295b84ce4d,2024-02-16T13:38:00.047000
|
||||
CVE-2024-21729,0,1,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000
|
||||
CVE-2024-21729,0,0,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000
|
||||
CVE-2024-2173,0,0,cc4124960d2643aa2251e7a3c8790f6df41511bad9bea7473c2d4e9b36b2911e,2024-07-03T01:53:03.693000
|
||||
CVE-2024-21730,0,1,1b2a5305e4ab8d792a0cdaca2379657af358835cd0a20f361a179e55999cc955,2024-08-16T14:47:27.933000
|
||||
CVE-2024-21731,0,1,0bdbad6073a6f00bc29521c81bb3ba90d14042bc70946cce369f0b6d5d73421c,2024-08-16T14:54:49.230000
|
||||
CVE-2024-21730,0,0,1b2a5305e4ab8d792a0cdaca2379657af358835cd0a20f361a179e55999cc955,2024-08-16T14:47:27.933000
|
||||
CVE-2024-21731,0,0,0bdbad6073a6f00bc29521c81bb3ba90d14042bc70946cce369f0b6d5d73421c,2024-08-16T14:54:49.230000
|
||||
CVE-2024-21732,0,0,5b8477386d174238a16ab6890c874c5b9a2e295383724c8992520c310a411731,2024-01-08T18:51:23.740000
|
||||
CVE-2024-21733,0,0,5c1944b5f993b5404fdb05bb0e77d12a8bf708110b872f1231cf5e420e715391,2024-02-16T13:15:10.190000
|
||||
CVE-2024-21734,0,0,885365a84c85d383ea10609ce715ea65d1a8ab1acecb51a21fedb1fc4873fc73,2024-01-12T16:34:40.870000
|
||||
@ -243939,7 +243939,7 @@ CVE-2024-21746,0,0,71b367edf262d30b7091359190b87e54a7e9349e34c251cedb156f5314341
|
||||
CVE-2024-21747,0,0,cc2bc1e14d3097f2a1e3dc28d52ecd9537e1bd47ae59862aa7a5dd138ea1e45b,2024-01-11T18:45:06.960000
|
||||
CVE-2024-21748,0,0,2a197de0adbf993ed118e27e797a4f0c8754f47a7d945195f996e2582711721f,2024-07-17T19:59:28.060000
|
||||
CVE-2024-21749,0,0,5487855d4429da4fac08226224f1538028a7a5ac2df658cc224a0e240622cf41,2024-02-29T13:49:47.277000
|
||||
CVE-2024-2175,1,1,9e9e3edd6492c4dbac5ff0accd7cd503db38ed345fbfa9a1783a57a68a56f8a9,2024-08-16T15:15:27.940000
|
||||
CVE-2024-2175,0,0,9e9e3edd6492c4dbac5ff0accd7cd503db38ed345fbfa9a1783a57a68a56f8a9,2024-08-16T15:15:27.940000
|
||||
CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000
|
||||
CVE-2024-21751,0,0,55d06ade7b40f70a88f44c4672adccf43ead813dee575220c2752c77b1d36f34,2024-06-10T12:40:41.360000
|
||||
CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000
|
||||
@ -244544,7 +244544,7 @@ CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba7
|
||||
CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000
|
||||
CVE-2024-22532,0,0,de186662f33e74d83cd8fffe00aab46fcd2955cb2806c1da45608ae2427d3c0c,2024-08-01T13:46:58.680000
|
||||
CVE-2024-22533,0,0,85338afee49dae9d2d34419392208a0e08c059f930c68060a5bc4d947f64730e,2024-02-10T04:09:13.303000
|
||||
CVE-2024-22543,0,0,b394fea0f9ec82c032a72697191c5255a9224f67e82d2cec41e6415b42196cbc,2024-02-27T14:20:06.637000
|
||||
CVE-2024-22543,0,1,b1a889b0e18be55a9638cd371ddf76030836a5edd3b6465766a28cf814e1ba4e,2024-08-16T17:35:03.823000
|
||||
CVE-2024-22544,0,0,c83930b3fd617d56b4e76bf97e8edd2a7a4295e7011794060244a8c71ee5f812,2024-08-01T13:46:59.453000
|
||||
CVE-2024-22545,0,0,68df59d7f199c8b9a762129a9a26d5183a0bcd88eec159e4a975bd0c437f8e2d,2024-03-05T18:15:48.443000
|
||||
CVE-2024-22546,0,0,e9e7789c2178195f81c38b7f4473534160dfa78b46fb2352260cdce1bd7f6814,2024-07-03T01:47:18.977000
|
||||
@ -245296,7 +245296,7 @@ CVE-2024-2375,0,0,a058c80efe949762571e053df4cb958436e1818db9efb8af354b35f7ce7104
|
||||
CVE-2024-23750,0,0,5b7689a4bbe3979ddb3dbfc60b9bab1cc13d0a195ac1ecb4770e9c464c629b61,2024-01-29T16:51:14.573000
|
||||
CVE-2024-23751,0,0,9162dc4b42b5905d8dd88803aa2613495cbbe611df5d9d2ead982e210e469fa5,2024-01-29T15:06:44.003000
|
||||
CVE-2024-23752,0,0,b2bcc21873940c2a0980c29225225dbeb5e398b96bb8976a2b36657cd69cb30a,2024-01-29T19:27:17.040000
|
||||
CVE-2024-23755,0,0,1d0ab3a2302d7444b06dc76885babfa0cdbd41238356230e54918e18d91dff39,2024-03-25T01:51:01.223000
|
||||
CVE-2024-23755,0,1,d38be966ccbea9093e3f38cc4a316cab8e8cf5496a4c06474494fc58b9fd5172,2024-08-16T17:35:04.600000
|
||||
CVE-2024-23756,0,0,2bdfbaef90f9f936a849dec2c9c1d1a05a3f10092fc01318b2702eeb8348f878,2024-02-15T16:01:08.870000
|
||||
CVE-2024-23758,0,0,3ffe01e5849c29350b16e72f283a186df16bf63db40bd56bdf04a6fdd9681114,2024-02-22T19:07:37.840000
|
||||
CVE-2024-23759,0,0,7b8f90d14164aaef0f5274ab8cd0cd35c941b0f2a4c75bb44f448c7d8d1f721f,2024-02-15T04:49:02.133000
|
||||
@ -245812,7 +245812,7 @@ CVE-2024-2472,0,0,9c657ae60ef92e7052748340ce8fdcc97fb449e534be5cbcdbd4360a9f7fdd
|
||||
CVE-2024-24720,0,0,116148208b713005301f5cf40f7ed4d29a4a646b11c4e3748d94824457651517,2024-08-14T15:35:05.267000
|
||||
CVE-2024-24721,0,0,cc501af2f363293d6bbcb033e643fca22423d4b5f2a3dc57ffee4b6412c8c2b9,2024-08-12T18:35:31.143000
|
||||
CVE-2024-24722,0,0,5c00076d5903b9adf702f9584a80b15289fd6952952bdabe5514eebef63f696b,2024-02-20T19:50:53.960000
|
||||
CVE-2024-24724,0,0,49e36beb0292b27c4af21607f62c8098e243af86c10e87204060b3a2a9eb0caa,2024-04-03T12:38:04.840000
|
||||
CVE-2024-24724,0,1,987b03154d8c04503d355cf1ee5e3a5f82060d437b582c3cf8e7d7248a9afa9d,2024-08-16T16:35:03.010000
|
||||
CVE-2024-24725,0,0,fa4c4ce65e4991dcf18e22afc18c407373bea4c35493c8cf2afcfe5d0757cc18,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000
|
||||
CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000
|
||||
@ -246110,7 +246110,7 @@ CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f7
|
||||
CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000
|
||||
CVE-2024-25089,0,0,4d3ddaeeeaf0e005a5320fd57126d38836ae358b9586c6957758efb8e6b78742,2024-02-13T00:38:12.137000
|
||||
CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000
|
||||
CVE-2024-25090,0,0,fe4dfe05b7df4dade0fae9afde244a31ac4436c4195a84dec142976b30aaa959,2024-07-26T12:38:41.683000
|
||||
CVE-2024-25090,0,1,f85b3bcd033b385efb1c9f266ce72e41f2e2d9369cf294e95ea532fc1e35d52c,2024-08-16T17:56:31.230000
|
||||
CVE-2024-25091,0,0,d822656b63074e0c8fc140e02cdc2082434684ada7eeff085f5eee9f7616d66b,2024-08-05T19:35:03.780000
|
||||
CVE-2024-25092,0,0,93228461014d21e76377d62123a9b74976fcddddff96fb9097cb4fcb49528f7c,2024-06-10T02:52:08.267000
|
||||
CVE-2024-25093,0,0,b8e6c12d6bc03129058956c6365ec4ac1bf71d6b0585045592f329dee7756d25,2024-02-29T13:49:29.390000
|
||||
@ -246175,7 +246175,7 @@ CVE-2024-25155,0,0,1d7983859d61945142ef2e8872f422d7a225c4f14d7bf78ef2435c14d9e9f
|
||||
CVE-2024-25156,0,0,5644f61e62691ed9b2ea36cf2dd30ea49f643127034e87e186f5419ac1deb692,2024-03-14T14:21:20.217000
|
||||
CVE-2024-25157,0,0,cd729b57eba763a1404c06e161ad68966ff36563106bac56cde20ec280ac8b95,2024-08-14T17:49:14.177000
|
||||
CVE-2024-2516,0,0,14566cb1daab665f74119ef85235fd35fa3b84dccd777ba113a66fd32edf19a9,2024-05-17T02:38:16.350000
|
||||
CVE-2024-25164,0,0,0c2d2e02425cd8795a424c928e888033fabe9adbf3e44624e7d86333837b1314,2024-03-05T13:41:01.900000
|
||||
CVE-2024-25164,0,1,759bf404d5770b9163c704f082cc395dd906a306da057b7d64ff4a44c31ee872,2024-08-16T16:35:03.903000
|
||||
CVE-2024-25165,0,0,b60ae9c4b2953dad1606ed76f79140fa695e9553000ce7a315e2caf4198c7634,2024-02-15T06:23:39.303000
|
||||
CVE-2024-25166,0,0,28ed357e8ad3f41e96ed47a3cbc3e0eb532501ab6da8d8dda90dddb9fc6831df,2024-02-27T14:20:06.637000
|
||||
CVE-2024-25167,0,0,be72ecca7313bea8f298d89db24b35310bc283e623855cf81605c9b70521a6b3,2024-08-05T18:35:07.617000
|
||||
@ -246239,7 +246239,7 @@ CVE-2024-25269,0,0,cecb054aeb252fd3635e4b5b6f2ee9da6b9765bdfc4680265db28bca7071a
|
||||
CVE-2024-2527,0,0,3595089dfbf7c838cd10907d9475b6f382b61f5d4f125e4851b3ab5c70cb2f91,2024-05-17T02:38:17.313000
|
||||
CVE-2024-25274,0,0,08bbd944a87379073203caa03548429c52cb88f2e3324503fdb87764ae5cf736,2024-02-20T19:50:53.960000
|
||||
CVE-2024-2528,0,0,f3ce2742845e3c962e76fc1fc8b85fe99361dde771fc18d0886792da646965aa,2024-05-17T02:38:17.403000
|
||||
CVE-2024-25288,0,0,ec9a8f6e97e7741142de4cb4c32dde31396457ba8d55d4f5745270d50453dfad,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25288,0,1,5073c2c356c31f0a28f991dd78ab646fa56ee0bfa67ba129f7aa2ad1aa6c7f01,2024-08-16T17:35:05.360000
|
||||
CVE-2024-2529,0,0,3dcfb18c753ec485cf6ba2b140882ea30783b45e3ebf36f2c06c6d0afef8cf3b,2024-05-17T02:38:17.490000
|
||||
CVE-2024-25290,0,0,1ec48026c39efee418c42c9ca18840885fee8443e93218944bef4bd724ec09b7,2024-08-01T13:47:39.797000
|
||||
CVE-2024-25291,0,0,3fb4fe8a5c11e3a034eb8eee615e5ca2d89bb2fc5feb0b891e21815184a51204,2024-08-01T13:47:40.580000
|
||||
@ -246291,7 +246291,7 @@ CVE-2024-25376,0,0,6a816dff6e980af2ce9830b28c1e10df0bab9ab3e8e9a695c06849f72c23c
|
||||
CVE-2024-2538,0,0,9040c900b991e8f6fd3afa80f5869e2f9dbcc85520bbfcec371534f7a5ee52c0,2024-03-20T13:00:16.367000
|
||||
CVE-2024-25381,0,0,a7f2494426dcfd03638803eefb4663189386d44e34e1d8cefdca6022c601b371,2024-02-22T19:07:27.197000
|
||||
CVE-2024-25385,0,0,4e6ac49ed38b214c0cadcf5b7d24f80edcf812117f3b947eea7b8836b8926a85,2024-02-23T02:42:54.547000
|
||||
CVE-2024-25386,0,0,8150946dfcd9aeb8580150c5b420a3c626648a2db1c6d529b93950e8e3ec732d,2024-03-13T04:15:07.960000
|
||||
CVE-2024-25386,0,1,635388f91f9efca73d197efb28e6d958488f53679752b3c1d9d9ef7abd682a1f,2024-08-16T17:35:06.100000
|
||||
CVE-2024-25388,0,0,a4fd2e7348bdb39a0284b3ab07f14681f4dbe00912c0f5a31c9cd1eaaaf64a39,2024-08-01T13:47:42.200000
|
||||
CVE-2024-25389,0,0,300e228567e32929b074f159e6b0c3d280feae8278a6996691035995a5db28e1,2024-07-03T01:48:46.323000
|
||||
CVE-2024-2539,0,0,e61b24f26184c749ddf56008443c202d469d18246466f0526477f147012e59d6,2024-04-10T13:23:38.787000
|
||||
@ -246305,7 +246305,7 @@ CVE-2024-25398,0,0,d9ed4e2578e708fde238a2333f8c06b711d373daa3ef2c157ba58fb7d13ba
|
||||
CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000
|
||||
CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000
|
||||
CVE-2024-25407,0,0,acf0dedeaaf5cb4ed513286f293369fa64a4aa24615bdc4521396e5298313ce4,2024-02-13T14:01:40.577000
|
||||
CVE-2024-25410,0,0,da2543318fbb8275cd16936f8a754d30f1d50739901afbcb1ba92647c65cf519,2024-04-03T21:15:31.220000
|
||||
CVE-2024-25410,0,1,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000
|
||||
CVE-2024-25413,0,0,e60164141d6ef6aae483b347bcb438f10cf90b0fdc503439bf774c3a45e4d7f4,2024-08-06T16:35:06.130000
|
||||
CVE-2024-25414,0,0,e37faede54af522703a4e537065f1d12f9e2e079cddb040df250a6ab47704e37,2024-02-16T13:37:51.433000
|
||||
CVE-2024-25415,0,0,669eb2c339e3bc5aae821eb5536f61ec9a8ace328fdd7918c4b65de35957067d,2024-06-07T15:15:49.860000
|
||||
@ -247740,7 +247740,7 @@ CVE-2024-27179,0,0,85f9bd060c25072746b1e3bfaefabaa31cf907d9fa1300683bdfc57bd5ce2
|
||||
CVE-2024-2718,0,0,e867b4db92934c4ec2b3fac03d5022cd051733038b4330c7ca5ad40b77757de0,2024-05-17T02:38:27.407000
|
||||
CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431d16,2024-07-04T05:15:15.450000
|
||||
CVE-2024-27181,0,0,21e26148840b13fc3c6737fbae62d8da3122fe005206d34756c4a69e36306e68,2024-08-02T14:35:10.763000
|
||||
CVE-2024-27182,0,0,ce412bcff2b9c7110a2b759fc053bec2d3578e8e3e218da80159f8ef3b0ffed3,2024-08-02T12:59:43.990000
|
||||
CVE-2024-27182,0,1,3745db63e259cb2e1fbe54f15ae0e0f8afab0bc93a91d91e5de7d932d84971e0,2024-08-16T16:55:10.923000
|
||||
CVE-2024-27183,0,0,73875a696a64d9ddbd95175557e5ab869a14de50e9906db42e11184efe06e929,2024-07-12T17:13:30.700000
|
||||
CVE-2024-27188,0,0,def19a2058b71e528abca5da80971f2d008d715cb853d3ea2c84141e42391a01,2024-03-27T12:29:30.307000
|
||||
CVE-2024-27189,0,0,994d0c9d134383fa54dc85b5fd282a40acff54c3ff303ac4e31ff6be7de68f0c,2024-03-15T16:26:49.320000
|
||||
@ -248007,7 +248007,7 @@ CVE-2024-2748,0,0,a5981f926316e727f1bb9455ec311db801fabdd6fc8350d94a1fb8a2edb4a8
|
||||
CVE-2024-27488,0,0,6be2a43b71b53f166dfab0e5a48f18012ba860e052bdc0fdded0a51aae424787,2024-04-08T18:48:40.217000
|
||||
CVE-2024-27489,0,0,fae6db07f37367cac095792be5d6f831e097964d9738fbc71b73f8a7056182d5,2024-08-01T13:48:29.187000
|
||||
CVE-2024-2749,0,0,1d41dd2f9a8ec812d743eb2503d3459b40e5b74ef406549f3f22535f8f1ae124,2024-07-03T01:53:31.040000
|
||||
CVE-2024-27497,0,0,0a259a174ab84ccb90a6c7661916522a49292b77c0e76cb95a176d9f4412b99e,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27497,0,1,2405900a7ea943326a9606fe19fb79f48e8cc6663a4627c665d5498ade7bedff,2024-08-16T16:35:04.793000
|
||||
CVE-2024-27499,0,0,b83d178e9b7191162c5685f1e47e2fd1e5529f49e76aee3b7cd72833d352a7e5,2024-08-01T13:48:29.880000
|
||||
CVE-2024-2750,0,0,37727f710079f44007aa4b3f740cc1e5c5b0086f375c812c16d7e3bf2db19280,2024-05-02T18:00:37.360000
|
||||
CVE-2024-27507,0,0,553b05ae6ffd373dfbf2aa3222522f3386658a0a78887ec1a5a87ad22402f8cf,2024-03-23T03:15:11.443000
|
||||
@ -248084,7 +248084,7 @@ CVE-2024-27674,0,0,21e90956bc1e5ed96e828710d1d2cfc02b0d7dccfda52db8ef3f15b53b564
|
||||
CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6afb,2024-05-17T02:38:29.203000
|
||||
CVE-2024-27680,0,0,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000
|
||||
CVE-2024-27683,0,0,907eeb18dbdd6bbefaa7b9be484cc98a16f164c9a600e2bae77550cea0d2db2c,2024-08-14T19:35:21.653000
|
||||
CVE-2024-27684,0,0,7ad8756d24f2571ad9256e43ef045290d6acdd43e24c12c1e3cfdd0dce330fdc,2024-03-04T15:35:25.673000
|
||||
CVE-2024-27684,0,1,b102c05080f733920be192face7e38ed6a74f9c73aceec04d2c70a07af3f6781,2024-08-16T16:35:05.530000
|
||||
CVE-2024-27689,0,0,2f9863a2ed79e44545ccb0840f57d72c6748eaf9261e1b5cf11563ef5b1b6f39,2024-08-08T21:35:06.920000
|
||||
CVE-2024-2769,0,0,4ce409110b7519da5af6e8ebe0cc3e53d83319a867f728e76ce04b1f4c62c385,2024-05-17T02:38:29.300000
|
||||
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
|
||||
@ -248110,13 +248110,13 @@ CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c7
|
||||
CVE-2024-27728,0,0,92c2f4f300ca741f2c37bce04178555a76577e155666dd983f312360347cacd1,2024-08-15T19:15:18.477000
|
||||
CVE-2024-27729,0,0,c948204789378d657f2b41d6c6761ce5ea794f998ddb93f2ebf81a9fb64e12c5,2024-08-15T19:15:18.573000
|
||||
CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a733,2024-05-17T02:38:29.487000
|
||||
CVE-2024-27730,0,0,32a18e903d98aa035fd1fe5fcdbab3b67106449b10089c696c32a889a14b214f,2024-08-15T19:15:18.663000
|
||||
CVE-2024-27730,0,1,12847aa86fe1ac70d87265d0b4758314d0c5ea3a5710aebdf2b0c7adafade873,2024-08-16T16:35:06.563000
|
||||
CVE-2024-27731,0,0,0e54bb9a495ca00aca3255fbd7013d472940c8369148ec88372e9e447c0ebdfe,2024-08-15T19:15:18.770000
|
||||
CVE-2024-27733,0,0,f76bf300f1cfa0de74d17f1145877f7fe4a3d69ea3dede66e09a54e795dd7256,2024-03-08T14:02:57.420000
|
||||
CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663b2a,2024-03-01T22:22:25.913000
|
||||
CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000
|
||||
CVE-2024-27743,0,0,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000
|
||||
CVE-2024-27744,0,0,4e757ce0fe3647ea6f05f08011979a37be799ec10e3981611cdfea238e8d5ca8,2024-03-13T07:15:36.410000
|
||||
CVE-2024-27744,0,1,56bcff35b4b37cb35913a0cb22dd08c69cc0aaf691322c9f45e718a27d4a69f3,2024-08-16T16:35:07.307000
|
||||
CVE-2024-27746,0,0,25c5d1637666144aa24b9e78e08712d087d46315d29be0eb97ff37efb1a8968b,2024-03-13T07:15:36.470000
|
||||
CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000
|
||||
CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000
|
||||
@ -248139,8 +248139,8 @@ CVE-2024-27774,0,0,9cbdaf77f4a8542149d6b11f5bee28067f7edd716cc6732ed60e063fe1f70
|
||||
CVE-2024-27775,0,0,456fca18fe71533779d986efe95c0ae90c69ca0c555f033d6cc6ced4fa8e3387,2024-03-28T16:07:30.893000
|
||||
CVE-2024-27776,0,0,c1f24ea22b57cf55cbaee5256ab64f8b8e0305819b509c8db14f64fd5ba1ef96,2024-06-03T14:46:24.250000
|
||||
CVE-2024-2778,0,0,e878f2e24cf14ae545b32e39b137fabc7b5a57fc71abbcd24b764cc029a658e7,2024-05-17T02:38:29.967000
|
||||
CVE-2024-27782,0,1,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000
|
||||
CVE-2024-27783,0,1,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000
|
||||
CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb31c,2024-08-16T14:45:37.017000
|
||||
CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000
|
||||
CVE-2024-27784,0,0,7a9199f6100de9f987e85bb4b46ccc517d63d40c8a5a9b633fa6d524c9d2d6a0,2024-07-09T18:18:38.713000
|
||||
CVE-2024-27785,0,0,a9323d0de61da76c0e0b4ae0888d0a2f5fae6fc263c21d492f4567bd7dd7a351,2024-07-09T18:18:38.713000
|
||||
CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000
|
||||
@ -248224,7 +248224,7 @@ CVE-2024-27873,0,0,7729d99677f493b1646015ca9c6f3b42e2f48da1b219729ff59f6f38e1d66
|
||||
CVE-2024-27877,0,0,f267e4e9b2c15ea5212cd96d8b790eca5b3bdc1ce3ab48286d7c0d66eea29c1a,2024-08-09T17:02:19.750000
|
||||
CVE-2024-27878,0,0,0c018d0060dfa2d1e866f6f95570e39bac870f1d62334bf4a576f22fb4e08910,2024-08-01T14:35:06.007000
|
||||
CVE-2024-2788,0,0,fae17eccf9cd9e59e0540a9ad532e11d3f58404c6459f605cc04b4c55f908408,2024-04-10T13:23:38.787000
|
||||
CVE-2024-27881,0,0,6afd9f87fafeb826eaa3a6402ee6d0351c4562f692aa76e6b34d561c97200b1f,2024-07-30T13:32:45.943000
|
||||
CVE-2024-27881,0,1,ecd3b41ffcf84a1b769c2ce9b805a207566f7e84b913888f092b35189f2e87e8,2024-08-16T17:37:25.757000
|
||||
CVE-2024-27882,0,0,5f6b8c776d129a743847181e673fbc08fa4525f477938bb4131e477f4d230687,2024-07-30T13:32:45.943000
|
||||
CVE-2024-27883,0,0,a0ddd934b377fc709fb4c9c5999258197501ae8a4c900c5f15b38ef425986e01,2024-07-30T13:32:45.943000
|
||||
CVE-2024-27884,0,0,c8b7a89e085d35ad0c448e616c336654f520047f390f2d4a8df19df20362a2a2,2024-07-30T13:32:45.943000
|
||||
@ -248621,7 +248621,7 @@ CVE-2024-28404,0,0,de4bb0761b47ec48a2f8f7ba9fcf3d34a35356ef117606bd87d22259d5f91
|
||||
CVE-2024-28405,0,0,2c15de9876ba9bcb0c88245dcbd415aed2fe212a7903bb0c75f14ccc80f65f8d,2024-08-01T16:35:07.140000
|
||||
CVE-2024-2841,0,0,2c2b4741d1454e52d6849cf0d7e19bb6be42afd910b9080bb0f288684da8e29a,2024-03-29T12:45:02.937000
|
||||
CVE-2024-28417,0,0,f78ede20fcde24d3d7d8bc3dab1ce82d14b3041f2644162129c2ad754c19b6a4,2024-07-03T01:51:41.033000
|
||||
CVE-2024-28418,0,0,a547e7c2904ffc7c315aa13518177bc1d84929cd46462a0678162ae7db3fce1d,2024-03-14T14:21:20.217000
|
||||
CVE-2024-28418,0,1,2a4e7f72113758cf676cf86e709d4c2254271c4bc05c9c8adb6c432f26d0d67c,2024-08-16T16:35:08.140000
|
||||
CVE-2024-2842,0,0,fb8969f6b6806427a8ba5bfc6ea26b5b1997081ed131de3b61a4fe60370dfde0,2024-03-29T12:45:02.937000
|
||||
CVE-2024-28421,0,0,1239831c00e8490a8b37a2f0168365916badc596709bff57ac81168b6c37e716,2024-08-05T19:35:05.787000
|
||||
CVE-2024-28423,0,0,58a1ef7d35f092e50b1e07fd4013c2973ded6a4e76c11332d68829fd34d7c92f,2024-03-14T20:11:36.180000
|
||||
@ -248923,7 +248923,7 @@ CVE-2024-28960,0,0,52abb52a9d4e5bfc8a4202f8cac850702b2036add0599181377d1c9da970c
|
||||
CVE-2024-28961,0,0,c8a249a7c99721db71986c46abf04003bb50c28611dbaf91b07993347a57a453,2024-04-29T12:42:03.667000
|
||||
CVE-2024-28962,0,0,a96effbf83c42c6de037f267cb741b7ad8c0c1cba3ce445c3f138895f41093ff,2024-08-06T16:30:24.547000
|
||||
CVE-2024-28963,0,0,46ff77abc65aaef52e66733c3c1ae0b4da0085f9d8df9e4bfbf89b9b93df3b64,2024-04-24T13:39:42.883000
|
||||
CVE-2024-28964,0,0,eacce0fb2e076889bc70a58cf7097d65229ee0f89cf37af65654afa31a5f76a3,2024-06-13T18:36:09.010000
|
||||
CVE-2024-28964,0,1,668c3eb1130fe0883336d2377db58f6ba4d918c33aa5ccfcfc554147c62cb6c8,2024-08-16T16:44:09.413000
|
||||
CVE-2024-28965,0,0,864e7f335ec953da5c2c7e907f469034e931a4a4637e4de43f2a96367ccd9cf1,2024-08-06T15:30:52.433000
|
||||
CVE-2024-28966,0,0,6430710ce538aed33833d6523d76ed4e05ecdf436ddf0d76f353fb0ef57acee9,2024-08-06T15:30:39.067000
|
||||
CVE-2024-28967,0,0,1648dd50c3f81be97a86f7abed79bf1b0d6da23e4a54c3c444650653354399fb,2024-08-06T15:30:14.820000
|
||||
@ -248943,7 +248943,7 @@ CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f3
|
||||
CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808f7e,2024-06-27T12:47:19.847000
|
||||
CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000
|
||||
CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000
|
||||
CVE-2024-28986,0,1,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
|
||||
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
|
||||
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
|
||||
CVE-2024-28992,0,0,696c70c13cdfd39478c05c8c040491fa3a08d2263d68b357789c3f03fee2f204,2024-07-18T12:28:43.707000
|
||||
CVE-2024-28993,0,0,929415671d938543e4980e176019e6c6553f30e59f81cf3d32505fa605110cfe,2024-07-18T12:28:43.707000
|
||||
@ -249097,7 +249097,7 @@ CVE-2024-29152,0,0,6494eb520227446d6d245c5a4d673a99692904bc67e1a2221cdb6494798ef
|
||||
CVE-2024-29153,0,0,2c87e530f91e7774053380e11e49b72f056e4f91a33688cb37ee6834272eeb27,2024-07-11T15:05:33.247000
|
||||
CVE-2024-29154,0,0,c24b7a65a861ab0fbc7efb2f7b0dd4677efe572e0b22b8bb6ebb0d687fe6c77b,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,595d020a34dc3c63329ef492697be54cca90adb54515cbfada40f26153450f3f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29157,0,0,686a5563366ae5e63c744308ef6f77aa3c96e95949cc031d68a4d1990f03c411,2024-05-14T16:13:02.773000
|
||||
CVE-2024-29157,0,1,3110ca8118b2c924b316fb8b417f719cf20fff49178f5804090215ed711693f7,2024-08-16T16:35:08.877000
|
||||
CVE-2024-29158,0,0,233df1a8f6bd60efc553c6b930d261c8562f8385a13b7e3a3998e2d044729790,2024-07-03T01:52:08.880000
|
||||
CVE-2024-29159,0,0,9a119fb563b8f74a63294a27b73a89cf8c5215b9d36b48948639d3bb01780b26,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2916,0,0,62a74d7777ba9b78e45dbd8edaf3903a6d88704541ec72ec8eada5e4f7d122b9,2024-05-17T02:38:37.200000
|
||||
@ -249234,7 +249234,7 @@ CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0
|
||||
CVE-2024-29402,0,0,b3b67ac2f5a71f897648f0dbc8697340f6879726be4aa06cba11c0478007588d,2024-04-17T12:48:07.510000
|
||||
CVE-2024-2941,0,0,1d46f1daca1d9b41abf5b871e57cb1a154c8989de86923637267a01c87a2e537,2024-06-26T19:15:13.107000
|
||||
CVE-2024-29413,0,0,493f53d4b43110a7ef6c57bebf5ca6e237d29210366d7552d76297fd422d6175,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29415,0,1,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000
|
||||
CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000
|
||||
CVE-2024-29417,0,0,23124bcb1400c4464d6cdb85518e542571ce92d23b1dd27acde255160c2981ed,2024-07-03T01:52:26.833000
|
||||
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
|
||||
CVE-2024-2942,0,0,df11b58be940727b4679e167fb2c13b9eb7e603ddfc660919e5e8d815e396a72,2024-05-17T02:38:38.500000
|
||||
@ -249314,7 +249314,7 @@ CVE-2024-29661,0,0,88ef154f0ac81ededf103463c2b4906b746fd4986090980f76c4c2bc2515e
|
||||
CVE-2024-29666,0,0,a67e8622ed74011ff249c5e68e53374a60af6cb3676ee7edca6fb573c3e202e4,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29667,0,0,4118e10082e95e28b5db3ce405eaacc62f74bef151ef94158b87df6d64494dc8,2024-08-01T13:49:33.747000
|
||||
CVE-2024-2967,0,0,c152c043e13b4423e324e9742145ebebea680255fd320b84aa6fd1c484253799,2024-05-02T18:00:37.360000
|
||||
CVE-2024-29672,0,1,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000
|
||||
CVE-2024-29672,0,0,21274e0a8172ae852f68ce065f3465878b739d5891b6aa07cb248440814e94cf,2024-08-16T15:35:04.670000
|
||||
CVE-2024-2968,0,0,45b6ebbb9d99cd3c2205a629e13ac67f3a4bda14dbab27666ba50c91e62a9257,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29684,0,0,b36bf2e8a8667d8059487f589a89143767a320a5d181a5559cd241abd56a073c,2024-08-06T15:35:12.520000
|
||||
CVE-2024-29686,0,0,24415b8b4ad1fce01014ce0adb73b5758ac1af7cb6661af128dfb5e4207dea3b,2024-08-02T01:16:00.577000
|
||||
@ -250605,7 +250605,7 @@ CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520
|
||||
CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000
|
||||
CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000
|
||||
CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000
|
||||
CVE-2024-31333,0,1,dff3c0848f2c560893a0af75ea057ea93ab7ac2846c297e0e5fb7e6350eba960,2024-08-16T15:35:05.893000
|
||||
CVE-2024-31333,0,0,dff3c0848f2c560893a0af75ea057ea93ab7ac2846c297e0e5fb7e6350eba960,2024-08-16T15:35:05.893000
|
||||
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
|
||||
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
|
||||
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
|
||||
@ -251217,7 +251217,7 @@ CVE-2024-32312,0,0,fb39c38437b7e403d4bca9d564b66acec8787221ff0788e5fad32029133a3
|
||||
CVE-2024-32313,0,0,b116247e5c00d5184493232455f468609fa393d89b579971585285365b8441db,2024-07-03T01:56:07.130000
|
||||
CVE-2024-32314,0,0,ef5dc51f0fe13e2d54624ad184f99cb7967409751beb976a4c726c8f3cfcb960,2024-07-03T01:56:07.890000
|
||||
CVE-2024-32315,0,0,ca838fbb773cbae3bd9255050bb868bf1fd48237f3ce87bc70b24f413e3dd8cb,2024-07-03T01:56:08.650000
|
||||
CVE-2024-32316,0,0,ffea206eb35e029317458be59cb44b8fa7a1becdd91322b99748836c3f7db1d0,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32316,0,1,b7e4f766b6ae8b9ee3202c8692a9daa8fa4256b563e548adca488753bcf1bbfd,2024-08-16T16:35:09.793000
|
||||
CVE-2024-32317,0,0,650aa34fc080388d8f2bd6a4a88b6775736a0002394db3f799d9283eb4ac353f,2024-08-08T21:35:13.350000
|
||||
CVE-2024-32318,0,0,ecff3438c4feb6e3e34e68eac1bc15ad0ca3b72da87c9841a9aa73abbe7e81f6,2024-07-03T01:56:09.407000
|
||||
CVE-2024-3232,0,0,c59a906ca6c3b26e020d4b33cc77d57f43a342f5b3c4ac255f8439d838cfaba1,2024-07-16T18:00:02.110000
|
||||
@ -251452,7 +251452,7 @@ CVE-2024-32604,0,0,476210d0ebaa2034f48a17e0b0fe33262ad582a7b7ecd7d8aa31989dbd17e
|
||||
CVE-2024-32605,0,0,de9c05a78c9964678d3bb18ce0c8aa64d771273179cdd76262e7bc3689e14034,2024-07-03T01:56:44.803000
|
||||
CVE-2024-32606,0,0,a3bb52a9f7db8524bc0f64398e8a4bbdbe62f2aa330bc775d2b1822f7f4c3268,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32607,0,0,01051eb3e082c3438d23481476f9a985d555e9a0f80b0e1feb0cf3db1ee2a690,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32609,0,0,e9c7de90afd0cbd1681b9959652a6da4e9f88c281b35d47dfe050d5fb7f03f3f,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32609,0,1,779fda0ffa1999f70549dd5bc26454852aa5b69a0ba347533f9e01b4e592fe2e,2024-08-16T16:35:10.610000
|
||||
CVE-2024-3261,0,0,5a564cf24105216fca1fdc9c03d186979decb6a34306dfcf795295396bd14e90,2024-08-01T13:56:29.727000
|
||||
CVE-2024-32610,0,0,5100dd5cbf5b46cbb7cc886ebc012d3ebb66cde81cb5143cf02dc17bf6f8b899,2024-05-14T16:12:23.490000
|
||||
CVE-2024-32611,0,0,2310031ef5af96912f44f0f7e5319f735ea5afde954f456c8fb33e30d583bb91,2024-05-14T16:12:23.490000
|
||||
@ -251683,7 +251683,7 @@ CVE-2024-32857,0,0,cd2bae36db5519723b2404409c5a2285b1e5b4332d74f6586db2f526ae196
|
||||
CVE-2024-32858,0,0,bea038833c00e1cf5cd6721712641f32c5f903e89a9e6f9359da9d5e4bbbe75c,2024-06-13T18:35:19.777000
|
||||
CVE-2024-32859,0,0,03cfa9128131e4e31b6c7a7857fb4f0bbd43d768e740100a365b65d50eaff363,2024-06-13T18:35:19.777000
|
||||
CVE-2024-3286,0,0,f064673537255c8b5419193db861ab38d2aa66df0f5b7dffd2eb436b55f3980e,2024-05-17T18:36:31.297000
|
||||
CVE-2024-32860,0,0,f7dffb4e6c88e91eb3b0e840948c90a54884d2d7e46d06b53c404dced4e4a3d1,2024-06-13T18:35:19.777000
|
||||
CVE-2024-32860,0,1,140d176974a544a70b011e4a7385dddf6177887685faa32d97074b7714e98c8d,2024-08-16T16:46:36.203000
|
||||
CVE-2024-32861,0,0,4690ae217a4b596d64e69c4e91eed7a814ce164eeb5aed983f8d559fa108dfae,2024-08-02T03:15:20.680000
|
||||
CVE-2024-32862,0,0,2aef539538fe2995a5ca2aea866b8c37c4f13ea43ec8d03f4cb015e7c649b943,2024-08-09T18:55:44.473000
|
||||
CVE-2024-32863,0,0,6824730357c9032b068186d64db79b75e84cc03aca375bd1b03f4bed7db730e0,2024-08-09T18:47:45.963000
|
||||
@ -251743,7 +251743,7 @@ CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c
|
||||
CVE-2024-32915,0,0,ce3c0f63e7c4b15b4980a52ade118f9c0799ed8303c4569ce9e259a0da82edf0,2024-06-17T12:43:31.090000
|
||||
CVE-2024-32916,0,0,b886661caf70d7fd3c261e90c0f590c6eca5af4ee25ade8b0972d2baebb2ff9c,2024-06-17T12:43:31.090000
|
||||
CVE-2024-32917,0,0,6d583d8ab79c5333a5d03cc2ab6bba8eb02ee95c890cd04661d7dbc4855b1773,2024-08-15T16:35:09.653000
|
||||
CVE-2024-32918,0,0,2a2c8a8c7d4b363845694cbf190176d55749936bbf41bcb406340187abded385,2024-06-17T12:43:31.090000
|
||||
CVE-2024-32918,0,1,af111f037945614b977ab3fde7f96a13d2defad259d3c610a939cb822dc9c206,2024-08-16T17:49:01.547000
|
||||
CVE-2024-32919,0,0,f0aa26802459bcc1e57c74adfaef7d72c48e702e9fd1db0d49dae70c6bb3b2a9,2024-08-01T13:51:40.153000
|
||||
CVE-2024-3292,0,0,07318f8f2185b7ffadc020ce54f4218255ee206d16b74c44d805183e4ce99eaf,2024-05-17T18:35:35.070000
|
||||
CVE-2024-32920,0,0,884af5f47808b4ceffd2a4bd9b80204f75cce16bd0848479c6a369a24d34e09f,2024-06-17T12:43:31.090000
|
||||
@ -251890,7 +251890,7 @@ CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba
|
||||
CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000
|
||||
CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000
|
||||
CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000
|
||||
CVE-2024-33212,0,0,9a12458adc56efb8a68240e2fde6c0ad53446d170f1d3cd3bc653023748972de,2024-04-24T13:39:42.883000
|
||||
CVE-2024-33212,0,1,e1465636a9a0085dbcb931f6bf0bf00f21c6133d537bb14ffddf0238c4968d35,2024-08-16T16:35:11.323000
|
||||
CVE-2024-33213,0,0,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000
|
||||
CVE-2024-33214,0,0,8e181eaf2c411bd8942ecfd3d2eed2d851824edcd9b22698bc6806bfcacc1394,2024-07-03T01:57:37.013000
|
||||
CVE-2024-33215,0,0,f9635f87bc059511c8393decbd9afdfc8c1adc67d76d6bf1ee0f441704979663,2024-07-03T01:57:37.763000
|
||||
@ -252880,7 +252880,7 @@ CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45
|
||||
CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000
|
||||
CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000
|
||||
CVE-2024-34685,0,0,588dc8fca74d544e911ad8585a3fe8a4026086ccc3b45cf5d371e8a153609a7e,2024-07-09T18:19:14.047000
|
||||
CVE-2024-34686,0,0,9a46529afe2602396741c77c95009142538ded4dd5a0a610b2bc7ac147d05880,2024-06-11T13:54:12.057000
|
||||
CVE-2024-34686,0,1,e9bb1b88f368d1635fab463778c0099fa75235c21c0d77c253e89ea0001f99e2,2024-08-16T17:54:46.250000
|
||||
CVE-2024-34687,0,0,2d1fb3e427c306d9f3a4e574ef26ad04ac3746abee3e170bed2385765a3ef230,2024-05-14T19:17:55.627000
|
||||
CVE-2024-34688,0,0,f7195c0aa4b21b145d71d8ca8f2dd3d8f80451302ff7a5fec7e22b7dba8274ce,2024-08-09T19:45:52.623000
|
||||
CVE-2024-34689,0,0,24635e46ef31bb11483f26da60a02a929940d00bd29acd39e88acae29470e314,2024-07-09T18:19:14.047000
|
||||
@ -252922,15 +252922,15 @@ CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6
|
||||
CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000
|
||||
CVE-2024-34727,0,0,d3a2c747ee927f1291c35785807c6dbb5ec4b02ae6150a400652401339eb68d8,2024-08-15T22:15:06.190000
|
||||
CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34731,0,1,db99553d52ef10862db59395def4b447bf82c534bc82ff690124fb7e9aeaf33e,2024-08-16T15:35:07.050000
|
||||
CVE-2024-34734,0,1,2401da04401bc478efc817cf70bc2539da268544cddb84ea1022fb7b735e1a9a,2024-08-16T15:35:08.043000
|
||||
CVE-2024-34731,0,0,db99553d52ef10862db59395def4b447bf82c534bc82ff690124fb7e9aeaf33e,2024-08-16T15:35:07.050000
|
||||
CVE-2024-34734,0,0,2401da04401bc478efc817cf70bc2539da268544cddb84ea1022fb7b735e1a9a,2024-08-16T15:35:08.043000
|
||||
CVE-2024-34736,0,0,e31a789529c464401dd83172b804c99ebe04c32cc188ce2e95f92b9abe1bc6ea,2024-08-15T22:15:06.400000
|
||||
CVE-2024-34737,0,1,47d73555cd102e0f18e45ab95ac3a6e267c7cd75e08fe880be1adf2bf0c8e2dd,2024-08-16T15:35:09.367000
|
||||
CVE-2024-34738,0,1,9bffb660d4578c23873bea39f77d81a9f59f5b4d9ddbe82ebb52e5c5dcb4a003,2024-08-16T15:35:09.537000
|
||||
CVE-2024-34739,0,1,29b4a468c9ec4e299c008f2fd536080f64baded03c66ae4ec0774f333537b18a,2024-08-16T15:35:09.703000
|
||||
CVE-2024-34737,0,0,47d73555cd102e0f18e45ab95ac3a6e267c7cd75e08fe880be1adf2bf0c8e2dd,2024-08-16T15:35:09.367000
|
||||
CVE-2024-34738,0,0,9bffb660d4578c23873bea39f77d81a9f59f5b4d9ddbe82ebb52e5c5dcb4a003,2024-08-16T15:35:09.537000
|
||||
CVE-2024-34739,0,0,29b4a468c9ec4e299c008f2fd536080f64baded03c66ae4ec0774f333537b18a,2024-08-16T15:35:09.703000
|
||||
CVE-2024-3474,0,0,f8fe69ded09f8f3335cb0a291c0ff93be246183a89b6f2a9db60adabf1ff9a0d,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34740,0,1,7e6b7caee11d6bb2f72419f850600f936ccab908481703a9ea744b4d892dfa36,2024-08-16T14:35:02.640000
|
||||
CVE-2024-34741,0,0,ffc119c2b062b459351b84600fe5fda211e601923a32345a664710007a08e353,2024-08-15T22:15:06.820000
|
||||
CVE-2024-34740,0,0,7e6b7caee11d6bb2f72419f850600f936ccab908481703a9ea744b4d892dfa36,2024-08-16T14:35:02.640000
|
||||
CVE-2024-34741,0,1,9743d0fcf2b344299b6d8e57c3e5c047679ef45dcdbcc16f464446bb088cce71,2024-08-16T16:35:12.133000
|
||||
CVE-2024-34742,0,0,810e6764d5ddb3d52b814c091bfdc919e6fb1c2ff52eaed58ccd0c8bd96c8188,2024-08-15T22:15:06.890000
|
||||
CVE-2024-34743,0,0,e813f78a1c3c1f053825d2df9fc7d52e06e3c3fcd645217e4ada409f53307702,2024-08-15T22:15:06.957000
|
||||
CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000
|
||||
@ -254275,7 +254275,7 @@ CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa79
|
||||
CVE-2024-36811,0,0,f90db255bac241fb3eb4c4274fa7aa4f43fe1ecaa498e979225312b15e44df61,2024-06-07T19:24:09.243000
|
||||
CVE-2024-36819,0,0,b06c755f900c06f50434f89b91de559393300344dda01bbc662266b5fc611e52,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3682,0,0,aebee2feda89d709e11e9bec3e1c17ca0ae10ff39719e7f62be10e1e27b06dc2,2024-04-26T12:58:17.720000
|
||||
CVE-2024-36821,0,0,a101d59bf6e24c907bc18edaa02c1eaea1af6aad6d551ff1aa91ecf54c6663ec,2024-08-01T13:53:17.693000
|
||||
CVE-2024-36821,0,1,4048b5245e036c49d5dbdedad8d1915f86e0e0022083fd298392f4047a036134,2024-08-16T16:33:38.597000
|
||||
CVE-2024-36823,0,0,73764c9f34abc877735e2a683a3be5f7a3435e84b5edb7f300e1e086f31dcd65,2024-07-17T14:41:44.227000
|
||||
CVE-2024-36827,0,0,d5b65af3d7b9322aad3b5478f72ede9b79c676edb352f8fbc888d8aac5e59f92,2024-06-07T19:24:09.243000
|
||||
CVE-2024-36829,0,0,5509ab1d6b09194f3e037884f0294eea6f9178d3338dcfb674a6c6cc4137e04b,2024-08-12T14:35:09.987000
|
||||
@ -254482,8 +254482,8 @@ CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3
|
||||
CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37087,0,0,cd5f38dea6878f55617a1348143830ab9f44bbdb4a44091efb0c0832c07fcba2,2024-06-25T18:50:42.040000
|
||||
CVE-2024-37089,0,0,9e292fe1dd11fba75d82973b2e1db6879968f554c93ecd19be42fbc3a656ef4b,2024-06-24T12:57:36.513000
|
||||
CVE-2024-37090,0,1,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000
|
||||
CVE-2024-37091,0,1,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b460,2024-08-16T14:08:08.113000
|
||||
CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000
|
||||
CVE-2024-37091,0,0,51d89bff6d4927a6932c5f16be7fc12b87d21b9cb01a4f230b0e60352bf9b460,2024-08-16T14:08:08.113000
|
||||
CVE-2024-37092,0,0,4f832f426d4e20df2ade16ea7f95884ead700f0032ad8127b2362adeff7b3a6b,2024-06-24T19:26:54.367000
|
||||
CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000
|
||||
CVE-2024-37098,0,0,206a1546b741bc07a86d9ba244975f767c816d0e758aea47c5cb3f103694aa58,2024-06-26T12:44:29.693000
|
||||
@ -254632,7 +254632,7 @@ CVE-2024-37286,0,0,10f2f815d7a7cf1bd4d9a66e0df29331d0a360a2b816ffdb4c8479be46d14
|
||||
CVE-2024-37287,0,0,896be1043c8d33126804ddfb1ca0ab5acdf6cf2b208c4e819b98503dc40cb8a4,2024-08-13T12:58:25.437000
|
||||
CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
|
||||
CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
|
||||
CVE-2024-37293,0,0,efa095b0cfa3ac59ab9798514bc41970933da504bf684c09bb20230e55ad7e3a,2024-06-13T18:36:09.013000
|
||||
CVE-2024-37293,0,1,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000
|
||||
CVE-2024-37294,0,0,b35339309cfb6110892ba6e3580c3b860149dc89948cc54efd20172fbcf6cac8,2024-06-13T18:36:45.417000
|
||||
CVE-2024-37295,0,0,fbcc7bb2889d9597bfed9fd8e34bf110cdf869ea553c4d9c4889af667e21f7cd,2024-06-13T18:36:45.417000
|
||||
CVE-2024-37296,0,0,f773e9b4096330bb10b1258fc1d1c3f8598fa34d0610a3d76b02b358a1c46fc9,2024-06-13T18:36:45.417000
|
||||
@ -254788,7 +254788,7 @@ CVE-2024-37507,0,0,4e09e288241de45505be5c9a204dc926ba463ec216fa96f5e2157f7702b56
|
||||
CVE-2024-37509,0,0,dc88a6cc688b80a3d03a097d55abdc7d4cad7d3b7b2c546a1ea91a8173ea195a,2024-07-22T13:00:31.330000
|
||||
CVE-2024-3751,0,0,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000
|
||||
CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37513,0,1,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000
|
||||
CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000
|
||||
CVE-2024-37514,0,0,dc98e25e8fd49b90b1755d1a17af64cf14cc9a477edf02d5fac5f9675efa01ce,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37519,0,0,86f8ec4698a3f7ec42b8ff60d0401dd6d0a9f51f26071b5cfe16503b6f9ef5fb,2024-07-22T13:00:31.330000
|
||||
@ -255018,7 +255018,7 @@ CVE-2024-37949,0,0,55220a015847dc6b7bbbb605b8fd86a65c29f22d3366af728409225c777da
|
||||
CVE-2024-3795,0,0,f16f2517dca7ca05b3c4907d5c002f230ac9e36a749d3bc6fea553bc4f317d0d,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37950,0,0,b9d9c5157e1c031a5d4e7c44990db904f249de585cb32088fcff43b55d08f84a,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37951,0,0,1d7da26bc90367902aadb08526715ea13e2d2d70f6c886dc0633388d7fb4c227,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37952,0,1,bd86ec6c211688ba29fc744c5aef3d42e26e9441894c6b1d08190d2fb9b682f3,2024-08-16T14:43:20.333000
|
||||
CVE-2024-37952,0,0,bd86ec6c211688ba29fc744c5aef3d42e26e9441894c6b1d08190d2fb9b682f3,2024-08-16T14:43:20.333000
|
||||
CVE-2024-37953,0,0,4eb5938cacccd7a29bd6421c7b9d4f160d359c8ce01d9b3d6865ffcc482f476e,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37954,0,0,5da244531959717aea2bcb37c065da0b6b4234d99344e5c53987029f66f4ac92,2024-07-22T13:00:31.330000
|
||||
CVE-2024-37955,0,0,0546cd1263e2bde71eb6a609e1ed7b710b22deaf856a78cfe13cb35decc79042,2024-07-22T13:00:31.330000
|
||||
@ -255146,28 +255146,28 @@ CVE-2024-38109,0,0,02eca01dc206383c5000f5bdb91703b385cc24e7f0ebef3584edd1fc31081
|
||||
CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000
|
||||
CVE-2024-38112,0,0,64430ceb275cf8da67da7c67aeb82862dd246ca5cb45dd22ee184d5f24377f9e,2024-08-14T16:56:54.473000
|
||||
CVE-2024-38114,0,0,1282525a951ecf3124930865d1cd10f1ea2b2932c023f1714c8b23ef7351b831,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38115,0,0,4704e56eea8b8b074f156e981474d632988785f88bf14ae388fb152ba6a674ba,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38116,0,0,c2e2ceafbae9191663acb68769fbff52112a73f7e2608f4c3d97f9e8cb7a617d,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38117,0,0,ca68cb4f7a878afdf154a0f25eed1ff20d4ef6133063c7fffb5553e86781d7c1,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38118,0,0,26d18b3717d8ebfbb8bbc274785e430983473f457c5d8729b4244429ba71532b,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38115,0,1,02e874a63c3ed8e836207d7ec5324587e06233688848e5986aceeba6b3647167,2024-08-16T16:32:49.573000
|
||||
CVE-2024-38116,0,1,cf5f9404ade8a272eaa60eac9416d676a7fec4246c36e11b4419656b9c2b876d,2024-08-16T16:36:12.337000
|
||||
CVE-2024-38117,0,1,02b7b7449a7b7b31a197bf1e7192817f8fc368d67a62c3b9bfb90b12627dfc8b,2024-08-16T16:40:43.667000
|
||||
CVE-2024-38118,0,1,059378b81a9f1bb6254755f38cf2c71d4b5127a9e95a1f8408020622caafceb0,2024-08-16T16:41:04.497000
|
||||
CVE-2024-3812,0,0,aee0c212c8bdd18b48eb1b3684691508393eebae6c9908dea995a90b32a5da45,2024-05-20T13:00:34.807000
|
||||
CVE-2024-38120,0,0,c6d043ce60e7570a91ddabd7dc6cbb9101fe07ab797612d39ebfb98d20caa260,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38121,0,0,171fc1d508881ec08c8f3d20c5a1da6f266ed783da35b3ccbae425ec88391deb,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38122,0,0,24d80a04c2b8b72b5bc37449b1da731ceaa85ad71a0f7a82d1665cf0a1f2e913,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38123,0,1,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000
|
||||
CVE-2024-38125,0,1,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000
|
||||
CVE-2024-38126,0,1,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000
|
||||
CVE-2024-38127,0,1,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000
|
||||
CVE-2024-38128,0,1,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000
|
||||
CVE-2024-38120,0,1,2ae453d657d52bc7db9af51e7d1476c70babe1dc65f572207fedc460d3088fb7,2024-08-16T17:12:59.383000
|
||||
CVE-2024-38121,0,1,a7fd6853a556fbe6804501b199f8b68852be41a932a956f803d9744290991e8e,2024-08-16T17:13:28.350000
|
||||
CVE-2024-38122,0,1,ccd40c698ac79bd5e6ffae27158140be83eb08e1e0ee4a0ffabbae2b5e3808c8,2024-08-16T17:16:41.717000
|
||||
CVE-2024-38123,0,0,525f8001d93df555a0cfc66808829dcfb3dfccf1ea500c52ab244c6ecbf6dc75,2024-08-16T15:40:45.897000
|
||||
CVE-2024-38125,0,0,d26e1d36824e76a6a220df456c8652db7a6ab165e3bf0f710833baa0d18ade22,2024-08-16T15:41:26.523000
|
||||
CVE-2024-38126,0,0,25e344926ac532a376ed99284317937aab86d47126d849de8aa15a2c61208620,2024-08-16T15:42:36.073000
|
||||
CVE-2024-38127,0,0,304c33e03b3f29c6650859d459051685e79af8f8ff6cfbb19cd608ad8b9b0b79,2024-08-16T15:43:13.980000
|
||||
CVE-2024-38128,0,0,e3a8bab2bf7fdda23ba89dc94ad7ced2a70e01d403cd721a878e5f60b1e25e7a,2024-08-16T15:31:29.327000
|
||||
CVE-2024-3813,0,0,d80bc8b1e8c714a4f8827190dc103e9bc726aeafa665606cb93627ea2cb076a3,2024-08-07T15:45:23.793000
|
||||
CVE-2024-38130,0,1,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000
|
||||
CVE-2024-38131,0,1,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000
|
||||
CVE-2024-38132,0,1,2a93ad01c2f6386608e424c1dfbafa21ec2ed5d60753f135cdd2c69c119de531,2024-08-16T15:33:07.097000
|
||||
CVE-2024-38133,0,1,5b117a31a499a24e7c20a3254e7045dc8befa477564278a1a29716f75bfec5a7,2024-08-16T15:25:05.590000
|
||||
CVE-2024-38130,0,0,1c4738a40a92ee4feeaa805c133e23a472a7eecf285f709aa42fcc40bbb8d08e,2024-08-16T15:31:59.127000
|
||||
CVE-2024-38131,0,0,40b1bdfd01969a7823d6e6ec72c7b0c0b9a4fc0cb17877426945849145ebb51a,2024-08-16T15:32:31.797000
|
||||
CVE-2024-38132,0,0,2a93ad01c2f6386608e424c1dfbafa21ec2ed5d60753f135cdd2c69c119de531,2024-08-16T15:33:07.097000
|
||||
CVE-2024-38133,0,0,5b117a31a499a24e7c20a3254e7045dc8befa477564278a1a29716f75bfec5a7,2024-08-16T15:25:05.590000
|
||||
CVE-2024-38134,0,0,b6bca1691f34ce239423b1778ddba4932cca47dfb244ff22d58ba4b41cb300da,2024-08-15T17:43:41.003000
|
||||
CVE-2024-38135,0,0,98f14c37b10468e1351c51883d72765a25cb71664e0ecc84c4e130e6b7bd9ae5,2024-08-16T13:32:49.503000
|
||||
CVE-2024-38136,0,1,cfb5c77ae8e5a72e5b5f77bb0b7a3d12e21e298432360ac71bc0f1bdf1bb6039,2024-08-16T15:26:24.433000
|
||||
CVE-2024-38137,0,1,fab28c8133db0be5dde10db5a50f4bb03706666135c65b121b19727f3cc55898,2024-08-16T15:27:09.137000
|
||||
CVE-2024-38136,0,0,cfb5c77ae8e5a72e5b5f77bb0b7a3d12e21e298432360ac71bc0f1bdf1bb6039,2024-08-16T15:26:24.433000
|
||||
CVE-2024-38137,0,0,fab28c8133db0be5dde10db5a50f4bb03706666135c65b121b19727f3cc55898,2024-08-16T15:27:09.137000
|
||||
CVE-2024-38138,0,0,abc0a81a70e51ce96788b041a13e6056800dddcef1d1b740392d66a01c072e6f,2024-08-14T02:07:05.410000
|
||||
CVE-2024-3814,0,0,4b11a7d4126e6e627365a6c09d49c5b79c42112fff3bef28a2dbbe621feb8e3e,2024-07-26T13:36:51.523000
|
||||
CVE-2024-38140,0,0,ee68c7b1f88cb35e19343ff179991211a8ff702f8244f123636f491f728a1f17,2024-08-14T02:07:05.410000
|
||||
@ -255216,7 +255216,7 @@ CVE-2024-38184,0,0,c835801cc9a652fb4d0e1f944198cfbcc8cd135504cb985a1202364a28f2d
|
||||
CVE-2024-38185,0,0,75ab73ca7d58e9b27e8fa6ff3eacfd93bb93d79005d1365847f0476f878e01f8,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38186,0,0,e48699951b83a13a8c545a7bb39dc766d490dd0a39c76d8a25aa85e46c5ed311,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38187,0,0,426ec9e92ff0a407b183738cdd31a21c97647274d94618ee0b6aa72a02fffbbf,2024-08-14T02:07:05.410000
|
||||
CVE-2024-38189,0,1,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000
|
||||
CVE-2024-38189,0,0,17b3a71ec92377ac99020e30bbb6da09945580c015316b509e01f36ec223c6d3,2024-08-16T15:11:42.940000
|
||||
CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000
|
||||
CVE-2024-38191,0,0,9730b06694f8b54c9807aa14f7df48bed6f98d855f940894c24b2328b7f114e6,2024-08-15T20:58:12.813000
|
||||
CVE-2024-38193,0,0,f683727b02704ad7b117b644e084a2e01a414a802e0c9c89e2d81dddf3e07bbe,2024-08-14T16:31:06.880000
|
||||
@ -256877,7 +256877,7 @@ CVE-2024-41259,0,0,8e959022d59e60bc0e97cf4bf2cb7de172a51f6107bba66dcfedab192a1fc
|
||||
CVE-2024-4126,0,0,eeea001e03fa6fec03fbd996718e983ff172445a96f3b74ca8247477394c3911,2024-06-04T19:20:30.860000
|
||||
CVE-2024-41260,0,0,3b736a5e72a084b867bc1f8a67734020228a90a35c7407c8f5897185d84f7415,2024-08-06T19:35:08.443000
|
||||
CVE-2024-41262,0,0,48b0074f34ada1a302a3c7c2afcfaf4594d4fd732c8b7153c8377ab26e16ee3d,2024-08-01T16:35:11.627000
|
||||
CVE-2024-41264,0,1,332d92db5c905482198269e17be9fe322336114f0c994cd46df7b2596aa2cc30,2024-08-16T16:00:36.687000
|
||||
CVE-2024-41264,0,0,332d92db5c905482198269e17be9fe322336114f0c994cd46df7b2596aa2cc30,2024-08-16T16:00:36.687000
|
||||
CVE-2024-41265,0,0,96664aad23c7dd63e002634cfc71189c6e2399a9d19b5373e19abde784e31cd7,2024-08-02T16:35:52.013000
|
||||
CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ece0,2024-06-04T19:20:30.957000
|
||||
CVE-2024-41270,0,0,af12a3d2be324bb3d9e2b16ff7d039367afc9e03066837308e275993680c0e05,2024-08-12T18:25:28.583000
|
||||
@ -257163,7 +257163,7 @@ CVE-2024-41959,0,0,135bc4bf1338241a775bbfd3e5799793f19819d1fb2e41bc46b5a8bdc385f
|
||||
CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000
|
||||
CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000
|
||||
CVE-2024-41962,0,0,5aa1ed6b30907704a36dc6fd122a906a648121941a14c73bf3eebe85b6d07876,2024-08-02T12:59:43.990000
|
||||
CVE-2024-41962,0,1,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000
|
||||
CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000
|
||||
CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000
|
||||
CVE-2024-41976,0,0,1fe33f47a85db9ce981ff794d247895d57be7987d9b98a139ed18f9270505ef4,2024-08-13T12:58:25.437000
|
||||
@ -257430,12 +257430,12 @@ CVE-2024-42458,0,0,5dc7de7c18fc9a4762e6600de6bc88b5c8771baaff2409a2a19314905b1c9
|
||||
CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff193,2024-08-02T15:35:44.213000
|
||||
CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000
|
||||
CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000
|
||||
CVE-2024-42461,0,0,ccfc4466bb15f077fb8e5d551bb285d827a249febd58170e6accc3c96449bf17,2024-08-07T19:35:13.447000
|
||||
CVE-2024-42462,1,1,bd842e4078213663fb9634d032edf846d5a7dcdcf5e81621d6a22c94c7d85215,2024-08-16T14:15:13.253000
|
||||
CVE-2024-42463,1,1,a938019478eeaf319f9b08147b37054c25ff2382e54c40bd90ca30afae7c0b7f,2024-08-16T14:15:13.650000
|
||||
CVE-2024-42464,1,1,3e63a708074ce366f3461fc42631850434e6ccbd81b25ac91329e1979960a870,2024-08-16T14:15:13.933000
|
||||
CVE-2024-42465,1,1,1c0b6edc320d8750d70e421efe32a64e97e1bb73fcf59fbb24c5bad282598f4e,2024-08-16T14:15:14.133000
|
||||
CVE-2024-42466,1,1,d86a0ebc4dcb18aca1621b0b7b556b13b3a067e20f4525c591e0df9bbf718bc2,2024-08-16T14:15:14.343000
|
||||
CVE-2024-42461,0,1,bba68fac1714eca06b2f70a5c715b9fe71087992bafdb6d29066928e025c5f76,2024-08-16T16:51:40.270000
|
||||
CVE-2024-42462,0,0,bd842e4078213663fb9634d032edf846d5a7dcdcf5e81621d6a22c94c7d85215,2024-08-16T14:15:13.253000
|
||||
CVE-2024-42463,0,0,a938019478eeaf319f9b08147b37054c25ff2382e54c40bd90ca30afae7c0b7f,2024-08-16T14:15:13.650000
|
||||
CVE-2024-42464,0,0,3e63a708074ce366f3461fc42631850434e6ccbd81b25ac91329e1979960a870,2024-08-16T14:15:13.933000
|
||||
CVE-2024-42465,0,0,1c0b6edc320d8750d70e421efe32a64e97e1bb73fcf59fbb24c5bad282598f4e,2024-08-16T14:15:14.133000
|
||||
CVE-2024-42466,0,0,d86a0ebc4dcb18aca1621b0b7b556b13b3a067e20f4525c591e0df9bbf718bc2,2024-08-16T14:15:14.343000
|
||||
CVE-2024-42467,0,0,4d22b6210d07d5f3c254f02dd41ae3cecad0c4d515c80021ed5ec249d7082a04,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42468,0,0,76cb3122a8232cee530b0374441c48dedc4c3d24ff695d723500b8a92fe30bc6,2024-08-12T13:41:36.517000
|
||||
CVE-2024-42469,0,0,b65049b5c4751d92c1e0b91c507812510fe11805ae8aa9f7a38c440861e678c6,2024-08-12T13:41:36.517000
|
||||
@ -257450,11 +257450,11 @@ CVE-2024-42477,0,0,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf3
|
||||
CVE-2024-42478,0,0,cdf48197e3348474fc63d3659602086723564e2de2d520434b1a86401eda413e,2024-08-15T14:03:32.867000
|
||||
CVE-2024-42479,0,0,919a4727e7b8c44b8fb7de183faba90f9bbe38a8002d5847cf0037ef02b3958f,2024-08-15T14:03:53.203000
|
||||
CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3de,2024-06-04T19:20:34
|
||||
CVE-2024-42480,0,0,d6ef3c6db5a498c7b4cc4b77be4e0c4132e9804f02867681cb2b417c4a3c017c,2024-08-12T18:57:29.247000
|
||||
CVE-2024-42480,0,1,a493fdcfd2cab0bed771f4294216832fdd84bd63bcd8976ed48629d61d56dc9b,2024-08-16T16:24:40.430000
|
||||
CVE-2024-42481,0,0,ad34942ce8111bc952fcd265a37f1d388b31063c4018bd73b3f6d858abc1a1ad,2024-08-12T18:57:29.247000
|
||||
CVE-2024-42482,0,0,b30158f5b674bded8c099de403a1859157e22ee6eae596b9cbf6c6cda1ffed96,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42485,0,0,fe887079979720fde6a2564dece883024602b52e3edd829141a610d95ce6aeb6,2024-08-12T18:57:17.383000
|
||||
CVE-2024-42486,1,1,0cf9b72eb06e426c9ae9c3be7c0a8751b5c461e1fe82a33b1cb1479b5f7e9ef5,2024-08-16T15:15:28.777000
|
||||
CVE-2024-42486,0,0,0cf9b72eb06e426c9ae9c3be7c0a8751b5c461e1fe82a33b1cb1479b5f7e9ef5,2024-08-16T15:15:28.777000
|
||||
CVE-2024-42487,0,0,268550579915872b28630196fcd08762a9f824be6b68b39fadbf6356d7ded081,2024-08-15T21:15:16.997000
|
||||
CVE-2024-42488,0,0,2ac3d3c300a22378eb838a987000238154148bda4b1a1a7af2a05964a033aa16,2024-08-15T21:15:17.270000
|
||||
CVE-2024-42489,0,0,1203b17e47b8d78391ae8374fec72a221549be23a40702733d44133e504634fc,2024-08-12T18:57:17.383000
|
||||
@ -257488,6 +257488,7 @@ CVE-2024-4263,0,0,ca3576d1d67e220dba5bd29258a281021ffe39453fa0c4f20e91ad0ccbfbb4
|
||||
CVE-2024-42630,0,0,4fff96f7d5cfbd5e5589e0968506019fde3792b2edc6b60a8aaf8334fc6488be,2024-08-13T15:35:22.433000
|
||||
CVE-2024-42631,0,0,1f47f8877d49e8628a42d74c73cac60b8f382fa6d5b7f60da5c7487aa880aef0,2024-08-13T19:35:12.050000
|
||||
CVE-2024-42632,0,0,6db2b07353e1fe8433bb94ce7c82367301221ecd513a59df2e5f1960150683fd,2024-08-13T15:35:23.410000
|
||||
CVE-2024-42634,1,1,315cb6187375dc5de6e54eacb8a432704aa3e96d9692e54bbe2981f665b8fc7d,2024-08-16T16:15:06.670000
|
||||
CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4266,0,0,4e57f554a9a502210e7298e86f8a93b4c9fd8085f966eca22533475a40566a21,2024-06-11T13:54:12.057000
|
||||
@ -257540,7 +257541,7 @@ CVE-2024-42942,0,0,22160e7a51aba7ec4c2a442eda5365016c21f50a3ce436f5593e17d4a4e43
|
||||
CVE-2024-42943,0,0,89c464dfd8c5f51926e53bbc150c1d5fb409b705cb2bcd9dfb7d1af986ed8796,2024-08-15T19:32:41.770000
|
||||
CVE-2024-42944,0,0,6a290ba62a9fff3904840cadfe2b37e39d360c8330bb30550edf0cc0dbc5dd2d,2024-08-15T19:35:13.737000
|
||||
CVE-2024-42945,0,0,b51c554c7b4c6d19cac5e4b0d4a01832b1af734dc7e9521d8a5997f778081806,2024-08-15T18:35:13.343000
|
||||
CVE-2024-42946,0,0,93fe4893c0cedb4738a7e308b70ad69c3528d6545aadd1d60c711d4757ed44f7,2024-08-15T19:31:54.883000
|
||||
CVE-2024-42946,0,1,d0f7e8d7d1788119449618db3b1da4ffbfa720ab07647edae28d1ada00373d08,2024-08-16T17:35:08.227000
|
||||
CVE-2024-42947,0,0,e7d01f7003d2f409e61d4e637f7500689fb65c07673a6b4b02e4e7886d96fafe,2024-08-16T13:32:05.103000
|
||||
CVE-2024-42948,0,0,59733d9ea03ff832cdda58530fe7794aa6dde194a9927e51f986b168d6545b07,2024-08-15T19:31:38.217000
|
||||
CVE-2024-42949,0,0,9d545118cba6649782b54ae27c38f1aa504bb881d29e0b9897d5de790ac29d20,2024-08-15T18:35:14.430000
|
||||
@ -257550,7 +257551,7 @@ CVE-2024-42951,0,0,85275541fa923c811c363f65806be15ab72ba82c78bd854fd99c466c7c580
|
||||
CVE-2024-42952,0,0,b65ff3219b833a55817e0927e7de1af3e44121268840902e5ccda1d541c6cdf9,2024-08-15T19:30:38.387000
|
||||
CVE-2024-42953,0,0,58c878dc5f5cca4ba3f36cfc4bba965c4a1c2ae0257b6ccf0d5ee87f2b28abe9,2024-08-15T18:35:15.460000
|
||||
CVE-2024-42954,0,0,21936edb6d76a1dd8ac96611d3a88660fcfb4cf78730c9339bc7845c4b218f07,2024-08-15T18:35:16.510000
|
||||
CVE-2024-42955,0,0,9320f4344c94707c19eb1638f7623083e78d4d0cac1d427a8b445dec8cf0f81b,2024-08-15T19:29:55.033000
|
||||
CVE-2024-42955,0,1,00b8e7d9e7586e92f9d97b1e6a1644d4d4ca5fa3cfd628bfbd234416a0d76773,2024-08-16T17:35:08.957000
|
||||
CVE-2024-4296,0,0,052b4ea8fe5e477de9d37ee5afe4ea95ec74241a638e1e02dda20e9782a7e237,2024-04-29T12:42:03.667000
|
||||
CVE-2024-42966,0,0,2183a7825b02d826715434a606b8e0e88607ae49ea211d2b913cb8ef25e10f0a,2024-08-16T13:35:28.477000
|
||||
CVE-2024-42967,0,0,7e74ee4a2d6a17af6b0f12f00eb90c60c9c52c49e61e430789bbc0c38446386e,2024-08-16T13:34:29.780000
|
||||
@ -257559,27 +257560,29 @@ CVE-2024-42969,0,0,ceb7831a2a6e34194193b49c18930eef13b8b53d9526a7c509fe06bf6f41d
|
||||
CVE-2024-4297,0,0,391cde32595a6f10054c7e99797c9f48482f1c612a355cb934b7ce023c8828d7,2024-04-29T12:42:03.667000
|
||||
CVE-2024-42973,0,0,d5485c43677896de6fa08dcef41d866080793d4ea6f42d62bb087be9a42b86ec,2024-08-15T18:35:18.647000
|
||||
CVE-2024-42974,0,0,61d1e7965783de08549ceb87497ce958d38b08adcba4b51b3e7dd7cf76abda57,2024-08-15T18:35:19.710000
|
||||
CVE-2024-42976,0,0,fdeb1058f309a6b1c2e03e5041022acb93160f1fd65f5954096327060d87628a,2024-08-16T13:31:28.890000
|
||||
CVE-2024-42976,0,1,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000
|
||||
CVE-2024-42977,0,0,feb7f28f54f84204165e37a00b44b1e384cb0d1f0ba15a6d5127e74a8ec2aae1,2024-08-16T13:31:11.107000
|
||||
CVE-2024-42978,0,0,b1f4d5128465b01f205b47353b8c0b280ab205530bf41f8f4bc128c131592e31,2024-08-16T13:30:54.670000
|
||||
CVE-2024-42979,0,0,fec579a62e68a4a25550b4929302262929d70ec750534fbc7a3c9c744abc20d4,2024-08-15T18:35:20.827000
|
||||
CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000
|
||||
CVE-2024-42980,0,0,aae73890d46507cd39a47700993c5d676f70df0e2e17eb3d4e6489411e40562b,2024-08-16T13:30:25.787000
|
||||
CVE-2024-42981,0,0,305e4d194b20329fbf4e53ae71462711a1b6a79d86ab57d0c8e5b6861c13f109,2024-08-16T13:30:08.427000
|
||||
CVE-2024-42982,0,1,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613f62,2024-08-16T14:35:03.793000
|
||||
CVE-2024-42982,0,0,b79378f1ff4a9e006826a55d7321d82064d4e893f7822df5232fe4a1a2613f62,2024-08-16T14:35:03.793000
|
||||
CVE-2024-42983,0,0,2ff07324e83d99eb1dc609eafc4c3fb864fe9bede7cebb3f3a45d534c9241118,2024-08-15T18:35:21.960000
|
||||
CVE-2024-42984,0,0,bab3f2f7207ff98837835928f6ef37efbc1f08e16988e1becb88b00c2369e868,2024-08-15T18:35:23.283000
|
||||
CVE-2024-42985,0,0,c7e7a8fb8466a6c9eed5915b1babd484e4e0a3d29e5fa5926690e0b009cd701f,2024-08-16T13:29:27.497000
|
||||
CVE-2024-42985,0,1,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000
|
||||
CVE-2024-42986,0,0,729f44b69d8ed274bedf72a20b1cd0e83d0be1662a818f8ffd16806b1da8caa0,2024-08-16T13:26:43.100000
|
||||
CVE-2024-42987,0,0,be14eefacd9f282e13e394cb1aeefe62ea3c84389f7783546c46d3192df9881f,2024-08-16T13:26:27.123000
|
||||
CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000
|
||||
CVE-2024-42994,1,1,929e4934cc5ce20c828654d19893b5f26f36240698af23914c05b184721c7515,2024-08-16T17:15:15.153000
|
||||
CVE-2024-42995,1,1,0ea9659999eca75719977ad75316ad87471a8f88bfd82595d5287f10dccdda95,2024-08-16T17:15:15.273000
|
||||
CVE-2024-4300,0,0,9683d559686bc261042c0ad86aeb3d06ca0ebb649bc8d0eaba9f4d32c108bd00,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4301,0,0,218172685a71d9dc14b7de60ac62731c757d7801c2c506799e72286e245e5cdd,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000
|
||||
CVE-2024-43044,0,0,2dbbef33f99d7cbcabcc19e81e19ebf43163c5d81893c4595ee6a39205a72744,2024-08-07T15:17:46.717000
|
||||
CVE-2024-43045,0,0,6c09b38c22660d5e17b2c923e52895837b1f6e1429e2502f70318f1f62bcf3fa,2024-08-07T15:17:46.717000
|
||||
CVE-2024-43044,0,1,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000
|
||||
CVE-2024-43045,0,1,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000
|
||||
CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000
|
||||
CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000
|
||||
@ -257675,7 +257678,7 @@ CVE-2024-43370,0,0,59b87d7d60e811132be75fab5860fc7d531485b8890b7e3ad6ed1f41f6548
|
||||
CVE-2024-43373,0,0,69d56183bd2a33523e74549d732339012a778a169f9424729adc89709a9fb8e3,2024-08-15T17:34:07.033000
|
||||
CVE-2024-43374,0,0,7644def70e08cd7a711b128ad560c089ada83dcf140f909f0ac36102735face9,2024-08-16T02:15:17.687000
|
||||
CVE-2024-43378,0,0,d0e1086da4bd21519e32eff9bfa155f1714d7bd494c9d21a9f49685aa5f864a3,2024-08-16T02:15:17.877000
|
||||
CVE-2024-43381,1,1,8ad255b17aef678316f5fdfb44e36b31d5b5d1db82172614569592481d1fec5a,2024-08-16T15:15:29
|
||||
CVE-2024-43381,0,0,8ad255b17aef678316f5fdfb44e36b31d5b5d1db82172614569592481d1fec5a,2024-08-16T15:15:29
|
||||
CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4340,0,0,47279ef0860b5c8c8bd0a3697c64eecb43c1be11e1b93224b8fe23143c960d81,2024-04-30T17:52:35.057000
|
||||
CVE-2024-4341,0,0,60a5b39ccdef4d059dc8073670ab0aea750a7880bf4e71543025f3d18b32ff1e,2024-07-08T15:49:22.437000
|
||||
@ -257716,11 +257719,11 @@ CVE-2024-4376,0,0,7b257e3003fee7879c886112d028b58d973966a06334b732b2628be71d9e1e
|
||||
CVE-2024-4377,0,0,1f0bc109d8a6e47162fe7e13cb7db22957e997f770c56ad1361c99539d4a2fb0,2024-07-17T02:53:06.217000
|
||||
CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000
|
||||
CVE-2024-43807,1,1,611e8f9d418d5e15c9aad30fc27b0390a7fb66137bd3721a251de12fedfbc97f,2024-08-16T15:15:29.197000
|
||||
CVE-2024-43808,1,1,912c71bb8d20eed572e047dbdccd61a20f88b88c5959aeeb01551f889a13eba5,2024-08-16T15:15:29.417000
|
||||
CVE-2024-43809,1,1,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000
|
||||
CVE-2024-43807,0,0,611e8f9d418d5e15c9aad30fc27b0390a7fb66137bd3721a251de12fedfbc97f,2024-08-16T15:15:29.197000
|
||||
CVE-2024-43808,0,0,912c71bb8d20eed572e047dbdccd61a20f88b88c5959aeeb01551f889a13eba5,2024-08-16T15:15:29.417000
|
||||
CVE-2024-43809,0,0,9a8fcf3055cb9d3106aa11467282a4b8b63ce20177d8ae1a833fcaed5c48e04e,2024-08-16T15:15:29.597000
|
||||
CVE-2024-4381,0,0,acf3a4021017fa63457aceda91db3b255168337a90160e11d4caaf0dc88c06d3,2024-07-17T02:54:24.913000
|
||||
CVE-2024-43810,1,1,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000
|
||||
CVE-2024-43810,0,0,941aa7336cebfaaf308b83fc9f3bc3224ab24e66cccdb855bf3e66ffde8aa6bc,2024-08-16T15:15:29.790000
|
||||
CVE-2024-4382,0,0,f0af8887b52c70037c2b23db1dd5fba9df47b870975ecf7200df960162cfbaf4,2024-07-17T02:56:01.750000
|
||||
CVE-2024-4383,0,0,79a386b1175f996c5232e33e8542f544a0804b6992fb3e16e7f612c169e16a45,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000
|
||||
@ -258060,7 +258063,7 @@ CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da7348723
|
||||
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
|
||||
CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000
|
||||
CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000
|
||||
CVE-2024-4763,1,1,6636f17cd3a0c4133c37d5ed7e2fab0443c459d266364d8c96c024b20b18973f,2024-08-16T15:15:30.563000
|
||||
CVE-2024-4763,0,0,6636f17cd3a0c4133c37d5ed7e2fab0443c459d266364d8c96c024b20b18973f,2024-08-16T15:15:30.563000
|
||||
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
|
||||
CVE-2024-4765,0,0,8a392c26e3db622097fdbc028abf6a874c53118cfa805a98650695a7c92a19e0,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000
|
||||
@ -258078,8 +258081,8 @@ CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737b
|
||||
CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000
|
||||
CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000
|
||||
CVE-2024-4781,1,1,b694f46118d4cccc5c5bcdb3d30f110d4d06f54bef2c3bd5967fb05b14fef8a8,2024-08-16T15:15:30.783000
|
||||
CVE-2024-4782,1,1,18e9f0fb9ad043cb162fddc8d4b5d979fca1582ad25f7d3183bf4fb975a4dc81,2024-08-16T15:15:30.967000
|
||||
CVE-2024-4781,0,0,b694f46118d4cccc5c5bcdb3d30f110d4d06f54bef2c3bd5967fb05b14fef8a8,2024-08-16T15:15:30.783000
|
||||
CVE-2024-4782,0,0,18e9f0fb9ad043cb162fddc8d4b5d979fca1582ad25f7d3183bf4fb975a4dc81,2024-08-16T15:15:30.967000
|
||||
CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4784,0,0,9aaebc683fa580787b3fd96a509a375fe0be341d6b1720ff572edca3637a16b2,2024-08-08T13:04:18.753000
|
||||
CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000
|
||||
@ -258440,8 +258443,8 @@ CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e38
|
||||
CVE-2024-5206,0,0,1edbf7ffa84186215d61e0a6ea0414ae2bae29f22b2d9bacc791d12b11ca4436,2024-06-17T19:15:59.190000
|
||||
CVE-2024-5207,0,0,181dd5a561a1ca6cee33a4a5369908472f122edb94b0d0fa7d6cd5b5e2958e5a,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5208,0,0,1cccb0861be6781d1738a6540c67013b2ca290af7bc911f2a2acee7d44fa67ac,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5209,1,1,a68bca98dfe872b23aaa0a9014ede2a53549ec319bf752a6f798da9369698c69,2024-08-16T15:15:31.150000
|
||||
CVE-2024-5210,1,1,0c9453286818a64466348ad4ea2fe1c9bda56f0c4d89e3d6bd52256cf7397211,2024-08-16T15:15:31.337000
|
||||
CVE-2024-5209,0,0,a68bca98dfe872b23aaa0a9014ede2a53549ec319bf752a6f798da9369698c69,2024-08-16T15:15:31.150000
|
||||
CVE-2024-5210,0,0,0c9453286818a64466348ad4ea2fe1c9bda56f0c4d89e3d6bd52256cf7397211,2024-08-16T15:15:31.337000
|
||||
CVE-2024-5211,0,0,98a88a37609463fc748729234fb7fa88ed6b19a9a862440dab2a89ae616c7fd0,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e00,2024-07-17T14:36:39.397000
|
||||
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
|
||||
@ -258850,7 +258853,7 @@ CVE-2024-5687,0,0,20e940b5eb34eeb2ca33bc2ed1420b0aebfdd0f1b1da393415c2caf461a27a
|
||||
CVE-2024-5688,0,0,378fe065c1c96c80f8fcd92ad9e23dd5031fac1fb881139af57f2ca0f8af6f7d,2024-07-03T02:09:10.300000
|
||||
CVE-2024-5689,0,0,4a110f75db5aeecb8ba897daed59c54700fc78a15415c63a015a6e971aa1956d,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5690,0,0,d97da1ed16aadcb18dbcdccf4095ed3e100e24ec0426a177c2c96faa76e14b0a,2024-08-09T13:43:37.807000
|
||||
CVE-2024-5691,0,1,5f94a4cdfecfdccc98e41d19459a5804c0a9703c03d05b1e9ae63480a42a1f11,2024-08-16T14:44:05.733000
|
||||
CVE-2024-5691,0,0,5f94a4cdfecfdccc98e41d19459a5804c0a9703c03d05b1e9ae63480a42a1f11,2024-08-16T14:44:05.733000
|
||||
CVE-2024-5692,0,0,da86a3e71defc1a5762f0a215e21c8d6ad0bb48702dddd9796e84e537e21cbce,2024-08-01T13:59:56.967000
|
||||
CVE-2024-5693,0,0,0c0efe07ae7eccba3dbeb9fe7241e864745aeb8b41f02dc5d33a8371321e7469,2024-07-03T02:09:11.353000
|
||||
CVE-2024-5694,0,0,275b578189d93f8e1ff5fb24ee08b4deeac272512e00405f2d220d413d57023d,2024-06-11T13:54:12.057000
|
||||
@ -259057,7 +259060,7 @@ CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb
|
||||
CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000
|
||||
CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5975,0,0,fa255d4ef912d8f8da76e1022132a17caf8538a1c8cca7df81e3eaadac5c5086,2024-08-01T14:00:06.617000
|
||||
CVE-2024-5976,0,0,0d4a23e2583616de98536e1ad4d7b2a882021b32cad502d23a934bbf343ef666,2024-06-17T12:43:31.090000
|
||||
CVE-2024-5976,0,1,77b9cc86c9238f37d2799be9bfcfd76dc8bf6ab8aad4ffdc48881bdede83c5f6,2024-08-16T17:53:25.450000
|
||||
CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da75815823,2024-07-19T18:27:34.967000
|
||||
CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000
|
||||
@ -259076,7 +259079,7 @@ CVE-2024-5996,0,0,ab938dbc15262bb65cf82c58e85d96d3d9a41bba3218e574f8e961fd3a4906
|
||||
CVE-2024-5997,0,0,f617c2b08e97b588522e326e884bd8b2d7e5f36631694be3e5e4c23ccbcfc0bd,2024-07-19T13:01:44.567000
|
||||
CVE-2024-6000,0,0,4ab86aa4bce235d1120437fd5cb3b34fb6bdae181005ebaa070e8c0afe83cf87,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6003,0,0,14279c0384813c4cf50ab75a79953f2b0469d9bedd7f76c2b6cebfd90962fd14,2024-06-17T16:15:16.027000
|
||||
CVE-2024-6004,1,1,7ebd9046422c77bdfb40b7ec5eac36784e20ab47d0f1e37aeb7d86e4bdd1a2a4,2024-08-16T15:15:31.527000
|
||||
CVE-2024-6004,0,0,7ebd9046422c77bdfb40b7ec5eac36784e20ab47d0f1e37aeb7d86e4bdd1a2a4,2024-08-16T15:15:31.527000
|
||||
CVE-2024-6005,0,0,4d74c6c4a521a164f63a9fe529c141dc8da0592a0575e27e0e62d822beb9b877,2024-06-17T12:42:04.623000
|
||||
CVE-2024-6006,0,0,da8e313e14db96255e115f081c2f199aa734bf4f3a245ddcbe0fc940a6272d5f,2024-06-17T15:15:52.693000
|
||||
CVE-2024-6007,0,0,168f29713bfc3d324900731ff252d7ac39dc3f3059397dc39713b17d5dee00d3,2024-06-17T12:42:04.623000
|
||||
@ -259149,7 +259152,7 @@ CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7e
|
||||
CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000
|
||||
CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000
|
||||
CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000
|
||||
CVE-2024-6098,1,1,932d25e2016531c902cfc4db6b2a32ff7be61dd1665ae909731e83ee7ccd342c,2024-08-16T15:15:31.737000
|
||||
CVE-2024-6098,0,0,932d25e2016531c902cfc4db6b2a32ff7be61dd1665ae909731e83ee7ccd342c,2024-08-16T15:15:31.737000
|
||||
CVE-2024-6099,0,0,122ce35d776bcd880891466a825515ec577be2ec80ec19c4510dcdd6af223974,2024-07-02T18:08:53.233000
|
||||
CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000
|
||||
CVE-2024-6101,0,0,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000
|
||||
@ -259180,7 +259183,7 @@ CVE-2024-6129,0,0,7933292aa403a14b0748017ae2569e039b43c54c319d4b3589a08b9d05be42
|
||||
CVE-2024-6130,0,0,f4b647f0047f578fe057faac21db7670b7977afa1d31bb2fa4fd50dc12004c54,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6132,0,0,83486b9bda06b2bfd8b6c6e0e87eac1b4d59232f4be914a093590a57da1cf4d5,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6133,0,0,2337ffd9cad2357491c8f783d0b691c0b27d4405be8ab2d34dc8ce60f34a6000,2024-08-13T01:18:26.570000
|
||||
CVE-2024-6134,0,0,e3ef2ea84bcff820ce2b4e452d500e8e9e5be6a6b81c054bf5cac514a6a5608b,2024-08-12T13:41:36.517000
|
||||
CVE-2024-6134,0,1,c8a0602d6db0f3051b72e96c7e16fe4780a3ce250e242879d4a8baa99538dda9,2024-08-16T17:35:11.413000
|
||||
CVE-2024-6136,0,0,b5f2fd8869742060eab1f7acc4116cefd24c0a3b003f1c5a14cb58f5ac02f037,2024-08-13T01:18:26.820000
|
||||
CVE-2024-6138,0,0,fc35836bd5348e7eb9a778e4240c73e0ce52b6c3e53dfd414d6ee066e94e6acd,2024-07-12T16:54:53.997000
|
||||
CVE-2024-6139,0,0,5132030314b9a0ca48cecf9e1dd593f9b9cec1db256d0c213c6569e108426fbe,2024-06-27T19:25:12.067000
|
||||
@ -259264,7 +259267,7 @@ CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3
|
||||
CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000
|
||||
CVE-2024-6237,0,0,8762afad911d25272cef1e25e793265b79c2ac5f7d12b159ff8ab393df4b7ad2,2024-08-12T13:38:38.977000
|
||||
CVE-2024-6238,0,0,e8b3f57765062eca265deb8b1ecf893867ae3e3cc25fdad8633c66082a70ffd0,2024-06-25T18:50:42.040000
|
||||
CVE-2024-6239,0,0,f6fdb4572a4dbbcb94fcc324f5cf8790dec8289d28e940d8e84930cf2b5efdf8,2024-06-24T19:06:27.537000
|
||||
CVE-2024-6239,0,1,f9926b0cd048febae2346520b44e3c86bff18a382e32c768152365d4c8d177e9,2024-08-16T16:15:06.760000
|
||||
CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000
|
||||
CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000
|
||||
CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000
|
||||
@ -259349,7 +259352,7 @@ CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdca
|
||||
CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000
|
||||
CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000
|
||||
CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000
|
||||
CVE-2024-6347,0,1,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000
|
||||
CVE-2024-6347,0,0,b05eb2868311217449eb10df58f7023e3786bc9ff3f4e4c02dbfa2fb465a5bc1,2024-08-16T14:33:42.730000
|
||||
CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000
|
||||
CVE-2024-6353,0,0,3e7ee1ed054bc0661b7c1f2f3de9fe2ed8be61a7a777eee50734c66af6748302,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6354,0,0,c9410e2fdcd521ee7fa5aea0abe57bbff6ce1153eea9fc9c27ad647524c61c5c,2024-07-03T02:09:53.917000
|
||||
@ -259375,7 +259378,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985
|
||||
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
|
||||
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
|
||||
CVE-2024-6384,0,1,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
|
||||
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6387,0,0,db893df8e717a9bd82383b1c159531d9bd008b0dedb866ba3b332081811995f1,2024-07-30T02:15:08.387000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
@ -259746,7 +259749,7 @@ CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03
|
||||
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
|
||||
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
|
||||
CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000
|
||||
CVE-2024-6990,0,1,0326ecf1bc9a8efec80f09c5dfd50b62c0d815fc632f7f111159a058f9ccd9e8,2024-08-16T15:21:14.383000
|
||||
CVE-2024-6990,0,0,0326ecf1bc9a8efec80f09c5dfd50b62c0d815fc632f7f111159a058f9ccd9e8,2024-08-16T15:21:14.383000
|
||||
CVE-2024-6991,0,0,d11c88ce8a351ab3495759c45368576c695eaeac0cf5e78c45b41aed7a267a71,2024-08-07T22:09:36.353000
|
||||
CVE-2024-6994,0,0,9960b5d210859f33c1958dbd6accb9b3cfa02ad5092a4aa4cfe1209e8d35090e,2024-08-07T22:10:04.740000
|
||||
CVE-2024-6995,0,0,9e1a01449fcee7bd95abf904254e638fb274f5eefbc5fb1951ae014eb09df4e6,2024-08-07T20:35:26.507000
|
||||
@ -259809,8 +259812,8 @@ CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583
|
||||
CVE-2024-7135,0,0,31437d1db396166831d3abd18bbeb77eef50ad11110b9df0f25d86e90a9b1fe1,2024-07-31T12:57:02.300000
|
||||
CVE-2024-7136,0,0,800009dc095d757e18cd07243220b156b5e1378ab0cdc8e3a6c11dcf096f0c2b,2024-08-16T11:15:04.027000
|
||||
CVE-2024-7143,0,0,444409226f2889debaa1b6cea63b846cc438f1a41258f2e601b106b9c83baf18,2024-08-07T19:09:46.290000
|
||||
CVE-2024-7144,1,1,956345c30ac91703cc6247a06908da0b5850fed46bf6b704798f3fbd677362a9,2024-08-16T14:15:14.690000
|
||||
CVE-2024-7145,1,1,8008e4f01c2164733d1a7678bcf08be4de0dc8b1ace04bc419ca0832fa2e5456,2024-08-16T14:15:15.187000
|
||||
CVE-2024-7144,0,0,956345c30ac91703cc6247a06908da0b5850fed46bf6b704798f3fbd677362a9,2024-08-16T14:15:14.690000
|
||||
CVE-2024-7145,0,0,8008e4f01c2164733d1a7678bcf08be4de0dc8b1ace04bc419ca0832fa2e5456,2024-08-16T14:15:15.187000
|
||||
CVE-2024-7146,0,0,1125a4692c6fb48bbab5140d3c4102c44a646d58d32c16ab6b96c4c0e4b7524f,2024-08-16T11:15:04.230000
|
||||
CVE-2024-7147,0,0,25a2551577bf2ff9e0ee13fa7c6e048a893e4216beb8bb4e8ed94704fa47c0a8,2024-08-16T11:15:04.423000
|
||||
CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000
|
||||
@ -259893,11 +259896,11 @@ CVE-2024-7249,0,0,b1c62b4f237d55dfb39f8f205e178006f9409a78ccfd426e79f2f98ca375d8
|
||||
CVE-2024-7250,0,0,2ad6dc357ed437eabcd60fe2775245fd2e54c1167d56f0a56470e33155a5fc4c,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7251,0,0,56e37f41fcf38f76a5deb1629f8d7e708899009a1e9f2b615de298d4a45a835f,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d89e,2024-07-30T13:32:45.943000
|
||||
CVE-2024-7255,0,1,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000
|
||||
CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000
|
||||
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
|
||||
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
|
||||
CVE-2024-7262,0,1,f691c718a5a63454dd0ad05ebe1b7dabdfe7c97003cd8aba2b437046cee7544f,2024-08-16T14:25:42.820000
|
||||
CVE-2024-7263,0,1,aad826c9d28e2bc52cb4f35b11d432222b44358d7b79f7294e5895302e02069b,2024-08-16T14:25:46.027000
|
||||
CVE-2024-7262,0,0,f691c718a5a63454dd0ad05ebe1b7dabdfe7c97003cd8aba2b437046cee7544f,2024-08-16T14:25:42.820000
|
||||
CVE-2024-7263,0,0,aad826c9d28e2bc52cb4f35b11d432222b44358d7b79f7294e5895302e02069b,2024-08-16T14:25:46.027000
|
||||
CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000
|
||||
CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000
|
||||
CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user