mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-10-10T20:00:17.856967+00:00
This commit is contained in:
parent
bdc74a7bb4
commit
3137bd899e
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-1000487",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-01-03T20:29:00.703",
|
||||
"lastModified": "2023-11-07T02:37:57.687",
|
||||
"lastModified": "2024-10-10T19:55:20.253",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:plexus-utils_project:plexus-utils:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:codehaus-plexus:plexus-utils:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.0.16",
|
||||
"matchCriteriaId": "32FC40BD-9DA1-480F-A13E-1A4C14776DB4"
|
||||
"matchCriteriaId": "7214D6BD-75D5-4F16-905C-98F8890BD888"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-22969",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2022-04-21T19:15:08.903",
|
||||
"lastModified": "2023-08-08T14:22:24.967",
|
||||
"lastModified": "2024-10-10T19:13:58.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -83,6 +83,13 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pivotal:spring_security_oauth:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.4.0",
|
||||
"versionEndExcluding": "2.4.2",
|
||||
"matchCriteriaId": "A137BE31-252D-4B38-8C9C-E4CA2030FDB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pivotal:spring_security_oauth:*:*:*:*:*:*:*:*",
|
||||
|
@ -2,17 +2,54 @@
|
||||
"id": "CVE-2024-20091",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:02.583",
|
||||
"lastModified": "2024-10-07T17:47:48.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:06:38.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1701."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En vdec, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1701."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
@ -24,10 +61,117 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,54 @@
|
||||
"id": "CVE-2024-20093",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:02.757",
|
||||
"lastModified": "2024-10-07T17:47:48.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:06:57.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1699."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En vdec, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1699."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
@ -24,10 +61,117 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,54 @@
|
||||
"id": "CVE-2024-20095",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:02.910",
|
||||
"lastModified": "2024-10-07T17:47:48.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:07:22.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996894; Issue ID: MSV-1636."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En m4u, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08996894; ID de problema: MSV-1636."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
@ -24,10 +61,182 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,54 @@
|
||||
"id": "CVE-2024-20096",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:02.987",
|
||||
"lastModified": "2024-10-07T17:47:48.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:07:38.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996900; Issue ID: MSV-1635."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En m4u, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08996900; ID de problema: MSV-1635."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
@ -24,10 +61,182 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46F71838-4E50-4F2A-9EB8-30AE5DF8511E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FA8A390-9F52-4CF3-9B45-936CE3E2B828"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,54 @@
|
||||
"id": "CVE-2024-20097",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:03.057",
|
||||
"lastModified": "2024-10-07T17:47:48.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:07:52.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1630."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En vdec, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09028313; ID de problema: MSV-1630."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
@ -24,10 +61,102 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03E6123A-7603-4EAB-AFFB-229E8A040709"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,54 @@
|
||||
"id": "CVE-2024-20102",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-10-07T03:15:03.427",
|
||||
"lastModified": "2024-10-07T17:47:48.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:20:31.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el controlador WLAN, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998892; ID de problema: MSV-1601."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
"type": "Secondary",
|
||||
@ -24,10 +61,82 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F897E19-008E-4DC8-B4CB-BF27044B9F5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30118",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2024-10-09T20:15:07.570",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:50:54.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +81,35 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD4BF4C3-3D45-41A8-886F-521E095CBBF2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D55E0F2F-7C8D-4334-8B8D-CCF88431F6DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0114302",
|
||||
"source": "psirt@hcl.com"
|
||||
"source": "psirt@hcl.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44954",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-04T19:15:30.353",
|
||||
"lastModified": "2024-09-05T12:53:21.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:02:42.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,168 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: line6: Fix racy access to midibuf Puede haber accesos concurrentes a midibuf de line6 tanto desde la devoluci\u00f3n de llamada de finalizaci\u00f3n de URB como desde el acceso a la API rawmidi. Esto podr\u00eda ser la causa de la advertencia KMSAN activada por syzkaller a continuaci\u00f3n (as\u00ed que se indica aqu\u00ed). Este parche protege la llamada midibuf de la ruta de c\u00f3digo anterior con un spinlock para evitar las posibles ejecuciones."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.320",
|
||||
"matchCriteriaId": "0B4EF915-550B-45E5-B2CA-648FEACD60FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "4.20",
|
||||
"versionEndExcluding": "5.4.282",
|
||||
"matchCriteriaId": "21D0A18B-9B7E-4C59-A2A6-8A94BBA4E0FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.224",
|
||||
"matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "5.11",
|
||||
"versionEndExcluding": "5.15.165",
|
||||
"matchCriteriaId": "87C7E3B8-B82C-459E-AE23-FFE2D952481F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.105",
|
||||
"matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.46",
|
||||
"matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.10.5",
|
||||
"matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/15b7a03205b31bc5623378c190d22b7ff60026f1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/40f3d5cb0e0cbf7fa697913a27d5d361373bdcf5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/51d87f11dd199bbc6a85982b088ff27bde53b48a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/535df7f896a568a8a1564114eaea49d002cb1747",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/643293b68fbb6c03f5e907736498da17d43f0d81",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a54da4b787dcac60b598da69c9c0072812b8282d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c80f454a805443c274394b1db0d1ebf477abd94e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e7e7d2b180d8f297cea6db43ea72402fd33e1a29",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,17 +2,41 @@
|
||||
"id": "CVE-2024-46300",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-07T17:15:15.610",
|
||||
"lastModified": "2024-10-07T20:35:11.433",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-10T18:52:42.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "itsourcecode Placement Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Full Name field in registration.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "itsourcecode Placement Management System 1.0 es vulnerable a cross-site scripting (XSS) a trav\u00e9s del campo Nombre completo en registration.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -36,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -47,14 +81,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/riya98241/CVE/blob/main/CVE-2024-46300",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portswigger.net/web-security/cross-site-scripting/stored",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-473xx/CVE-2024-47354.json
Normal file
56
CVE-2024/CVE-2024-473xx/CVE-2024-47354.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47354",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-10T19:15:16.837",
|
||||
"lastModified": "2024-10-10T19:15:16.837",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in smp7, wp.Insider Simple Membership After Login Redirection.This issue affects Simple Membership After Login Redirection: from n/a through 1.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-membership-after-login-redirection/wordpress-simple-membership-after-login-redirection-plugin-1-6-open-redirection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47410",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:04.540",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:26:44.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -41,8 +41,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -51,10 +61,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47411",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:04.793",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:26:54.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47412",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:05.017",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:27:02.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47413",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:05.210",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:27:08.210",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47414",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:05.417",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:27:17.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47415",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:05.627",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:27:30.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47416",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:05.830",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:27:39.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47417",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:06.060",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:27:46.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47418",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:06.277",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:28:04.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47419",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:06.480",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:28:19.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +71,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47420",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2024-10-09T10:15:06.660",
|
||||
"lastModified": "2024-10-10T12:51:56.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:28:26.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "23.0.0",
|
||||
"versionEndExcluding": "23.0.8",
|
||||
"matchCriteriaId": "54E2F85B-E498-4092-94CD-5FF311162444"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "24.0.0",
|
||||
"versionEndExcluding": "24.0.5",
|
||||
"matchCriteriaId": "0E0AFAFE-6669-4321-95EF-F67D428469BA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-476xx/CVE-2024-47636.json
Normal file
56
CVE-2024/CVE-2024-476xx/CVE-2024-47636.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47636",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-10T18:15:07.920",
|
||||
"lastModified": "2024-10-10T18:15:07.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in Eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-wp-jobsearch-plugin-2-5-9-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-476xx/CVE-2024-47648.json
Normal file
56
CVE-2024/CVE-2024-476xx/CVE-2024-47648.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47648",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-10-10T19:15:17.067",
|
||||
"lastModified": "2024-10-10T19:15:17.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in EventPrime Events EventPrime.This issue affects EventPrime: from n/a through 4.0.4.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-4-0-4-5-open-redirection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-479xx/CVE-2024-47962.json
Normal file
78
CVE-2024/CVE-2024-479xx/CVE-2024-47962.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-47962",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-10T18:15:08.183",
|
||||
"lastModified": "2024-10-10T18:15:08.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-479xx/CVE-2024-47963.json
Normal file
78
CVE-2024/CVE-2024-479xx/CVE-2024-47963.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-47963",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-10T18:15:08.330",
|
||||
"lastModified": "2024-10-10T18:15:08.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-479xx/CVE-2024-47964.json
Normal file
78
CVE-2024/CVE-2024-479xx/CVE-2024-47964.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-47964",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-10T18:15:08.470",
|
||||
"lastModified": "2024-10-10T18:15:08.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-479xx/CVE-2024-47965.json
Normal file
78
CVE-2024/CVE-2024-479xx/CVE-2024-47965.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-47965",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-10T18:15:08.587",
|
||||
"lastModified": "2024-10-10T18:15:08.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-479xx/CVE-2024-47966.json
Normal file
78
CVE-2024/CVE-2024-479xx/CVE-2024-47966.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-47966",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2024-10-10T18:15:08.710",
|
||||
"lastModified": "2024-10-10T18:15:08.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-457"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7801",
|
||||
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"published": "2024-10-04T20:15:07.440",
|
||||
"lastModified": "2024-10-07T17:48:28.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:48:37.270",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"type": "Secondary",
|
||||
@ -73,14 +105,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microchip:timeprovider_4100_grandmaster_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0",
|
||||
"versionEndExcluding": "2.4.7",
|
||||
"matchCriteriaId": "C2B755C3-0A88-49A4-AA98-8FF7160E7C91"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:microchip:timeprovider_4100_grandmaster:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6987284-9FEC-493F-AD20-7B173D82AD82"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-unathenticated-sql-injection",
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9054",
|
||||
"sourceIdentifier": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"published": "2024-10-04T20:15:07.587",
|
||||
"lastModified": "2024-10-07T17:48:28.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-10T18:46:08.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,9 +59,41 @@
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"type": "Secondary",
|
||||
@ -77,14 +109,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microchip:timeprovider_4100_grandmaster_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0",
|
||||
"versionEndExcluding": "2.4.7",
|
||||
"matchCriteriaId": "C2B755C3-0A88-49A4-AA98-8FF7160E7C91"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:microchip:timeprovider_4100_grandmaster:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6987284-9FEC-493F-AD20-7B173D82AD82"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-grandmaster-rce-through-configuration-file",
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5"
|
||||
"source": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-98xx/CVE-2024-9804.json
Normal file
141
CVE-2024/CVE-2024-98xx/CVE-2024-9804.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-9804",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T18:15:09.150",
|
||||
"lastModified": "2024-10-10T18:15:09.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/campsdetails.php. The manipulation of the argument hospital leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 5.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sternstundes/cve/blob/main/sql5-campdetails.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279952",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279952",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418618",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-98xx/CVE-2024-9805.json
Normal file
141
CVE-2024/CVE-2024-98xx/CVE-2024-9805.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-9805",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T18:15:09.440",
|
||||
"lastModified": "2024-10-10T18:15:09.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Blood Bank System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/campsdetails.php. The manipulation of the argument hospital/address/city/contact leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"hospital\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sternstundes/cve/blob/main/xss5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279953",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279953",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418619",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-98xx/CVE-2024-9806.json
Normal file
137
CVE-2024/CVE-2024-98xx/CVE-2024-9806.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-9806",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T19:15:17.520",
|
||||
"lastModified": "2024-10-10T19:15:17.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Craig Rodway Classroombookings up to 2.8.6 and classified as problematic. This vulnerability affects unknown code of the file /rooms/fields of the component Room Page. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.7 is able to address this issue. It is recommended to upgrade the affected component. The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/JunMing27/CVE/blob/main/CVE%20-%20classroombookings%20Cross%20Site%20Scripting%20(XSS)%20at%20custom%20field.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279958",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279958",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.418715",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2024/CVE-2024-98xx/CVE-2024-9807.json
Normal file
137
CVE-2024/CVE-2024-98xx/CVE-2024-9807.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2024-9807",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-10T19:15:17.797",
|
||||
"lastModified": "2024-10-10T19:15:17.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Craig Rodway Classroombookings 2.8.7 and classified as problematic. This issue affects some unknown processing of the file /sessions of the component Session Page. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.8.8 is able to address this issue. It is recommended to upgrade the affected component. The project maintainer was contacted early about the disclosure. He responded very quickly, friendly, and professional."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/JunMing27/CVE/blob/main/CVE%20-%20classroombookings%20Cross%20Site%20Scripting%20(XSS)%20at%20create%20and%20edit%20session%20page%20via%20Administrator%20Dashboard.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.279959",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.279959",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.419262",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-10T18:00:18.882198+00:00
|
||||
2024-10-10T20:00:17.856967+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-10T17:57:00.267000+00:00
|
||||
2024-10-10T19:55:20.253000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,50 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
265250
|
||||
265262
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2023-25581](CVE-2023/CVE-2023-255xx/CVE-2023-25581.json) (`2024-10-10T16:15:04.923`)
|
||||
- [CVE-2024-9793](CVE-2024/CVE-2024-97xx/CVE-2024-9793.json) (`2024-10-10T16:15:09.080`)
|
||||
- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-10T16:15:09.350`)
|
||||
- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-10T17:15:16.063`)
|
||||
- [CVE-2024-9799](CVE-2024/CVE-2024-97xx/CVE-2024-9799.json) (`2024-10-10T17:15:16.390`)
|
||||
- [CVE-2024-9803](CVE-2024/CVE-2024-98xx/CVE-2024-9803.json) (`2024-10-10T17:15:16.730`)
|
||||
- [CVE-2024-47354](CVE-2024/CVE-2024-473xx/CVE-2024-47354.json) (`2024-10-10T19:15:16.837`)
|
||||
- [CVE-2024-47636](CVE-2024/CVE-2024-476xx/CVE-2024-47636.json) (`2024-10-10T18:15:07.920`)
|
||||
- [CVE-2024-47648](CVE-2024/CVE-2024-476xx/CVE-2024-47648.json) (`2024-10-10T19:15:17.067`)
|
||||
- [CVE-2024-47962](CVE-2024/CVE-2024-479xx/CVE-2024-47962.json) (`2024-10-10T18:15:08.183`)
|
||||
- [CVE-2024-47963](CVE-2024/CVE-2024-479xx/CVE-2024-47963.json) (`2024-10-10T18:15:08.330`)
|
||||
- [CVE-2024-47964](CVE-2024/CVE-2024-479xx/CVE-2024-47964.json) (`2024-10-10T18:15:08.470`)
|
||||
- [CVE-2024-47965](CVE-2024/CVE-2024-479xx/CVE-2024-47965.json) (`2024-10-10T18:15:08.587`)
|
||||
- [CVE-2024-47966](CVE-2024/CVE-2024-479xx/CVE-2024-47966.json) (`2024-10-10T18:15:08.710`)
|
||||
- [CVE-2024-9804](CVE-2024/CVE-2024-98xx/CVE-2024-9804.json) (`2024-10-10T18:15:09.150`)
|
||||
- [CVE-2024-9805](CVE-2024/CVE-2024-98xx/CVE-2024-9805.json) (`2024-10-10T18:15:09.440`)
|
||||
- [CVE-2024-9806](CVE-2024/CVE-2024-98xx/CVE-2024-9806.json) (`2024-10-10T19:15:17.520`)
|
||||
- [CVE-2024-9807](CVE-2024/CVE-2024-98xx/CVE-2024-9807.json) (`2024-10-10T19:15:17.797`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `50`
|
||||
Recently modified CVEs: `24`
|
||||
|
||||
- [CVE-2023-49262](CVE-2023/CVE-2023-492xx/CVE-2023-49262.json) (`2024-10-10T16:15:06.893`)
|
||||
- [CVE-2023-5378](CVE-2023/CVE-2023-53xx/CVE-2023-5378.json) (`2024-10-10T16:15:07.540`)
|
||||
- [CVE-2023-6551](CVE-2023/CVE-2023-65xx/CVE-2023-6551.json) (`2024-10-10T16:15:07.720`)
|
||||
- [CVE-2023-6998](CVE-2023/CVE-2023-69xx/CVE-2023-6998.json) (`2024-10-10T16:15:07.850`)
|
||||
- [CVE-2024-0864](CVE-2024/CVE-2024-08xx/CVE-2024-0864.json) (`2024-10-10T16:15:07.990`)
|
||||
- [CVE-2024-1604](CVE-2024/CVE-2024-16xx/CVE-2024-1604.json) (`2024-10-10T16:15:08.103`)
|
||||
- [CVE-2024-1605](CVE-2024/CVE-2024-16xx/CVE-2024-1605.json) (`2024-10-10T16:15:08.220`)
|
||||
- [CVE-2024-2759](CVE-2024/CVE-2024-27xx/CVE-2024-2759.json) (`2024-10-10T16:15:08.360`)
|
||||
- [CVE-2024-3462](CVE-2024/CVE-2024-34xx/CVE-2024-3462.json) (`2024-10-10T16:15:08.497`)
|
||||
- [CVE-2024-35202](CVE-2024/CVE-2024-352xx/CVE-2024-35202.json) (`2024-10-10T16:35:11.390`)
|
||||
- [CVE-2024-35687](CVE-2024/CVE-2024-356xx/CVE-2024-35687.json) (`2024-10-10T16:59:04.827`)
|
||||
- [CVE-2024-41817](CVE-2024/CVE-2024-418xx/CVE-2024-41817.json) (`2024-10-10T17:25:47.637`)
|
||||
- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2024-10-10T17:57:00.267`)
|
||||
- [CVE-2024-44958](CVE-2024/CVE-2024-449xx/CVE-2024-44958.json) (`2024-10-10T17:56:24.467`)
|
||||
- [CVE-2024-44959](CVE-2024/CVE-2024-449xx/CVE-2024-44959.json) (`2024-10-10T17:54:07.960`)
|
||||
- [CVE-2024-44976](CVE-2024/CVE-2024-449xx/CVE-2024-44976.json) (`2024-10-10T17:50:14.863`)
|
||||
- [CVE-2024-44977](CVE-2024/CVE-2024-449xx/CVE-2024-44977.json) (`2024-10-10T17:47:59.593`)
|
||||
- [CVE-2024-44979](CVE-2024/CVE-2024-449xx/CVE-2024-44979.json) (`2024-10-10T17:44:36.417`)
|
||||
- [CVE-2024-44980](CVE-2024/CVE-2024-449xx/CVE-2024-44980.json) (`2024-10-10T17:42:53.433`)
|
||||
- [CVE-2024-44982](CVE-2024/CVE-2024-449xx/CVE-2024-44982.json) (`2024-10-10T17:09:54.350`)
|
||||
- [CVE-2024-44984](CVE-2024/CVE-2024-449xx/CVE-2024-44984.json) (`2024-10-10T16:48:56.167`)
|
||||
- [CVE-2024-44988](CVE-2024/CVE-2024-449xx/CVE-2024-44988.json) (`2024-10-10T16:44:14.767`)
|
||||
- [CVE-2024-4748](CVE-2024/CVE-2024-47xx/CVE-2024-4748.json) (`2024-10-10T16:15:08.630`)
|
||||
- [CVE-2024-7265](CVE-2024/CVE-2024-72xx/CVE-2024-7265.json) (`2024-10-10T16:15:08.763`)
|
||||
- [CVE-2024-7266](CVE-2024/CVE-2024-72xx/CVE-2024-7266.json) (`2024-10-10T16:15:08.910`)
|
||||
- [CVE-2017-1000487](CVE-2017/CVE-2017-10004xx/CVE-2017-1000487.json) (`2024-10-10T19:55:20.253`)
|
||||
- [CVE-2022-22969](CVE-2022/CVE-2022-229xx/CVE-2022-22969.json) (`2024-10-10T19:13:58.310`)
|
||||
- [CVE-2024-20091](CVE-2024/CVE-2024-200xx/CVE-2024-20091.json) (`2024-10-10T18:06:38.370`)
|
||||
- [CVE-2024-20093](CVE-2024/CVE-2024-200xx/CVE-2024-20093.json) (`2024-10-10T18:06:57.333`)
|
||||
- [CVE-2024-20095](CVE-2024/CVE-2024-200xx/CVE-2024-20095.json) (`2024-10-10T18:07:22.267`)
|
||||
- [CVE-2024-20096](CVE-2024/CVE-2024-200xx/CVE-2024-20096.json) (`2024-10-10T18:07:38.557`)
|
||||
- [CVE-2024-20097](CVE-2024/CVE-2024-200xx/CVE-2024-20097.json) (`2024-10-10T18:07:52.507`)
|
||||
- [CVE-2024-20102](CVE-2024/CVE-2024-201xx/CVE-2024-20102.json) (`2024-10-10T18:20:31.820`)
|
||||
- [CVE-2024-30118](CVE-2024/CVE-2024-301xx/CVE-2024-30118.json) (`2024-10-10T18:50:54.383`)
|
||||
- [CVE-2024-44954](CVE-2024/CVE-2024-449xx/CVE-2024-44954.json) (`2024-10-10T18:02:42.307`)
|
||||
- [CVE-2024-46300](CVE-2024/CVE-2024-463xx/CVE-2024-46300.json) (`2024-10-10T18:52:42.790`)
|
||||
- [CVE-2024-47410](CVE-2024/CVE-2024-474xx/CVE-2024-47410.json) (`2024-10-10T18:26:44.857`)
|
||||
- [CVE-2024-47411](CVE-2024/CVE-2024-474xx/CVE-2024-47411.json) (`2024-10-10T18:26:54.153`)
|
||||
- [CVE-2024-47412](CVE-2024/CVE-2024-474xx/CVE-2024-47412.json) (`2024-10-10T18:27:02.867`)
|
||||
- [CVE-2024-47413](CVE-2024/CVE-2024-474xx/CVE-2024-47413.json) (`2024-10-10T18:27:08.210`)
|
||||
- [CVE-2024-47414](CVE-2024/CVE-2024-474xx/CVE-2024-47414.json) (`2024-10-10T18:27:17.123`)
|
||||
- [CVE-2024-47415](CVE-2024/CVE-2024-474xx/CVE-2024-47415.json) (`2024-10-10T18:27:30.467`)
|
||||
- [CVE-2024-47416](CVE-2024/CVE-2024-474xx/CVE-2024-47416.json) (`2024-10-10T18:27:39.187`)
|
||||
- [CVE-2024-47417](CVE-2024/CVE-2024-474xx/CVE-2024-47417.json) (`2024-10-10T18:27:46.470`)
|
||||
- [CVE-2024-47418](CVE-2024/CVE-2024-474xx/CVE-2024-47418.json) (`2024-10-10T18:28:04.387`)
|
||||
- [CVE-2024-47419](CVE-2024/CVE-2024-474xx/CVE-2024-47419.json) (`2024-10-10T18:28:19.330`)
|
||||
- [CVE-2024-47420](CVE-2024/CVE-2024-474xx/CVE-2024-47420.json) (`2024-10-10T18:28:26.860`)
|
||||
- [CVE-2024-7801](CVE-2024/CVE-2024-78xx/CVE-2024-7801.json) (`2024-10-10T18:48:37.270`)
|
||||
- [CVE-2024-9054](CVE-2024/CVE-2024-90xx/CVE-2024-9054.json) (`2024-10-10T18:46:08.743`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
172
_state.csv
172
_state.csv
@ -94063,7 +94063,7 @@ CVE-2017-1000483,0,0,2c782e716e646464be3ff1c28e8962cef86475bfaafb3e5b53340fee0d5
|
||||
CVE-2017-1000484,0,0,dca237d697eeaf1adf4df9dc3fe43bba4871b23225ab8d5ea64d75a83c91b7c7,2018-01-18T22:39:31.510000
|
||||
CVE-2017-1000485,0,0,9712b765c25719d687e98f07dbc6c374e8514510a8409ec752de40b515fcd95a,2019-10-03T00:03:26.223000
|
||||
CVE-2017-1000486,0,0,e1b0bf8479f211a6c6c4b3e7c0ee2cac4c56bbddcbe5cf37242188c85895a04f,2018-01-24T14:05:05.860000
|
||||
CVE-2017-1000487,0,0,4729907ee0b177103f48a95d1f8d5daf8dcbec0d92e0cbc66a472c6df9cecea3,2023-11-07T02:37:57.687000
|
||||
CVE-2017-1000487,0,1,fe2a151eaded6eb7758df45258122f096dcee65ffe680c74a0a383861f8cbd30,2024-10-10T19:55:20.253000
|
||||
CVE-2017-1000488,0,0,259d9550f380c60535f60918d3312a959d6ffda0c46bc64ece9306a6bf27a222,2021-01-25T16:51:54.423000
|
||||
CVE-2017-1000489,0,0,be1903f47143d543c423ca8dcfc5ba1434d844fb3f1a7cb442e985e1df4e4331,2021-01-25T16:51:54.423000
|
||||
CVE-2017-1000490,0,0,e8418584a1c0602ae01cefc26bb42542d505599f78913768c7bdde7f81f021ec,2021-01-25T16:51:54.423000
|
||||
@ -170947,9 +170947,9 @@ CVE-2021-25087,0,0,19e5de177e018eddf6d5a6875036f53b78d429deae8efad633fa9b91298bb
|
||||
CVE-2021-25088,0,0,bee661c44eb6e65b60a9fe52fbaf1b4775a92328a5411f570fc6063c67f7c58f,2022-06-30T14:24:30.540000
|
||||
CVE-2021-25089,0,0,05895cbf1b9443f106297e5a92634828df29f4af7bea5d81a44de2796a1dcd7d,2022-02-04T18:01:22.500000
|
||||
CVE-2021-25090,0,0,26860aa3f36d9e491890e7d184049cf51fe3e428cd51d8077cad8e49275b8957,2022-04-15T17:47:52.203000
|
||||
CVE-2021-25091,0,1,8f745090ccc214dd2d75ed946d82ed1b8ab0a89279191b5a9c71a893e0773959,2024-10-10T16:59:04.827000
|
||||
CVE-2021-25092,0,1,7208f7393a679602468fe51538ce3b460fd0f12c45d7cc136ad2af27660acbff,2024-10-10T16:59:04.827000
|
||||
CVE-2021-25093,0,1,c497c0cbefa1ee70d7e5d10f8442a98df74e697472aa9c3039a2ca06c18921f7,2024-10-10T16:59:04.827000
|
||||
CVE-2021-25091,0,0,8f745090ccc214dd2d75ed946d82ed1b8ab0a89279191b5a9c71a893e0773959,2024-10-10T16:59:04.827000
|
||||
CVE-2021-25092,0,0,7208f7393a679602468fe51538ce3b460fd0f12c45d7cc136ad2af27660acbff,2024-10-10T16:59:04.827000
|
||||
CVE-2021-25093,0,0,c497c0cbefa1ee70d7e5d10f8442a98df74e697472aa9c3039a2ca06c18921f7,2024-10-10T16:59:04.827000
|
||||
CVE-2021-25094,0,0,dd533dc3cc92acef1f59bb6a4350acbdf9cca7aaabbf023b4f276daed6440190,2022-11-09T21:26:14.653000
|
||||
CVE-2021-25095,0,0,8c78162e663a846060fb12d9533a13fc81591ecca36fca2f037661d2c2237d5e,2022-12-09T18:55:26.423000
|
||||
CVE-2021-25096,0,0,fd5053d87489fe09b1d48cb8e7c1b0f4ca149e5e22ee43ef2fa1caa855f416a6,2022-02-10T22:07:50.717000
|
||||
@ -181126,12 +181126,12 @@ CVE-2021-39114,0,0,91bb300b928a2e7c1d42863cf149e080ec34fb17bb3f12f372376e10a70a3
|
||||
CVE-2021-39115,0,0,3edadea3bb79510465312b5ed43b357dd9837c0ef0dbf8d050d2cfbe35d4b421,2022-04-25T18:16:18.227000
|
||||
CVE-2021-39116,0,0,a42315d93d2fd10c554b2c15934daf6b946942b74ba2ba4fbf662199cd5b29b6,2022-03-28T16:18:14.047000
|
||||
CVE-2021-39117,0,0,0f5bdd3a21f39c9eaa09674f49f313b346bf46d979c65d077a542c986dc638e1,2021-09-02T02:41:23.137000
|
||||
CVE-2021-39118,0,1,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000
|
||||
CVE-2021-39118,0,0,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000
|
||||
CVE-2021-39119,0,0,19d82c9ad15e2315e337669b0ea8aa57ac063c6e8f2ab13ad8070419810cfcfb,2022-07-12T17:42:04.277000
|
||||
CVE-2021-3912,0,0,e8c5a6132b4c804f3ef396cb77b6bb9032c86570b20db73e367107d41f114ccb,2022-08-09T14:39:02.117000
|
||||
CVE-2021-39121,0,0,633d5656fffda0e45c49d4bc8d151e90cce078ce60d3d369ea3f30579930e1fe,2022-03-30T13:29:49.280000
|
||||
CVE-2021-39122,0,1,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000
|
||||
CVE-2021-39123,0,1,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8aa41,2024-10-10T16:35:02.213000
|
||||
CVE-2021-39122,0,0,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000
|
||||
CVE-2021-39123,0,0,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8aa41,2024-10-10T16:35:02.213000
|
||||
CVE-2021-39124,0,0,2b58fd447d3cafa91334dabd9357b993b27ae7c16f1985b8ba8afc2558c4088b,2022-02-24T20:18:49.327000
|
||||
CVE-2021-39125,0,0,4c8f1895e82d1bcd913a7b42e9a1b5d82429da426af796f023bfb884e96ba7ec,2024-10-09T17:35:02.380000
|
||||
CVE-2021-39126,0,0,c5fcfc69aba84d73b9f8c74c936a36d81151cadeddc7fa2ff49085a699b83f32,2022-04-15T15:29:12.737000
|
||||
@ -192195,7 +192195,7 @@ CVE-2022-22965,0,0,2f519047b5be7b5c3f740bb5079cac81215716a27fbb5a4a7014ed00bba97
|
||||
CVE-2022-22966,0,0,cbd6dd93b6a16428418469cc7e7df48ccddd4621e61eb17f42baa53a218153a5,2022-04-22T15:54:21.460000
|
||||
CVE-2022-22967,0,0,5d3cbaf95f637bfc190cb5e394da4e7c5b2b3716a498c6a0bccb9201ece5f423,2023-12-21T18:44:00.137000
|
||||
CVE-2022-22968,0,0,76d2d0e04e7a2561ee37c3b7751375bfc36c7f92b02395c774552bc434e32869,2022-10-19T15:15:02.103000
|
||||
CVE-2022-22969,0,0,73d67e70fab7f7178c157bb0b6b0b030bd964048ff40d5e3dc8b300936044056,2023-08-08T14:22:24.967000
|
||||
CVE-2022-22969,0,1,abbb62a9ae0a4ff9429cdf938c758920e7b6f332d1fce63b31d08e57e955cdbc,2024-10-10T19:13:58.310000
|
||||
CVE-2022-2297,0,0,4ef9b306875b455f4c7b78b1739f984226e0ad348ea6f2264c92121001a18d12,2024-09-07T12:56:42.300000
|
||||
CVE-2022-22970,0,0,d980c314d1c11d3685960089d98db960d9c321630b3b200ca331bc9f8185909b,2022-10-07T13:17:11.233000
|
||||
CVE-2022-22971,0,0,496751d18943e5335d8ad064b55f3d5280912afd4eb0d251bf18e253a42fb0b5,2022-10-05T16:54:41.663000
|
||||
@ -207577,7 +207577,7 @@ CVE-2022-41986,0,0,ee6e9ef066ba8c5459920520ed62fd3d1ecc23c4fd518353f99769eb13ab0
|
||||
CVE-2022-41987,0,0,973b71f1dab2e2d56c71d687723d5c44031c8553347583b75d1661405fd6e442,2023-05-31T22:47:06.207000
|
||||
CVE-2022-41988,0,0,d84d73f7ebcefc94a40d46de0942ff010bc2553936ab9fef99b206cfa4aec137,2023-05-30T06:15:24.370000
|
||||
CVE-2022-41989,0,0,3ac83e6f430f25af669f4a1c5f38227f6c1e7b17a93a5ca5588faf3f237ae764,2023-11-07T03:53:11.200000
|
||||
CVE-2022-4199,0,1,e8ddc903285ebf1515513113098cbd32df397061ee6caf54c2302be597b7fb65,2024-10-10T16:59:04.827000
|
||||
CVE-2022-4199,0,0,e8ddc903285ebf1515513113098cbd32df397061ee6caf54c2302be597b7fb65,2024-10-10T16:59:04.827000
|
||||
CVE-2022-41990,0,0,9034b3c666ccb8516dcb1cb446205c1217b17de23ff758726eeef9b5ab2a0cb9,2024-01-24T18:44:19.600000
|
||||
CVE-2022-41991,0,0,59d444d31b0a538de290798d8cadedf1819a417ebd6154c3e1e4a9a386d6b539,2023-02-06T17:28:53.793000
|
||||
CVE-2022-41992,0,0,baf225fe84f3f52e61816c353969d1e421b989ba6be07e7177d1f64b7bd91e9f,2022-12-22T13:08:10.897000
|
||||
@ -215083,12 +215083,12 @@ CVE-2023-20823,0,0,e5030abbdc1b76a1fdf724e78a79e9447430af00d8598a10a707b12f48ab9
|
||||
CVE-2023-20824,0,0,6caacf9d3f8a58027c0dab9caf4b9b264fdfa1d70dcd710a95edcc7d198dbed4,2023-09-07T19:06:55.563000
|
||||
CVE-2023-20825,0,0,3b7e714e9925156ab37c943a82248f5bb6cc462ec9ffd9479518f0eaa72d4ea8,2023-09-07T19:14:16.880000
|
||||
CVE-2023-20826,0,0,f19cc9ee6c42e884beea40f74b7dd27c757677880dca33965287532349a24c24,2023-09-07T19:13:15.787000
|
||||
CVE-2023-20827,0,1,83bbd7748b521833d1c4e47e1d930c6efc13da73425f93940cd5870a89858ab8,2024-10-10T16:35:03.543000
|
||||
CVE-2023-20828,0,1,f7fc852afc53227ebfac9ed12d8d9bf27249e792c863286dbe616fd7f942976d,2024-10-10T16:35:04.517000
|
||||
CVE-2023-20829,0,1,dfa93302be3736a2d42f62642d511aa3a1c70f4594e227fe1b2a98e2c69bf4d9,2024-10-10T16:35:05.527000
|
||||
CVE-2023-20827,0,0,83bbd7748b521833d1c4e47e1d930c6efc13da73425f93940cd5870a89858ab8,2024-10-10T16:35:03.543000
|
||||
CVE-2023-20828,0,0,f7fc852afc53227ebfac9ed12d8d9bf27249e792c863286dbe616fd7f942976d,2024-10-10T16:35:04.517000
|
||||
CVE-2023-20829,0,0,dfa93302be3736a2d42f62642d511aa3a1c70f4594e227fe1b2a98e2c69bf4d9,2024-10-10T16:35:05.527000
|
||||
CVE-2023-2083,0,0,cee4396e30e25258287b1e489d3bf3b3f1eef2f0033a51dfea6bffe2ec1286c2,2023-11-07T04:11:54.640000
|
||||
CVE-2023-20830,0,1,6a02392b6a6fe91a83233632455d7b661d82c5d0733c61d40940a5da6781c68c,2024-10-10T16:35:07.153000
|
||||
CVE-2023-20831,0,1,a7bd9cc2fd769f7a7f78cbf92dbd0df138f255abd6200025975d1d20633911f3,2024-10-10T16:35:08.083000
|
||||
CVE-2023-20830,0,0,6a02392b6a6fe91a83233632455d7b661d82c5d0733c61d40940a5da6781c68c,2024-10-10T16:35:07.153000
|
||||
CVE-2023-20831,0,0,a7bd9cc2fd769f7a7f78cbf92dbd0df138f255abd6200025975d1d20633911f3,2024-10-10T16:35:08.083000
|
||||
CVE-2023-20832,0,0,05c466968e672a55e813b676aa2e07e30bcd43922fbe2ea39969f9ca4c1ecc0c,2024-10-04T15:35:02.997000
|
||||
CVE-2023-20833,0,0,0d4fbfbfcfca4b8d072b58089465cf19c7295168fffc28d5689dd850a4e87f39,2023-09-07T19:08:21.983000
|
||||
CVE-2023-20834,0,0,2fa6eb5f722248d938b7f55db6fa9eb5c85a7a23b1dd1c297a61b4fbff51fb9d,2023-09-07T19:08:44.343000
|
||||
@ -219117,7 +219117,7 @@ CVE-2023-25577,0,0,5ee92e0558fbce9bd773a8afe897565bfdaa982c0f4ad7e71e954409a79ac
|
||||
CVE-2023-25578,0,0,a34c5a3bd74c9feff4c9c3173b48f4aebcbdb41926b496db508268725eb1d80a,2023-11-07T04:09:01.430000
|
||||
CVE-2023-25579,0,0,a6c9e68a845dd568c2130b08183545a22df0a4df1e1473c0c5450b50e5f8d3f7,2023-03-03T15:09:20.680000
|
||||
CVE-2023-2558,0,0,b36d9018fbad440af935b7a05f8181b9f5920728ee39953642c99c7cad89beda,2023-11-07T04:12:52.760000
|
||||
CVE-2023-25581,1,1,579c0aad7d867cae9a73ee2c9d8422836a716e4fd5e18a78c07bdbbb7a948afa,2024-10-10T16:15:04.923000
|
||||
CVE-2023-25581,0,0,579c0aad7d867cae9a73ee2c9d8422836a716e4fd5e18a78c07bdbbb7a948afa,2024-10-10T16:15:04.923000
|
||||
CVE-2023-25582,0,0,232d943891f8f503b5ec3e85110e47e18b7fb6075027f0a7fcc0c9807f79fac9,2023-07-12T15:05:19.617000
|
||||
CVE-2023-25583,0,0,90cb5ae4facc7427ba0ec7a3aba488de3ea49316450585c3a592993efe3ec3d7,2023-07-12T15:18:34.447000
|
||||
CVE-2023-25584,0,0,28b5e4e1071105b09a7a0fe37c814dcf7b81d264417fa64df5b4f0851185a205,2024-02-23T18:51:09.787000
|
||||
@ -219297,7 +219297,7 @@ CVE-2023-25769,0,0,198ca9c61d051c8c694de7cff750ffa8d39aeb715958a8ab2b3e781df2601
|
||||
CVE-2023-25770,0,0,c196f3f59a9ed379f3033392f5332da695ce96226441cec597553d40d2c90803,2024-04-22T16:15:12.870000
|
||||
CVE-2023-25771,0,0,0a40ade9e4b633e2e25c64b41412f6cf20b10475ee3b92ce849eec7e304b725e,2023-11-07T04:09:10.947000
|
||||
CVE-2023-25772,0,0,a0a863d580e53f497e70eeff0d4bd28ff51b949ec7490c2b052c7aaa57fffae7,2023-11-07T04:09:11.190000
|
||||
CVE-2023-25773,0,1,c8a4a4c116ed5d896279b6cb93fadbf0a6a145a41b80291e643b9b92633bb181,2024-10-10T16:35:09.100000
|
||||
CVE-2023-25773,0,0,c8a4a4c116ed5d896279b6cb93fadbf0a6a145a41b80291e643b9b92633bb181,2024-10-10T16:35:09.100000
|
||||
CVE-2023-25774,0,0,50f00eb85c9a6f3939ad3ac3d2f8701f08cab7d7ec6691ef9981e83d63419194,2023-10-18T17:53:08.367000
|
||||
CVE-2023-25775,0,0,9e0931d7bb83de9c26f9ad076dcda45420d6c5a1e995b56352243c3259380610,2024-01-11T21:15:10.030000
|
||||
CVE-2023-25776,0,0,a5c9a6507e4e8061236842380ca8385e80281fc571d20401f84423392270b8fa,2023-11-07T04:09:11.693000
|
||||
@ -219525,7 +219525,7 @@ CVE-2023-26022,0,0,e0cd395060def6af839f53ca17359e6fe07ff5b74e3efa90c2588e10aba9c
|
||||
CVE-2023-26023,0,0,bf7f45eb43f656e5a2c0034397287ee8bde96ac526309a673ae112ef759ff9a6,2023-07-28T14:02:42.573000
|
||||
CVE-2023-26024,0,0,db59bc89cdf9d3cbfb06338ac5b62513dd0547a1a4f051c439caafcace4d191b,2023-12-06T18:51:10.323000
|
||||
CVE-2023-26026,0,0,9d4fc8ae77db69c6c04dc4dd3fae29dc591b099947fecb438ca71d1c94800582,2023-07-28T16:36:20.187000
|
||||
CVE-2023-2603,0,1,4a60df169eea5dff83ba6df411dcf1103a34959027fdc74feb414d60c9098ed0,2024-10-10T16:32:56.777000
|
||||
CVE-2023-2603,0,0,4a60df169eea5dff83ba6df411dcf1103a34959027fdc74feb414d60c9098ed0,2024-10-10T16:32:56.777000
|
||||
CVE-2023-26031,0,0,3c1225c9f1cc3a824a50548b415ab5a795739af789c2ff216b590967c4819438,2024-08-01T13:43:31.307000
|
||||
CVE-2023-26032,0,0,73f981053207ef66bd42c47f91689994979ec8c8290fe7f9acad2a7d7aba765e,2023-11-07T04:09:17.300000
|
||||
CVE-2023-26033,0,0,e9bef52edabfb15f3fd145610458b9c83a92e0d7fa6697fbaccc32ad54c639c0,2023-03-06T18:54:30.003000
|
||||
@ -231957,9 +231957,9 @@ CVE-2023-42130,0,0,0241b38800c234ec8e4a2ff16f40e83d68c56ec86a9b4257cd78b46e40a43
|
||||
CVE-2023-42131,0,0,4e0f01a335565af1d2caffbcb3515b0a5bc3abdb5520eb1e67adabde374601fe,2024-09-18T19:15:36.553000
|
||||
CVE-2023-42132,0,0,b3614605e58c2ad6bb3381e3dd9a9ae21953bc0309c61010e3af35ddfe93114f,2023-10-03T20:56:24.067000
|
||||
CVE-2023-42134,0,0,4ee57071d16fbebb2fd73b2c73a537f320f9d80ad77a4c87162327571d527be7,2024-01-19T16:14:39.460000
|
||||
CVE-2023-42135,0,1,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000
|
||||
CVE-2023-42136,0,1,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000
|
||||
CVE-2023-42137,0,1,c966cfe4f9f72b0b343b6e5bc55f130bed0f505de6f9e1585674a3d65dbc321f,2024-10-10T16:15:06.090000
|
||||
CVE-2023-42135,0,0,afc51742bb55c141f44e3c071a949b928f7fc168a8f3df1a2cc739282f45f1b6,2024-10-10T16:15:05.690000
|
||||
CVE-2023-42136,0,0,3cb425be70508b6a679f0aab3db264515ab3c51689b6da64cb1007c415646915,2024-10-10T16:15:05.880000
|
||||
CVE-2023-42137,0,0,c966cfe4f9f72b0b343b6e5bc55f130bed0f505de6f9e1585674a3d65dbc321f,2024-10-10T16:15:06.090000
|
||||
CVE-2023-42138,0,0,229b19fe75a25194eeeceeed8dd7d2cb66ba39737de630ef3ead70362964246b,2023-10-18T19:57:05.243000
|
||||
CVE-2023-4214,0,0,819da04ab354ee39aabca649e2dd617af7bc8556f065736471274ad51ec00604,2023-11-25T02:12:54.557000
|
||||
CVE-2023-42143,0,0,6c09d38ca58ec27b89dd2edb91a7d385bfff81e0d5504c4d608be4afbef841ea,2024-01-31T16:57:18.603000
|
||||
@ -234032,7 +234032,7 @@ CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694
|
||||
CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000
|
||||
CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000
|
||||
CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000
|
||||
CVE-2023-4537,0,1,eea3b8def9553f8b072fdf468cb4f4f9b040c5e8850ac6668a829484a8fdd935,2024-10-10T16:15:06.990000
|
||||
CVE-2023-4537,0,0,eea3b8def9553f8b072fdf468cb4f4f9b040c5e8850ac6668a829484a8fdd935,2024-10-10T16:15:06.990000
|
||||
CVE-2023-45370,0,0,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000
|
||||
CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000
|
||||
CVE-2023-45372,0,0,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000
|
||||
@ -234057,7 +234057,7 @@ CVE-2023-45391,0,0,9c0fd5516832886de6f7034699893261e3bea437e0ea5d4edc791da17fd46
|
||||
CVE-2023-45393,0,0,c1fb02f3a6040b11d75e76a87aac1d917a2141d0d313b00964f7b7e953d37259,2023-10-20T17:09:10.553000
|
||||
CVE-2023-45394,0,0,a4b4f063ff375dd7ab74a1a8d1c641e98ad0cb4a4cc340067fe632ab3db64424,2023-10-30T15:29:24.470000
|
||||
CVE-2023-45396,0,0,a9c3245ef3981c277f6e35bb37ce5839a8934f2abfbc3e4742e599437dabb487,2023-11-07T04:21:45.490000
|
||||
CVE-2023-4540,0,1,454dcfbbb42131d02ef2de39e6b50d769b0e902beec03a837e810055e3fa53c4,2024-10-10T16:15:07.110000
|
||||
CVE-2023-4540,0,0,454dcfbbb42131d02ef2de39e6b50d769b0e902beec03a837e810055e3fa53c4,2024-10-10T16:15:07.110000
|
||||
CVE-2023-4541,0,0,e6c5b595e1802a5ff24ab31b4fe094c0626b7d35f33552e6362bd8cefaa24697,2024-01-08T18:49:41.183000
|
||||
CVE-2023-4542,0,0,08b69d675d8a1c1e0ff7f35c28444e73725292dffb22cba8268ef60d8afdb0cd,2024-05-17T02:31:38.280000
|
||||
CVE-2023-4543,0,0,dc1ba3a33cff31b8fca78e8cb21ccb021964ab63d67083a56dc6088e7b3319cb,2024-05-17T02:31:38.390000
|
||||
@ -234537,7 +234537,7 @@ CVE-2023-46116,0,0,32b4d7ad1ade33016b0db1435d5658983da94db4596e866b4681196d84a04
|
||||
CVE-2023-46117,0,0,121f23ec03c8bfaf7add309657ccc2b1ffeb80e620568dd23fbae288673558b3,2023-10-28T03:48:19.117000
|
||||
CVE-2023-46118,0,0,2aa54fb6f1645b23b925b0febacb85bd2e2906b6fd47ae5d3d57a7dea4fa70d4,2023-12-14T01:15:08.103000
|
||||
CVE-2023-46119,0,0,188517dc1713ce67d106802c5ad12899f4256143eda10dbeb48b8cf0d28ac511,2023-11-01T17:09:01.520000
|
||||
CVE-2023-4612,0,1,01d7a15f58bf2babc855c5767a299377da4c90f0f3df23aa6271c6ffec670599,2024-10-10T16:15:07.260000
|
||||
CVE-2023-4612,0,0,01d7a15f58bf2babc855c5767a299377da4c90f0f3df23aa6271c6ffec670599,2024-10-10T16:15:07.260000
|
||||
CVE-2023-46120,0,0,6e468d84efc420bb6523b981da81618dcba67cf9ae9e183627575d464dc63c85,2023-11-01T16:42:03.003000
|
||||
CVE-2023-46121,0,0,b7e0c927c4dcd3e846e6bd7603e2bace09835d7b7a24801aa9322bb54baaa1f8,2023-11-22T15:05:37.027000
|
||||
CVE-2023-46122,0,0,77ece346cd29f8df5fbc9b6dc7a110d1754062db3ff45e353933b3597d9c5458,2023-10-31T14:52:24.573000
|
||||
@ -235948,7 +235948,7 @@ CVE-2023-4817,0,0,66b9317b8b341b3c6f85e7870e90748e4d6a86dfea30b64fc5b4019933f60d
|
||||
CVE-2023-48171,0,0,6326cb8d81d428a9f4381270fc2ce963d0ad0058312b77c3d694b3258e3a7cbb,2024-09-18T18:54:08.080000
|
||||
CVE-2023-48172,0,0,0e78c6c737f4aa94c295f39e3b2f6c04b05dd97deb3b6a7475ffc20424f8ee86,2023-12-09T04:46:27.490000
|
||||
CVE-2023-48176,0,0,5229479ea70d793012d98b28f5832b18c29ca0585926ac2e2e1991c088531620,2023-11-30T20:21:54.850000
|
||||
CVE-2023-4818,0,1,c9f685e7feb9907c1838dc5c22479dcdaf800947aa0e477285b5b32cee6e423c,2024-10-10T16:15:07.403000
|
||||
CVE-2023-4818,0,0,c9f685e7feb9907c1838dc5c22479dcdaf800947aa0e477285b5b32cee6e423c,2024-10-10T16:15:07.403000
|
||||
CVE-2023-48183,0,0,e30177454f59bb0f06584d26feaa9f110fa0ec2af3bd7711cda6932b65226702,2024-07-03T01:42:18.010000
|
||||
CVE-2023-48184,0,0,2a3c5af64fd53e932537ccff83557b108ba1700dbb22cbbe968d9532a829a3fb,2024-07-03T01:42:18.813000
|
||||
CVE-2023-48185,0,0,fb1a8a21d098ed36db5f2ffae494f226b32c201c926520d79e5da8af6f3638dd,2023-12-02T00:21:40.093000
|
||||
@ -236868,14 +236868,14 @@ CVE-2023-49252,0,0,6696676ea138bbbe3898a0462d8349d55e4aa53c82758205c6683cad9207a
|
||||
CVE-2023-49253,0,0,39190be26437367f0cb128dcd19588699a00c78d11d0cabd94b801e94a74f9b6,2024-01-18T21:14:22.820000
|
||||
CVE-2023-49254,0,0,f34419f08bdce6ccb5f0124295abfdffd452c9485f4a1c06bc7fd8b241598e11,2024-01-18T21:14:11.877000
|
||||
CVE-2023-49255,0,0,bc83c3f00ff6ea1845ee64d5acf6a80c765b032e9814e7dcd665e4aa5a04acbc,2024-01-19T02:11:57.800000
|
||||
CVE-2023-49256,0,1,1fe21d50c5e8b0fde1b1aeab802f4db220d1674b9d434fbf5d6ee24127c69ec7,2024-10-10T16:15:06.313000
|
||||
CVE-2023-49257,0,1,c31f878e5552c04f8a82115b35872a15a6ed05c684d69a1210e2832df83e342b,2024-10-10T16:15:06.553000
|
||||
CVE-2023-49256,0,0,1fe21d50c5e8b0fde1b1aeab802f4db220d1674b9d434fbf5d6ee24127c69ec7,2024-10-10T16:15:06.313000
|
||||
CVE-2023-49257,0,0,c31f878e5552c04f8a82115b35872a15a6ed05c684d69a1210e2832df83e342b,2024-10-10T16:15:06.553000
|
||||
CVE-2023-49258,0,0,a15e9f4b25aa211e384ddcd9096065a9180748cd045a91be89f41ec1efaa7319,2024-01-18T20:38:29.220000
|
||||
CVE-2023-49259,0,1,ec3adc3a7840a7661f1b002dec4a07aa624dd034829c5b4ec8b6632211624a03,2024-10-10T16:15:06.680000
|
||||
CVE-2023-49259,0,0,ec3adc3a7840a7661f1b002dec4a07aa624dd034829c5b4ec8b6632211624a03,2024-10-10T16:15:06.680000
|
||||
CVE-2023-4926,0,0,f04445011a7b61f0239196a2a3d2a11a7cfa48d9f67d70f794613b5affd23cb6,2023-11-07T04:23:10.633000
|
||||
CVE-2023-49260,0,0,eacaa360b74b478231fd0a67d27793e1aa2a71bc28ed6337e23a0f3affc2630c,2024-01-18T20:22:01.957000
|
||||
CVE-2023-49261,0,1,ab12768ceb84db446d13551e51716c39b487b5e822d367a966090eb33f0ba06c,2024-10-10T16:15:06.787000
|
||||
CVE-2023-49262,0,1,274063e158f489d41be2d722570f9ed9c17604ee5dffa76726e2ba1ea7a07b0e,2024-10-10T16:15:06.893000
|
||||
CVE-2023-49261,0,0,ab12768ceb84db446d13551e51716c39b487b5e822d367a966090eb33f0ba06c,2024-10-10T16:15:06.787000
|
||||
CVE-2023-49262,0,0,274063e158f489d41be2d722570f9ed9c17604ee5dffa76726e2ba1ea7a07b0e,2024-10-10T16:15:06.893000
|
||||
CVE-2023-49269,0,0,028a4e58082cf4ef8da9a9e284540f563d62594be00f2afffe30cf24bc0b64ca,2023-12-27T17:17:44.617000
|
||||
CVE-2023-49270,0,0,b9649fb168337300fb031c39ff29926d549e641e684c52d7e7ff666ecb63d06e,2023-12-26T21:41:07.910000
|
||||
CVE-2023-49271,0,0,b7b5bb763871877cb1dd0f84ec6ac0e1261e6246273abfbaba9879bbf625ed6c,2023-12-26T21:40:42.173000
|
||||
@ -239557,7 +239557,7 @@ CVE-2023-5374,0,0,bbad172aa30166f85ca2e7d3ff515943900e68e6abf27c8173e4afc98be416
|
||||
CVE-2023-5375,0,0,a64347362803998112e7738c159b01f9d4276db052cc0c20b8aec7e6633c0c07,2023-10-05T18:26:45.907000
|
||||
CVE-2023-5376,0,0,990cd494edefb2d9c83b147909f1f06cb068f2eb4ba15f46e74b335e88c7a2b7,2024-01-17T17:46:40.297000
|
||||
CVE-2023-5377,0,0,beec2be658ee2abf7a8172d160c87ff77ea1bb8ccb609f8c80ff98d55729625c,2023-10-05T17:07:40.813000
|
||||
CVE-2023-5378,0,1,609da6346e4b2cfb0c1b7e2a7e8f2a984ad4f64785ebe1bf6922b24e0ab439b8,2024-10-10T16:15:07.540000
|
||||
CVE-2023-5378,0,0,609da6346e4b2cfb0c1b7e2a7e8f2a984ad4f64785ebe1bf6922b24e0ab439b8,2024-10-10T16:15:07.540000
|
||||
CVE-2023-5379,0,0,2931e08b2d2958f825098c38b4e9fee27840063393b70d1f9dc8921e6c5fef26,2023-12-20T18:39:19.120000
|
||||
CVE-2023-5380,0,0,cb08b877665112ae720bd7aafeb8d644ec13fe741b6b7e105c2ccf85e625dbc3,2024-09-16T16:15:08.980000
|
||||
CVE-2023-5381,0,0,f4159bdba728827531b2d68c527e85df9c54a93da715a2ba38d9642e5e4ffa3f,2023-11-21T02:45:00.847000
|
||||
@ -240617,7 +240617,7 @@ CVE-2023-6546,0,0,4f4e46a35eb2a1cbc8c494030b87e8c4a5413a7fdef4268737b564917a093f
|
||||
CVE-2023-6547,0,0,4de5784377e5f9787f8338a046ec4c275ae6d29b8fb06be598377dd3ea6b3a4e,2023-12-14T19:31:10.497000
|
||||
CVE-2023-6548,0,0,a93a0604081016c50f51b204cce97858e584569f5bc0432075c5fb69824b24a8,2024-01-25T16:45:58.287000
|
||||
CVE-2023-6549,0,0,850161f4c77aa0f06b12ed2562bc348193320e4386ca4ea0ef325dd56db8dedc,2024-06-10T16:27:52.507000
|
||||
CVE-2023-6551,0,1,bf9ad9148b141f0ca977f2e13f6eef6a0137ca2b6186a2363f040e09df113981,2024-10-10T16:15:07.720000
|
||||
CVE-2023-6551,0,0,bf9ad9148b141f0ca977f2e13f6eef6a0137ca2b6186a2363f040e09df113981,2024-10-10T16:15:07.720000
|
||||
CVE-2023-6552,0,0,280e58e9ed2dc80c0c0a43f67c21eed670b513dd1014a470571d49cccf0fc6ac,2024-01-11T21:13:09.007000
|
||||
CVE-2023-6553,0,0,b5146d631beb06b07e5ca8b91ef438e8f5760824aa0920387c6fefb74ea914c5,2024-01-18T17:15:14.300000
|
||||
CVE-2023-6554,0,0,2feb5ba088ff3e9dd4cf7fbd58c1eecc82f5eb18efcc3326d89df15d295f81d8,2024-01-18T17:35:46.637000
|
||||
@ -241006,7 +241006,7 @@ CVE-2023-6993,0,0,58824562ab00139fd1065f90d459866d58a79c75a4afe1ed988bda594a97b5
|
||||
CVE-2023-6994,0,0,98369af104a5f616fad5110292c6d21a84f6de7cb99223c15d3db3d8af92686a,2024-01-17T22:13:52.143000
|
||||
CVE-2023-6996,0,0,fccc2168deda8e9a325faec73794d5557356b0d09dbb916af246ca96a67db2d3,2024-02-13T16:11:03.577000
|
||||
CVE-2023-6997,0,0,6e27e5b63f0a87af454d1261575dc30b0f4ff5f301848e086587a6cca0abb399,2024-06-07T19:15:23.410000
|
||||
CVE-2023-6998,0,1,d47af9cb9500ce4c322dbabda800a0d285b36e94645b23c9df839f36c73319f9,2024-10-10T16:15:07.850000
|
||||
CVE-2023-6998,0,0,d47af9cb9500ce4c322dbabda800a0d285b36e94645b23c9df839f36c73319f9,2024-10-10T16:15:07.850000
|
||||
CVE-2023-6999,0,0,105a70829f6eff53ac15a557cd0bd3f06555e4d64cccad8e6bdc880dc85be3d9,2024-04-10T13:24:00.070000
|
||||
CVE-2023-7002,0,0,1f48f06eff9246f8921966d36b30d4b155872d4efce169cac69a0e04e201ed5d,2023-12-29T06:21:43.197000
|
||||
CVE-2023-7003,0,0,e9402f475914886887087bf2c3bb459f6ae259bd32832a137b61739af9c3ed22,2024-09-25T01:15:39.957000
|
||||
@ -242016,7 +242016,7 @@ CVE-2024-0859,0,0,ff784ede10a0711bc0887b221fef20123179373dca5468014d5965d599854b
|
||||
CVE-2024-0860,0,0,831bd3ec539e95c34edc12f0e20bfc01b276aabb943cb43f0dff12e235110897,2024-03-15T12:53:06.423000
|
||||
CVE-2024-0861,0,0,86ecba68491b7b81822881feb2da55a3f32a47f2022c25fb159df017410c6f17,2024-10-03T07:15:28.390000
|
||||
CVE-2024-0862,0,0,cd566c8abfba0ca515f734ef4070df65c5856e9bf9b981d35c91f199e6054347,2024-05-14T19:17:55.627000
|
||||
CVE-2024-0864,0,1,5df0a42cefa6ce6ca871e243da3f4a295df398ecbf312afeac42b693671796d2,2024-10-10T16:15:07.990000
|
||||
CVE-2024-0864,0,0,5df0a42cefa6ce6ca871e243da3f4a295df398ecbf312afeac42b693671796d2,2024-10-10T16:15:07.990000
|
||||
CVE-2024-0865,0,0,92ed612466d8a4d7183523d7500a321a95aa9e27cc826fa3fd89f2bb9954809a,2024-07-19T20:43:36.043000
|
||||
CVE-2024-0866,0,0,fc759d49c9e441a8b12ab4ad1a997904eb8eb9894ecca01f95e8cb0572eecb6c,2024-03-26T12:55:05.010000
|
||||
CVE-2024-0867,0,0,e359b89be2d490f4a35e658519a1716eaafc027d44d059518f42f8274899e25d,2024-05-24T13:03:11.993000
|
||||
@ -242714,8 +242714,8 @@ CVE-2024-1600,0,0,361b3dac683b3a5ac546d616c21e4dc0f349290759dbe747906d2ebdb44b8f
|
||||
CVE-2024-1601,0,0,83cf4a8caabcc81e351705b7638f02b9b11f8845346f643cabf4d0eb108d61fe,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1602,0,0,424c7946b86609c0593c4ee4eb3ca817d37faadfd2bd290c5bce24c66955d72e,2024-04-10T19:49:51.183000
|
||||
CVE-2024-1603,0,0,7560f4eb0fe2f104ec0cc7868f6032f1be714ae3fffcb6babc4d2b97acd948b5,2024-03-25T01:51:01.223000
|
||||
CVE-2024-1604,0,1,277105b8ea788ca74c9aed2acbcd50868e1b158a625c260553e18f1e3fc00dac,2024-10-10T16:15:08.103000
|
||||
CVE-2024-1605,0,1,1303820adefb05fc627f5a7ece6f248c68b2369966e9fc4c3087c505496a74aa,2024-10-10T16:15:08.220000
|
||||
CVE-2024-1604,0,0,277105b8ea788ca74c9aed2acbcd50868e1b158a625c260553e18f1e3fc00dac,2024-10-10T16:15:08.103000
|
||||
CVE-2024-1605,0,0,1303820adefb05fc627f5a7ece6f248c68b2369966e9fc4c3087c505496a74aa,2024-10-10T16:15:08.220000
|
||||
CVE-2024-1606,0,0,15a17e447d99df7418714d7ef94e3798f3d5d0e7ef6ca0dc3b7b341bddda711a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-1608,0,0,44224eee05265f6f7b8c8729d57dee56f28fe5925bde16e1c91e799aa3c2bf41,2024-07-03T01:45:25.227000
|
||||
CVE-2024-1618,0,0,3886085aa0e530a3cd7ca87e86ea29f5f9d41baf4dd8dca3226a1b22f221980f,2024-03-12T16:02:33.900000
|
||||
@ -243174,19 +243174,19 @@ CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac94
|
||||
CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000
|
||||
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
|
||||
CVE-2024-20090,0,0,1cc27d2d83ce003b6470b40682a3b5da8b80eb4fa000f5267f5143b72241b340,2024-10-07T19:36:41.627000
|
||||
CVE-2024-20091,0,0,fd45810d9aee6040d217a3937d43dd5f8802d66444422a9c5a1878bbe9948f64,2024-10-07T17:47:48.410000
|
||||
CVE-2024-20091,0,1,95c1cc97fac75de79c119111dadc5f8d3a906b145632a8e99c237ca3d2d7644f,2024-10-10T18:06:38.370000
|
||||
CVE-2024-20092,0,0,65830fa876d29f654e9b40a795649bd4c4172565bc9f95b5dcdf288a40258ca8,2024-10-07T19:36:41.920000
|
||||
CVE-2024-20093,0,0,6b85b2af41f87789a911efc1464bf3d97201349f5e8ee337e4b206be9879b8cd,2024-10-07T17:47:48.410000
|
||||
CVE-2024-20093,0,1,c7a8ea33b5c13e2cfd81c4913c1b2b72f026361290108826cf239c320fb41376,2024-10-10T18:06:57.333000
|
||||
CVE-2024-20094,0,0,641953c4feffbce745824ec3b9a68aa2647d59084bfd49f0a36c52974ebad7a5,2024-10-07T19:36:42.200000
|
||||
CVE-2024-20095,0,0,c87243ba660fecd88127b7dd085f3bb2b1ceefb7ee222f0d9dafc609f51271a2,2024-10-07T17:47:48.410000
|
||||
CVE-2024-20096,0,0,9bab41ba3ae00524734fb2d3da1534064ae87b4f27691d9dbbc0a50dd5ae3e1d,2024-10-07T17:47:48.410000
|
||||
CVE-2024-20097,0,0,8b726df278ab0147d5c79378847c893689036afb5f6e5d33fa23d78e16ccf31b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-20095,0,1,d6b4f4b5ca0d1c0ca9fa6a164ccd3e736674879d2a4e467b2ce89e3ecdfc36f1,2024-10-10T18:07:22.267000
|
||||
CVE-2024-20096,0,1,45d32d93a320f4f6a2e9db75ef5f199b17687f055d814228fc82875df2d4036b,2024-10-10T18:07:38.557000
|
||||
CVE-2024-20097,0,1,3c6ef07555d661f8c358576e6e89719e982983707258f6bd5a4a5f4d4bf6603e,2024-10-10T18:07:52.507000
|
||||
CVE-2024-20098,0,0,ebf7f236d13e88b2602c1ec20190e8c7c5c76c45a773e147ba2db1178f899ee9,2024-10-07T19:36:42.660000
|
||||
CVE-2024-20099,0,0,8778aa965d312369cd80f285a091e79f4ec3ef9269eaa2482f6c232a39c7df59,2024-10-07T19:36:42.860000
|
||||
CVE-2024-2010,0,0,b3d54c217418fe6eaac723aeeab2da7590ea8caf84d69dd0f5d6f2f7fff7952b,2024-10-02T13:52:09.270000
|
||||
CVE-2024-20100,0,0,00e7a4eaba0bfed9181372c6367bfb391a030c7a1acbb9963f83a3c62045a172,2024-10-07T19:36:43.050000
|
||||
CVE-2024-20101,0,0,ced475548a5bfbc53f04a0c2a5712a0c8bc4d7f836b6e8c5ac4a95d33c15bd60,2024-10-07T19:36:43.247000
|
||||
CVE-2024-20102,0,0,b4615e87decf60a8e85da63e8bfe5c34d6f63676225acf731bf036484b2d278b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-20102,0,1,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000
|
||||
CVE-2024-20103,0,0,ff6d2294295d0dd22c31cf32176b100a255e6abd1ceb31b42b3a8764be05646b,2024-10-07T19:36:43.530000
|
||||
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
|
||||
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
|
||||
@ -248610,7 +248610,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c
|
||||
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
|
||||
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
|
||||
CVE-2024-2758,0,0,ec71169b8e8ae96bf24d772237af9a9c33e20fd447b06805225d467e622ae7a6,2024-05-01T18:15:19.300000
|
||||
CVE-2024-2759,0,1,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000
|
||||
CVE-2024-2759,0,0,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000
|
||||
CVE-2024-27592,0,0,d1ab0f4f443cdfc3ef1bdb598e0eca6a6dd41bceb98b2d42145b4b52d872d5f3,2024-04-16T23:15:08.690000
|
||||
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
|
||||
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
|
||||
@ -250331,7 +250331,7 @@ CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf548246
|
||||
CVE-2024-30110,0,0,a07e687d8cc25234136155156054fc7c4d3e910119afb02b600c596b9dc2e496,2024-06-28T10:27:00.920000
|
||||
CVE-2024-30111,0,0,2d23b069061a9f03f5bbdc50f3bb24e02ba7cc17cb7c96642572c4ddb7c10c61,2024-06-28T10:27:00.920000
|
||||
CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1b94,2024-06-26T12:44:29.693000
|
||||
CVE-2024-30118,0,0,d75f0d74d06c8e3868a6471e6d2e944efbd02635e86e9265337e7bf5cb305cb6,2024-10-10T12:51:56.987000
|
||||
CVE-2024-30118,0,1,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68377,2024-10-10T18:50:54.383000
|
||||
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
|
||||
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
|
||||
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
|
||||
@ -253616,7 +253616,7 @@ CVE-2024-34616,0,0,c301260c315697c954fb2feafb31403c37229c06fbc1763a645c0b780c7d6
|
||||
CVE-2024-34617,0,0,b1ee984b0fa2dc691ebab6e8249f2a4d4bb83e2ded6eba30678b4026e2d801bc,2024-08-12T18:40:21.090000
|
||||
CVE-2024-34618,0,0,d83244a9f175d49a5d846a23c6fe10dd7ec1bbbbc81b439f7092f16730defc87,2024-08-12T18:40:38.963000
|
||||
CVE-2024-34619,0,0,91b7e2ba5c8ef39243e26b3218dbb54a69ef40dbc6e2ee1a6dfc7635d1e06db4,2024-08-12T18:41:03.467000
|
||||
CVE-2024-3462,0,1,cde69c32d1cfdddf84aad9bf072c1ff8f90df5fe6471a02399ac91c4d7da2bbd,2024-10-10T16:15:08.497000
|
||||
CVE-2024-3462,0,0,cde69c32d1cfdddf84aad9bf072c1ff8f90df5fe6471a02399ac91c4d7da2bbd,2024-10-10T16:15:08.497000
|
||||
CVE-2024-34620,0,0,18af99a16c151d48117fe4a9d6b46c84a917ab3823f5ed3fce7acc26205bcfe1,2024-08-12T18:41:21.593000
|
||||
CVE-2024-34621,0,0,fbb4f55b8bb52c900dd8b6fb5e30a72cb1ea07a01b1c400b8d7287789fe61e97,2024-08-09T20:43:21.560000
|
||||
CVE-2024-34622,0,0,aeda50f8bab0ac7ef960dd7444278eb4fda7645ea46e11099531591011c5f504,2024-08-09T20:15:32.807000
|
||||
@ -253975,7 +253975,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08
|
||||
CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000
|
||||
CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000
|
||||
CVE-2024-35202,0,1,307eeb0ba3a894c1f24169242df5b7772be5729599a16b2a6aaeb88e865b1b41,2024-10-10T16:35:11.390000
|
||||
CVE-2024-35202,0,0,307eeb0ba3a894c1f24169242df5b7772be5729599a16b2a6aaeb88e865b1b41,2024-10-10T16:35:11.390000
|
||||
CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000
|
||||
CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000
|
||||
CVE-2024-35206,0,0,2d45311ddac58ab7849b5dcc4f34358defb99853941e437129eca208b1798608,2024-08-06T15:02:05.777000
|
||||
@ -254257,7 +254257,7 @@ CVE-2024-35683,0,0,35d7e7c403c9e1a0af5b15ee529f21dfe95dd77d68bca956781c650575c54
|
||||
CVE-2024-35684,0,0,73ceea3685cab6d12bcc00b1be64bf260bc52647423fb13caa461de77b765285,2024-07-18T19:15:49.853000
|
||||
CVE-2024-35685,0,0,139851b07c410dda78a8d072ad9e34deae44fbd00bd025834cea54049b4e0532,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35686,0,0,32ff2e600a9d8926049897296d1d6fe8809b6a2e4221afcb5a5a74815a856c9b,2024-08-19T12:59:59.177000
|
||||
CVE-2024-35687,0,1,b379fb6562e3ac3f0754d3c341db6054c4dc0eed9ed63187d866802f459ed76a,2024-10-10T16:59:04.827000
|
||||
CVE-2024-35687,0,0,b379fb6562e3ac3f0754d3c341db6054c4dc0eed9ed63187d866802f459ed76a,2024-10-10T16:59:04.827000
|
||||
CVE-2024-35688,0,0,3002fd4b3fe5cc02b7654ca7bf43c572c5d7c5d95678447c325fe6a4dfea431c,2024-07-18T19:11:38.683000
|
||||
CVE-2024-35689,0,0,a84697d9194d9eaca216c47abe16f4656da4cd35d0aca0020ad4375947ea31e4,2024-07-18T19:11:09.873000
|
||||
CVE-2024-3569,0,0,9b80b9a87217b369759c7140d80dbd6082319d66e422964bf6b9aefb97f43369,2024-04-10T19:49:51.183000
|
||||
@ -258328,7 +258328,7 @@ CVE-2024-41812,0,0,77d77d75e12a46a4096a7ded13c0631df5e5cdfd100a1bda9b1f75a9011ec
|
||||
CVE-2024-41813,0,0,91e03e36b9e87581405a8dd69398040d61a14fc0a45ce589d6f6ebdb2f6cab48,2024-09-30T20:02:25.837000
|
||||
CVE-2024-41815,0,0,fa3c6b5fdaad718b40db16c805a164fa7a9b4ae5ba2f85a17caaeb17fb76200d,2024-09-19T14:36:12.677000
|
||||
CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000
|
||||
CVE-2024-41817,0,1,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000
|
||||
CVE-2024-41817,0,0,55d2f9b0a2075c2da5349f298b0dd31b3b48148f233e37649ddc262d2d2d446f,2024-10-10T17:25:47.637000
|
||||
CVE-2024-41818,0,0,34e8576dcb1a1bd2ef0841435c6e4eb9b22f044d76175d55bfedd30532739326,2024-09-11T16:09:46.303000
|
||||
CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000
|
||||
CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000
|
||||
@ -260184,12 +260184,12 @@ CVE-2024-44950,0,0,5e42ef2a98099750242b4bcce4d058e90a98782e0666750e9b6b801f3fbcf
|
||||
CVE-2024-44951,0,0,d4df6b53659b4bf2ca95c9e72ed9fbab6343da2558ed206d0ca74ab61429319e,2024-10-09T14:27:43.973000
|
||||
CVE-2024-44952,0,0,6abe9435eb01f0417ea6e45511928e929f498aad7a413484748a480c46e0c4ce,2024-09-06T16:37:38.370000
|
||||
CVE-2024-44953,0,0,f2ec50e0309c43f7cf9bb2e776118a51e77c29a5f9b8c0285a1645b3f3d10a0b,2024-09-06T16:37:33.650000
|
||||
CVE-2024-44954,0,0,31b5dfbb887da799bd2bd3ced4c927fc2ecea3232fc0eafa678eaf39c7e755f6,2024-09-05T12:53:21.110000
|
||||
CVE-2024-44955,0,1,7ecd6df0a7fc728e9f1b78b619a80458c35c83df938799fdd53ee40a270e647d,2024-10-10T17:57:00.267000
|
||||
CVE-2024-44954,0,1,917c2285a10b8a4c9f2cbeefe4b18ea2f038a0ed9d2b06168fbf3620c40fe5dd,2024-10-10T18:02:42.307000
|
||||
CVE-2024-44955,0,0,7ecd6df0a7fc728e9f1b78b619a80458c35c83df938799fdd53ee40a270e647d,2024-10-10T17:57:00.267000
|
||||
CVE-2024-44956,0,0,6af1a87a6f61cb2e54a20c3401cc5debba4744f6ee0ebb8ac5c756a545a18cee,2024-09-06T16:37:11.777000
|
||||
CVE-2024-44957,0,0,e09ae721dc946241eec9f81a8aaa6dbc034c414b1c1b70d35ec2e90777c333a8,2024-09-06T16:37:00.077000
|
||||
CVE-2024-44958,0,1,e4d3f1ed246cde0567507bcc647e05aeb172deedd04cdd90b68c843294cc3a64,2024-10-10T17:56:24.467000
|
||||
CVE-2024-44959,0,1,cdc6d6e75361aea84c95ea1414f5cfe7ea6483c758f03a0ec301cc000a1016f2,2024-10-10T17:54:07.960000
|
||||
CVE-2024-44958,0,0,e4d3f1ed246cde0567507bcc647e05aeb172deedd04cdd90b68c843294cc3a64,2024-10-10T17:56:24.467000
|
||||
CVE-2024-44959,0,0,cdc6d6e75361aea84c95ea1414f5cfe7ea6483c758f03a0ec301cc000a1016f2,2024-10-10T17:54:07.960000
|
||||
CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000
|
||||
CVE-2024-44960,0,0,68277b730b7485e374cc6a581bba8cf7b2d42cf68316fea6befff6e677f25010,2024-10-04T16:44:05.497000
|
||||
CVE-2024-44961,0,0,f953df8f16221e9fd81f9cf7e7b0f2354703b12926c99e78c21e8910d16a893b,2024-10-04T16:39:39.300000
|
||||
@ -260208,20 +260208,20 @@ CVE-2024-44972,0,0,9b4a601abf868742cc56845740bd2af5dc67b7e9f76c5e2e3815a329e7373
|
||||
CVE-2024-44973,0,0,6da77340a818d4254bbf05ca91b8c65562f8d826d87a4df556d42cceb3d012ba,2024-10-03T14:23:09.147000
|
||||
CVE-2024-44974,0,0,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000
|
||||
CVE-2024-44975,0,0,259cddaa128c9efb6ec303816aae245e7b8378b15a62da050b41a2aa6ef90c6f,2024-10-03T14:32:31.677000
|
||||
CVE-2024-44976,0,1,bc18e50085e0996c22bd3875fde1d8b8546c02856815a998cf979827e572374f,2024-10-10T17:50:14.863000
|
||||
CVE-2024-44977,0,1,03172ad45dab614d5712c6aa7ef1d5d1de28df5518c80831856ede17b98f6602,2024-10-10T17:47:59.593000
|
||||
CVE-2024-44976,0,0,bc18e50085e0996c22bd3875fde1d8b8546c02856815a998cf979827e572374f,2024-10-10T17:50:14.863000
|
||||
CVE-2024-44977,0,0,03172ad45dab614d5712c6aa7ef1d5d1de28df5518c80831856ede17b98f6602,2024-10-10T17:47:59.593000
|
||||
CVE-2024-44978,0,0,86121d29302acc1da31190cefab002b1ff26f43dfa1aaefb7afb57e51681158d,2024-09-10T16:51:19.813000
|
||||
CVE-2024-44979,0,1,cecac389382680ea39a2d45161307db74c62b644cb6a1947cc1848191426c503,2024-10-10T17:44:36.417000
|
||||
CVE-2024-44979,0,0,cecac389382680ea39a2d45161307db74c62b644cb6a1947cc1848191426c503,2024-10-10T17:44:36.417000
|
||||
CVE-2024-4498,0,0,237405bb434f57b5ee3d93725ee504cc093cf6521d831301400a29eebde53ae2,2024-06-26T12:44:29.693000
|
||||
CVE-2024-44980,0,1,dea397cd74419967eeeec31ac4bb73b2fcd8298d78221f7ff8b71c505344cc1e,2024-10-10T17:42:53.433000
|
||||
CVE-2024-44980,0,0,dea397cd74419967eeeec31ac4bb73b2fcd8298d78221f7ff8b71c505344cc1e,2024-10-10T17:42:53.433000
|
||||
CVE-2024-44981,0,0,bc3bb172f7a0023a22356964618a5541429c999634289482e09bbe39c56b8053,2024-09-05T17:54:19.377000
|
||||
CVE-2024-44982,0,1,a05c0c5e6b282a95ebe731908435bbb3ecaa688dda76ce2904340585b7afa275,2024-10-10T17:09:54.350000
|
||||
CVE-2024-44982,0,0,a05c0c5e6b282a95ebe731908435bbb3ecaa688dda76ce2904340585b7afa275,2024-10-10T17:09:54.350000
|
||||
CVE-2024-44983,0,0,6dcccaf315345579e49205f3bdea80f9b0827330855785bb5774834968a11f76,2024-09-10T16:57:55.110000
|
||||
CVE-2024-44984,0,1,9f87dbbca170f6f4d252c6919ea7b3f286e8ff7024a06a22635aff0d47c02da1,2024-10-10T16:48:56.167000
|
||||
CVE-2024-44984,0,0,9f87dbbca170f6f4d252c6919ea7b3f286e8ff7024a06a22635aff0d47c02da1,2024-10-10T16:48:56.167000
|
||||
CVE-2024-44985,0,0,89614f0dc5a1bc1e42d274d3ec6531500905f54e1226dc3d0cfa558fdaf45e82,2024-09-05T17:54:11.313000
|
||||
CVE-2024-44986,0,0,7b1b7f962a5dde2e3112c86530d9327efd0060e0a73a92ec7225981af2f022b4,2024-09-05T17:54:04.127000
|
||||
CVE-2024-44987,0,0,80c7ee92eb0c64e1bc51cb1cea659b21d515983723260d3a4a67be7790dea749,2024-09-05T17:53:54.687000
|
||||
CVE-2024-44988,0,1,6a50a64461dde71a529e9e83bb0f9a6735ab909803f408460e79c8c9f655c334,2024-10-10T16:44:14.767000
|
||||
CVE-2024-44988,0,0,6a50a64461dde71a529e9e83bb0f9a6735ab909803f408460e79c8c9f655c334,2024-10-10T16:44:14.767000
|
||||
CVE-2024-44989,0,0,f232cbe2cf85d26edc47089ff1f523369ffa3f6479342bd09b010a8ff52ddbe8,2024-09-06T16:31:22.253000
|
||||
CVE-2024-4499,0,0,76c471af3c85399c41d057a036d2a12d52d3dc17ec6cbd4660af6d2299ed90b8,2024-09-13T16:01:19.483000
|
||||
CVE-2024-44990,0,0,87bc0c256d1ef863849319b5a4078ee77f85507d6091a25f9ed554ccb2e112e7,2024-09-06T16:31:12.870000
|
||||
@ -260836,7 +260836,7 @@ CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494
|
||||
CVE-2024-46292,0,0,16657deaed202158307b9cd348b1ae5a658eccdd4341dd38e21d8ab9f2e1a265,2024-10-10T12:51:56.987000
|
||||
CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
|
||||
CVE-2024-46300,0,0,d1242a191b8ea8c2a0e9fbab7765f3d208830dd828d323e4edc4853d2473356e,2024-10-07T20:35:11.433000
|
||||
CVE-2024-46300,0,1,ac737436c281f2a0090533929879a33c37be3bd6f7970fe4b452f2dd4b8cf935,2024-10-10T18:52:42.790000
|
||||
CVE-2024-46304,0,0,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000
|
||||
CVE-2024-46307,0,0,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000
|
||||
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
|
||||
@ -261406,6 +261406,7 @@ CVE-2024-47349,0,0,e6c8290f3997da4ca5815c85f88c430fa697e63af208e1750b560fe37e4f7
|
||||
CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000
|
||||
CVE-2024-47350,0,0,09067a079935a016b58f07623b3d09d0a14ce68a8d0e97bc64a38c36b79a09f5,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47352,0,0,594028d39b78ff520b0396c6a3ce285d2e384a0ebe8a52208931d1ced0ad3b29,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47354,1,1,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000
|
||||
CVE-2024-47355,0,0,cf08585fe7cb6bc0c9335afe55d15aa081a8746842ce9e96d34e20bb3b2de71f,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47356,0,0,cfe95239cc4248246cd874a2cb2d77c8e851cdbbe7ac1a464fc0eb4a3c757f5f,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47357,0,0,149fcf46e7f27075eeb3f705ac9a4ebeb96a867a52767d71262e20ba7a053432,2024-10-07T17:47:48.410000
|
||||
@ -261447,18 +261448,18 @@ CVE-2024-47393,0,0,58cf853d8f2d02cbccb461c82596ff01f0cdfcc3c36878d036a5e6eb40f01
|
||||
CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f7e9,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47410,0,0,2b85065b3cc816e2e6894f4ae6f931ef6472a4a9b302dce9c53bfb573efb0017,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47411,0,0,1d6e4d3969d08861473d57c5b16554b86f8a81f0484d410008e00804e5251930,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47412,0,0,d79a02d1f4644268c1c69c3071d6d3ce53192d43f8632419aaa8746cc964ddf0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47413,0,0,bb02e382dd56e1508620412f0b964df099870bc38f898fec21d0ecb2225633fd,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47414,0,0,b09b81cd598b82d2a9f212c2fdacf7e3739fbf5c004de4fd1c2e706bbd81b600,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47415,0,0,327ea81d47c3c36536acf07bb1213820f9087ea124ee47313ac98538463d0fbd,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47416,0,0,3616058ebfbbdf7abbde901ae18937d623c3700cc1dc8ef67948efac664217c7,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47417,0,0,c089aa4778ac152ed305d4215c2a8f60791877b22e2d0ab62b0d5b692b7501a3,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47418,0,0,24aafbb08a4cabfc7223ae23ef2abd05c864bf283f001c0cb5602a278270228c,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47419,0,0,1fbe0741bc25a4665f681ec0731d85fac68fc75c4da90f369b7a56d7b0a2f152,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47410,0,1,42b59896d371aa29c83e01a1ce08752b8288a889a8db3630a5c6ba7966f3731c,2024-10-10T18:26:44.857000
|
||||
CVE-2024-47411,0,1,5875ac529772763bf76adfec6337ced119d16dc7bedac06df0488c853721b19e,2024-10-10T18:26:54.153000
|
||||
CVE-2024-47412,0,1,391d79d5da558802eae8e86cf3dd3b740642f9484cd58363cf9ca936b2f15d9d,2024-10-10T18:27:02.867000
|
||||
CVE-2024-47413,0,1,efffb7f4f524842c3da4f8e4f47d682ca3f5022b22ee31bdd64350ada5d174d7,2024-10-10T18:27:08.210000
|
||||
CVE-2024-47414,0,1,b99ef98ddddc4fe3a2ce97930aec3a4f54c382fcd7fa966d806bfcc3b3a29f17,2024-10-10T18:27:17.123000
|
||||
CVE-2024-47415,0,1,242c4905864565326853c5e25cbd1c250260c0bd4a96116024e1f67e79438df0,2024-10-10T18:27:30.467000
|
||||
CVE-2024-47416,0,1,0c7f43b25401c6f57308fc4d12ca4043b36b0b76fb92542ee8608f2b89376b6f,2024-10-10T18:27:39.187000
|
||||
CVE-2024-47417,0,1,34adb3875f984010ac1ec6bb1f4ecdfba3c04b2381129bff62f8abb8615e1a50,2024-10-10T18:27:46.470000
|
||||
CVE-2024-47418,0,1,1d09a601d50b55fb35b7d4fc7e118d1a06dd238f3708db9ef993b303806cc748,2024-10-10T18:28:04.387000
|
||||
CVE-2024-47419,0,1,8fd66d9bf61c8353ab141ddd3435e43b693fb94a6a4d1ca08ad07bf05b83025e,2024-10-10T18:28:19.330000
|
||||
CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000
|
||||
CVE-2024-47420,0,0,7eaf2743e4253484617ee7cfdb1fd7edab0aa7aa062fd268430e44e44517e0bb,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47420,0,1,67ad7f7dd5cb664c9d8d7ab9101e8bdaff33af0ff65a5f148b23df17a4f95602,2024-10-10T18:28:26.860000
|
||||
CVE-2024-47421,0,0,102f8e332a29bbf3c4d5fb03ab9810391e67a628a1a147f11476861b16d4b605,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47422,0,0,3952ccb617f0de75e022164e02292c15f6e11ca918ca4295a5ace8ee97dd98ab,2024-10-10T12:51:56.987000
|
||||
CVE-2024-47423,0,0,f17caf37955ec4ecc572648540e4cfbee61ac432f2927a7322d8623e06a593fd,2024-10-10T12:51:56.987000
|
||||
@ -261469,7 +261470,7 @@ CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef
|
||||
CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000
|
||||
CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000
|
||||
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4748,0,1,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
|
||||
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
|
||||
CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000
|
||||
CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000
|
||||
@ -261533,6 +261534,7 @@ CVE-2024-47631,0,0,01fc100dd08a1360f7c125c78507402e09d2b1c2d847226a5af87eb0733a2
|
||||
CVE-2024-47632,0,0,f0965ad8a98839b57c8efa58e92981fb5169721d554ccd74aa7f6384bc6276d7,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47633,0,0,83d0f903f83dd379c31137a99d53fc1c554d901d5d9bc74c2d6bef68bc5c82b4,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47635,0,0,b72deea70e905bb748839730e330b907a08dfe276b949c1628ef45ac3c08976b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47636,1,1,ec69ee24cf2cc4e35a0d87e9bc4dc38df2ef5d9589ff0aa5f365e729ec78649f,2024-10-10T18:15:07.920000
|
||||
CVE-2024-47638,0,0,b3cbfd223fe1cc94aab3e88ad41656f2b84c9afb1b07b461655fed70a6186be3,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47639,0,0,0dbdca40ed3a65834d3c291ae2785dd80dbc26b9e69a0dc2156d5c47067029d8,2024-10-07T17:47:48.410000
|
||||
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
|
||||
@ -261542,6 +261544,7 @@ CVE-2024-47643,0,0,76324b383f26178af320ff117ac2bc824c9739123bf10b44dfde01cdcda70
|
||||
CVE-2024-47644,0,0,e673aed60238f9b5abec2b17d0b773fd574cc4aee068cf599e12a758154a364b,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47646,0,0,10b5a56791d1f80011760e4ddb4fabbf6b562e5ec54c7774cd5b5f1d927a2684,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47647,0,0,7716a0ae18142ae56901b805b3add32c3ed7fb51591ce35c85552affb5dedd67,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47648,1,1,38ca133ebdd26d7310fc58b771105a72f4adf8394bf849f97ad77530c58416a6,2024-10-10T19:15:17.067000
|
||||
CVE-2024-4765,0,0,2cc9c7bf1e2c28194496aab966e3be262d91c35cfd4edb32adc2df596a464b78,2024-08-29T21:35:11.807000
|
||||
CVE-2024-47650,0,0,9afef3be3c031099cbe7cbfa5812d4fd5a6f96ce9539e691bb6d557c122e6c41,2024-10-07T17:47:48.410000
|
||||
CVE-2024-47651,0,0,a5c70d4582bbdb3780ac3463bdf31076b74c5748ebb37496a5c0ac719743777c,2024-10-04T13:50:43.727000
|
||||
@ -261645,6 +261648,11 @@ CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e2
|
||||
CVE-2024-47950,0,0,051b7d62708c153f7aefabbe7d8cbca3b760e43438404853bb4e254aa1c32f1d,2024-10-10T12:56:30.817000
|
||||
CVE-2024-47951,0,0,dd0e5081c613ef6331152cf5f5a93ee02293e5a5a930e15d75080ba702abfea6,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000
|
||||
CVE-2024-47962,1,1,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000
|
||||
CVE-2024-47963,1,1,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000
|
||||
CVE-2024-47964,1,1,8708b1223f13c984225d5ff9a93e6643d31a9da9d412e571b444e93d6ab07c8d,2024-10-10T18:15:08.470000
|
||||
CVE-2024-47965,1,1,2326a0f43bbda417b7328f4bcf140455310111b0a6b80eb67cbda48f4f017f48,2024-10-10T18:15:08.587000
|
||||
CVE-2024-47966,1,1,2e5feecff0fa14f89d0ed8ddc60e7023397935bd4a2b23667d2d59536ef817ba,2024-10-10T18:15:08.710000
|
||||
CVE-2024-47967,0,0,a1330cc114fe2e48a56c50da9857d953b86ef030556f660ace8207b5a6ff6caf,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47968,0,0,4fff8938b14b264b8114ea788e4702165e516bca6198626b64c35403b2d1f728,2024-10-10T12:57:21.987000
|
||||
CVE-2024-47969,0,0,cca9607f354104b423066ece0dc4ef5cb988716d253447be49d5f3344fccc48a,2024-10-10T12:57:21.987000
|
||||
@ -263734,8 +263742,8 @@ CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd
|
||||
CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000
|
||||
CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000
|
||||
CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000
|
||||
CVE-2024-7265,0,1,f8d550c674039cce8f324746def751c860d87bd4ce8e1c453bd0781310abcf46,2024-10-10T16:15:08.763000
|
||||
CVE-2024-7266,0,1,e5f7907376447dca655b663fd7a74a213d7d563471c1ec60c07889df6ae132cf,2024-10-10T16:15:08.910000
|
||||
CVE-2024-7265,0,0,f8d550c674039cce8f324746def751c860d87bd4ce8e1c453bd0781310abcf46,2024-10-10T16:15:08.763000
|
||||
CVE-2024-7266,0,0,e5f7907376447dca655b663fd7a74a213d7d563471c1ec60c07889df6ae132cf,2024-10-10T16:15:08.910000
|
||||
CVE-2024-7267,0,0,d99f3d8b6ba6fe3542d0e70da6abdfbfdfd1dfb75ac1c1edca9979fafd8e77bc,2024-08-23T15:12:23.453000
|
||||
CVE-2024-7269,0,0,7c73ca02cf2298b160a9951524082c8dd50257198d6ed0e474a4c364b69ef80a,2024-09-19T14:37:26.380000
|
||||
CVE-2024-7272,0,0,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000
|
||||
@ -264169,7 +264177,7 @@ CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5
|
||||
CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000
|
||||
CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000
|
||||
CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000
|
||||
CVE-2024-7801,0,0,1164f794da4fee808f8e2273f992a67f819ac5e607d06fa4a43a71cfadbb2486,2024-10-07T17:48:28.117000
|
||||
CVE-2024-7801,0,1,a8939d42b45f5ccec85b43ab25a1d0d5c294724ddfec239c933d015a4f9ab704,2024-10-10T18:48:37.270000
|
||||
CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000
|
||||
CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000
|
||||
CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000
|
||||
@ -264970,7 +264978,7 @@ CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b
|
||||
CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000
|
||||
CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000
|
||||
CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000
|
||||
CVE-2024-9054,0,0,0d14c343d616ebc19e493649349714efeb90a8268a2c04aa86a752fc9f9af719,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9054,0,1,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000
|
||||
CVE-2024-9057,0,0,8f186945e14f31b85c7dab0f889179203746f07361926bd0e395e83df78388b0,2024-10-10T12:51:56.987000
|
||||
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
|
||||
@ -265241,11 +265249,15 @@ CVE-2024-9788,0,0,d0cba3dcf7be8cbc54f9f640901b56842d2e022c0155404c088882514bb98e
|
||||
CVE-2024-9789,0,0,2b4090b026a79f14a56152956a62ce7d4cd34e80782abc00813a239529bb2e8c,2024-10-10T14:15:06.803000
|
||||
CVE-2024-9790,0,0,062baa88691ce911608565afafee861bca229a67c8372d75785d3a77a80a0dfa,2024-10-10T15:15:15.457000
|
||||
CVE-2024-9792,0,0,2514dd90a5e918a09429c2c7607165e2b577a21ba08399597bfb6d38390f9c80,2024-10-10T15:15:15.710000
|
||||
CVE-2024-9793,1,1,f88fa106bba1c40a4cd6d3772f7b83c7e4ea94d13bbc61f765d745f4584ffc72,2024-10-10T16:15:09.080000
|
||||
CVE-2024-9794,1,1,24440d82ae69b0af74e9c151f82c9b1061e13043eae6ee1de39cb7f149ea4452,2024-10-10T16:15:09.350000
|
||||
CVE-2024-9793,0,0,f88fa106bba1c40a4cd6d3772f7b83c7e4ea94d13bbc61f765d745f4584ffc72,2024-10-10T16:15:09.080000
|
||||
CVE-2024-9794,0,0,24440d82ae69b0af74e9c151f82c9b1061e13043eae6ee1de39cb7f149ea4452,2024-10-10T16:15:09.350000
|
||||
CVE-2024-9796,0,0,c4f0b98e58e202300ac3c27bc57acd8a82992c6087c6cae3816d6e3a584fcf99,2024-10-10T15:35:16.310000
|
||||
CVE-2024-9797,1,1,32d50d64a6d23aa1ecf9c20299adc2043371b388c20eb741bc94c3c31f2a5a2e,2024-10-10T17:15:16.063000
|
||||
CVE-2024-9797,0,0,32d50d64a6d23aa1ecf9c20299adc2043371b388c20eb741bc94c3c31f2a5a2e,2024-10-10T17:15:16.063000
|
||||
CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000
|
||||
CVE-2024-9799,1,1,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000
|
||||
CVE-2024-9799,0,0,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000
|
||||
CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000
|
||||
CVE-2024-9803,1,1,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000
|
||||
CVE-2024-9803,0,0,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000
|
||||
CVE-2024-9804,1,1,89f8ea72d25f0eddbb8b5a3baea4833631254612ffe4917b0c6293a590d52dbf,2024-10-10T18:15:09.150000
|
||||
CVE-2024-9805,1,1,f93447fea5a871d2a236223dab8ba6d5f2748eefc9e1e41bc80a3cf4d5d96eb7,2024-10-10T18:15:09.440000
|
||||
CVE-2024-9806,1,1,fab3cf780899402ed265861f091b2b5c5a2f3a65753dc88a57c329dcdda36189,2024-10-10T19:15:17.520000
|
||||
CVE-2024-9807,1,1,f5649b59fd8fb32d2f9e11414708f6df3b7dcdb3d251afc4ade1b8999c66290b,2024-10-10T19:15:17.797000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user