mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-11-15T23:00:19.830276+00:00
This commit is contained in:
parent
63b98d3fa8
commit
37e12b3213
44
CVE-2017/CVE-2017-133xx/CVE-2017-13309.json
Normal file
44
CVE-2017/CVE-2017-133xx/CVE-2017-13309.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2017-13309",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-15T21:15:05.980",
|
||||
"lastModified": "2024-11-15T21:35:00.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In readEncryptedData of ConscryptEngine.java, there is a possible plaintext leak due to improperly used crypto. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2017/CVE-2017-133xx/CVE-2017-13310.json
Normal file
21
CVE-2017/CVE-2017-133xx/CVE-2017-13310.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2017-13310",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-15T22:15:14.177",
|
||||
"lastModified": "2024-11-15T22:15:14.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In createFromParcel of ViewPager.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2017/CVE-2017-133xx/CVE-2017-13311.json
Normal file
21
CVE-2017/CVE-2017-133xx/CVE-2017-13311.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2017-13311",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-15T22:15:14.240",
|
||||
"lastModified": "2024-11-15T22:15:14.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2017/CVE-2017-133xx/CVE-2017-13312.json
Normal file
21
CVE-2017/CVE-2017-133xx/CVE-2017-13312.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2017-13312",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-15T22:15:14.300",
|
||||
"lastModified": "2024-11-15T22:15:14.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In createFromParcel of MediaCas.java, there is a possible parcel read/write mismatch due to improper input validation. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2017/CVE-2017-133xx/CVE-2017-13313.json
Normal file
21
CVE-2017/CVE-2017-133xx/CVE-2017-13313.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2017-13313",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-15T22:15:14.373",
|
||||
"lastModified": "2024-11-15T22:15:14.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In ElementaryStreamQueue::dequeueAccessUnitMPEG4Video of ESQueue.cpp, there is a possible infinite loop leading to resource exhaustion due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2017/CVE-2017-133xx/CVE-2017-13314.json
Normal file
21
CVE-2017/CVE-2017-133xx/CVE-2017-13314.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2017-13314",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-15T22:15:14.440",
|
||||
"lastModified": "2024-11-15T22:15:14.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In setAllowOnlyVpnForUids of NetworkManagementService.java, there is a possible security settings bypass due to a missing permission check. This could lead to local escalation of privilege allowing users to access non-VPN networks, when they are supposed to be restricted to the VPN networks, with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2018-05-01",
|
||||
"source": "security@android.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27702",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-12T23:15:03.797",
|
||||
"lastModified": "2024-11-13T17:01:16.850",
|
||||
"lastModified": "2024-11-15T22:35:02.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El enrutador Sercomm Etisalat modelo S3-AC2100 se ve afectado por un control de acceso incorrecto a trav\u00e9s de la utilidad de diagn\u00f3stico en el panel del enrutador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Mrnmap/mrnmap-cve/blob/main/CVE-2021-27702",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-27703",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-12T23:15:03.897",
|
||||
"lastModified": "2024-11-13T17:01:16.850",
|
||||
"lastModified": "2024-11-15T22:35:03.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El modelo Sercomm Etisalat modelo S3-AC2100 se ve afectado por Cross Site Scripting (XSS) a trav\u00e9s de la p\u00e1gina de actualizaci\u00f3n de firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Mrnmap/mrnmap-cve/blob/main/CVE-2021-27703",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-37577",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T15:15:06.423",
|
||||
"lastModified": "2024-10-04T13:51:25.567",
|
||||
"lastModified": "2024-11-15T21:35:01.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "El emparejamiento de conexiones seguras de Bluetooth LE y BR/EDR y el emparejamiento simple seguro mediante el protocolo de entrada de clave de acceso en las especificaciones b\u00e1sicas de Bluetooth 2.1 a 5.3 pueden permitir que un atacante intermediario no autenticado identifique la clave de acceso utilizada durante el emparejamiento mediante el reflejo de una clave p\u00fablica manipulada con la misma coordenada X que la clave p\u00fablica ofrecida y mediante el reflejo de la evidencia de autenticaci\u00f3n del dispositivo iniciador, lo que potencialmente permite que este atacante complete el emparejamiento autenticado con el dispositivo que responde utilizando la clave de acceso correcta para la sesi\u00f3n de emparejamiento. Este es un problema relacionado con CVE-2020-26558."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bluetooth.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-47154",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-18T05:15:06.140",
|
||||
"lastModified": "2024-03-23T17:15:10.217",
|
||||
"lastModified": "2024-11-15T22:35:04.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El m\u00f3dulo Net::CIDR::Lite anterior a 0.22 para Perl no considera adecuadamente los caracteres cero extra\u00f1os al comienzo de una cadena de direcci\u00f3n IP, lo que (en algunas situaciones) permite a los atacantes eludir el control de acceso basado en direcciones IP."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20814",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2024-11-15T16:15:22.670",
|
||||
"lastModified": "2024-11-15T16:15:22.670",
|
||||
"lastModified": "2024-11-15T22:15:14.747",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-45935",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-27T05:15:47.377",
|
||||
"lastModified": "2024-08-02T21:15:47.317",
|
||||
"lastModified": "2024-11-15T22:35:05.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -22,7 +22,42 @@
|
||||
"value": "Se descubri\u00f3 que Qt 6 a 6.6 conten\u00eda una desreferencia de puntero NULL mediante la funci\u00f3n QXcbConnection::initializeAllAtoms(). NOTA: esto est\u00e1 en disputa porque no se espera que una aplicaci\u00f3n X contin\u00fae ejecut\u00e1ndose cuando hay un comportamiento an\u00f3malo arbitrario del servidor X."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jan/61",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11124",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-12T14:15:16.260",
|
||||
"lastModified": "2024-11-12T15:48:59.103",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T22:47:16.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in TimGeyssens UIOMatic 5 and classified as critical. This vulnerability affects unknown code of the file /src/UIOMatic/wwwroot/backoffice/resources/uioMaticObject.r. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en TimGeyssens UIOMatic 5 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /src/UIOMatic/wwwroot/backoffice/resources/uioMaticObject.r. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -106,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,26 +154,60 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:timgeyssens:ui-o-matic:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD4547F9-B069-49FC-900C-EBD1A40A260B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TimGeyssens/UIOMatic/pull/227",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TimGeyssens/UIOMatic/pull/227#issuecomment-2317993695",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TimGeyssens/UIOMatic/pull/227#issuecomment-2346074453",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.283972",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.283972",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-11175",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-13T16:15:17.740",
|
||||
"lastModified": "2024-11-13T17:01:16.850",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-15T22:50:48.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Public CMS 5.202406.d and classified as problematic. This issue affects some unknown processing of the file /admin/cmsVote/save of the component Voting Management. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named b9530b9cc1f5cfdad4b637874f59029a6283a65c. It is recommended to apply a patch to fix this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Public CMS 5.202406.d y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /admin/cmsVote/save del componente Voting Management. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. El parche se llama b9530b9cc1f5cfdad4b637874f59029a6283a65c. Se recomienda aplicar un parche para solucionar este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -57,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -105,6 +129,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +154,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:publiccms:publiccms:5.202406.d:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85610E70-6347-47C4-9F7B-2407D2AEA5CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/sanluan/PublicCMS/commit/b9530b9cc1f5cfdad4b637874f59029a6283a65c",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/sanluan/PublicCMS/issues/IB2BUV",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284351",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284351",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-112xx/CVE-2024-11217.json
Normal file
60
CVE-2024/CVE-2024-112xx/CVE-2024-11217.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11217",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-11-15T21:15:06.543",
|
||||
"lastModified": "2024-11-15T21:15:06.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in the OAuth-server. OAuth-server logs the OAuth2 client secret when the logLevel is Debug higher for OIDC/GitHub/GitLab/Google IDPs login options."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-11217",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326230",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2024/CVE-2024-112xx/CVE-2024-11261.json
Normal file
141
CVE-2024/CVE-2024-112xx/CVE-2024-11261.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2024-11261",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-15T22:15:14.970",
|
||||
"lastModified": "2024-11-15T22:15:14.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Student Record Management System 1.0. Affected is an unknown function of the file StudentRecordManagementSystem.cpp of the component Number of Students Menu. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 4.3
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Hacker0xone/CVE/issues/12",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.284718",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.284718",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.443906",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1555",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-02-20T14:15:09.007",
|
||||
"lastModified": "2024-02-20T19:50:53.960",
|
||||
"lastModified": "2024-11-15T21:35:03.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Al abrir un sitio web utilizando el controlador de protocolo `firefox://`, las cookies de SameSite no se respetaban adecuadamente. Esta vulnerabilidad afecta a Firefox < 123."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1873223",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20070",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-06-03T02:15:09.093",
|
||||
"lastModified": "2024-06-03T14:46:24.250",
|
||||
"lastModified": "2024-11-15T21:35:04.253",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En los m\u00f3dems, existe una posible divulgaci\u00f3n de informaci\u00f3n debido al uso de algoritmos criptogr\u00e1ficos riesgosos durante la negociaci\u00f3n del establecimiento de la conexi\u00f3n. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n, cuando se utiliza un algoritmo de cifrado d\u00e9bil, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY00942482; ID del problema: MSV-1469."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@mediatek.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21088",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-04-16T22:15:28.810",
|
||||
"lastModified": "2024-04-17T12:48:31.863",
|
||||
"lastModified": "2024-11-15T22:35:06.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21146",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:16.190",
|
||||
"lastModified": "2024-07-17T13:34:20.520",
|
||||
"lastModified": "2024-11-15T21:35:04.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-23944",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-03-15T11:15:08.927",
|
||||
"lastModified": "2024-05-01T17:15:29.330",
|
||||
"lastModified": "2024-11-15T21:35:05.263",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Divulgaci\u00f3n de informaci\u00f3n en el manejo de observadores persistentes en Apache ZooKeeper debido a la falta de verificaci\u00f3n de ACL. Permite a un atacante monitorear znodes secundarios adjuntando un observador persistente (comando addWatch) a un padre al que el atacante ya tiene acceso. El servidor ZooKeeper no realiza una verificaci\u00f3n de ACL cuando se activa el observador persistente y, como consecuencia, la ruta completa de los znodes sobre los que se activa un evento de vigilancia queda expuesta al propietario del observador. Es importante tener en cuenta que esta vulnerabilidad solo expone la ruta, no los datos de znode, pero dado que la ruta de znode puede contener informaci\u00f3n confidencial como el nombre de usuario o el ID de inicio de sesi\u00f3n, este problema es potencialmente cr\u00edtico. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.9.2, 3.8.4, que soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24447",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:26.930",
|
||||
"lastModified": "2024-11-15T19:15:06.300",
|
||||
"lastModified": "2024-11-15T21:35:05.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A buffer overflow in the ngap_amf_handle_pdu_session_resource_setup_response function of oai-cn5g-amf up to v2.0.0 allows attackers to cause a Denial of Service (DoS) via a PDU Session Resource Setup Response with an empty Response Item list."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cellularsecurity.org/ransacked",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T18:15:27.097",
|
||||
"lastModified": "2024-11-15T18:15:27.097",
|
||||
"lastModified": "2024-11-15T21:35:06.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cellularsecurity.org/ransacked",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T20:15:19.117",
|
||||
"lastModified": "2024-11-15T20:15:19.117",
|
||||
"lastModified": "2024-11-15T21:35:07.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Release Indication messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24453",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T20:15:19.203",
|
||||
"lastModified": "2024-11-15T20:15:19.203",
|
||||
"lastModified": "2024-11-15T21:35:08.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T20:15:19.300",
|
||||
"lastModified": "2024-11-15T20:15:19.300",
|
||||
"lastModified": "2024-11-15T21:35:08.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T20:15:19.403",
|
||||
"lastModified": "2024-11-15T20:15:19.403",
|
||||
"lastModified": "2024-11-15T21:35:09.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24457",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T20:15:19.510",
|
||||
"lastModified": "2024-11-15T20:15:19.510",
|
||||
"lastModified": "2024-11-15T21:35:10.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24458",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T20:15:19.610",
|
||||
"lastModified": "2024-11-15T20:15:19.610",
|
||||
"lastModified": "2024-11-15T21:35:11.383",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An invalid memory access when handling the ENB Configuration Transfer messages containing invalid PLMN Identities in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T20:15:19.703",
|
||||
"lastModified": "2024-11-15T20:15:19.703",
|
||||
"lastModified": "2024-11-15T21:35:12.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27223",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2024-03-11T19:15:48.603",
|
||||
"lastModified": "2024-03-12T12:40:13.500",
|
||||
"lastModified": "2024-11-15T21:35:13.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En EUTRAN_LCS_DecodeFacilityInformationElement de LPP_LcsManagement.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n despu\u00e9s de autenticar la conexi\u00f3n celular sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27789",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-05-14T15:13:01.493",
|
||||
"lastModified": "2024-06-10T19:15:53.183",
|
||||
"lastModified": "2024-11-15T22:35:08.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 16.7.8 y iPadOS 16.7.8, macOS Monterey 12.7.5, macOS Ventura 13.6.7, macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/May/11",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-29119",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-12T13:15:07.263",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T22:50:03.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in Spectrum Power 7 (All versions < V24Q3). The affected product contains several root-owned SUID binaries that could allow an authenticated local attacker to escalate privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad en Spectrum Power 7 (todas las versiones anteriores a V24Q3). El producto afectado contiene varios binarios SUID propiedad de superusuario que podr\u00edan permitir que un atacante local autenticado aumente los privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -80,6 +84,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -91,10 +105,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "24q3",
|
||||
"matchCriteriaId": "60335833-4E79-43C9-B629-1FD9D4D675DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-616032.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29316",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-28T23:15:46.470",
|
||||
"lastModified": "2024-03-29T12:45:02.937",
|
||||
"lastModified": "2024-11-15T21:35:13.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "NodeBB 3.6.7 es vulnerable a un control de acceso incorrecto; por ejemplo, un atacante con pocos privilegios puede acceder a las pesta\u00f1as restringidas del grupo de administraci\u00f3n a trav\u00e9s de \"isadmin\":true."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/%40krityamkarma858041/broken-access-control-nodebb-v3-6-7-eebc59c24deb",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-31337",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-13T18:15:20.167",
|
||||
"lastModified": "2024-11-15T14:00:09.720",
|
||||
"lastModified": "2024-11-15T22:35:09.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En PVRSRVRGXKickTA3DKM de rgxta3d.c, existe la posibilidad de ejecuci\u00f3n de c\u00f3digo arbitrario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-11-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34024",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-18T06:15:11.257",
|
||||
"lastModified": "2024-06-20T12:44:01.637",
|
||||
"lastModified": "2024-11-15T21:35:13.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Existe un problema de discrepancia de respuesta observable en ID Link Manager y FUJITSU Software TIME CREATOR. Si se explota esta vulnerabilidad, un atacante remoto no autenticado puede determinar si un nombre de usuario es v\u00e1lido o no."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN65171386/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34460",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-04T05:15:06.497",
|
||||
"lastModified": "2024-05-06T12:44:56.377",
|
||||
"lastModified": "2024-11-15T21:35:13.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La herramienta Tree Explorer de Organizer en Zenario anterior a 9.5.60602 se ve afectada por XSS. (Este componente se elimin\u00f3 en 9.5.60602)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://zenar.io/zenario-9/blog/zenario-9560602-patch-released",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34729",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-13T18:15:20.337",
|
||||
"lastModified": "2024-11-15T14:00:09.720",
|
||||
"lastModified": "2024-11-15T22:35:09.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "En varias ubicaciones, existe la posibilidad de ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-11-01",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-34747",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2024-11-13T18:15:20.410",
|
||||
"lastModified": "2024-11-15T14:00:09.720",
|
||||
"lastModified": "2024-11-15T22:35:09.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "En DevmemXIntMapPages de devicemem_server.c, existe un posible use-after-free debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/security/bulletin/2024-11-01",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-36140",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2024-11-12T13:15:07.957",
|
||||
"lastModified": "2024-11-12T13:55:21.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T22:53:26.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been identified in OZW672 (All versions < V5.2), OZW772 (All versions < V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha identificado una vulnerabilidad en OZW672 (todas las versiones anteriores a la V5.2) y OZW772 (todas las versiones anteriores a la V5.2). La pesta\u00f1a de cuentas de usuario de los dispositivos afectados es vulnerable a ataques de Cross Site Scripting (XSS) almacenado. Esto podr\u00eda permitir que un atacante remoto autenticado inyecte c\u00f3digo JavaScript arbitrario que luego ejecuta otro usuario v\u00edctima autenticado con posibles privilegios superiores a los del atacante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -58,8 +62,28 @@
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
|
||||
@ -91,10 +115,71 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.2",
|
||||
"matchCriteriaId": "79643F49-38EC-4BC7-9EB4-6586505B6D76"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.2",
|
||||
"matchCriteriaId": "C6D46204-8631-4874-98E4-112595A1BDEB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html",
|
||||
"source": "productcert@siemens.com"
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-383xx/CVE-2024-38370.json
Normal file
56
CVE-2024/CVE-2024-383xx/CVE-2024-38370.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-38370",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T22:15:15.317",
|
||||
"lastModified": "2024-11-15T22:15:15.317",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is a free asset and IT management software package. Starting in 9.2.0 and prior to 11.0.0, it is possible to download a document from the API without appropriate rights. Upgrade to 10.0.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xrm2-m72w-w4x4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-15T14:15:11.107",
|
||||
"lastModified": "2024-08-21T11:06:00.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-11-15T21:15:07.623",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -70,6 +70,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-42680.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYinfo.md",
|
||||
"source": "cve@mitre.org",
|
||||
|
25
CVE-2024/CVE-2024-447xx/CVE-2024-44758.json
Normal file
25
CVE-2024/CVE-2024-447xx/CVE-2024-44758.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44758",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T21:15:09.233",
|
||||
"lastModified": "2024-11-15T21:15:09.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the component /Production/UploadFile of NUS-M9 ERP Management Software v3.0.0 allows attackers to execute arbitrary code via uploading crafted files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-44758.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WarmBrew/web_vul/blob/main/M9ERP/M9ERP-upload.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-456xx/CVE-2024-45610.json
Normal file
56
CVE-2024/CVE-2024-456xx/CVE-2024-45610.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45610",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T21:15:09.370",
|
||||
"lastModified": "2024-11-15T21:15:09.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the Cable form. Upgrade to 10.0.17."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vvr8-chwj-9m4c",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-456xx/CVE-2024-45611.json
Normal file
56
CVE-2024/CVE-2024-456xx/CVE-2024-45611.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45611",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-11-15T21:15:09.627",
|
||||
"lastModified": "2024-11-15T21:15:09.627",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can bypass the access control policy to create a private RSS feed attached to another user account and use a malicious payload to triggger a stored XSS. Upgrade to 10.0.17."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-490xx/CVE-2024-49060.json
Normal file
56
CVE-2024/CVE-2024-490xx/CVE-2024-49060.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-49060",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-11-15T21:15:10.863",
|
||||
"lastModified": "2024-11-15T21:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Stack HCI Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49060",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-495xx/CVE-2024-49592.json
Normal file
21
CVE-2024/CVE-2024-495xx/CVE-2024-49592.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-49592",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T21:15:11.070",
|
||||
"lastModified": "2024-11-15T21:15:11.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "McAfee Trial Installer 16.0.53 has Incorrect Access Control that leads to Local Escalation of Privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mcafee.com/support/s/article/000002516?language=en_US",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50143",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-07T10:15:06.243",
|
||||
"lastModified": "2024-11-08T19:01:03.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T22:22:40.397",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,149 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: se corrige el uso de un valor no inicializado en udf_get_fileshortad. Se comprueba si hay desbordamiento al calcular alen en udf_current_aext para mitigar el uso posterior de un valor no inicializado en udf_get_fileshortad. Error de KMSAN[1]. Despu\u00e9s de aplicar el parche, el reproductor no activ\u00f3 ning\u00fan problema[2]. [1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df [2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.19.323",
|
||||
"matchCriteriaId": "3BC77309-A76B-49EF-A846-844D824E3586"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.285",
|
||||
"matchCriteriaId": "B5A89369-320F-47FC-8695-56F61F87E4C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.15.170",
|
||||
"matchCriteriaId": "2A6E0420-A1EC-4112-AAE8-10319804CCEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.115",
|
||||
"matchCriteriaId": "C08A77A6-E42E-4EFD-B5A1-2BF6CBBB42AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.59",
|
||||
"matchCriteriaId": "5D15CA59-D15C-4ACD-8B03-A072DEAD2081"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.6",
|
||||
"matchCriteriaId": "E4486B12-007B-4794-9857-F07145637AA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1ac49babc952f48d82676979b20885e480e69be8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/264db9d666ad9a35075cc9ed9ec09d021580fbb1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/417bd613bdbe791549f7687bb1b9b8012ff111c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4fc0d8660e391dcd8dde23c44d702be1f6846c61",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5eb76fb98b3335aa5cca6a7db2e659561c79c32b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/72e445df65a0aa9066c6fe2b8736ba2fcca6dac7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e52e0b92ed31dc62afbda15c243dcee0bb5bb58d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50835",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-14T17:15:07.090",
|
||||
"lastModified": "2024-11-15T13:58:08.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-11-15T21:35:17.397",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/edit_student.php in KASHIPARA E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros cys, un, ln, fn e id."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20edit%20student.pdf",
|
||||
|
25
CVE-2024/CVE-2024-509xx/CVE-2024-50983.json
Normal file
25
CVE-2024/CVE-2024-509xx/CVE-2024-50983.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50983",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-15T22:15:15.907",
|
||||
"lastModified": "2024-11-15T22:15:15.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/redhotchilihacker1/CVE-Hunting/blob/master/CVE-2024-50983/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/swampopus/flightpath/blob/e713acf9f125af22cc68c2f5664c2869cd73616b/flightpath/CHANGELOG.txt#L4",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-517xx/CVE-2024-51764.json
Normal file
21
CVE-2024/CVE-2024-517xx/CVE-2024-51764.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51764",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T22:15:16.017",
|
||||
"lastModified": "2024-11-15T22:15:16.017",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability has been identified in HPE Data Management Framework (DMF) Suite (CXFS). Depending on configuration, this vulnerability may lead to local/cluster unauthorized access."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04747en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-517xx/CVE-2024-51765.json
Normal file
21
CVE-2024/CVE-2024-517xx/CVE-2024-51765.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51765",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T22:15:16.090",
|
||||
"lastModified": "2024-11-15T22:15:16.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability has been identified in HPE Cray Data Virtualization Service (DVS). Depending on configuration, this vulnerability may lead to local/cluster unauthorized access."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04748en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-8755",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-10-11T15:15:06.150",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"lastModified": "2024-11-15T21:15:11.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:\n\n\n\n\n\n?Product \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n?\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n?\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)"
|
||||
"value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:\n\n\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9477",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-11-13T15:15:09.493",
|
||||
"lastModified": "2024-11-13T17:01:16.850",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-11-15T22:54:21.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AirTies Air4443 Firmware allows Cross-Site Scripting (XSS).This issue affects Air4443 Firmware: through 14102024.\n\n\nNOTE: The vendor was contacted and it was learned that the product classified as End-of-Life and End-of-Support."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en AirTies Air4443 Firmware que permite Cross-Site Scripting (XSS). Este problema afecta al firmware Air4443: hasta 14102024. NOTA: Se contact\u00f3 al proveedor y se supo que el producto estaba clasificado como al final de su vida \u00fatil y al final de su soporte."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -62,6 +66,28 @@
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -76,10 +102,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:airties:air4443_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "14102024",
|
||||
"matchCriteriaId": "8482ED96-B625-421B-8EF9-EAA6F7EFBDAC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:airties:air4443:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78D47A7A-A217-47EE-A28C-3C54886BF022"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-1851",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-95xx/CVE-2024-9500.json
Normal file
56
CVE-2024/CVE-2024-95xx/CVE-2024-9500.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-9500",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-11-15T22:15:16.580",
|
||||
"lastModified": "2024-11-15T22:15:16.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@autodesk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@autodesk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0023",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
103
README.md
103
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-11-15T21:00:20.056961+00:00
|
||||
2024-11-15T23:00:19.830276+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-11-15T20:35:26.383000+00:00
|
||||
2024-11-15T22:54:21.233000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
269994
|
||||
270012
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `32`
|
||||
Recently added CVEs: `18`
|
||||
|
||||
- [CVE-2024-24426](CVE-2024/CVE-2024-244xx/CVE-2024-24426.json) (`2024-11-15T19:15:06.057`)
|
||||
- [CVE-2024-24431](CVE-2024/CVE-2024-244xx/CVE-2024-24431.json) (`2024-11-15T19:15:06.137`)
|
||||
- [CVE-2024-24446](CVE-2024/CVE-2024-244xx/CVE-2024-24446.json) (`2024-11-15T19:15:06.220`)
|
||||
- [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2024-11-15T20:15:19.117`)
|
||||
- [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2024-11-15T20:15:19.203`)
|
||||
- [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2024-11-15T20:15:19.300`)
|
||||
- [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2024-11-15T20:15:19.403`)
|
||||
- [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2024-11-15T20:15:19.510`)
|
||||
- [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2024-11-15T20:15:19.610`)
|
||||
- [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2024-11-15T20:15:19.703`)
|
||||
- [CVE-2024-3334](CVE-2024/CVE-2024-33xx/CVE-2024-3334.json) (`2024-11-15T20:15:19.910`)
|
||||
- [CVE-2024-41679](CVE-2024/CVE-2024-416xx/CVE-2024-41679.json) (`2024-11-15T19:15:06.527`)
|
||||
- [CVE-2024-43417](CVE-2024/CVE-2024-434xx/CVE-2024-43417.json) (`2024-11-15T19:15:06.737`)
|
||||
- [CVE-2024-43418](CVE-2024/CVE-2024-434xx/CVE-2024-43418.json) (`2024-11-15T19:15:06.940`)
|
||||
- [CVE-2024-44759](CVE-2024/CVE-2024-447xx/CVE-2024-44759.json) (`2024-11-15T20:15:20.163`)
|
||||
- [CVE-2024-45608](CVE-2024/CVE-2024-456xx/CVE-2024-45608.json) (`2024-11-15T19:15:07.143`)
|
||||
- [CVE-2024-45609](CVE-2024/CVE-2024-456xx/CVE-2024-45609.json) (`2024-11-15T20:15:20.410`)
|
||||
- [CVE-2024-45969](CVE-2024/CVE-2024-459xx/CVE-2024-45969.json) (`2024-11-15T19:15:07.413`)
|
||||
- [CVE-2024-45970](CVE-2024/CVE-2024-459xx/CVE-2024-45970.json) (`2024-11-15T19:15:07.497`)
|
||||
- [CVE-2024-45971](CVE-2024/CVE-2024-459xx/CVE-2024-45971.json) (`2024-11-15T19:15:07.577`)
|
||||
- [CVE-2024-49536](CVE-2024/CVE-2024-495xx/CVE-2024-49536.json) (`2024-11-15T20:15:20.683`)
|
||||
- [CVE-2024-51037](CVE-2024/CVE-2024-510xx/CVE-2024-51037.json) (`2024-11-15T19:15:07.803`)
|
||||
- [CVE-2024-51141](CVE-2024/CVE-2024-511xx/CVE-2024-51141.json) (`2024-11-15T19:15:07.893`)
|
||||
- [CVE-2024-51142](CVE-2024/CVE-2024-511xx/CVE-2024-51142.json) (`2024-11-15T19:15:07.980`)
|
||||
- [CVE-2024-51330](CVE-2024/CVE-2024-513xx/CVE-2024-51330.json) (`2024-11-15T19:15:08.057`)
|
||||
- [CVE-2017-13309](CVE-2017/CVE-2017-133xx/CVE-2017-13309.json) (`2024-11-15T21:15:05.980`)
|
||||
- [CVE-2017-13310](CVE-2017/CVE-2017-133xx/CVE-2017-13310.json) (`2024-11-15T22:15:14.177`)
|
||||
- [CVE-2017-13311](CVE-2017/CVE-2017-133xx/CVE-2017-13311.json) (`2024-11-15T22:15:14.240`)
|
||||
- [CVE-2017-13312](CVE-2017/CVE-2017-133xx/CVE-2017-13312.json) (`2024-11-15T22:15:14.300`)
|
||||
- [CVE-2017-13313](CVE-2017/CVE-2017-133xx/CVE-2017-13313.json) (`2024-11-15T22:15:14.373`)
|
||||
- [CVE-2017-13314](CVE-2017/CVE-2017-133xx/CVE-2017-13314.json) (`2024-11-15T22:15:14.440`)
|
||||
- [CVE-2024-11217](CVE-2024/CVE-2024-112xx/CVE-2024-11217.json) (`2024-11-15T21:15:06.543`)
|
||||
- [CVE-2024-11261](CVE-2024/CVE-2024-112xx/CVE-2024-11261.json) (`2024-11-15T22:15:14.970`)
|
||||
- [CVE-2024-38370](CVE-2024/CVE-2024-383xx/CVE-2024-38370.json) (`2024-11-15T22:15:15.317`)
|
||||
- [CVE-2024-44758](CVE-2024/CVE-2024-447xx/CVE-2024-44758.json) (`2024-11-15T21:15:09.233`)
|
||||
- [CVE-2024-45610](CVE-2024/CVE-2024-456xx/CVE-2024-45610.json) (`2024-11-15T21:15:09.370`)
|
||||
- [CVE-2024-45611](CVE-2024/CVE-2024-456xx/CVE-2024-45611.json) (`2024-11-15T21:15:09.627`)
|
||||
- [CVE-2024-49060](CVE-2024/CVE-2024-490xx/CVE-2024-49060.json) (`2024-11-15T21:15:10.863`)
|
||||
- [CVE-2024-49592](CVE-2024/CVE-2024-495xx/CVE-2024-49592.json) (`2024-11-15T21:15:11.070`)
|
||||
- [CVE-2024-50983](CVE-2024/CVE-2024-509xx/CVE-2024-50983.json) (`2024-11-15T22:15:15.907`)
|
||||
- [CVE-2024-51764](CVE-2024/CVE-2024-517xx/CVE-2024-51764.json) (`2024-11-15T22:15:16.017`)
|
||||
- [CVE-2024-51765](CVE-2024/CVE-2024-517xx/CVE-2024-51765.json) (`2024-11-15T22:15:16.090`)
|
||||
- [CVE-2024-9500](CVE-2024/CVE-2024-95xx/CVE-2024-9500.json) (`2024-11-15T22:15:16.580`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `40`
|
||||
Recently modified CVEs: `37`
|
||||
|
||||
- [CVE-2024-41206](CVE-2024/CVE-2024-412xx/CVE-2024-41206.json) (`2024-11-15T19:35:08.297`)
|
||||
- [CVE-2024-41209](CVE-2024/CVE-2024-412xx/CVE-2024-41209.json) (`2024-11-15T19:35:09.147`)
|
||||
- [CVE-2024-41217](CVE-2024/CVE-2024-412xx/CVE-2024-41217.json) (`2024-11-15T19:35:10.000`)
|
||||
- [CVE-2024-44760](CVE-2024/CVE-2024-447xx/CVE-2024-44760.json) (`2024-11-15T20:15:20.270`)
|
||||
- [CVE-2024-45784](CVE-2024/CVE-2024-457xx/CVE-2024-45784.json) (`2024-11-15T20:35:07.697`)
|
||||
- [CVE-2024-46383](CVE-2024/CVE-2024-463xx/CVE-2024-46383.json) (`2024-11-15T20:35:07.907`)
|
||||
- [CVE-2024-50145](CVE-2024/CVE-2024-501xx/CVE-2024-50145.json) (`2024-11-15T19:50:44.203`)
|
||||
- [CVE-2024-50800](CVE-2024/CVE-2024-508xx/CVE-2024-50800.json) (`2024-11-15T19:35:15.183`)
|
||||
- [CVE-2024-50823](CVE-2024/CVE-2024-508xx/CVE-2024-50823.json) (`2024-11-15T20:35:09.490`)
|
||||
- [CVE-2024-50824](CVE-2024/CVE-2024-508xx/CVE-2024-50824.json) (`2024-11-15T20:35:10.823`)
|
||||
- [CVE-2024-50825](CVE-2024/CVE-2024-508xx/CVE-2024-50825.json) (`2024-11-15T20:35:12.167`)
|
||||
- [CVE-2024-50826](CVE-2024/CVE-2024-508xx/CVE-2024-50826.json) (`2024-11-15T20:35:13.500`)
|
||||
- [CVE-2024-50827](CVE-2024/CVE-2024-508xx/CVE-2024-50827.json) (`2024-11-15T20:35:14.820`)
|
||||
- [CVE-2024-50828](CVE-2024/CVE-2024-508xx/CVE-2024-50828.json) (`2024-11-15T20:35:16.143`)
|
||||
- [CVE-2024-50829](CVE-2024/CVE-2024-508xx/CVE-2024-50829.json) (`2024-11-15T20:35:17.460`)
|
||||
- [CVE-2024-50830](CVE-2024/CVE-2024-508xx/CVE-2024-50830.json) (`2024-11-15T20:35:18.800`)
|
||||
- [CVE-2024-50831](CVE-2024/CVE-2024-508xx/CVE-2024-50831.json) (`2024-11-15T20:35:20.133`)
|
||||
- [CVE-2024-50832](CVE-2024/CVE-2024-508xx/CVE-2024-50832.json) (`2024-11-15T20:35:21.483`)
|
||||
- [CVE-2024-50833](CVE-2024/CVE-2024-508xx/CVE-2024-50833.json) (`2024-11-15T20:35:22.847`)
|
||||
- [CVE-2024-50834](CVE-2024/CVE-2024-508xx/CVE-2024-50834.json) (`2024-11-15T20:35:24.163`)
|
||||
- [CVE-2024-50968](CVE-2024/CVE-2024-509xx/CVE-2024-50968.json) (`2024-11-15T19:55:17.097`)
|
||||
- [CVE-2024-52522](CVE-2024/CVE-2024-525xx/CVE-2024-52522.json) (`2024-11-15T19:35:18.670`)
|
||||
- [CVE-2024-9186](CVE-2024/CVE-2024-91xx/CVE-2024-9186.json) (`2024-11-15T20:35:26.383`)
|
||||
- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-11-15T20:15:21.523`)
|
||||
- [CVE-2024-9529](CVE-2024/CVE-2024-95xx/CVE-2024-9529.json) (`2024-11-15T19:35:19.160`)
|
||||
- [CVE-2024-23944](CVE-2024/CVE-2024-239xx/CVE-2024-23944.json) (`2024-11-15T21:35:05.263`)
|
||||
- [CVE-2024-24447](CVE-2024/CVE-2024-244xx/CVE-2024-24447.json) (`2024-11-15T21:35:05.520`)
|
||||
- [CVE-2024-24450](CVE-2024/CVE-2024-244xx/CVE-2024-24450.json) (`2024-11-15T21:35:06.360`)
|
||||
- [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2024-11-15T21:35:07.200`)
|
||||
- [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2024-11-15T21:35:08.027`)
|
||||
- [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2024-11-15T21:35:08.870`)
|
||||
- [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2024-11-15T21:35:09.713`)
|
||||
- [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2024-11-15T21:35:10.550`)
|
||||
- [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2024-11-15T21:35:11.383`)
|
||||
- [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2024-11-15T21:35:12.210`)
|
||||
- [CVE-2024-27223](CVE-2024/CVE-2024-272xx/CVE-2024-27223.json) (`2024-11-15T21:35:13.053`)
|
||||
- [CVE-2024-27789](CVE-2024/CVE-2024-277xx/CVE-2024-27789.json) (`2024-11-15T22:35:08.453`)
|
||||
- [CVE-2024-29119](CVE-2024/CVE-2024-291xx/CVE-2024-29119.json) (`2024-11-15T22:50:03.257`)
|
||||
- [CVE-2024-29316](CVE-2024/CVE-2024-293xx/CVE-2024-29316.json) (`2024-11-15T21:35:13.307`)
|
||||
- [CVE-2024-31337](CVE-2024/CVE-2024-313xx/CVE-2024-31337.json) (`2024-11-15T22:35:09.383`)
|
||||
- [CVE-2024-34024](CVE-2024/CVE-2024-340xx/CVE-2024-34024.json) (`2024-11-15T21:35:13.637`)
|
||||
- [CVE-2024-34460](CVE-2024/CVE-2024-344xx/CVE-2024-34460.json) (`2024-11-15T21:35:13.877`)
|
||||
- [CVE-2024-34729](CVE-2024/CVE-2024-347xx/CVE-2024-34729.json) (`2024-11-15T22:35:09.693`)
|
||||
- [CVE-2024-34747](CVE-2024/CVE-2024-347xx/CVE-2024-34747.json) (`2024-11-15T22:35:09.927`)
|
||||
- [CVE-2024-36140](CVE-2024/CVE-2024-361xx/CVE-2024-36140.json) (`2024-11-15T22:53:26.063`)
|
||||
- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-11-15T21:15:07.623`)
|
||||
- [CVE-2024-50143](CVE-2024/CVE-2024-501xx/CVE-2024-50143.json) (`2024-11-15T22:22:40.397`)
|
||||
- [CVE-2024-50835](CVE-2024/CVE-2024-508xx/CVE-2024-50835.json) (`2024-11-15T21:35:17.397`)
|
||||
- [CVE-2024-8755](CVE-2024/CVE-2024-87xx/CVE-2024-8755.json) (`2024-11-15T21:15:11.443`)
|
||||
- [CVE-2024-9477](CVE-2024/CVE-2024-94xx/CVE-2024-9477.json) (`2024-11-15T22:54:21.233`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
220
_state.csv
220
_state.csv
@ -97055,7 +97055,13 @@ CVE-2017-13304,0,0,bc01bf9619a2ed9e9969de4c65bf442a5fec6030e332a0ad95cf9c9671c48
|
||||
CVE-2017-13305,0,0,2acce61b5781c64283da81f61da07d2eadea1d7bd22b7b38dbaaa4a20fc64699,2019-10-03T00:03:26.223000
|
||||
CVE-2017-13306,0,0,423f74da95b3c89ac4494a0b8267dc23743708bc4de0a0cc92f3a3c6e2cdbb52,2019-10-03T00:03:26.223000
|
||||
CVE-2017-13307,0,0,e83357c9230d3ea5a0100316af468cc9cffb10b590fc6474a2652e4724796965,2019-10-03T00:03:26.223000
|
||||
CVE-2017-13309,1,1,2e22442e912c5fb731ed83c3f96ba1a742154503347e7ab20f5d5707587891a4,2024-11-15T21:35:00.833000
|
||||
CVE-2017-1331,0,0,fbfa6b4058c65afc0dadcb6abf2b300b566ab5bd4820053710fa36c8414eaba4,2017-08-09T12:43:53.857000
|
||||
CVE-2017-13310,1,1,033b3b63ed77c79d7314fc6565fc5c81260f38803d345358a3676942601fa56b,2024-11-15T22:15:14.177000
|
||||
CVE-2017-13311,1,1,44c0edcb53250bc42089f6ccc93c1af6528c9b857753cba11b459a79ba25c682,2024-11-15T22:15:14.240000
|
||||
CVE-2017-13312,1,1,e34a6fa4f383f164b91264bc4bdfb4a4368f6c80074f8a18574b28d7e93a0d8b,2024-11-15T22:15:14.300000
|
||||
CVE-2017-13313,1,1,c49dc9ddc0a7110bc63ef52a03d676f2216066756e3b2d280089ba7dc6b8e5d5,2024-11-15T22:15:14.373000
|
||||
CVE-2017-13314,1,1,76ea800f4d2ed2a18d3ca10f332fb088665ffa85b184df9396944a5b6c20f3c1,2024-11-15T22:15:14.440000
|
||||
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
|
||||
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
|
||||
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
|
||||
@ -172811,8 +172817,8 @@ CVE-2021-27697,0,0,d8ded8bdc52f59c312d3bf74607b3b01908e360dcebb7fc529a36c74b3134
|
||||
CVE-2021-27698,0,0,a71ff4d002f44401e10c1b1ff211b671c263fe02041820a72f55c49bfa7844a8,2021-04-09T17:58:56.127000
|
||||
CVE-2021-27700,0,0,df728dd54188563ed8cd3ee40e75b79fdd65a0a46114e1813cdb87a8e42063f0,2024-11-13T17:01:16.850000
|
||||
CVE-2021-27701,0,0,0cfaf4a9ab35e9f24a43b423a0184d590f4bcf791e191d98fedda77826098f61,2024-11-13T17:01:16.850000
|
||||
CVE-2021-27702,0,0,46efb4b17f0b7cf376e80d83971ca54223b2df79d26ad784365d8128d1e2ca13,2024-11-13T17:01:16.850000
|
||||
CVE-2021-27703,0,0,95d232c5cf5b38169b612f483aa773fb398f25077a05f6e33f9c4e62d7d0e50b,2024-11-13T17:01:16.850000
|
||||
CVE-2021-27702,0,1,0548d60e19988cde8ba8fdcde37222b33338b356d699d9a704ce05570224eb06,2024-11-15T22:35:02.520000
|
||||
CVE-2021-27703,0,1,d62ff39918af8c0cb167f5b639fc31ed4219eb530213926a015fce97189ac0a8,2024-11-15T22:35:03.380000
|
||||
CVE-2021-27704,0,0,7112cca193900f07897e7733aa4595c2de8f409e2bfb65df8b19fdfc732c4062,2024-11-13T17:01:16.850000
|
||||
CVE-2021-27705,0,0,0fc451b5c83532ba56dddcc5d193e275e54a51b7f6fd8bde6d30a4d168e267fa,2021-04-20T21:43:49.410000
|
||||
CVE-2021-27706,0,0,350588a83c6c47e1bdcdf8294935f4152b5875d95db621a6ad2d14cc64b3e98f,2021-04-20T21:43:34.577000
|
||||
@ -179880,7 +179886,7 @@ CVE-2021-37391,0,0,612092213cbf3c7c8612c0c47f8c525d5a52fd73e735ce6c2b430c9b86b41
|
||||
CVE-2021-37392,0,0,60b8dbff0c2d792a54d0cec2f57109e745df15412f48a80e1ebca647d9b97654,2021-08-06T16:21:28.697000
|
||||
CVE-2021-37393,0,0,8aef86848c22832237243030c09554d5c294fe67bf36c767afe9af07ac38cfd0,2021-08-06T16:16:15.627000
|
||||
CVE-2021-37394,0,0,3bedea4cd8c10cff8545c5ec47bc3c52f53035db41f301c1be09bcbd332575a2,2022-07-12T17:42:04.277000
|
||||
CVE-2021-3740,0,1,8b3b4a3b17eafbcc622d74e09a34aeba660ee97147cab5876d5a308e76fa0842,2024-11-15T19:35:02.440000
|
||||
CVE-2021-3740,0,0,8b3b4a3b17eafbcc622d74e09a34aeba660ee97147cab5876d5a308e76fa0842,2024-11-15T19:35:02.440000
|
||||
CVE-2021-37400,0,0,b0d27ef29eb9b33b48de9bc66b3e1c03ad9217ada68e0e9fad53740c5cf9e509,2022-01-07T20:40:19.347000
|
||||
CVE-2021-37401,0,0,59627adb2bdfa439df8627bb1689eacf7a0bb3291449d63f2dceab9e283ff994,2022-01-07T20:29:50.673000
|
||||
CVE-2021-37402,0,0,cf2062259da087492fc8edbe731f8aff92da042f2b45087a0d323466afa22b5a,2022-02-10T17:57:02.027000
|
||||
@ -180016,7 +180022,7 @@ CVE-2021-37571,0,0,8810bdea1e0d75d03e240d501b5268f30a1e86678a94e1f0084ada248d7d9
|
||||
CVE-2021-37572,0,0,281c07dfa56f806afe8a253991bfe8f3f11a98fa249cc7aa15d0189bdbefced0,2022-01-06T17:48:54.300000
|
||||
CVE-2021-37573,0,0,7a62febf8116992b0f2e78d77492937043d09c083776ae7d2f10c207efd03f0c,2021-08-17T12:51:19.657000
|
||||
CVE-2021-37576,0,0,e34430bb99e453aab32f0d546a7eac30cb7e4a1ba3ddc5e07589a81e633a6e3f,2023-11-07T03:36:58.177000
|
||||
CVE-2021-37577,0,0,758592ffe72b54a9258c14b5d6355ad5a6e0dcbc91f9380d094322611f8e9e55,2024-10-04T13:51:25.567000
|
||||
CVE-2021-37577,0,1,6d9673d10175da3b562723e50eaaf21f208195d20ace6575eb3efe3c6b982fc7,2024-11-15T21:35:01.120000
|
||||
CVE-2021-37578,0,0,9c85acc83abe44ac1a15da9480215ac43f11754a5a9615af576198fc0797def1,2021-08-11T14:35:32.113000
|
||||
CVE-2021-37579,0,0,9b4a5e1e4d0e07566dadc76198aebd7c7b97cb20e6feccf4056e349e554ad702,2021-09-17T15:54:55.787000
|
||||
CVE-2021-3758,0,0,5a543d76efb308409cc43a5170931244d9fe9c47acf40afa5bdb66fa49ae3d1e,2021-09-10T18:05:03.760000
|
||||
@ -187127,7 +187133,7 @@ CVE-2021-47150,0,0,c039c267eea8345920d021434c604afedc5623ca093058c28ca680cbc8aa1
|
||||
CVE-2021-47151,0,0,1fe3b28ed2c4f851af3156078fb754f319c7960371ca93a8bceeedd12ec853ab,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47152,0,0,b1587e917360f7774ad2c993fe18c5bf1b14c10323a49c1c67ba3251b6d157db,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47153,0,0,56cbf1db580541bf210a568c42ec0d8d1585a326c6cb4d7e68f92d9c28512649,2024-11-05T17:35:02.053000
|
||||
CVE-2021-47154,0,0,7696bd975b9d5cd0a5ecb9d8c992707b7a3d42cc8932a1cadcc3789a47ae2a4d,2024-03-23T17:15:10.217000
|
||||
CVE-2021-47154,0,1,bf01c5a57b84c76af2ae964b238dd0a389f1bbe02106fafbff877dce7353cf4b,2024-11-15T22:35:04.207000
|
||||
CVE-2021-47155,0,0,6308ec95938d8ffb3e70dc240296486288d07212264c6946580b1860e22fa163,2024-08-29T20:35:04.380000
|
||||
CVE-2021-47156,0,0,b2f4b6ef5982b832a45226efc32372b1be0aadedffe1e1672fdf4a4a2cbbe76d,2024-03-18T12:38:25.490000
|
||||
CVE-2021-47157,0,0,ffa912ab59086aaed72ae16afb96bf4cf5c72c4797b59fc955ea9521c3ad905d,2024-03-18T12:38:25.490000
|
||||
@ -189364,7 +189370,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0
|
||||
CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000
|
||||
CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000
|
||||
CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000
|
||||
CVE-2022-1884,0,1,23b1205baec96f7e23701a3fb895259c618cca15d9600e947a60e6f8ad9e65b7,2024-11-15T20:35:02.693000
|
||||
CVE-2022-1884,0,0,23b1205baec96f7e23701a3fb895259c618cca15d9600e947a60e6f8ad9e65b7,2024-11-15T20:35:02.693000
|
||||
CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000
|
||||
CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000
|
||||
CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000
|
||||
@ -190345,7 +190351,7 @@ CVE-2022-20810,0,0,d465eef9b8b49f6cfb2d6bafb33fa2e371f9e6acad1c0018859266ef98cb7
|
||||
CVE-2022-20811,0,0,894662974debbe90d9048d04c2e89055d5abb1a4cf1c1d40eeea299833ae5fe9,2023-11-07T03:43:01.097000
|
||||
CVE-2022-20812,0,0,ab77d59c65b8c3b8fa22769a2502e274cfb97592b7f62e8f7e615979b1069764,2023-11-07T03:43:01.317000
|
||||
CVE-2022-20813,0,0,41ff039ab407da2aee799c0e1f824d1a5aed4332ff899eff1c4f22e18add2aca,2023-11-07T03:43:01.517000
|
||||
CVE-2022-20814,0,0,2a51a8ad0b3a6aea61694eae4c68a3c856708276243d42739a7f8962ab6a8c3c,2024-11-15T16:15:22.670000
|
||||
CVE-2022-20814,0,1,4b020eca98f138c140408118b3e94914dfba654ad75c0f917c759c799a7f932b,2024-11-15T22:15:14.747000
|
||||
CVE-2022-20815,0,0,3b286a33cd412277cd07ecc33c3a88fe24589d1bb8e68df238991b9f13826a97,2023-11-07T03:43:01.693000
|
||||
CVE-2022-20816,0,0,f11ccbdc893ee80f99212c658d510a9d68a3c1dc64cf17744fc0ba52a820c978,2023-11-07T03:43:01.880000
|
||||
CVE-2022-20817,0,0,d44f2aa7ff7acf966547c59d8fb64b08a5a1dc81ddb4d70dbf3284d5da7cd837,2023-11-07T03:43:02.067000
|
||||
@ -233365,7 +233371,7 @@ CVE-2023-43835,0,0,d8c6ddc2049f074a11aa1d14080d5c6c78f2183d14f440bfa86d65c24d709
|
||||
CVE-2023-43836,0,0,909aa097fa945ea9081ca912c09938b024bee55c7581cdb4815aa6c6721c51ea,2023-10-04T17:04:16.373000
|
||||
CVE-2023-43838,0,0,ef0d4d0a77025638e25ac91e467d096c6c184c9c50cf0c660c7d95e7823829db,2023-10-06T16:14:54.457000
|
||||
CVE-2023-4384,0,0,54db9c5e0e48d365638318efaabdbc065f24cee66ef882641c4e391d0e81b6d5,2024-05-17T02:31:31.327000
|
||||
CVE-2023-43842,0,1,969ad9c97c033694c7c5ce6a213f5d596585a2f74b768866e6202653765d58cb,2024-11-15T19:35:03.303000
|
||||
CVE-2023-43842,0,0,969ad9c97c033694c7c5ce6a213f5d596585a2f74b768866e6202653765d58cb,2024-11-15T19:35:03.303000
|
||||
CVE-2023-43843,0,0,aef808c71263ea6153f2eb4b7e45ae7b9a73047abeb8810e9698360185074ff9,2024-05-29T13:02:09.280000
|
||||
CVE-2023-43844,0,0,060d731423af6f4711e120eb2a59d74f233fa214c9e9f3f730d535056c38b526,2024-08-22T20:35:01.130000
|
||||
CVE-2023-43845,0,0,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000
|
||||
@ -234723,7 +234729,7 @@ CVE-2023-4593,0,0,4991cf119c8ebfc10d48154734bdf0ee9365316ccc7c1b60d5d04e7ab999d2
|
||||
CVE-2023-45930,0,0,ac3197c84435c7633fa4745f386c7743f353780ba24625d46aefcbc75ec9d4de,2024-01-30T06:15:45.560000
|
||||
CVE-2023-45931,0,0,1f5bd835283ab289e500417af1c235f343ba52a05df340c733345fabae2eb518,2024-09-04T15:35:13.067000
|
||||
CVE-2023-45932,0,0,5804986f26a4a7091164de7ac51ad9027240da2e953af7ae7ca5bb7bec6cb357,2024-01-29T09:15:42.593000
|
||||
CVE-2023-45935,0,0,a681b11e1b15d64f0feef3bbce8cfc25d06bd82aced7e4d63aa09594ced1e08a,2024-08-02T21:15:47.317000
|
||||
CVE-2023-45935,0,1,f6ee20461587d18e0358708786acbde234e71430dcae9955d2c03c48be24878c,2024-11-15T22:35:05.180000
|
||||
CVE-2023-4594,0,0,24c035b780c77202dedc81f329600980e9f4ebf5e60ff552b7c3ea2fd6139c32,2023-11-29T21:23:22.717000
|
||||
CVE-2023-4595,0,0,e074cf3112cc40f52c3cb7bd1d68d6206089cc822c0d5f9ca4fee6aa17585812,2023-11-29T21:23:11.087000
|
||||
CVE-2023-45951,0,0,a0ce1dec3006fcbc682f8af4087e6b6b07ea1f5c8d28deeaa25ad267f3532e34,2023-10-24T20:49:24.337000
|
||||
@ -235373,7 +235379,7 @@ CVE-2023-46786,0,0,bf4916e892e13d9bd5f18249e97f7ed4aeb5247f2854f8c308efd96466799
|
||||
CVE-2023-46787,0,0,eee6ea113b686659f2a66a8e2e38db99b180a9cdd992ed45b258359c2fbbafb0,2023-11-13T18:00:08.857000
|
||||
CVE-2023-46788,0,0,fa89ddc1e582ea32e59694cd588090422058d73f3e55d49cdf4218b1d27bcb24,2023-11-13T18:00:01.510000
|
||||
CVE-2023-46789,0,0,9fbdb411cccdb011e81628500fbc3b74a0a6d06d2a8237255e6accafa55442cd,2023-11-13T17:59:42.877000
|
||||
CVE-2023-4679,0,1,9696f8639661f4ff600ec910a28b0621ec509409b2c3dcff5c480894998943b2,2024-11-15T20:35:03.507000
|
||||
CVE-2023-4679,0,0,9696f8639661f4ff600ec910a28b0621ec509409b2c3dcff5c480894998943b2,2024-11-15T20:35:03.507000
|
||||
CVE-2023-46790,0,0,7414a678623b3a8d31eda7749ee35a2bdf61169d6ade6fd91b06a5a0e4bffda9,2024-01-02T22:15:08.290000
|
||||
CVE-2023-46791,0,0,4f7a7ce04b20ee1c59664fc3196bc82b7bf68c16659759baf914252cd593ed28,2024-01-02T22:15:08.367000
|
||||
CVE-2023-46792,0,0,7e34df21be011e0e859102a1381c46b673dbda14e06d4aaaab00023b1fb66f87,2024-01-02T22:15:08.440000
|
||||
@ -242290,7 +242296,7 @@ CVE-2024-0782,0,0,dd227a8b469ce6630eb22142a87d0da772ecdb0285534b1bcdde3ca20e489d
|
||||
CVE-2024-0783,0,0,889b3aec94f8730e9264c4087d63efb1328316b4df2b41f572aa9ab243eedd51,2024-05-17T02:34:58.020000
|
||||
CVE-2024-0784,0,0,05fccc58af077ffcd0eb7b186f39f412c8126936ae9b879608bee8086b2c9a33,2024-05-17T02:34:58.123000
|
||||
CVE-2024-0786,0,0,09a89f715683ba83fe81b0a3f3fbdcf9cf5cb4fbf3001ded7457bfdf3b510a57,2024-02-28T14:06:45.783000
|
||||
CVE-2024-0787,0,1,da307c985a5d2f7277ca10e0fa3477284443893dbdb87e2624f6bc584ee82d36,2024-11-15T19:35:04.380000
|
||||
CVE-2024-0787,0,0,da307c985a5d2f7277ca10e0fa3477284443893dbdb87e2624f6bc584ee82d36,2024-11-15T19:35:04.380000
|
||||
CVE-2024-0788,0,0,77f61568ad57c437194aa13eed7b7f4a244f0c473b6deae4d7ecf1e9a4375c8f,2024-09-05T23:15:11.527000
|
||||
CVE-2024-0789,0,0,dd4dfae2cf9c1e14c885c435e4946684b1e28fce4e56958a0b475f730b1ce5ce,2024-06-20T12:44:01.637000
|
||||
CVE-2024-0790,0,0,faf5037c158d063c7d3783eeaaf8baa8e520d90b8a2f56f0b34167c00c86529b,2024-02-13T19:42:38.757000
|
||||
@ -242551,7 +242557,7 @@ CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615a
|
||||
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
|
||||
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
|
||||
CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000
|
||||
CVE-2024-10104,0,1,72cf69759458c44313ae635dcdff8a669fdc4ab81a7522ae21a712b6681cb93c,2024-11-15T19:35:04.683000
|
||||
CVE-2024-10104,0,0,72cf69759458c44313ae635dcdff8a669fdc4ab81a7522ae21a712b6681cb93c,2024-11-15T19:35:04.683000
|
||||
CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000
|
||||
CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000
|
||||
CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000
|
||||
@ -243070,7 +243076,7 @@ CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976
|
||||
CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000
|
||||
CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000
|
||||
CVE-2024-10934,1,1,a69e8c368cd0afb57664ae3d4f2c76ada6a2cb886a8cd15572bdb8a5a3aba87d,2024-11-15T20:15:17.620000
|
||||
CVE-2024-10934,0,0,a69e8c368cd0afb57664ae3d4f2c76ada6a2cb886a8cd15572bdb8a5a3aba87d,2024-11-15T20:15:17.620000
|
||||
CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4626,2024-11-08T19:01:25.633000
|
||||
CVE-2024-10943,0,0,0ccd8432f0f0e1492058026cc01938e6138a4fa1c4553945683b272d10510561,2024-11-13T17:01:58.603000
|
||||
@ -243181,7 +243187,7 @@ CVE-2024-11120,0,0,368b83ae5902e34b0c550f99a9e3cbb6abf3210b2f6a699d61899ee63a5aa
|
||||
CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000
|
||||
CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000
|
||||
CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000
|
||||
CVE-2024-11124,0,0,efd601a275819de67bd20a9a8d3bf2e3170b2fecab4aaf15486a28875c9a9123,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11124,0,1,85986f24f31ee4bef22b7f18f4c9a6da3c56a63086ac6bba2d472201c2da5cfd,2024-11-15T22:47:16.050000
|
||||
CVE-2024-11125,0,0,122a7b88d4467b2583e8cd046c15116b4ff84a1dc79b401a73643c2cfd3066b9,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e708,2024-11-12T15:48:59.103000
|
||||
CVE-2024-11127,0,0,7d1296cebc7c05fd3dd6b306ae87cbc2c9940166d503543487e9da9414a97cf7,2024-11-15T17:29:43.450000
|
||||
@ -243198,7 +243204,7 @@ CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176f
|
||||
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
|
||||
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
|
||||
CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000
|
||||
CVE-2024-11175,0,0,2129c1cdddb364757f82b16fba301982b34bdf0dfeb6c2bb6f48aa85e142eee1,2024-11-13T17:01:16.850000
|
||||
CVE-2024-11175,0,1,a70e7384355b41e57dbae42f60548787ddcd5e64369094201d6e3104c030e304,2024-11-15T22:50:48.817000
|
||||
CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62fc3,2024-02-10T04:13:01.030000
|
||||
CVE-2024-11182,0,0,2c8b47b53840f1b2967586a65b9fa7c78b80f1c6c1c69d3e7c3505d211f5d54c,2024-11-15T13:58:08.913000
|
||||
CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000
|
||||
@ -243215,6 +243221,7 @@ CVE-2024-11212,0,0,d580f98b2d893ad0ca823fed098b3da0e1374898a103c5afa4af95f7221aa
|
||||
CVE-2024-11213,0,0,0c495b874546c97440b3fe42e97782a656e128548583235ee69a0a31261b0052,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11214,0,0,d39fe330eb8d17269036227b36e62f47bf8007d5207bfeb9d874b55c9f476130,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11217,1,1,5fc631148be96815ae3dccb931ec54e2a397e3be9cc132b7c1b1194566441529,2024-11-15T21:15:06.543000
|
||||
CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000
|
||||
CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000
|
||||
CVE-2024-11237,0,0,8e8efac9e9fbe063a859c165ee378ecff565ba183a1a030817265309876770b7,2024-11-15T13:58:08.913000
|
||||
@ -243233,11 +243240,12 @@ CVE-2024-11248,0,0,05f63ae886ce8e4f4f6c9c95a9d19bf2bcd71685909c7308e46e3edf7854f
|
||||
CVE-2024-1125,0,0,f1d015036f4cdda32f03ba210c93a8838e991a1e1d168cce1bd81d56428097c5,2024-03-11T01:32:39.697000
|
||||
CVE-2024-11250,0,0,8b0e6334f9dcad2b90092c4673840dfd4d860cb1e6e6f8d5be015dbe688bf885,2024-11-15T18:15:26.280000
|
||||
CVE-2024-11251,0,0,e3365cd5b35beffead202860ed23ac651fd05ceb4020ebe0e15542749f7995ad,2024-11-15T18:15:26.653000
|
||||
CVE-2024-11256,1,1,a200740b98546397555a7010cd472bb40574fc7bd60c8575d49577892414e623,2024-11-15T20:15:17.957000
|
||||
CVE-2024-11257,1,1,ec4480984683bf3b8eebcd3579b1969108cf413555e22eb0ff85eb2e036f9f3b,2024-11-15T20:15:18.253000
|
||||
CVE-2024-11258,1,1,6e1f232e48a40af52ebee8cbe965f07a9117e4136a41242b3cd57c4adb465599,2024-11-15T20:15:18.523000
|
||||
CVE-2024-11259,1,1,26858f27f49adbee1bd63f6e54c6c9a5a54b03d28b7660f6c7e83b128f88a6cc,2024-11-15T20:15:18.797000
|
||||
CVE-2024-11256,0,0,a200740b98546397555a7010cd472bb40574fc7bd60c8575d49577892414e623,2024-11-15T20:15:17.957000
|
||||
CVE-2024-11257,0,0,ec4480984683bf3b8eebcd3579b1969108cf413555e22eb0ff85eb2e036f9f3b,2024-11-15T20:15:18.253000
|
||||
CVE-2024-11258,0,0,6e1f232e48a40af52ebee8cbe965f07a9117e4136a41242b3cd57c4adb465599,2024-11-15T20:15:18.523000
|
||||
CVE-2024-11259,0,0,26858f27f49adbee1bd63f6e54c6c9a5a54b03d28b7660f6c7e83b128f88a6cc,2024-11-15T20:15:18.797000
|
||||
CVE-2024-1126,0,0,719cb9688eaad755b04db0e390abb1a9b0b6a5e25f632a929e6736322faf9c06,2024-03-13T18:16:18.563000
|
||||
CVE-2024-11261,1,1,d4990e22cfca44a02294d76909efed0131cd57bb247733c65dc562d3ac47a1b4,2024-11-15T22:15:14.970000
|
||||
CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f08c,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1128,0,0,de5352d9c421a908307277eb7da3f5f6fcfc08a095ea033ab740d4804aa5ccea,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1129,0,0,bb6d36851ed2d72741a575302302ac57d511f2bf349c6ca7db7385fd53c3529a,2024-02-29T13:49:29.390000
|
||||
@ -243347,7 +243355,7 @@ CVE-2024-1236,0,0,9d7e383554119a6eb8995bc3e3c594237fc2517d15212a162d538fac1156aa
|
||||
CVE-2024-1237,0,0,971489c96af173cd98795b7c46411895a847e87f027eb141f5511aec59ad2e5a,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1238,0,0,9f0a38233429658f32f8a976db71d716904de01ac4f7f996eed98f40cb8ba7b5,2024-04-01T01:12:59.077000
|
||||
CVE-2024-1239,0,0,db432ab525693f47cc78135d0c2cedd8ee6bd0f1495c321fd41dc0e5a9f890b0,2024-03-17T22:38:29.433000
|
||||
CVE-2024-1240,0,1,8ca6c8e77172e1b496219558ece8ecfbf40ada3bc3daf93700232ad7bd3910de,2024-11-15T19:35:06.063000
|
||||
CVE-2024-1240,0,0,8ca6c8e77172e1b496219558ece8ecfbf40ada3bc3daf93700232ad7bd3910de,2024-11-15T19:35:06.063000
|
||||
CVE-2024-1241,0,0,96fd44c6e5fabc6d4bff3dcf2753825594889b1a8245005a991dd6eafde3d621,2024-04-23T12:52:09.397000
|
||||
CVE-2024-1242,0,0,77f2f4c11df61eb6748d46bb4a1f43701b90877f99a1028521d6b0a2e093dca9,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1245,0,0,9f0a6683f1d5096645febd5b42c6e25cc14953b1062510f4b421bd46b5a5a4fe,2024-02-15T04:44:27.987000
|
||||
@ -243643,7 +243651,7 @@ CVE-2024-1551,0,0,92353a25b78aed9a3875a0acd3ba7810ab4ec982e716be554b468147656f8b
|
||||
CVE-2024-1552,0,0,307682b68873a43cdafe24dafb6eac26e19ab3e38eeb9bd9141f362a83f2be97,2024-03-04T09:15:37.957000
|
||||
CVE-2024-1553,0,0,d4e69432c11edaf26cb5ecef8a367b24963a2177b8e86262b661ecf0acdfe67c,2024-08-23T20:35:04.453000
|
||||
CVE-2024-1554,0,0,94cfb6cc07ab1eefb4963abf2ff816e5d8e104e1eff443cecb73eef11729b877,2024-08-20T20:35:08.463000
|
||||
CVE-2024-1555,0,0,65f007452d03670d11abd2d0d619aa73a454e482a2468476c6547ed89e323774,2024-02-20T19:50:53.960000
|
||||
CVE-2024-1555,0,1,cc827552f53cefe7ea9b6093e830251abcca34d6831cb7d3ee42365f9b714c10,2024-11-15T21:35:03.400000
|
||||
CVE-2024-1556,0,0,4a94d2fdf889ccc8aa6ea910de12200555f8d40d609519dd619bf98c3de1e735,2024-11-12T20:35:06.360000
|
||||
CVE-2024-1557,0,0,51db3712932ec01c1eb8b1a021f210ee26b20d61c6eed4eadf04bb01c575f448,2024-08-12T17:35:01.353000
|
||||
CVE-2024-1558,0,0,5408d260e40f39bd01d36a021872f3676b893d34da45c6b851a3176159106b0a,2024-04-16T13:24:07.103000
|
||||
@ -244128,7 +244136,7 @@ CVE-2024-20067,0,0,1f8b2f8c715bdcaed434516377e7c3641986c19edc4e9bc14558e6ec23837
|
||||
CVE-2024-20068,0,0,679bf43563d4114fa5098e0c9b0aa62c3a9922c68431f8362f508d44bd4491dd,2024-06-03T14:46:24.250000
|
||||
CVE-2024-20069,0,0,172335f530710667e7919bfa3b2133c1f2b8547ae34d6fb283548afd07a6be8a,2024-08-01T13:46:18.590000
|
||||
CVE-2024-2007,0,0,a3fe3f3185f5699d68e2f942355bc2ef347eee74a5b1980d4a10ee9977afe62a,2024-05-17T02:37:59.197000
|
||||
CVE-2024-20070,0,0,ae885049fd2221a76bca2636832ad5f29da86da3a58d64d82733ecc73da349ae,2024-06-03T14:46:24.250000
|
||||
CVE-2024-20070,0,1,9201e3308eeabc9966ad873e04ddda2b0e95eae0c22618376f6162770939f464,2024-11-15T21:35:04.253000
|
||||
CVE-2024-20071,0,0,88ec01cde687e5e65483ee95a4e6f5c3aa21fc1c2d03ca7ffc17bad8a2c7a3b3,2024-10-29T21:35:03.130000
|
||||
CVE-2024-20072,0,0,639e86e3d37aa95f3c744b6c3fdbeb01d314bfccd155f1c09f5fa09f8c152367,2024-07-03T01:45:59.183000
|
||||
CVE-2024-20073,0,0,b92b89689d99337a33ea65b4b166e8cf9f21aa160cfd841da21a2f3df1963e49,2024-07-03T01:45:59.423000
|
||||
@ -244965,7 +244973,7 @@ CVE-2024-21084,0,0,3ecf39fd228939a2dce5544ec5b78321dcd296bd51eedb006c227a11eff8a
|
||||
CVE-2024-21085,0,0,35f35fe8bd121dd226d197202c7e8879f1a74507a7dcab9fe69eee683b63b49a,2024-04-26T09:15:11.447000
|
||||
CVE-2024-21086,0,0,6968d09fe669a4367750ca8567b719597691a3493bb1bcb4d376ae2557ab644a,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21087,0,0,f22c17e300fd89cdd43bd6bc1adad60f10eeb6246d92b880ac98e54ddab22cbb,2024-04-26T09:15:11.543000
|
||||
CVE-2024-21088,0,0,aa00a9c4365758bc939c7b726717079ef8e712539a10e2dbcffa942cabed4aae,2024-04-17T12:48:31.863000
|
||||
CVE-2024-21088,0,1,44f4aa7f99d194c57665e971a2800175653d07a9f7c8ab39ede03f04ff22008a,2024-11-15T22:35:06.793000
|
||||
CVE-2024-21089,0,0,a802903839912e6ccd46d3ae2b8aaec7c725ef400dab1e68c738f51ab05539f2,2024-04-17T12:48:31.863000
|
||||
CVE-2024-2109,0,0,94fea5557ca85707a8add26a16c9667c38681a6051b37cb4d81c4a444a805fe5,2024-05-02T18:00:37.360000
|
||||
CVE-2024-21090,0,0,37a9329ca4ea88e58f19a40c712804df6aad8d3af015ccd127f2e694328d8e16,2024-04-17T12:48:31.863000
|
||||
@ -245027,7 +245035,7 @@ CVE-2024-21142,0,0,426d1a3f4d5eb091ec704405144203a0f68ebdfbeee6844133217e729852f
|
||||
CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21144,0,0,47e09fd5fcc37ec82730b14b6c143601a9e80d79dcae6217efe43cc12a904fd4,2024-09-18T15:15:42.963000
|
||||
CVE-2024-21145,0,0,0f20eb889de8290fa5c2ea280bb176cf511605c155717bdaded7ab58008b835d,2024-09-20T13:46:53.830000
|
||||
CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000
|
||||
CVE-2024-21146,0,1,7afb077336ce7ba3c6e73dd702aa8036e113fd3088789a47d72ac48f75e1b9ab,2024-11-15T21:35:04.493000
|
||||
CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000
|
||||
CVE-2024-21148,0,0,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000
|
||||
CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000
|
||||
@ -245727,15 +245735,15 @@ CVE-2024-21939,0,0,a5aa41911721c7484fc24860471dbac89d11ee960d3fa252f5bfcdc696021
|
||||
CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-21945,0,0,b63a5e4db7d9db144e112b73c910ed034b0ba3b12564dd621c287899f5252553,2024-11-13T17:01:58.603000
|
||||
CVE-2024-21946,0,0,e91350671d7fef838c1e33a6422004e0a45f2bbe81a9a8a8d8f829953040cd7c,2024-11-13T17:01:58.603000
|
||||
CVE-2024-21949,0,1,7a1e016e0f4a2eeb2b43069438979f7b8bebbb5dcd51b30c10a30f9b3dced5ee,2024-11-15T19:20:23.167000
|
||||
CVE-2024-21949,0,0,7a1e016e0f4a2eeb2b43069438979f7b8bebbb5dcd51b30c10a30f9b3dced5ee,2024-11-15T19:20:23.167000
|
||||
CVE-2024-2195,0,0,bb0953f36325af10b37984088b8b1459185284ada2095a83a3bbf8eda597a9b0,2024-04-10T19:49:51.183000
|
||||
CVE-2024-21957,0,0,78b8493cb09e98cba234648f190d1ba13da6601020de42b7e8cebd82789ca669,2024-11-13T17:01:58.603000
|
||||
CVE-2024-21958,0,0,34cd32e28ea44b16cbdc79985425a463f4005aefdd6dfb509675c47d9ee7258e,2024-11-13T17:01:58.603000
|
||||
CVE-2024-2196,0,0,8ec133a9075bc1567c504d98dff21f157cca962585a8b4ec57dc32003f56e460,2024-04-10T19:49:51.183000
|
||||
CVE-2024-2197,0,0,c0f73e1956ff9edc11d589212e34e54996b4c99f318ed5889f3320f37bab4ded,2024-06-05T23:15:33.943000
|
||||
CVE-2024-21972,0,0,faeb67500b1dc4ef8f1b7649334b23a7c70f07a8990a8b6dfa5400e248a30e42,2024-04-24T13:39:42.883000
|
||||
CVE-2024-21974,0,1,e945cdce0481a2236f8c3fc3597c2e09e0fcffcce9462be19907f54901a45889,2024-11-15T19:20:09.980000
|
||||
CVE-2024-21975,0,1,3d78cb740262f648775e64b558262f7d13f861a84d692c656d8015e29ef15d89,2024-11-15T19:15:18.770000
|
||||
CVE-2024-21974,0,0,e945cdce0481a2236f8c3fc3597c2e09e0fcffcce9462be19907f54901a45889,2024-11-15T19:20:09.980000
|
||||
CVE-2024-21975,0,0,3d78cb740262f648775e64b558262f7d13f861a84d692c656d8015e29ef15d89,2024-11-15T19:15:18.770000
|
||||
CVE-2024-21976,0,0,316a014d75b9b72921e8ef227aeb700f1f1d9634c14a7f67ab46550a5882ed94,2024-11-13T17:01:58.603000
|
||||
CVE-2024-21978,0,0,bd0ca29172ff67905ab419fb6e0b63fad45bf4b2c53567c94e0d7e696a373aa9,2024-08-06T16:30:24.547000
|
||||
CVE-2024-21979,0,0,69d970687ec7fc10c2117ffd8a662f03f2976fe858767ebadf9aede1ce3bc7bd,2024-04-24T13:39:42.883000
|
||||
@ -245999,7 +246007,7 @@ CVE-2024-22261,0,0,e2aaf47933f2c31b10d9c24b8a02f4ff589724ecabd25b937075f097414a0
|
||||
CVE-2024-22262,0,0,9be2a689a86ef414fbeac1ac9f909b61f22c440769cce8c765f035b3a2b5a24f,2024-08-27T14:35:01.160000
|
||||
CVE-2024-22263,0,0,f896fa0a79a81d0e9a59972a76bdb3f38491a193f39dfa7074f7f8bf4c5f9aad,2024-07-03T01:47:11.083000
|
||||
CVE-2024-22264,0,0,da64849d2957217dbd58b402df143805ad49bce0404b0354f2693ab5943acfc2,2024-05-08T13:15:00.690000
|
||||
CVE-2024-22266,0,1,ba5d4bbbae0cc0b22e67f7af5ba1c8ded568aa4a7232e6e81b6925454e8c4b78,2024-11-15T20:35:04.680000
|
||||
CVE-2024-22266,0,0,ba5d4bbbae0cc0b22e67f7af5ba1c8ded568aa4a7232e6e81b6925454e8c4b78,2024-11-15T20:35:04.680000
|
||||
CVE-2024-22267,0,0,0580d7c131aebd95aa25892cd08f876d614d2fb71c023502992bac4873632a6e,2024-05-14T19:18:31.490000
|
||||
CVE-2024-22268,0,0,823f1c8fe109f7318b4cb5fcaf25c94abb4b72eb405c2d208677e483171c233c,2024-05-14T19:18:31.490000
|
||||
CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000
|
||||
@ -246497,7 +246505,7 @@ CVE-2024-23158,0,0,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb5
|
||||
CVE-2024-23159,0,0,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000
|
||||
CVE-2024-2316,0,0,b886d554fbb39a8ab156ebbf04afa7dff2abe542e80901fe75a178728a777e10,2024-05-17T02:38:09.927000
|
||||
CVE-2024-23168,0,0,6aa4882ac31311673d7105c255a4a4ab30277fc82315f262184f5cb226bf109c,2024-08-19T13:00:23.117000
|
||||
CVE-2024-23169,1,1,86d9a411adfc5d5e78823636989ccd9b5f9a1a73ce3bad11071cb87abb452677,2024-11-15T19:35:06.473000
|
||||
CVE-2024-23169,0,0,86d9a411adfc5d5e78823636989ccd9b5f9a1a73ce3bad11071cb87abb452677,2024-11-15T19:35:06.473000
|
||||
CVE-2024-2317,0,0,8e30ab648286b0ea978301e5a5beda2d9abdf16065d34269cbb1824bfad23955,2024-05-17T02:38:10.027000
|
||||
CVE-2024-23170,0,0,2d2c8288a6a12ddbc7a1710ba6e09b64e14fe785fb79b86b20a944c1ecfef869,2024-02-22T03:15:08.297000
|
||||
CVE-2024-23171,0,0,f88bf803a0c4fbc4509407858b9247c6d4fbb766b717bcd811063458329b2ee7,2024-01-18T20:23:45.707000
|
||||
@ -247179,7 +247187,7 @@ CVE-2024-23938,0,0,f385512c9562a4125bf289d5854e0bf2cf71005be1d8a25303883b7e487b4
|
||||
CVE-2024-2394,0,0,601af7bb68f57fdb63dc28b1a3be4e92facb0bb452d0b42ad5d6937b933c3deb,2024-05-17T02:38:12.620000
|
||||
CVE-2024-23940,0,0,1c0bdede0fd3b02e7f9ad21f2aa27ec6ae45825d094730a07bddf507f926c4e8,2024-02-06T19:19:33.920000
|
||||
CVE-2024-23941,0,0,9709bab66e0af4d3dc69e9a86a5316f0273a5a15f2aac5ab4098dcbc1f12f8f7,2024-02-06T21:37:12.433000
|
||||
CVE-2024-23944,0,0,a4577755ac8434d8001d5ca099627598af1709502b9a95ee3ffe1e5567b9fd5a,2024-05-01T17:15:29.330000
|
||||
CVE-2024-23944,0,1,059e0b3fa4f34735124e9cd8e76659f9f5aec58c1074fc08d9eb22ca6d411d27,2024-11-15T21:35:05.263000
|
||||
CVE-2024-23946,0,0,84148e01db02d3b2895434dc823c0ae9f7d68159bffc3661e20f6a50ad8f107a,2024-08-13T19:35:04.530000
|
||||
CVE-2024-23947,0,0,1b43998aed29857dd1e4a92954078f6f47907ebb41136612d597b54ebf732265,2024-06-10T17:16:19.513000
|
||||
CVE-2024-23948,0,0,857b34d23def74a8136935341de0e448f0c93f2f46757187ac91997dca4cdefd,2024-06-10T17:16:19.623000
|
||||
@ -247402,23 +247410,23 @@ CVE-2024-24407,0,0,544874ccd7bf190605b1eed09e8dcc374c7eae5526ea68f4038bca85f79c4
|
||||
CVE-2024-24409,0,0,dd8ff08f29b98b9528fdb2ee83855d6758a702d939ff7172a903f50f6071724d,2024-11-13T20:35:44.963000
|
||||
CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf668f,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000
|
||||
CVE-2024-24425,1,1,b79517c27ddfb3c4c52c5ca4ea61f362c75eacb33ebe01e56666d4d2fb194390,2024-11-15T19:15:05.927000
|
||||
CVE-2024-24426,1,1,5f954247619c9506a09635317daea1739d1f7955f5146ab2cb8f96063ec13093,2024-11-15T19:15:06.057000
|
||||
CVE-2024-24425,0,0,b79517c27ddfb3c4c52c5ca4ea61f362c75eacb33ebe01e56666d4d2fb194390,2024-11-15T19:15:05.927000
|
||||
CVE-2024-24426,0,0,5f954247619c9506a09635317daea1739d1f7955f5146ab2cb8f96063ec13093,2024-11-15T19:15:06.057000
|
||||
CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000
|
||||
CVE-2024-24431,1,1,33c3bed5d3c5dd2cfbf9ccc66ea2d21c879c3bd4ff0a62e3b54ee65f0375a267,2024-11-15T19:15:06.137000
|
||||
CVE-2024-24431,0,0,33c3bed5d3c5dd2cfbf9ccc66ea2d21c879c3bd4ff0a62e3b54ee65f0375a267,2024-11-15T19:15:06.137000
|
||||
CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000
|
||||
CVE-2024-24446,1,1,56ab657fc72d4fff5cf76366c6733408e4b9f7a136a9f7dfa1a5f6f154ba8704,2024-11-15T19:15:06.220000
|
||||
CVE-2024-24447,0,1,8e2b35c0302f9d4d60d9917365a16d9eff4c2735718c048ac7918628919ecfe4,2024-11-15T19:15:06.300000
|
||||
CVE-2024-24446,0,0,56ab657fc72d4fff5cf76366c6733408e4b9f7a136a9f7dfa1a5f6f154ba8704,2024-11-15T19:15:06.220000
|
||||
CVE-2024-24447,0,1,bed5865bf9df39f19158b1764a9e5edb678bc0fe4341cd3f77db348a92e140c1,2024-11-15T21:35:05.520000
|
||||
CVE-2024-24449,0,0,c1cedd05172c4efc6df6d5d561bf0d004bf06abec1c0e01707406c0e914ff17f,2024-11-15T18:15:27.013000
|
||||
CVE-2024-2445,0,0,4580fbdabeda1a44cff89d119283db83c12561dfbbac9584647c19bac102f840,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24450,0,0,d81358a2964522ca6fb1f5769ded6178556fe128fbb0360faf4057187f926cee,2024-11-15T18:15:27.097000
|
||||
CVE-2024-24452,1,1,8749f1ad3b3cb4d795e5c071dc9bd32faac40c18bd66d2458c40a7095b496a77,2024-11-15T20:15:19.117000
|
||||
CVE-2024-24453,1,1,24f0ebc7d78581d8b7566ef03cb25c8b74cc06948cdc22bbb0cc27d1db0a6f4a,2024-11-15T20:15:19.203000
|
||||
CVE-2024-24454,1,1,9e157c0d329fa6dd1449b5e442f3b03a00acee32395385dacdea93db2dbb0f01,2024-11-15T20:15:19.300000
|
||||
CVE-2024-24455,1,1,29b3568718e4bc3714bb83d1ebb5e476a89cf1a3b53b2cdab55205543762428c,2024-11-15T20:15:19.403000
|
||||
CVE-2024-24457,1,1,0dc96b056ebdf9d01297b93b486a810c7f0e9bdc97154ceb0f306813644c2ea5,2024-11-15T20:15:19.510000
|
||||
CVE-2024-24458,1,1,4bd90cf66a02ca88f73d811cf897690fc256903dadedd406e6d07ce6d5f07fad,2024-11-15T20:15:19.610000
|
||||
CVE-2024-24459,1,1,0c36050982164d4e472771d0b15d29a88006773fb00f22ee03305a8a6157737f,2024-11-15T20:15:19.703000
|
||||
CVE-2024-24450,0,1,6a0b7b5ded00a8277fb325c1ecc37cd7ec612b58b513eed9797faafbeb200188,2024-11-15T21:35:06.360000
|
||||
CVE-2024-24452,0,1,f554e44a498c2268e0d196c5da5a7fb8302b221c9b89212e7c8e96e50d4e9b19,2024-11-15T21:35:07.200000
|
||||
CVE-2024-24453,0,1,405c556fbf8ff483c12e07c7fba52c38ab8a10d1e07527abda70d703786bad4b,2024-11-15T21:35:08.027000
|
||||
CVE-2024-24454,0,1,f85db7d99e3be955f6d96a83bd1e7a20170f3336fd080420781742869359006f,2024-11-15T21:35:08.870000
|
||||
CVE-2024-24455,0,1,410a255356df7aff732df54be2049904da6422e8e99f1ad0db89a5197543ac98,2024-11-15T21:35:09.713000
|
||||
CVE-2024-24457,0,1,578ce80f141b484680b203c3b49ce9adcd1af314734d32a4aa6eb0cc6063b37f,2024-11-15T21:35:10.550000
|
||||
CVE-2024-24458,0,1,7abaea1d736032318a78e812634f5db8f94df4be5ba869e92e4c42f608e5ee24,2024-11-15T21:35:11.383000
|
||||
CVE-2024-24459,0,1,899a825774254570132f41a8ac87ea2b2a4bc87f29bb72beb342d6064c62a294,2024-11-15T21:35:12.210000
|
||||
CVE-2024-2446,0,0,ef51f957632ec98e360c50fa0db196c0f3cfe0183f1093005f40b796022ec810,2024-03-15T12:53:06.423000
|
||||
CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c74ac,2024-02-07T22:03:09.897000
|
||||
CVE-2024-24469,0,0,118364649006ddd6dd7a0282a82463969addbea3b241460c52f60a3b25b50f38,2024-08-26T19:35:10.113000
|
||||
@ -248892,7 +248900,7 @@ CVE-2024-26542,0,0,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec0
|
||||
CVE-2024-26548,0,0,f455c865dc4374a0a4a4244e6b92be3619bcb05c42ae31697deaf30a36afaa44,2024-08-29T20:36:27.060000
|
||||
CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d6e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-26557,0,0,bce4bb7db30c44200534fa645c4e21a32632f06526ac89541f2afa8ce855d2c7,2024-03-22T12:45:36.130000
|
||||
CVE-2024-26559,0,1,b80332e133a33e46dec2587fae160cff8e9c8df6cb62f84da7f87724dbea40ae,2024-11-15T20:35:05.457000
|
||||
CVE-2024-26559,0,0,b80332e133a33e46dec2587fae160cff8e9c8df6cb62f84da7f87724dbea40ae,2024-11-15T20:35:05.457000
|
||||
CVE-2024-2656,0,0,1e1bbc88c0161a3acb0637c745cf054774e0c8a58563824f7d11f0999806993d,2024-04-08T18:49:25.863000
|
||||
CVE-2024-26566,0,0,178f5f9908b56a8ca7b57493a287d425d6858d98fae12d3e88663a8ab0cf6ac4,2024-08-06T14:35:06.510000
|
||||
CVE-2024-2657,0,0,8d1ff58c39beea61aea6c79faeb579bd293dbee684695e94ca7134a1a41bac4a,2024-05-30T13:15:41.297000
|
||||
@ -249593,7 +249601,7 @@ CVE-2024-2722,0,0,3d547fbfae7104f0dbf6c0b76ddd02751536ed8c09a63381f891ff8e3f28de
|
||||
CVE-2024-27220,0,0,9e42cc406e1b16ddffbd424b62b76586911d68db1ef5ee823133d22916298517,2024-08-26T16:35:06.173000
|
||||
CVE-2024-27221,0,0,0b9e9b937a1b9e138bd27417c292991204813b235d6b5129744f85ce4729872d,2024-08-27T21:35:16.047000
|
||||
CVE-2024-27222,0,0,628d34a7a6bc07d71cb2e1c85581ef034de82cd46a15b7c424080a08ed0a02c0,2024-08-05T18:35:10.287000
|
||||
CVE-2024-27223,0,0,cf3a2ced12b4a3bf155534028aaccdd6d95cd0b4d2f10d3ca759d3a4dee62fdb,2024-03-12T12:40:13.500000
|
||||
CVE-2024-27223,0,1,fc9cd51cab8f4da67c2e7794cf7ee5a6f1936f992a7ebb2975acb9d55a9e0abb,2024-11-15T21:35:13.053000
|
||||
CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213aabe,2024-08-01T13:48:20.053000
|
||||
CVE-2024-27225,0,0,4066fc479d85e41bfc3a21ed1b56d094f7f8c2b2d6dbe050f5934705a2ae1195,2024-11-07T16:35:14.340000
|
||||
CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000
|
||||
@ -249980,7 +249988,7 @@ CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb
|
||||
CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000
|
||||
CVE-2024-27784,0,0,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000
|
||||
CVE-2024-27785,0,0,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000
|
||||
CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000
|
||||
CVE-2024-27789,0,1,9e11896276314d268b6495530a30a9a370b410415ff7a8865f6d2d728d6cb4ac,2024-11-15T22:35:08.453000
|
||||
CVE-2024-2779,0,0,2aa54c375187eea63fa6c956db70ce31dec68ec2b409a2e5d246e26b34790090,2024-05-17T02:38:30.057000
|
||||
CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000
|
||||
CVE-2024-27791,0,0,09b0597ca715a1f6ef86184b931742440fb3c3b5a01efc19b59894d859d878db,2024-07-03T01:50:48.290000
|
||||
@ -250957,7 +250965,7 @@ CVE-2024-29115,0,0,b12a9dbf612250a49df2e6948fc40b23d35ff13f6aa9d2beedd64c49a8ed8
|
||||
CVE-2024-29116,0,0,d85dc6ae194d83c2dbd05b4e1cc8c25eaf9e91cd72cd7e6ae549c7eb131b7c33,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29117,0,0,7cbc86fd47b57aac5bdcb66853eac01c2823bf8c332ca79b8820d49cc7cba209,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29118,0,0,1cf920921a96fd5f0eb418dbd890604a04de50213d4066e1f2401f217f180df5,2024-03-19T16:33:58.680000
|
||||
CVE-2024-29119,0,0,738a7b7e804b6feffc33f998d5fbd83a1b05ef16b9a6d435f583f42a46ae6f6c,2024-11-12T13:55:21.227000
|
||||
CVE-2024-29119,0,1,0811f092679734deba80b812c98d1850ac3db34b4730f32fa57515f8c5fb65e2,2024-11-15T22:50:03.257000
|
||||
CVE-2024-2912,0,0,f62836a8afe15e49afc11abef746f6e05f5ae0f68099e584fae53277c8c9f769,2024-05-22T16:15:09.713000
|
||||
CVE-2024-29120,0,0,7f41b964c09ac8aa95a0035e77a220dee0c782999c30c100c6ecb39548161767,2024-11-14T17:35:05.343000
|
||||
CVE-2024-29121,0,0,6325c10b522d77de76e2af8d35d0ad7dde2dffd7703677e5c3f9cd67ab864731,2024-03-19T16:33:58.680000
|
||||
@ -251101,7 +251109,7 @@ CVE-2024-29302,0,0,d9abe707740065eb1e46de0ca659947f36c93421f8110011a7bf9bee8bf0d
|
||||
CVE-2024-29303,0,0,37679fb63bf9f38f4f9cc53651a73974a7164616369c7f1ab3afdb3ecf05cb90,2024-08-07T21:35:03.913000
|
||||
CVE-2024-29309,0,0,5f16c8c5101bbe6a7fe340fed41cfd483ccf194ab5d9cef153ac339623cd5967,2024-08-13T18:35:02.870000
|
||||
CVE-2024-2931,0,0,8681da4e6a98287d6793458554ab4ea24f94bf4e8afb9a8ac5d31dc0735ec9f9,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29316,0,0,bf79b73f40391754999830b90ca9fb7610ead48f76025066f6bbfd69a2114a92,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29316,0,1,2f3c817c4f7c559ff4b0013399f8b474c64af5ae7bcfa59ae6059ebc1e3cf72b,2024-11-15T21:35:13.307000
|
||||
CVE-2024-29318,0,0,3bd80ca4ed2a21d168ac76c12fc53877e0cf37b2c12f34546ddefc9f9e0a12f8,2024-07-08T16:39:39.810000
|
||||
CVE-2024-29319,0,0,bbb0862aea68d5a01a34ecc5b39e1d6e8c1c3d81ce4dfc0412f430759d0ae56e,2024-07-09T16:22:26.077000
|
||||
CVE-2024-2932,0,0,44a8d61038c752584673290a44e85a0e6ddb987cff5ca0c208afdec0eff4bd59,2024-05-17T02:38:37.813000
|
||||
@ -252235,7 +252243,7 @@ CVE-2024-30868,0,0,40572fc00d47dcab0a02e3b982268eb31daa0424a9f9ba994981729836c30
|
||||
CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d4f,2024-05-17T02:39:42.787000
|
||||
CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000
|
||||
CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000
|
||||
CVE-2024-30872,0,1,64734544ccb6f849f8e6b7c181bf35d2a96e6186e2801de85b4c087395773bf4,2024-11-15T20:35:06.470000
|
||||
CVE-2024-30872,0,0,64734544ccb6f849f8e6b7c181bf35d2a96e6186e2801de85b4c087395773bf4,2024-11-15T20:35:06.470000
|
||||
CVE-2024-30875,0,0,1cda1f7e96707733b42fb351c9353bb46bc4382d5324d37a18f42fe89fb4a47a,2024-10-25T16:15:09.693000
|
||||
CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000
|
||||
CVE-2024-30879,0,0,93839d92eafd1cfae5881afc220b2fbe0e3f01fdcdacee7a1692cd18e78fca03,2024-10-27T03:35:03.670000
|
||||
@ -252593,7 +252601,7 @@ CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd
|
||||
CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
|
||||
CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000
|
||||
CVE-2024-31336,0,0,e16f98988b82130b2e32557c399f0ea25778a1838eb9ccce21afc0b2ed5c5a95,2024-09-13T01:15:01.980000
|
||||
CVE-2024-31337,0,0,211cc0c863ee5c8d748051b42330bf23dfc862367b588e297bbc4c9eb5d837ca,2024-11-15T14:00:09.720000
|
||||
CVE-2024-31337,0,1,07dff38ce8dc544e656ac7c3f496be50a62b48a2297f04b9f73097a5633a3e04,2024-11-15T22:35:09.383000
|
||||
CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000
|
||||
CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000
|
||||
CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000
|
||||
@ -254031,7 +254039,7 @@ CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b9
|
||||
CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000
|
||||
CVE-2024-33338,0,0,dc64e17746d1abab607747c6889c78b7b366c3abba84bde17473f7cc02765f3e,2024-11-06T22:35:06.803000
|
||||
CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000
|
||||
CVE-2024-3334,1,1,690229517d403dc25b1c35a49447814b209ca70fdd0de341b8228c12814872aa,2024-11-15T20:15:19.910000
|
||||
CVE-2024-3334,0,0,690229517d403dc25b1c35a49447814b209ca70fdd0de341b8228c12814872aa,2024-11-15T20:15:19.910000
|
||||
CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000
|
||||
CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000
|
||||
CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e54c,2024-07-03T01:57:55.620000
|
||||
@ -254536,7 +254544,7 @@ CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff4
|
||||
CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000
|
||||
CVE-2024-34022,0,0,7b23e7a4942e184fec33b1bffa07086984aca57ed7d3dd370cec1e2a245271cf,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34023,0,0,4dad96a4b3405ff5975c0f7d1a940e81b4b229c6fe69b1b44167ee14d10f47a5,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000
|
||||
CVE-2024-34024,0,1,436ff185980fb4887f6e90c4484ac03d00d9d240594d2b927342762d05845604,2024-11-15T21:35:13.637000
|
||||
CVE-2024-34025,0,0,edd2792f368696b38d90328f1c1ccaaade65bc2e70f896834331ba779fb27dd0,2024-05-16T13:03:05.353000
|
||||
CVE-2024-34026,0,0,d23e70be79ae55b32e18d5911869778bf5369290a7a856aaf669d9f9bc7f7d52,2024-09-26T20:52:39.357000
|
||||
CVE-2024-34027,0,0,665288561aa105eb3ace1a2e821548dcc73a2a65b6f5aec99c3e8227e5375b1e,2024-11-05T15:35:13.297000
|
||||
@ -254868,7 +254876,7 @@ CVE-2024-34457,0,0,488e2de12358ba7ac2ecaef904903ac7bcb5c8ffea8ebfc53fe2dd66e2b38
|
||||
CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000
|
||||
CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000
|
||||
CVE-2024-3446,0,0,5ac77fa1865633043064ab1ffaeb59fe80c825b06632f0aec7d1674c1a671484,2024-09-25T01:15:40.827000
|
||||
CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000
|
||||
CVE-2024-34460,0,1,6353926884b168ea665b411f9a89e1bb0d0f21b5142b7a6d521425ffbbf4237a,2024-11-15T21:35:13.877000
|
||||
CVE-2024-34461,0,0,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000
|
||||
CVE-2024-34462,0,0,8a88747aa45fa0ff08468c03145b77f14c23a2c5a801117a3645ac9e35ca3df3,2024-07-03T02:00:09.780000
|
||||
CVE-2024-34463,0,0,93e0b7a3eff8acce578e44f45931c5eaf5e6d1df4cebdc938c3a054fad258881,2024-09-03T15:12:16.467000
|
||||
@ -255117,7 +255125,7 @@ CVE-2024-34724,0,0,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d9444
|
||||
CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000
|
||||
CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000
|
||||
CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000
|
||||
CVE-2024-34729,0,0,54de913c260765be67c48041f77073710a2847abf55ca4fe236c2bf5de701ec8,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34729,0,1,14522fc749ee1e0b788fbc2d96cfaff68d5620759da5fe76e950ab7e180eea45,2024-11-15T22:35:09.693000
|
||||
CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000
|
||||
CVE-2024-34731,0,0,c2796903b18972c85283f94e39f216adab1245ab24ab7429de75a096f2bef3ba,2024-08-19T13:00:23.117000
|
||||
CVE-2024-34734,0,0,03ca469f8cd315011dd153921c263a875a2212423b28ba9a9477308f69d8631d,2024-10-24T20:35:05.433000
|
||||
@ -255130,7 +255138,7 @@ CVE-2024-34740,0,0,cd68171e55105c9a184cdc72c371579137a9ca2bcc91416cae3d7556d14ec
|
||||
CVE-2024-34741,0,0,92c683bbe77a7f293c2037090a232d821770d81c7905215e3ef6319cf6b5adba,2024-08-19T13:00:23.117000
|
||||
CVE-2024-34742,0,0,ae7622882d0f2f3d011507be8bcb7493359b0ef6aaca92f56d7280395d35123c,2024-08-19T13:00:23.117000
|
||||
CVE-2024-34743,0,0,9a08509f1ceb4bbb716866bb59161611c0588d77430a21c15b6c1621568bccf5,2024-08-19T20:35:16.253000
|
||||
CVE-2024-34747,0,0,2d28e87671e44808335b186af8072869a96462e808f2184392e92b73bb99c621,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34747,0,1,54274e9091b3a0011b2ff0803398b57f8823e3a645921a5eb6d9ebe2e1bb8c96,2024-11-15T22:35:09.927000
|
||||
CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000
|
||||
CVE-2024-3475,0,0,3d68cde343ddcb97ac984b733d2ae7662c97a24c514b9a563c1c306f42f1759f,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000
|
||||
@ -256154,7 +256162,7 @@ CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6
|
||||
CVE-2024-36137,0,0,9438d2b71ef73887d75e6f454e33b7f397670092254d4a5da60582748cb22f74,2024-09-09T13:03:38.303000
|
||||
CVE-2024-36138,0,0,e6354c672dea5a9efe6496da7c00037de66d6aa6e785f55fccdeccb25bc2c9b3,2024-09-09T18:35:09.367000
|
||||
CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000
|
||||
CVE-2024-36140,0,0,339aa114c9b4ee85084777ff864435ce00ae50f8bdcd2f9c6e4c47ffb9909a55,2024-11-12T13:55:21.227000
|
||||
CVE-2024-36140,0,1,7bda1bcadac079ac13abda54cbaf16d9f22ad0e82ddd82e6b230bd54b41d2d6f,2024-11-15T22:53:26.063000
|
||||
CVE-2024-36141,0,0,18db6c112ccc0d71f5b13b30aecab0a5f2370100cf994f0af07b87507f970796,2024-06-14T20:02:18.553000
|
||||
CVE-2024-36142,0,0,6ae7dd3b3d84d3e60ab36df1a1df499d7a9063449a2d0a679757a0e6ad8f4e57,2024-06-14T20:00:46.803000
|
||||
CVE-2024-36143,0,0,b9ffa4a4b0c08b2c09cabc08087789a8d9178358a74a11dff2dc25f2bba0c28f,2024-06-14T19:58:25.220000
|
||||
@ -257807,6 +257815,7 @@ CVE-2024-38367,0,0,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc
|
||||
CVE-2024-38368,0,0,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000
|
||||
CVE-2024-38369,0,0,8244568cb54133bd4b7c000807714a4126c5f985c9bed4f8d225a3d939b43204,2024-06-26T14:47:05.077000
|
||||
CVE-2024-3837,0,0,83b07e73fbcd3bdc07d74ecd9200ace8bc3f655fb5ef786e0fb5447a3f989592,2024-07-03T02:06:37.303000
|
||||
CVE-2024-38370,1,1,2a7739a42ac119a79a6d88cdf8eaf101f5e8cf352457db3797f21dc353940baf,2024-11-15T22:15:15.317000
|
||||
CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000
|
||||
CVE-2024-38372,0,0,3d54cf49c69f5dcfca10b8ed801434d5b29c7aa6896635c0f913f2cd2b718834,2024-07-09T18:19:14.047000
|
||||
CVE-2024-38373,0,0,871cf732e8d89daf91760031051bd3f20f88f5dad720fab8628df5921c7be18f,2024-06-26T15:02:05.100000
|
||||
@ -259185,7 +259194,7 @@ CVE-2024-40568,0,0,4e89eb42d593339b238d1e440516cb2ccd3f5095fd163b21c19673544e39a
|
||||
CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000
|
||||
CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000
|
||||
CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000
|
||||
CVE-2024-40579,0,1,aed9bb41ab6e2fc5580c188aa250efad7de1629e44af77f0fe07dd2ceedf19f8,2024-11-15T19:35:07.323000
|
||||
CVE-2024-40579,0,0,aed9bb41ab6e2fc5580c188aa250efad7de1629e44af77f0fe07dd2ceedf19f8,2024-11-15T19:35:07.323000
|
||||
CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000
|
||||
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
|
||||
CVE-2024-40592,0,0,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000
|
||||
@ -259696,10 +259705,10 @@ CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b24963
|
||||
CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000
|
||||
CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000
|
||||
CVE-2024-41200,0,0,c6634d5ee9208991d605965f74d59d477ce80a275c83b2ac8c83f9990bd5e19e,2024-11-05T22:35:06.980000
|
||||
CVE-2024-41206,0,1,6b34d8a4f8eb0ca37fbc5fec97e1cd8e6aaa772dfa42cec6df805a0418b292a0,2024-11-15T19:35:08.297000
|
||||
CVE-2024-41209,0,1,e65fe1f95013b4d1e68f077c50e8d961a21bc688ccc61972b6f988d0a65e2962,2024-11-15T19:35:09.147000
|
||||
CVE-2024-41206,0,0,6b34d8a4f8eb0ca37fbc5fec97e1cd8e6aaa772dfa42cec6df805a0418b292a0,2024-11-15T19:35:08.297000
|
||||
CVE-2024-41209,0,0,e65fe1f95013b4d1e68f077c50e8d961a21bc688ccc61972b6f988d0a65e2962,2024-11-15T19:35:09.147000
|
||||
CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000
|
||||
CVE-2024-41217,0,1,0c2636112e03d934d0d09fb45bc31eafc821e0c0c1c75ddfbecef08bccd71d27,2024-11-15T19:35:10
|
||||
CVE-2024-41217,0,0,0c2636112e03d934d0d09fb45bc31eafc821e0c0c1c75ddfbecef08bccd71d27,2024-11-15T19:35:10
|
||||
CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000
|
||||
CVE-2024-41226,0,0,a3a85fa64d0c123f261294a19d764a3608a61e848957876669f922adbd8d3b3c,2024-09-03T21:15:15.923000
|
||||
CVE-2024-41228,0,0,f3d365bd2199687dcff5eebde6177461134036d09c1cc3d7eb6b2cb72c0f76b0,2024-09-26T13:32:55.343000
|
||||
@ -259924,7 +259933,7 @@ CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47
|
||||
CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000
|
||||
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
|
||||
CVE-2024-41678,0,0,43bfd773fe0f389d4d2972065648cf80c04ab4504b31ed9b2e85f880173045d0,2024-11-15T18:15:27.720000
|
||||
CVE-2024-41679,1,1,30895d98a21b1efa39db3dfa62b7834f7f6581bb6d111c2b0d0989f68a696495,2024-11-15T19:15:06.527000
|
||||
CVE-2024-41679,0,0,30895d98a21b1efa39db3dfa62b7834f7f6581bb6d111c2b0d0989f68a696495,2024-11-15T19:15:06.527000
|
||||
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
|
||||
CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000
|
||||
CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000
|
||||
@ -260706,7 +260715,7 @@ CVE-2024-42677,0,0,b97ab4f5686d6ff46f6aa7f7f9b4e7a78fadb921b4c0ab7041661656c5221
|
||||
CVE-2024-42678,0,0,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3cdc9,2024-08-19T16:06:36.343000
|
||||
CVE-2024-42679,0,0,e76aaa5887122d6232dc83073fc758cc42de2802e94141ff1ce4fac272e935d1,2024-09-06T17:35:14.393000
|
||||
CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000
|
||||
CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000
|
||||
CVE-2024-42680,0,1,58693ad444a0076e8c2aed38637b138ca0db4c28c3b5f77c2b2ce98f6959fbaa,2024-11-15T21:15:07.623000
|
||||
CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000
|
||||
CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000
|
||||
CVE-2024-42697,0,0,3f30501ddd948bd3dd87aa7e992970f54de2da95f223a929b6ab6b98833e0327,2024-09-26T13:32:55.343000
|
||||
@ -261201,8 +261210,8 @@ CVE-2024-43412,0,0,d8be950c692563feabe854c0542abee7aa58fa64820fe9c692a8fb330f15b
|
||||
CVE-2024-43413,0,0,8e6331055eff0a1fc21c13ac1aa5a910957effe87064f315927a5ac8c4d9163f,2024-09-12T20:18:46.097000
|
||||
CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000
|
||||
CVE-2024-43415,0,0,33623038bce272467978985c7d034b7fd7d9931154f17ac64d12541af9ed8ac3,2024-11-13T19:15:08.580000
|
||||
CVE-2024-43417,1,1,aab5248f5a199e96281de3e8ba633e068cfce50aefda0254830d2ebd2d16b55a,2024-11-15T19:15:06.737000
|
||||
CVE-2024-43418,1,1,d2ce1fef34767053b97958e7039ef8b665cb5d80cc119d4e7b551ab12a87e9e7,2024-11-15T19:15:06.940000
|
||||
CVE-2024-43417,0,0,aab5248f5a199e96281de3e8ba633e068cfce50aefda0254830d2ebd2d16b55a,2024-11-15T19:15:06.737000
|
||||
CVE-2024-43418,0,0,d2ce1fef34767053b97958e7039ef8b665cb5d80cc119d4e7b551ab12a87e9e7,2024-11-15T19:15:06.940000
|
||||
CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000
|
||||
CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000
|
||||
CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000
|
||||
@ -262074,8 +262083,9 @@ CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3
|
||||
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
|
||||
CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c6f7,2024-10-04T20:15:07.203000
|
||||
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
|
||||
CVE-2024-44759,1,1,b9649314fac826d03abe6e58586192745a7059e4a9b66144d374bc1358b57b39,2024-11-15T20:15:20.163000
|
||||
CVE-2024-44760,0,1,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000
|
||||
CVE-2024-44758,1,1,7e2c17fda7d66e4b4978ca78609d630df3e55b53cc04e7d8a3dc3130a137179f,2024-11-15T21:15:09.233000
|
||||
CVE-2024-44759,0,0,b9649314fac826d03abe6e58586192745a7059e4a9b66144d374bc1358b57b39,2024-11-15T20:15:20.163000
|
||||
CVE-2024-44760,0,0,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000
|
||||
CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
|
||||
CVE-2024-44762,0,0,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000
|
||||
CVE-2024-44765,0,0,f49b0ddc47e501e666f4838593930e2064ad96de66f6bc89ed89c1395c14c839,2024-11-12T13:56:54.483000
|
||||
@ -262649,9 +262659,11 @@ CVE-2024-45604,0,0,8bf71581fc88ef149abd090a70890b5121cb8944654700250436e6871eed9
|
||||
CVE-2024-45605,0,0,e2dcbd09111d51f02ed3dc28b06a6dfe1b2afb4b9e6f7d6992823c9eafceb7dc,2024-09-26T19:14:00.873000
|
||||
CVE-2024-45606,0,0,74770cd60bba1a7e3534716f76d2f24e8f6b5a1c9090e259fc4bcbaa501443fe,2024-09-26T19:16:40.720000
|
||||
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
|
||||
CVE-2024-45608,1,1,c692f8fe9893c192cd58fed893ade100507eb59a60353ebf14c7e4fa543e922f,2024-11-15T19:15:07.143000
|
||||
CVE-2024-45609,1,1,913b06e92e0c1bf11238525050a178ea0bed3b00bbfc86a83c4e6b38e2106c69,2024-11-15T20:15:20.410000
|
||||
CVE-2024-45608,0,0,c692f8fe9893c192cd58fed893ade100507eb59a60353ebf14c7e4fa543e922f,2024-11-15T19:15:07.143000
|
||||
CVE-2024-45609,0,0,913b06e92e0c1bf11238525050a178ea0bed3b00bbfc86a83c4e6b38e2106c69,2024-11-15T20:15:20.410000
|
||||
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
|
||||
CVE-2024-45610,1,1,6fa74d30bf44c88ef160552ca204c3506802904d40f18cb2d33379537a28eee5,2024-11-15T21:15:09.370000
|
||||
CVE-2024-45611,1,1,40f7dbcdb95fcfd8fbd7bda741b3dbab96ad29839dea3a7571ea3c53c1327236,2024-11-15T21:15:09.627000
|
||||
CVE-2024-45612,0,0,3e30286b1d723ddfef1522eda155227a0e1e8c66d0b8dce0d9a777734913d222,2024-09-23T19:33:04.650000
|
||||
CVE-2024-45613,0,0,a2ff9b099297ab22455347765d4960198846769603bf11c2b22cdb95078fe454,2024-10-01T22:15:02.757000
|
||||
CVE-2024-45614,0,0,ac4b7afda4571cd40367f25e5fa4ed4a95b6d96da3864aae950ca5538b1c5a35,2024-09-26T13:28:30.537000
|
||||
@ -262732,7 +262744,7 @@ CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb
|
||||
CVE-2024-45772,0,0,d4fcff511ac9c702d11d2981d4f53f578a5b533222a07c5c21d8a62a8451fded,2024-10-04T13:20:58.327000
|
||||
CVE-2024-45773,0,0,fa80a32ca25578799d772108a6e7f2b87164fbdfd3820c41dab7e96e6c83084e,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
|
||||
CVE-2024-45784,0,1,c50448792ca0bc70dc69110c69f0c1eaf6da89dad203eb3fb8490186b0e8b380,2024-11-15T20:35:07.697000
|
||||
CVE-2024-45784,0,0,c50448792ca0bc70dc69110c69f0c1eaf6da89dad203eb3fb8490186b0e8b380,2024-11-15T20:35:07.697000
|
||||
CVE-2024-45785,0,0,edaf655206685301bfa1d23b3961ca90e190821a2f1da23140bfad50572d7731,2024-11-06T17:08:40.507000
|
||||
CVE-2024-45786,0,0,1027a4a71b54e4ed926e7c4d82608ed7bf7290e7e8486a1ac94d8f7e4edfad02,2024-09-18T20:12:47.337000
|
||||
CVE-2024-45787,0,0,46f8564066b3f70e712610c0aca9059d9bda6862d53c941af56b2ef72737a51d,2024-09-18T18:15:07.650000
|
||||
@ -262843,10 +262855,10 @@ CVE-2024-45962,0,0,410a38ff5223f4d49bf1514b127efbec05a242aa992c767afa2b00b3754e2
|
||||
CVE-2024-45964,0,0,115c652e0870ab8284554895b46caa73ee13878a3a483a4a0704cf316ae20802,2024-10-04T13:50:43.727000
|
||||
CVE-2024-45965,0,0,337eabe224912cc2b0cbadda62428cffb8300aa00cac2bea6d6188e8e9c18de6,2024-10-04T13:50:43.727000
|
||||
CVE-2024-45967,0,0,6af6fb1bf8abc96b89a897208a34deb6484f333cf92fc60514a52d4661f8c7cf,2024-10-04T13:51:25.567000
|
||||
CVE-2024-45969,1,1,d865bf352dd17e303fb9cb7a0bf07aadd1a1c5fdd539ecf844c17fe8c81603a1,2024-11-15T19:35:11.467000
|
||||
CVE-2024-45969,0,0,d865bf352dd17e303fb9cb7a0bf07aadd1a1c5fdd539ecf844c17fe8c81603a1,2024-11-15T19:35:11.467000
|
||||
CVE-2024-4597,0,0,098adbd2826136caa11e67cd45a2f45f6208425bc1c84711667f353f70d7a203,2024-05-14T16:11:39.510000
|
||||
CVE-2024-45970,1,1,df7bd90d0fd5d50e5abf391b1c572883ac9aee4953d26d7824e97b7aa4817c2c,2024-11-15T19:35:12.330000
|
||||
CVE-2024-45971,1,1,69ce485500e35d7ddd1ef9e0591aaf47d71dcb0b3ac7cf4897f01bbc1f5a00cd,2024-11-15T19:35:13.180000
|
||||
CVE-2024-45970,0,0,df7bd90d0fd5d50e5abf391b1c572883ac9aee4953d26d7824e97b7aa4817c2c,2024-11-15T19:35:12.330000
|
||||
CVE-2024-45971,0,0,69ce485500e35d7ddd1ef9e0591aaf47d71dcb0b3ac7cf4897f01bbc1f5a00cd,2024-11-15T19:35:13.180000
|
||||
CVE-2024-45979,0,0,0482757b935fe16e8666637b8de38f7a7ad511da9e453512eb3d62b894d1236e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-45980,0,0,ded57935070da9b29c36c9f95713cf4ac252f503e27a31ee2114452772d0590b,2024-09-30T12:46:20.237000
|
||||
CVE-2024-45981,0,0,ee65d3def52ce7ec5d6bf2c7e86cdebd6e620d115c275dfbcce303dfb9c98da4,2024-09-30T12:46:20.237000
|
||||
@ -262964,7 +262976,7 @@ CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406d
|
||||
CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000
|
||||
CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000
|
||||
CVE-2024-46382,0,0,65cd8f8715b62b5a7598d3b8d6186f6e2f4b087b931ac8f129c8f64b10f1fd55,2024-09-25T16:56:09.927000
|
||||
CVE-2024-46383,0,1,c940113eb54c83050ae731934a303ca798964bc8736d5ca21108a0c20ba8f2b7,2024-11-15T20:35:07.907000
|
||||
CVE-2024-46383,0,0,c940113eb54c83050ae731934a303ca798964bc8736d5ca21108a0c20ba8f2b7,2024-11-15T20:35:07.907000
|
||||
CVE-2024-4639,0,0,f02b5c58ae5a71f4f7afea4e263ab89427639817f2fb26164569232dacb74959,2024-10-10T10:39:06.410000
|
||||
CVE-2024-46394,0,0,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdadeb1,2024-09-25T16:55:15.023000
|
||||
CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
|
||||
@ -264560,6 +264572,7 @@ CVE-2024-49050,0,0,7f9392ea1a4bf88203fb43021b2368620daa51f821e70681a840b2ee1bd81
|
||||
CVE-2024-49051,0,0,44f6ae7bff81d5005b198cc105e28816f70e74649012bdd37fd7f8773db7d846,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49056,0,0,45909acaf00cd3c64a19d5557ee0abf98abf49c50825d0cd6a263c45cc01e6bc,2024-11-13T17:01:58.603000
|
||||
CVE-2024-4906,0,0,dcabb97348a8cb55b860a9e76b2d4e839fce25f207d8f1f73aadb53eff678110,2024-06-04T19:20:52.587000
|
||||
CVE-2024-49060,1,1,5a5b232a1362125286d642f24f655ac6dd933be96fcda8497cc4edb155d570c1,2024-11-15T21:15:10.863000
|
||||
CVE-2024-4907,0,0,89cf000cbe1b65b5529bee88595d69713864cb4ca68c5cee750a10d4257b63ad,2024-06-07T20:15:12.077000
|
||||
CVE-2024-4908,0,0,3762060553f2912238245a2ee2164293eb895a92d4f73c18aef2dad30449d1a2,2024-06-04T19:20:52.687000
|
||||
CVE-2024-4909,0,0,ea0d933b3d2cd5595c3fbbee43ad0bc8cc6b1745afbc1d0aa36c8f7e8ca72f46,2024-06-04T19:20:52.787000
|
||||
@ -264792,7 +264805,7 @@ CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631
|
||||
CVE-2024-49526,0,0,0871004c04b2341eb737b8d4e5693e458bc7c8461095a71ec5604d2d8a7a3e4f,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49527,0,0,90add3f65b96eee1f0b9fbf01f92dfd0e4ee77a768256f110d47e754c67f09f0,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49528,0,0,0e21c50648494dddb2e6f81fb4539064ca26c5177933d85140437daf91d91144,2024-11-13T17:01:58.603000
|
||||
CVE-2024-49536,1,1,b5bebd3e76ccc8dd27494c774698ac2911e07900ef9d359439a343734b2455b2,2024-11-15T20:15:20.683000
|
||||
CVE-2024-49536,0,0,b5bebd3e76ccc8dd27494c774698ac2911e07900ef9d359439a343734b2455b2,2024-11-15T20:15:20.683000
|
||||
CVE-2024-49557,0,0,d5723680a20b941e0b929edc2959b845b0ec9b5d07125e59e1942c5e8991b90e,2024-11-15T17:36:47.110000
|
||||
CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312603,2024-11-15T17:35:54.480000
|
||||
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
|
||||
@ -264802,6 +264815,7 @@ CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9
|
||||
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
|
||||
CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
|
||||
CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000
|
||||
CVE-2024-49592,1,1,8d58881505aa5166b2d4228f1caec6539241e0d475e52eaca08116f92b39e272,2024-11-15T21:15:11.070000
|
||||
CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000
|
||||
CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000
|
||||
CVE-2024-49604,0,0,4130a6c1f975a0d07098374dd7fb4ff2ab97718728858633e395173b92657205,2024-10-23T15:49:25.567000
|
||||
@ -265246,9 +265260,9 @@ CVE-2024-5014,0,0,a159cfb950f4667dfac650da1dbd95c7b0726154dc655b46619c19dd5e035f
|
||||
CVE-2024-50140,0,0,eb0746926c420cc8d2090f5fca10ae981e81997ac8c1fdaad448b32c59f370bd,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50141,0,0,bae62305714eb5ec8c5bfe94e53b566f82f69bfdc7c3c2d2860ceb7d14e4fe27,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50142,0,0,081683ea498aec7e08e36c9792d1a986b4879eebc92b8bac2d87cfe2d81863a5,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50143,0,0,225aa5dbc7963c527a87a475fd315c4d6cf88e38af436bff7f3a96ea656c9f8e,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50143,0,1,7a8465c6c5e86219699475e0aac212071d8c08e38a0e388ea4ee3b273c23e38c,2024-11-15T22:22:40.397000
|
||||
CVE-2024-50144,0,0,c55b4e7f7af67f90eda178a9ba2fa4c47d80901810b77811a8c947ce6e8532ea,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50145,0,1,9aaca4c4bd27c56de1138e3b927e1f83dfbefe24220661e4c64f210cd7f4f3cf,2024-11-15T19:50:44.203000
|
||||
CVE-2024-50145,0,0,9aaca4c4bd27c56de1138e3b927e1f83dfbefe24220661e4c64f210cd7f4f3cf,2024-11-15T19:50:44.203000
|
||||
CVE-2024-50146,0,0,021f17a71355e9c7da1a3fa872cce66adf431c69a2c8d8e36098a29d09e838bb,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50147,0,0,43ce628689773c231ddef91126d37c67bb5709ecfbe9aae9414366a036ef0103,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50148,0,0,7f0c6446839199adc93c3b0f21555587f022bb17548db4f7897fc0fadf3c850a,2024-11-08T19:01:03.880000
|
||||
@ -265631,7 +265645,7 @@ CVE-2024-50766,0,0,af3ada3641e5f900c68c3d98d58b715ce7a7d6da5b4d545f2ac59e163c2e3
|
||||
CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000
|
||||
CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000
|
||||
CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000
|
||||
CVE-2024-50800,0,1,ab830a43039dc3b7687658827fe30858d8d98c5f738791670612919030dff069,2024-11-15T19:35:15.183000
|
||||
CVE-2024-50800,0,0,ab830a43039dc3b7687658827fe30858d8d98c5f738791670612919030dff069,2024-11-15T19:35:15.183000
|
||||
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
|
||||
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
|
||||
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
|
||||
@ -265640,20 +265654,20 @@ CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf1
|
||||
CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000
|
||||
CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000
|
||||
CVE-2024-5082,0,0,3c0f951c5b33762a472b3ea33ccf88b6977979b0c14a32ab8b6cbf67889fd7af,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50823,0,1,9e28ccd9a08403be9206c1fa5d06864983d2eb9e0ee859ed9196bb4a5749640a,2024-11-15T20:35:09.490000
|
||||
CVE-2024-50824,0,1,35fe569e5a2209990a7b50cac83c485bd9d4fc5c9126e62e9515102607295a98,2024-11-15T20:35:10.823000
|
||||
CVE-2024-50825,0,1,78721026e8bda92e94947b276b84f39730aacb6de8d193ace62a531df2853d94,2024-11-15T20:35:12.167000
|
||||
CVE-2024-50826,0,1,9ab314a9ae4299550f9cd1128db30ab75635e2b4df9acc44237f8ffee9257b76,2024-11-15T20:35:13.500000
|
||||
CVE-2024-50827,0,1,49d717d74c74f3cadb619530991fcd02c4fd10dbb2ae02cf88b0f9b5a884fe3b,2024-11-15T20:35:14.820000
|
||||
CVE-2024-50828,0,1,fafb0f73bc6df62cd1e6fb4e462fcaade9c676589e89a8cb22ddd2c1ff8a54d7,2024-11-15T20:35:16.143000
|
||||
CVE-2024-50829,0,1,0ee321663baac09b0aac9953d0386c900ebd5fbaf6aad0e241d3a7132ebb7371,2024-11-15T20:35:17.460000
|
||||
CVE-2024-50823,0,0,9e28ccd9a08403be9206c1fa5d06864983d2eb9e0ee859ed9196bb4a5749640a,2024-11-15T20:35:09.490000
|
||||
CVE-2024-50824,0,0,35fe569e5a2209990a7b50cac83c485bd9d4fc5c9126e62e9515102607295a98,2024-11-15T20:35:10.823000
|
||||
CVE-2024-50825,0,0,78721026e8bda92e94947b276b84f39730aacb6de8d193ace62a531df2853d94,2024-11-15T20:35:12.167000
|
||||
CVE-2024-50826,0,0,9ab314a9ae4299550f9cd1128db30ab75635e2b4df9acc44237f8ffee9257b76,2024-11-15T20:35:13.500000
|
||||
CVE-2024-50827,0,0,49d717d74c74f3cadb619530991fcd02c4fd10dbb2ae02cf88b0f9b5a884fe3b,2024-11-15T20:35:14.820000
|
||||
CVE-2024-50828,0,0,fafb0f73bc6df62cd1e6fb4e462fcaade9c676589e89a8cb22ddd2c1ff8a54d7,2024-11-15T20:35:16.143000
|
||||
CVE-2024-50829,0,0,0ee321663baac09b0aac9953d0386c900ebd5fbaf6aad0e241d3a7132ebb7371,2024-11-15T20:35:17.460000
|
||||
CVE-2024-5083,0,0,732c694a7e1209ed2f8fc7bc4b33638dd34156f3bcdf08e1c465413b90acb66d,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50830,0,1,d617c9b7d296513d184f5993b5ea43bd52583e401c6a04117d74d1cf54b1ac96,2024-11-15T20:35:18.800000
|
||||
CVE-2024-50831,0,1,44616a4beb14916ca1f00d30b19581dffc684be84504bda456a73fb7729c3ec4,2024-11-15T20:35:20.133000
|
||||
CVE-2024-50832,0,1,51c67e0f2769dec09ca7bb0843ab6c7d4db85991d6db2038381aa4452b822ef9,2024-11-15T20:35:21.483000
|
||||
CVE-2024-50833,0,1,077ac2f3a9ebcb59ea8cb006c25d9010cb0298acef393e3740698518e254fb50,2024-11-15T20:35:22.847000
|
||||
CVE-2024-50834,0,1,c0d48344d094c5c2f6cc477d614ce9495e8d41ba0d081b253eeb62cfbe5dfa7a,2024-11-15T20:35:24.163000
|
||||
CVE-2024-50835,0,0,d5fbc4b0d7032126c0f14b65179dabe6edfc46679aef0894f54588480863cf78,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50830,0,0,d617c9b7d296513d184f5993b5ea43bd52583e401c6a04117d74d1cf54b1ac96,2024-11-15T20:35:18.800000
|
||||
CVE-2024-50831,0,0,44616a4beb14916ca1f00d30b19581dffc684be84504bda456a73fb7729c3ec4,2024-11-15T20:35:20.133000
|
||||
CVE-2024-50832,0,0,51c67e0f2769dec09ca7bb0843ab6c7d4db85991d6db2038381aa4452b822ef9,2024-11-15T20:35:21.483000
|
||||
CVE-2024-50833,0,0,077ac2f3a9ebcb59ea8cb006c25d9010cb0298acef393e3740698518e254fb50,2024-11-15T20:35:22.847000
|
||||
CVE-2024-50834,0,0,c0d48344d094c5c2f6cc477d614ce9495e8d41ba0d081b253eeb62cfbe5dfa7a,2024-11-15T20:35:24.163000
|
||||
CVE-2024-50835,0,1,583baa89a3c36b45de164b658380a4083975decf59ae9617f3c0dd1ec6abfbba,2024-11-15T21:35:17.397000
|
||||
CVE-2024-50836,0,0,85766955476c98bd839d5b2de9f60973de1bd164e67470863e519d1cacd3f4a7,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50837,0,0,fa916683a3dbdfde4d576245ae8ebbe1bad5683debaaa4ab7d920a9d6cde4375,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50838,0,0,03dc014a97e8c40e12ccc27e79d2f7d1a4be7052e0e877e043248cf17a531f10,2024-11-15T13:58:08.913000
|
||||
@ -265681,13 +265695,14 @@ CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b803
|
||||
CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000
|
||||
CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000
|
||||
CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50968,0,1,8c4a378aa29139c2d1edfb8be9d371ec199bf37fbc913c101e94bbcd552ffb7c,2024-11-15T19:55:17.097000
|
||||
CVE-2024-50968,0,0,8c4a378aa29139c2d1edfb8be9d371ec199bf37fbc913c101e94bbcd552ffb7c,2024-11-15T19:55:17.097000
|
||||
CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000
|
||||
CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000
|
||||
CVE-2024-50970,0,0,2e7889cd3277e474e337527bd160fa64940d7885ad18ecb1fd92dbeebea4ffd5,2024-11-14T14:52:08.097000
|
||||
CVE-2024-50971,0,0,848df10022c9f75f1c9b9af05147f0923c3bc4a87738961451f1396fe9fbaab2,2024-11-14T14:54:33.787000
|
||||
CVE-2024-50972,0,0,4e8fb2dd82bb709cf8c210bd21d32873aff8eb306d7b228bf00eb024671ceb3b,2024-11-14T14:55:08.567000
|
||||
CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000
|
||||
CVE-2024-50983,1,1,84de45fb907a99039ccf14e66e9e37e3e137e1772ab203e8910a8d2f6cceb415,2024-11-15T22:15:15.907000
|
||||
CVE-2024-50986,0,0,949bd035da5362255ed7ac7c9edff0cc7fd8e202111ff0c1f3097978f8821437,2024-11-15T15:15:07.773000
|
||||
CVE-2024-50989,0,0,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000
|
||||
CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000
|
||||
@ -265734,7 +265749,7 @@ CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df
|
||||
CVE-2024-51030,0,0,f2e747039aa1c94bb05e787f4d207222d754db12ded9f6bb6df83cbdf74d7a25,2024-11-13T16:47:16.060000
|
||||
CVE-2024-51031,0,0,b86b8798942030d83468cd0fee37fbed37248c27fcb27a06dd2e8866d706c425,2024-11-13T19:34:52.990000
|
||||
CVE-2024-51032,0,0,8ef48ff90dee211a4695fed712dc76f07ccf41b216d3f511e2ee570e4fc12c05,2024-11-13T19:35:03.467000
|
||||
CVE-2024-51037,1,1,227ae7b5cb9d86b36d7cd849e72d041623335a38cbfae0382a862c71b1bd6796,2024-11-15T19:15:07.803000
|
||||
CVE-2024-51037,0,0,227ae7b5cb9d86b36d7cd849e72d041623335a38cbfae0382a862c71b1bd6796,2024-11-15T19:15:07.803000
|
||||
CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000
|
||||
CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000
|
||||
CVE-2024-51054,0,0,5f7e39a7aaba6174905b6372920760418cc96f41e26463faa8167a7c26d82367,2024-11-12T20:35:17.823000
|
||||
@ -265763,8 +265778,8 @@ CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fd
|
||||
CVE-2024-51135,0,0,14e718ab6bbce05ef8372500586cdca65e1edc88403906fd3621efeb1c3a8273,2024-11-12T17:35:13.127000
|
||||
CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000
|
||||
CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000
|
||||
CVE-2024-51141,1,1,72704e13d12a17e571c3a7505e61832763889d7be7070a6bf2a4ed14cd771078,2024-11-15T19:35:16.037000
|
||||
CVE-2024-51142,1,1,fd30d68982f80038879876bcb7da202ea098b1b06829842cd1d2fd879f794ac7,2024-11-15T19:35:16.907000
|
||||
CVE-2024-51141,0,0,72704e13d12a17e571c3a7505e61832763889d7be7070a6bf2a4ed14cd771078,2024-11-15T19:35:16.037000
|
||||
CVE-2024-51142,0,0,fd30d68982f80038879876bcb7da202ea098b1b06829842cd1d2fd879f794ac7,2024-11-15T19:35:16.907000
|
||||
CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000
|
||||
CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c572,2024-11-13T20:03:06.083000
|
||||
CVE-2024-51156,0,0,ab531e15c589d8d218306e8fd6a6995b5bbbca61f7ac15e609aad877e064595a,2024-11-15T13:58:08.913000
|
||||
@ -265826,7 +265841,7 @@ CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5
|
||||
CVE-2024-51328,0,0,2b00b7365b3324739a77fda3a7b20dd87707f9d87480b5fe651b2c4602f0e7fd,2024-11-04T19:35:16.150000
|
||||
CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
|
||||
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
|
||||
CVE-2024-51330,1,1,623b675eccffcbf1cf55a5f779caf9f08fac1ee997e235e10f58c6709b1207ca,2024-11-15T19:15:08.057000
|
||||
CVE-2024-51330,0,0,623b675eccffcbf1cf55a5f779caf9f08fac1ee997e235e10f58c6709b1207ca,2024-11-15T19:15:08.057000
|
||||
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
|
||||
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
|
||||
CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000
|
||||
@ -266088,6 +266103,8 @@ CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59
|
||||
CVE-2024-51761,0,0,7fba3491ed17cbb0fcacf7e06dec1801a39b2cbb0c39394d461b327fba0f0b35,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51762,0,0,d2974582ab4193d4fadecd27c7279e3cb5c2f47e26174ca4e5af6a95c50b9465,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51763,0,0,1ab0b26c017f9714f7e7328b764552b7d7949949df835662c6f45441aac0b931,2024-11-12T13:56:24.513000
|
||||
CVE-2024-51764,1,1,8800ca929d396499daf3236208fd4ea66794e6173690a1c1b1f0ac3f2b68132e,2024-11-15T22:15:16.017000
|
||||
CVE-2024-51765,1,1,2b45b920dce3433278e2cb17cc21b3c3ec955264a5b038b22d8bab75a4c3fdc6,2024-11-15T22:15:16.090000
|
||||
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
|
||||
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
|
||||
CVE-2024-51776,0,0,5ca2c4eb522419754c0be1183c799032dcc5ffdbcb2b4aea116b020281ac6eec,2024-11-12T13:56:24.513000
|
||||
@ -266284,7 +266301,7 @@ CVE-2024-52519,0,0,ef167401ae9fc01ccb1f13f70e64122366cb19a9418bcd255bc301ab8d4f7
|
||||
CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
|
||||
CVE-2024-52520,0,0,4de7d2e7a45bd842065c15f5be2bd96578b919552715d69160c2096043d8c3e4,2024-11-15T17:35:16.007000
|
||||
CVE-2024-52521,0,0,faa46aebbec3a6f9761c605df33640c3789d02a577af493da0314de121761d4d,2024-11-15T17:15:22.580000
|
||||
CVE-2024-52522,0,1,95d6ce09113e93a246b361619724cd6885ae3117169da02763d180ee43e73efa,2024-11-15T19:35:18.670000
|
||||
CVE-2024-52522,0,0,95d6ce09113e93a246b361619724cd6885ae3117169da02763d180ee43e73efa,2024-11-15T19:35:18.670000
|
||||
CVE-2024-52523,0,0,c73b3a3e311904286520f4e28b5eb14cf21a74cb1348dc035fd6fd39108922b4,2024-11-15T17:35:16.820000
|
||||
CVE-2024-52524,0,0,71485345519193ae9ba542ea67056853a738d2240eb01cec0b89113cc24468ca,2024-11-15T13:58:08.913000
|
||||
CVE-2024-52525,0,0,ec8e0a0bf9b687aeae95450e5373687e7d3db6b39b44f52647e90ceeb50d4278,2024-11-15T17:15:23.150000
|
||||
@ -269212,7 +269229,7 @@ CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b56
|
||||
CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000
|
||||
CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000
|
||||
CVE-2024-8755,0,0,6df715314b1336790c7d97e006488029fc046357f7768aca9e76af35c90a4cf5,2024-10-15T12:58:51.050000
|
||||
CVE-2024-8755,0,1,ada2261a0d66bc88ffef4f3af38606726bc93eaeb8dab074f59d4d0069757373,2024-11-15T21:15:11.443000
|
||||
CVE-2024-8756,0,0,267dc6d9d323b3ee60c214fb8c857bab77801af706c2ead75de38cc80f69f89e,2024-11-12T13:56:24.513000
|
||||
CVE-2024-8757,0,0,ac7b458a171f940d51c6f598fa3e7660be88f90768b34e80d2717be5212da2e2,2024-10-15T12:57:46.880000
|
||||
CVE-2024-8758,0,0,fea72da3ec447aa80df355b080e42aa6b936f28594d975635bc512eef8e85985,2024-10-07T21:35:03.193000
|
||||
@ -269484,7 +269501,7 @@ CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68
|
||||
CVE-2024-9178,0,0,eca5aa915b955e4e0d7be79d1a2a855f18f7873a33fd6eb6846d12ead9d5fc40,2024-11-08T16:03:26.157000
|
||||
CVE-2024-9180,0,0,43a25f270cfb7cd861387fae3760598de599a33ae7c6d1aa6e3f1a95d5d03b2a,2024-10-18T20:15:03.393000
|
||||
CVE-2024-9184,0,0,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9186,0,1,f4eaaf66520dd1dd546daa33a6861bcc369cf7d44acbcfde5a36d3ec579a2c15,2024-11-15T20:35:26.383000
|
||||
CVE-2024-9186,0,0,f4eaaf66520dd1dd546daa33a6861bcc369cf7d44acbcfde5a36d3ec579a2c15,2024-11-15T20:35:26.383000
|
||||
CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000
|
||||
CVE-2024-9191,0,0,ee6dfe1b0c94de0c4973c32fd9b929e1fce6c45c7ed6900711a578d548548d42,2024-11-05T17:06:41.363000
|
||||
@ -269593,7 +269610,7 @@ CVE-2024-9350,0,0,aa8e581f7289e7bd37e76e94e3964b82de5f4fbd95aa75417bef570e71a86c
|
||||
CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000
|
||||
CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000
|
||||
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
|
||||
CVE-2024-9355,0,1,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000
|
||||
CVE-2024-9355,0,0,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000
|
||||
CVE-2024-9356,0,0,5ef3a6f6e42eeb70f3f0a3cf86d7f29bc317f9d12d447c962c47d2384419ce59,2024-11-15T13:58:08.913000
|
||||
CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000
|
||||
CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000
|
||||
@ -269681,7 +269698,7 @@ CVE-2024-9472,0,0,6dc75bb8c902376e1f062a26c7a99982f272de37330a03e0fbfe9796bed76f
|
||||
CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000
|
||||
CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9476,0,0,e9d7dbd43229ebc9ea9972271d753666a58d144ea232688064d92b4b52fc9277,2024-11-15T14:00:09.720000
|
||||
CVE-2024-9477,0,0,d96fc519f7a9945d386fdd8950ef88a71881f191581b1624fa0de9c4a83d5a52,2024-11-13T17:01:16.850000
|
||||
CVE-2024-9477,0,1,cf43e95350fa7037b016e95ffdd76723a0091878a7d1f39dfbb116076ef07df2,2024-11-15T22:54:21.233000
|
||||
CVE-2024-9481,0,0,00fc2967ba19d907f5a39395cc30079db3ef641b613179e4b9951bd38c8d6817,2024-11-08T20:49:03.597000
|
||||
CVE-2024-9482,0,0,761865a3338cb95ad6952db46fced2e0b200e6722c7208c63ea4447e2930458e,2024-11-08T20:49:58.077000
|
||||
CVE-2024-9483,0,0,ad5fedd0cd72fbc18365b7b114267513d576cf1b98379267d7018d384a26ba96,2024-11-08T20:54:30.980000
|
||||
@ -269690,6 +269707,7 @@ CVE-2024-9486,0,0,69b6721a825ab2624e7f19326bb9e1625f15ea4093ed6bc68f868f6a5c393d
|
||||
CVE-2024-9487,0,0,8c0f797a1267751cd655e097cc4e72301937e39ee2b0b43119e44c1b6d6e9879,2024-11-15T16:57:10.080000
|
||||
CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8b2,2024-11-06T14:57:04.457000
|
||||
CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000
|
||||
CVE-2024-9500,1,1,d17a5fe6d7405fdf2189b088b648e6a96752a76d7bfb6e4cf4e052611cd95656,2024-11-15T22:15:16.580000
|
||||
CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9505,0,0,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000
|
||||
CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000
|
||||
@ -269703,7 +269721,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296
|
||||
CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000
|
||||
CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9529,0,1,a74498e9b247fb3cd22f5e7796c9032948030a8869b02aae9fc90324965437c4,2024-11-15T19:35:19.160000
|
||||
CVE-2024-9529,0,0,a74498e9b247fb3cd22f5e7796c9032948030a8869b02aae9fc90324965437c4,2024-11-15T19:35:19.160000
|
||||
CVE-2024-9530,0,0,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000
|
||||
CVE-2024-9531,0,0,2d32cff16aa07ef9767a12c3b335b7a483cb4a13b1ba87080414d4508df82841,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user