mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2024-10-01T22:00:18.000134+00:00
This commit is contained in:
parent
b793a47fa9
commit
39c8f608c0
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38460",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-09-04T02:15:09.713",
|
||||
"lastModified": "2023-09-08T00:02:44.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-01T20:35:04.597",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39136",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-30T22:15:08.977",
|
||||
"lastModified": "2023-09-06T12:41:25.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-01T21:35:02.317",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-703"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39137",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-30T22:15:09.030",
|
||||
"lastModified": "2023-09-05T19:04:53.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-01T21:35:03.077",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40272",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-08-17T14:15:10.083",
|
||||
"lastModified": "2023-08-24T17:00:07.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-01T20:35:06.170",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4357",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.247",
|
||||
"lastModified": "2024-01-31T17:15:14.977",
|
||||
"lastModified": "2024-10-01T20:35:08.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51958",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-10T15:15:09.290",
|
||||
"lastModified": "2024-01-13T01:36:59.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-01T21:35:05.460",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23058",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-11T16:15:55.997",
|
||||
"lastModified": "2024-01-18T15:16:50.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-10-01T21:35:06.453",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37533",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-07-24T18:15:04.690",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-01T20:35:02.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4CED2F00-89E3-4BA9-A8FB-D43B308A59A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294727",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7159173",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39560",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2024-07-10T23:15:13.140",
|
||||
"lastModified": "2024-07-11T17:15:16.867",
|
||||
"lastModified": "2024-10-01T20:15:05.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).\n\nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.\n\nSystem kernel memory can be monitored through the use of the 'show system statistics kernel memory' command as shown below:\n\nuser@router> show system statistics kernel memory\nMemory \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Size (kB) Percentage When\n\u00a0 Active \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 753092 \u00a0 \u00a0 18.4% Now\n\u00a0 Inactive \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 574300 \u00a0 \u00a0 14.0% Now\n\u00a0 Wired\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 443236 \u00a0 \u00a0 10.8% Now\n\u00a0 Cached\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1911204 \u00a0 \u00a0 46.6% Now\n\u00a0 Buf \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 32768\u00a0 \u00a0 \u00a0 0.8% Now\n\u00a0 Free \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 385072\u00a0 \u00a0 \u00a0 9.4% Now\nKernel Memory\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Now\n\u00a0 Data \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 312908\u00a0 \u00a0 \u00a0 7.6% Now\n\u00a0 Text \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 2560\u00a0 \u00a0 \u00a0 0.1% Now\n...\n\nThis issue affects:\nJunos OS:\n\n\n * All versions before 20.4R3-S9,\n * All versions of 21.2,\n * from 21.4 before 21.4R3-S5,\n * from 22.1 before 22.1R3-S5,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S2,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved:\n\n\n * All versions before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO."
|
||||
"value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a kernel crash, resulting in a Denial of Service (DoS).\n\nThe kernel memory leak and eventual crash will be seen when the downstream RSVP neighbor has a persistent error which will not be corrected.\n\nSystem kernel memory can be monitored through the use of the 'show system kernel memory' command as shown below:\n\nuser@router> show system kernel memory \u00a0 \nReal memory total/reserved: 4130268/ 133344 Kbytes\nkmem map free: 18014398509110220 Kbytes\n\nThis issue affects:\nJunos OS:\n\n\n * All versions before 20.4R3-S9,\n * All versions of 21.2,\n * from 21.4 before 21.4R3-S5,\n * from 22.1 before 22.1R3-S5,\n * from 22.2 before 22.2R3-S3,\n * from 22.3 before 22.3R3-S2,\n * from 22.4 before 22.4R3,\n * from 23.2 before 23.2R2;\n\n\nJunos OS Evolved:\n\n\n * All versions before 21.4R3-S5-EVO,\n * from 22.1-EVO before 22.1R3-S5-EVO, \n * from 22.2-EVO before 22.2R3-S3-EVO, \n * from 22.3-EVO before 22.3R3-S2-EVO, \n * from 22.4-EVO before 22.4R3-EVO, \n * from 23.2-EVO before 23.2R2-EVO."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -22,7 +22,7 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
@ -51,7 +51,7 @@
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"recovery": "AUTOMATIC",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41672",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-07-24T18:15:05.527",
|
||||
"lastModified": "2024-07-25T12:36:39.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-01T20:33:44.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:duckdb:duckdb:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1.0",
|
||||
"matchCriteriaId": "83AE278C-3F41-40B0-8AE5-3F5D9DFE359A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/duckdb/duckdb/commit/c9b7c98aa0e1cd7363fe8bb8543a95f38e980d8a",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/duckdb/duckdb/pull/13133",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/duckdb/duckdb/security/advisories/GHSA-w2gf-jxc9-pf2q",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-42514",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T19:15:07.883",
|
||||
"lastModified": "2024-10-01T19:15:07.883",
|
||||
"lastModified": "2024-10-01T20:35:10.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A vulnerability in the legacy chat component of Mitel MiContact Center Business through 10.1.0.4 could allow an unauthenticated attacker to conduct an unauthorized access attack due to inadequate access control checks. A successful exploit could allow an attacker to access sensitive information and send unauthorized messages."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.mitel.com/support/security-advisories",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45302",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-08-29T22:15:05.377",
|
||||
"lastModified": "2024-08-30T13:00:05.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-01T20:05:07.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:restsharp:restsharp:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "107.0.0",
|
||||
"versionEndExcluding": "112.0.0",
|
||||
"matchCriteriaId": "AE118595-3073-4346-A583-A7DAE32C060B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/restsharp/RestSharp/blob/777bf194ec2d14271e7807cc704e73ec18fcaf7e/src/RestSharp/Request/HttpRequestMessageExtensions.cs#L32",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/restsharp/RestSharp/commit/0fba5e727d241b1867bd71efc912594075c2934b",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/restsharp/RestSharp/security/advisories/GHSA-4rr6-2v9v-wcpc",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45537",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-17T19:15:28.157",
|
||||
"lastModified": "2024-09-20T12:30:51.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-01T20:41:33.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,44 @@
|
||||
"value": "Apache Druid permite a los usuarios con ciertos permisos leer datos de otros sistemas de bases de datos mediante JDBC. Esta funcionalidad permite a los usuarios de confianza configurar b\u00fasquedas de Druid o ejecutar tareas de ingesta. Druid tambi\u00e9n permite a los administradores configurar una lista de propiedades permitidas que los usuarios pueden proporcionar para sus conexiones JDBC. De forma predeterminada, esta lista de propiedades permitidas restringe a los usuarios solo a las propiedades relacionadas con TLS. Sin embargo, al configurar una conexi\u00f3n JDBC de MySQL, los usuarios pueden usar una cadena de conexi\u00f3n JDBC especialmente manipulada para proporcionar propiedades que no est\u00e1n en esta lista de permitidos. Los usuarios sin permiso para configurar conexiones JDBC no pueden aprovechar esta vulnerabilidad. CVE-2021-26919 describe una vulnerabilidad similar que se solucion\u00f3 parcialmente en Apache Druid 0.20.2. Este problema se solucion\u00f3 en Apache Druid 30.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -28,10 +61,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "30.0.1",
|
||||
"matchCriteriaId": "03D16162-089B-402F-BBC9-9BC52E415591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/2ovx1t77y6tlkhk5b42clp4vwo4c8cjv",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-459xx/CVE-2024-45999.json
Normal file
21
CVE-2024/CVE-2024-459xx/CVE-2024-45999.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-45999",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T20:15:05.390",
|
||||
"lastModified": "2024-10-01T20:15:05.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability was discovered in Cloudlog 2.6.15, specifically within the get_station_info()function located in the file /application/models/Oqrs_model.php. The vulnerability is exploitable via the station_id parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chiggerlor.substack.com/p/cve-2024-45999",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46079",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T19:15:08.373",
|
||||
"lastModified": "2024-10-01T19:15:08.373",
|
||||
"lastModified": "2024-10-01T20:35:15.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in proj_new.php via the Descricao parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",
|
||||
|
21
CVE-2024/CVE-2024-460xx/CVE-2024-46080.json
Normal file
21
CVE-2024/CVE-2024-460xx/CVE-2024-46080.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-46080",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T21:15:06.767",
|
||||
"lastModified": "2024-10-01T21:15:06.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Scriptcase v9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_zip function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46081",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T19:15:08.763",
|
||||
"lastModified": "2024-10-01T19:15:08.763",
|
||||
"lastModified": "2024-10-01T20:35:15.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS). An authenticated user can craft malicious payloads in the To-Do List. The assigned user will trigger a stored XSS, which is particularly dangerous because tasks are assigned to various users on the platform."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",
|
||||
|
25
CVE-2024/CVE-2024-460xx/CVE-2024-46082.json
Normal file
25
CVE-2024/CVE-2024-460xx/CVE-2024-46082.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46082",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T21:15:06.857",
|
||||
"lastModified": "2024-10-01T21:15:06.857",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Scriptcase v.9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in nm_cor.php via the form and field parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46083",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T19:15:09.013",
|
||||
"lastModified": "2024-10-01T19:15:09.013",
|
||||
"lastModified": "2024-10-01T20:35:16.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Scriptcase v9.10.023 and before is vulnerable to Cross Site Scripting (XSS). An authenticated user can craft malicious payloads using the messages feature, which allows the injection of malicious code into any user's account on the platform. It is important to note that regular users can trigger actions for administrator users."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/",
|
||||
|
25
CVE-2024/CVE-2024-460xx/CVE-2024-46084.json
Normal file
25
CVE-2024/CVE-2024-460xx/CVE-2024-46084.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-46084",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-01T21:15:06.950",
|
||||
"lastModified": "2024-10-01T21:15:06.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Scriptcase 9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_unzip function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://scriptcase.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-47082",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-09-25T18:15:05.417",
|
||||
"lastModified": "2024-09-26T13:32:02.803",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-01T20:01:13.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:strawberryrocks:strawberry:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.243.0",
|
||||
"matchCriteriaId": "69791F16-368E-421A-AF87-2B4DE9F15925"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/strawberry-graphql/strawberry/commit/37265b230e511480a9ceace492f9f6a484be1387",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-79gp-q4wv-33fr",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://strawberry.rocks/docs/breaking-changes/0.243.0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-475xx/CVE-2024-47523.json
Normal file
64
CVE-2024/CVE-2024-475xx/CVE-2024-47523.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-47523",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T21:15:07.050",
|
||||
"lastModified": "2024-10-01T21:15:07.050",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Alert Transports\" feature allows authenticated users to inject arbitrary JavaScript through the \"Details\" section (which contains multiple fields depending on which transport is selected at that moment). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/blob/4777247327c793ed0a3306d0464b95176008177b/includes/html/print-alert-transports.php#L40",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/ee1afba003d33667981e098c83295f599d88439c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-7f84-28qh-9486",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-475xx/CVE-2024-47524.json
Normal file
60
CVE-2024/CVE-2024-475xx/CVE-2024-47524.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-47524",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T21:15:07.297",
|
||||
"lastModified": "2024-10-01T21:15:07.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can create a Device Groups, the application did not properly sanitize the user input in the Device Groups name, when user see the detail of the Device Group, if java script code is inside the name of the Device Groups, its will be trigger. This vulnerability is fixed in 24.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/d3b51560a8e2343e520d16e9adc72c6951aa91ee",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-fc38-2254-48g7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-475xx/CVE-2024-47525.json
Normal file
64
CVE-2024/CVE-2024-475xx/CVE-2024-47525.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-47525",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T21:15:07.520",
|
||||
"lastModified": "2024-10-01T21:15:07.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Alert Rules\" feature allows authenticated users to inject arbitrary JavaScript through the \"Title\" field. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/blob/9455173edce6971777cf6666d540eeeaf6201920/includes/html/print-alert-rules.php#L405",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/7620d220e48563938d869da7689b8ac3f7721490",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-j2j9-7pr6-xqwv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-475xx/CVE-2024-47526.json
Normal file
68
CVE-2024/CVE-2024-475xx/CVE-2024-47526.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-47526",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T21:15:07.740",
|
||||
"lastModified": "2024-10-01T21:15:07.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Self Cross-Site Scripting (Self-XSS) vulnerability in the \"Alert Templates\" feature allows users to inject arbitrary JavaScript into the alert template's name. This script executes immediately upon submission but does not persist after a page refresh."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/blob/0e741e365aa974a74aee6b43d1b4b759158a5c7e/includes/html/forms/alert-templates.inc.php#L40",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/blob/0e741e365aa974a74aee6b43d1b4b759158a5c7e/includes/html/modal/alert_template.inc.php#L205",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/f259edc19b9f0ccca484c60b1ba70a0bfff97ef5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-gcgp-q2jq-fw52",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-475xx/CVE-2024-47527.json
Normal file
60
CVE-2024/CVE-2024-475xx/CVE-2024-47527.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-47527",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T21:15:07.967",
|
||||
"lastModified": "2024-10-01T21:15:07.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Device Dependencies\" feature allows authenticated users to inject arbitrary JavaScript through the device name (\"hostname\" parameter). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. This vulnerability is fixed in 24.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/36b38a50cc10d4ed16caab92bdc18ed6abac9685",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-rwwc-2v8q-gc9v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2024/CVE-2024-475xx/CVE-2024-47528.json
Normal file
90
CVE-2024/CVE-2024-475xx/CVE-2024-47528.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2024-47528",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T21:15:08.273",
|
||||
"lastModified": "2024-10-01T21:15:08.273",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Stored Cross-Site Scripting (XSS) can be achieved by uploading a new Background for a Custom Map. Users with \"admin\" role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger on load. This led to Stored Cross-Site Scripting (XSS). The vulnerability is fixed in 24.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/commit/d959bf1b366319eda16e3cd6dfda8a22beb203be",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-x8gm-j36p-fppf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2024/CVE-2024-476xx/CVE-2024-47609.json
Normal file
86
CVE-2024/CVE-2024-476xx/CVE-2024-47609.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2024-47609",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-10-01T21:15:08.400",
|
||||
"lastModified": "2024-10-01T21:15:08.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tonic is a native gRPC client & server implementation with async/await support. When using tonic::transport::Server there is a remote DoS attack that can cause the server to exit cleanly on accepting a TCP/TLS stream. This can be triggered by causing the accept call to error out with errors that were not covered correctly causing the accept loop to exit. Upgrading to tonic 0.12.3 and above contains the fix."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "GREEN",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/hyperium/tonic/commit/a4472a86f3290e60c7c01348b7e6a8164d6e7e48",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hyperium/tonic/issues/1897",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/hyperium/tonic/security/advisories/GHSA-4jwc-w2hc-78qv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6936",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-21T04:15:02.007",
|
||||
"lastModified": "2024-07-22T13:00:31.330",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2024-10-01T20:37:34.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -120,22 +140,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:formtools:form_tools:3.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD2FECB7-93EA-4F34-AD68-A96EED343AF6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DeepMountains/Mirage/blob/main/CVE2-2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.271991",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.271991",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.372318",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-7151",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-07-27T20:15:09.650",
|
||||
"lastModified": "2024-07-29T14:12:08.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-10-01T20:28:02.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,6 +61,26 @@
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
@ -110,8 +130,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,22 +150,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:o3_firmware:1.0.0.10\\(2478\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1E05BDCC-AA87-414D-A782-6DE9A79BF613"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:o3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB0A6A18-0499-43E9-ADC9-A229A5DF846A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/noahze01/IoT-vulnerable/blob/main/Tenda/O3v2.0/fromMacFilterSet.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.272554",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.272554",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.377040",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9396",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-10-01T16:15:10.790",
|
||||
"lastModified": "2024-10-01T16:15:10.790",
|
||||
"lastModified": "2024-10-01T20:35:19.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912471",
|
||||
|
60
CVE-2024/CVE-2024-94xx/CVE-2024-9407.json
Normal file
60
CVE-2024/CVE-2024-94xx/CVE-2024-9407.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-9407",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-10-01T21:15:08.530",
|
||||
"lastModified": "2024-10-01T21:15:08.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-9407",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2315887",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
163
CVE-2024/CVE-2024-94xx/CVE-2024-9411.json
Normal file
163
CVE-2024/CVE-2024-94xx/CVE-2024-9411.json
Normal file
@ -0,0 +1,163 @@
|
||||
{
|
||||
"id": "CVE-2024-9411",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-01T20:15:05.630",
|
||||
"lastModified": "2024-10-01T21:35:07.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in OFCMS 1.1.2. This affects the function add of the file /admin/system/dict/add.json?sqlid=system.dict.save. The manipulation of the argument dict_value leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/oufu/ofcms/issues/IATECW",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.278973",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.278973",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
75
README.md
75
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-10-01T20:00:17.206345+00:00
|
||||
2024-10-01T22:00:18.000134+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-10-01T19:41:08.783000+00:00
|
||||
2024-10-01T21:35:07.620000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
264274
|
||||
264287
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-31835](CVE-2024/CVE-2024-318xx/CVE-2024-31835.json) (`2024-10-01T19:15:07.493`)
|
||||
- [CVE-2024-42514](CVE-2024/CVE-2024-425xx/CVE-2024-42514.json) (`2024-10-01T19:15:07.883`)
|
||||
- [CVE-2024-46079](CVE-2024/CVE-2024-460xx/CVE-2024-46079.json) (`2024-10-01T19:15:08.373`)
|
||||
- [CVE-2024-46081](CVE-2024/CVE-2024-460xx/CVE-2024-46081.json) (`2024-10-01T19:15:08.763`)
|
||||
- [CVE-2024-46083](CVE-2024/CVE-2024-460xx/CVE-2024-46083.json) (`2024-10-01T19:15:09.013`)
|
||||
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-01T19:15:09.500`)
|
||||
- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-10-01T19:15:09.793`)
|
||||
- [CVE-2024-45999](CVE-2024/CVE-2024-459xx/CVE-2024-45999.json) (`2024-10-01T20:15:05.390`)
|
||||
- [CVE-2024-46080](CVE-2024/CVE-2024-460xx/CVE-2024-46080.json) (`2024-10-01T21:15:06.767`)
|
||||
- [CVE-2024-46082](CVE-2024/CVE-2024-460xx/CVE-2024-46082.json) (`2024-10-01T21:15:06.857`)
|
||||
- [CVE-2024-46084](CVE-2024/CVE-2024-460xx/CVE-2024-46084.json) (`2024-10-01T21:15:06.950`)
|
||||
- [CVE-2024-47523](CVE-2024/CVE-2024-475xx/CVE-2024-47523.json) (`2024-10-01T21:15:07.050`)
|
||||
- [CVE-2024-47524](CVE-2024/CVE-2024-475xx/CVE-2024-47524.json) (`2024-10-01T21:15:07.297`)
|
||||
- [CVE-2024-47525](CVE-2024/CVE-2024-475xx/CVE-2024-47525.json) (`2024-10-01T21:15:07.520`)
|
||||
- [CVE-2024-47526](CVE-2024/CVE-2024-475xx/CVE-2024-47526.json) (`2024-10-01T21:15:07.740`)
|
||||
- [CVE-2024-47527](CVE-2024/CVE-2024-475xx/CVE-2024-47527.json) (`2024-10-01T21:15:07.967`)
|
||||
- [CVE-2024-47528](CVE-2024/CVE-2024-475xx/CVE-2024-47528.json) (`2024-10-01T21:15:08.273`)
|
||||
- [CVE-2024-47609](CVE-2024/CVE-2024-476xx/CVE-2024-47609.json) (`2024-10-01T21:15:08.400`)
|
||||
- [CVE-2024-9407](CVE-2024/CVE-2024-94xx/CVE-2024-9407.json) (`2024-10-01T21:15:08.530`)
|
||||
- [CVE-2024-9411](CVE-2024/CVE-2024-94xx/CVE-2024-9411.json) (`2024-10-01T20:15:05.630`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `30`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
- [CVE-2023-39553](CVE-2023/CVE-2023-395xx/CVE-2023-39553.json) (`2024-10-01T19:35:04.130`)
|
||||
- [CVE-2023-4353](CVE-2023/CVE-2023-43xx/CVE-2023-4353.json) (`2024-10-01T19:35:06.040`)
|
||||
- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-10-01T19:15:07.107`)
|
||||
- [CVE-2024-22892](CVE-2024/CVE-2024-228xx/CVE-2024-22892.json) (`2024-10-01T19:10:13.467`)
|
||||
- [CVE-2024-25659](CVE-2024/CVE-2024-256xx/CVE-2024-25659.json) (`2024-10-01T18:35:06.917`)
|
||||
- [CVE-2024-25660](CVE-2024/CVE-2024-256xx/CVE-2024-25660.json) (`2024-10-01T18:35:07.807`)
|
||||
- [CVE-2024-3657](CVE-2024/CVE-2024-36xx/CVE-2024-3657.json) (`2024-10-01T19:15:07.647`)
|
||||
- [CVE-2024-41445](CVE-2024/CVE-2024-414xx/CVE-2024-41445.json) (`2024-10-01T19:03:27.197`)
|
||||
- [CVE-2024-42154](CVE-2024/CVE-2024-421xx/CVE-2024-42154.json) (`2024-10-01T19:32:18.310`)
|
||||
- [CVE-2024-44610](CVE-2024/CVE-2024-446xx/CVE-2024-44610.json) (`2024-10-01T18:35:08.880`)
|
||||
- [CVE-2024-44744](CVE-2024/CVE-2024-447xx/CVE-2024-44744.json) (`2024-10-01T19:35:08.023`)
|
||||
- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-10-01T18:29:17.867`)
|
||||
- [CVE-2024-47534](CVE-2024/CVE-2024-475xx/CVE-2024-47534.json) (`2024-10-01T18:35:09.730`)
|
||||
- [CVE-2024-5953](CVE-2024/CVE-2024-59xx/CVE-2024-5953.json) (`2024-10-01T19:15:09.320`)
|
||||
- [CVE-2024-6593](CVE-2024/CVE-2024-65xx/CVE-2024-6593.json) (`2024-10-01T19:37:55.573`)
|
||||
- [CVE-2024-6594](CVE-2024/CVE-2024-65xx/CVE-2024-6594.json) (`2024-10-01T19:41:08.783`)
|
||||
- [CVE-2024-7421](CVE-2024/CVE-2024-74xx/CVE-2024-7421.json) (`2024-10-01T18:36:59.117`)
|
||||
- [CVE-2024-8888](CVE-2024/CVE-2024-88xx/CVE-2024-8888.json) (`2024-10-01T19:30:35.400`)
|
||||
- [CVE-2024-8975](CVE-2024/CVE-2024-89xx/CVE-2024-8975.json) (`2024-10-01T19:20:21.103`)
|
||||
- [CVE-2024-8996](CVE-2024/CVE-2024-89xx/CVE-2024-8996.json) (`2024-10-01T19:16:02.793`)
|
||||
- [CVE-2024-9392](CVE-2024/CVE-2024-93xx/CVE-2024-9392.json) (`2024-10-01T19:35:08.990`)
|
||||
- [CVE-2024-9400](CVE-2024/CVE-2024-94xx/CVE-2024-9400.json) (`2024-10-01T19:35:10.277`)
|
||||
- [CVE-2024-9401](CVE-2024/CVE-2024-94xx/CVE-2024-9401.json) (`2024-10-01T18:35:10.363`)
|
||||
- [CVE-2024-9402](CVE-2024/CVE-2024-94xx/CVE-2024-9402.json) (`2024-10-01T19:35:11.270`)
|
||||
- [CVE-2024-9403](CVE-2024/CVE-2024-94xx/CVE-2024-9403.json) (`2024-10-01T19:35:12.057`)
|
||||
- [CVE-2023-38460](CVE-2023/CVE-2023-384xx/CVE-2023-38460.json) (`2024-10-01T20:35:04.597`)
|
||||
- [CVE-2023-39136](CVE-2023/CVE-2023-391xx/CVE-2023-39136.json) (`2024-10-01T21:35:02.317`)
|
||||
- [CVE-2023-39137](CVE-2023/CVE-2023-391xx/CVE-2023-39137.json) (`2024-10-01T21:35:03.077`)
|
||||
- [CVE-2023-40272](CVE-2023/CVE-2023-402xx/CVE-2023-40272.json) (`2024-10-01T20:35:06.170`)
|
||||
- [CVE-2023-4357](CVE-2023/CVE-2023-43xx/CVE-2023-4357.json) (`2024-10-01T20:35:08.987`)
|
||||
- [CVE-2023-51958](CVE-2023/CVE-2023-519xx/CVE-2023-51958.json) (`2024-10-01T21:35:05.460`)
|
||||
- [CVE-2024-23058](CVE-2024/CVE-2024-230xx/CVE-2024-23058.json) (`2024-10-01T21:35:06.453`)
|
||||
- [CVE-2024-37533](CVE-2024/CVE-2024-375xx/CVE-2024-37533.json) (`2024-10-01T20:35:02.140`)
|
||||
- [CVE-2024-39560](CVE-2024/CVE-2024-395xx/CVE-2024-39560.json) (`2024-10-01T20:15:05.170`)
|
||||
- [CVE-2024-41672](CVE-2024/CVE-2024-416xx/CVE-2024-41672.json) (`2024-10-01T20:33:44.697`)
|
||||
- [CVE-2024-42514](CVE-2024/CVE-2024-425xx/CVE-2024-42514.json) (`2024-10-01T20:35:10.930`)
|
||||
- [CVE-2024-45302](CVE-2024/CVE-2024-453xx/CVE-2024-45302.json) (`2024-10-01T20:05:07.857`)
|
||||
- [CVE-2024-45537](CVE-2024/CVE-2024-455xx/CVE-2024-45537.json) (`2024-10-01T20:41:33.207`)
|
||||
- [CVE-2024-46079](CVE-2024/CVE-2024-460xx/CVE-2024-46079.json) (`2024-10-01T20:35:15.110`)
|
||||
- [CVE-2024-46081](CVE-2024/CVE-2024-460xx/CVE-2024-46081.json) (`2024-10-01T20:35:15.930`)
|
||||
- [CVE-2024-46083](CVE-2024/CVE-2024-460xx/CVE-2024-46083.json) (`2024-10-01T20:35:16.743`)
|
||||
- [CVE-2024-47082](CVE-2024/CVE-2024-470xx/CVE-2024-47082.json) (`2024-10-01T20:01:13.367`)
|
||||
- [CVE-2024-6936](CVE-2024/CVE-2024-69xx/CVE-2024-6936.json) (`2024-10-01T20:37:34.150`)
|
||||
- [CVE-2024-7151](CVE-2024/CVE-2024-71xx/CVE-2024-7151.json) (`2024-10-01T20:28:02.453`)
|
||||
- [CVE-2024-9396](CVE-2024/CVE-2024-93xx/CVE-2024-9396.json) (`2024-10-01T20:35:19.027`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
119
_state.csv
119
_state.csv
@ -211259,7 +211259,7 @@ CVE-2022-47180,0,0,feeb910e30fc590f014c687ac3b445ad520d89e7bd146542881614c509fca
|
||||
CVE-2022-47181,0,0,51afd3bad1538ba6200abd9f8ed00bcacb9c749ddf0f1b3acf678c6446ded1f8,2023-11-15T15:52:09.650000
|
||||
CVE-2022-47183,0,0,cce3276c953e1ad26b3593918630191fbed32dda25f1ab16491186a3efe94af4,2023-05-26T13:56:53.707000
|
||||
CVE-2022-47184,0,0,4c70a545a853d25f85171c9fa2b1bd779e68fdc203c6ed430f8ebaf2aef625c9,2023-06-30T02:15:08.723000
|
||||
CVE-2022-47185,0,1,065bfecabb9c0fe335359d3df24bea57ca36ad2123e34b49d507b12c5e7642ba,2024-10-01T19:35:00.857000
|
||||
CVE-2022-47185,0,0,065bfecabb9c0fe335359d3df24bea57ca36ad2123e34b49d507b12c5e7642ba,2024-10-01T19:35:00.857000
|
||||
CVE-2022-47186,0,0,fc4b0558bef7a018ed1447c73a878492478d31f80573d5d43c4df02b4bacefa7,2023-10-03T00:45:03.710000
|
||||
CVE-2022-47187,0,0,f70f9487045a773b790514c9aaca409db00d19ea5383fd18c1f5d735a7719558,2023-10-02T20:45:38.697000
|
||||
CVE-2022-47188,0,0,ea49527de7f0fef9a080da54534eb3be5ad9a5330b8ad0dd08b44e7004124fe4,2023-04-06T19:46:55.110000
|
||||
@ -215106,9 +215106,9 @@ CVE-2023-20845,0,0,02fc9de8b79334f19e56f97c1e0d83a8ed285d0db1c41fa812625c5f13612
|
||||
CVE-2023-20846,0,0,6cd059ec6b277b1d7eb18c1c547341c79d6b806c2d39572a914bec0a227f4e62,2023-09-07T14:42:09.063000
|
||||
CVE-2023-20847,0,0,fca0d6701300e43b9ac492b44dba1f93abaea048fb485ddb4172af838081672a,2023-09-07T14:43:55.820000
|
||||
CVE-2023-20848,0,0,f8ab05aaa65b9d97c7927c9f7f85f45846288129514faf0a47280807318007af,2023-09-07T14:44:06.117000
|
||||
CVE-2023-20849,0,1,732ea1440309f4e1beded71f9f4fba5ac28aea4f3eff22c819fa9a5b01f18bdd,2024-10-01T19:35:01.137000
|
||||
CVE-2023-20849,0,0,732ea1440309f4e1beded71f9f4fba5ac28aea4f3eff22c819fa9a5b01f18bdd,2024-10-01T19:35:01.137000
|
||||
CVE-2023-2085,0,0,338a62bf8724204748fc07e75fa57132a1fae27e3dff7bdb8f58ed05edf063d5,2023-11-07T04:11:54.957000
|
||||
CVE-2023-20850,0,1,73fd7189993018104a47c923837818af31364782c90b09203ab602d9e71b3051,2024-10-01T18:35:02.863000
|
||||
CVE-2023-20850,0,0,73fd7189993018104a47c923837818af31364782c90b09203ab602d9e71b3051,2024-10-01T18:35:02.863000
|
||||
CVE-2023-20851,0,0,be0013a00c3715e1813fdf306db6be2e25c169823a0d7a12944b48deefed838b,2023-09-07T19:10:10.583000
|
||||
CVE-2023-20852,0,0,0bb4ba88c629b90d1df3958f078964652582dca9076942a6163fb821e9a4dc4a,2023-05-08T17:45:47.537000
|
||||
CVE-2023-20853,0,0,710623e02ee2d05aec5c3ee6bf751e0da0fec2fdaef0dc7d038d8c18682b7eb9,2023-05-08T18:45:09.930000
|
||||
@ -224839,7 +224839,7 @@ CVE-2023-32807,0,0,d8a6af0507a0d41f9a8ee4ad9d32298e7eae1bab1e6d2928ee6b7def5c985
|
||||
CVE-2023-32808,0,0,bd0af10904aecc1ae16ec029049d57afde81c9af3947ef3356881d7703008230,2023-09-07T19:12:34.423000
|
||||
CVE-2023-32809,0,0,929cb445486c4573195687241ba6c1ed4f870abddd481c25e4dc12969ed4fd51,2023-09-07T19:12:43.770000
|
||||
CVE-2023-32810,0,0,4fb3f76b2305d513fe8fafd71268d676dbcee10861a6e4da52ccaed05bc22c8d,2023-09-07T19:12:56.850000
|
||||
CVE-2023-32811,0,1,c7e3a2acd8ac3002d64478758a339565290c41241e59c530e4832384cd1c700a,2024-10-01T19:35:02.820000
|
||||
CVE-2023-32811,0,0,c7e3a2acd8ac3002d64478758a339565290c41241e59c530e4832384cd1c700a,2024-10-01T19:35:02.820000
|
||||
CVE-2023-32812,0,0,599edd474e68b3b82ff60cf2047213ad572ad452ad4995cf016ec27b59b086c0,2023-09-07T14:42:25.327000
|
||||
CVE-2023-32813,0,0,c96bd46cd9ba2352828083b7c7200ae5888cb4d37f5907c2db7d910bb0203cef,2023-09-07T14:42:39.470000
|
||||
CVE-2023-32814,0,0,4feadb463c76a88ab596897a43377e7f80236c0d7ca7b35eb9093f0abea1d20c,2023-09-07T14:42:58.513000
|
||||
@ -225681,7 +225681,7 @@ CVE-2023-3393,0,0,ed9a0ba91ad4a8f09fbdeaeefe5d6742b533c27532218bce46a9c7781a5552
|
||||
CVE-2023-33930,0,0,5e1b4b2e39ebc0810edaed24fa749cb5ff1094a76d90351b848320fd4a16f9c5,2024-06-04T16:57:41.053000
|
||||
CVE-2023-33931,0,0,9106168532ab2addb5e7b5a3eb8d9190aa2bca4cfda158157202afa7a07cd3a7,2023-06-02T01:31:13.207000
|
||||
CVE-2023-33933,0,0,9175093f486b4ea5e2aca075e1a9835d48e8aca0045318fe8eb28760e9a74497,2023-06-30T02:15:09.060000
|
||||
CVE-2023-33934,0,1,de334d9acd68662471dedff6521ef25ea4f9b72b7a3f6f1790e5d33c45ca327d,2024-10-01T19:35:03.657000
|
||||
CVE-2023-33934,0,0,de334d9acd68662471dedff6521ef25ea4f9b72b7a3f6f1790e5d33c45ca327d,2024-10-01T19:35:03.657000
|
||||
CVE-2023-33937,0,0,bc1be9e31f7865fa56bee64c9cedb1f9708b14232973e80728efd59ee3961971,2023-05-30T17:03:17.217000
|
||||
CVE-2023-33938,0,0,ac6ff70b73875be47e3d0537893ed9a023897167f8897f10814a360e575b89e1,2023-05-31T19:32:37.323000
|
||||
CVE-2023-33939,0,0,9a73d602606c77bd69142852b1957d1038d49fb0d2e040861c2d1bd59203784a,2023-05-31T20:35:06.760000
|
||||
@ -229037,7 +229037,7 @@ CVE-2023-38457,0,0,f02a3fd8430e0c8ee48f173f1e80cb2811aab3b6dbc442550c71a1ce0dbf3
|
||||
CVE-2023-38458,0,0,4dd8cb39abe3a2898afc4c68fb3269e759faa98ba291cfc9970979260faad039,2023-09-08T00:02:21.383000
|
||||
CVE-2023-38459,0,0,da38a8e6a851d6028dcb97ddf67e397e73d01255f5b1c893ade23785cf2580a1,2023-09-08T00:02:33.287000
|
||||
CVE-2023-3846,0,0,c04eb34779e2dd8a560eaeeaf47fca879072f7e8dce2ee419ef68b6a1c4dcd45,2024-05-17T02:27:53.090000
|
||||
CVE-2023-38460,0,0,fb856bc587c829fe459042e290e0d72c9fac8a91c5c4e7b46f9984c2422f81a4,2023-09-08T00:02:44.077000
|
||||
CVE-2023-38460,0,1,7edb98d5d86b34dc83f0614538a100382c98c6255ec1756e9552295c060f795c,2024-10-01T20:35:04.597000
|
||||
CVE-2023-38461,0,0,ef1f9318b591f67680fb88cab0a45ea5592d498d20e13820d69b14910f7a31d4,2023-09-08T00:02:53.680000
|
||||
CVE-2023-38462,0,0,ad8f13637d50038aa92b9722f87fbd880b84386b94fb455f8d003e25ca3bf654,2023-09-08T00:03:05.363000
|
||||
CVE-2023-38463,0,0,c448fe007f1883db40b171cfe3dc3ea94417cbd4f603b041b857c9a1b11546de,2023-09-08T00:03:15.670000
|
||||
@ -229550,8 +229550,8 @@ CVE-2023-39128,0,0,77f6c5119bafca0b9996aee2842e191a4d9548174e03d2fa9b129d2810aeb
|
||||
CVE-2023-39129,0,0,d1eb5fed83fa5734b4290c997347cd686277058609690a23f95237e8ce709e17,2023-08-03T13:49:53.617000
|
||||
CVE-2023-39130,0,0,9393d377d6aa3221c621e3302d662e6b07a56ec0af558ca2a1cb541bcac10567,2023-08-03T13:50:26.573000
|
||||
CVE-2023-39135,0,0,594c0f936b3099d165517fc58af2cdacfab98a3e04f24198a0ddf203d5f1b5de,2023-09-06T13:12:18.997000
|
||||
CVE-2023-39136,0,0,86e08af91084edda0600c9f57d0319754607f3c44537b3711ea63f35a4d082a3,2023-09-06T12:41:25.233000
|
||||
CVE-2023-39137,0,0,601a28e4e912b3746c0594cbef62e56ae00fee9ae7aea82deb28ee5c00fe5878,2023-09-05T19:04:53.400000
|
||||
CVE-2023-39136,0,1,c06ff859bd1c7c055b45576b7dbb53007c0cde9db1fc9d5dc938e1bfc6260f86,2024-10-01T21:35:02.317000
|
||||
CVE-2023-39137,0,1,638e7b31a00f87602302ef4b52c85d129349bffb8d3723657dc3b2438559c13b,2024-10-01T21:35:03.077000
|
||||
CVE-2023-39138,0,0,6dcde40857a231284385091ae6674cabfe3f0cf7ca44d8a504c40d2c03a30cfc,2023-09-05T19:00:03.030000
|
||||
CVE-2023-39139,0,0,d39e992b252416f6b6937fce8132868562a07c9f97ba56c45ab42cc8e857d843,2023-09-05T18:59:48.403000
|
||||
CVE-2023-3914,0,0,685f2ca881f14c2c10a5fcd42b9f85e11043130d7961d19b65a5febef8c6adec,2023-10-03T15:31:20.073000
|
||||
@ -229951,7 +229951,7 @@ CVE-2023-3955,0,0,510b6186eabfafe872746a3af55ba860a172147a88fc084aca8037ff56624d
|
||||
CVE-2023-39550,0,0,2a8d817096e915e94fe219a53b6a38ead86de951ff52ddb911ad30f78e04b370,2023-08-09T20:32:27.357000
|
||||
CVE-2023-39551,0,0,8d5e6a566bc2cd3065689b637543c0821838e3c03e3582da35fdeda106407485,2023-12-28T14:38:04.070000
|
||||
CVE-2023-39552,0,0,02ee4c2492f2965e99540c5423c0fdededbafe1eb16493d9b568d848959a133c,2023-11-07T04:17:32.960000
|
||||
CVE-2023-39553,0,1,dbd6cd86e49522a71b233588d611bc7c44ac0c2670dd6c99c7cdd270a728d3b7,2024-10-01T19:35:04.130000
|
||||
CVE-2023-39553,0,0,dbd6cd86e49522a71b233588d611bc7c44ac0c2670dd6c99c7cdd270a728d3b7,2024-10-01T19:35:04.130000
|
||||
CVE-2023-39558,0,0,5145ad8848de2b2a6600b3fdbb21297a79091733780a9f23e50a185007d8fa3a,2023-08-31T20:10:44.260000
|
||||
CVE-2023-39559,0,0,054d47cac5a8a6923a905c555773c14dce51b228c84c87f8f079198b6c03dd1d,2023-08-31T20:05:28.393000
|
||||
CVE-2023-3956,0,0,575daaaf998cddcbf63d4d2ed6f9a7d2053e76a2a5cbf3196a7093f0e7062d90,2023-11-07T04:20:01.623000
|
||||
@ -230442,7 +230442,7 @@ CVE-2023-40267,0,0,56572919214891c41bf23bf9a2a8facbc146568509a54758466f00ffb956e
|
||||
CVE-2023-4027,0,0,48dd689c0965b18792f4cfccdc2c7158758924f1ef3e29f58ca27c4d96ee8917,2024-09-12T17:53:23.627000
|
||||
CVE-2023-40270,0,0,bfe775aa3824e231981669c54daa4b3626fdef3730529a7294f128db1bc3f6b9,2023-11-07T04:20:11.150000
|
||||
CVE-2023-40271,0,0,6b7cac9f3aa7106de89543b184fd87ed595daa98acee7e01c87cb1a2e5f2240d,2023-09-13T02:27:16.427000
|
||||
CVE-2023-40272,0,0,dc2163a711fa92f8bca2bd6cb8aeefb8d5caede053b4827a4026ffd948affedb,2023-08-24T17:00:07.203000
|
||||
CVE-2023-40272,0,1,c51ef96a95f857beeafcaad1f1e8a7a8691f09322a6f61139921406cef681ae7,2024-10-01T20:35:06.170000
|
||||
CVE-2023-40273,0,0,1aeff0c64e332d86a913527db0cb88631ccab3f1706bf0fb35ec4fc41927c1a7,2024-09-27T21:35:03.083000
|
||||
CVE-2023-40274,0,0,f20f5b1641662d852a3d92ec12b3069f4904a342ddf85c169c1d25358b0bc60a,2023-08-22T17:47:49.207000
|
||||
CVE-2023-40275,0,0,bb235e4d61f5beda262b4c42a88b68d3e4b0c5cc4d47ebabd44e56511d114a27,2024-08-01T13:44:29.067000
|
||||
@ -232809,7 +232809,7 @@ CVE-2023-43526,0,0,fdef4d07433978c21e90f2aaa2d5e0744a40159cb46d2523f600e44091ff5
|
||||
CVE-2023-43527,0,0,7eb5c18eb2dcab19f02773f664512e59d6f3104050a058d0292f61259e86f9d7,2024-05-06T16:00:59.253000
|
||||
CVE-2023-43528,0,0,17723454d7170de1ffe05a669d9458b879c06f04bcd60806eb419a03cff21a7e,2024-05-06T16:00:59.253000
|
||||
CVE-2023-43529,0,0,d796ba91e8ed3a8af43a3b917741a5721c1a1c6f37759baff5d843732f367ee6,2024-05-06T16:00:59.253000
|
||||
CVE-2023-4353,0,1,393e1bc8974009d001ebc36ee1d228d22785f4af86ba454f0fc8955240e1e1dc,2024-10-01T19:35:06.040000
|
||||
CVE-2023-4353,0,0,393e1bc8974009d001ebc36ee1d228d22785f4af86ba454f0fc8955240e1e1dc,2024-10-01T19:35:06.040000
|
||||
CVE-2023-43530,0,0,2b0e9b8c44b2af07efc8e1983d06865dbe8d4ff2d4b02c1d4461a0a3baae25ca,2024-05-06T16:00:59.253000
|
||||
CVE-2023-43531,0,0,8776dcf534399ce96f5122f460d512396d2f87ec911c41e1e3bf01fcb06c7188,2024-05-06T16:00:59.253000
|
||||
CVE-2023-43532,0,0,2152376de855e4c6f3a3defbbd22ff091a522c6da97f87a072241e119c769d31,2024-04-12T16:15:34.570000
|
||||
@ -232844,7 +232844,7 @@ CVE-2023-43566,0,0,93b8330a966078586ff833ee074865965aee8604bc18527a8553469739647
|
||||
CVE-2023-43567,0,0,2aa86a4e24e6fbbc26da7a89b2443664154e1ca53a55c0280bab873782f48bbd,2023-11-16T14:27:01.117000
|
||||
CVE-2023-43568,0,0,bdfb543de0dbba6d1e62cd6b1d8ef84ab210795e281df5ecaa3d356a7108492b,2023-11-16T14:24:24.567000
|
||||
CVE-2023-43569,0,0,b501c00f16ad12c10de51b119f50da5b049f47b7a51d0959233e8a67b55dbb6f,2023-11-16T14:17:19.957000
|
||||
CVE-2023-4357,0,0,e5caa97919d1edd1308d69be6b40fa8b90c186dccadad04dac8f127c95689c26,2024-01-31T17:15:14.977000
|
||||
CVE-2023-4357,0,1,9a94caff9b6bef36e5d7f09901164950bf982836eab1382d1ab74e5201c2a9d8,2024-10-01T20:35:08.987000
|
||||
CVE-2023-43570,0,0,9ad3b7c79f93c1e3393183edbef7977dccc2cb0e413a289ae0c6f5cdc6eaca94,2023-11-16T14:20:36.770000
|
||||
CVE-2023-43571,0,0,0e75aa7e46973e590b7ca83bf8a058f9bcfeaf9ea393965470cb6593b7717e7b,2023-11-15T21:15:32.450000
|
||||
CVE-2023-43572,0,0,4fabdbdf5ef9f17ef700646cf6ea9081ceb1666f94c31ca11a0803fcb32aac84,2023-11-15T21:16:30.670000
|
||||
@ -238585,7 +238585,7 @@ CVE-2023-51954,0,0,4ff76b568d3faff9f829ea591dbfd0d9115272ba981bdf7edc32bb5147722
|
||||
CVE-2023-51955,0,0,96b6c1691f65514a025578a62b8ac9a0de7de576b9ebb58feaa93bb19273720d,2024-01-13T01:37:05.593000
|
||||
CVE-2023-51956,0,0,39d053af463ba7e4c7411fd2ae0ae34235a4f5d7202a921e90419dda10c7c0a3,2024-01-13T01:37:00.747000
|
||||
CVE-2023-51957,0,0,d4fa4f4bf8e10824cf2b7b73f04972398831051b7356d3b28aeb0357f12b784b,2024-09-03T21:35:05.447000
|
||||
CVE-2023-51958,0,0,6a543d9cfb3d754668940339330a02888bb256ec0fc4794f933773784d3b7e99,2024-01-13T01:36:59.057000
|
||||
CVE-2023-51958,0,1,9c0aa07523721b15574a8902ade72dd402be70f2c14a5bc99aef1fd7808f35d4,2024-10-01T21:35:05.460000
|
||||
CVE-2023-51959,0,0,88b3cd42f3f63afb4a575533356810808dc0bdec1c8365e49cf2b4a7a510665c,2024-01-13T01:36:56.537000
|
||||
CVE-2023-5196,0,0,b20860c77a6c0ec45058e11238b4e7202da899f6f301963823f3d3e85909eb20,2023-10-03T18:03:34.537000
|
||||
CVE-2023-51960,0,0,3084e660dc3b4485d09a6056a61ba99e47ad1e9382a09a174ebbb903ebd4df7e,2024-01-13T01:36:54.740000
|
||||
@ -242184,7 +242184,7 @@ CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab32714
|
||||
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
|
||||
CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000
|
||||
CVE-2024-1061,0,0,b0142398cd9b9f174f90c4c080cff8303ffcef7270f68849f3de92ae586ec72f,2024-02-05T18:21:08.577000
|
||||
CVE-2024-1062,0,1,24ecace5df9c5b33c9bbceb7b481f2a68a28ce66c96d3da7dab3563d6caa5f19,2024-10-01T19:15:07.107000
|
||||
CVE-2024-1062,0,0,24ecace5df9c5b33c9bbceb7b481f2a68a28ce66c96d3da7dab3563d6caa5f19,2024-10-01T19:15:07.107000
|
||||
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
|
||||
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
|
||||
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
|
||||
@ -245081,7 +245081,7 @@ CVE-2024-2288,0,0,cd7c5230343a968ec1284ad6d84a2effc1ddaec094bc18cd1b2aea35c83f88
|
||||
CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000
|
||||
CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000
|
||||
CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000
|
||||
CVE-2024-22892,0,1,1cb70c9bbe2035656f1a61537a281bff8d1269d1ea2645c56c1075af5d2518c3,2024-10-01T19:10:13.467000
|
||||
CVE-2024-22892,0,0,1cb70c9bbe2035656f1a61537a281bff8d1269d1ea2645c56c1075af5d2518c3,2024-10-01T19:10:13.467000
|
||||
CVE-2024-22893,0,0,e1e53fa1e54ff65fc5aae6a149ae9db0f2276c6ba02f1d9037ae0607db2029bf,2024-09-26T14:35:12.920000
|
||||
CVE-2024-22894,0,0,ecc90d1f90435a146d50bcd73db1df9adeb9ffb1597740cac1fbe4451cd93336,2024-08-29T20:36:06.063000
|
||||
CVE-2024-22895,0,0,ed8706063f1e23de8c688f7d1c47a27a8939e76d7f567287b7abe53b8af0f9ba,2024-01-26T19:34:53.417000
|
||||
@ -245138,7 +245138,7 @@ CVE-2024-23052,0,0,6e63544b9543a8be6c4c9d7ca85d761282c9d7499422234fa61e57b1028c2
|
||||
CVE-2024-23054,0,0,7a4436b0ce2b8f811851624479923281ac594f0e57d9c7febac6e9ac0a1c183e,2024-07-03T01:47:31.317000
|
||||
CVE-2024-23055,0,0,39a1da2046599a541095e649cd1467da192eafbb8c83bda6ccc7f637566b20d9,2024-02-02T17:05:51.857000
|
||||
CVE-2024-23057,0,0,356413b0e16b06656f2e48b34a263773eed2e79f92f54165ef6c3b3059d3c30c,2024-08-30T20:35:09.487000
|
||||
CVE-2024-23058,0,0,fbe948769846a0ca6a1c6e458e451afa4015e04c958980894e74b0838aeb0576,2024-01-18T15:16:50.140000
|
||||
CVE-2024-23058,0,1,2a01ebbd00ace7d6e55c410bee23cc5baa62717edeeb4cc89cb06fbb07b5e202,2024-10-01T21:35:06.453000
|
||||
CVE-2024-23059,0,0,9b9d622c9c169dee1e73de5d3695d13a5b3f299998a8b8578a6cba7dbf769da5,2024-01-18T15:17:14.453000
|
||||
CVE-2024-2306,0,0,dba4619c77c06715e90d6a0a9c40f646be88098100eb784089d749ef57adff28,2024-04-10T13:23:38.787000
|
||||
CVE-2024-23060,0,0,c533a2c3ab7879cb6341107bf55fb347921b4dcfd1771c35cc46c295fffc3384,2024-01-18T15:17:35.587000
|
||||
@ -246916,9 +246916,9 @@ CVE-2024-25655,0,0,873187155e7b44c80bfdf0f8ac9cdfc6130f961d8321802657052de226969
|
||||
CVE-2024-25656,0,0,dd2a757ac88e60c65e553326c3978a5d90dbd260cb747593d758355402513e97,2024-08-02T16:35:36.647000
|
||||
CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb312c,2024-08-22T20:35:04.950000
|
||||
CVE-2024-25658,0,0,f09508debc7eed82221938be7b993c0160818aa241ddbeae9e878f31f37fca08,2024-10-01T15:15:07.640000
|
||||
CVE-2024-25659,0,1,e243ce9030582146f2f06c628d6032baed4429ba1e3bb6f5631d56029f34cf07,2024-10-01T18:35:06.917000
|
||||
CVE-2024-25659,0,0,e243ce9030582146f2f06c628d6032baed4429ba1e3bb6f5631d56029f34cf07,2024-10-01T18:35:06.917000
|
||||
CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000
|
||||
CVE-2024-25660,0,1,00be2a86b19b7b85d17c4c9f5b4bc90225a5d5112c345c0347406e7d2223b9d0,2024-10-01T18:35:07.807000
|
||||
CVE-2024-25660,0,0,00be2a86b19b7b85d17c4c9f5b4bc90225a5d5112c345c0347406e7d2223b9d0,2024-10-01T18:35:07.807000
|
||||
CVE-2024-25661,0,0,b2add6eeddb71dfa6f29717e48f88f16d7fabe3cb3344824a313325dcf3b42aa,2024-10-01T15:35:11.597000
|
||||
CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000
|
||||
@ -251464,7 +251464,7 @@ CVE-2024-31822,0,0,f5a60a4c5bebe79b36a24a50e6b8d88f76d622645863bbbdd8c3e989dd181
|
||||
CVE-2024-31823,0,0,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000
|
||||
CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000
|
||||
CVE-2024-3183,0,0,0492ca93cdfb91fe06164185f64dfd6e79760054d26b360873216c2809fc0f55,2024-09-25T16:29:45.630000
|
||||
CVE-2024-31835,1,1,a15909b348dffc8f5b64de98bd835d16533e3f022180d11add00c96b0d6d92ad,2024-10-01T19:15:07.493000
|
||||
CVE-2024-31835,0,0,a15909b348dffc8f5b64de98bd835d16533e3f022180d11add00c96b0d6d92ad,2024-10-01T19:15:07.493000
|
||||
CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb008909a,2024-04-30T13:11:16.690000
|
||||
CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000
|
||||
CVE-2024-31840,0,0,2a239ae6429f1e619b6ab41616165b617110dec5fa8e072accfd9e1f9e2b5f58,2024-07-26T19:12:02.190000
|
||||
@ -254883,7 +254883,7 @@ CVE-2024-3655,0,0,e71ce96c12260fd20e30c34a37c891ab80d60d68f884fd271e3bd452e26ac6
|
||||
CVE-2024-36550,0,0,d598c384dd8bbd4edfd1900743514ac3a937e6a8f9e3bb960c12f741aca4d680,2024-08-21T16:35:07.113000
|
||||
CVE-2024-36568,0,0,c947aedd82bb9149f6d5ed733e385977abac9a86db57bbcbe31097874b0b1009,2024-07-03T02:03:17.227000
|
||||
CVE-2024-36569,0,0,360f77d552cdb048cab439a5bee7725cd5b340a5088e797dd6c6cd06c49b10f6,2024-07-03T02:03:18.013000
|
||||
CVE-2024-3657,0,1,83c06ed0f4ba7d4d8236ae3b34414da273019294423ac879c4a20b79f527b478,2024-10-01T19:15:07.647000
|
||||
CVE-2024-3657,0,0,83c06ed0f4ba7d4d8236ae3b34414da273019294423ac879c4a20b79f527b478,2024-10-01T19:15:07.647000
|
||||
CVE-2024-36572,0,0,51fcc433e117044936f625e7e1dc65ef66d9076878d51d4460ad4070df0069c4,2024-08-08T14:28:25.750000
|
||||
CVE-2024-36573,0,0,9ceb16a2acc670182f357db64f06ef9a672381f951b2f58ee1e425755272a679,2024-08-01T13:53:08.237000
|
||||
CVE-2024-36574,0,0,5919b4ca2d0f287d5f7cfcf83fdb2db228de9c4db571b73cd23f7f08bae7fb33,2024-07-03T02:03:18.790000
|
||||
@ -255528,7 +255528,7 @@ CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726
|
||||
CVE-2024-37529,0,0,f9accff698127aa01ca28b864c7fa6ff8749b3c683fd8343d39e26a6d0d3d7fd,2024-08-23T18:55:48.257000
|
||||
CVE-2024-3753,0,0,84eff4df8db1a00368e62ddb5ee92a92d75f6c87384a685b642620e2007cf84f,2024-08-01T13:56:41.100000
|
||||
CVE-2024-37532,0,0,3b60301bd3ecd5ba1ae039adbdac16a6f9c55836208bf93b57eccc416f5b126c,2024-08-21T14:19:53.637000
|
||||
CVE-2024-37533,0,0,d82586c3abd351c16093df491355c34e8750e635410a84408441a8e9ff8b85a0,2024-07-25T12:36:39.947000
|
||||
CVE-2024-37533,0,1,8617a6cc9c5f8f71c3d60c428ddee73394a13d5fc8b812be34dfeb025cafba9c,2024-10-01T20:35:02.140000
|
||||
CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000
|
||||
CVE-2024-37536,0,0,195e5e44f085284e46a0abfb4a43141ba690e4bb70fa2e823028c4e9bfbf4e97,2024-08-30T20:29:11.573000
|
||||
CVE-2024-37537,0,0,b4ce6fe0880001166fce40df54becea01a571a6ed2c234e78a95332e05a4f107,2024-08-30T20:35:49.987000
|
||||
@ -256903,7 +256903,7 @@ CVE-2024-39557,0,0,a32cc20ffd72a7cfc463b7005050b871d4a9c6b4282470b8a1b65cda36863
|
||||
CVE-2024-39558,0,0,f90cadeb1900fca56f5888109bfbb2a2d09e5b97ab830e54de2a3e13ed068c80,2024-08-12T13:38:24.610000
|
||||
CVE-2024-39559,0,0,3e11b67256a64801d826cd1dd91d32c291c393011a888b94d8c41f17c128d873,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3956,0,0,a3cb09bf1f28d977327946dc32f9ea686f27cbe51075fc0453b6840e64eb9d3b,2024-05-14T16:11:39.510000
|
||||
CVE-2024-39560,0,0,b4ed92932e2d04f6c32524ca2b7ed5834cd6ea452116fcc1c65eefbeae3fbc2c,2024-07-11T17:15:16.867000
|
||||
CVE-2024-39560,0,1,23f69d2135add515835b57e80ed861f5b71ea1c4537140e0184db49c17a20902,2024-10-01T20:15:05.170000
|
||||
CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbcb51,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000
|
||||
@ -257949,7 +257949,7 @@ CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1
|
||||
CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000
|
||||
CVE-2024-41443,0,0,4b989230a84b85398c5698bceac0a0dd2b8192cac38c0d61b31ca0600868cc4e,2024-09-11T15:54:29.327000
|
||||
CVE-2024-41444,0,0,5ea59719718418adee108f9ce5540b96facb8a58caf3370b9e6aa1a42ff02782,2024-09-05T18:36:39.773000
|
||||
CVE-2024-41445,0,1,0fc7f8fbc1abd819663cf2e74dae12a1de52a80ed01d9032692e1c87685a8e86,2024-10-01T19:03:27.197000
|
||||
CVE-2024-41445,0,0,0fc7f8fbc1abd819663cf2e74dae12a1de52a80ed01d9032692e1c87685a8e86,2024-10-01T19:03:27.197000
|
||||
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
|
||||
CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000
|
||||
CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000
|
||||
@ -258035,7 +258035,7 @@ CVE-2024-41668,0,0,d649a2a5c90e957bfc9f2698aae879b13d0f5f730255ef5d13e3e5f57ca74
|
||||
CVE-2024-4167,0,0,a726fa69800dd2a00fe506dc5d29a370681725e72bfe1ac34a8206d50708861e,2024-06-04T19:20:31.593000
|
||||
CVE-2024-41670,0,0,d4de1327e25e7abc39266a562cb92a3c058d45ff783401ce0a66d0266a4c8b41,2024-07-29T14:12:08.783000
|
||||
CVE-2024-41671,0,0,246285a77daa13e5014904fc895b261c0c0cff4d8c9ca9cc03eeeb85acc4b806,2024-07-29T16:21:52.517000
|
||||
CVE-2024-41672,0,0,22d9ca4e03b108f26bbb384eff42397f3ecb90b1b86b629c7d5509df37cbcfd2,2024-07-25T12:36:39.947000
|
||||
CVE-2024-41672,0,1,663620cb38189153336e50cbd79c8e42d8e45afa368faf46f48802a1fdfadeff,2024-10-01T20:33:44.697000
|
||||
CVE-2024-41673,0,0,920f05f9faa451ee3028416d14a5dbff94f88b00a7d462342ce1687bde0dafad,2024-10-01T15:15:07.873000
|
||||
CVE-2024-41674,0,0,e673b8205e82a534b9a977608e67254dbf60c56054d2121630b866936cabb953,2024-08-23T17:06:58.063000
|
||||
CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000
|
||||
@ -258408,7 +258408,7 @@ CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad
|
||||
CVE-2024-42151,0,0,fdb3fba7028cbe28580e674b99b9030e1b9e9a62c2e7f59da9e900cf53455fd9,2024-07-30T13:32:45.943000
|
||||
CVE-2024-42152,0,0,f9b1bdbb9770cb880c8e4f665160afe152a7dd9b4afb734b9f478a046b3eefc2,2024-08-09T14:55:35.753000
|
||||
CVE-2024-42153,0,0,fcc644e98f47bf80a615aace1a6ace900e6f19b9ce88641e6a917689ff1d51b4,2024-08-08T12:51:49.873000
|
||||
CVE-2024-42154,0,1,c65c832cba909a54bbd26126a85c44c643ba5fb94f1f9e28362ed2f837ea2217,2024-10-01T19:32:18.310000
|
||||
CVE-2024-42154,0,0,c65c832cba909a54bbd26126a85c44c643ba5fb94f1f9e28362ed2f837ea2217,2024-10-01T19:32:18.310000
|
||||
CVE-2024-42155,0,0,95a42d84399f0f115a34ecfd921658f3d7af5446b3cada02cd7d7dba29b77291,2024-08-08T15:01:33.093000
|
||||
CVE-2024-42156,0,0,3e3b593a088f7c0fa294387fa1377c62b099a10750cb61c9f552055051d6684b,2024-08-02T14:31:53.660000
|
||||
CVE-2024-42157,0,0,5125f5bae216026101436b8ffee5dc883ebe43267cdd74d06d29261ee37e908f,2024-08-02T14:31:28.107000
|
||||
@ -258677,7 +258677,7 @@ CVE-2024-42505,0,0,2fcd58f857ce6c82725ed74b63d72047c82b9583f361cc1246e436db45ee2
|
||||
CVE-2024-42506,0,0,a50836bc4b1264acacafbcc6caa08df43b3dfb5e0abc0c4e6db32750472d07f5,2024-09-26T13:32:02.803000
|
||||
CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb509124921a9,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
|
||||
CVE-2024-42514,1,1,67642e13ec32e598611ef0c754f1018f0c4bb02e7b9cedf0e4b024d133cabaf6,2024-10-01T19:15:07.883000
|
||||
CVE-2024-42514,0,1,61ee7e24012c0212f358aa1c3d0fe07389e60a29dbac19896e49651b443d2093,2024-10-01T20:35:10.930000
|
||||
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
|
||||
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
|
||||
CVE-2024-42523,0,0,e7f13531824456b37c381b164195bec4f01c74ddaa27da31139f6cf4c536fef0,2024-08-23T18:35:03.563000
|
||||
@ -259689,7 +259689,7 @@ CVE-2024-44589,0,0,67d52b979dbf84795ff1b1a6445da43c9d3cf1ac9141ab2287575f9704bf9
|
||||
CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000
|
||||
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
|
||||
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
|
||||
CVE-2024-44610,0,1,d9977e7613c4219febbb22e6f2d11d119f7833e2e068a8d6964d274f158b29fa,2024-10-01T18:35:08.880000
|
||||
CVE-2024-44610,0,0,d9977e7613c4219febbb22e6f2d11d119f7833e2e068a8d6964d274f158b29fa,2024-10-01T18:35:08.880000
|
||||
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
|
||||
CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
|
||||
CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000
|
||||
@ -259720,7 +259720,7 @@ CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a254
|
||||
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
|
||||
CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3ab6,2024-09-06T16:46:47.907000
|
||||
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
|
||||
CVE-2024-44744,0,1,2cfc69cf96d0f6d6bf0cafff4131548c736f85c9575c6e741792a6f3559eb74f,2024-10-01T19:35:08.023000
|
||||
CVE-2024-44744,0,0,2cfc69cf96d0f6d6bf0cafff4131548c736f85c9575c6e741792a6f3559eb74f,2024-10-01T19:35:08.023000
|
||||
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
|
||||
CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
|
||||
CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
|
||||
@ -260031,7 +260031,7 @@ CVE-2024-45298,0,0,3855d0d2f5eeba6af655c62306c41db8dfb0c660d64bc08f64547216bf276
|
||||
CVE-2024-45299,0,0,9c3c8396841ffa0041cd432be8da2038212f3a02e0878e8a646a9564573126e8,2024-09-30T12:48:22.930000
|
||||
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
|
||||
CVE-2024-45300,0,0,27fd775164e57067a38ceabd2aa31d5b4a7f60dbeadc170d1b287ab3c44d3eb5,2024-09-29T00:08:14.363000
|
||||
CVE-2024-45302,0,0,2643a37ef19c9772537ce62d37ff849e3e9fbe197380391a278662073d8a215f,2024-08-30T13:00:05.390000
|
||||
CVE-2024-45302,0,1,9c7190c10c27ef40d1c9209827dd8e45f9bb7da829c533438c3bcb25c5fb1108,2024-10-01T20:05:07.857000
|
||||
CVE-2024-45303,0,0,0f2993ec35c2f5c69a86f92f14083da5a1f9682262497cdf98941162719918c3,2024-09-18T20:25:05.807000
|
||||
CVE-2024-45304,0,0,46c3aa86e7ae53dac98ca6e0bb14f844dd183bc529cbdd17303f7bdd1323bb19,2024-09-19T17:26:37.030000
|
||||
CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000
|
||||
@ -260141,7 +260141,7 @@ CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6
|
||||
CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000
|
||||
CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000
|
||||
CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000
|
||||
CVE-2024-45537,0,0,a282d5193ad4ed25eb36900d0c615a3a776acb77a2f162fd5f0d463a04fcdb02,2024-09-20T12:30:51.220000
|
||||
CVE-2024-45537,0,1,8c7192afa018dd1f57bdc055aa77c26b5bbb005bc40a8a5d5186545cf53e09ac,2024-10-01T20:41:33.207000
|
||||
CVE-2024-4554,0,0,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000
|
||||
CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000
|
||||
CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000
|
||||
@ -260301,6 +260301,7 @@ CVE-2024-45987,0,0,78f20ed33f2f525a22db6a5cf4bd6c14205c0abb553bb982099aff60afe84
|
||||
CVE-2024-45989,0,0,ab3f6bd3392b087dcb35df06d536b3edd1a33ced94d9672493bfe0cf20988e7e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000
|
||||
CVE-2024-45993,0,0,e26b64fa81fc283c963e728220ec6b219796ae3f5c14eda623f46362e541d825,2024-09-30T19:35:05.410000
|
||||
CVE-2024-45999,1,1,4a0e2d6b9b706a9c04f96309d805e7a6593b35eaced1e9b7eade5f19e1c83601,2024-10-01T20:15:05.390000
|
||||
CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
|
||||
@ -260315,10 +260316,13 @@ CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb
|
||||
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
|
||||
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
|
||||
CVE-2024-46079,1,1,dad44f151f567ca45ee3a42f209885ad348460752883d5e1da277ce1abc03bdb,2024-10-01T19:15:08.373000
|
||||
CVE-2024-46079,0,1,de738a0bd882f39ea47b8b780287948857238b9c551e4d68f6db004a475649c2,2024-10-01T20:35:15.110000
|
||||
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
|
||||
CVE-2024-46081,1,1,267260957606f4fcc19bc77768a77368d056373798b365f99fdafa532b090fe3,2024-10-01T19:15:08.763000
|
||||
CVE-2024-46083,1,1,4bd55eb181f311fa2dca0ffc852711a990cc815111820be04315a4fee90c9829,2024-10-01T19:15:09.013000
|
||||
CVE-2024-46080,1,1,fc601b9ca1b02c7d9ec64ffd3e18ec37b90c292805b3e0ba6020447020b8c32c,2024-10-01T21:15:06.767000
|
||||
CVE-2024-46081,0,1,ce234681fd295fa30b0365e788d91f8af933d72fe65b9789b0e2a2d1afc6dfb2,2024-10-01T20:35:15.930000
|
||||
CVE-2024-46082,1,1,d95641b6e12ce4e2c315980636fb143c9979cbf517556c795f433f4f608511d1,2024-10-01T21:15:06.857000
|
||||
CVE-2024-46083,0,1,9a57be1cd20a7d38e5aef4fd8fde4bd404240de87843aaaa1ae4ab3787c965a8,2024-10-01T20:35:16.743000
|
||||
CVE-2024-46084,1,1,03932b1e786313bde47afcea58437164dbad1a2165bf11903e8b6ec41ebf5c6d,2024-10-01T21:15:06.950000
|
||||
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
|
||||
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
|
||||
@ -260768,9 +260772,9 @@ CVE-2024-47071,0,0,20aabd4cecd2fa87bfcd546bdad0f706b91d0c98fb8b7e753eb6864a0d761
|
||||
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000
|
||||
CVE-2024-47078,0,1,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000
|
||||
CVE-2024-47078,0,0,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000
|
||||
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
|
||||
CVE-2024-47082,0,0,d7ffc8b868640d5bbc5bc3253e64c223c49da037df585cfe29979998a6e29188,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47082,0,1,1308a2a31af2cc56619224d4839a59b43bea81793244865a2d1ff9a5500281b8,2024-10-01T20:01:13.367000
|
||||
CVE-2024-47083,0,0,5b490c0fd8cdac8afed0a02d02ba8fbf5e1993a5d9b09690e4aa8f97b99a9224,2024-09-26T13:32:02.803000
|
||||
CVE-2024-47085,0,0,52609fda0dd3268fb54a4c4835942301029b5f82b7a9256b81c2395928ebbe9b,2024-09-26T15:30:47.787000
|
||||
CVE-2024-47086,0,0,170e19d2a5f94228d179fe1c43d4342418d894a17ee62d0745e0ba04130a0c3e,2024-09-26T15:29:47.233000
|
||||
@ -260867,11 +260871,17 @@ CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef
|
||||
CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb5f,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000
|
||||
CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000
|
||||
CVE-2024-47523,1,1,fca2b0d3b1acc48eb24e4a02cc1e9ba9635ac9f135f59c304acc058ad85d9be4,2024-10-01T21:15:07.050000
|
||||
CVE-2024-47524,1,1,3aec47c770f6d1d3bcb3c93afa50d815d55cf5bd0a76155277e66f52d1432216,2024-10-01T21:15:07.297000
|
||||
CVE-2024-47525,1,1,9a4e8f76e84229f4808462d3a570657a25dda99b3c44f531ee53664db59a21d0,2024-10-01T21:15:07.520000
|
||||
CVE-2024-47526,1,1,43af752c3e2fc7342ec611606be28a580ed0ec758c75ca78eb986e06173bde43,2024-10-01T21:15:07.740000
|
||||
CVE-2024-47527,1,1,34969198f4910991ff7dd37ae24149a4937c9d23978ca5ae81c80cd14b82849a,2024-10-01T21:15:07.967000
|
||||
CVE-2024-47528,1,1,c80083da542e7f6c3b4980993c546b6e063f1d605799a426937d87a9431cf505,2024-10-01T21:15:08.273000
|
||||
CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000
|
||||
CVE-2024-47530,0,0,fba522e024b83acf70358c93acf37e114887d5fe3a476a11c9462eadc0b44e72,2024-09-30T16:15:09.540000
|
||||
CVE-2024-47531,0,0,33301edab0f0649702484b01110937da183dc72540869ebdc9cdc877c211a23a,2024-09-30T16:15:09.750000
|
||||
CVE-2024-47532,0,0,260108fc45e8ac31160035cc2b3e7ed0f7f45e8ba1661343699d85f76bbe06fa,2024-09-30T16:15:09.960000
|
||||
CVE-2024-47534,0,1,671e6c0c25dde8e26f9c5f40d1c53b3b411fe0b9cd99c946b70166162df34376,2024-10-01T18:35:09.730000
|
||||
CVE-2024-47534,0,0,671e6c0c25dde8e26f9c5f40d1c53b3b411fe0b9cd99c946b70166162df34376,2024-10-01T18:35:09.730000
|
||||
CVE-2024-47536,0,0,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000
|
||||
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
@ -260883,6 +260893,7 @@ CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f289
|
||||
CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000
|
||||
CVE-2024-47604,0,0,b6b4fc903f99b2043f88ddbd3163a454dae216b1bade4187e503e59baa13044e,2024-10-01T16:15:10.003000
|
||||
CVE-2024-47608,0,0,183b8f26709f0bb4c9315ae5ac8f0737eedb89fb07f4c926502b272e6d5567a7,2024-10-01T17:15:08.970000
|
||||
CVE-2024-47609,1,1,c9cf022f1dfad5ffb2fde9c3a055c08aea8aa07af7c65f963881117a985c612b,2024-10-01T21:15:08.400000
|
||||
CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000
|
||||
CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000
|
||||
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
|
||||
@ -261925,7 +261936,7 @@ CVE-2024-5949,0,0,4572c12d3ad878ee653901722f7c16c0dabd647af42f6f6ae5a5828547615d
|
||||
CVE-2024-5950,0,0,f2973766f812398c51fdc9e52a19a5f151706c2da451b30e218939a121000c2a,2024-08-07T18:12:58.253000
|
||||
CVE-2024-5951,0,0,6febf2923b11ad8e5c0b580c95ce8478dd937b62c84a55da1a853959f3aac15d,2024-08-07T18:12:55.977000
|
||||
CVE-2024-5952,0,0,4b0244413edcc544ed5c05479b5dbc3eeb5d75652ce440b39e8ad3eb0aaa28bb,2024-08-07T17:50:09.493000
|
||||
CVE-2024-5953,0,1,b0757fe0be0db13c58712e79eac7917768b2c13e9ca44ac3bbcfbb57ee29490a,2024-10-01T19:15:09.320000
|
||||
CVE-2024-5953,0,0,b0757fe0be0db13c58712e79eac7917768b2c13e9ca44ac3bbcfbb57ee29490a,2024-10-01T19:15:09.320000
|
||||
CVE-2024-5956,0,0,420ebddf13dc6945f3b24acaba57b0a6b03370d22cfc4e076d52d9e45c18f699,2024-09-06T16:25:19.253000
|
||||
CVE-2024-5957,0,0,c06bad62b3a76beb3abdcaffc89e2e904ca620c6e7deccb3fcebfda71eaf22f8,2024-09-06T16:24:23.317000
|
||||
CVE-2024-5958,0,0,c362ae5c540e50c1b2c9dabce36ffa9306ab0cb7dda4c74f438c515104f11dba,2024-09-26T15:35:51.207000
|
||||
@ -262469,8 +262480,8 @@ CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbe
|
||||
CVE-2024-6590,0,0,d0599e66e3892d02270a133e7b75afc43bc911ece06aeb7ca1aaac80a84c180b,2024-09-30T14:31:06.627000
|
||||
CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000
|
||||
CVE-2024-6592,0,0,774b02abc9a341465f921917d82b309b3271b39fa6eaccc5903cbff98ad507d8,2024-10-01T16:06:09.937000
|
||||
CVE-2024-6593,0,1,8f2655c01f1a83b7a90fb05748c8d626172d70351c6af6caea97afc7c1e3cc00,2024-10-01T19:37:55.573000
|
||||
CVE-2024-6594,0,1,2593d3c0abe72883de12f7c5bcc72b3469cc3337afbd9c16e369acfd8c35d63c,2024-10-01T19:41:08.783000
|
||||
CVE-2024-6593,0,0,8f2655c01f1a83b7a90fb05748c8d626172d70351c6af6caea97afc7c1e3cc00,2024-10-01T19:37:55.573000
|
||||
CVE-2024-6594,0,0,2593d3c0abe72883de12f7c5bcc72b3469cc3337afbd9c16e369acfd8c35d63c,2024-10-01T19:41:08.783000
|
||||
CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000
|
||||
CVE-2024-6596,0,0,8001cefbd18b27b44dffd25d89889cfeadffdcc6d2b877cab97cdf4b13170018,2024-10-01T12:26:45.967000
|
||||
CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000
|
||||
@ -262736,7 +262747,7 @@ CVE-2024-6932,0,0,b45f238b66342b8a7c2c79c0dddcacbab87276fdb0cd01ae77c1653350b609
|
||||
CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6934,0,0,e803290e0f45598964544bee83d9eab1d1648748432498a6102e4608f1e931cb,2024-09-10T20:22:56.390000
|
||||
CVE-2024-6935,0,0,e72e7506294a595ab2cf5db5061b1cb277319bbf98ed1b3e690a38f115d41f6a,2024-09-10T20:14:55.343000
|
||||
CVE-2024-6936,0,0,c3135623e07bfa962eaae47b33235e55701757a791431ecc292302b1d8016c20,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6936,0,1,1709a234b5c59ba1493b0dd105fab2e74988aa262e2e78535f0b41c6d2257151,2024-10-01T20:37:34.150000
|
||||
CVE-2024-6937,0,0,9f011e32ee5611afd15c42ca9833c85e92433cbb9a85515a07cac7b3da88768e,2024-10-01T16:51:29.433000
|
||||
CVE-2024-6938,0,0,b45e7150592dc53d2d6f8456f74caeee413b2781d0948d41717bd8701ae68b88,2024-07-22T13:00:31.330000
|
||||
CVE-2024-6939,0,0,a7847aa2e67130908ca4b0fccbd5e84e8651f5b038701465ea8b316a5bed0334,2024-09-20T22:55:37.133000
|
||||
@ -262884,7 +262895,7 @@ CVE-2024-7146,0,0,0d097eb41f121dd3c78bcb7ece20b3c3122f8d7908fd573306f5f8009daac9
|
||||
CVE-2024-7147,0,0,d64b7d45d4df4fda891fe044ed5ed11da3adfb67eec103504ae2ce9a34185836,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7149,0,0,ef084513070b63be43d2b9419aae4af22b746649f4805a3227c23f4589d058d4,2024-09-30T12:45:57.823000
|
||||
CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000
|
||||
CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7151,0,1,414c1240860ea75ab59ee6e10e908928a07d954f70fe0075d0c8750033db15c0,2024-10-01T20:28:02.453000
|
||||
CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7153,0,0,9aefcf5212f7daa00d220d7b2b9f573be0a36b383139766fde3ad17e71ad7b77,2024-07-29T14:12:08.783000
|
||||
CVE-2024-7154,0,0,e57552471881e1a14b1caaa59dc9c6ca8d39660d594fa4a96870a943590cfe91,2024-08-08T12:38:38.570000
|
||||
@ -263106,7 +263117,7 @@ CVE-2024-7415,0,0,4f3e91f02c270ceca383c924b673a911f19c76918de0da2e60f23a61a9c60f
|
||||
CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000
|
||||
CVE-2024-7418,0,0,6785004d3e0c8a7d4acd7be47cb26ee53d058e1a0fbb989539468dc8c9c8a1ec,2024-08-29T13:25:27.537000
|
||||
CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000
|
||||
CVE-2024-7421,0,1,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000
|
||||
CVE-2024-7421,0,0,4b103fff50da4b09038f9929ad3e23e3be25f08bd3025dbf87bd771ab41116d2,2024-10-01T18:36:59.117000
|
||||
CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000
|
||||
CVE-2024-7423,0,0,683032207cd0b1b10abe49d0a408feb34a406022ce5c9940510e7ae64734c49a,2024-09-26T20:08:31.863000
|
||||
CVE-2024-7426,0,0,6a71007700c4116b380e5f6e6a7f1695f7459185616f96253328245521427764,2024-09-30T14:17:51.317000
|
||||
@ -264074,7 +264085,7 @@ CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488
|
||||
CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000
|
||||
CVE-2024-8883,0,0,d39bf3fdabe814eab7383cf7d0056d70749ac8a21f6ccaada9d165b73ef13b6c,2024-10-01T13:15:03.313000
|
||||
CVE-2024-8887,0,0,0407ca62fcbad308289f29aa7a81815bcc03d59968582f8cfbf5cd23bcc12817,2024-10-01T17:30:07.597000
|
||||
CVE-2024-8888,0,1,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000
|
||||
CVE-2024-8888,0,0,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000
|
||||
CVE-2024-8889,0,0,409f189e1cc8763baf41f6d7663087a2138f3ee0ecad616a441fc7d44385c004,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8890,0,0,853fdfae0cb7e409cedb2bfde6ac5084d9565e6d8770bf21e4fc31a9e1d858a1,2024-10-01T15:46:33.750000
|
||||
CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775bc2,2024-09-26T18:50:56.827000
|
||||
@ -264110,13 +264121,13 @@ CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4
|
||||
CVE-2024-8965,0,0,4ba541e4606533e3a8bee7a33ff07d0a9f7a7b73c53d09de5034be2d80daa7c8,2024-09-30T12:46:20.237000
|
||||
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
|
||||
CVE-2024-8974,0,0,d4bcc9476e440aef15c3a18c780e18e6939f5911111a1f36c9f70c7d14bcd4bb,2024-09-30T12:46:20.237000
|
||||
CVE-2024-8975,0,1,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
|
||||
CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000
|
||||
CVE-2024-8981,0,0,a6dff398f54eed438863305f0063a0cfe917abfa14511ee9bceae99f41bf945c,2024-10-01T03:15:02.470000
|
||||
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
|
||||
CVE-2024-8989,0,0,6ab2546ec964e99a431fecbc3726785c0f1928620ca5ffdda7abd4a623d7c876,2024-10-01T08:15:04.840000
|
||||
CVE-2024-8990,0,0,5f3121a9544cb00fa60db849505a5187b12f6013895f285bda1d0b2e597f3595,2024-10-01T08:15:05.060000
|
||||
CVE-2024-8991,0,0,09885cc5ee50368e772186dae89932abe94e78de6f22233b671ca629cda9542e,2024-09-30T12:46:20.237000
|
||||
CVE-2024-8996,0,1,b0907780bcace0477557b6ba9bb55a2aefa2e27bdc88e1eb50e40fe332316c17,2024-10-01T19:16:02.793000
|
||||
CVE-2024-8996,0,0,b0907780bcace0477557b6ba9bb55a2aefa2e27bdc88e1eb50e40fe332316c17,2024-10-01T19:16:02.793000
|
||||
CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000
|
||||
CVE-2024-9003,0,0,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000
|
||||
CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000
|
||||
@ -264254,22 +264265,24 @@ CVE-2024-9326,0,0,bc58a26c9b43fcdd4054d9300d5d0cde5547399aaa29865b7fca11d142895d
|
||||
CVE-2024-9327,0,0,789b0175cdbfabd0a2b291c27ea4b21dfccf76f50782f3eac2c88bada4dfe956,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
|
||||
CVE-2024-9329,0,0,98bed362b2a24e4db4311c4ce14eee7b5d7d3a2b87c87f5c94a31ac7bc8ac4f5,2024-09-30T12:45:57.823000
|
||||
CVE-2024-9341,1,1,d5fd607e07f2946dcf80c0714f2f83eb8231c34e7bb32f10864cd8428533f0a9,2024-10-01T19:15:09.500000
|
||||
CVE-2024-9355,1,1,bc71c5b9ebfc4eac935290ed6c54b2a101846c60f03637d231f1d92ea2a8c69d,2024-10-01T19:15:09.793000
|
||||
CVE-2024-9341,0,0,d5fd607e07f2946dcf80c0714f2f83eb8231c34e7bb32f10864cd8428533f0a9,2024-10-01T19:15:09.500000
|
||||
CVE-2024-9355,0,0,bc71c5b9ebfc4eac935290ed6c54b2a101846c60f03637d231f1d92ea2a8c69d,2024-10-01T19:15:09.793000
|
||||
CVE-2024-9358,0,0,0152cc075779a766d901f87385961645ed224130afe67fa457b1ec2b8de41536,2024-10-01T02:15:10.340000
|
||||
CVE-2024-9359,0,0,5e91a64536057dea096939e15114b5b156ad006dfcccaeb6e7ef261c97c1ddd2,2024-10-01T02:15:10.657000
|
||||
CVE-2024-9360,0,0,bc1b1d81b39a5da5efaa713a48768241d5b68973f72008d946c08564d584aa3a,2024-10-01T03:15:02.690000
|
||||
CVE-2024-9391,0,0,4c41432718e7451dc470a85181cb09fb2bd64b781f5907911b14b935baeaf954,2024-10-01T16:15:10.510000
|
||||
CVE-2024-9392,0,1,407207e9e6bd2b7ba92ed54ef3a4a35aab092bf9644ceeea6fbb3985d013ec81,2024-10-01T19:35:08.990000
|
||||
CVE-2024-9392,0,0,407207e9e6bd2b7ba92ed54ef3a4a35aab092bf9644ceeea6fbb3985d013ec81,2024-10-01T19:35:08.990000
|
||||
CVE-2024-9393,0,0,7475863af582d7682a6cb667413720d8e8e419cf18be5c21c0a8d554e15e8e48,2024-10-01T16:15:10.623000
|
||||
CVE-2024-9394,0,0,94ac2f796a28a48fb8529db6d17f57bb7aa19d5460b4224a06e050de703c7467,2024-10-01T16:15:10.683000
|
||||
CVE-2024-9395,0,0,146f3b6c203b667b0708a9cd79c0e427dcadd8287fbd519c028fdd750b54ddc2,2024-10-01T16:15:10.740000
|
||||
CVE-2024-9396,0,0,a50ce8a9060c20d0ea77d2742b7c06ef5085a0732da723d5dac6169147daa334,2024-10-01T16:15:10.790000
|
||||
CVE-2024-9396,0,1,30f872d95bfbe66505283ad3346d27217f937a94e7cff3447a4a7706017b7395,2024-10-01T20:35:19.027000
|
||||
CVE-2024-9397,0,0,0e6dc018e27e106f8465f46982df3d3806f8eaa1705916a22bae5ef9542138bc,2024-10-01T16:15:10.847000
|
||||
CVE-2024-9398,0,0,cbf6d5eea6bb52c18b5f761a5bd1d0e77b201a1de5510ad862b43de95ab8a99e,2024-10-01T16:15:10.913000
|
||||
CVE-2024-9399,0,0,7831716ae62b7b01e34c5c67a387b7643b5b679c0690629c11f4db300e7b381a,2024-10-01T16:15:10.980000
|
||||
CVE-2024-9400,0,1,cc4fb93e00abf7802426c11e025b2c7a4c7347dd968ff958c1332299ebead6de,2024-10-01T19:35:10.277000
|
||||
CVE-2024-9401,0,1,ccf23971d5a906be4b8d96e3aa94ed0071c57600834a3074e4d71320bf7c6562,2024-10-01T18:35:10.363000
|
||||
CVE-2024-9402,0,1,9433d310ea442611994bb49cae76b6abe099452fd68462d2a25ab8d64b3a2459,2024-10-01T19:35:11.270000
|
||||
CVE-2024-9403,0,1,66d9e463986ac67ad9bceb6cae4045b10ea740cc9a13552aa6348c37ab2ae35e,2024-10-01T19:35:12.057000
|
||||
CVE-2024-9400,0,0,cc4fb93e00abf7802426c11e025b2c7a4c7347dd968ff958c1332299ebead6de,2024-10-01T19:35:10.277000
|
||||
CVE-2024-9401,0,0,ccf23971d5a906be4b8d96e3aa94ed0071c57600834a3074e4d71320bf7c6562,2024-10-01T18:35:10.363000
|
||||
CVE-2024-9402,0,0,9433d310ea442611994bb49cae76b6abe099452fd68462d2a25ab8d64b3a2459,2024-10-01T19:35:11.270000
|
||||
CVE-2024-9403,0,0,66d9e463986ac67ad9bceb6cae4045b10ea740cc9a13552aa6348c37ab2ae35e,2024-10-01T19:35:12.057000
|
||||
CVE-2024-9405,0,0,e9703465f499653ca07470a1ffd16e91f994c6f46933e9f402589910617b650e,2024-10-01T12:15:03.893000
|
||||
CVE-2024-9407,1,1,844e60b42bd22ac882920576f0244b4221aa1cb4e0aeb01caf7aa58317c74c32,2024-10-01T21:15:08.530000
|
||||
CVE-2024-9411,1,1,0ed7229fadcaa0ba2be6aae3ed0a903fea8ee7057f413ca8d29b7080b09aae26,2024-10-01T21:35:07.620000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user